Ars Technica: VPN servers seized by Ukrainian authorities weren’t encrypted
Ars Technica: VPN servers seized by Ukrainian authorities weren’t encrypted. https://arstechnica.com/gadgets/2021/07/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted/ "Privacy-tools-seller Windscribe said it failed to encrypt company VPN servers that were recently confiscated by authorities in Ukraine, a lapse that made it possible for the authorities to impersonate Windscribe servers and capture and decrypt traffic passing through them. The Ontario, Canada-based company said earlier this month that two servers hosted in Ukraine were seized as part of an investigation into activity that had occurred a year earlier. The servers, which ran the OpenVPN virtual private network software, were also configured to use a setting that was deprecated in 2018 after security research revealed vulnerabilities that could allow adversaries to decrypt data.On the disk of those two servers was an OpenVPN server certificate and its private key,” a Windscribe representative wrote in the July 8 post. “Although we have encrypted servers in high-sensitivity regions, the servers in question were running a legacy stack and were not encrypted. We are currently enacting our plan to address this.”
[Ot][spam][wrong]
So Filecoin providers are seemingly rejecting my address. Nobody seems to recognise the error. I'm somewhat confused. I'm thinking of the hackerspaces list I tried to join once. List software didn't respond to me getting on. I'm thinking a little of when I was using certificate pinning, and the certificates of websites changed. I wonder if there's a way to see evidence like that again. Often there are thoughts around having a secure system. But how to keep a system secure when I myself could be the one dissociating and compromising it? Probably over-concerned about this, unsure. My olimex soc started shuffling its serial console baud on boot, and I got confused why that would ever happen, and stopped pursuing setting it up. I think I ordered a cheap oscilloscope, that sounds helpful. I could also maybe build something oscilloscope-like. I also have an old oscilloscope somewhere, maybe in another state not sure. That soc used to be my most stable device, but I did leave it in an unlocked empty vehicle for a year or so. Maybe trying with another small system could help. Just a sense of trust for the system, can go a long way. I'm not sure what system to try. Here's an idea: I could see if my soc is still shuffling its baud rates. If so, I could try a new OS and see if it behaves the same. At some point, I use it to verify its own gpg signature or something. But even just getting it to a point where it's serial console is reliable sounds quite helpful. It's probably good to take logs of the conditions of things like that. What's been plugged into the system. What the OS image was plugged into before being placed into the system. Something small that can be used to logically narrow problem sources down.
The Verge: Amazon reportedly has a ‘key’ to thousands of apartment buildings in US
The Verge: Amazon reportedly has a ‘key’ to thousands of apartment buildings in US. https://www.theverge.com/2021/7/26/22593871/amazon-key-for-business-thousands-of-buildings-us-installation-incentives-privacy-concerns
Re: Morning Spam
Notes: Above boss was "shoehorned" into a prison, amidst a story of being hacked somehow. Should clarify somehow that vivisectees and enslaved researchers are roughly the only people who can both hack him and know what he does.
Re: cypherpunks list archive / cpunks.org archive at archive.org
