Geert - no need to conspire -- simple action suffices ... the most
powerful act is to identify the communications protocols one is using, and
identify who owns (or controls) those protocols, and stop using the ones that
are harvesting your attention in the form of your life-time and your
life-en
M.E.
If you are interested in exploring our situation as modeled via scalar
variations of (energy) amplification systems, I'd direct you to "The Regime of
Amplification" (pdf download) at
http://neoscenes.net/blog/archives/77892
One paramount feature of amplifiers is that they consume prodigio