codrus's avatar
codrus
npub1uk70...zjsj
Voluntaryist Agorism Freedom Nature
codrus's avatar
codrus 11 months ago
Is this just a bizarre coincidence? image
codrus's avatar
codrus 11 months ago
I'm starting to understand the very real danger CDN's (content delivery network) pose to internet security, privacy, and anonymity. Someone correct me if I'm wrong in the following: You've probably noticed those cloudflare windows that popup. Cloudflare is a popular CDN. So, imagine you're doing this: home computer->vpn->youtube. Well, you're actually going through cloudflare in there, so it actually is: computer->vpn->cloudflare->youtube. You're still pretty anonymous, but cloudflare creates a fingerprint ID of your browser's settings. So you go on and visit a bunch of other sites through your vpn, assuming all of it is anonymous. It is, still, but you're also going through cloudflare for many of those sites as well, and cloudflare is attaching that fingerprint ID to each. And this is where your anonymity and privacy can be broken: When you then log into any website that holds any real, personal identifying information (gmail, youtube to earn money, twitch to earn money, bank account, telegram which you opened using a phone number thus attaching your real identity), cloudflare may now possibly acquire that personal identifying information. You may say, 'But I connected through an SSL or HTTPS tunnel!' Okay, but how does that work? There are two kinds of encrypted tunnels: end-to-end and terminated tunnels. And it is the WEBSITE that determines which will be used for any given content it sends. So, you have to trust that that website is using end-to-end when real identifying information is being sent. Let's say the website lets you log in using an end-to-end encryption tunnel, but then for the rest of the session it uses a terminated encryption tunnel, meaning the information is sent to the CDN which then decides which content (pictures, video, etc.) to deliver, encrypts and sends on to you. So, in this situation, the CDN is able to see your real name and other personal identifying information which passes through it from the website. It can then go and append that real identifying information to all your other connections via the fingerprint ID it made identifying your browser. So, the question becomes: how can I minimize this privacy, security threat posed by websites using CDNs? Installing a browser extension like Decentraleyes may help. Although, I'm not sure how much. The other is to use a vpn that actively helps your efforts to fight these types of identifying tricks. I haven't done a lot of research in this, so I currently know only of: I'm sure there must be others?
codrus's avatar
codrus 11 months ago
I'm starting to understand the very real danger CDN's (content delivery network) pose to internet security, privacy, and anonymity. Someone correct me if I'm wrong in the following: You've probably noticed those cloudflare windows that popup. Cloudflare is a popular CDN. So, imagine you're doing this: home computer->vpn->youtube. Well, you're actually going through cloudflare in there, so it actually is: computer->vpn->cloudflare->youtube. You're still pretty anonymous, but cloudflare creates a fingerprint ID of your browser's settings. So you go on and visit a bunch of other sites through your vpn, assuming all of it is anonymous. It is, still, but you're also going through cloudflare for many of those sites as well, and cloudflare is attaching that fingerprint ID to each. And this is where your anonymity and privacy can be broken: When you then log into any website that holds any real, personal identifying information (gmail, youtube to earn money, twitch to earn money, bank account, telegram which you opened using a phone number thus attaching your real identity), cloudflare may now possibly acquire that personal identifying information. You may say, 'But I connected through an SSL or HTTPS tunnel!' Okay, but how does that work? There are two kinds of encrypted tunnels: end-to-end and terminated tunnels. And it is the WEBSITE that determines which will be used for any given content it sends. So, you have to trust that that website is using end-to-end when real identifying information is being sent. Let's say the website lets you log in using an end-to-end encryption tunnel, but then for the rest of the session it uses a terminated encryption tunnel, meaning the information is sent to the CDN which then decides which content (pictures, video, etc.) it to deliver, encrypts it and sends on to you. So, in this situation, the CDN is able to see your real name and other personal identifying information that passes through it from the website. It can then go and append that real identifying information to all your other connections that it knows of via the fingerprint ID it made identifying your browser. So, the question becomes, how can I minimize this privacy, security threat posed by websites using CDNs? Installing a browser extension like Decentraleyes may help. Although, I'm not sure how much it helps. The other is to use a vpn that actively helps your efforts to fight these types of identifying tricks. I haven't done a lot of research for in this, so I currently know only of: I'm sure there must be others.
codrus's avatar
codrus 11 months ago
Is this just a weird coincidence by a segment that makes up only 0.02% of the population? image
codrus's avatar
codrus 11 months ago
So, this is weird. Someone asked Grok AI if someone on Earth was Satan or Satan's spirit, who would it be? Then they went and asked ChatGPT the same question. Take a look at the answers.
codrus's avatar
codrus 11 months ago
Epstein Files: A Rigged ‘Release’ to Protect Israel? The latest Epstein files release were a step back, not forward.
codrus's avatar
codrus 11 months ago
What are things that Robert Kennedy can do as HHS Secretary to help? 1. Influence vaccine recommendations via the CDC; the HHS oversees the CDC. He can remove and appoint Advisory Committee on Immunization Practices (ACIP). The ACIP influences state level polices, insurance coverage via the Affordable Care Act, and Vaccines for Children (VFC). -- Also he could direct the CDC to change its public messaging about vaccines, emphasizing risks over benefits (there are no benefits), or promoting 'transparency'. 2. Remove or Modify Emergency Use Authorizations (EUAs). Through his influence over the FDA he could push to rescind existing EUAs. Also, as HHS Secretary, he has the authority under the Public Health Services Act to terminate public health emergencies. 3. Alter Vaccine Injury Compensation Policies. Kennedy could propose changes to the Vaccine Injury Compensation Program (VICP) by amending the vaccine injury table, which lists conditions eligible for compensation. For example, he could add autism after consulting the ACCV; while he must follow the public comment process, he isn't bound to follow the commission's advice. 4. Redirect research priorities at NIH and CDC. Kennedy controls their budget and can redirect funds away from infectious disease preventions (Germ Theory is a failed theory, e.g. vaccine development), and toward his stated priority of investigating cronic diseases. 5. Appoint like-minded agency heads. Kennedy can nominate leaders for NIH, CDC, and FDA. 6. Undermine vaccine access through administrative actions. He could weaken programs like the CDC's section 317 Immunization Program, which funds state and local vaccine efforts, by reducing grants and shifting priorities. Similarly, he could influence VFC program operations, potentially limiting which vaccines are distributed and how they're promoted. 7. Shape public opinion. BTW, these suggestions were compiled using AI, which illustrates how AI can be an important tool to help defend ourselves against what is being done. src:
codrus's avatar
codrus 11 months ago
Quote from a Joe Rogan guest. I'm not going to post a link because I think Rogan willingly become an intelligence asset. Persuasion expert bets his career on the COVID response being a full-blown psyop. Hughes explained that the key sign of a psyop is “if the opinion that’s coming out needs people to be silenced.” “So if you can’t question it—if you’re supposed to just go along, it’s a psyop,” Hughes reiterated.
codrus's avatar
codrus 11 months ago
Women may be interested in this. Birth Control literally changes a woman into a different kind of woman and is one of the factors that led to how society got to where it is now. You can either watch it from the beginning, or from where my link starts it (although y our client may mess that up.)
codrus's avatar
codrus 11 months ago
Trump "banned" central bank digital currencies (CBDCs) only to promote stablecoins in the same executive order. Stablecoins are tied to the US dollar, effectively making them CBDCs with an extra step.