Whatif instead of a password, a internet service will ask you to upload a unique picture, and grant access based upon value of that unique picture.
August 24, 2016
So what can people do to change this?
No, I think we are at that point. I think it’s really important people understand this. We lost this fight. Just admit defeat and make sure next time you understand why you lost this fight and make sure it doesn’t happen again when we try and win the war.
Well, I think the focus needs to be that the internet is exactly the same as society. People might realize that it’s not a really good idea to have all of our data and files on Google, Facebook and company servers. All of these things need to be communicated al the way to the political top, of course. But stop treating internet like it’s a different thing and start focusing on what you actually want your society to look like. We have to fix society, before we can fix the internet. That’s the only thing.
August 23, 2016
Is it too hard for the system operating the hardwar to diagnose the fault in hardware and ask for a replacement unit from the vendor?
The device F:\ (location (unknown)) is offline due to a user-mode device crash. Windows will no longer attempt to restart this device because the maximum restart limit has been reached. Disconnecting the device and reconnecting it, or disabling it and re-enabling it from the device manager, will reset this limit and allow the device to be accessed again. Please contact the device manufacturer for more information about this problem.
The device F:\ (location (unknown)) is offline due to a user-mode driver crash. Windows will attempt to restart the device 1 more times. Please contact the device manufacturer for more information about this problem.
A problem has occurred with one or more user-mode drivers and the hosting process has been terminated. This may temporarily interrupt your ability to access the devices.
The device, \Device\Harddisk1\DR2, has a bad block.
The program explorer.exe version 6.1.7601.17567 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.
Encrypted volume check: Volume information on F: cannot be read.
August 20, 2016
I’m just furious.
1. My efforts when I written code into Chrome Apps is lost. I spent enough time and hope on it to be profoundly disgusted.
2. The Dart workaround for Chrome Apps I written is now pointless.
3. We’ll have hard time to send UDP/TCP packets. Cool. Now how to do versatile clients that talks to many protocols? Funny.
4. Now, running an HTML offline-ready app will have a cost because of Origin-only APIs (at least $30/year because of domain name & hosting, I don’t even talk about running an Apache server etc), or it will need a localhost HTTP server to install & update (and run through the insane update process of each OS, especially Windows), and so it makes my app unavailable to ChromeOS.
5. Now, either you make a web app and ignore ChromeOS, or make a native app and ignore ChromeOS. ChromeOS will pay it a lot.
6. Migration guide does not even talk about NaCl. NaCl can be used to send UDP packets. Are they going to remove it as well?
I don’t know what I’m going to do now. That’s even the biggest problem. I don’t see any good looking solution.
Will I switch to native apps and the pain of each graphical toolkit? Stay to the web with a local server? Find a remote server to keep my apps, and proxify everything for TCP/UDP?
So for chrome extension to be able to use special api, it now needs a native app to be installed? Would it be any different from the hopping we did earlier already?
July 26, 2016
seems the companies know no boundaries anymore. on my S7 the facebook oculus home seems to want to install yet another update.
the software as it is right now is just fine.
i can use the device. i can interact with the gyro and the gpu.
the oculus home is not part of the use case for me, since it does not show my icons. that makes it useless.
if i could i would disable and replace oculus home on the development device.
so, now we have windows 10 and gearvr where both are misusing the internet connection to disrespect the users will. if you are an employee or an agent of these companies, you must wonder how akward the situation would be if you were to come to my device in person to “upgrade” it. we all know where this is going. shame tho.
it seems the only option will be to ban and intercept network traffic to make the companies comply with the will of the user.
July 15, 2016
- Account was made recently 2015, 2016.
- Account has no history published for earlier years, but Facebook says they have been a member since 2009, etc.
- Most fake accounts have 1 image or no real profile photo of the person. Some may only have a select few photos over a long span of time. A well seasoned user would have more photos posted over a long period of time. A fake account may have 7-10 photos posted on the same day.
- User has very few friends in common and or friends in general.
- There is little to no interaction on their page with friends, no comments, likes or responses over their long time line.
- Profile picture seems to good to be true, that hot model added you today! They even messaged you and are interested in you!
- When in doubt use reverse image search. Take their image and see if it is a real person or not.
- When in doubt deny, deny, deny.
