11/30/2015

Why do I protect my identity?


Why do I protect my identity?


The fact that a person may want to protect his/her identity, does not mean that he/she is "up to something",


A person may have secrets and that does not make him/her suspicious; privacy must be considered a human need. We all have our own angels and demons, we all know our tears and smiles, but those "things" are ours. It is up to us if we share them or not.


We have talked so many times about smartphones, about how they keep doubling their capabilities every two years, and the way the people use their cameras to (unconsciously) destroy their privacy, destroying themselves in the process. The same way a smoker destroys his/her life... I am a heavy smoker myself, but I would never try to sue the tobacco companies for "my cancer”… it is my call to smoke more than a package a day, it is not like the cigarrete pointed a gun to my head...everything was consensual, for so to say. The world takes photos, the world talks and the world shares... criticizes and gets mad at itself; three days later the world forgets… perhaps without knowing it, the world experiences its two minutes of hate.

 

The best distraction and monitoring technique for the masses is to make the citizens to impose an aabomination called the “Penurious Censorship”, also known as "Politically Correct” language; a sterile form of language that must be used at any moment in order to avoid hurting people's feelings, a form of language that must be monitored in all situations and levels, using the ruler that the canons designed to label words as "offensive”. As George Carlin would say: Psychiatrists have actually started calling ugly people "those with severe appearance deficits". It's getting so bad that any day now, I'm expecting to hear a rape victim referred to as an "unwilling sperm recipient".


Most people who impose the Penurious Censorship language,
are as fundamentalist as the ISIS hordes. Whereas ISIS destroys Palmyra because it opposed their interpretation of the Quran; the PC Fundamentalists destroy language, sterilize creativity and castrate the part of the soul where rebellion is born; because their interpretation on what society should be, is of a place where there are no offenses; a place where no one uses criticism, and a place where no one is able to defend itself, because there is a structure that will "always defend him/her" through stiff laws; a place in which everyone is told what is best for them, and a place where people are not looking for answers on their own because they have been conditioned to believe that individualism means to excel, and the sole act of shinning, of being special, is an act of hatred towards the collective… it is funny, but tyrants dream of places such as the one I just described.


The Fundamentalist PC Police has a very methodical way to attack all those who are against their rhetoric; in the case of a group, they will divide it and attack individually with
Doxing. They always attack as a group, they always exploit the darkest and more personal elements, "forgetting" all good deeds. They will always attack the heart; it is also true that they do not care about the lives they will destroy in the process, as long as their agenda prevails. A clear example of doxing happened when Cecil the lion was assassinated by Walter Palmer. Social networks, their "opinion leaders", influencers and other Pied Pipers of Hamelin, cried out for Palmer's head (two minutes of hate), and went after every single hunter who had some sort of online presence. The PC Police attacked the cyber-jugular of these people, hidding behind the animal cruelty banner; but their main objective was to attack what hunting really represents... independence. Hunting represents a bond with the past, hunting involves physical, mental and spiritual training; hunting means to fight against one-self… all these, is part of the tyrant's shit list.


What about the ones that do not want to be part of the game? Nathaniel Hawthorne
painted an unjust and hypocritical society in “The Scarlet Letter”, a society in which a woman is condemned to carry on her chest a letter “A”, for Adulterous; because she refuses to reveal the name of her daughter's father. We live in an age of cyber-obscurantism disguised with a mask of "freedom for all minorities"; minorities that have carved in their hearts the commands of the Penurious Censorship movement. When we do the math, PC minorities become The PC Majority; and the new minorities are completely defenceless before the stranglehold of all that it is politically correct… the new scarlet letter is “I” for Intolerance. 

 

So, I protect my identity, encrypt my information,
avoid/cover cameras or cover my face; not because I am doing something wrong, but I know that there is something out there that keeps monitoring, assessing and when time is right, will be ready to attack.


All great stories in which a group of people fought a tyrant for their freedom, share the elements of secrecy, privacy and conspiracy; from the Warsaw Ghetto to the Underground Railroad,
from the Servile Wars, to Star Wars. The Sauron of our era, the one who this in charge of pulling the strings, has already found the “The One Ring”. The Sauron of our era wants to control absolutely everything, and that "everything" starts with our minds and hearts.

 

www.feexit.mx
@feexitmx
rp@feexit.mx

P.D. What happened to Cecil was regrettable, but for the people in
Zimbabwe, it had the same relevance as Ja Rule's opinion. 


