Anonymous ID: 98b574 March 14, 2018, 12:52 p.m. No.664936   🗄️.is 🔗kun

No prison time. I wonder if DOJ will take action beyond this sweet SEC deal for Elizabeth Holmes.

 

https:// nam01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.vanityfair.com%2Fnews%2F2018%2F03%2Felizabeth-holmes-disgraced-theranos-ceo-charged-with-massive-fraud&data=02%7C01%7C%7Ccee18d99d6b14d16a36308d589e1104b%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636566522082071114&sdata=GllZeB1A0aKNmht0Xq9%2BBQy3bvVxJokhYuCxsb0asx0%3D&reserved=0

 

https:// nam01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.statnews.com%2F2018%2F03%2F14%2Fsec-charges-theranos-elizabeth-holmes%2F&data=02%7C01%7C%7Ccee18d99d6b14d16a36308d589e1104b%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636566522082071114&sdata=IKyEigaR1a%2B6kYZOKVKEzwP8VUW8aZ1YoiVtGepkDeg%3D&reserved=0

Anonymous ID: 98b574 March 14, 2018, 1:17 p.m. No.665168   🗄️.is 🔗kun   >>5469

Anons

Do NOT feed the schillsess

 

DO NOT respond to their clevers.

 

Do NOT annouce "filtered."

 

IGNORE the schillsess, they feed on your interactions.

 

Starve the schillsess. Send them home HUNGRY to HELL.

Anonymous ID: 98b574 March 14, 2018, 1:23 p.m. No.665231   🗄️.is 🔗kun

1820s Britain faced a crisis. Innovations in transportation, communications and manufacturing disrupted artisan industries and traditional occupations. A poor understanding of new industrial economy led to overproduction, bank failures, factory closures and very quickly, riots in all the major cities. A revolution was in prospect because the British system of government, suited to slow additive rate of change of the rural agrarian economy of a century earlier, was unequal to managing the rapid change accompanying the Industrial Revolution.

 

The Industrial Revolution was threatened by civil disorders arising from its early success. It went on to become wildly successful, and political revolution was avoided because the British reorganized their system of government using the methods, procedures and principles of the enlightenment scientific project which had given rise to it.

 

Today the United States faces a similar problem. The deep integration of computational and networking technology into every area of human endeavor has resulted in a supercharged scientific, economic and industrial environment unlike anything we’ve ever experienced. Things don’t seem to happen faster than they used to, they do happen faster than they used to.

 

We need to adapt, quickly.

 

PRIORITY: THE INTERNET

 

Powerful new technologies like the internet are accompanied by great dangers. Sometimes we know in advance what those dangers are. Often those hazards become evident only after the technology is in use. Scientists call such unforeseen unexpected qualities “emergent dangers.”

 

The most powerful transformative technology of all time, the internet, has made us richer, healthier, better educated, better fed, more peaceful and longer-lived than at any previous time in our history, and now threatens to destroy us.

 

Our civilization is entirely, utterly and irreversibly dependent on the insecure, anonymous internet, and the internet is failing.

 

Our email system is flooded with malware, phishing emails and criminal scams in profusion. Remote access trojans, key loggers and ransomware are packed in popular gaming apps and users tricked into downloading them from legitimate websites. Text messages, phone calls, and email spam offer endless, ingenious scams and swindles. Fake web sites purport to be banks, stock brokers or trusted merchants to collect our credentials. Gangs of con artists use stolen data to credibly impersonate IRS agents, file our taxes to collect refunds, apply for credit or terrify and extort unwary or intimidated victims. Phony tech support scams install malware, charging hundreds of dollars for doing so. Skimmers in ATMs and trojans in point of sale terminals steal our credit and debit card information and associated PIN numbers. Personal data or email correspondence is stolen and used to blackmail political parties, government employees and individuals in sensitive positions. Corporate data is held for ransom, and lately, frequently destroyed, even after the ransom is paid.

 

 

The internet grew from a small town with a population of scientists and academic researchers to a worldwide megalopolis, home to the most ruthless and capable criminals on earth. Anonymous, insecure networking has permitted disastrous manipulations of popular opinion, allowed sophisticated disinformation operations conducted by nation states and criminal interests to confuse, mislead and enrage US citizens, institutions and our elected representatives. The pillaging of businesses, individuals and governments by nation state criminal organizations is ongoing and described in comprehensive detail in Samantha Ravitch and Juan Zarate’s treatise, Cyber Enabled Economic Warfare .

 

 

Nobody foresaw the consequences of insecure, anonymous networking. Only over the last three years has it become incontrovertibly evident that our best combination of defensive technologies is no longer able to keep pace with the offensive innovations in crimeware produced by nation state/criminal collaborations.

 

The inherent, irremediable insecurity of anonymous networking means we must engineer and adopt a new networking framework which will change the way the internet functions.

Secure Identity Based Networking is fundamental to the management of exponential change and necessary to the reestablishment of US democracy.

