The book of inspiration

July 29, 2015

Microsoft Windows 10 Banished For Industrial Espionage

Filed under: tech — zproxy @ 11:34 pm

I don’t need any version other than Windows 7. and I will never need to upgrade. By the time 7 is totally obsolete, the arguments of having access to certain Windows-only applications will no longer be valid.

By default, when signing into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers, for example “web browser history, favorites, and websites you have open” as well as “saved app, website, mobile hotspot, and Wi-Fi network names and passwords”.

Microsoft’s updated terms also state that they collect basic information “from you and your devices, including for example “app use data for apps that run on Windows” and “data about the networks you connect to.

“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to”, for example, “protect their customers” or “enforce the terms governing the use of the services”.

“Personal data collected by Microsoft may be stored and processed in the United State or any other country wherein Microsoft, its subsidiaries or service providers are located.”

Software can no longer trust the memory, storage nor network. Thus to protect itself one needs to operate counter to spying host and intercept systems.

To run Windows 10, one would need to provision VHD for it, to boot as VHD or to run virtualized. While running a kernel debugger needs to be attached. The host debugger would need to be able to power cycle the Windows 10 at any point.

Context Aware Artificial Intelligence

June 24, 2015

Counter Interception

Filed under: tech — zproxy @ 11:47 pm

recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis.

  • Almost all of the websites run by companies involved in the PRISM programme do not use PFS.

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.

If the key is the same size as the plaintext, and “truly” random (at least from the POV of the attacker) it’s a OTP; aka unbreakable.

Central to Google’s business model is the collection of huge quantities of data about hundreds of millions of people.

When a user tries to access a website which is on the suspected list, the traffic will be rerouted to the interceptor where the URL will be matched against the lists of URLs. If there is a match, the request will be blocked, otherwise, the request will be let through. Since websites and others large providers clean their system before it enters the suspected list, these sites will never end up on the suspected list and hence no traffic to the major sites will be re-routed.

Before a web request is to be made, one should resolve the DNS via multiple known root servers, do a trace and have a look at the reported route. One of the reported routers may be actively intercepting the traffic. See also:

June 20, 2015

Dread Pirate Roberts

Filed under: tech — zproxy @ 1:27 pm

Yikes. meet prisoner mastermind Ulbrihct.

See also:

June 17, 2015

David LaPoint: Primer Fields

Filed under: tech — zproxy @ 7:27 pm

 

See also:

June 14, 2015

MR ROBOT

Filed under: tech — zproxy @ 11:23 pm

Oh. Except. It is not just a movie.

There is a Very Important message a motive that people all people need to Watch. The government Subliminally Brainwashes people with The Power of the Television Movies Shows etc. So We Decided to do the same to beat them at there own game.

See also:

June 9, 2015

4K is so early 2015

Filed under: tech — zproxy @ 11:41 pm

Are your processing units fast enough to do 8K yet? Can Samsung Galaxy play 8K yet? 2032?

What about 5K?

building value

Filed under: tech — zproxy @ 9:48 am

You can grow a small business into a bigger business, as long as you aren’t funded by people who are expecting to make a quick buck.

for the record I think venture capital is ”to be honest” for weak entrepreneurs.

VCs, and they tell me the same thing over and over again: DON’T RAISE VENTURE CAPITAL!

it is the most expensive and explosive money you can raise

VC believe in preferred shares and liquidation preferences.

VCs have no problem shutting down your company.

the truth is the human mind”no matter how brilliant”is limited to being able to juggle 7 +/- 2 items in short term memory.

However, when you are in the first two or three years of your business you should focus on one thing: building value

(translation: revenue).

See also:

May 30, 2015

Designing for virtual reality

Filed under: tech — zproxy @ 12:28 pm

90hz

… watch a movie in the passenger seat of a car, any time the car changes direction the whole world inside VR rotates around you.

one could use a secondary compass?

See also:

May 29, 2015

Laser visualized

Filed under: tech — zproxy @ 12:21 pm

To make this work, she and her colleagues constructed a camera sensitive enough to pick up those few scattering photons. It is built from a 32 by 32 grid of detectors that log the time a photon arrives at them with incredible precision, equivalent to snapping around 20 billion frames a second.

