Re: OpenBSD FreeBSD: Why and How
HI KURT Original Message On Nov 13, 2019, 6:40 PM, Kurt Buff - GSEC, GCIH wrote: > https://www.over-yonder.net/~fullermd/rants/bsd4linux/01 > > On Wed, Nov 13, 2019 at 6:03 PM grarpamp wrote: >> >> https://sivers.org/openbsd >> https://news.ycombinator.com/item?id=21521774 >> >> https://openbsd.org/ >> https://freebsd.org/
Re: OpenBSD FreeBSD: Why and How
A primary thing *BSD needs for "hip young newbie" attractiveness is something less geriatric than CVS as their source code distribution system... no matter how secure, stable etc it is, it's $CURRENT_YEAR already and I for one welcome our Git overlords. There's "conservative, stable processes", then there's simply a lack of will to engage the learning curve required to properly learn and deploy that which is fundamentally superior in very way (except of course, that the commands are different, and from the ultra conservative view, that is, in fact, inferior). On Wed, Nov 13, 2019 at 07:40:17PM -0700, Kurt Buff - GSEC, GCIH wrote: > https://www.over-yonder.net/~fullermd/rants/bsd4linux/01 > > On Wed, Nov 13, 2019 at 6:03 PM grarpamp wrote: > > > > https://sivers.org/openbsd > > https://news.ycombinator.com/item?id=21521774 > > > > https://openbsd.org/ > > https://freebsd.org/
Daily Wire's Josh Hammer: "Jew hatred is in the DNA of Europeans" - [PEACE]
>From the "know thine enemies" dept comes a handsome reporter tweeting some basic facts to the world, this one that we all well know about Europeans and our DNA: What Did Daily Wire Writer and Ben Shapiro Employee Josh Hammer Mean by This? http://dstormer6em3i4km.onion/what-did-daily-wire-writer-and-ben-shapiro-employee-josh-hammer-mean-by-this/ Josh Hammer, a Daily Wire editor at large, said on Tuesday that “Jew hatred is in the DNA of Europeans.” He deleted the tweet without explanation, but it’s been archived. https://archive.fo/Fd8rI ... Remember to always take it with a grain of salt when Ben Shapiro or one of his goons calls anything anti-Semitic. They believe that all Whites are “inherently anti-Semitic.” — Nicholas J. Fuentes (@NickJFuentes) November 13, 2019 That’s certainly one way to look at race – certain races are genetically hardwired for a hatred that is defined as evil, meaning that this race is genetically evil. ... I’m not really seeing that Jew hatred is inherent in European DNA. I am seeing that Christian hatred is inherent in Jewish DNA. I’m also seeing that criminal behavior, perverse sexuality, financial scams, lying and a desire to dominate non-Jewish societies is also inherent in Jewish DNA. But I’m certainly willing to have an open discussion with Daily Wire editor and Ben Shapiro employee Josh Hammer about what behaviors may or may not be hardwired into the DNA of both our races. And I’m not triggered if Josh thinks I’m genetically predisposed to Jew hatred, and hope that he will not be triggered by my beliefs that Jews are genetically predisposed to these behaviors I’ve listed. The thing is: last week I listened to a speech where he said that http://dstormer6em3i4km.onion/groyper-war-zog-strikes-back-as-kooky-kike-ben-shapiro-gives-anti-groyper-basket-of-deplorables-speech/ race is “nothing but melanin content in the skin,” and made the outrageous claim that anyone who disagrees with that statement is stupid and evil. http://www.youtube.com/watch?v=gPyRjTCuCV8 “Race does not have ideals, it’s just a melanin level,” Shapiro declared. “It’s just a skin color or a place of origin. If you think it does, you’re absolutely indistinguishable, you are identical to the identity politics left, to the intersectional left.” ...