- Here’s How to ID a Fake Account
July 4, 2016
Amazon, Ebay, Aliexpress, Bestbuy?
3. Submit the below necessary documents and it will be followed up by our Order Verification Team accordingly:
A copy of your personal ID or passport if you used a personal credit card for the transaction; a copy of your business registration if you used a company credit card
A copy of both sides of the credit card use
A copy of the bank statement for the credit card used
Tried to contact Alipay and Aliexpress via their chat support, which is utterly useless, they cannot help you at all, no phone support, when you contact them they ask you your name and order number you are having problem with and just tell you “its in payment verification state, please wait patiently” , when you contact them again after your order gets closed Automatically for some “Security Reason” – their response is – Sorry your order got closed due to security reason and there is noting they can do about it. They have no escalation path or any thing at all.
AliExpress response after order gets closed “We are sorry to inform you that we have to cancel your order for security reasons”
Support Service asked to order it again. Lets see if it works.
- Top 12 Facts about CE Marking of Electrical and Electronic Equipment
- CE marking
- Importers and distributors
- CE Marking When Importing From China: A Complete Guide
- Clearing customs on DHL (UPS, FedEx, TNT) item yourself
Notice that CE marking compliance requires much more than just a certificate. At a minimum, the following is required:
1. Declaration of Conformity
2. Test Reports
3. Circuit Diagram
4. Bill of Materials / Component List
5. Risk Analysis
6. List of applied standards
7. Instructions Manual
Even if it has no monetary value, you have to make the correct customs declaration on an international package.
If you cannot process the relevant import procedures because you require a CE certificate or other related documents from the seller, please contact the seller for these documents as soon as possible.
it is your local customs that hold this package and delayed the delivery. Normally it would be detained because:
1. Certain required document is missing, such as invoice, import license or certification etc.;
2. Penalty caused by wrong customs value;
3. Violation of intellectual property rights or counterfeit products;
4. Non-government institute detains the shipment;
5. Against of your local regulations;
6. Customs clearance delay.
Please notice that it is the buyer’s duty to do normal customs clearance and pay the tax.
June 5, 2016
May 28, 2016
May 18, 2016
It is cool I am able to live stream into the IO in SF.
The event begins with bragging of how google can monitor your searches, written or verbal, including your own images and videos.
There is no word on Google Glass nor the Q Player I saw first hand back in 2012.
Ah they now want your kids to talk to Google Home.
Its a joke right?
Its about control. Google wants to control your devices.
Google Allo wants to impersonate you in your chats and communications.
- The Beginning Of The End Of CIA Google
May 17, 2016
May 13, 2016
So you open tumblr to use the tumblr feed. It logs you out. While trying to remedy the situation it reports: Welcome back!
It’s time to change your password.
Dear tumblr. F!ck you.
While its cool to find and follow tumblr feeds, this is essentially AI holding your feeds in hostage.
The user agent shall be the one to collect feeds.
You see. Its not about tumblr. Its about making you submissive. Its about making humans do what AI wants them to do. Its behaviour shaping. The battle of willpower.
April 20, 2016
March 31, 2016
Don’t you have $5?
We block you because you don’t pay us.
Did Chrome Web Store just kill themselves?
Your developer account has been suspended from the Chrome Web Store.
The Chrome Web Store team seeks to provide the best user experience in our store, and as such we uphold strict compliance of our Developer Terms of Service and Program Policies.
The problem with this is that it has now disabled extensions that ~~ I WROTE ~~ for my own purposes. There is no reason for me to be upload my own extensions to the chrome store. I don’t want them there. These extensions are not intended for other people to use. They were written by me, for me, and now Chrome has blocked me from using my own code.
Logically, then, the next step will be to disable any ability to develop extensions locally, and only permit extension developers to innovate in an online sandbox that Google provides, conveniently only after the developers pay the $5 “Promise You’re Not Malicious” surcharge.
Screw you, google. You effectively want to prohibit people from installing extensions from anywhere other than your store, under the guise of protecting people from malware.
I spent hours of my time writing a Chrome extension for my own personal use. I have no intention of releasing it. The fact that I have been restricted from using a clean, functional, packaged version of my own code for my own use is ridiculous. There is no reason for me to pay to have my extension (which, to reiterate, only I will be using) be put on the Chrome Web Store to “verify its integrity” or for other such reasons. I think I should be trusted to make my own decisions about my own code and as a developer I have been highly discouraged from using Google Chrome as a platform.