 

Mirrors


Mirrors


The elders say that there are no answers, just stories. There are so many urban legends, from "The Candy Lady" to "The Devil Tree"; "Bloody Mary" and "The WMDs". All these stories are a constant reminder of certain painful and traumatic events that we that scarred our people. There are so many stories about mirrors; we have the ones that explain their capabilities as portals to other dimensions; there are stories that if a person dies in a room where there is an uncovered mirror, the soul of the deceased person will be trapped forever; and the most famous story of all...the candle, the mirror and the darkness… at 3am.

Other stories talk about reflection and duality; the pond that reflected Narcissus' image and the different alternative realities. In a way, mirrors do show us,
for a fraction of a second, what dwells inside…and this is how this article begins.



Reality is stranger than

We all have used an Internet browser, from the disastrous Internet Explorer to Firefox and Chrome; also Safari, Opera, Torch, Maxthon, Sea Monkey, Avant, Deepnet Explorer, Tor and the one that we love the most, Epic. All these browsers are like ponds, and every time we visit a website, we are allowing something very personal to come to life on screen. We all look for and consume whatever our desires ask for; but we must be capable to understand that when we look inside our souls, we are looking into the abyss… and from time to time, the abyss looks back at us. 

People think and imagine whatever they want; from the nice and lovely; to the stupid and obnoxious... probably even the ones that are illegal in Thailand... and there is no greater consequence because those things, most of the time, remain inside our heads. But what happens when those thoughts move to a computer?

The way in which a conventional internet browser works is relatively simple: there are certain protocols such as identification, the address to be visited, exchange some more information and that'
s it!.

 
Everything was so simple and somewhat transparent, but people and governments always find a way to fuck things up, Man-In-The-Middle Attack. Also, back in the day, many companies that already had an online presence decided that in order to give a better service to their clients and to improve their products, they had to know what was going through the minds of all those people visiting their websites; thus this "small list" of companies who track their users, was born.

Tor and Onion.

Tor is an Internet browser that allows its users to remain anonymous; and the easiest way to explain how it works is the following: The user opens Tor and Tor will communicate with a relay system that creates a path to a desired server, so the user can connect to the internet.

Onion

Let's say that the user connects to a server through a network of onion routers (approximately 6.000 relays), the information that the user sends to the server must be encrypted by layers, so each layer can be decrypted by each router in the network. For example, if the user connects using 4 onion routers, there will be a need for 4 encrypted layers to protect the information.


Paranoia

The principle behind "onion routing" was developed by Paul Syverson, Michael Reed and David Goldschlag… the idea was to protect the communications of the different intelligence services, online. The first version of Tor (The Onion Routing Project) was developed and launched by Syverson, Roger Dingledine and Nick Mathewson, in 2002. By the year 2004, the Naval Research Laboratory “released” Tor's code. Tor's most important patrons are the International Broadcasting Bureau, Internews, Human Rights Watch, University of Cambridge, Google and Stichting NLnet.

During the infamous cyber-raid called “Operation Onymous” (different international agencies attacked different websites in the Black Market and other type of services that operated in the Tor network), certain “weaknesses” were found, thus allowing to track the physical location of the servers and the number of sites hosted there.
All these happened when Firefox was 17.


In 2014,
Alexander Volynkin gave the presentation called “You Don’t Have to be the NSA to Break Tor: Deanonymizing Users on a Budget" (Exposing users without spending much money… around $3000.00), at Black Hat. This presentation was cancelled at the request of Carnegie Mellon, arguing that the material that Alexander Volynkin was going to use, was not approved to be shown in public.

“It is said that a mirror must be covered at night, so the soul cannot wonder and escape through it... or to prevent something from the otherside from coming in.“

Now what?

TAILS “The Amnesic Incognito Live System”
Freenet
Subgraph
Freepto
Ipredia
JonDonym
LPS
Whonix
PeerBlock

Keep posing

There are fake mirrors at fitting rooms in malls, bathrooms in luxury hotels and motels (two-sided mirrors) through these mirrors people can be recorded, and eventually end up in the internet. (Take a look at your favorite amateur porn website: “Hotel…”)


Perform the fingernail test. While not completely accurate, you can use your fingernail to determine if the mirror is a first or second surface mirror. Simply place your fingernail against the surface of the mirror. When you touch your fingernail to a second surface mirror, you can't to touch your own reflection; instead, you will see a gap caused by a second layer of glass over the mirrored surface. When you touch your finger to a first surface mirror, you can touch your own reflection, since there's no additional layer of glass in between. First surface mirrors are very rare, so if you find one there's likely to be a very specific reason and it's very possible that it's a two-way mirror. Second surface mirrors are your ubiquitous everyday mirrors.


Reading Material



@feexitmx
www.feexit.mx

rp@feexit.mx