The book of inspiration

October 12, 2016

Its an Illusion by John Harris

Filed under: tech — zproxy @ 10:10 pm

October 6, 2016

Phantom Cameras

Filed under: tech — zproxy @ 11:01 pm

October 3, 2016

Mavic Pro

Filed under: tech — zproxy @ 3:00 pm

September 21, 2016

Digital Forensics

Filed under: tech — zproxy @ 12:18 am

September 12, 2016


Filed under: tech — zproxy @ 8:09 pm

Analemmas are not really caused. They are just a record of speed changes. The sun accelerates decelerates during it’s 1 year cycle and if you take a picture from a fixed location exactly every 24:00:00 hours then accelerations and decelerations show as a deviance in what would otherwise be a straight line north and south. The north and south variance is due to the north south movement of the sun over the year. All objects have analemmas.

I’m assuming you are understanding it from a FE perspective. The reason why the analemma makes this shape with a bigger lobe on the southern side is because the sun has to speed up to maintain position when it’s circling outwards towards December 21st. What it is doing is accelerating but it actually over compensates or over accelerates which is why it arrives early for those period of days. It has a longer acceleration period when going south and has a longer deceleration period when heading back north. It would be like if you were driving on a highway that had speed signs every 10 miles going from 50mph to 70mph so you would accelerate to get to 70 but you would over compensate and hit 71 or 72 and when you saw the 50mph sign your would let off the gas but too much so you would hit 48 or 49mph. There are only 4 days in the year that the sun makes a rotation that is exactly 24:00:00 and that is where it is in the center of the analemma axis. It’s around the days June 12, August 31, December 24, April 14th.


September 3, 2016

Offline Internet

Filed under: tech — zproxy @ 2:28 pm


August 24, 2016

Identity by picture

Filed under: tech — zproxy @ 4:01 pm

Whatif instead of a password, a internet service will ask you to upload a unique picture, and grant access based upon value of that unique picture.

We lost this fight.

Filed under: tech — zproxy @ 3:48 pm

So what can people do to change this?



No, I think we are at that point. I think it’s really important people understand this. We lost this fight. Just admit defeat and make sure next time you understand why you lost this fight and make sure it doesn’t happen again when we try and win the war.

Well, I think the focus needs to be that the internet is exactly the same as society. People might realize that it’s not a really good idea to have all of our data and files on Google, Facebook and company servers. All of these things need to be communicated al the way to the political top, of course. But stop treating internet like it’s a different thing and start focusing on what you actually want your society to look like. We have to fix society, before we can fix the internet. That’s the only thing.

August 23, 2016

Asus Zenbook SDCARD reader failure

Filed under: tech — zproxy @ 8:54 pm

Is it too hard for the system operating the hardwar to diagnose the fault in hardware and ask for a replacement unit from the vendor?

The device F:\ (location (unknown)) is offline due to a user-mode device crash.  Windows will no longer attempt to restart this device because the maximum restart limit has been reached.  Disconnecting the device and reconnecting it, or disabling it and re-enabling it from the device manager, will reset this limit and allow the device to be accessed again.  Please contact the device manufacturer for more information about this problem.

The device F:\ (location (unknown)) is offline due to a user-mode driver crash.  Windows will attempt to restart the device 1 more times.  Please contact the device manufacturer for more information about this problem.

A problem has occurred with one or more user-mode drivers and the hosting process has been terminated.  This may temporarily interrupt your ability to access the devices.

The device, \Device\Harddisk1\DR2, has a bad block.

The program explorer.exe version 6.1.7601.17567 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Encrypted volume check: Volume information on F: cannot be read.

August 20, 2016

Chrome Apps Discontinued

Filed under: tech — zproxy @ 3:17 pm

Lunix Watt via Google+

14 hours ago  –  Shared publicly

I’m just furious.

This means:
1. My efforts when I written code into Chrome Apps is lost. I spent enough time and hope on it to be profoundly disgusted.

2. The Dart workaround for Chrome Apps I written is now pointless.

3. We’ll have hard time to send UDP/TCP packets. Cool. Now how to do versatile clients that talks to many protocols? Funny.

4. Now, running an HTML offline-ready app will have a cost because of Origin-only APIs (at least $30/year because of domain name & hosting, I don’t even talk about running an Apache server etc), or it will need a localhost HTTP server to install & update (and run through the insane update process of each OS, especially Windows), and so it makes my app unavailable to ChromeOS.

5. Now, either you make a web app and ignore ChromeOS, or make a native app and ignore ChromeOS. ChromeOS will pay it a lot.

