Forwarded from West Coast News & Discussion
This media is not supported in your browser
VIEW IN TELEGRAM
The best example so far of the snow that burns...it sustains the flame! Arson, Chemtrails and GeoEngineering are the Lefts new Climate Change (formerly known as the global warming hoax)
@neo_network Protocols
ππ£π‘
Here are a few basic principles for this channel so our discussions can be clear, productive and helpful.
1. Focus: We will attempt to keep channel & group discussion oriented around technology. Other topics may come in based on being related to technology or breaking news, although these topics are allowed, let's try to bring the discussion back to technology & solutions. There are certain topics, like partisan politics that are more likely to get removed as they hardly ever lead to a productive discussion.
2. Substance: If you make an assertion or statement, please do some research to back yourself up. You can link to other sources of content to support your claims. When responding to other people's statements, let's analyze the sources and potential biases, the primary information, and let's research and respond with our own.
3. Solutions: Although a big part of privacy and security is focusing on danger, we should also provide a better alternative based on our findings. After all, we are trying to help each other be the best that we can be. This means balancing our negative analysis with positive solutions and having well-informed opinions.
Suggestions & recommendations are always welcomed and considered. :)
Thanks for being part of the @neo_network β€οΈ
ππ£π‘
Here are a few basic principles for this channel so our discussions can be clear, productive and helpful.
1. Focus: We will attempt to keep channel & group discussion oriented around technology. Other topics may come in based on being related to technology or breaking news, although these topics are allowed, let's try to bring the discussion back to technology & solutions. There are certain topics, like partisan politics that are more likely to get removed as they hardly ever lead to a productive discussion.
2. Substance: If you make an assertion or statement, please do some research to back yourself up. You can link to other sources of content to support your claims. When responding to other people's statements, let's analyze the sources and potential biases, the primary information, and let's research and respond with our own.
3. Solutions: Although a big part of privacy and security is focusing on danger, we should also provide a better alternative based on our findings. After all, we are trying to help each other be the best that we can be. This means balancing our negative analysis with positive solutions and having well-informed opinions.
Suggestions & recommendations are always welcomed and considered. :)
Thanks for being part of the @neo_network β€οΈ
ImgBB
cube-concept
Image cube-concept hosted in ImgBB
Forwarded from Matteo Salm
Re Protonmail: I would like to double down on 'automatic' privacy issues when going through servers based on Swiss territory! Please all be aware that Swiss Secret Services based on valid Swiss law are controlling and analyzing all communications to and from abroad. This is public knowledge and based on transparent existing laws. Any communication to a Server based in Switzerland from abroad and any communication going from Switzerland to a foreign location is automatically analyzed. Even worse there is the law called 'Vorratsdatenspeicherung' = 'data preservation' which forces all Internet Providers of all kind to preserve ALL DATA (including calls, all digital communication) for at least 6 months by law. They have to provide this data to government entities if asked. Even worse: The law (at this moment, 2021) does not force providers to delete data after this forced period, so it is possible that data is preserved for much longer. There are powerful political forces that want to increase the forced period by law to at least 12 months and they also work to further increase digital control and surveillance. Not many people know that Switzerland in fact has much worse digital privacy rights than the EU! So when you include the background of protonmail key management and founders and their ties (incl. the usual reasonalbe supicion based on further information that they too, just like google and so many more digital companies have been actually founded by the military/intelligence complex of the US and their allied and vassal states (which by the way includes Switzerland). This just shows you for one factor, communication, that you have to exit life and society in a quite extreme way, not only geographically and what concerns your supplies, etc. to eliminate your vulnerability to the forces in power, the global elite, which are expanding their grip right now with incredible mass and speed.
Ramiro's Recommended Apps SnackPack Part I
@neo_network
Discuss at: @neo_network_chat (π srsly click this π€ )
ππ π
I'm made a commitment to write for @neo_network every day this month, however I'm feeling lazy today. Here's some low hanging but delicious fruit in the form of app recommendations.