Re: OpenBSD FreeBSD: Why and How
https://www.over-yonder.net/~fullermd/rants/bsd4linux/01 On Wed, Nov 13, 2019 at 6:03 PM grarpamp wrote: > > https://sivers.org/openbsd > https://news.ycombinator.com/item?id=21521774 > > https://openbsd.org/ > https://freebsd.org/
Re: Intel Fucks Up Jump Conditional Code Cache, New ucode
On Wed, Nov 13, 2019 at 06:20:49PM -0500, grarpamp wrote: > On 11/13/19, Georgi Guninski wrote: > >> Users flock to AMD. > > > > Is AMD really better? > > I suspect it is the same garbage as Intel. > > AMD's price:performance is compelling right now, > and enjoying underdog rising. > > It's seen less of the exploit parade than Intel has lately. > That doesn't mean AMD is any better regarding > potential vulnerabilities. > > Given that AMD (and Intel, IBM, ARM, Qualcomm, Broadcom, etc) > are all closed HW garbage, there are surely entire classes > and vast mounds of garbage waiting within them to be security > advisoried and exploited, were they only to be opened up. > They have refused to do that for longer than most users > have been alive. > > So at this point, people would be better off ignoring > them, and coming together to create something > new for the world... > > #OpenFabs , #OpenHW , #OpenAudit > > That will be compelling to userbase and markets, > a new class of open underdogs rising. I vote for grarpamp and Juan as #OpenAudit inspector generals :)
Re: tor stinks, take #376029
On Wed, Nov 13, 2019 at 07:06:26PM -0300, Punk-Stasi 2.0 wrote: > https://www.freehaven.net/anonbib/cache/active-pet2010.pdf > > "Suppose the adversary runs just two routers. If we take into > account the way Tor chooses circuits, the size of the network ], > and the number of users observed on Tor in one day , we expect the > adversary to compromise 15 users at least once in that day. If the > adversary provides the top two routers by bandwidth, the expected > number of compromised users increases to 9464.1 Thus, the system > provides poor anonymity against a wide variety of realistic > opponents, such as governments, ISPs," Thanks heaps for the tl;dr paragraph. Very succinct. Important/ foundation question for any alternative to Tor: What alternative network topologies are actually able to protect (to any relevant degree) against traffic analysis by governments and ISPs? Here are some possible network topologies/ connection models, which may (or may not) provide any such improvement: - split connections / connection bonding / massive micro routes etc - enter the network, and access network and data/cache resources, through some number of simultaneous routes, rather than only one - peer with one or more meat space "friend" nodes - quid pro quo in concept - access of resources may or may not hop initially through your friend, but when your outgoing resources access speed is capped to your chaff filled F2F link max throughput, then adversarial node may not know whether it is you, or your friend through you, accessing the network resource - if adversary is also able to actively monitor all your friend's node's links, then identifying who is requesting and or sending what, becomes trivial - access through dark links (private back haul, Eth Over The Fence, Neighbour 2 Neighbour "street" wireless, guerilla HAM mesh, opportunistic mobile phone wireless mesh, etc) - each node in such a guerilla mesh may also have normie net (regular Internet/ ISP/ govnet) access - the local dark link backhaul may provide some relevant "mix"ing against active adversaries moar ?? > that comes directly from supreme scum-master syverson himself. What's really > astounding is that at the same time syverson and the rest of tor shitbags > advertise tor as a means for people to "protect themselves against traffic > analysis".
OpenBSD FreeBSD: Why and How
https://sivers.org/openbsd https://news.ycombinator.com/item?id=21521774 https://openbsd.org/ https://freebsd.org/
Cryptocurrency: Buy Kryptoez Socks PoS instead of Stupid Rocks, Brave Browser Hits 1.0
https://old.reddit.com/r/Bitcoin/comments/dvr7fb/got_my_cryptosocks/ https://i.redd.it/dna9s63m8gy31.jpg https://www.mtsocks.com/ProofOfSock https://old.reddit.com/user/mtsocks https://www.bloomberg.com/news/articles/2019-11-13/the-problem-with-diamonds-is-they-keep-getting-cheaper https://brave.com/brave-launches-next-generation-browser/ Includes crypto rewards micropayment system. https://thenextweb.com/hardfork/2019/11/13/bitcoin-swiss-bank-greenlight-regulators/ https://old.reddit.com/r/Monero/comments/dvmc8v/former_interpol_director_cashless_societies/ https://old.reddit.com/r/Bitcoin/comments/dvum27/to_paraphrase_what_jay_powell_just_said_our_debt/
All Activities Monitored: How military drone technology is quietly creeping into policing, business, and everyday life
https://www.thenewatlantis.com/publications/all-activities-monitored https://news.ycombinator.com/item?id=21527328 Around 2006, a holy terror must have seized Iraqi insurgents. It must have seemed that, just as at Homer’s Troy, the gods were watching the battle from above and took sides. Seemingly without regard to whatever precautions they might take, insurgents were being slaughtered left and right — not only those directly confronting American troops or government forces, but even the financiers, couriers, bomb builders, and bomb placers. Death might find insurgents in their cars via Hellfire missile or in their homes in the middle of the night. Friends and compatriots were disappearing, snatched up in the desert or arrested at checkpoints. Precautions like using burner phones or in-person messengers no longer seemed to be working nearly as well. Terrorist and insurgent networks were collapsing, and the numbers of successful attacks against Americans were dropping. Why?
