April 20, 2016
March 31, 2016
Don’t you have $5?
We block you because you don’t pay us.
Did Chrome Web Store just kill themselves?
Your developer account has been suspended from the Chrome Web Store.
The Chrome Web Store team seeks to provide the best user experience in our store, and as such we uphold strict compliance of our Developer Terms of Service and Program Policies.
The problem with this is that it has now disabled extensions that ~~ I WROTE ~~ for my own purposes. There is no reason for me to be upload my own extensions to the chrome store. I don’t want them there. These extensions are not intended for other people to use. They were written by me, for me, and now Chrome has blocked me from using my own code.
Logically, then, the next step will be to disable any ability to develop extensions locally, and only permit extension developers to innovate in an online sandbox that Google provides, conveniently only after the developers pay the $5 “Promise You’re Not Malicious” surcharge.
Screw you, google. You effectively want to prohibit people from installing extensions from anywhere other than your store, under the guise of protecting people from malware.
I spent hours of my time writing a Chrome extension for my own personal use. I have no intention of releasing it. The fact that I have been restricted from using a clean, functional, packaged version of my own code for my own use is ridiculous. There is no reason for me to pay to have my extension (which, to reiterate, only I will be using) be put on the Chrome Web Store to “verify its integrity” or for other such reasons. I think I should be trusted to make my own decisions about my own code and as a developer I have been highly discouraged from using Google Chrome as a platform.
Chrome keeps “removing” features from Mac/Windows/Linux but keeping them for Chrome OS.
February 7, 2016
January 24, 2016
Did Chrome Apps just killed themselves?
Your Google Chrome item, “x83 MOON,” with ID: nmjgfaedebbeknhohfbhlilocmiimjam did not comply with the following section of our Program policies:
“Where possible, make as much of your code visible in the package as you can. If some of your app’s logic is hidden and it appears to be suspicious, we may remove it.”
If you’d like to re-submit your item, please make appropriate changes to the item so that it complies with our policies, then re-publish it in your developer dashboard. Please reply to this email for issues regarding this item removal.
*Please keep in mind that your re-submitted item will not be immediately published live in the store. All re-submitted items undergo a strict compliance review and will be re-published if the item passes review.
Repeated or egregious violations in the store may result in your developer account being banned from the store. This may also result in the suspension of related Google services associated with your Google account. All re-submitted items will continue to be subject to Chrome Web Store policies and terms of service.
Thank you for your cooperation,
Google Chrome Web Store team
- Microsoft Windows 10 Banished For Industrial Espionage
December 9, 2015
November 19, 2015
August 28, 2015
not water proof. verified twice. can it be repaired? can it be upgraded? is it cost effective?
Upgrade to a new device?
August 19, 2015
The experience of your show is 90% sound driven.
August 16, 2015
July 29, 2015
Microsoft engineers can use the following capabilities to get the information:
- Ability to run a limited, pre-approved list of Microsoft certified diagnostic tools, such as msinfo32.exe, powercfg.exe, and dxdiag.exe.
- Ability to get registry keys.
- Ability to gather user content, such as documents, if they might have been the trigger for the issue.
the FBI believes it can force online companies to turn over the following information simply by sending an NSL demanding it: an individual’s complete web browsing history; the IP addresses of everyone a person has corresponded with; and records of all online purchases.
- Revealed: What Info the FBI Can Collect With a National Security Letter
“If you open a file, we may collect information about the file, the application used to open the file, and how long it takes any use [of]it for purposes such as improving performance, or [if you]enter text, we may collect typed characters, we may collect typed characters and use them for purposes such as improving auto-complete and spell check features.”
Microsoft is sending, at will, a cryptic event descriptor to their system, based on any event, user initiated or not.
device need to be airgapped?
I don’t need any version other than Windows 7. and I will never need to upgrade. By the time 7 is totally obsolete, the arguments of having access to certain Windows-only applications will no longer be valid.
By default, when signing into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers, for example “web browser history, favorites, and websites you have open” as well as “saved app, website, mobile hotspot, and Wi-Fi network names and passwords”.
Microsoft’s updated terms also state that they collect basic information “from you and your devices, including for example “app use data for apps that run on Windows” and “data about the networks you connect to.”