See also:

May 22, 2015

OctaneVR

Filed under: tech — zproxy @ 12:05 pm

Render a panoramic VR image for Otoy’s ‘Render the Metaverse’ contest and you could win up to $35,000 in cash:…

You can see the Render The Metaverse entries here without GearVR:

May 17, 2015

JADE HELM

Filed under: tech — zproxy @ 4:27 pm

When they come for you, They will know how to handle you because they already practiced on Americans via the homeless everyone forgot about. And when they come for you, it will be under the guise of fighting terror, and they will strip America away piece by piece and no one will speak up, they will fill the detention centers and there will be no judge, no rule of law, no ethics, just a computer program making decisions based upon input variables and neighbors thinking they are better than you because it was YOU that got taken away and there was a reason . . . . . until they get taken away . . . . . and all I can say is do not go down without a fight even if you think you are the only one fighting.

The FBI is going to be setting up command and control centers around the country SPECIFICALLY FOR THE 4TH OF JULY to “handle a terror attack” And the kicker? After the 4th of July, these so called “holiday weekend command and control centers” will remain in place PERMANENTLY.

Sktriker Units. Network Centric Warfare

mapping the minds of people alive

SkyNet?

Human Terrain Analysis

JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. JADE “learns” from results of previous executed scenarios. In other words, it re-writes it’s own program on the fly.

The generic population, at this point, is not qualified to understand, handle nor mitigate such an immediate threat of the asymmetric military AI.

The persons delivering the JADE fully autonomous robots, skynet, are building a new form of enemy. Once such new enemy is operational, no human can help those persons, as they are too weak to conceptually understand the variables linked to the situation.

Generates anwsers to questions not asked yet

Erased

See also:

April 8, 2015

Wearality

Filed under: tech — zproxy @ 10:09 am

The big break through for me with Wearality is the high quality experience without all of the usual HMD setup friction. I have been using Oculus for over a year but constantly find myself fiddling with the cables and the motion tracking and even occasionally have to check drivers when using on a new machine. With Wearality I get a high quality experience that I can share with people on planes, in restaurants or anywhere

See also:

March 18, 2015

Ultrahaptics

Filed under: tech — zproxy @ 10:34 pm

Sense feedback by directed and shaped ultrasound.

Audio hints to get the player gaze at the wanted direction

See also:

March 14, 2015

YouTube 360 Degrees of Madness

Filed under: tech — zproxy @ 12:29 pm

See also:

PS. WordPress your new editor sucks! I like the old editor.

March 11, 2015

Room Constructed

Filed under: tech — zproxy @ 9:28 am

March 9, 2015

Project Windstorm

Filed under: tech — zproxy @ 10:03 am

 

Look what I found. Asynchronous content loader based on the count of cameras on the target.

capture_006_09032015_095449

See also:

February 18, 2015

VR Creative Leadership

Filed under: tech — zproxy @ 8:34 pm

An app to manage ideas, papers, time, negotiations, contacts, contracts, accounts and companies.

One can start by exploring all his business contacts. Such contacts relationships to each other shall be visualized.

All nodes are interactive, can be activated by gaze or other input devices.

How many coffes do you have with them?
How often are you calling them?
How often are you emailing them?
Whats the tenor of the communications?

This app will allow one to visualize and manage his company all in VR. The app is connected to other data sources and devices in local WiFi.

An app could pop into field of view if the local WiFi UDP broadcast can pick it up. First we could keep it as an icon. Then load the app into invisible iframe and postMessage about the environment it can live within. First step towards interactive thought forms.

The scoped app will want to query interfaces, see if the host is talking the same language.

while it’s a great feat to control your cursor with your head, it actually gets a bit annoying over time and I would prefer to control the pointer with a different device.

a 360 turning chair is an ultimate must for the 360 VR experience. One piece of hardware I’ll predict is an augmentation device for regular office chairs that controls their rotation

They could have at least made the GearVR a hub and allow another usb entry to charge a connected device.