TPM-FAIL: Trusted Platform Module - Exploited
http://tpm.fail/tpmfail.pdf https://github.com/VernamLab/TPM-Fail TPM meets Timing and Lattice Attacks Trusted Platform Module (TPM) serves as a root of trust for the operating system. TPM is supposed to protect our security keys from malicious adversaries like malware and rootkits. Most laptop and desktop computers nowadays come with a dedicated TPM chip, or they use the Intel firmware-based TPM (fTPM) which runs on a separate microprocessor inside the CPU. Intel CPUs support fTPM since the Haswell generation (2013). TPM chips are also used in other computing devices such as cellphones and embedded devices. We discovered timing leakage on Intel firmware-based TPM (fTPM) as well as in STMicroelectronics' TPM chip. Both exhibit secret-dependent execution times during cryptographic signature generation. While the key should remain safely inside the TPM hardware, we show how this information allows an attacker to recover 256-bit private keys from digital signature schemes based on elliptic curves. A team of academics has disclosed today two vulnerabilities known collectively as TPM-FAIL that could allow an attacker to retrieve cryptographic keys stored inside TPMs. The first vulnerability is CVE-2019-11090 and impacts Intel's Platform Trust Technology (PTT). Intel PTT is Intel's fTPM software-based TPM solution and is widely used on servers, desktops, and laptops, being supported on all Intel CPUs released since 2013, starting with the Haswell generation. The second is CVE-2019-16863 and impacts the ST33 TPM chip made by STMicroelectronics. This chip is incredibly popular and is used on a wide array of devices ranging from networking equipment to cloud servers, being one of the few chips that received a CommonCriteria (CC) EAL 4+ classification — which implies it comes with built-in protection against side-channel attacks like the ones discovered by the research team. Unlike most TPM attacks, these ones were deemed practical. A local adversary can recover the ECDSA key from Intel fTPM in 4-20 minutes depending on the access level. We even show that these attacks can be performed remotely on fast networks, by recovering the authentication key of a virtual private network (VPN) server in 5 hours.
Lula, unleashed -- Re: BrBrBr: Corrupt Brazil Swats at Greenwald
Hey hey, New World Order not quite going to plan :) And a quality Saker piece to boot. Enjoy, Escobar: Lula's "Back, With A Bang!" To Fight US Deep State's "Cocaine Evangelistan" https://www.zerohedge.com/geopolitical/escobar-lulas-back-bang-fight-us-deep-states-cocaine-evangelistan http://thesaker.is/released-lula-in-for-greatest-fight-of-his-life/ On Mon, Jun 17, 2019 at 06:30:24PM -0400, grarpamp wrote: > https://reddit.com/r/worldnews/comments/c1glfa/after_exposing_corrupted_brazilian_government/ > > https://www.commondreams.org/news/2019/06/14/after-exposing-corrupted-brazilian-government-journalist-glenn-greenwald-faces > > > Greenwald and his colleagues published leaked chats from government > officials that appear to show justice minister Sérgio Moro was > involved in a plot to keep former Brazilian President Luiz Inacio Lula > da Silva, known as Lula, from entering the country's 2018 presidential > race. The reporting has already caused controversy in Brazil and > forced Moro to answer difficult questions from the public. > > In addition to physical harm, Greenwald, who is American but lived in > Brazil for many years, says powerful members of the Brazilian > government are also threatening to have him deported because of his > journalism. > > Greenwald's husband, David Miranda, is a member of the Socialism and > Liberty Party, and was elected to Brazil's National Congress last > year. > > > > https://twitter.com/ggreenwald/status/1139275872840667138 > https://twitter.com/carlosjordy/status/1139249465062301699 > > A Congressman from Bolsonaro's party explicitly threatening me with > arrest and/or deportation for reporting on the massive improprieties > of Bolsonaro's Justice Minister and the prosecutors who imprisoned > Lula. This is their prevailing mentality, laid out explicitly: > > Assisti agora a um vídeo do Glenn Greenwald debochando do PSL dizendo > que o partido amarelou de convidá-lo na Comissão de Segurança. Vamos à > verdade: > > 1 - Eu não estava lá, mas jamais teria deixado q fizessem convite. O > convidado não é obrigado a responder perguntas, responde o que quer. > Aquilo se tornaria um palco para a esquerda blindá-lo e ele falaria o > que quisesse de forma distorcida. > > 2 - O ideal seria uma convocação, mas que, no caso dele, só seria > possível numa CPI, o que eu e @filipebarrost já estamos providenciando > coletando assinaturas. > > 3 - Independente do seu comparecimento ao Congresso, seu caso já está > sendo investigado na justiça. Senhor @ggreenwald, não pense que você é > um imortal acima do bem e do mal. Você praticou ativismo jornalístico > através de um ato criminoso, o que lhe faz cúmplice. > > 4 - Respeite o País que o recebeu, você não pode afrontar nossas > instituições e autoridades, cometendo crimes contra a segurança > nacional e não imaginar que pode ser punido criminalmente e DEPORTADO. > > 5 - Se instaurarmos a CPI, não vale amarelar e recorrer ao STF > impetrando HC para não comparecer.