Everything has a useful FREE version (i love free) and most things are privacy minded - but not all things. Do your own research (and then share it with us on @neo_network_chat)
Productivity
CryptPad: Browser-based cloud Encrypted Office Suite With Storage, Word Documents, Spreadsheets , Presentations & More π₯
CherryTree: A Personal (Local) Hierarchical Note Taking System with rich text formatting, code blocks, links, and more. I use it like a personal wikipedia or for journals. Your CherryTree notebooks can be saved as an encrypted database file. π
Obsidian: A Graph-Based Knowledge Base & Markdown Editor: I usually compose my more serious writing here. π
YunoHost: Self-hosting platform for email, calendar, web applications & more π
Communication
Jitsi Meet: Open Source & Private Real-Time Video Conferencing With Screen Sharing, Chat & More π§ββοΈ
CTemplar: Highly Secure Email Service Based In Iceland π§I've written a bit about it at @neo_network
Technical:
FileZilla: A Really Easy Way To Transfers Files Quickly Between Any Computers within the same Network π
VSCodium: The Truly Open-Souce Fork of VSCode (now with less telemetry!) π©βπ»
Crypto:
Atomic Wallet: The Cross-Platform Wallet I've Seen With The Most Supported Tokens and Built-in Exchange (pretty trustworthy, except I can't get my monero out of there, damn it) βοΈ
CryptoWatch: Awesome Crypto-Trading Dashboard to watch coin prices & see candlestick charts π
Till tomorrow then, :)
Discuss at: @neo_network_chat
@neo_network
Discuss at: @neo_network_chat (π srsly click this π€ )
ππ π
I'm made a commitment to write for @neo_network every day this month, however I'm feeling lazy today. Here's some low hanging but delicious fruit in the form of app recommendations.
Everything has a useful FREE version (i love free) and most things are privacy minded - but not all things. Do your own research (and then share it with us on @neo_network_chat)
Productivity
CryptPad: Browser-based cloud Encrypted Office Suite With Storage, Word Documents, Spreadsheets , Presentations & More π₯
CherryTree: A Personal (Local) Hierarchical Note Taking System with rich text formatting, code blocks, links, and more. I use it like a personal wikipedia or for journals. Your CherryTree notebooks can be saved as an encrypted database file. π
Obsidian: A Graph-Based Knowledge Base & Markdown Editor: I usually compose my more serious writing here. π
YunoHost: Self-hosting platform for email, calendar, web applications & more π
Communication
Jitsi Meet: Open Source & Private Real-Time Video Conferencing With Screen Sharing, Chat & More π§ββοΈ
CTemplar: Highly Secure Email Service Based In Iceland π§I've written a bit about it at @neo_network
Technical:
FileZilla: A Really Easy Way To Transfers Files Quickly Between Any Computers within the same Network π
VSCodium: The Truly Open-Souce Fork of VSCode (now with less telemetry!) π©βπ»
Crypto:
Atomic Wallet: The Cross-Platform Wallet I've Seen With The Most Supported Tokens and Built-in Exchange (pretty trustworthy, except I can't get my monero out of there, damn it) βοΈ
CryptoWatch: Awesome Crypto-Trading Dashboard to watch coin prices & see candlestick charts π
Till tomorrow then, :)
Discuss at: @neo_network_chat
If You Want Encryption Done Right, You Gotta Do It Yourself: Using PGP
ππ¨π§₯
@neo_network
Discuss at: @neo_network_chat
"If privacy is outlawed, only outlaws will have privacy. Intelligence agencies have access to good cryptographic technology. So do the big arms and drug traffickers. So do defense contractors, oil companies, and other corporate giants. But ordinary people and grassroots political organizations mostly have not had access to affordable "military grade" public-key cryptographic technology. Until now.
PGP empowers people to take their privacy into their own hands. There's a growing social need for it. That's why I wrote it. "
- Philip Zimmerman (Creator of PGP), 1994
In 1991, the US Senate proposed a 'Comprehensive Counter-Terrorism Act', which would force all software & communications providers to 'ensure that communications systems permit the Government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law'.
Does that sound like outlawing privacy to you?
π« Fun Fact: The senator who once proposed this bill is now the President...