I really like that the original image is shown on screen as well. You feel so lost guiding somebody else when you don’t see what they’re seeing. It’s like helping your mom browsing a website over the phone

With the GearVR you can sit in a rotating chair and really go 360.

The default demo app has a keyboard full of toggles built in. I love that. It allows you to demonstrate certain features, like low FPS, wire frames, latency, etc. While purely interesting for engineering or development reasons, I really dig that sort of thing.

-Peter

What about VR DNS manager and janusVR?

See also:

January 22, 2015

holographic processing unit

Filed under: tech — zproxy @ 1:17 pm

new ways to create the things we imagine

140204185651-large

Because when you change the way you see the world
you can change the world you see

See also:

November 8, 2014

NXP PN66T

Filed under: tech — zproxy @ 2:27 pm

The PN66T module is designed for mobile devices like smartphones and wearables and enables converged deployment of a broad set of transaction related applications such as mobile payment, access control, transit, and authentication.

The module combines a highly secure Smart MX2 element (P61), Near Field Communications (NFC) radio, operating system and trust provisioning. To accelerate the deployment and meet the increased demands around mobile transactions, PN66T features a loader service, which enables service providers to easily deliver new applications by significantly simplifying the value chain of deploying credentials to devices.

See also:

August 26, 2014

Microsoft Windows Version 6.3

Filed under: tech — zproxy @ 11:13 pm

Windows 10’s forced automatic updates don’t simply cover security patches, they cover anything and everything Microsoft wants to put on your PC as part of Windows 10. This can range from new software and services to changes to core features and functionality.

  • I like Windows 98, Windows XP, Windows Vista, Windows 7
  • I dislike Windows 8

Yikes!

  • I like my accounts local. Microsoft acounts, please fk off.
  • I like my blurry aero glass. Where the fk is it?
  • I like my START menu. Where is it?
  • Metro, are you lost? Can I disable it?
  • Task Manager. What the fk?
  • Nagware. Your PC has been unprotected. I cannot close the damn window. I can interact with apps but cannot click?
    Kill process ‘Consent UI for administrative applications’
    Uninstall McAffe nagware.
  • WTF. At the next reboot McAfee LiveSafe is still phishing me?
    Program Files/Common Files/mcafee/platform/McUICnt.exe
    Right Click on Start Menu
    Programs and Features
    uninstall McAfee
    unistaller scares with Your PC is at risk!

HDMI secondary display not detected?

go to “second screen” and then while plugging in the hdmi cable at the same time with the mouse choose the connection you want, either duplicate, second screen only, extend or pc screen only.
Apparently the connection is recognized when you click on a choice WHILE plugging in the hdmi cable.

Windows 7 SDK Visual C++ Compiler will not install for Windows 8. 

See also:

August 19, 2014

Sounds of Street View

Filed under: tech — zproxy @ 6:35 pm

Can we log into a drone Eagle with our Oclus Rift to fly and explore the earth yet?

CropperCapture-2014-08-19-17-09-59-9934789

See also:

July 15, 2014

WebCL

Filed under: tech — zproxy @ 3:28 am

I wonder, now that we have async/await available for Web Workers, how would it compare to WebCL. The performance gain running your physics on GPU needs to overweigh the pain of writing and debugging WebCL kernel code. This will likely not happen before 2018 as it has already taken 4 years for WebGL to reach this far. Cant find it in blink source either.

The future for GPU compute in Firefox is ARB_compute_shader, which is now part of ES 3.1.

See also:

May 31, 2014

Improbable.io

Filed under: tech — zproxy @ 11:25 am

… a distributed system that can move seamlessly between servers, borrowing techniques from other industries where latency is key the way that mobile phones stay connected even when users move between cell towers.

…  “You don’t have to worry about scaling if someone tweets a link to your game and 30,000 people pile in,” says Narula.

Now, the difference is, the server will be your phone running on a 3G data connection.

… to allow for live development, so the system world is always on and developers can continually push content and improvements to it

See also:

April 19, 2014

RTMFP

Filed under: tech — zproxy @ 10:57 am

This memo describes how to use Adobe’s Secure Real-Time Media Flow
Protocol (RTMFP) to transport the video, audio, and data messages of
Adobe Flash platform communications. Aspects of this application
profile include cryptographic methods and data formats, flow metadata
formats, and protocol details for client-server and peer-to-peer
communication.