Cryptocurrency: Rothschild holds GBTC
https://investors.morningstar.com/ownership/shareholders-overview.html?t=GBTC Name SharesHeld %TotalSharesHeld SharesChange %ChgfromPriorPort %TotalAssets DateofPortfolio Rothschild Investment Corp 11,500 0 11,500 New 0.02 06/30/2019 Banks and other interesting "traditional players" and parties have been showing up in worldwide crypto securities markets for years.
Microsoft OS Workaround Site "My Digital Life" Still Running
https://forums.mydigitallife.net/ ISO links, KMS, howtos, BIOS mods, Apps, etc. Seems popular, been running for years. Windows 98 Universal Product Key: VP9VV-VJW7Q-MHY6W-JK47R-M2KGJ
dastardly banker deeds, 1933 part 2 -- was Re: you can safely bet the 1933 USD fix did not apply to Rothschild - Executive Order 6102 "no personal gold ownership" - [PEACE]
>From the "when you're just about to eff over the populations of the world, you really need an iron fisted fascist government to impose a lock down and secure your new fiat printing regime" dept. Only, we've seen it all before - 1933 to be precise. Right now, with a massive global financial reset looming, it is important that a few people know a few key facts from history. The full article is quite interesting - some extracts below: How To Crush A Bankers' Dictatorship: A Lesson From 1933 https://www.zerohedge.com/geopolitical/how-crush-bankers-dictatorship-lesson-1933 https://www.strategic-culture.org/news/2019/11/08/how-to-crush-bankers-dictatorship-lesson-from-1933/?fbclid=IwAR2lf0LTf_1M6NT_6g8WwNzQFvkm7X3I2elOu3cWV_HQEX_GUFbxcdQgNGQ ... In principle, the world crisis, is no different from the artificially manufactured crises which the world faced in 1923 when unpayable Versailles debts were heaved onto a beaten Germany, which I elaborated upon in my previous report. It is also no different from the nature of the folly that unleashed unbounded speculation during the “roaring 1920s” which led to the bank-run and general meltdown. Similarly, the solutions being proposed to put out the fire by those same arsonists who lit the matches today are identical to what the world faced in 1933 as a “central bankers” solution for the world depression. ... When the bubble was sufficiently inflated, a moment was decided upon to coordinate a mass “calling in” of the broker loans. Predictably, no one could pay them resulting in a collapse of the markets. Those “in the know” cleaned up with JP Morgan’s “preferred clients”, and other financial behemoths selling before the crash and then buying up the physical assets of America for pennies on the dollar. One notable person who made his fortune in this manner was Prescott Bush of Brown Brothers Harriman, who went onto bailout a bankrupt Nazi party in 1932. These financiers had a tight allegiance with the City of London and coordinated their operations through the private central banking system of America’s Federal Reserve and Bank of International Settlements. ... It was in this atmosphere that one of the least understood battles unfolded in 1933. 1932: A Bankers’ Dictatorship is Attempted In Germany, a surprise victory of Gen. Kurt Schleicher caused the defeat of the London-directed Nazi party in December 1932 threatening to break Germany free of Central Bank tyranny. A few weeks before Schleicher’s victory, Franklin Roosevelt won the presidency in America threatening to regulate the private banks and assert national sovereignty over finance. Seeing their plans for global fascism slipping away, the City of London announced that a new global system controlled by Central Banks had to be created post haste. Their objective was to use the economic crisis as an excuse to remove from nation states any power over monetary policy, while enhancing the power of Independent Central Banks as enforcers of “balanced global budgets”. In December 1932, an economic conference “to stabilize the world economy” was organized by the League of Nations under the guidance of the Bank of International Settlements (BIS) and Bank of England. The BIS was set up as “the Central Bank of Central Banks” in 1930 in order to facilitate WWI debt repayments and was a vital instrument for funding Nazi Germany- long after WWII began. ... By May 1933, the London Conference crumbled when FDR complained that the conference’s inability to address the real issues of the crisis is “a catastrophe amounting to a world tragedy” and that fixation with short term stability were “old fetishes of so-called international bankers”. FDR continued “The United States seeks the kind of dollar which a generation hence will have the same purchasing and debt paying power as the dollar value we hope to attain in the near