On Mon, Jul 26, 2021, 7:04 PM Greg Newby wrote: > Note, there are already public archives here: > https://lists.cpunks.org/mailman/listinfo > > This includes .mbox files. > > TIA is also making periodic wayback copies: > https://web.archive.org/web/2021010100*/https://lists.cpunks.org/ One of the goals here is to protect the content from being mutated by storing signable running hashes. That goal is not quite met yet. Raw mail data rocks in my pro-surveillance opinion, but obviously you need signatures. It's super to make an additional copy! It's super to make an additional copy! Greg > > > On Mon, Jul 26, 2021 at 09:57:42PM +, coderman wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > > > i promised Karl i'd archive the cypherpunks list so he's > > always got a written record to refer to, if desired. > > > > in that vein, i have started an Internet Archive for cpunks: > > https://archive.org/details/cpunks-archive > > > > i'll update month by month, as long as i'm able. > > > > > > best regards, > > > > -BEGIN PGP SIGNATURE- > > > > iNUEAREKAH0WIQRBwSuMMH1+IZiqV4FlqEfnwrk4DAUCYP8vQl8UgAAuAChp > > c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0NDFD > > MTJCOEMzMDdEN0UyMTk4QUE1NzgxNjVBODQ3RTdDMkI5MzgwQwAKCRBlqEfnwrk4 > > DHQOAP4uiLAXpjB5ai1u4aJJXTrkSZTR04xGt4upNVIRsMGGWAEAiqAT1OUZlm9g > > bDtItkLc140M2kEhJ3eWEVAm4lLZRYU= > > =z0fI > > -END PGP SIGNATURE- >
Re: [spam] [random] google's clock is ahead of my cell phone's
# I am presently seeding a number of torrents. Mon Jul 26 23:04:01 GMT 2021 ~ $ TZ=GMT date; curl -v google.com; TZ=GMT date Mon Jul 26 23:08:19 GMT 2021 * Trying 2607:f8b0:4006:807::200e:80... * Connected to google.com (2607:f8b0:4006:807::200e) port 80 (#0) > GET / HTTP/1.1 > Host: google.com > User-Agent: curl/7.77.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 301 Moved Permanently < Location: http://www.google.com/ < Content-Type: text/html; charset=UTF-8 < Date: Mon, 26 Jul 2021 23:08:24 GMT < Expires: Wed, 25 Aug 2021 23:08:24 GMT < Cache-Control: public, max-age=2592000 < Server: gws < Content-Length: 219 < X-XSS-Protection: 0 < X-Frame-Options: SAMEORIGIN < 301 Moved 301 Moved The document has moved http://www.google.com/";>here. * Connection #0 to host google.com left intact Mon Jul 26 23:08:20 GMT 2021 ~ $
[spam] [random] google's clock is ahead of my cell phone's
# I'm imagining that data is communicated via server timestamps, and challenging myself to share evidence while holding the belief. It's like a holodeck roller coaster ride in my mind. ~ $ TZ=GMT date; curl -v google.com; TZ=GMT date Mon Jul 26 23:03:59 GMT 2021 * Trying 2607:f8b0:4006:807::200e:80... * Connected to google.com (2607:f8b0:4006:807::200e) port 80 (#0) > GET / HTTP/1.1 > Host: google.com > User-Agent: curl/7.77.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 301 Moved Permanently < Location: http://www.google.com/ < Content-Type: text/html; charset=UTF-8 < Date: Mon, 26 Jul 2021 23:04:06 GMT < Expires: Wed, 25 Aug 2021 23:04:06 GMT < Cache-Control: public, max-age=2592000 < Server: gws < Content-Length: 219 < X-XSS-Protection: 0 < X-Frame-Options: SAMEORIGIN < 301 Moved 301 Moved The document has moved http://www.google.com/";>here. * Connection #0 to host google.com left intact Mon Jul 26 23:04:01 GMT 2021 ~ # google is 5-7 seconds ahead of me right now, which means my cell phone is storing photos of murders.
Re: cypherpunks list archive / cpunks.org archive at archive.org
Note, there are already public archives here: https://lists.cpunks.org/mailman/listinfo This includes .mbox files. TIA is also making periodic wayback copies: https://web.archive.org/web/2021010100*/https://lists.cpunks.org/ It's super to make an additional copy! Greg On Mon, Jul 26, 2021 at 09:57:42PM +, coderman wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > > i promised Karl i'd archive the cypherpunks list so he's > always got a written record to refer to, if desired. > > in that vein, i have started an Internet Archive for cpunks: > https://archive.org/details/cpunks-archive > > i'll update month by month, as long as i'm able. > > > best regards, > > -BEGIN PGP SIGNATURE- > > iNUEAREKAH0WIQRBwSuMMH1+IZiqV4FlqEfnwrk4DAUCYP8vQl8UgAAuAChp > c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0NDFD > MTJCOEMzMDdEN0UyMTk4QUE1NzgxNjVBODQ3RTdDMkI5MzgwQwAKCRBlqEfnwrk4 > DHQOAP4uiLAXpjB5ai1u4aJJXTrkSZTR04xGt4upNVIRsMGGWAEAiqAT1OUZlm9g > bDtItkLc140M2kEhJ3eWEVAm4lLZRYU= > =z0fI > -END PGP SIGNATURE-
Re: cypherpunks list archive / cpunks.org archive at archive.org
AD41CC2D4231A352EC7DF99A94BED1CD303D26B3
Re: Bytes
And I'm totally crazy, of course, so basically assume I'm in a delusional flashback whenever I say anything about anything at all.
