India Rejects Facebook Plan to Exploit World’s Poorest with Private Internet

Bravo India, now the West can follow your lead! Net neutrality for all!

Tales from the Conspiratum

The true colors of Mark Zuckerberg bleed through on the other side of the world. Congrats to India for being alert and on the ball. Do not believe the crapitalists. As a species, we are done accepting second class citizens. We are all one and the same.

Source: India Rejects Facebook Plan to Exploit World’s Poorest with Private Internet | Common Dreams | Breaking News & Views for the Progressive Community

India Rejects Facebook Plan to Exploit World’s Poorest with Private Internet

‘As the country with the second largest number of Internet users worldwide, this decision will resonate around the world.’

Net neutrality advocates in India demonstrate against "VIP culture" on the web. (Photo: AFP)

Net neutrality advocates in India demonstrate against “VIP culture” on the web. (Photo: AFP)

In a move that open internet advocates say will “resonate around the world,” India’s top telecom regulator on Monday struck a decisive blow against…

View original post 517 more words

After 1,428 years here’s what brought down the world’s oldest business


In 578 AD, a Korean immigrant named Shigemitsu Kongo made his way to Japan at the invitation of the royal family.

Buddhism was on the rise in Japan at the time; though it had only been introduced a few decades prior, the Empress consort had been actively encouraging the adoption of Buddhism across Japan.

But since the Japanese had no experience building Buddhist temples, they looked overseas for help.

That’s where Kongo came in.

Shigemitsu Kongo was a renowned temple builder, and the royal family in Japan commissioned him to build the Shitenno-ji temple, which still stands today in Osaka.

Kongo saw an incredible opportunity. Buddhism was catching on fast, and he knew he could be kept busy for decades building temples.

It turned out to be centuries. Over 14 centuries, in fact.

Shigemitsu Kongo formed his construction company Kongo Gumi in 578 AD, and it lasted 1,428 years.

It’s extraordinary that any single enterprise could last so long.

Even as late as 2004, temple building accounted for more than 80% of the company’s revenue, which exceeded USD $60 million.

But ten years ago the company finally went under due to the massive debt burden they had accumulated.

It started back in the 1980s. Japan was in the midst of an epic financial bubble thanks to unconstrained credit growth and expansion of the money supply.

Go figure, central bankers artificially suppressed interest rates, keeping them way too low for way too long. And it created a huge asset bubble.

Asset prices in Japan got so out of control that for a short time during the 1980s, it was said that the grounds of the imperial palace in Tokyo were worth more than all of the real estate in the entire state of California.

As part of this bubble, banks had relaxed their lending standards and were handing out loans to just about anyone.

And many Japanese companies took on vast amounts of debt, including Kongo Gumi.

Debt was like a popular drug. Everyone was doing it.

But when the bubble burst in 1989, asset prices collapsed. And companies that had borrowed heavily were left with nothing but debt.

Kongo Gumi didn’t go out of business right away. The company was able to limp along for more than two decades on basic life support.

Soon they were borrowing money just to pay interest on the money they had already borrowed, even though interest rates were at record lows.

But eventually the company’s revenues were no longer sufficient to service the debt.

And in 2006 Kongo Gumi was forced into liquidation.

This company lasted over 1,400 years.

They survived countless political crises, wars, and natural disasters.

They survived the Meiji Restoration in the 1800s, a period in which the government set out to eradicate Buddhism from Japan, and hence, the temple building industry.

They even survived two atomic bombs.

What Kongo Gumi couldn’t survive was debt.

It doesn’t matter if you’re an individual, a company, a government, or even a central bank; if your balance sheet doesn’t add up, sooner or later you’re going under.

It’s concerning to see consumer debt once again on the rise in the Land of the Free, at the fastest pace since the days of the financial bubble.

Perhaps most appropriate was a Superbowl commercial from Quicken Loans advertising how easy they have made it to obtain a loan.

