Anonymous ID: 96a2a1 Dec. 17, 2021, 6:44 a.m. No.15207640   🗄️.is 🔗kun

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.

 

Traffic analysis /meta data can tell everything about an individual without ever knowing real world identities. Where we shop, how we vote, and if we vote, why and for whom. If a subject's real world identity matters, it is trivial to 'unmask' and identify by name, social security number or any other registry system.

 

But there's no reason to care about our real-world identities. An opponent doesn't need to have a name to manipulate an individual news feed and to provide specially prepared media content that will prompt the target to voluntarily choose a given course of action - to act and think in ways harmful to that individual and the community they are part of.

 

Media news content can make us angry or sad, stimulate us sexually, make us recall old grievances, encourage us to drink or take drugs, make us feel more threatened by, or less conscious of, race, religion and economic status. Using out metadata allows marketers and digital enemies to modify that news and media content that shapes our beliefs and forms our understanding of the world.

 

To defeat traffic analysis and remove the possibility of this type of control we need to engineer a specific type of advanced network.

 

An identity based secure network which use a series of specially configured servers called a "mix net" which scrambles the data of millions of users messages at the same time; encrypting, mixing and routing the messages through multiple servers, re mixing and encrypting at each stage, making it impossible for others to determine where a message came from, defeating "traffic analysis."

 

https://en.wikipedia.org/wiki/Mix_network

 

(The former data limitation of mixnets has been largely overcome.)

 

Mix nets are only one component of a secure information distribution system, one that the world needs to secure our common information supply and prevent the most common and widely used forms of surveillance, manipulation and social control.

 

The chief requirement of a secure network is identity. We need a single, permanent lifetime identity in virtual space for the same reason we need one in the real world.

 

If our friends or neighbors could switch identities and appear to be someone else in the real world we would not know who to trust. We'd be surrounded by shapeshifters -like the internet -where there is no fixed or permanent identity. On an anonymous insecure network it is possible to spoof credentials and present a convincing and deceptive appearance to cheat and manipulate others.

 

We need a single permanent lifetime identity - but we also need assured anonymity.

 

There are lots of good reasons for someone to want to be anonymous. To make a gift. To blow the whistle on crime. To buy and sell without giving your real-world identity to a merchant who sells it to others.

 

On a secure "identity based" network it is possible to do everything anonymously - credentials can be split many ways. If an anonymous user wants to offer proof of expertise while remaining anonymous it is possible to do that. We can display credentials and others can see they are real without revealing any more of ourselves.

 

Networks are not secure for anybody until they are secure for everybody.

 

We need to build the information system of the future as an international engineering project, so the safety and engineering are open to all the nations who will depend on this infrastructure to support civilization.

 

We can not allow an enemy to capture our information systems again. The way to prevent this happening is to make the network a public utility owned and controlled by users used to provide media content provided by trusted individuals or companies, unmanipulated by anyone else. Secure for all, because it is secure from all, even the people who build it.

Anonymous ID: 96a2a1 Dec. 17, 2021, 6:56 a.m. No.15207688   🗄️.is 🔗kun   >>7721 >>7733

We all know old King Solomon,

We know what happened there

He was the wisest King around,

But life is funny and he found,

That wisdom was another cross to bear.

So it all went sour for Solomon

And long before his race was run

He'd given up on life on earth

Said all is vain and cursed his birth.

His wisdom didn't get him anywhere.

Anonymous ID: 96a2a1 Dec. 17, 2021, 7:02 a.m. No.15207731   🗄️.is 🔗kun   >>7753

Though Julius Cesar was a star,

We know what happened there.

He was the biggest man in town,

But Brutus cut big Julie down.

"The bigtime" - that's another cross to bear.

So it all went sour on Julie C.,

And him as big as big could be,

Still, "Et tu, Brute,: Julie cried,

coughed up some blood, and then he died.

The bigtime didn't get him anywhere.

Anonymous ID: 96a2a1 Dec. 17, 2021, 7:14 a.m. No.15207792   🗄️.is 🔗kun   >>7813

We all know honest Socrates

We know what happened there

The truth he told wrecked his career,

It's just what no one wants to hear,

So soon enough they turned on Soc

They fed him hemlock in a crock,

See, honesty won't get you anywhere.

Anonymous ID: 96a2a1 Dec. 17, 2021, 7:20 a.m. No.15207823   🗄️.is 🔗kun

 

Holy Martin was a Saint

We know what happened there.

He hated suffering of course,

His heart was big as all outdoors,

But charity's another cross to bear.