future. That objective means more to the good of other nations than a fixed ratio for a month or two. Exchange rate fixing is not the true answer.” .. FDR declared a war on Wall Street on several levels, beginning with his support of the Pecorra Commission which sent thousands of bankers to prison, and exposed the criminal activities of the top tier of Wall Street’s power structure who manipulated the depression, buying political offices and pushing fascism. Ferdinand Pecorra who ran the commission called out the deep state when he said “this small group of highly placed financiers, controlling the very springs of economic activity, holds more real power than any similar group in the United States.” Pecorra’s highly publicized success empowered FDR to impose sweeping regulation in the form of 1) Glass-Steagall bank separation, 2) bankruptcy re-organization and 3) the creation of the Security Exchange
Re: 5G Riddled With Security Holes
On 11/13/19, Razer wrote: > >>https://www.wired.com/story/5g-vulnerabilities-downgrade-attacks/ >>https://techcrunch.com/2019/11/12/5g-flaws-locations-spoof-alerts/ >> >> 5G [intentionally ;] full of security holes. > You're pathetic. When large fractions of all the "secure" and other protocols the world uses in history... telephony, internet, email, CPU's wifi, overlay networks, not so strong crypto applications after all, etc... have been publicly shamed time and time again, fix after fix, after mitm, after "we are doing security right / won't happen again"... Yes, that's pathetic, downright suspect, and even proven in some cases. Secure tech seems to have historically slow learning curve, coupled with anything learned being sidelined in, and out of, the market for whatever is new and hot. As such, "secure" implementations of 5G, if not 5G itself, will suffer just as many fun exploit advisories, CALEA, mea culpa, whitewashed corporate secret lies, spying, as AMPS, CDMA, 2G, 3G, 4G have and do. https://en.wikipedia.org/wiki/5G https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt-2020/Pages/default.aspx As to whatever else you may be trying to talk, call now... https://www.youtube.com/watch?v=Cx1J2CzNnS8
Re: Bolivia coup led by Christian fascist paramilitary leader and millionaire – with foreign support
On 2019-11-13 05:49, Ryan Carboni wrote: Bolivia coup led by Christian fascist paramilitary leader and millionaire – with foreign support https://thegrayzone.com/2019/11/11/bolivia-coup-fascist-foreign-support-fernando-camacho/ Read it in full, it will get to the part about Americans. Morales used violence to "win" an election, electing him for an unconstitutional fourth term. He then used violence against legislators and government officials. The army therefore had to threaten him with horizontal removal. The army is now ensuring that the letter and spirit of the constitution is being followed to hold new elections. Which elections strike me as likely to result in more of the same, since too much is up for grabs for people to follow the rules, and too many people on all sides have broken the rules. Also people are voting their tribe, faith and ethnicity, which apt to end in tribal war. We are already seeing this stuff in USA, with the deep state illegally tapping Trump's phone and fabricating evidence against him, and the governor of a Democratic party state sending thugs to break up a Trump rally, and police to protect those thugs against rally security (fed cops and rentacops), which tactics are bringing us closer in the US to political outcomes being resolved by security forces. We got rather close to a fight between rally security and anti rally security. As the 2020 election draws closer, and if Trump starts draining the swamp, we are likely to see such battles. This is likely to result in a contested election, with the outcome being resolved by whether Trump manages to arrest the Democratic candidate for quid pro quo (Plenty of Biden quid pro quo, notably him pulling the Ukraine prosecutor off investigating his son, and him collecting billions while negotiating a mysteriously terrible trade deal with China) or Trump gets arrested for quid pro quo. Democrats committed no end of arguably illegal acts when they thought that they would be in power forever, and if Trump drains the swamp, which he has ample legal grounds to do, he is likely to get through a constitutional amendment allowing him to exceed term limits, which amendment the Democrats will protest was not legally passed, and we will find ourselves in the same Bolivian situation - too much up for grabs for people to accept election outcomes, and security forces playing an ever increasing role in elections.
