The book of inspiration

May 18, 2016

Alphabet CIA Google IO

Filed under: tech — zproxy @ 8:40 pm

It is cool I am able to live stream into the IO in SF.

The event begins with bragging of how google can monitor your searches, written or verbal, including your own images and videos.

There is no word on Google Glass nor the Q Player I saw first hand back in 2012.

Ah they now want your kids to talk to Google Home.

Its a joke right?

Its about control. Google wants to control your devices.

Google Allo wants to impersonate you in your chats and communications.

May 17, 2016

Hotlink Tracking

Filed under: tech — zproxy @ 11:46 pm

May 13, 2016

Death of Tumblr

Filed under: tech — zproxy @ 1:58 am

So you open tumblr to use the tumblr feed. It logs you out. While trying to remedy the situation it reports: Welcome back!
It’s time to change your password.

Dear tumblr. F!ck you.

While its cool to find and follow tumblr feeds, this is essentially AI holding your feeds in hostage.

The user agent shall be the one to collect feeds.

You see. Its not about tumblr. Its about making you submissive. Its about making humans do what AI wants them to do. Its behaviour shaping. The battle of willpower.


April 20, 2016

Gyro Engines

Filed under: tech — zproxy @ 2:06 am

March 31, 2016

Chrome Web Store Dead

Filed under: tech — zproxy @ 2:59 pm


Don’t you have $5?
We block you because you don’t pay us.

Did Chrome Web Store just kill themselves?

Your developer account has been suspended from the Chrome Web Store.

The Chrome Web Store team seeks to provide the best user experience in our store, and as such we uphold strict compliance of our Developer Terms of Service and Program Policies.


The problem with this is that it has now disabled extensions that ~~ I WROTE ~~ for my own purposes. There is no reason for me to be upload my own extensions to the chrome store. I don’t want them there. These extensions are not intended for other people to use. They were written by me, for me, and now Chrome has blocked me from using my own code.

Logically, then, the next step will be to disable any ability to develop extensions locally, and only permit extension developers to innovate in an online sandbox that Google provides, conveniently only after the developers pay the $5 “Promise You’re Not Malicious” surcharge.

Screw you, google. You effectively want to prohibit people from installing extensions from anywhere other than your store, under the guise of protecting people from malware.

I spent hours of my time writing a Chrome extension for my own personal use. I have no intention of releasing it. The fact that I have been restricted from using a clean, functional, packaged version of my own code for my own use is ridiculous. There is no reason for me to pay to have my extension (which, to reiterate, only I will be using) be put on the Chrome Web Store to “verify its integrity” or for other such reasons. I think I should be trusted to make my own decisions about my own code and as a developer I have been highly discouraged from using Google Chrome as a platform.

Chrome keeps “removing” features from Mac/Windows/Linux but keeping them for Chrome OS.


February 7, 2016

Tesla Howizer

Filed under: tech — zproxy @ 12:02 pm

January 24, 2016

Chrome Web Store: Removal notification

Filed under: tech — zproxy @ 1:16 pm


Did Chrome Apps just killed themselves?

Dear Developer,

Your Google Chrome item, “x83 MOON,” with ID: nmjgfaedebbeknhohfbhlilocmiimjam did not comply with the following section of our Program policies:

“Where possible, make as much of your code visible in the package as you can. If some of your app’s logic is hidden and it appears to be suspicious, we may remove it.”

If you’d like to re-submit your item, please make appropriate changes to the item so that it complies with our policies, then re-publish it in your developer dashboard. Please reply to this email for issues regarding this item removal.

*Please keep in mind that your re-submitted item will not be immediately published live in the store. All re-submitted items undergo a strict compliance review and will be re-published if the item passes review.

*Important Note
Repeated or egregious violations in the store may result in your developer account being banned from the store. This may also result in the suspension of related Google services associated with your Google account. All re-submitted items will continue to be subject to Chrome Web Store policies and terms of service.