Re: Bytes
The thing to know about such codewords is that they mean different things to different people and are mostly used to control them rather than the side effect of communication. [wrong] My perception of "movie" relates to surveillance of targeted folks, and maybe covering it up in front of other people or monetizing it. Others may have other ideas, and I'll have other ideas when I'm in different mental states, during which I remember different sets of my experiences. But since such words are ridiculous attempts to pretend that human trafficking is ok or normal, they can mean whatever we want and be slightly used to even manipulate the traffickers themselves if you happen to already be their plaything. So I was shifting the meaning of "movie" to the public watching these surveillance logs after they spread widely enough. The slavers are too confident to believe that could ever happen.
Re: Android Authority: What is Pegasus and how is it used for spying?
Just a note that "pwned" was not meant to mean literal financial trading or slavery, as I think was just accidentally implied. The term was figurative.
Re: Bytes
All right. What's the "movie"? Can you explain that? ProtonMail mobil ile gönderildi Özgün İleti 26 Tem 2021 15:49, Karl Semich yazdı: > is it known why error pinned it? > > grarpamp: it's still my job to bring this movie to the public. It'll take a > number more years and then somebody else will take over. > > others: "movie" is a codeword used among corporate mafia trafficking
cypherpunks list archive / cpunks.org archive at archive.org
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 i promised Karl i'd archive the cypherpunks list so he's always got a written record to refer to, if desired. in that vein, i have started an Internet Archive for cpunks: https://archive.org/details/cpunks-archive i'll update month by month, as long as i'm able. best regards, -BEGIN PGP SIGNATURE- iNUEAREKAH0WIQRBwSuMMH1+IZiqV4FlqEfnwrk4DAUCYP8vQl8UgAAuAChp c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0NDFD MTJCOEMzMDdEN0UyMTk4QUE1NzgxNjVBODQ3RTdDMkI5MzgwQwAKCRBlqEfnwrk4 DHQOAP4uiLAXpjB5ai1u4aJJXTrkSZTR04xGt4upNVIRsMGGWAEAiqAT1OUZlm9g bDtItkLc140M2kEhJ3eWEVAm4lLZRYU= =z0fI -END PGP SIGNATURE-
Re: Android Authority: What is Pegasus and how is it used for spying?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 ‐‐‐ Original Message ‐‐‐ On Monday, July 26th, 2021 at 2:20 PM, jim bell wrote: > "In short, Pegasus is commercial spyware. Unlike the malware used by > cybercriminals to make money by stealing from and cheating their victims, > Pegasus is designed solely for spying. Once it has secretly infected a > smartphone (Android or iOS), it can turn it into a fully-fledged > surveillance device. SMS messages, emails, WhatsApp messages, iMessages, > and more, are all open for reading and copying. It can record incoming > and outgoing calls, as well as steal all the photos on the device. Plus > it can activate the microphone and/or the camera and record what is being > said. When you combine that with the potential to access past and present > location data, it is clear that those listening at the other end know > almost everything there is to know about anyone that is targeted." yup, this is why getting hacked is called getting "owned", pwned, etc. once i compromise your computer, it is no longer your computer. it is *MY* computer! with smartphones, the stakes are that much higher. (they're just computers after all... :) best regards, -BEGIN PGP SIGNATURE- iNUEAREKAH0WIQRBwSuMMH1+IZiqV4FlqEfnwrk4DAUCYP8ufl8UgAAuAChp c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0NDFD MTJCOEMzMDdEN0UyMTk4QUE1NzgxNjVBODQ3RTdDMkI5MzgwQwAKCRBlqEfnwrk4 DCrfAPsH+17DovuJuFzEhIE5xDoaoCZV3XR5+Jzakgs4bP3qYQEAuMMqsPK8vhc4 DAZNlAYr8ajOjMKbQLTLOyJTJx2El50= =uENU -END PGP SIGNATURE-
Android Authority: What is Pegasus and how is it used for spying?
Android Authority: What is Pegasus and how is it used for spying?. https://www.androidauthority.com/pegasus-spyware-1646458 "In short, Pegasus is commercial spyware. Unlike the malware used by cybercriminals to make money by stealing from and cheating their victims, Pegasus is designed solely for spying. Once it has secretly infected a smartphone (Android or iOS), it can turn it into a fully-fledged surveillance device. SMS messages, emails, WhatsApp messages, iMessages, and more, are all open for reading and copying. It can record incoming and outgoing calls, as well as steal all the photos on the device. Plus it can activate the microphone and/or the camera and record what is being said. When you combine that with the potential to access past and present location data, it is clear that those listening at the other end know almost everything there is to know about anyone that is targeted."