And it all went sour on Martin too

(It has for me, it will for you)

He saw a poor man had no clothes

Tore up his cloak and both men froze.

His kind heart didn't get him anywhere.

Anonymous ID: 96a2a1 Dec. 17, 2021, 7:30 a.m. No.15207855   🗄️.is 🔗kun

The ten commandments make our day

And on the hour, prayer.

Still, here's the coldest day all year.

And you're in there. And we're out here.

And maybe we've become your cross to bear.

For it's all gone sour on everyone

So please, before my song is done,

Recall the bad things that we're not,

And come across with something hot,

Our virtue never got us anywhere,

We sang our lungs out and you didn't care.

Anonymous ID: 96a2a1 Dec. 17, 2021, 7:56 a.m. No.15207990   🗄️.is 🔗kun   >>8009

Ever been part of "the wave" at a sporting event? Stood up at a show or event and applauded because others were applauding without knowing much about who, or what the clapping was for?

 

It is trivial to exploit our human propensity for imitation to go along with the crowd and use this to propagate unconscious self-replicating social behaviors (fads, trends, crazes) in a culture for purposes of marketing or for social control.

 

It's common sense that such a phenomenon, ripe for exploitation, is being used by cultist pedovores interested in controlling human behavior – especially the for controlling the future evolution of social and economic systems.

 

Pop culture is not the organic phenomena it appears, but a cultivated artificial medium engineered to permit rapid introduction and transmission of contagious, conditioned behaviors like purchasing and to spread psychogenic illnesses, self-destructive sexual fetishes etc.

 

Cultures where commerce controls media content and where art is used to sell consumer goods also have the capacity to engineer psychological operations which induce delusions and powerful contagious mental illnesses or collective insanities.

 

Historical incidents and known forms of contagious psychogenic illnesses are described in "Extraordinary Popular Delusions and the Madness of Crowds" by Charles Mackay.

 

https://www.gutenberg.org/ebooks/24518

 

In recent years, we have seen mysterious maladies proliferate. Recently, American and European psychologists have been tracking the blue whale game, the Momo challenge, the gorilla glue challenge which use guided imagery, occult symbols sigils and glyphs to evoke a psychic dilemma which persuades victim to ice themselves or huff wasp spray. In addition to obvious mind traps like Momo and the Whale, there are similar cognitive exploits which are far more dangerous.

 

Rothko's basilisk is a logic trap to which a small segment of the population is especially vulnerable -

https://slate.com/technology/2014/07/rokos-basilisk-the-most-terrifying-thought-experiment-of-all-time.html

 

The evil clowns create both the pathology, “induced contagious, epidemic psychogenic illness” and the psyops which exploit it, constantly.

 

https://en.wikipedia.org/wiki/Blue_Whale_Challenge

 

https://en.wikipedia.org/wiki/Momo_Challenge_hoax

 

https://indianexpress.com/article/trending/trending-globally/louisiana-man-tries-gorilla-glue-challenge-with-a-cup-ends-up-in-hospital-7188330/

 

DIG MEME PRAY

Anonymous ID: 96a2a1 Dec. 17, 2021, 8:01 a.m. No.15208014   🗄️.is 🔗kun

Many people assume that technology is in some way artificial. It is as natural as a bird’s nest or a beaver’s dam, and every individual, each species and all nations have a unique developmental course. As with a seed, the full life of individuals, species and nations is inherent, contained in their beginnings.

 

A billion networked autonomous biological computational devices form an evolutionary inflection point: when the quality and speed of the connection between the nodes is optimized, it is no longer a network – it is an ‘’’evolved, parallel computational organism’’’ of unimaginable power.

 

If the data circulating in that evolved organism, circulated by and among autonomous biological processors, chiefly news and entertainment, is error corrected at successive stages, as is done with other biological networks like our blood stream, and in silicon-based networks and distributed computation; the performance of networked individuals and of the civilization in which they participate must be enhanced by orders of magnitude.

 

Human beings have two identities, the smaller, individual identity is personal, comprised of our life history, our thoughts and our sensory perceptual experience. The second, much greater identity, is collective. We all participate in this greater common identity because we participate in civilization. No single individual ever creates anything of value. Every work of imagination, every invention, scientific discovery or artistic innovation is the work of many other human beings.

 

The words, numbers and images we share are common property; they make of us what we are; they are living things with immutable properties.

 

Everyone contributes to civilization and all are free to withdraw from the transgenerational repository of mankind’s treasury of accumulated knowledge. The achievement of each benefits all without any Marxist management at all.

 

DIG MEME PRAY