Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
A former climate activist who broke up with the movement and healed from climate anxiety. (3 min, 3 sec)
Join: @davidavocadowolfe 🥑
Join: @davidavocadowolfe 🥑
Forwarded from PlanofAction
BioDigital Convergence
Part 6
The Network Connection & The Plan
THE PLAN
CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE
This plan outlines the ENTIRE CONTROL SYSTEM for the BioDigital Convergence !!!!
They laid out the groundwork under the Disguise of Cybersecurity.
It's clear on page 71 underneath the "Targeting" section that this will be used against us while disguising it as Cyber Security
PAGE 11
CYBER-PERSONA LAYER 1-27.
The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network layer using the rules that apply in the logical network layer to develop descriptions of digital representations of an actor or entity identity in cyberspace, known as a Cyber-Persona (JP 3-12).
Cyber-Personas are not confined to a single physical or logical location and may link to multiple physical and logical network layers. When planning & executing cyberspace operations, staffs should understand that one actor or entity (user) may have multiple cyber-personas, using multiple identifiers in cyberspace.
For example, an individual’s account on a social media website, consisting of the username and digital information associated with that username, may be just one of that individual’s cyber-personas.
Conversely, multiple different users may share a single cyber-persona or set of cyber-personas.
Planners must understand that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.
Page 37
ELECTROMAGNETIC ATTACK TASKS 2-26
EA has the unique potential to affect enemy use of the EMS and attack the enemy through the EMS. Other offensive options can affect enemy use of the EMS but are likely to cause collateral damage outside the EMS, whereas EA uses the EMS for its effects.
EA tasks include
- Employing directed energy weaponry.
- Electromagnetic pulse
- Reactive countermeasures
- Deception measures
- Electromagnetic intrusion.
- Electromagnetic jamming.
- Electromagnetic probing.
- Meaconing.
PAGE 71
TARGETING
4-59. When targeting for cyberspace effects, the physical network layer is the medium through which all digital data travels.
The physical network layer includes wired (land and undersea cable), and WIRELESS (RADIO, RADIO-RELAY, CELLULAR, SATELLITE) transmission means.
WIRELESS COMMUNICATION
1) Graphene Radio Nanosystem
Graphene-based nano-antennas have been characterized for use in the terahertz band, enabling wireless communications at the nanoscale.
The physical network layer is a point of reference used during targeting to determine the geographic location of an enemy’s cyberspace and EMS capabilities.
THE PHYSICAL LAYER
BabbleSim
BabbleSim is a simulator of the physical layer of shared medium networks.
Its main objective is to be an aid to develop network protocols and network devices, and to be able to develop, debug and regression test target code in a controlled environment.
BabbleSim Architecture
The physical layer simulation (Phy) and each device run as independent programs each in their own Linux process(es).
In a simulation there will normally be 1 Physical layer simulation and a set of devices. Starting a simulation consists of executing the Physical layer simulation and devices.
Once all devices have connected to the Physical layer the simulation will start
Here's how we know they're doing this under the disguise of Cybersecurity.
Microsoft & the DOD
Azure & DoD IL6
Azure Government Secret maintains an Impact Level 6 (IL6) DoD provisional authorization (PA) at the high confidentiality, high integrity & customer-determined availability (H-H-x) information categorization.
It provides a direct connection to the DoD Secret Internet Protocol Router Network (SIPRNet) and is operated by cleared US citizens.
Azure Government Secret operates on secure, native connections to classified networks with options for ExpressRoute
and ExpressRoute Direct
For Private, resilient, high-bandwidth connectivity.
Part 6
The Network Connection & The Plan
THE PLAN
CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE
This plan outlines the ENTIRE CONTROL SYSTEM for the BioDigital Convergence !!!!
They laid out the groundwork under the Disguise of Cybersecurity.
It's clear on page 71 underneath the "Targeting" section that this will be used against us while disguising it as Cyber Security
PAGE 11
CYBER-PERSONA LAYER 1-27.
The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network layer using the rules that apply in the logical network layer to develop descriptions of digital representations of an actor or entity identity in cyberspace, known as a Cyber-Persona (JP 3-12).
Cyber-Personas are not confined to a single physical or logical location and may link to multiple physical and logical network layers. When planning & executing cyberspace operations, staffs should understand that one actor or entity (user) may have multiple cyber-personas, using multiple identifiers in cyberspace.
For example, an individual’s account on a social media website, consisting of the username and digital information associated with that username, may be just one of that individual’s cyber-personas.
Conversely, multiple different users may share a single cyber-persona or set of cyber-personas.
Planners must understand that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.
Page 37
ELECTROMAGNETIC ATTACK TASKS 2-26
EA has the unique potential to affect enemy use of the EMS and attack the enemy through the EMS. Other offensive options can affect enemy use of the EMS but are likely to cause collateral damage outside the EMS, whereas EA uses the EMS for its effects.
EA tasks include
- Employing directed energy weaponry.
- Electromagnetic pulse
- Reactive countermeasures
- Deception measures
- Electromagnetic intrusion.
- Electromagnetic jamming.
- Electromagnetic probing.
- Meaconing.
PAGE 71
TARGETING
4-59. When targeting for cyberspace effects, the physical network layer is the medium through which all digital data travels.
The physical network layer includes wired (land and undersea cable), and WIRELESS (RADIO, RADIO-RELAY, CELLULAR, SATELLITE) transmission means.
WIRELESS COMMUNICATION
1) Graphene Radio Nanosystem
Graphene-based nano-antennas have been characterized for use in the terahertz band, enabling wireless communications at the nanoscale.
The physical network layer is a point of reference used during targeting to determine the geographic location of an enemy’s cyberspace and EMS capabilities.
THE PHYSICAL LAYER
BabbleSim
BabbleSim is a simulator of the physical layer of shared medium networks.