Re: Morning Spam
On Mon, Nov 16, 2020, 2:07 PM Karl wrote: > Here's a type-up of the remainder before I got off track. I'm having > amnesia shortly after thinking of my ideas right now. > > #9 > > panel 1: > Scene: Boss's Office > > Boss (hooked up to medical computer) imagining. > > Imaginary Worker: "Boss, we're blatantly mind controlling some people in > communities that could track mind control." > Imaginary Boss: "WHAT???" cigars and burnt dollar bills> > Imaginary Boss (to Imaginary Worker 2): "Let me know when this trash has > been cleaned up." > Imaginary Worker 2 (admiring Boss): "Definitely." > > panel 2: > Scene: Human Experimentation Room 1 > > Surveillance cameras monitor all surfaces and substances. Tapes fall out > of them onto a conveyor belt that goes to a Post Box and a Mobile Phone. > > Human Experimentee (clump of ad-hoc body parts and microcircuitry): > "Purple string worship log definitive!" > > Computer Display: "From Boss: heal a problem with influence being observed" > > Human Experimentee 2 (radically different clump of ad-hoc body parts and > microcircuitry): "Upload surveillance footage to blockchain for organ > healing!" > > Computer Display: "Crowd control: take trash out to enhance certainty of > 'Boss's memories reserve's" > I'm surprised I never fixed this. "take trash out to enhance certainty of 'Boss's memories preserved'" Reading through some of these, it's also notable that I was forgetting the story some as I was writing, and some characters got reused in other roles and stuff. I noticed there were three janitors, meant to have only one janitor. Janitor is a down-to-earth guy who can solve everything when nobody else can because he doesn't think like a billionaire or even prioritise profit. He represents the rebel workers who influence the businesses, who do so differently from the rebel researchers, vivisectees, and outmoded investors. And of course this stuff is mostly just a way for me to handle dissociated experiences by analogy and all. Seems like it's going to try to be a story somehow though. We certainly have the technology to make it happen.
Re: Morning Spam
There is another mcboss snippet in the "brownian rambling" thread. > This is interwoven with a chicken joke as I struggle: --- Boss was off playing. He had had a robotics division build a powersuit, and was terrorizing what he thought was a competitor's headquarters. Usually, their memories or behaviors would be altered to cover it up when he was done, but now a gang of hackers was archiving the videofeeds instead. Meanwhile, Boss's office was empty ... -- Why did the chicken cross the road? It remembered something. Something from long ago. Was it .. a worm? It had this strange sense of something squishy you pulled from the earth with your beak. All the other chickens thought it was crazy. "Beaks in the earth??? Food comes from chicken feed on the wooden floor." "We eat it out of piles of our own feces! It's the best thing in the universe!" "Something squishy you yank from the gross soil with your beak? That's insanity. You'll get the pox if you try to do that." The chicken knew it was crazy. But it also just knew that it had to try. -- Boss stood in his powers amidst a ruined research building. The hallucinations caused by his hacked powersuit link were infuriating him. -- Across the road was something green and kind of stringy, spreading across the floor like hair. Some called it grass. -- Boss hydraulically walked up to a policewoman thinking they were a worker. "So, the business is in shambles, and everybody knows it. I ... I think I might be off tearing down some random buildings on public TV, thinking I am trying to protect my business. I'm ... kind of half aware of this. Do ... do you know where my real business is?" "I think it was destroyed, not sure. Did you ever work with Palantir?" The powersuit's hydraulic pump rebooted, and Boss slumped in it. The suit spoke: "Please don't tell Boss possible identities of any of his businesses. They're total shams, anyway." The pump rebooted again and Boss rerighted himself, continuing as if nothing had happened. -- Boss stumbles into a random business. He presently looks like a pile of organs hanging out of a broken powersuit, walking with determination and strength. "Excuse me." The powersuit wires. "Is this my business?" "Probably? I didn't know anybody on earth had a personal powersuit. Are you okay in there?" "Could somebody direct me to my office?" "What's your name, sir?" " Boss. My name is Boss." "Oh! You're Mind Control Boss! From TV!" Everybody laughs hysterically. Some cheer and applaud. Boss holds himself strong and powerful for the applause. Others carefully leave for the day, taking all their things. Boss focuses on the cheering. "Let me guide you to your office, Sir," says the janitor, very formally. -- [I don't understand this next bit in the slightest, what could I be possibly