“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to”, for example, “protect their customers” or “enforce the terms governing the use of the services”.
“Personal data collected by Microsoft may be stored and processed in the United State or any other country wherein Microsoft, its subsidiaries or service providers are located.”
Cortana cannot be disabled without breaking Windows. Yes, you can turn all of the settings off, but the process still runs in the background and auto restarts when killed. I even went into the windows group policy settings and forbade Cortana, and it still ran as a process in the background. So, I tried to use powershell to remove it since it was installed as a “modern app”. I removed every trace of modern app, including the Windows store, rebooted, Cortana was still there, running the background, consuming 0%-0.1% cpu and using ~35MB of RAM. So, I found out where Cortana was on the file system, killed the process, and renamed the folder, so that it would not be found. And that did work, Cortana never restarted. The only problem was Windows Update stopped working! Yes, not being able to start Cortana prevents Windows 10 from installing updates. I had to run sfc (which fixed Cortana) to install updates, and now the Cortana process is back. Also, when I renamed the Cortana install folder, the search feature of the start menu stopped working completely (no type to search). Magically started working once Cortana was back. I can’t believe how deep this thing has its tentacles into the OS, it really is disturbing.
- Windows Platform Binary Table
- 3068708 customer experience and diagnostic telemetry
- Microsoft Windows Version 6.3
- Microsoft’s new small print – how your personal data is (ab)used
- R.I.P., Windows Media Center
- Stop Windows Nagging and Spying. Works with Windows 7 through 10
- Microsoft’s Software is Malware
- German Government Warns Key Entities Not To Use Windows 8 – Linked to NSA
- Microsoft’s Software is Malware
- Spybot Anti-Beacon for Windows 10
Software can no longer trust the memory, storage nor network. Thus to protect itself one needs to operate counter to spying host and intercept systems.
To run Windows 10, one would need to provision VHD for it, to boot as VHD or to run virtualized. While running a kernel debugger needs to be attached. The host debugger would need to be able to power cycle the Windows 10 at any point.
Context Aware Artificial Intelligence
- How to stop Firefox from making automatic connections
- Why you shouldn’t downgrade to Windows 10
a way to steal every joke, every poem, every intellectual endeavor you ever create and have it copyrighted before you even stop typing.
Telemetry is sent once per 5 minutes, to:
This allows them to track you very accurately.
Typing the name of any popular movie into your local file search starts a telemetry process that indexes all media files on your computer and transmits them to:
This allows them to index any “unauthorized” content, and build a dossier on you that can be used in conjunction with their tracking data to stuff almost anyone in jail when needed.
June 24, 2015
recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis.
- Almost all of the websites run by companies involved in the PRISM programme do not use PFS.
A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.
If the key is the same size as the plaintext, and “truly” random (at least from the POV of the attacker) it’s a OTP; aka unbreakable.
Central to Google’s business model is the collection of huge quantities of data about hundreds of millions of people.
When a user tries to access a website which is on the suspected list, the traffic will be rerouted to the interceptor where the URL will be matched against the lists of URLs. If there is a match, the request will be blocked, otherwise, the request will be let through. Since websites and others large providers clean their system before it enters the suspected list, these sites will never end up on the suspected list and hence no traffic to the major sites will be re-routed.
Before a web request is to be made, one should resolve the DNS via multiple known root servers, do a trace and have a look at the reported route. One of the reported routers may be actively intercepting the traffic. See also:
- 40 maps that explain the internet
- Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses it
Request to resolver1.opendns.com timed-out
Request to google-public-dns-a.google.com timed-out
can’t find enclosedworld.com: Server failed
Most Internet users typically don’t have much control over the path their Internet data travels. That can prove problematic because routers in certain parts of the world will modify data passing through and effectively censor the content.
- System Routes Internet Traffic Around Countries You Don’t Trust
- Network Monitoring Program Warrant
- Using Chrome with Tor on OS X
Your IP address, 3184.108.40.206, has been automatically identified as a Tor exit node. Editing through Tor is blocked to prevent abuse.
June 20, 2015
Yikes. meet prisoner mastermind Ulbrihct.
