Jump to content

Google/Apple malware


Steph

Recommended Posts

A wise man once said "I dont join up with anyone unless I know where he's going".

 

https://www.gnu.org/proprietary/malware-google.en.html

 

I have the source code for the Covid-19 Notification API "app" (well thats what its called in the folder the bulk of the source code is stored under, sorry if it doesnt quite add up with what the independent fact checkers have been saying that an API isnt an app when actually depending on what a person meant by the word app, an API is every bit an app in the same way the win32s sdk is an application albeit that there are actually several "apps" that shipped with that application in the sense of executable files that did stuff and without trying to blind people with science by splitting hairs to make the false narrative seem incontrovertable, I think anyone who called the api an "app" simply meant "software for an android or mobile phone". I think the independent fact checkers know this and they are all too aware that the software is indeed malware because if I was to do to their phone what google has done to mine and someone said my software wasnt malware, Im sure they would find some link somewhere to deem google and apples behaviour to be beyond mere border line criminality but extreme threats against fundamental human rights. Funny about how its hard to find links about removing the API from your own phone on the criminal search engine networks, yet if you go to the bits of internet that google doesn want people to see, then theres certainly ways to do more than just keep spyware on your phone in a disabled state knowing full well theres an undocumented feature which allows google to do what it likes to your phone.

 

I opted to remove the API in the same way I would opt to remove any software like that. Ive taken further measures to prevent to the fullest extent I can, google having any further ability to change my phones software. Seeing its an undocumented feature and not having the time to decompile the andorid OS and the google extentions and screen the whole thing, I cant guarantee my phone is safe and Im looking to install an alternative OS on it altogether. I regard this as serious a cybercrime when done by google or apple or by any other person or corporation in a world where we are all equals before the law and its clear that the adage about not taking justice into our own hands is only applicable to the extent that there is a society which will take justice into its hands on our behalf. At this stage I can only say that it is not in the view of google or apple or anyone who defends the installation of this malware for anyone, as equals before the law to install similar software on the devices of such people without their knowledge or consent. Their only defences against anyone behaving toward them as they and their friends have towards everyone else are 1) That they did commit a crime ... and deserve the consequences they would impose on everyone else which is not a crime when in retort but an act of self defence, or that 2) They have no intention of acting within the law in which case a state of war exists and we should consider the good possibility that they indeed look on us as an enemy, with only a pretence that they have any regard for right or wrong toward us. I hope its 1) but we can not afford for it to be nothing at all. These people must be brought to bear the consequences of their wrong doing and every time a cop is going to say something like "crime doesn't pay" I will simply laugh, "You havent arrested any of the criminals who have thrived while their victims have been swept under the carpet".

 

Who protects justice when the cops and government and the system are shown to be nothing but a bunch of fraudsters who need a television network to pretent to the world they serve any purpose to the world they operate like a protection racket over?

 

Heres how to remove the API from your phone (if its an android). I expect to be paid for doing the service the system isnt doing for providing you with this public information but I recognise criminals have stole the system and your probably all a bit skint but since Im doing the job of protecting your rights and the so called justice system is sitting with its finger up its bum wondering if better makeup will make them look like they have their finger out, then I have to submit if Im not paid for this by the time I die, then crime does pay. It pays enormously. Infiltrate the government, infiltrate its agencies. Stab your neighbours on the back and treat the people you pretend to protect like your livestock with a shallow pretence that the system you become is somehow justice because it seems to be the only way to get ahead in this world. Doing the right thing does not put enough bread on the table to feed a family.

 

Heres how to remove it:

 

1. Copy your address to your phones SIM card.

2. Copy the files you have stored on your phones internal memory card to your phones removable SDCARD.

3. Download the APK for firefox or opera from their websites or from a appstore on the WWW which isnt google play. You will need the APK itself.

4. Install the APK onto your phone. Does it work? Good. If not get another download of a browser APK that isnt chrome. Store the APK on the removable SDCARD

5. Factory reset the phone. (settings->system->reset option->Erase all data

6. The phone starts up and immediately prompts you for google credentials. Skip this or just consent to being spied on and close this post.