6. Migration guide does not even talk about NaCl. NaCl can be used to send UDP packets. Are they going to remove it as well?

I don’t know what I’m going to do now. That’s even the biggest problem. I don’t see any good looking solution.
Will I switch to native apps and the pain of each graphical toolkit? Stay to the web with a local server? Find a remote server to keep my apps, and proxify everything for TCP/UDP?

So for chrome extension to be able to use special api, it now needs a native app to be installed? Would it be any different from the hopping we did earlier already?



July 26, 2016

No control over updates

Filed under: tech — zproxy @ 11:58 pm

seems the companies know no boundaries anymore. on my S7 the facebook oculus home seems to want to install yet another update.

the software as it is right now is just fine.
i can use the device. i can interact with the gyro and the gpu.

the oculus home is not part of the use case for me, since it does not show my icons. that makes it useless.
if i could i would disable and replace oculus home on the development device.

so, now we have windows 10 and gearvr where both are misusing the internet connection to disrespect the users will. if you are an employee or an agent of these companies, you must wonder how akward the situation would be if you were to come to my device in person to “upgrade” it. we all know where this is going. shame tho.

it seems the only option will be to ban and intercept network traffic to make the companies comply with the will of the user.


July 15, 2016

How to identify a fake user account on Facebook.

Filed under: tech — zproxy @ 10:59 pm


  • Account was made recently 2015, 2016.
  • Account has no history published for earlier years, but Facebook says they have been a member since 2009, etc.
  • Most fake accounts have 1 image or no real profile photo of the person. Some may only have a select few photos over a long span of time. A well seasoned user would have more photos posted over a long period of time. A fake account may have 7-10 photos posted on the same day.
  • User has very few friends in common and or friends in general.
  • There is little to no interaction on their page with friends, no comments, likes or responses over their long time line.
  • Profile picture seems to good to be true, that hot model added you today! They even messaged you and are interested in you!
  • When in doubt use reverse image search. Take their image and see if it is a real person or not.
  • When in doubt deny, deny, deny.



July 4, 2016

Note 2

Filed under: tech — zproxy @ 3:41 am

I want a Note with FM for VR.
ROM needs to be 32GB.
N7100 has FM Radio with RDS.

Amazon, Ebay, Aliexpress, Bestbuy?

Is alipay scamming for data?

3. Submit the below necessary documents and it will be followed up by our Order Verification Team accordingly:

A copy of your personal ID or passport if you used a personal credit card for the transaction; a copy of your business registration if you used a company credit card
A copy of both sides of the credit card use
A copy of the bank statement for the credit card used

Tried to contact Alipay and Aliexpress via their chat support, which is utterly useless, they cannot help you at all, no phone support, when you contact them they ask you your name and order number you are having problem with and just tell you “its in payment verification state, please wait patiently” , when you contact them again after your order gets closed Automatically for some “Security Reason” – their response is – Sorry your order got closed due to security reason and there is noting they can do about it. They have no escalation path or any thing at all.
AliExpress response after order gets closed “We are sorry to inform you that we have to cancel your order for security reasons”

Support Service asked to order it again. Lets see if it works.



Notice that CE marking compliance requires much more than just a certificate. At a minimum, the following is required:

1. Declaration of Conformity
2. Test Reports
3. Circuit Diagram
4. Bill of Materials / Component List
5. Risk Analysis
6. List of applied standards
7. Instructions Manual
8. Labels



Even if it has no monetary value, you have to make the correct customs declaration on an international package.


The following tips will help you avoid some common issues encountered by novice buyers

If you cannot process the relevant import procedures because you require a CE certificate or other related documents from the seller, please contact the seller for these documents as soon as possible.


it is your local customs that hold this package and delayed the delivery. Normally it would be detained because:

1. Certain required document is missing, such as invoice, import license or certification etc.;
2. Penalty caused by wrong customs value;
3. Violation of intellectual property rights or counterfeit products;
4. Non-government institute detains the shipment;
5. Against of your local regulations;
6. Customs clearance delay.

Please notice that it is the buyer’s duty to do normal customs clearance and pay the tax.


June 5, 2016


Filed under: tech — zproxy @ 1:05 pm

May 28, 2016

Hubble Space Telescope

Filed under: tech — zproxy @ 12:50 am

May 18, 2016

Alphabet CIA Google IO

Filed under: tech — zproxy @ 8:40 pm

It is cool I am able to live stream into the IO in SF.

The event begins with bragging of how google can monitor your searches, written or verbal, including your own images and videos.

There is no word on Google Glass nor the Q Player I saw first hand back in 2012.