June 17, 2015
June 14, 2015
Oh. Except. It is not just a movie.
There is a Very Important message a motive that people all people need to Watch. The government Subliminally Brainwashes people with The Power of the Television Movies Shows etc. So We Decided to do the same to beat them at there own game.
June 9, 2015
Are your processing units fast enough to do 8K yet? Can Samsung Galaxy play 8K yet? 2032?
What about 5K?
You can grow a small business into a bigger business, as long as you aren’t funded by people who are expecting to make a quick buck.
for the record I think venture capital is ”to be honest” for weak entrepreneurs.
VCs, and they tell me the same thing over and over again: DON’T RAISE VENTURE CAPITAL!
it is the most expensive and explosive money you can raise
VC believe in preferred shares and liquidation preferences.
VCs have no problem shutting down your company.
the truth is the human mind”no matter how brilliant”is limited to being able to juggle 7 +/- 2 items in short term memory.
However, when you are in the first two or three years of your business you should focus on one thing: building value
- Real entrepreneurs don’t raise venture capital.
- Autopsy – Lessons from Failed Startups
May 30, 2015
… watch a movie in the passenger seat of a car, any time the car changes direction the whole world inside VR rotates around you.
one could use a secondary compass?
May 29, 2015
To make this work, she and her colleagues constructed a camera sensitive enough to pick up those few scattering photons. It is built from a 32 by 32 grid of detectors that log the time a photon arrives at them with incredible precision, equivalent to snapping around 20 billion frames a second.
May 22, 2015
Render a panoramic VR image for Otoy’s ‘Render the Metaverse’ contest and you could win up to $35,000 in cash:… http://fb.me/7dpgVJhDq
You can see the Render The Metaverse entries here without GearVR: http://render.otoy.com/vr_gallery.php
May 17, 2015
3M-54 Klub launch platform?
When they come for you, They will know how to handle you because they already practiced on Americans via the homeless everyone forgot about. And when they come for you, it will be under the guise of fighting terror, and they will strip America away piece by piece and no one will speak up, they will fill the detention centers and there will be no judge, no rule of law, no ethics, just a computer program making decisions based upon input variables and neighbors thinking they are better than you because it was YOU that got taken away and there was a reason . . . . . until they get taken away . . . . . and all I can say is do not go down without a fight even if you think you are the only one fighting.
The FBI is going to be setting up command and control centers around the country SPECIFICALLY FOR THE 4TH OF JULY to “handle a terror attack” And the kicker? After the 4th of July, these so called “holiday weekend command and control centers” will remain in place PERMANENTLY.
Sktriker Units. Network Centric Warfare
mapping the minds of people alive
Human Terrain Analysis
JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. JADE “learns” from results of previous executed scenarios. In other words, it re-writes it’s own program on the fly.
The generic population, at this point, is not qualified to understand, handle nor mitigate such an immediate threat of the asymmetric military AI.
The persons delivering the JADE fully autonomous robots, skynet, are building a new form of enemy. Once such new enemy is operational, no human can help those persons, as they are too weak to conceptually understand the variables linked to the situation.
Generates anwsers to questions not asked yet
- When The NSA Surveillance Grid Is Turned Over To AI, Humanity Is Finished
- To Protect And Infect: The Militarization Of The Internet
- Sentiment Analysis / Opinion Mining
April 8, 2015
Review from 2015.08.12
- It hurts the nose
- Field of view with Galaxy S6 is beyond the edge of the screen, which results looking at the frame of the device.
- Can see lense details on top of content which is distracting
- Cardboard app does not implement S6 CPU, GPU and screen overclocking.
- The gyroscope sensor from GearVR is what makes the experience
- In the end, I like my GearVR, did not get 150FOV out of the box as hoped for.
The big break through for me with Wearality is the high quality experience without all of the usual HMD setup friction. I have been using Oculus for over a year but constantly find myself fiddling with the cables and the motion tracking and even occasionally have to check drivers when using on a new machine. With Wearality I get a high quality experience that I can share with people on planes, in restaurants or anywhere
March 18, 2015
Sense feedback by directed and shaped ultrasound.