Re: Lovely... <3
Yes! On November 13, 2019 10:26:25 AM PST, Cecilia Tanaka wrote: >https://twitter.com/netsecfocus/status/1194574626761904128 Rr Sent from my Androgyne dee-vice
TED Talks: Cryptographers, quantum computers and the war for information
TED Talks: Cryptographers, quantum computers and the war for information. https://www.ted.com/talks/craig_costello_cryptographers_quantum_computers_and_the_war_for_information?rss=172BB350-0309
Tech Xplore: Researchers discover vulnerabilities affecting billions of computer chips
Tech Xplore: Researchers discover vulnerabilities affecting billions of computer chips. https://techxplore.com/news/2019-11-vulnerabilities-affecting-billions-chips.html
Lovely... <3
https://twitter.com/netsecfocus/status/1194574626761904128
Re: Common Networks bets 5G will replace cable internet in your home
On November 13, 2019 9:19:05 AM PST, jim bell wrote: >On Wednesday, November 13, 2019, 07:27:37 AM PST, Razer > wrote: > >On November 12, 2019 6:43:11 PM PST, "Shawn K. Quinn" > wrote: >>On 11/12/19 19:16, jim bell wrote: >>> >>https://www.cnbc.com/2019/11/12/common-networks-bets-5g-will-replace-cable-internet-in-your-home.html >> >>Doubtful. You will always be able to get more bandwidth out of wires >>than out of any wireless connection. > > >>The more I read about problems with 5G (health > >>Lower power, 5" wavelength, will operate at 4g almost all the time >(because 2 watts at 240ghz most likely won't even make it the length of >a football field and is entirely line-of-sight. Even at 2.4 ghz rain >fog and dust interferes with signal strength.) What 'health problem'? > >It won't be immediately obvious, but limited range isn't necessarily a >disadvantage: It may sometimes actually be an advantage. Remember Ricochet? Like that. You connected to a ricochet node on a nearby phone pole and it went into the hardwired phone system. This HAS TO BE safer than 50/100 watt phased array cellsites. >The concept >of "cellular" systems is that the same frequencies can be used 'nearby' >(what constitutes 'nearby' depends on factors...). A single city or >suburban block could be served by one (or a couple) of cell sites. >An old friend of mine (Who, like me, is a 'ham', an amateur radio >operator) who was working on the problem for a company explained it >this way: There are certain frequencies which are fairly strongly >absorbed by oxygen molecules in the atmosphere. You'd actually benefit >if you could place more (and very cheap) cells. I'm talking about >frequencies of about 60 gigahertz. Extremely high frequency > >| >| >| >| | | > > | > > | >| >| | >Extremely high frequency > >Compared to lower bands, radio waves in this band have high atmospheric >attenuation: they are absorbed by the ga... > | I was operating as KC6NFR (coded tech) when the manufacturers were selling all the senile rubes on the bands 1.2 ghz as the next big thing and the 'thing' could barely work through the walls of a building... SUCKERS! > > | > > | > > > >Such frequencies, if used, won't interfere with terrestrial uses. Meh. All pulse coded modulation messes with terrestrial use of hyper-sensitive microwave receiving equipment like Radio Astronomy gear, and it's broadband noise. In analog daze RA RF engineers used to build elaborate notch filters and such. Doesn't work with PCM, Square Waves. The 'corner' of the 'square' generates even order harmonics "from DC to Daylight". I SUPPOSE, like audio, one could use 'fast-fourier filtering' (Meyer Sound could make any room's reverberation disappear, even in Commodore/Amiga daze, and did so for the Grateful Dead for years) but I haven't heard of it, and due to the upper range of frequencies involved it would take one really fast computer and most likely machine/assembly language based software that I don't believe exists. Regarding harmonics... In case you never noticed, blues and rock musicians who like distortion prefer tube amps which always have a touch of 'fuzz' and really go for it when driven hard. Jazz and classical musicians who like a clean sound pick transitor amps. Tube amps deliver odd order harmonics when overdriven... 1st, 3rd, 5th... as is with music. Transistor amps generate even order harmonics when pushed and sound nasty, but jazzeers and classical musicians never overdrive their amps so... > > > >related are the last ones I remember), >>the more I have doubts about it, and especially wild, far-flung >>predictions like this one. > Some people... SOME PEOPLE... say the 5g fearmongering is russian influenced as a way of delaying the US 5g rollout. Most of the 5g fear-freaks I've met also think Putin is hiding in their closet, so if that's the case the 5g Russophobes are in reality "Putin's Puppets". That would be s apropos. Rr Sent from my Androgyne dee-vice with K-9 Mail
Re: Facebook is deleting the name of the potential whistleblower
On November 12, 2019 12:49:07 PM PST, jim bell wrote: >On Monday, November 11, 2019, 02:32:00 PM PST, Razer >wrote: > > >>Spoken like the nasty capitalist you are. Wtf are you doing on an >Anarchist list child? > > >As far as I can see, "capitalism" and "anarchy" should go quite well >together. You know, "anarcho-capitalist". There is no such thing as an "Anarcho-Capitalist" stupid. It's some bullshit Libertards like you made up. Rr Sent from my Androgyne dee-vice with K-9 Mail
Ayn Rand... A 3rd Rate Writer Desired By Disturbed Sexually Frustrated Young Men
"It's not rape if you like it..." "When Donald Trump was running for the GOP nomination, he told USA Today’s Kirsten Powers that Ayn Rand’s raped-girl-decides-she-likes-it novel, "The Fountainhead," was his favorite book." [...] "Welfare and other social safety net programs were, as Rand saw it, “the glorification of mediocrity” in society. Providing a social safety net for the poor, disabled, or unemployed, she believed, were part of a way of thinking that promoted, “satisfaction instead of joy, contentment instead of happiness… a glow-worm instead of a fire.” She, like Trump, lived a largely joyless life. She mercilessly manipulated people, particularly her husband, and, like Trump, surrounded herself with cult-like followers who were only on the inside so long as they gave her total, unhesitating loyalty. Like Trump and his billionaire backers, she believed that a government promoting working-class “looters” instead of solely looking out for capitalist “producers” was throwing its “best people” under the bus. In Rand’s universe, the producers had no obligations to the looters. Providing welfare or sacrificing one nickel of your own money to help a “looter” on welfare, unemployment, or Social Security—particularly if it was “taken at the barrel of a gun” (taxes)—was morally reprehensible. Like Trump saying, “My whole life I’ve been greedy,” for Rand looking out for numero uno was the singular name of the game—selfishness is next to godliness. Later in Rand’s life, in 1959, as she gained more notoriety for the moral philosophy of selfishness that she named “Objectivism” and that is today at the core of libertarianism..." https://www.commondreams.org/views/2019/08/13/right-wing-american-love-affair-one-most-disturbing-serial-killers Rand died in poverty and on welfare. HAHAHAHAHAHAHAHA! Most libertards will too. I'll PISS ON YOUR POTTERS FIELD HOLE-IN-THE-GROUND UNTIL I RUN OUT OF PISS! Rr Sent from my Androgyne dee-vice with K-9 Mail
Re: No, Mr. Busby, there is a Santa Claus.