“Push button. Get mortgage.” says the commercial.

More appropriate would be “Push button. Get into debt. Then buy more useless stuff.”

It’s a blatant snapshot of how far along we are in this latest financial bubble.

Of course, most western governments are in this position as well; they can go further into debt with a few strokes of the pen.

No surprise that many governments must borrow money to pay interest on money they’ve already borrowed, even at a time when interest rates are at record lows!

And yet the leading mainstream economic minds claim that debt (and money printing) are actually CURES to economic problems, and not causes of them.

As my colleague Tim Price points out, medieval doctors used to advocate leeches as a way to cure sick people.

Yet this approach turned out be largely ineffective and tended to kill the patient.

Sometimes the final consequences take years. Even decades.

Old, established institutions have the ability to kick the can down the road, just like Kongo Gumi did.

And even in terminal decline they can even give the appearance of strength.

Just a few years before its demise, Kongo Gumi was still a media darling that seemed strong, fit, and likely to last another 1,400 years.

The LA Times, for example, ran a story in 2003 praising the company for its deft ability to outlast Japan’s tough economic conditions.

Kongo Gumi folded less than three years later.

This is an incredibly important lesson: debt is a killer. And no one is immune to this inevitability.

Onion.City: The New Way to Scour the Dark Web without Tor

OnionCity Search the Dark Web without Tor

One software developer has built a new way to search the deep dark web of .onion domains without the use of the Tor browser bundle, while offering the same security and safe haven.

The dark web, you may have heard of it, the underground internet comprised of illicit services that requires an extra layer of anonymizing tools just to access. Okay, it’s not quite that bad, but the underground typically known as the deepweb, dark net, or .onion domain is officially referred to as the dark web. Often referred  to as the “hidden internet,” the subinternet offers everything from drug marketplaces, to hidden Wiki’s all the way to hiring a hitman online.

While the dark web may be crawling with a list of services, it also has a lot to offer. Especially for heavily censored nations, Tor browser, the anonymizing tool needed to access the dark web, can open the walls behind the censorship. The Tor browser offers anonymity and security to browse the internet without the fear or government intrusion and censorship.

Though the dark web is a slightly well-known area, it remains hidden behind Tor nodes and the general dark web is harder to find. As the dark web domains don’t appear on Google or other commercial search engines, it may be hard to enter the initial dark web , let alone navigate throughout it if you end up on it. Originally to end up on the dark web, you may have to go scouring the web for a .onion link, then boot up Tor and copy and paste it into the browser bar.

As the dark web is hidden and no real dark web search engines exist, someone changed that.

Welcome Onion.City, a new way to search the dark web with a Google-like search engine, alongside not even needing Tor to properly browse the dark web.

Developed by programmer, Virgil Griffith, OnionCity is the new way to search the dark web with a Google-type search engine. The search engine indexes the dark web just like Google, allowing users to search for their desired search terms, and OnionCity will search through its database, and return all the results it was able to gather.

The search engine is powered using Tor2web proxy, a project which enables regular Internet users to access .onion domains and allows the search engine to dig into .onion domains whilst on the Tor anonymizer network. The image below explains the concept.

Google and Onion.City
The first search is on Google, below the black line is a search on OnionCity.

As you can see, Google returns results to Wikipedia and their .org domain, while OnionCity returns addresses to .onion domains, behind its own OnionCity domain.

Griffith has essentially taken the need for the Tor browser out of the picture, but the project is far from complete. As of the time of writing this article, OnionCity has only indexed approximately 664,000 sites, according to Google’s search.

Powered by the Tor2web proxy, the software acts as a middleman for the regular web and Tor network. The only difference browsing sites with Onion.City is the results will appear with a .city suffix at the end instead of the usual .onion. The above image is a prime example, searching for a Wiki will leave you with results such as, rather then xxxx.onion.

Once you click a search result, you will be shown the .onion domain but be redirected to a .city subdomain where the contents of that webpage will exist.

