ID: bec951 June 4, 2020, 6:41 a.m. No.9464037   🗄️.is 🔗kun   >>4130 >>4559

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.

 

Traffic analysis /meta data can tell everything about an individual without ever knowing real world identities. Where we shop, how we vote, or if we vote, why. If a subject's identity matters, it is trivial to 'unmask'and identify by name, social security number or any other registry system.

 

But there's no reason to care about our real world identities. An opponent doesn't need to have a name to manipulate an individual news feed and to provide specially prepared media content that will prompt the target to voluntarily choose a given course of action - to act and think in ways harmful to that individual and the community they are part of.

 

Media news content can make us angry or sad, stimulate us sexually, make us recall old grievances, encourage us to drink or take drugs, make us feel more threatened by, or less conscious of, race, religion and economic status. Using out metadata allows marketers and digital enemies to modify that news and media content that shapes our beliefs and forms our understanding of the world.

 

To defeat traffic analysis and remove the possibility of this type of control we need to engineer a specific type of advanced network.

 

An identity based secure network which use a series of specially configured servers called a "mix net" which scrambles the data of millions of users messages at the same time; encrypting, mixing and routing the messages through multiple servers, re mixing and encrypting at each stage, making it impossible for others to determine where a message came from, defeating "traffic analysis."

 

https://en.wikipedia.org/wiki/Mix_network

 

(The former data limitation of mixnets has been largely overcome.)

 

Mix nets are only one component of a secure information distribution system, one that the world needs to secure our common information supply and prevent the most common and widely used forms of surveillance, manipulation and social control.

 

The chief requirement of a secure network is identity. We need a single, permanent lifetime identity in virtual space for the same reason we need one in the real world.

 

If our friends or neighbours could switch identities and appear to be someone else in the real world we would not know who to trust. We'd be surrounded by shapeshifters -like the internet -where there is no fixed or permanent identity. On an anonymous insecure network it is possible to spoof credentials and present a convincing and deceptive appearance to cheat and manipulate others.

 

We need a single permanent life time identity - but we also need assured anonymity.

 

There are lost of good reasons for someone to want to be anonymous. To make a gift. To blow the whistle on crime. To buy and sell without giving your real world identity to a merchant who sells it to others.

 

On a secure "identity based" network it is possible to do everything anonymously - credentials can be split many ways. If an anonymous user wants to offer proof of expertise while remaining anonymous it is possible to do that. We can display credentials and others can see they are real without revealing any more of ourselves.

 

Networks are not secure for anybody until they are secure for everybody.

 

We need to build the information system of the future as an international engineering project, so the safety and engineering are open to all the nations who will depend on this infrastructure to support civilization.

 

We can not allow an enemy to capture our information systems again. The way to prevent this happening is to make the network a public utility owned and controlled by users used to provide media content provided by trusted individuals or companies, unmanipulated by anyone else. Secure for all, because it is secure from all, even the people who build it.

ID: bec951 June 4, 2020, 7 a.m. No.9464214   🗄️.is 🔗kun

What happens when a country develops ideologically or ethnically segregated information distribution systems - news and entertainment?

 

Segregated information systems are partisan, they select for facts and interpretations favorable to their ethnicity or

ideology. They amplify Fear Uncertainty and Doubt.

 

The control of information systems was critical to initiating violence in the Balkans. People had lived in peace there for

generations - Muslim, Christians, Jews intermarried in Sarajevo and everyone was related - a great deal of trust been built up and the people resisted the cult's effort to inculcate hate. Until the false flags made then fearful and the lies were all that was left.

 

In Yugoslavia criminal cultists used the local ethnic news systems supported by multiple false flags and so-called "active measures" to create the mutual fear uncertainty doubt and suspicion necessary to initiate the Balkan civil war, which in turn was the pretext for the cult's first worldwide MSM partnered multi-hundred billion dollar "humanitarian" looting of the compassionate, unwitting public.

 

These conditions - ideologically segregated news and 'entertainment' networks - mean that there exists no common set of facts for We the People to disagree over the interpretation of.

 

It becomes impossible to tell what is real, true and important from what is trivial, false and malicious.

 

Such conditions must inevitably arise from all insecure anonymous networks. This is an axiom not an opinion.

 

Anonymous insecure networks (like the internet) permit the deniable injection of false information at every level.

 

Civilization rests on identity and secure communications. The internet provides neither.

 

Our anonymous, insecure internetwork connects the most ruthless and sophisticated criminals in the world to everyone else, anonymously, while allowing credible spoofing of identities.

 

The results of that are obvious, just as the pedovore cult now is. Only an identity based network with assured anonymity can protect us and our data and assure our future liberty and survival of a constitutional republic by instantiating our rights into its protocols.

ID: bec951 June 4, 2020, 7:07 a.m. No.9464262   🗄️.is 🔗kun

 

"An odd word that recurs obsessively in the Bible, where it appears in forty passages: "Burn their Asherah in the fire and cut down the idols of their god", "Cut down their Asherah and burn their idols in the fire." How many times and with what stubborn vehemence, does Yahweh enjoin his people. Asherah designates a goddess, the partner of Baal. And at the same time certain sacred poles, which were worshiped. Asherah is a name that condenses within itself the abomination of idolatry. Yet for a long time, until the reign of Manasseh, it happened that "the objects that had been made for Baal, for the Asherah, and for all the heavenly host" were housed inside the temple for Yahweh. For Israel, the perennial risk was that the house of Yahweh still contained the altars of other divine beings. Hence Manasseh "made his son pass through fire and practiced astrology, and magic and dealt with familiar spirits and wizards: he wrought much wickedness in the sight of the LORD, to provoke his to anger. "

ID: bec951 June 4, 2020, 7:18 a.m. No.9464336   🗄️.is 🔗kun

>>9464293

NPCs have no distinct individual personas. Nor did we until the middle ages technolgy brought cheap pocket mirrors. Before that ordinary people had no surnames, and were known by single names like super models or housepets.

ID: bec951 June 4, 2020, 7:27 a.m. No.9464407   🗄️.is 🔗kun

>>9464142

excellent idea.

There are also great example of mass popular delusions to be found in Charles Makay's book Extraordinary Popular Delusions and the Madness of Crowds.

 

http://www.gutenberg.org/ebooks/636