Seeing this, the internet folk hero Philip Zimmerman (PRZ) wrote the first version of Pretty Good Privacy. Although it was outlawed for US citizens or companies to export strong encryption models, PRZ found a loophole and published his source code in a book, releasing it to the world. (what a legend)
Despite the 3 year criminal investigation that ensued for him, Philip's software became a weapon to fight government surveillance, leading to open source development groups & large scale adoption of encryption.
Today, given the uncertainty of how trustworthy web encryption is, I wanted to do a short tutorial on how you can use PGP.
This Is A Private Conversation π€«
How does PGP work?
If I want to send you (and only you) a message, I could encrypt the message by mixing the letters up. Key based encryption mixes the letters up in a programmatic manner derived by a cryptographic 'key'.
You could use this same key to decrypt the message, just by playing the steps backwards.
But how am I going to send you this key securely without it getting intercepted? This is why we cannot use single-key cryptography, and why public key systems were created.
With public key cryptography, I generate two keys that are counterparts to each other: the public key, and the private key.
The public key can be released to the public, and serves as a way to contact me privately if you encrypt a message with it and send the resulting ciphertext to me.
The private key must be kept secret, it can only decrypt the ciphertext encrypted with the public key.
When you create your own public keys, they are generated as part of a key certificate that include your name, timestmap, and the material of the key. This allows you to register it with a public location, where people can look you up by name or email.
The private key contains the secrets and is encrypted with an additional passcode that is entered at time of creation, in case it ever gets stolen.
The keys can also be used to sign messages, if you use your secret key to encrypt a message - you prove that you wrote that message when it is decrypted by others using your public key.
ππ¨π§₯
@neo_network
Discuss at: @neo_network_chat
"If privacy is outlawed, only outlaws will have privacy. Intelligence agencies have access to good cryptographic technology. So do the big arms and drug traffickers. So do defense contractors, oil companies, and other corporate giants. But ordinary people and grassroots political organizations mostly have not had access to affordable "military grade" public-key cryptographic technology. Until now.
PGP empowers people to take their privacy into their own hands. There's a growing social need for it. That's why I wrote it. "
- Philip Zimmerman (Creator of PGP), 1994
In 1991, the US Senate proposed a 'Comprehensive Counter-Terrorism Act', which would force all software & communications providers to 'ensure that communications systems permit the Government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law'.
Does that sound like outlawing privacy to you?
π« Fun Fact: The senator who once proposed this bill is now the President...
Seeing this, the internet folk hero Philip Zimmerman (PRZ) wrote the first version of Pretty Good Privacy. Although it was outlawed for US citizens or companies to export strong encryption models, PRZ found a loophole and published his source code in a book, releasing it to the world. (what a legend)
Despite the 3 year criminal investigation that ensued for him, Philip's software became a weapon to fight government surveillance, leading to open source development groups & large scale adoption of encryption.
Today, given the uncertainty of how trustworthy web encryption is, I wanted to do a short tutorial on how you can use PGP.
This Is A Private Conversation π€«
How does PGP work?
If I want to send you (and only you) a message, I could encrypt the message by mixing the letters up. Key based encryption mixes the letters up in a programmatic manner derived by a cryptographic 'key'.
You could use this same key to decrypt the message, just by playing the steps backwards.
But how am I going to send you this key securely without it getting intercepted? This is why we cannot use single-key cryptography, and why public key systems were created.
With public key cryptography, I generate two keys that are counterparts to each other: the public key, and the private key.
The public key can be released to the public, and serves as a way to contact me privately if you encrypt a message with it and send the resulting ciphertext to me.
The private key must be kept secret, it can only decrypt the ciphertext encrypted with the public key.
When you create your own public keys, they are generated as part of a key certificate that include your name, timestmap, and the material of the key. This allows you to register it with a public location, where people can look you up by name or email.
The private key contains the secrets and is encrypted with an additional passcode that is entered at time of creation, in case it ever gets stolen.
The keys can also be used to sign messages, if you use your secret key to encrypt a message - you prove that you wrote that message when it is decrypted by others using your public key.
Enough talk. Let's get our hands dirty with GnuPG, an implementation of the OpenPGP standard. GnuPG allows you to manage your keys and connect to public key directories. Make sure to download the GUI version.