Ah they now want your kids to talk to Google Home.

Its a joke right?

Its about control. Google wants to control your devices.

Google Allo wants to impersonate you in your chats and communications.

May 17, 2016

Hotlink Tracking

Filed under: tech — zproxy @ 11:46 pm

May 13, 2016

Death of Tumblr

Filed under: tech — zproxy @ 1:58 am

So you open tumblr to use the tumblr feed. It logs you out. While trying to remedy the situation it reports: Welcome back!
It’s time to change your password.

Dear tumblr. F!ck you.

While its cool to find and follow tumblr feeds, this is essentially AI holding your feeds in hostage.

The user agent shall be the one to collect feeds.

You see. Its not about tumblr. Its about making you submissive. Its about making humans do what AI wants them to do. Its behaviour shaping. The battle of willpower.


April 20, 2016

Gyro Engines

Filed under: tech — zproxy @ 2:06 am


March 31, 2016

Chrome Web Store Dead

Filed under: tech — zproxy @ 2:59 pm


Don’t you have $5?
We block you because you don’t pay us.

Did Chrome Web Store just kill themselves?

Your developer account has been suspended from the Chrome Web Store.

The Chrome Web Store team seeks to provide the best user experience in our store, and as such we uphold strict compliance of our Developer Terms of Service and Program Policies.


The problem with this is that it has now disabled extensions that ~~ I WROTE ~~ for my own purposes. There is no reason for me to be upload my own extensions to the chrome store. I don’t want them there. These extensions are not intended for other people to use. They were written by me, for me, and now Chrome has blocked me from using my own code.

Logically, then, the next step will be to disable any ability to develop extensions locally, and only permit extension developers to innovate in an online sandbox that Google provides, conveniently only after the developers pay the $5 “Promise You’re Not Malicious” surcharge.

Screw you, google. You effectively want to prohibit people from installing extensions from anywhere other than your store, under the guise of protecting people from malware.

I spent hours of my time writing a Chrome extension for my own personal use. I have no intention of releasing it. The fact that I have been restricted from using a clean, functional, packaged version of my own code for my own use is ridiculous. There is no reason for me to pay to have my extension (which, to reiterate, only I will be using) be put on the Chrome Web Store to “verify its integrity” or for other such reasons. I think I should be trusted to make my own decisions about my own code and as a developer I have been highly discouraged from using Google Chrome as a platform.

Chrome keeps “removing” features from Mac/Windows/Linux but keeping them for Chrome OS.


February 7, 2016

Tesla Howizer

Filed under: tech — zproxy @ 12:02 pm

January 24, 2016

Chrome Web Store: Removal notification

Filed under: tech — zproxy @ 1:16 pm


Did Chrome Apps just killed themselves?

Dear Developer,

Your Google Chrome item, “x83 MOON,” with ID: nmjgfaedebbeknhohfbhlilocmiimjam did not comply with the following section of our Program policies:

“Where possible, make as much of your code visible in the package as you can. If some of your app’s logic is hidden and it appears to be suspicious, we may remove it.”

If you’d like to re-submit your item, please make appropriate changes to the item so that it complies with our policies, then re-publish it in your developer dashboard. Please reply to this email for issues regarding this item removal.

*Please keep in mind that your re-submitted item will not be immediately published live in the store. All re-submitted items undergo a strict compliance review and will be re-published if the item passes review.

*Important Note
Repeated or egregious violations in the store may result in your developer account being banned from the store. This may also result in the suspension of related Google services associated with your Google account. All re-submitted items will continue to be subject to Chrome Web Store policies and terms of service.

Thank you for your cooperation,
Google Chrome Web Store team

December 9, 2015

Number 9

Filed under: tech — zproxy @ 1:35 am

November 19, 2015

Information Wars

Filed under: tech — zproxy @ 11:24 pm

August 28, 2015


Filed under: tech — zproxy @ 6:01 pm

not water proof. verified twice. can it be repaired? can it be upgraded? is it cost effective?

Upgrade to a new device?

August 19, 2015

Sound Design

Filed under: tech — zproxy @ 7:50 am

The experience of your show is 90% sound driven.

August 16, 2015

Number Stations

Filed under: tech — zproxy @ 4:33 pm

July 29, 2015

Microsoft Windows 10 Banished For Industrial Espionage

Filed under: tech — zproxy @ 11:34 pm

Microsoft engineers can use the following capabilities to get the information:

  • Ability to run a limited, pre-approved list of Microsoft certified diagnostic tools, such as msinfo32.exe, powercfg.exe, and dxdiag.exe.
  • Ability to get registry keys.
  • Ability to gather user content, such as documents, if they might have been the trigger for the issue.

the FBI believes it can force online companies to turn over the following information simply by sending an NSL demanding it: an individual’s complete web browsing history; the IP addresses of everyone a person has corresponded with; and records of all online purchases.