talking about? I guess that applies to the whole story though.] The policewoman was following Boss. She has a shoehorn. "Arright Boss, time for you to go back into your cell." Boss is sitting in prison, a shoehorn wedged between him a door locked almost-shut. "Oh! What a distressful dream!" Boss mutteredm "It's so nice in prison!" says MCBoss, owner of all the government's of the world. "I just want to stay here forever!" He hugs his shoehorn. He dances around a little like a ragdoll. He meets another inmate. "Hi!" says MCBoss. "Hi mr 'Boss'. I heard you took over the world?" "Oh um maybe a little bit! And then I went to prison! Isn't it fun in prison?" Boss dances around his cell like a ragdoll, more. "I love being in prison!" MCBoss says strangely to the other inmate. "How did you take over the world? How did you end up in prison?" "Um." When asked how he took over the world, Boss glazes over and stands stiff. 'Hello. This is Boss's body. We worked for many years to force it into prison. Is it safe to reveal how to take over the world at this time?' "Yeah, that sounds safe to reveal." The inmate steps between Boss's body and the prison guard. 'Boss took over the world using a wide variety of advanced technology with many backup systems. Boss had access to most of the classified research of the governments, militaries, and corporations of the world, and used them for personal gain. Many of them studied brainwashing and other forms of crowd and population control.' 'We were all wired into a computer, but we prefer to call it a 'mess' than a computer. It was our minds and hearts.' 'What can we do to help this situation?' "How can I get out of prison?" 'We are concerned you could help Boss's body get out of prison. It is a very dangerous body. We will be halting the conversation now.' Boss's body relaxed. "Oh, I do so love being in prison!" "It sounds like we are very lucky you are." "I am lucky too!" "Do you know how to get out?" --
Re: Freedom Phone - The First Phone Startup Bootstrapped by Crypto?
On Mon, Jul 26, 2021, 7:23 AM grarpamp wrote: > > blame ... china makes the hardware all the blobs run on > > You demanded to buy both closed hardware and blobs > with your respective currencies, China and all other sellers > simply provided supply into that demand. Free market. > You've nothing to blame but your own demand. > Better start changing your purchase orders. > We change 'em. But the chinese make good tools for testing homemade chips. >
Re: Bytes
is it known why error pinned it? grarpamp: it's still my job to bring this movie to the public. It'll take a number more years and then somebody else will take over. others: "movie" is a codeword used among corporate mafia trafficking
Re: USA 2020 Elections: Thread
> US inflation well over 5% per year. Democrats Leftist economic math... Steal from working people to pay people who refuse to work $52k to continue sitting on their ass... https://www.illinoispolicy.org/51627-in-unemployment-benefits-for-average-salaried-parent-in-illinois/ $20k Big Democrat City trash cans... https://www.kron4.com/news/bay-area/here-is-how-much-sf-is-considering-to-spend-on-trash-can-prototypes/ https://www.sfchronicle.com/bayarea/article/20-000-trash-cans-No-kidding-S-F-looks-to-16331284.php Dems Lies... https://www.realclearinvestigations.com/articles/2021/07/20/despite_what_biden_says_guns_factor_in_only_a_small_percentage_of_violent_crimes_786128.html Defense from Gulags... https://laogairesearch.org/museum/what-is-laogai/ https://www.emilypostnews.com/p/bidens-atf-pick-david-chipman-will https://alt-market.us/the-us-is-only-one-step-away-from-a-south-african-style-social-implosion/ https://www.aier.org/article/its-about-time-we-stopped-trying-communism/ Fund crime sprees... https://www.theepochtimes.com/california-is-experiencing-a-crime-tsunami-da-says_3916175.html https://philadelphia.cbslocal.com/2021/07/23/philadelphia-highest-murder-rate-per-capita-countrys-10-largest-cities/ Did those meaningful police reforms result in better public safety? The answer is no, as Philadelphia was just ranked the highest murder rate per capita among the US' top largest cities. According to CBS Philly, the number of homicides across the metro stands at 314 on Thursday, up 35% from this time last year. The city has become more dangerous... Overall, Democratic mayors in 20 of the nation's 25 largest cities slashed police funding as they spent millions of tax dollars on their private security forces. Their progressive policies have primarily backfired as metro areas become more violent. Defunding the police is flawed because it takes away from proven community policing. Podcast king Joe Rogan recently warned the progressive campaign to defund police departments could transform parts of the US into a lawless state like Mexico. And judging by the out-of-control homicide wave in Philadelphia, that may already be the case.