Its main objective is to be an aid to develop network protocols and network devices, and to be able to develop, debug and regression test target code in a controlled environment.
BabbleSim Architecture
The physical layer simulation (Phy) and each device run as independent programs each in their own Linux process(es).
In a simulation there will normally be 1 Physical layer simulation and a set of devices. Starting a simulation consists of executing the Physical layer simulation and devices.
Once all devices have connected to the Physical layer the simulation will start
Here's how we know they're doing this under the disguise of Cybersecurity.
Microsoft & the DOD
Azure & DoD IL6
Azure Government Secret maintains an Impact Level 6 (IL6) DoD provisional authorization (PA) at the high confidentiality, high integrity & customer-determined availability (H-H-x) information categorization.
It provides a direct connection to the DoD Secret Internet Protocol Router Network (SIPRNet) and is operated by cleared US citizens.
Azure Government Secret operates on secure, native connections to classified networks with options for ExpressRoute
and ExpressRoute Direct
For Private, resilient, high-bandwidth connectivity.
❤1
Oh dear, the torturers home residential addresses, all went out onto the dark net.
What a shame, hey.
What a shame, hey.
😁1
Reminder, you have natural law rights to use fatal force in self defence.
Reminder, you have common law rights to use fatal force in self defence.
Reminder, you have Statutory rights to use fatal force (if reasonable in all the circs) ... in self defence.
Reminder, you have common law rights to use fatal force in self defence.
Reminder, you have Statutory rights to use fatal force (if reasonable in all the circs) ... in self defence.
🔥1
And all of your torturers home residential addresses are apparently leaked onto the dark web.
As I was saying, tragic, hey.
As I was saying, tragic, hey.
😁1
Bitcoin Core and Bitcoin Knots are both implementations of the Bitcoin protocol, with Knots being a derivative of Core's codebase, maintained by developer Luke Dashjr.
The primary differences lie in their philosophy, features, and user focus. Bitcoin Core serves as the reference implementation, emphasizing stability, standardization, and broad consensus, and is used by the majority of nodes.
In contrast, Bitcoin Knots targets advanced users seeking greater control and customization, offering enhanced features and stricter policy controls.
A key technical difference is in mempool policy and spam filtering. Bitcoin Knots includes advanced filters that allow node operators to reject non-financial transactions, such as those embedding large data payloads via OP_RETURN, by default.
It enforces a strict 42-byte limit on OP_RETURN data, a policy aimed at preventing network spam and preserving Bitcoin's function as peer-to-peer electronic cash.
Bitcoin Core, on the other hand, has increased its datacarriersize limit to 100,000 bytes in its v30.0rc1 release, a change that has sparked debate over potential network misuse and a departure from Bitcoin’s original monetary purpose.
Core maintains a neutral stance, not filtering transactions based on content, which some view as a commitment to decentralization, while others see it as enabling spam.
Bitcoin Knots also offers more granular configuration options through its bitcoin.conf settings, such as rejectparasites=1, datacarrier=0, and permitbaremultisig=0, giving users fine-grained control over transaction acceptance.
It provides a more feature-rich experience with advanced debugging tools, a graphical user interface, and support for features like disabling SegWit, which Core does not allow.
Knots has historically been proactive in addressing security vulnerabilities, such as patching the CVE-2023-50428 exploit related to inscriptions before Core.
While Core is regularly updated and widely used, Knots is less stable and used by a smaller, more specialized user base.
However, supporters argue that Knots strengthens network resilience by promoting client diversity, acting as a backup in case Core becomes compromised, and fostering a more robust, decentralized development ecosystem.
The choice between the two often reflects a philosophical stance: Core represents a consensus-driven, standardized approach, while Knots embodies a more libertarian, user-controlled vision of Bitcoin.
AI-generated answer. Please verify critical facts.
The primary differences lie in their philosophy, features, and user focus. Bitcoin Core serves as the reference implementation, emphasizing stability, standardization, and broad consensus, and is used by the majority of nodes.
In contrast, Bitcoin Knots targets advanced users seeking greater control and customization, offering enhanced features and stricter policy controls.
A key technical difference is in mempool policy and spam filtering. Bitcoin Knots includes advanced filters that allow node operators to reject non-financial transactions, such as those embedding large data payloads via OP_RETURN, by default.
It enforces a strict 42-byte limit on OP_RETURN data, a policy aimed at preventing network spam and preserving Bitcoin's function as peer-to-peer electronic cash.
Bitcoin Core, on the other hand, has increased its datacarriersize limit to 100,000 bytes in its v30.0rc1 release, a change that has sparked debate over potential network misuse and a departure from Bitcoin’s original monetary purpose.
Core maintains a neutral stance, not filtering transactions based on content, which some view as a commitment to decentralization, while others see it as enabling spam.
Bitcoin Knots also offers more granular configuration options through its bitcoin.conf settings, such as rejectparasites=1, datacarrier=0, and permitbaremultisig=0, giving users fine-grained control over transaction acceptance.
It provides a more feature-rich experience with advanced debugging tools, a graphical user interface, and support for features like disabling SegWit, which Core does not allow.
Knots has historically been proactive in addressing security vulnerabilities, such as patching the CVE-2023-50428 exploit related to inscriptions before Core.
While Core is regularly updated and widely used, Knots is less stable and used by a smaller, more specialized user base.
However, supporters argue that Knots strengthens network resilience by promoting client diversity, acting as a backup in case Core becomes compromised, and fostering a more robust, decentralized development ecosystem.
The choice between the two often reflects a philosophical stance: Core represents a consensus-driven, standardized approach, while Knots embodies a more libertarian, user-controlled vision of Bitcoin.
AI-generated answer. Please verify critical facts.