A serious Analysis of Dogecoin — Or: Why I am all-in on dogecoin.

Leave a comment

Originally posted on Tuxedage's Essays and Musings:

dogecoin

Introduction:

For those of you who don’t know me, I am Tuxedage — organizer of the dogecoin lite wallet fund, moderator of the thousand-user strong #dogecoin and #dogecoin-market IRC channel, as well as an active member and supporter of the dogecoin community. If you are reading this, I will assume you are already familiar with cryptocurrencies, so I won’t beat around the bush.

This document explains why Dogecoin is going to the Moon.

Personal Story:

Ignore all of this if you want to skip directly to the arguments. Just scroll down  to “The Prediction” Section.

I am a bitcoin supporter. In 2013, I put in trivial amounts of money into bitcoin because I saw it as a protocol and community with significant potential. As a result, I have made a ridiculously good return on my initial investment. On Christmas of 2013, I converted from a strong dogecoin-critic to a…

View original 6,136 more words

Major new bombshells on NSA blackhat techniques at CCC 30c3

Leave a comment

This is part 2 of “To Protect and Infect” about the militarization of the Internet, where Jacob Applebaum aka ioerror talks about specific techniques used by the NSA for surveillance, exploitation and overt attack of individual targets as well as the dragnet collection of data on everyone.   I’m kind of surprised at some of the “low-tech” methods used and also at some of the ingenuous uses of combinations of vectors.  If you’re a target, there’s only so much you can do before they get ya.  As has been hinted at before in previous disclosures of this kind, it’s not impossible to stop or at least severely hamper a lot of these techniques.

The most surprising of these techniques, to me anyway because I thought of it a few weeks back after having ordered some headphones from Newegg during one of those Black Friday/Cyber Monday sales (shipping took over 2 weeks which is surprising for normally rapid Newegg, even with the holiday rush – also, UPS tracker was showing some unusual delays and weird routes), is simply intercepting a postal shipment for computer hardware and infecting it with some kind of modified firmware or even a low-tech bug like a GPS transponder or mic.  I say surprising because I just dismissed this as the meandering of my paranoid imagination, but in the case of someone who might actually be a significant target, it’s not so unrealistic after all and now we know that it’s indeed a reality.  I mean, if I were the Bad Guys, I’d try it as an attack vector, especially if I had the kind of technical, financial and political resources the Bad Guys in question certainly do have.  I first thought of this when I started buying OpenBSD media and having it shipped to me rather than installing from online mirrors – wouldn’t it be easy to intercept the envelope, steam it open and swap out a compromised set of the software?  Especially considering it’s an international shipment since they send it from Canada; I’m guessing the laws are a bit more lenient in such case…   This method and legally using the Patriot Acts to “blackbag” (break into) a target’s residence to gather intel and install backdoors of all kinds are the 2 that bother me the most because I have the least control over them.

In fact, if I recall correctly, Applebaum was just in the news recently for getting his residence in Germany infiltrated, with 3 of the 4 physical security systems he had set up bypassed and lots of items inside were obviously disturbed.  Not surprised, since the context of the news recently has been that of Snowden speaking with German media and subsequently most of the content in this CCC talk were just disclosed to Der Spiegel (and thankfully rapidly reported on by Matt Drudge and other diverse news outlets) and the source had to have been Snowden given the multitude of codenames for various techniques discussed in this talk – surely the NSA and CIA were not very pleased about this data getting disclosed.

Another important point that Applebaum constantly drives home is that the access to most of these techniques is not exclusive to the NSA – once known by the general populace, they can be exploited by *anyone* which is very irresponsible and should give you an idea about this agency’s moral compass.  Who’s to say that SCADA infrastructure, the kind that was (and continues to be! no one has closed that Pandora’s box because… it can’t be) used by the STUXNET worm, won’t accidentally trigger a disaster like a nuclear plant meltdown after accidental infection?

Anyway, an interesting highlight was Applebaum’s meeting with a political dissident from Angola who complained of a possible trojan on his MacBook and sure enough Applebaum discovered a lame background task that was doing screenshots on a regular interval.  I guess it didn’t bother to check if there was Internet connectivity since there were about 8GB of screenshots in his user directory that probably weren’t even queued up to be sent at a later point when there was connectivity.  Unfortunately, this Angolan ended up getting arrested and detained.

Part 1 is here

Boeing loses Brazilian defense contract to Saab over NSA spying

1 Comment

US high-tech companies, already suffering in a fantasy economy propped up by Keynesian stimulus and undermined by outsourcing, international trade agreements and automation, are now really feeling the heat from the blowback of slow-creep Snowden revelations.  Nobody wants a backdoored Cisco router or Microsoft operating system.  It’s so bad that DARPA/NSA darlings like Google and Facebook are rebelling against their benefactors in protest, if only in a superficial theatrical motion to save face for full complicity in all of this.