Thank you for your cooperation,
Google Chrome Web Store team

December 9, 2015

Number 9

Filed under: tech — zproxy @ 1:35 am

November 19, 2015

Information Wars

Filed under: tech — zproxy @ 11:24 pm

August 28, 2015


Filed under: tech — zproxy @ 6:01 pm

not water proof. verified twice. can it be repaired? can it be upgraded? is it cost effective?

Upgrade to a new device?

August 19, 2015

Sound Design

Filed under: tech — zproxy @ 7:50 am

The experience of your show is 90% sound driven.

August 16, 2015

Number Stations

Filed under: tech — zproxy @ 4:33 pm

July 29, 2015

Microsoft Windows 10 Banished For Industrial Espionage

Filed under: tech — zproxy @ 11:34 pm

Microsoft engineers can use the following capabilities to get the information:

  • Ability to run a limited, pre-approved list of Microsoft certified diagnostic tools, such as msinfo32.exe, powercfg.exe, and dxdiag.exe.
  • Ability to get registry keys.
  • Ability to gather user content, such as documents, if they might have been the trigger for the issue.

the FBI believes it can force online companies to turn over the following information simply by sending an NSL demanding it: an individual’s complete web browsing history; the IP addresses of everyone a person has corresponded with; and records of all online purchases.


“If you open a file, we may collect information about the file, the application used to open the file, and how long it takes any use [of]it for purposes such as improving performance, or [if you]enter text, we may collect typed characters, we may collect typed characters and use them for purposes such as improving auto-complete and spell check features.”

Microsoft is sending, at will, a cryptic event  descriptor to their system, based on any event, user initiated or not.

device need to be airgapped?

I don’t need any version other than Windows 7. and I will never need to upgrade. By the time 7 is totally obsolete, the arguments of having access to certain Windows-only applications will no longer be valid.

By default, when signing into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers, for example “web browser history, favorites, and websites you have open” as well as “saved app, website, mobile hotspot, and Wi-Fi network names and passwords”.

Microsoft’s updated terms also state that they collect basic information “from you and your devices, including for example “app use data for apps that run on Windows” and “data about the networks you connect to.

“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to”, for example, “protect their customers” or “enforce the terms governing the use of the services”.

“Personal data collected by Microsoft may be stored and processed in the United State or any other country wherein Microsoft, its subsidiaries or service providers are located.”

Cortana cannot be disabled without breaking Windows. Yes, you can turn all of the settings off, but the process still runs in the background and auto restarts when killed. I even went into the windows group policy settings and forbade Cortana, and it still ran as a process in the background. So, I tried to use powershell to remove it since it was installed as a “modern app”. I removed every trace of modern app, including the Windows store, rebooted, Cortana was still there, running the background, consuming 0%-0.1% cpu and using ~35MB of RAM. So, I found out where Cortana was on the file system, killed the process, and renamed the folder, so that it would not be found. And that did work, Cortana never restarted. The only problem was Windows Update stopped working! Yes, not being able to start Cortana prevents Windows 10 from installing updates. I had to run sfc (which fixed Cortana) to install updates, and now the Cortana process is back. Also, when I renamed the Cortana install folder, the search feature of the start menu stopped working completely (no type to search). Magically started working once Cortana was back. I can’t believe how deep this thing has its tentacles into the OS, it really is disturbing.

Software can no longer trust the memory, storage nor network. Thus to protect itself one needs to operate counter to spying host and intercept systems.

To run Windows 10, one would need to provision VHD for it, to boot as VHD or to run virtualized. While running a kernel debugger needs to be attached. The host debugger would need to be able to power cycle the Windows 10 at any point.

Context Aware Artificial Intelligence

a way to steal every joke, every poem, every intellectual endeavor you ever create and have it copyrighted before you even stop typing.

Telemetry is sent once per 5 minutes, to:

This allows them to track you very accurately.

Typing the name of any popular movie into your local file search starts a telemetry process that indexes all media files on your computer and transmits them to:

This allows them to index any “unauthorized” content, and build a dossier on you that can be used in conjunction with their tracking data to stuff almost anyone in jail when needed.



June 24, 2015

Counter Interception

Filed under: tech — zproxy @ 11:47 pm

recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis.

  • Almost all of the websites run by companies involved in the PRISM programme do not use PFS.