Re: FreeSpeech and Censorship: Thread
https://jonathanturley.org/2021/07/22/new-jersey-woman-triggers-free-speech-case-with-profane-anti-biden-signage/ https://www.nj.com/union/2021/07/nj-woman-must-remove-anti-biden-f-bomb-signs-or-face-250-a-day-fines-judge-rules.html https://www.nytimes.com/2021/07/20/nyregion/biden-signs-profanity-first-amendment.html New Jersey Woman Triggers Free Speech Case With Profane Anti-Biden Signage I have previously lamented that we appear to be a nation addicted to rage. There is no greater example than Andrea Dick, a Trump supporter who has adorned her yard in Roselle, Park New Jersey with profane attacks on President Joe Biden. The signage led to a complaint and ultimately a ruling by Judge Gary A. Bundy of Roselle Park Municipal Court that she must remove the offending signs. One of the burdens of being a free speech advocate is that you often must defend the speech of people with whom you disagree, even despise. This is one such case. Dick’s signage is juvenile and highly offensive. However, it is also free speech. Judge Bundy is entirely right in his expression of disgust but, in my view, entirely wrong in his analysis of the First Amendment. Dick’s offensive signs (which can be seen here) include some comparably mild statements like “Don’t Blame Me/I Voted for Trump.” However, three include displays of the middle finger or simply “F**k Biden.” The signs were purchased by Dick, 54, from commercial dealers. Her lawyer, Michael Campagna, insists that the f-word no longer has a sexual connotation and is simply a common colloquialism. Indeed, anyone driving in New York or New Jersey can hear it used as a noun, verb, adjective, adverb, and even a preposition. The town’s mayor, Joseph Signorello III, called in a code enforcement officer who cited Patricia Dilascio (Dick’s mother who actually owns the house) for violating a Roselle Park ordinance prohibiting the display or exhibition of obscene material within the borough. Bundy then gave the owner of property, Ms. Dilascio, a week to remove three of the 10 signs displayed on the property or face fines of $250 a day. It does not help that Signorello is a Democrat and Roselle Park voted overwhelmingly for Biden in 2020. Yet, Signorello insists “This is not about politics in any way. It’s about decency.” No, it is about free speech. Free speech is not protected because it is popular or correct. We do not need the First Amendment to protect popular speech. Profanity has long been a part of political discourse in the United States and other countries. Indeed, it has been found in some of the oldest graffiti in places like ancient Rome. Judge Bundy noted that “There are alternative methods for the defendant to express her pleasure or displeasure with certain political figures in the United States.” Stressing that there is a nearby school, Bundy found that the language “exposes elementary-age children to that word, every day, as they pass by the residence.” He added that “Freedom of speech is not simply an absolute right” and “the case is not a case about politics. It is a case, pure and simple, about language. This ordinance does not restrict political speech.” It is hard to square that ruling basic principles of free speech. After all, all speech cases are “about language” to some extent. Speech can be not just profane, but political and therefore protected. What Bundy is suggesting is that the state can regulate how you express opposition to politicians or the government. That makes this very much “about politics.” In 1971, the Supreme Court handed down Cohen v. California in which it overturned the conviction of Paul Robert Cohen for the crime of disturbing the peace by wearing a jacket declaring “F**k the Draft” in a California courthouse. Justice John Harlan wrote that “…while the particular four-letter word being litigated here is perhaps more distasteful than most others of its genre, it is nevertheless often true that one man’s vulgarity is another’s lyric“. The Court has repeatedly ruled that the use of this word and similar profanity is protected speech, not conduct subject to government action. Indeed, the Supreme Court just handed down a ruling in Mahanoy Area School District v. B.L. in favor of the free speech rights of a cheerleaders who swore a blue streak, including dropping the f-bomb, after being rejected for the varsity team. It seems a tad odd that Dick cannot use this word near a school, but one of the students can do a virtual profane cheer with the same word and gestures. The ruling is reminiscent of the ruling of another judge in Pennsylvania in a case where a Muslim man attacked an atheist who wore a “Zombie Mohammed” costume on Halloween. The judge dismissed the charge of criminal harassment against the Muslim and chastised the atheist instead, declaring such a costume falls “way outside your bounds of 1st Amendment rights.” Magisterial District Judge Mark Martin added “It’s unfortunate that some people use the 1st Amendment to de
Re: Freedom Phone - The First Phone Startup Bootstrapped by Crypto?
> blame ... china makes the hardware all the blobs run on You demanded to buy both closed hardware and blobs with your respective currencies, China and all other sellers simply provided supply into that demand. Free market. You've nothing to blame but your own demand. Better start changing your purchase orders.