Here are downloads for all environments (scroll down to Binary Releases and pick your platform). (linux users might have to find alternate gnupg clients, like KGpg)
Once you get it installed, launch the program. It should prompt you to generate a new key. Fill out your name, email, and an optional comment.
Select the key-size based on how much security you need (higher is more secure, but takes longer).
Then, enter your passphrase for the key.
Now you'll see a fingerprint, which people will use to identify your public key.
BOOM - is this what privacy feels like?
At this point, you should sign your public key to validate yourself as the creator (it may do this automatically).
You can even get other people you trust to sign your key, and you may want to - it is the only secure way you can obtain a public key. Ensuring you have the right public key for someone is based on a web of trust.
The web of trust is built when you give your public key to someone in a secure manner. This could be in person, or in print (with signature). You should have this person then sign your key with their private key. This key can go on switching hands in a secure manner, developing signatures. Different public keys you release may have different chains of trust based on who receives them.
A person who may find that public key somewhere only needs to know one person on the list of signatures to trust that that key does belong to the right person.
NEVER sign a key for someone you don't personally know or cannot verify. You'd break the web of trust. The private key is your identity. It is you.
What to do next?
- Send your public key to your friends, let them know that the key is yours. You should get the key signed by a few people before sending it across the internet.
- Keep your private key in a safe place. On a secure computer, a flash drive, or a CD. Back it up to as many secure locations as you can. You can even print it out.
Conclusion
There are many players that are determined to manage our security for us. We always wonder if we can trust them. God forbid, if we find ourselves living in a future where you cannot say what is on your mind, and we find that the trust in the players was misplaced, can we at least can trust ourselves? π
More content at: @neo_network
Discuss at: @neo_network_chat
Here are downloads for all environments (scroll down to Binary Releases and pick your platform). (linux users might have to find alternate gnupg clients, like KGpg)
Once you get it installed, launch the program. It should prompt you to generate a new key. Fill out your name, email, and an optional comment.
Select the key-size based on how much security you need (higher is more secure, but takes longer).
Then, enter your passphrase for the key.
Now you'll see a fingerprint, which people will use to identify your public key.
BOOM - is this what privacy feels like?
At this point, you should sign your public key to validate yourself as the creator (it may do this automatically).
You can even get other people you trust to sign your key, and you may want to - it is the only secure way you can obtain a public key. Ensuring you have the right public key for someone is based on a web of trust.
The web of trust is built when you give your public key to someone in a secure manner. This could be in person, or in print (with signature). You should have this person then sign your key with their private key. This key can go on switching hands in a secure manner, developing signatures. Different public keys you release may have different chains of trust based on who receives them.
A person who may find that public key somewhere only needs to know one person on the list of signatures to trust that that key does belong to the right person.
NEVER sign a key for someone you don't personally know or cannot verify. You'd break the web of trust. The private key is your identity. It is you.
What to do next?
- Send your public key to your friends, let them know that the key is yours. You should get the key signed by a few people before sending it across the internet.
- Keep your private key in a safe place. On a secure computer, a flash drive, or a CD. Back it up to as many secure locations as you can. You can even print it out.
Conclusion
There are many players that are determined to manage our security for us. We always wonder if we can trust them. God forbid, if we find ourselves living in a future where you cannot say what is on your mind, and we find that the trust in the players was misplaced, can we at least can trust ourselves? π
More content at: @neo_network
Discuss at: @neo_network_chat
Happy 2/22/2021! 2οΈβ£
200 members & 600 subs at @neo_network β€οΈ This is the first time in my life I have a community following my writing. I can't thank y'all enough. We have so much planned, including a new site & videos. What should we learn next?
200 members & 600 subs at @neo_network β€οΈ This is the first time in my life I have a community following my writing. I can't thank y'all enough. We have so much planned, including a new site & videos. What should we learn next?