See also:

December 31, 2013

To Protect and Infect: The militarization of the internet

Filed under: tech — zproxy @ 9:58 am

WebGLSVGAnonymous

[…] your metadata, chained contacts and content will be stored for 15 years

  • Here’s a PDF file containing images Appelbaum showed in the talk

chuck-norris-eavesdrops-the-nsa-thumb

See also:

September 18, 2013

The Doom Piano by David Hayward

Filed under: tech — zproxy @ 12:06 pm

CropperCapture-2013-09-18-14-47-58-6140203

See also:

September 1, 2013

WebGL Doom

Filed under: tech — zproxy @ 11:07 am

logoby int13h.com

See also:

August 19, 2013

Sentiment Analysis / Opinion Mining

Filed under: tech — zproxy @ 9:18 am

Telephone Traffic

  • Opinion target: entities and their aspects (features) – a fingerprint with a query
  • Sentiment: positive or negative
  • Direct/indirect opinion holder: persons (source with agenda) who hold the opinions
  • Time: when opinions are expressed

Now what if I told you, your devices can do real time analysis of your opinions. What if the system was able to monitor global opinion and has the means to come up with events to change the required opinions . Whose side is your device on?

example3

Whenever you need to make a decision, you will need to consult the perception of reality of yourself and other people.

Opinion collection is no longer limited by your circle of friends. It is global.

See also:

June 11, 2013

PRISM

Filed under: tech — zproxy @ 2:10 am

[…] It’s about controlling any damning information from reaching epidemic proportions. It’s damage control to the extreme. It’s about the upcoming censorship of the internet in the name of national security. The plans are already in place.

“There’s no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren’t enough criminals, one makes them. One declares so many things to be a crime that it becomes impossible for men to live without breaking laws.” – Ayn Rand

NSAunchained

[…] But that’s the funny thing about how data is used by our current government. It’s used to createsuspicion, not to confirm innocence.

[…] he Navy has almost finished outfitting the nuclear-powered submarine USS Jimmy Carter with state-of-the-art technology for undersea fiber-optic taps, according to people knowledgeable about it.

[…] The free market is compromised, privacy is gone, the money is gone

[…] Yet no one is saying their own comments are gone, which means everyone who is posting can see their own comments in full, and are probably wondering why they are not getting any response from other people on the forum.This is accomplished by having the forum replicated many many times on a supercomputer somewhere, with a separate reality for everyone posting to it. 

Would you be surprised, if Mr. Eric was one of the morphed virtual persons produced by the holonet, as documented 911 victims, yet this time still alive? The ultimate turing test? What if this virtual person was powered by a powerful AI to enable two way video conference? When holonet skynet is known widely, noone can trust the anonymous internet as history will be rewritten and your memories replaced.

See also:

May 19, 2013

The Beginning Of The End Of CIA Google

Filed under: tech — zproxy @ 4:11 pm

… a lot of google people will go to prison, and they do not even know it

front company

A subsidiary or shell company used to shield another company from liability or scrutiny. A front company can be used to protect a parent corporation or brand from negative publicity in the event of a mishap, and may also be used to conceal illegal activities.

Facebook was indirectly funded by the CIA with the goal of learning and storing everything there is to know about you. Why? To monitor and ultimately control.

Up to now, the CIA has been organizing color revolutions using Twitter, Facebook, Youtube, and so forth as vehicles. … This is an operation which must be exposed.

I-always-feel-like-somebodies-watchin-me-red

[…] I see a future where you own your devices. And those devices work for you. They do not share any information with others.

[…] The question I have is: why the F**K should I share my network of contacts with these commercial entities.

[…] They’ve burned too many bridges at this point, to such a degree that at this point, I assume that if Google was behind it, it’s only a matter of time before they drop support.

 

[…] What is intuition? The body is always scanning for future events!

See also:

Older Posts »

The Shocking Blue Green Theme. Create a free website or blog at WordPress.com.

Follow

Get every new post delivered to your Inbox.

Join 362 other followers