As the dark web can harvest a lot of illicit material such as child pornography and black markets, to comply with United States law and Internet regulations, OnionCity has blacklisted a number of domains from appearing in their search results. Not all domains may be bad, some may just choose to not be indexed and shown commercially. Griffith has an disallowed page, where results will not be returned for sets of domains.

Griffith’s search engine is defiantly an innovation in dark web computing, but far from complete or a substitute to the Tor network. Currently OnionCity roams on an insecure http:// connection, meaning web traffic may be able to be intercepted and read. Griffith has assured those concerned that the site is working to gain a valid SSL certificate. Many have also voiced concern over the search engines use of Google to help index the entire site and dark web. Google is not fond of privacy and has been known to infringe on those rights. Griffith said he is aware the use and direct connection to Google is suboptimal, but see’s the search giants help as a “temporary-ladder just to get the ball rolling.”

Aside from concerns, Griffith’s new project can help shed light on the not so dark and deep web we have today.

Image courtesy of OnionCity.

Hackers Breach NASA Leaking Hundreds of Gigs, Crash a $222M Drone, expose Geoengineering/ Chemtrails

Hackers breach NASA network leaking hundreds of gigabytes

Anonsec hackers, a hacking collective that has been alive for the past 4 years, hacked into NASA and leaked over 276GB of internal data after trying to crash a drone worth $222.7 million right into the ocean.

The Anonsec admin Dêfãult Vírüsa released the information to Infowars Sunday, including 631 videos from aircraft and weather radars, 2,143 flight logs as well as the names, emails, and phone numbers of 2,414 NASA employees.

Anonsec published a zine (password: anonsec), or self-published paper detailing what they dubbed “OpNasaDrones,” revealing why the Anonsec group hacked NASA and the specifics behind the technical vulnerabilities they exploited to gain access to NASA’s protected systems.

“NASA has been breached more times than most people can honestly remember… However, this hack into NASA wasn’t initially focused on drones [sic]data and upper atmosphere chemical samples. In fact the original breach into NASA systems wasn’t even planned, it was caught up in a gozi virus spread,” the hackers explained to Infowars, referring to the notorious trojan virus that has infected more than one million computers to date!

Shortly after accidentally breaking into their initial system, the group began to test just how many machines they could break into and root, a term that means to take complete control of the server, similar to that of an administrator.

Anonsec said after targeting and planning their operation they began, however when they began to brute force the server it took a mere “0.32” seconds to break in due to the servers credentials being left as default. This allowed them to scope out the network even further after running a hidden packer sniffer (tcpdump) within the network.

According to the self-published paper, the hackers had various jobs scouring the network and analyzing data including “different missions, airbases and aircraft” within the breached network. Public missions including “OIB – Operation Ice Bridge” and drones such as “Global Hawk” were among the information listed.

Other members prowled deeper through the agency’s system, hacking into security cameras and even uncovered the schematics to one base’s camera layout. Other Anonsec members hacked into the networks of Glenn Research Center, Goddard Space Flight Center and Dryden Flight Research Center.

Once inside and analyzing the network, the group began uncovering various systems and network devices “popping up in scans that were not previously visible.” Again, hackers sniffed the network and gained access to the system administrator account, giving the attackers full root access once again, but this time to three additional network-attached storage (NAS) devices whose main task it was to keep backups of aircraft flight logs.

“Now we had all 3 NAS devices automatically making copies of the logs as they are uploaded from the drones and renaming them to look like semi ordinary index files,” Anonsec said, poking fun at the system administrator for their poor security.

Deep sea diving with a $222.7 million drone

After Anonsec setup an external server for NASA’s hacked network to leak information too, analysis of incoming data sparked hackers interests in what they described as “weird traffic.”

After analyzing the traffic the group concluded it consisted of “pre-planned route option” files which NASA uploads prior to any takeoff.