Anonymous Poll
26%
Picking VPNs
21%
Browser Security
39%
Cryptocurrency
49%
More Decentralized Web
27%
Security & Intelligence Gathering
Forwarded from StormCloudsGathering
Israel is the first to start coercing its citizens to take the vaccine, reopening for only those who accept the jab. Those who refuse are shut out of everyday activities.
https://www.wsj.com/articles/israels-speedy-vaccination-campaign-now-faces-key-test-in-returning-to-normal-11613929717
https://www.wsj.com/articles/israels-speedy-vaccination-campaign-now-faces-key-test-in-returning-to-normal-11613929717
WSJ
Israelβs Speedy Vaccination Campaign Now Faces Key Test in Returning to Normal
Officials are combining incentives with threats, offering perks like free meals at Covid-19 vaccination sites while warning that those who donβt get the shot will be shut out of everyday activities.
Announcing The neo-network Blog!
@neo_network
βοΈπ»π
I have been missing for the past few days, hard at work building a blog that will update itself as soon as I write a new post. This editing flow will make it super easy for me to write up a post, publish it in Telegram, and then have the site update itself a few minutes after. And now you'll be able to share links to posts here with your non-telegram friends!
https://neonetwork.in/
Next steps: Publish automatically to IPFS, alternative social media platforms.
The whole process took me around 3 days and ~8 hours. (i'll be faster next time >:D)
Are you interested in creating your own blog like this? We have a lot of knowledgeable people in our community with lots to share. I am planning to do a write up and offer consults to anyone who wants to do their own.
Let me know if you're interested by responding in our chat
@neo_network_chat
@neo_network
βοΈπ»π
I have been missing for the past few days, hard at work building a blog that will update itself as soon as I write a new post. This editing flow will make it super easy for me to write up a post, publish it in Telegram, and then have the site update itself a few minutes after. And now you'll be able to share links to posts here with your non-telegram friends!
https://neonetwork.in/
Next steps: Publish automatically to IPFS, alternative social media platforms.
The whole process took me around 3 days and ~8 hours. (i'll be faster next time >:D)
Are you interested in creating your own blog like this? We have a lot of knowledgeable people in our community with lots to share. I am planning to do a write up and offer consults to anyone who wants to do their own.
Let me know if you're interested by responding in our chat
@neo_network_chat
Forwarded from Derrick Broze's Daily News
Well Patreon officially deleted Ryan Cristian's (The Last American Vagabond) account. Visit the website and support him directly if you can.
FYI by supporting TLAV you support me. My main source of income is writing articles for TLAV. I make some money via Patreon but obviously that might not last.
The Last American Vagabond
FYI by supporting TLAV you support me. My main source of income is writing articles for TLAV. I make some money via Patreon but obviously that might not last.
The Last American Vagabond
Forwarded from Derrick Broze's Daily News
Check out my latest article for The Last American Vagabond. I told you this was going to happen last May. Have you done anything to prepare to survive and thrive outside the Technocratic control grid?
"As the European Union announces they are preparing to implement βvaccine certificatesβ the largest airline association is also preparing to roll out their version of the controversial Immunity Passports."
https://www.thelastamericanvagabond.com/as-predicted-immunity-passports-are-no-longer-fantasy/
"As the European Union announces they are preparing to implement βvaccine certificatesβ the largest airline association is also preparing to roll out their version of the controversial Immunity Passports."
https://www.thelastamericanvagabond.com/as-predicted-immunity-passports-are-no-longer-fantasy/
The Last American Vagabond
As Predicted: Immunity Passports Are No Longer a Fantasy
As the EU prepares to implement "vaccine certificates" the largest airline association is preparing to roll out their own Immunity Passports.
Did you attend the first The Greater Reset Activation?
The Greater Reset Team (myself included) is hard at working getting the site up for the next conference, which will take place the last week in May!
Last time we had 30+ speakers share their thoughts over 5 days over critical topics such as a food, commerce, technology, and health.
This year we want to make the event even more interactive, and showcase our community.
I'd like to hear your ideas:
- Who do you want to see speak at the next The Greater Reset?
- How would you like to interact with the live community at the event?
- How will you invite friends & neighbors to set up watch parties?
Peace and love β€οΈ
The Greater Reset Team (myself included) is hard at working getting the site up for the next conference, which will take place the last week in May!