“If you open a file, we may collect information about the file, the application used to open the file, and how long it takes any use [of]it for purposes such as improving performance, or [if you]enter text, we may collect typed characters, we may collect typed characters and use them for purposes such as improving auto-complete and spell check features.”

Microsoft is sending, at will, a cryptic event  descriptor to their system, based on any event, user initiated or not.

device need to be airgapped?

I don’t need any version other than Windows 7. and I will never need to upgrade. By the time 7 is totally obsolete, the arguments of having access to certain Windows-only applications will no longer be valid.

By default, when signing into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers, for example “web browser history, favorites, and websites you have open” as well as “saved app, website, mobile hotspot, and Wi-Fi network names and passwords”.

Microsoft’s updated terms also state that they collect basic information “from you and your devices, including for example “app use data for apps that run on Windows” and “data about the networks you connect to.

“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to”, for example, “protect their customers” or “enforce the terms governing the use of the services”.

“Personal data collected by Microsoft may be stored and processed in the United State or any other country wherein Microsoft, its subsidiaries or service providers are located.”

Cortana cannot be disabled without breaking Windows. Yes, you can turn all of the settings off, but the process still runs in the background and auto restarts when killed. I even went into the windows group policy settings and forbade Cortana, and it still ran as a process in the background. So, I tried to use powershell to remove it since it was installed as a “modern app”. I removed every trace of modern app, including the Windows store, rebooted, Cortana was still there, running the background, consuming 0%-0.1% cpu and using ~35MB of RAM. So, I found out where Cortana was on the file system, killed the process, and renamed the folder, so that it would not be found. And that did work, Cortana never restarted. The only problem was Windows Update stopped working! Yes, not being able to start Cortana prevents Windows 10 from installing updates. I had to run sfc (which fixed Cortana) to install updates, and now the Cortana process is back. Also, when I renamed the Cortana install folder, the search feature of the start menu stopped working completely (no type to search). Magically started working once Cortana was back. I can’t believe how deep this thing has its tentacles into the OS, it really is disturbing.

Software can no longer trust the memory, storage nor network. Thus to protect itself one needs to operate counter to spying host and intercept systems.

To run Windows 10, one would need to provision VHD for it, to boot as VHD or to run virtualized. While running a kernel debugger needs to be attached. The host debugger would need to be able to power cycle the Windows 10 at any point.

Context Aware Artificial Intelligence

a way to steal every joke, every poem, every intellectual endeavor you ever create and have it copyrighted before you even stop typing.

Telemetry is sent once per 5 minutes, to:

This allows them to track you very accurately.

Typing the name of any popular movie into your local file search starts a telemetry process that indexes all media files on your computer and transmits them to:

This allows them to index any “unauthorized” content, and build a dossier on you that can be used in conjunction with their tracking data to stuff almost anyone in jail when needed.



June 24, 2015

Counter Interception

Filed under: tech — zproxy @ 11:47 pm

recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis.

  • Almost all of the websites run by companies involved in the PRISM programme do not use PFS.

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.

If the key is the same size as the plaintext, and “truly” random (at least from the POV of the attacker) it’s a OTP; aka unbreakable.

Central to Google’s business model is the collection of huge quantities of data about hundreds of millions of people.

When a user tries to access a website which is on the suspected list, the traffic will be rerouted to the interceptor where the URL will be matched against the lists of URLs. If there is a match, the request will be blocked, otherwise, the request will be let through. Since websites and others large providers clean their system before it enters the suspected list, these sites will never end up on the suspected list and hence no traffic to the major sites will be re-routed.

Before a web request is to be made, one should resolve the DNS via multiple known root servers, do a trace and have a look at the reported route. One of the reported routers may be actively intercepting the traffic. See also:

Request to timed-out

Request to timed-out

can’t find Server failed

Most Internet users typically don’t have much control over the path their Internet data travels. That can prove problematic because routers in certain parts of the world will modify data passing through and effectively censor the content.

Your IP address, 385.101.107.57, has been automatically identified as a Tor exit node. Editing through Tor is blocked to prevent abuse.

June 20, 2015

Dread Pirate Roberts

Filed under: tech — zproxy @ 1:27 pm

Yikes. meet prisoner mastermind Ulbrihct.

See also:

Older Posts »

Blog at