After protest from several group members, Anonsec said it decided to carry out a man-in-the-middle (MiTM) attack several months later that not only replaced the drones configured route, but directed it to crash right into the ocean.

“Several members were in disagreement on this because if it worked, we would be labeled terrorists for possibly crashing a $222.7 million US Drone… but we continued anyways lol,” hackers said.

A screenshot provided by the hackers shows their intended flight path, which can be seen navigating directly into the ocean. However after inserting their flight path, a drone pilot on the ground presumably noticed the aircraft’s suspicious behaviors, forcing NASA to restore manual control and re-enter the coordinates.

NASA Hacked Drone Flightpath

“This recreated flight is from our attempt to crash the GlobalHawk [sic]into the Pacific Ocean but seemed to have been taken off of the malicious pre-planned route and was controlled via SatCom [sic]by a pilot once GroundControl [sic]realized,” the hackers explained.

Soon after their drone plan was foiled the group lost complete access to NASA’s networks.

“Whether it was the high amount of traffic sending drone logs across their compromised network or the attempted crashing of a GlowbalHawk [sic]that caused them to FINALLY inspect their networks, we don’t know. But it went down for a while soon after.”

Why hackers targeted NASA

Hundreds of gigabytes worth of information has been leaked by the hackers through a series of torrents available for download.

Anonsec’s zine cites their motive behind the attack, specifically pointing to climate engineering methods such as cloud seeding and geoengineering.

“One of the main purposes of the Operation was to bring awareness to the reality of Chemtrails/CloudSeeding/Geoengineering/WeatherModification, whatever you want to call it, they all represent the same thing. NASA even has several missions dedicated to studying Aerosols [sic]and their affects on the environment and weather, so we targeted their systems,” the zine explained.

Cloud seeding is a weather modification technique that uses silver iodide to create precipitation in clouds, a tactic most famously executed by the U.S. military under “Operation Popeye” during the Vietnam war.

Gerenginnering, according to NASA’s Erik Conway, involves “injecting sulfate particles into the upper atmosphere – essentially mimicking a large volcanic eruption,” in an attempt to reflect sunlight away from the planet.

After linking to several media outlets covering these climate operations, the hackers argue that if geoengineering and weather modification “are all publicly acknowledged as real, why are Chemtrails [sic]discredited when its [sic]literally the same exact thing just with a different name.”

“We find it staggering how many people still dont [sic]believe the federal government is doing this when its [sic]already public knowledge that the CIA is funding studies, certain states and countries already have WeatherModification [sic]programs in place for the past several years, not to mention all the government whistleblowers.”

NASA: “Deny, Deny, Deny”

According to NASA the drone hijacking never occurred, nor did any breach within their network:

“Control of our global hawk aircraft was not compromised. NASA has no evidence to indicate the alleged hacked data are anything other than already publicly available data. NASA takes cybersecurity very seriously and will continue to fully investigate all of these allegations. NASA strives to make our scientific data publically available, including large data sets, which seems to be how the information in question was retrieved.”

Anonsec’s administrator has confirmed that no one involved in NASA’s breach has been apprehended by law enforcement.

“People might find this lack of security surprising but its [sic]pretty standard from our experience,” the hackers said. “Once you get past the main lines of defense, its [sic]pretty much smooth sailing propagating through a network as long as you can maintain access.”

[Photo via JD Hancock/Flickr (CC BY 2.0)]

Health Food for the Price of Fast Food: New Company Makes it Possible

Openhearted Rebellion

By Christina Sarich, Natural Society, February 7, 2016

Doug Rauch, former CEO of Trader Joe’s, has a novel idea; give people on limited incomes access to healthy, organic food. If you’ve always dreamed of shopping at Whole Foods, but decided against it so you wouldn’t have to take a second mortgage out on your home, take note of a new company called Daily Table, which is working to bring healthy foods to the masses.

View original post 344 more words