Last time we had 30+ speakers share their thoughts over 5 days over critical topics such as a food, commerce, technology, and health.
This year we want to make the event even more interactive, and showcase our community.
I'd like to hear your ideas:
- Who do you want to see speak at the next The Greater Reset?
- How would you like to interact with the live community at the event?
- How will you invite friends & neighbors to set up watch parties?
Peace and love β€οΈ
Announcing The Next Greater Reset
@neo_network
πππ
We've launched our systems for the second 'The Greater Reset: Activation', which will take place May 25th - 29th on thegreaterreset.org
Check out the videos on the site and watch them! I think I have a talk up there somewhere ;)
The Greater Reset Activation is the worldβs collective response to the World Economic Forumβs Initiative: The Great Reset.
We offer an alternative to the WEFβs top-down, centralized, authoritarian vision. Our desire is to help all people find community and liberty by providing practical steps and knowledge for co-creating a world that respects individual liberty, bodily autonomy, and choice.
We invite you to join us for 5 days of discussion about the diverse opportunities available for those who seek to live in harmony with humanity and the planet, while respecting our innate freedom.
@neo_network
πππ
We've launched our systems for the second 'The Greater Reset: Activation', which will take place May 25th - 29th on thegreaterreset.org
Check out the videos on the site and watch them! I think I have a talk up there somewhere ;)
The Greater Reset Activation is the worldβs collective response to the World Economic Forumβs Initiative: The Great Reset.
We offer an alternative to the WEFβs top-down, centralized, authoritarian vision. Our desire is to help all people find community and liberty by providing practical steps and knowledge for co-creating a world that respects individual liberty, bodily autonomy, and choice.
We invite you to join us for 5 days of discussion about the diverse opportunities available for those who seek to live in harmony with humanity and the planet, while respecting our innate freedom.
What's one thing you've done to become digitally conscious?
Since I became interested in privacy, I started reading through the Terms of Service when signing up for new softwares (especially free ones). Even skimming through the important sections the data collection and privacy policies really helps. When I'm working on something sensitive, reading through this can deter my decision of using that product. If its just normal use, then at least I am aware of who is listening. π
Since I became interested in privacy, I started reading through the Terms of Service when signing up for new softwares (especially free ones). Even skimming through the important sections the data collection and privacy policies really helps. When I'm working on something sensitive, reading through this can deter my decision of using that product. If its just normal use, then at least I am aware of who is listening. π
Hey, am looking to get informed opinions on the Ethereum ecosystem. Some of their partnerships with JP Morgan and big banks, as well the UNICEF projects that distribute ETH to warn torn areas have me thinking that its a limited hangout and potentially the coin of the deluded world order.
Anyone have any news or information to share on this?
Anyone have any news or information to share on this?
π€―
I'll be releasing a new article tomorrow evening titled 'Internet Apocalypse'. We're going to dig into how internet censorship works, what laws have been passed that allow it to happen, and the players driving censorship forwards.
Is a horrifying reality approaching where our favorite sites / content creators go missing from the web? If it is - how can we resist?
We'll answer these questions and more on the @neo_network!
Share with your peeps and chat with us at @neo_network_chat β€οΈ
I'll be releasing a new article tomorrow evening titled 'Internet Apocalypse'. We're going to dig into how internet censorship works, what laws have been passed that allow it to happen, and the players driving censorship forwards.
Is a horrifying reality approaching where our favorite sites / content creators go missing from the web? If it is - how can we resist?
We'll answer these questions and more on the @neo_network!
Share with your peeps and chat with us at @neo_network_chat β€οΈ
Forwarded from Rachel Blevins
Media is too big
VIEW IN TELEGRAM
NEW: The IRS is launching Operation Hidden Treasure, a new program targeting cryptocurrency users who haven't reported their earningsβas cryptos reach an all-time high and the IRS looks to get its cutβ¦
The IRS are trying to posture. If you don't have an identity tied to your wallets, you will be safe. This is why we use non-custodial wallets. This is why we keep our money off exchanges. This is why we should not convert our crypto to fiat and exchange it directly for goods & services. We'll have a platform to do this soon ;)