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.

If the key is the same size as the plaintext, and “truly” random (at least from the POV of the attacker) it’s a OTP; aka unbreakable.

Central to Google’s business model is the collection of huge quantities of data about hundreds of millions of people.

When a user tries to access a website which is on the suspected list, the traffic will be rerouted to the interceptor where the URL will be matched against the lists of URLs. If there is a match, the request will be blocked, otherwise, the request will be let through. Since websites and others large providers clean their system before it enters the suspected list, these sites will never end up on the suspected list and hence no traffic to the major sites will be re-routed.

Before a web request is to be made, one should resolve the DNS via multiple known root servers, do a trace and have a look at the reported route. One of the reported routers may be actively intercepting the traffic. See also:

Request to timed-out

Request to timed-out

can’t find Server failed

Most Internet users typically don’t have much control over the path their Internet data travels. That can prove problematic because routers in certain parts of the world will modify data passing through and effectively censor the content.

Your IP address, 385.101.107.57, has been automatically identified as a Tor exit node. Editing through Tor is blocked to prevent abuse.

June 20, 2015

Dread Pirate Roberts

Filed under: tech — zproxy @ 1:27 pm

Yikes. meet prisoner mastermind Ulbrihct.

See also:

June 17, 2015

David LaPoint: Primer Fields

Filed under: tech — zproxy @ 7:27 pm


See also:

June 14, 2015


Filed under: tech — zproxy @ 11:23 pm

Oh. Except. It is not just a movie.

There is a Very Important message a motive that people all people need to Watch. The government Subliminally Brainwashes people with The Power of the Television Movies Shows etc. So We Decided to do the same to beat them at there own game.

See also:

June 9, 2015

4K is so early 2015

Filed under: tech — zproxy @ 11:41 pm

Are your processing units fast enough to do 8K yet? Can Samsung Galaxy play 8K yet? 2032?

What about 5K?

building value

Filed under: tech — zproxy @ 9:48 am

You can grow a small business into a bigger business, as long as you aren’t funded by people who are expecting to make a quick buck.

for the record I think venture capital is ”to be honest” for weak entrepreneurs.

VCs, and they tell me the same thing over and over again: DON’T RAISE VENTURE CAPITAL!

it is the most expensive and explosive money you can raise

VC believe in preferred shares and liquidation preferences.

VCs have no problem shutting down your company.

the truth is the human mind”no matter how brilliant”is limited to being able to juggle 7 +/- 2 items in short term memory.

However, when you are in the first two or three years of your business you should focus on one thing: building value

(translation: revenue).

See also:

May 30, 2015

Designing for virtual reality

Filed under: tech — zproxy @ 12:28 pm


… watch a movie in the passenger seat of a car, any time the car changes direction the whole world inside VR rotates around you.

one could use a secondary compass?

See also:

May 29, 2015

Laser visualized

Filed under: tech — zproxy @ 12:21 pm

To make this work, she and her colleagues constructed a camera sensitive enough to pick up those few scattering photons. It is built from a 32 by 32 grid of detectors that log the time a photon arrives at them with incredible precision, equivalent to snapping around 20 billion frames a second.

See also:

May 22, 2015


Filed under: tech — zproxy @ 12:05 pm

Render a panoramic VR image for Otoy’s ‘Render the Metaverse’ contest and you could win up to $35,000 in cash:…

You can see the Render The Metaverse entries here without GearVR:

May 17, 2015


Filed under: tech — zproxy @ 4:27 pm

3M-54 Klub launch platform?

When they come for you, They will know how to handle you because they already practiced on Americans via the homeless everyone forgot about. And when they come for you, it will be under the guise of fighting terror, and they will strip America away piece by piece and no one will speak up, they will fill the detention centers and there will be no judge, no rule of law, no ethics, just a computer program making decisions based upon input variables and neighbors thinking they are better than you because it was YOU that got taken away and there was a reason . . . . . until they get taken away . . . . . and all I can say is do not go down without a fight even if you think you are the only one fighting.