Audio hints to get the player gaze at the wanted direction
March 14, 2015
- How to export a THREE.JS scene into a 360 texture for photosphere
- “Little Planet” Photographs
- Cylindrical Equidistant Projection
- Capturing little planets explained
PS. WordPress your new editor sucks! I like the old editor.
March 11, 2015
March 9, 2015
Look what I found. Asynchronous content loader based on the count of cameras on the target.
February 18, 2015
An app to manage ideas, papers, time, negotiations, contacts, contracts, accounts and companies.
One can start by exploring all his business contacts. Such contacts relationships to each other shall be visualized.
All nodes are interactive, can be activated by gaze or other input devices.
How many coffes do you have with them?
How often are you calling them?
How often are you emailing them?
Whats the tenor of the communications?
This app will allow one to visualize and manage his company all in VR. The app is connected to other data sources and devices in local WiFi.
An app could pop into field of view if the local WiFi UDP broadcast can pick it up. First we could keep it as an icon. Then load the app into invisible iframe and postMessage about the environment it can live within. First step towards interactive thought forms.
The scoped app will want to query interfaces, see if the host is talking the same language.
while it’s a great feat to control your cursor with your head, it actually gets a bit annoying over time and I would prefer to control the pointer with a different device.
a 360 turning chair is an ultimate must for the 360 VR experience. One piece of hardware I’ll predict is an augmentation device for regular office chairs that controls their rotation
They could have at least made the GearVR a hub and allow another usb entry to charge a connected device.
I really like that the original image is shown on screen as well. You feel so lost guiding somebody else when you don’t see what they’re seeing. It’s like helping your mom browsing a website over the phone
With the GearVR you can sit in a rotating chair and really go 360.
The default demo app has a keyboard full of toggles built in. I love that. It allows you to demonstrate certain features, like low FPS, wire frames, latency, etc. While purely interesting for engineering or development reasons, I really dig that sort of thing.
What about VR DNS manager and janusVR?
- Face Input
- WebVR Tony Parisi
- GearVR first impression
- GearVR as CardBoard
January 22, 2015
new ways to create the things we imagine
Because when you change the way you see the world
you can change the world you see
- Google Project Tango Dev Kit
- Total Recall
- Create Your Future By Visioning It
- Visual Thinking
- Augmented Reality On Natural Shapes
- Augmented Reality Gaming
- Face Input
- Create Your Own Puzzle At Mightier
November 8, 2014
The PN66T module is designed for mobile devices like smartphones and wearables and enables converged deployment of a broad set of transaction related applications such as mobile payment, access control, transit, and authentication.
The module combines a highly secure Smart MX2 element (P61), Near Field Communications (NFC) radio, operating system and trust provisioning. To accelerate the deployment and meet the increased demands around mobile transactions, PN66T features a loader service, which enables service providers to easily deliver new applications by significantly simplifying the value chain of deploying credentials to devices.
August 26, 2014
Windows 10’s forced automatic updates don’t simply cover security patches, they cover anything and everything Microsoft wants to put on your PC as part of Windows 10. This can range from new software and services to changes to core features and functionality.
- I like Windows 98, Windows XP, Windows Vista, Windows 7
- I dislike Windows 8
- I like my accounts local. Microsoft acounts, please fk off.
- I like my blurry aero glass. Where the fk is it?
- I like my START menu. Where is it?
- Metro, are you lost? Can I disable it?
- Task Manager. What the fk?
- Nagware. Your PC has been unprotected. I cannot close the damn window. I can interact with apps but cannot click?
Kill process ‘Consent UI for administrative applications’
Uninstall McAffe nagware.
- WTF. At the next reboot McAfee LiveSafe is still phishing me?
Program Files/Common Files/mcafee/platform/McUICnt.exe
Right Click on Start Menu
Programs and Features
unistaller scares with Your PC is at risk!
HDMI secondary display not detected?
go to “second screen” and then while plugging in the hdmi cable at the same time with the mouse choose the connection you want, either duplicate, second screen only, extend or pc screen only.
Apparently the connection is recognized when you click on a choice WHILE plugging in the hdmi cable.
Windows 7 SDK Visual C++ Compiler will not install for Windows 8.
August 19, 2014
Can we log into a drone Eagle with our Oclus Rift to fly and explore the earth yet?