On Tuesday, November 12, 2019, 11:43:59 PM PST, grarpamp wrote: On 11/13/19, jim bell wrote: >> What months of emails are missing? By my recollection, nearly all >> postings in the 1995 archive file end February 14, 1995, and resume about > >July 11, 1995. (there are a very few during this period, though.) I think > t>his simulates a 'data loss'. >Not regarding this Toad source... >1590 Jan 1995 1686 Feb 1995 1610 Mar 1995 1924 Apr 1995 1657 May 1995 1622 Jun 1995 1847 Jul 1995 1583 Aug 1995 2315 Sep 1995 2147 Oct 1995 1685 Nov 1995 1878 Dec 1995 If that source includes the actual emails, as well as the count of emails, we are in luck! >> But, very few postings mentioning "Jim Bell", >> "jimb...@pacifier.com", " ap ", "assassination politics" occur even after >> July 11, 1995: Just a handful in November and December 1995. >I forget if someone found and posted such a July match. THey may have made a small error... >> Those who faked the archive may also have deleted other emails, figuring >> that if they had only deleted a few, we would eventually learn what those >> few emails were. >The three from the Yahoo set I posted should be easy for someone to find in another set. Excellent. > By deleting perhaps thousands, they concealed what was > done. >That's possible, except that afaik no one has publicly mentioned finding any of your presumed missing early AP posts in any public or private archive prior to the first known dates posted in these threads. >That's what people should look for among their disks and peers. Yes... And that's one big reason I want some people who were on CP during that period to show up and agree that "Some things are missing!!!" >> the public had no > mechanism to force that punishment, which was very much needed. >Punishment implies perhaps some physical force as mandatory default course of action. Whereas with a real AP system... meaning one that is accessible to the public masses, and thus obviously reported on in the media... any mark for reeducation that starts accumulating satoshis will be quickly aware of their position on the list... no sane person would at that point refuse to alter their ways or stand down. Thus chance of any such force ever being actually applied is very small, and even if so, in a ratio lower than any statistically relavant property theft, damage, abuse, injury, and or death. Which is why I always believed that with a well-functioning AP system, there will actually be few deaths needed. >> the OKCB >> instead I wanted to make such incidents totally unnecessary. >Those sort of people probably did not hear about AP yet, else maybe they would have elected somehow participating in AP's more peaceful approach... gone on some speaking tours about AP to change politik started some form of convincing educational system, perhaps book making or confirming news, etc. Yes, they simply didn't go through the thought necessary to understand how AP would actually operate.
Public police misconduct leads to public condemnation
Public police misconduct leads to public condemnation. By the usual suspects, you know the ACLU, Amnesty International, etc. The major liberal press.