 

The ideas that powered the English industrial revolution were the same that guided the Enlightenment Scientific Project, the most fruitful collective endeavor in human history. These were the same ideas whose application to the political system permitted it to rapidly adapt. As much the technology, it was the optimism which imbued the scientific project and embodied in its leading proponent Charles Babbage who inspired government and people with the courage and confidence to adapt. That enlightenment spirit still exits, summarized by the physicist David Deutsch.

 

“There are always problems. All problems are soluble.”

Anonymous ID: 98b574 March 14, 2018, 1:23 p.m. No.665236   🗄️.is 🔗kun

Part2

 

Moved by that optimism, knowing this crisis must come, a small group of computer scientists began working, several years ago, on a plan to engineer a future internet that would be safe, private and which would offer a suite of integral functions essential to government, industry and private citizens, a network that would provide for the near future advent of quantum technologies and enable us to adapt to the rapidly changing environment of advanced computational civilization. We need a secure network to take advantage of opportunities and to manage the dangers powerful, unfamiliar technologies will continue to present us with at an ever-increasing rate.

 

SECURE IDENTITY BASED NETWORKING

 

Just as we have a single, fixed, permanent lifetime identity in the real world, we must have one in the digital world.

 

What is an “identity based” network?

 

An identity based network denies access to anonymous users. Unless you are authenticated by the network you are not allowed on. With technology that exists today, we can identify individual users using reactive biometrics to a standard of higher than that which obtains visual identification of a familiar person in real life.

 

I want privacy and security. What about that?

 

People have a legitimate fear of being spied on. For that reason, a secure ID based network design prevent anyone accessing user data that could connect online activities to real world identity. To be secure for all, a network must be secure from all, including governments, intelligence agencies and those who build, operate or maintain the network. The technical means to accomplish this have been developed by Dr. David Chaum, and are viewed as integral by the computer scientists who have envisioned the secure network’s design. Dr. Chaum’s foundational work in cryptography underlies most of the secure transactions on the internet today. He is the world’s preeminent expert in computational cryptography and network security.

 

How does identity help protect us?

 

On a secure, identity-based network, every user is known to the network and network policies can be vigilantly enforced, autonomously, by the network itself, without reference to users’ real world identity. Users who violate the terms of service can be readily identified, cautioned, suspended or their activities restricted as circumstances warrant.

 

This document is not intended to be a comprehensive description of secure ID based networking technology but to give non-technical users a basic understanding of what such a network can do.

 

Secure identity-based networking globally protects all internet accessible attack surfaces and the critical infrastructure which supports civilization. It prevents enemy nations and partisan interests from fraudulently manipulating public opinion and financial markets by exploiting insecure social media networks. It inhibits distribution of malware and ransomware and can log attempts to do so. It denies control of digital space to hostile actors including governments and criminal organizations.

 

Secure identity based networking framework includes an advanced virtual environment developed at Caltech, which will facilitate commercial, scientific and artistic collaborations. It will permit legislators or citizens to assemble in cyber space, provide virtual forums for specialized discussion and the means and flexibility to handle the increasing rate of change which will continue to produce powerful new technologies and attendant, unanticipated dangers.

The wide adoption of virtual and mixed reality technologies cannot occur on an insecure internet once it becomes widely known those technologies permit “brain hacking,” allowing information to be inserted into the user’s brain, stored and retained below user’s threshold of conscious awareness and which have been shown to influence behavior.

 

Secure voting and polling systems included offer more irrefutable results and vastly improved resistance to manipulation at a thousandth of the cost of current election methods, are so integral to secure network function and of inestimable value to governments, democratic organizations and individual users who may elect to employee them.

 

Currency conversion markets, as they now exist, are unregulated, opaque and subject to manipulation. Automated “makerless” currency conversion markets offer significant advantages of convenience, economy and security which will incentivize their adoption by governments, merchants and individuals who seek to convert from conventional to digital currencies in order to transfer resources as swiftly and reliably as information.

Anonymous ID: 98b574 March 14, 2018, 1:27 p.m. No.665269   🗄️.is 🔗kun

When advertising drives communication what happens is that the standards of accuracy which prevail in the upstream controlling economic medium (advertising/marketing) are adopted by the dependent, carrier media.

 

Newspapers, TV the internet are all advertising dependent. "Standards and practices" in our entertainment industry where I work, are the standards of advertisers. Advertising is persuasion, and its standards of objectivity are extremely flexible. It's considered acceptable to omit vital information if it is contrary to the purpose of selling a product.

 

The standards of truth and the selective enhancements of marketing advocacy become the standards of communication adopted by the all media and set the course of our public discussions and interactions with each other. In the end what results is a distorted collective world view.

 

It doesn't have to be that way, but it is that way.

 

If we understand what circulates between us, what binds us together and tears us apart, is information, we can begin to think about about ourselves as having two identities. One is as individuals with varying capacities and diverse cultural operating systems, the second our primary identity, which is collective.

Anonymous ID: 98b574 March 14, 2018, 2:06 p.m. No.665607   🗄️.is 🔗kun

>>665462

My God it's almost as if they let an election take place and gathered evidence of fraud a conspiracy connecting to individual withing and even outside the democratic party.