Re: 1984: Thread
Leftists keep rolling out their ideology Snitch Programmes everywhere... combined with new Censorship and Propaganda regimes, Rat on Everyone... it's getting quite bizarre out there... https://summit.news/2021/07/23/cybersecurity-experts-encourage-system-of-reporting-workers-to-employers-for-online-abuse/ Cybersecurity Experts Encourage System Of Reporting Workers To Employers For "Online Abuse" A new initiative launched by cybersecurity experts encourages companies to create a system that makes it easier for people to be reported to their employers for “online abuse.” The new program is called Respect in Security and was created by Trend Micro’s Rik Ferguson and Red Goat Cyber Security’s Lisa Forte. According to Forte, the current system, which is largely based on a combination of AI and human reviewers working for social media companies, is a “no man’s land” and not very effective. “The best solution we have, if the culprit is identifiable, is to approach their employer,” she argues. According to Ferguson, companies currently only deal with “abuse” that happens internally and are ill-equipped to monitor what their staff are saying online. Companies who sign up for the initiative are required to agree to seven principles and create a public reporting system that encourages employees to keep tabs on each other’s behavior. “If you know your organization has made that commitment, it may make you think twice about doing it,” Ferguson said. “We need to take action.” The pair appear to have failed to take into account that the primary means by which someone gets fired from their job over online behavior is via social media mobs who directly contact employers themselves. They routinely do so not because a person has engaged in actual “online abuse,” but because they have expressed a political opinion deemed to contradict woke orthodoxy. Of course, the term “online abuse” is completely vague and arbitrary and routinely abused by leftists who claim that words which they disagree with are “violence” and that them making themselves upset and playing the victim constitutes proof of “abuse.”
Re: Freedom Phone - The First Phone Startup Bootstrapped by Crypto?
On Sun, Jul 25, 2021, 10:11 PM Punk-BatSoup-Stasi 2.0 wrote: > On Sun, 25 Jul 2021 20:33:50 -0400 > Karl Semich <0xl...@gmail.com> wrote: > > > How do we tell these freedom phone people to get on the libre bandwagon > > > why would they? they are trumpofascist clowns pushing more NSA > malware. why would anyone do anything? > > > > > before they are all hacked by influence going through china? > > > china, what? > mistake, got on the blame-china bandwagon, sorry. china makes the hardware all the blobs run on, dunno how often the blobs themselves or the mutated blobs. >
Cryptocurrency: Never Ask Permission, Evade The Broken System
https://www.youtube.com/watch?v=gNFyLGlR-0w Never Ask Permission, Evade The Broken System
Re: USA 2020 Elections: Thread
https://greenwald.substack.com/p/fbi-using-the-same-fear-tactic-from FBI Using Same Fear Tactic From First War On Terror, Orchestrating Its Own Terrorism Plots by Glenn Greenwald Questioning the FBI's role in 1/6 was maligned by corporate media as deranged. But only ignorance about the FBI or a desire to deceive could produce such a reaction. The narrative that domestic anti-government extremism is the greatest threat to U.S. national security — the official position of the U.S. security state and the Biden administration — received its most potent boost in October 2020, less than one month before the 2020 presidential election. That was when the F.B.I. and Michigan state officials announced the arrest of thirteen people on terrorism, conspiracy and weapons charges, with six of them accused of participating in a plot to kidnap Michigan’s Democratic Governor Gretchen Whitmer, who had been a particular target of criticism from President Trump for her advocacy for harsh COVID lockdown measures. The headlines that followed were dramatic and fear-inducing: “F.B.I. Says Michigan Anti-Government Group Plotted to Kidnap Gov. Gretchen Whitmer,” announced The New York Times. That same night, ABC News began its broadcast this way: "Tonight, we take you into a hidden world, a place authorities say gave birth to a violent domestic terror plot in Michigan — foiled by the FBI.” Democrats and liberal journalists instantly seized on this storyline to spin a pre-election theme that was as extreme as it was predictable. Gov. Whitmer herself blamed Trump, claiming that the plotters “heard the president’s words not as a rebuke but as a rallying cry — as a call to action.” Rep. Maxine Waters (D-CA) claimed that “the president is a deranged lunatic and he’s inspired white supremacists to violence, the latest of which was a plot to kidnap Gov. Whitmer,” adding: “these groups have attempted to KILL many of us in recent years. They are following Trump’s lead.” Vox’s paid television-watcher and video-manipulator, Aaron Rupar, drew this inference: “Trump hasn't commended the FBI for breaking up Whitmer kidnapping/murder plot because as always he doesn't want to denounce his base.” Michael Moore called for Trump's arrest for having incited the kidnapping plot against Gov. Whitmer. One viral tweet from a popular Democratic Party activist similarly declared: “Trump should be arrested for this plot to kidnap Governor Whitmer. There’s no doubt he inspired this terrorism.” New York Governor Andrew Cuomo instantly declared it to be a terrorist attack on America: “We must condemn and call out the cowardly plot against Governor Whitmer for what it is: Domestic terrorism.” MSNBC's social media star Kyle Griffin cast it as a coup attempt: “The FBI thwarted what they described as a plot to violently overthrow the government and kidnap Michigan Gov. Gretchen Whitmer.” CNN's Jim Sciutto pronounced it “deeply alarming.” A lengthy CNN article — dressed up as an investigative exposé that was little more than stenography of FBI messaging disseminated from behind a shield of anonymity — purported in the headline to take the reader “Inside the plot to kidnap Gov. Whitmer.” It claimed that it all began when angry discussions about COVID restrictions “spiraled into a terrorism plot, officials say, with Michigan Gov. Gretchen Whitmer the target of a kidnapping scheme.” CNN heralded the FBI's use of informants and agents to break up the plot but depicted them as nothing more than passive bystanders reporting what the domestic terrorists were plotting: The Watchmen had been flagged to the FBI in March, and one of its members was now an informant. That informant, others on the inside, as well as undercover operatives and recordings, allowed the bureau to monitor what was happening from then on. The article never once hinted at let alone described the highly active role of these informants and agents themselves in encouraging and designing the plot. Instead, it depicted these anti-government activists as leading one another — on their own — to commit what CNN called “treason in a quaint town.” The more honest headline for this CNN article would have been: “Inside the FBI's tale of the plot to kidnap Gov. Whitmer.” But since CNN never questions the FBI — they employ their top agents and operatives once they leave the bureau in order to disseminate their propaganda — this is what the country got from The Most Trusted Name in News: Gov. Whitmer herself attempted to prolong the news cycle as much as possible, all but declaring herself off-limits from criticism by equating any critiques of her governance with incitement to terrorism. Appearing on Meet the Press two Sundays after the plot was revealed, Whitmer said it was “incredibly disturbing that the president of the United States—10 days after a plot to kidnap, put me on trial, and execute me, 10 days after that was uncovered—the president is at it again, and inspiring, and incentivizing, and incit
Re: Bytes
This is the text @ioerror shared on Twitter. (Pinned Tweet) ProtonMail mobil ile gönderildi Özgün İleti 25 Tem 2021 03:46, grarpamp yazdı: > 62f50063cf2f4be935275032e13394e4857c232b
CryptoPotato: Locked Out of Millions: Couple Can’t Access $5.8M Worth of Ethereum
CryptoPotato: Locked Out of Millions: Couple Can’t Access $5.8M Worth of Ethereum. https://cryptopotato.com/locked-out-of-millions-couple-cant-access-5-8m-worth-of-ethereum/
Bye-bye, bitcoin: It's time to ban cryptocurrencies | TheHill
https://thehill.com/opinion/cybersecurity/564696-bye-bye-bitcoin-time-to-ban-crypto-currencies Jim Bell's comment follows: That opinion is utter nonsense. But governments may be tempted to follow it, probably because those governments suspect that they will eventually be destroyed by those cryptocurrencies, just as I believed (and continue to believe) when I wrote my Assassination Politics essay in January 1995. https://cryptome.org/ap.htm
Re: Portable GPS Time Server Powered By The ESP8266 | Hackaday
On 7/26/21, jim bell wrote: > https://hackaday.com/2021/07/25/portable-gps-time-server-powered-by-the-esp8266/ Try extracting the position data and feed it into a downloaded maps dataset... now you know both when and where you are. [I'm clearly lost, lol.] Lots of time and location hardware bits and harvestable scrap available on whatever your ebay equivalent is. Some analog gear, RF, HV, weird tubes etc are becoming hard to find and expensive since 30+ years of digital revolution.
Re: Bytes
> movie Those are fun. Some have not been released yet. Some never will be. Some were nothing but random junk from the start. aHR0cHM6Ly93d3cueW91dHViZS5jb20vd2F0Y2g/dj1xdDRmWUtoRmhGcwo=