Some people have unbelievable lives
https://www.bbc.com/news/world-europe-43799281 A man suspected of masterminding the theft of 600 computers that were being used to mine virtual currencies has escaped custody in Iceland, police say. ... The computers were stolen during four raids on data centres around Iceland, a popular location for such centres because almost 100% of the power generated in Iceland comes from renewable sources and because of the cool climate. ... Prime minister on same flight https://www.nytimes.com/2018/05/04/business/iceland-bitcoin-heist.html Once in Stockholm, he traveled via train, taxi and ferry to Germany through Denmark. There he met “individuals” who drove him to Amsterdam. He enjoyed just three hours of freedom in the Dutch capital. Unbeknown to him, the local authorities had been quickly tipped off by two pedestrians with a cellphone photograph of a person they believed was the much-publicized wanted man. Soon after, an officer approached Mr. Stefansson and demanded identification. Moving on to a different character This guy has two prison escapes: https://www.bbc.com/news/world-europe-45729071 Rédoine Faïd: French helicopter jailbreak gangster captured In 2013, he escaped from a prison near Lille, using explosives to blast his way through five prison doors while holding guards hostage as human shields. ... Interpol stated that he had been trying to obtain forged documents to reach Israel. Someone who escaped a French prison by helicopter three times: https://en.wikipedia.org/wiki/Pascal_Payet https://en.wikipedia.org/wiki/Gordon_Novel Gordon Michael Dwayne Novel was a private investigator and electronics expert, who was known for several controversial investigations. He was most notable for his conflict with District Attorney Jim Garrison and his work as investigator for automobile industry executive John DeLorean and U.S. Attorney General Ramsey Clark. ... Gus Russo has written about the existence of a letter of marque, signed by Robert F. Kennedy, who was U.S. Attorney General at the time, which supposedly gave Banister the go-ahead to "liberate" the weaponry. I'm under the impression that these unbelievable lives are the product of faulty systems, somehow. Mysterious forces indeed. But it is possible to hire anybody, convince them of anything, and set things in motion on that basis. One of the advantages of due process is that the smartest people who operate the system can evaluate if their participation is worth it.
Re: Common Networks bets 5G will replace cable internet in your home
On November 12, 2019 6:43:11 PM PST, "Shawn K. Quinn" wrote: >On 11/12/19 19:16, jim bell wrote: >> >https://www.cnbc.com/2019/11/12/common-networks-bets-5g-will-replace-cable-internet-in-your-home.html > >Doubtful. You will always be able to get more bandwidth out of wires >than out of any wireless connection. >The more I read about problems with 5G (health Lower power, 5" wavelength, will operate at 4g almost all the time (because 2 watts at 240ghz most likely won't even make it the length of a football field and is entirely line-of-sight. Even at 2.4 ghz rain fog and dust interferes with signal strength.) What 'health problem'? >and radio astronomy That was over YEARS ago. Don't EVEN blame that on 5g. It's microwave SMOG caused by PULSE CODE MODULATED SQUARE WAVES, not 5g specifically. The 'corner' of the square wave emits even order harmonics from DC to Daylight and always have since PCM was a brand new thing. Back when there WAS NO PUBLIC INTERNET (yeah... that long ago) the Astronomy mags were already reporting that the Radio Astronomy equipment was being moved to remote places like Hawaiian mountaintops (There's an ongoing battle with the natives in Hawaii about one right now https://www.space.com/thirty-meter-telescope-protests-close-observatories.html. One media outlet is whining 'Fuck the natives. We're losing valuable observation time.' Yeah... Fuck them too.) Rr Sent from my Androgyne dee-vice with K-9 Mail related are the last ones I remember), >the more I have doubts about it, and especially wild, far-flung >predictions like this one.
Re: Intel Fucks Up Jump Conditional Code Cache, New ucode
On Wed, Nov 13, 2019 at 12:10:10AM -0500, grarpamp wrote: > https://www.phoronix.com/scan.php?page=article=intel-jcc-gaming=1 > https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files > > Users flock to AMD. Is AMD really better? I suspect it is the same garbage as Intel.
Re: 5G Riddled With Security Holes
On November 12, 2019 10:25:06 PM PST, grarpamp wrote: >https://www.wired.com/story/5g-vulnerabilities-downgrade-attacks/ >https://techcrunch.com/2019/11/12/5g-flaws-locations-spoof-alerts/ > >5G [intentionally ;] full of security holes. >Not even going to bother pasting it's so pathetic. You're pathetic. You think "5G" is the same no matter the provider. Unless you're speaking of a specific build from a specific provider this doesnt tell us shit except that US vendors are delaying their 5g rollout with assistance of all the ignorant 5g fear-freak mouthnoise-makers so they can build better security 'holes' into a protocol Huawei's CEO claims can't be cracked by Westen intel agencies in their version. At least right now. Ps. It's fun watching all the western tech mags twitch as Apple gets DESTROYED in the world's largest market, Asia. But the BEST part... 5g nutjobs are literally ignorant and apathetic... I've tried having a dicussion about the most basic RF principles with a few. Wavelenths, Half-power points. Basic physics. They're superstitious primitives who don't even know how an AM radio or most anything around them works 100 years after it's invention, and absofuckinglutely don't care. As long as the toy is shiny and works and has a BRAND name they pay premium for. Because they're superstitious they're easily led by psychopaths (priests) One of their priests even has a fud in RF engineering (wait for it)... Statistics. The ignorant led by the venal. Rr Sent from my Androgyne dee-vice with K-9 Mail > > >"Mounting those attacks takes only software-defined radios >that cost a few hundred dollars. The 5GReasoner tool also >found issues with..."