Now, the lucrative “Lord of War” defense sector, specializing in selling weapons to tinpot dictators worldwide to oppress their populaces and squabble over precious resources at the behest of the bankster cabals, are getting a taste of NSA blowback.  Zerohedge reports that Brazil is canceling a 4 billion US$ contract for fighter jets and instead going with Swedish SAAB for their flying pointy sticks:

Brazil awarded a $4.5 billion contract to Saab AB on Wednesday to replace its aging fleet of fighter jets, a surprise coup for the Swedish company after news of U.S. spying on Brazilians helped derail Boeing’s chances for the deal.

Aside from the cost of the jets themselves, the agreement is expected to generate billions of additional dollars in future supply and service contracts.

The timing of the announcement, after more than a decade of off-and-on negotiations, appeared to catch the companies involved by surprise.

Until earlier this year, Boeing’s F/A-18 Super Hornet had been considered the front runner. But revelations of spying by the U.S. National Security Agency in Brazil, including personal communication by Rousseff, led Brazil to believe it could not trust a U.S. company.

“The NSA problem ruined it for the Americans,” a Brazilian government source said on condition of anonymity.

A U.S. source close to the negotiations said that whatever intelligence the spying had delivered for the American government was unlikely to outweigh the commercial cost of the revelations.

“Was that worth 4 billion dollars?” the source asked.

“We are a peaceful country, but we won’t be defenseless,” Rousseff said on Wednesday at a lunch with senior officials from Brazil’s military, where she said the announcement was forthcoming. “A country the size of Brazil must always be ready to protect its citizens, patrimony and sovereignty.”

You all are surprised?  NSA, your retribution is just starting.  Thanks for destroying the last lynchpin of US voodoo economics, the backer of international petrodollars (AKA Federal Reserve Notes) known as the military-industrial complex.

 

Failed to uninstall the Extension Pack Oracle VM VirtualBox Extension Pack.

Leave a comment

Failed to uninstall the Extension Pack Oracle VM VirtualBox Extension Pack..

I ran into the above problem after upgrading to the latest kernel for CentOS 6.5 x86_64 with Windows 7 as the host and troubleshooting why fullscreen display wasn’t working after the upgrade.  Works like a charm.

I think I could have avoided the initial problem by installing dkms before the kernel upgrade but I haven’t reverted and tested yet.  That would make sense, though, since dkms auto-recompiles kernel modules when the kernel is upgraded.  Well, usually.

-v

Mentally Strong People: The 13 Things They Avoid

Leave a comment

Originally posted on WebInvestigatorKK:

For all the time executives spend concerned about physical strength and health, when it comes down to it, mental strength can mean even more. Particularly for entrepreneurs, numerous articles talk about critical characteristics of mental strength—tenacity, “grit,” optimism, and an unfailing ability as Forbes contributor David Williams says, to “fail up.”

However, we can also define mental strength by identifying the things mentally strong individuals don’t do. Over the weekend, I was impressed by this list compiled by Amy Morin, a psychotherapist and licensed clinical social worker, that she shared in LifeHack. It impressed me enough I’d also like to share her list here along with my thoughts on how each of these items is particularly applicable to entrepreneurs.

1. Waste Time Feeling Sorry for Themselves. You don’t see mentally strong people feeling sorry for their circumstances or dwelling on the way they’ve been mistreated. They have learned to take…

View original 834 more words

Illuminati Mind Control & the Report from Iron Mountain

Leave a comment

Originally posted on LEFT HOOK by Dean Henderson:

(Excerpted from Big Oil & Their Bankers… Chapter 13: USS Persian Gulf)

The Rothschild-led international banking cartel learned long ago that it was much easier to brainwash people than to face off with them in open combat. Over the past decades these techniques - led by television “programming” – have become quite sophisticated.

The US tested numerous top-secret high-tech weapons systems in the Gulf War theatre, while utilizing some old low-frequency favorites.  When Iraqi ground forces surrendered, many of them were in a state of delirium and lethargy that could have been induced by extremely low-frequency radio waves, which the US used as a weapon as early as the Vietnam conflict.

View original 1,594 more words

Forager’s Five: 5 Wild Edibles Found Almost Everywhere

Leave a comment

Originally posted on Zombease:

Foraging wild plantsSometimes you just don’t know where you next meal is coming from and all you can do is wander through the world hoping to stumble across something to put in your belly. Whether you’re out in the woods, wandering through the wastelands of an apocalyptic world or slinking through a fallen city, knowledge and familiarity with wild edibles could be key to staying alive.

This short guide will teach you the basic details for 5 of the most common wild edibles found across the globe. This is by no means a replacement for a more detailed guide to identifying wild edibles and should be considered as a jumping-off-point for learning to outlive the undead… among other types of disasters where foraging wild edibles becomes the most reliable method for getting your munch on.

CATTAILSCattail
Developing in late spring and early summer (later in more mountainous regions), this relatively easy to…

View original 1,159 more words

Older Entries

Follow

Get every new post delivered to your Inbox.

Join 38 other followers