Chrome keeps “removing” features from Mac/Windows/Linux but keeping them for Chrome OS.
February 7, 2016
January 24, 2016
Did Chrome Apps just killed themselves?
Your Google Chrome item, “x83 MOON,” with ID: nmjgfaedebbeknhohfbhlilocmiimjam did not comply with the following section of our Program policies:
“Where possible, make as much of your code visible in the package as you can. If some of your app’s logic is hidden and it appears to be suspicious, we may remove it.”
If you’d like to re-submit your item, please make appropriate changes to the item so that it complies with our policies, then re-publish it in your developer dashboard. Please reply to this email for issues regarding this item removal.
*Please keep in mind that your re-submitted item will not be immediately published live in the store. All re-submitted items undergo a strict compliance review and will be re-published if the item passes review.
Repeated or egregious violations in the store may result in your developer account being banned from the store. This may also result in the suspension of related Google services associated with your Google account. All re-submitted items will continue to be subject to Chrome Web Store policies and terms of service.
Thank you for your cooperation,
Google Chrome Web Store team
- Microsoft Windows 10 Banished For Industrial Espionage
December 9, 2015
November 19, 2015
August 28, 2015
not water proof. verified twice. can it be repaired? can it be upgraded? is it cost effective?
Upgrade to a new device?
August 19, 2015
The experience of your show is 90% sound driven.
August 16, 2015
July 29, 2015
Microsoft engineers can use the following capabilities to get the information:
- Ability to run a limited, pre-approved list of Microsoft certified diagnostic tools, such as msinfo32.exe, powercfg.exe, and dxdiag.exe.
- Ability to get registry keys.
- Ability to gather user content, such as documents, if they might have been the trigger for the issue.
the FBI believes it can force online companies to turn over the following information simply by sending an NSL demanding it: an individual’s complete web browsing history; the IP addresses of everyone a person has corresponded with; and records of all online purchases.
- Revealed: What Info the FBI Can Collect With a National Security Letter
“If you open a file, we may collect information about the file, the application used to open the file, and how long it takes any use [of]it for purposes such as improving performance, or [if you]enter text, we may collect typed characters, we may collect typed characters and use them for purposes such as improving auto-complete and spell check features.”
Microsoft is sending, at will, a cryptic event descriptor to their system, based on any event, user initiated or not.
device need to be airgapped?
I don’t need any version other than Windows 7. and I will never need to upgrade. By the time 7 is totally obsolete, the arguments of having access to certain Windows-only applications will no longer be valid.
By default, when signing into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers, for example “web browser history, favorites, and websites you have open” as well as “saved app, website, mobile hotspot, and Wi-Fi network names and passwords”.
Microsoft’s updated terms also state that they collect basic information “from you and your devices, including for example “app use data for apps that run on Windows” and “data about the networks you connect to.”
“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to”, for example, “protect their customers” or “enforce the terms governing the use of the services”.
“Personal data collected by Microsoft may be stored and processed in the United State or any other country wherein Microsoft, its subsidiaries or service providers are located.”
Cortana cannot be disabled without breaking Windows. Yes, you can turn all of the settings off, but the process still runs in the background and auto restarts when killed. I even went into the windows group policy settings and forbade Cortana, and it still ran as a process in the background. So, I tried to use powershell to remove it since it was installed as a “modern app”. I removed every trace of modern app, including the Windows store, rebooted, Cortana was still there, running the background, consuming 0%-0.1% cpu and using ~35MB of RAM. So, I found out where Cortana was on the file system, killed the process, and renamed the folder, so that it would not be found. And that did work, Cortana never restarted. The only problem was Windows Update stopped working! Yes, not being able to start Cortana prevents Windows 10 from installing updates. I had to run sfc (which fixed Cortana) to install updates, and now the Cortana process is back. Also, when I renamed the Cortana install folder, the search feature of the start menu stopped working completely (no type to search). Magically started working once Cortana was back. I can’t believe how deep this thing has its tentacles into the OS, it really is disturbing.
