« First « Previous Comments 375 - 414 of 751 Next » Last » Search these comments
we may need to mass by the millions at our Southern border as these patriots are showing us...with our flags, our legal weapons, & protect our borders
NZ dad says 'hate crime' was an act of love
Man fined $16,000 for painting over Auckland's rainbow crossing says he would 'absolutely' do it again.
politicians who gain power by wrecking financial and social fabrics and gain revenues by wrecking currencies will run awful playbooks to maximize their perverse incentives and the worse they do, the more they get, which, in turn, makes things worse.
it’s a positive feedback loop and those only end in starvation or explosion.
so what is the solution?
the solution is to take money, commerce, savings, and investment away from not only state control but from state view. in the end, the truly operative phrase is “you cannot tax what you cannot see.”
it’s quite literally the only way to get a durable fix. ...
rulers have always sought to control currencies because control of currencies is power and wealth. ...
governments love banking because banks keep records and are easy to co-opt or bully. you bribe or threaten your way into getting them to:
1. let you see what everyone does
2. let you grab whatever anyone has without having to go rooting through the back yard trying to discern where they buried the silver ...
no currency however sound is safe if leviathan can see it.
no bank that requires licensure from the state to operate or even whose executives and bookkeepers are known to and subject to arrest or intimidation by state actors can truly be trusted and if the IRS or DEA or FBI says “gimmie dat” the bank locks your accounts and your assets are seized faster than you can say "and it's gone"...
so you’re always, in effect, choosing between forms of thieves to which you’ll be vulnerable. the whole thing is a hobson’s choice. ...
NSA, DEA, and who knows who else track BTC in real time and use public keys to find all your instances on the chain. they can say “yup, that’s actor 27B421R right there” and based on what you bought, triangulating on who you are and where in meatspace you reside from any even rudimentarily common consumption pattern is kindergarten trivial for tax, intelligence, or law enforcement agencies in modern america and it’s about to get 1,000 times worse as the new RISSA rules that just passed in truly shameful fashion come into effect.
in essence, any company that touches communications or has access to communications can be suborned and dragooned by NSA to help them spy on you. every cable guy, IT staff, internet company, store with wifi, or computer repair shop can, without warrant and under gag order that prevents them from revealing that this has occurred, be required to help spy on you.
this is the dark future snowden warned about. ...
i spoke to a good friend of mine about this. he’s deep into these matters and comes from “the community.”
his take:
“I am moving our data repos to Iceland where they will not enforce a data custody subpoena. Go long on Iceland based and owned data centers.”
he’s the opposite of a worrywart.
this is likely sound advice. ...
and to avoid this, there is only one real feature that matters: invisibility. ...
secrecy requires stealth. but how can a billion transactions a day be stealthy?
that answer is twofold: they need to mostly be “off network” and take place behind firewalls. this helps (a lot) but it still places the transactional centers as bright strobes in the data ocean and they’ll get monitored and so will all the traffic going to them and from them. that means you. and if they have your network, they have you anyway. and if they don’t have your network, this is how they will know to come and get it. and this is why we need the second half of the answer: deep, omnipresent steganography. ...
steganography is hiding messages against a background so that observers not looking for them do not notice that they are there. if cryptography is making the color of a grain of sand impossible to a viewer to discern, steganography is placing that grain of sand on a beach so a would be crypto-cracker has no idea which one to crack or, indeed, if there is any message here at all.
so how do we build this?
streams of encrypted data packets pop in normal networks. it’s like putting a flashing light on the users governments might be interested in. there are a hundred ways to sort them with data and network analysis, DPI, header analysis, and various forms of interception.
but only if you can see it.
if we want currency taken away from states, first we must take the internet. and this is going to be a helluva arms race. but i like our chances. ...
foremost, we need new structure. peer to peer mesh network structure with swarm sourced data, storage, and routing all using end to end encryption. this needs to include protocols (like IPFS) and routing, DNS, all of it. for real safety, it may well need to include layer 1 (the physical fibers and wires and wavelengths of communication) but even the creation of massive meshes of constant encrypted traffic where no outside observer can tell a cat meme from a stock transaction or a picture of your kids from the deed to your house and where senders, sendings, and pathways are all opaque gets us a lot of the way there.
this literally turns the essentially infinite resource of idiots arguing with idiots on social media into the basis to protect the privacy of the internet. (talk about an allegory for the ages)
we need a whole system that’s analysis resistant as a core design premise.
you could hide anything in that.
and THAT is how we get away.
What is to be done? Let me propose that today’s conservatives have failed in large part because, in addition to a simple lack of backbone, they have completely forgotten the basic foundations of building real political power. Before I return to that point, however, let me first outline four key attributes that I think any real right-wing strategy would need to possess in order to actually be successful today.
Such a strategy would first of all have to be anti-fragile. That means it would have to be difficult to disrupt and suppress, no matter how much its enemies tried. In fact, ideally it should even gain strength from persecution, rather than lose it. In short, it must be very hard to kill.
It must be scalable. By this I mean that it must be flexible enough to meet a wide range of possible challenges and scenarios – from draconian repression, to acute instability, to sweeping electoral victory – without the core thrust of its strategy ever needing to change.
It must be self-legitimizing. Rather than its legitimacy hinging on promises, such as on the outcomes of an election or specific legislation, it should generate loyalty and popular legitimacy from the core nature of its very existence and everyday function.
Most importantly, it must be self-reinforcing. That means its every action builds the capacity for further action on a greater scale; every exercise of power generates additional power; every success makes further successes more likely, until the accumulated facts on the ground make victory seem inevitable…
There is in my view only one strategic method that can possibly fulfill all of these requirements. That is the strategy of deliberately constructing a parallel state from the ground up.
That may sound outlandish and impossible. But actually it’s been done before, and indeed many times over in history. In fact, many of the most successful and enduring right-wing movements of our own time have used variations of this strategy to great effect. ...
The dynamic at work in all of these examples is essentially the same: Rather than working within the strictures of a state apparatus controlled by their enemies, a dissident opposition pivots to go directly back to the level of the people. It builds a network of community institutions focused not on overt political action, but on community-building itself: bringing people together and genuinely working to help them. In doing so it fosters a resilient client power-base at the grassroots level, and directly builds popular legitimacy. Eventually more and more people find themselves more likely to turn to this network for support and protection than they are to turn to the state. They then transfer their loyalty accordingly. At some point suddenly the parallel shadow-state has more legitimacy than the state. And it has masses it can mobilize. Things begin to snowball. If the ruling regime cannot smother this competitor in the cradle, its days are soon numbered.
Patriotic French girls rush into Islamic and socialist crowd with banner: "Islamists and socialists outside our borders!” How brave are these girls?
Watch Palantir's CEO spit fire at woke college students: "You are breathing the vapors of a dangerous new, fake, and self-destructive religion ... you're not welcome at my company." 🔥
Why would someone screw with the operations of an autonomous vehicle? Irrelevant. The day of attacking driverless vehicles has already arrived. It's safe to assume such cases will become commonplace.
In fact, university researchers have studied this very issue and discovered several Achilles heels for autonomous vehicles, as we'll explain...
« First « Previous Comments 375 - 414 of 751 Next » Last » Search these comments
What else?