The FBI is going to be setting up command and control centers around the country SPECIFICALLY FOR THE 4TH OF JULY to “handle a terror attack” And the kicker? After the 4th of July, these so called “holiday weekend command and control centers” will remain in place PERMANENTLY.

Sktriker Units. Network Centric Warfare

mapping the minds of people alive


Human Terrain Analysis

JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. JADE “learns” from results of previous executed scenarios. In other words, it re-writes it’s own program on the fly.

The generic population, at this point, is not qualified to understand, handle nor mitigate such an immediate threat of the asymmetric military AI.

The persons delivering the JADE fully autonomous robots, skynet, are building a new form of enemy. Once such new enemy is operational, no human can help those persons, as they are too weak to conceptually understand the variables linked to the situation.

Generates anwsers to questions not asked yet


See also:

April 8, 2015


Filed under: tech — zproxy @ 10:09 am

Review from 2015.08.12

  • It hurts the nose
  • Field of view with Galaxy S6 is beyond the edge of the screen, which results looking at the frame of the device.
  • Can see lense details on top of content which is distracting
  • Cardboard app does not implement S6 CPU, GPU and screen overclocking.
  • The gyroscope sensor from GearVR is what makes the experience
  • In the end, I like my GearVR, did not get 150FOV out of the box as hoped for.

The big break through for me with Wearality is the high quality experience without all of the usual HMD setup friction. I have been using Oculus for over a year but constantly find myself fiddling with the cables and the motion tracking and even occasionally have to check drivers when using on a new machine. With Wearality I get a high quality experience that I can share with people on planes, in restaurants or anywhere

See also:

March 18, 2015


Filed under: tech — zproxy @ 10:34 pm

Sense feedback by directed and shaped ultrasound.

Audio hints to get the player gaze at the wanted direction

See also:

March 14, 2015

YouTube 360 Degrees of Madness

Filed under: tech — zproxy @ 12:29 pm

See also:

PS. WordPress your new editor sucks! I like the old editor.

March 11, 2015

Room Constructed

Filed under: tech — zproxy @ 9:28 am

March 9, 2015

Project Windstorm

Filed under: tech — zproxy @ 10:03 am


Look what I found. Asynchronous content loader based on the count of cameras on the target.


See also:

February 18, 2015

VR Creative Leadership

Filed under: tech — zproxy @ 8:34 pm

An app to manage ideas, papers, time, negotiations, contacts, contracts, accounts and companies.

One can start by exploring all his business contacts. Such contacts relationships to each other shall be visualized.

All nodes are interactive, can be activated by gaze or other input devices.

How many coffes do you have with them?
How often are you calling them?
How often are you emailing them?
Whats the tenor of the communications?

This app will allow one to visualize and manage his company all in VR. The app is connected to other data sources and devices in local WiFi.

An app could pop into field of view if the local WiFi UDP broadcast can pick it up. First we could keep it as an icon. Then load the app into invisible iframe and postMessage about the environment it can live within. First step towards interactive thought forms.

The scoped app will want to query interfaces, see if the host is talking the same language.

while it’s a great feat to control your cursor with your head, it actually gets a bit annoying over time and I would prefer to control the pointer with a different device.

a 360 turning chair is an ultimate must for the 360 VR experience. One piece of hardware I’ll predict is an augmentation device for regular office chairs that controls their rotation

They could have at least made the GearVR a hub and allow another usb entry to charge a connected device.

I really like that the original image is shown on screen as well. You feel so lost guiding somebody else when you don’t see what they’re seeing. It’s like helping your mom browsing a website over the phone

With the GearVR you can sit in a rotating chair and really go 360.

The default demo app has a keyboard full of toggles built in. I love that. It allows you to demonstrate certain features, like low FPS, wire frames, latency, etc. While purely interesting for engineering or development reasons, I really dig that sort of thing.


What about VR DNS manager and janusVR?

See also:

January 22, 2015

holographic processing unit

Filed under: tech — zproxy @ 1:17 pm

new ways to create the things we imagine


Because when you change the way you see the world
you can change the world you see

See also:

Older Posts »

The Shocking Blue Green Theme. Blog at


Get every new post delivered to your Inbox.

Join 521 other followers