- Windows Platform Binary Table
- 3068708 customer experience and diagnostic telemetry
- Microsoft Windows Version 6.3
- Microsoft’s new small print – how your personal data is (ab)used
- R.I.P., Windows Media Center
- Stop Windows Nagging and Spying. Works with Windows 7 through 10
- Microsoft’s Software is Malware
- German Government Warns Key Entities Not To Use Windows 8 – Linked to NSA
- Microsoft’s Software is Malware
- Spybot Anti-Beacon for Windows 10
Software can no longer trust the memory, storage nor network. Thus to protect itself one needs to operate counter to spying host and intercept systems.
To run Windows 10, one would need to provision VHD for it, to boot as VHD or to run virtualized. While running a kernel debugger needs to be attached. The host debugger would need to be able to power cycle the Windows 10 at any point.
Context Aware Artificial Intelligence
- How to stop Firefox from making automatic connections
- Why you shouldn’t downgrade to Windows 10
a way to steal every joke, every poem, every intellectual endeavor you ever create and have it copyrighted before you even stop typing.
Telemetry is sent once per 5 minutes, to:
This allows them to track you very accurately.
Typing the name of any popular movie into your local file search starts a telemetry process that indexes all media files on your computer and transmits them to:
This allows them to index any “unauthorized” content, and build a dossier on you that can be used in conjunction with their tracking data to stuff almost anyone in jail when needed.
June 24, 2015
recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis.
- Almost all of the websites run by companies involved in the PRISM programme do not use PFS.
A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.
If the key is the same size as the plaintext, and “truly” random (at least from the POV of the attacker) it’s a OTP; aka unbreakable.
Central to Google’s business model is the collection of huge quantities of data about hundreds of millions of people.
When a user tries to access a website which is on the suspected list, the traffic will be rerouted to the interceptor where the URL will be matched against the lists of URLs. If there is a match, the request will be blocked, otherwise, the request will be let through. Since websites and others large providers clean their system before it enters the suspected list, these sites will never end up on the suspected list and hence no traffic to the major sites will be re-routed.
Before a web request is to be made, one should resolve the DNS via multiple known root servers, do a trace and have a look at the reported route. One of the reported routers may be actively intercepting the traffic. See also:
- 40 maps that explain the internet
- Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses it
Request to resolver1.opendns.com timed-out
Request to google-public-dns-a.google.com timed-out
can’t find enclosedworld.com: Server failed
Most Internet users typically don’t have much control over the path their Internet data travels. That can prove problematic because routers in certain parts of the world will modify data passing through and effectively censor the content.
- System Routes Internet Traffic Around Countries You Don’t Trust
- Network Monitoring Program Warrant
- Using Chrome with Tor on OS X
Your IP address, 3184.108.40.206, has been automatically identified as a Tor exit node. Editing through Tor is blocked to prevent abuse.
June 20, 2015
Yikes. meet prisoner mastermind Ulbrihct.
June 17, 2015
June 14, 2015
Oh. Except. It is not just a movie.
There is a Very Important message a motive that people all people need to Watch. The government Subliminally Brainwashes people with The Power of the Television Movies Shows etc. So We Decided to do the same to beat them at there own game.
June 9, 2015
Are your processing units fast enough to do 8K yet? Can Samsung Galaxy play 8K yet? 2032?
What about 5K?
You can grow a small business into a bigger business, as long as you aren’t funded by people who are expecting to make a quick buck.
for the record I think venture capital is ”to be honest” for weak entrepreneurs.
VCs, and they tell me the same thing over and over again: DON’T RAISE VENTURE CAPITAL!
it is the most expensive and explosive money you can raise
VC believe in preferred shares and liquidation preferences.
VCs have no problem shutting down your company.
the truth is the human mind”no matter how brilliant”is limited to being able to juggle 7 +/- 2 items in short term memory.
However, when you are in the first two or three years of your business you should focus on one thing: building value
- Real entrepreneurs don’t raise venture capital.
- Autopsy – Lessons from Failed Startups
May 30, 2015
… watch a movie in the passenger seat of a car, any time the car changes direction the whole world inside VR rotates around you.
one could use a secondary compass?
May 29, 2015
To make this work, she and her colleagues constructed a camera sensitive enough to pick up those few scattering photons. It is built from a 32 by 32 grid of detectors that log the time a photon arrives at them with incredible precision, equivalent to snapping around 20 billion frames a second.