7. Pull down the menu, and go to settings->apps and notifactions->app preferences->go through each one and switch off every privelege.

8. Settings->apps and notifications. Go through all the apps like chrome, youtube, gmail, photo, anything thats googley in nature, disable then force stop.

9. Google play services. You may need to click the hamburger menu on the top right and go "all apps" to see google play services but you want to disable then force stop that too. This will cause lots of error messages to start appearing ... dont worry. Theres a much slower way to do this without causing error messages, so trust me, this ways easier.

10. Error messages.

 

a) intro

If you click on an error message it brings you to the app screen for google play services. Thats the wrong app screen based on the presumption you want to enable google play services which you dont. Look at the error message. The first words tell you which app actually generated the error message. Go to that app in the settings->apps and notifications list. For example, the phone app is sure to pop up and it kind of looks like the phone app now wont work because you dont have google play services but in reality what is actually happening is that certain functionality of the phone app wont work because you dont have google play services. For example, your phones address book will not be uploaded to google servers as a convenient way to lose all your contacts when you reset your phone and dont use google which is why I told you to save your address book to the sim card becaus you probably didnt realise the kinds of services google pretends to the world they think you need. Google needs shot in the head with a high powered rifle as much as you need google to fuck about with your personal life. Okay so you get it, you can still use the features of phone, messages, and basically all those apps you might want to use and you dont need google play services at all and the basic functionality of the app will still work perhaps even better without google play services (but obviously not better in the views of google.)

 

b) getting rid of the error messages

So you will get rid of the error messages straight away by going to the app mentioned at the start of the error messages, clicking on it then clicking on app notifications for it. Here you will find a list of various notifications and among them will be google play services. Just switch the toggle to off and the error message will never be seen again. Its debateable whether this counts as an actual error message or not since theres no actual erroneous thing going on. Click f-12 on your desktop browser and you will see "error messages" on most websites which are actually just warnings that only make sense to coders who may or may nor care about the information there like the zoom function deprecation facebook still uses. Its really just a warning message for geeks who might be wondering why their google play services enabled app/api didnt work as planned - ah theres a warning. I cant see many who know enough about coding to write anything catering too much for google in the aftermath of this shit. Google can bribe though so who knows.

 

c) as the first hour or so goes by

Go through each error message and select the app that generated the message and flick off google play services in the apps app notification screen. Well thats it. Except that every now and again, an error message will pop up that you hadnt switched off the notification with as you bed your new factory reset phone in. Just do the same on the occassions that happens. After an hour of using your phone, you wont get an more error messages apart from an occassional one or two that might pop up over the course of the week as you use apps you hadnt previously used. Just read the name of the app that genereated the message, go to in the apps and notifications screen of settings and switch off google play services notifications. In the rare chance of an app showing an error message that doesn have a google play services toggle in its list of notifications, just click off the general notifications as google play services is probably the only notification its geared up for. Within 5 minutes most errors are gone for good. Within an hour almost all and within a day, the chances of getting an error are slim to none. Within a week. Did you put a lottery card on?

 

So erm, theres no apps... True... except for the APK for the browser which wasnt chrome you installed to the SDCARD at step 4.

 

11) Go to browser APK through files app and click on the apk file.

12) Install from other sources - yes

13) Wait for browser to install.

14) Go to a website like apkpure.com and you will find a big list of apps you can install from AquaMail email client to Zeldas Zygomorphic Zombies shoots Pixelmen From Pluto

15) Start installing some apps. Most of your favourities will be there and apkpure is just one example of an appstore which isnt google. Theres other ways to get and install apks as well that ordinary spied on users cant do like you can visit google play, install the app onto special online appstores then download the apk they got from google onto your phone so if there are app makers who only provide through google play, you can still get these apps without having any connection between yourself and google from your phone directly.

16) What about gmail? You can still access your gmail through the browser using googles webmail. You can also set up the gmail credentials on your non-google email client. I recommend aquamail. Thunderbird isnt available on android.

17) Go to the toilet and play some Zeldas Zombies like you used to but this time, dont flush when your done. Use an old facemask to pick up the turd, place it in a pre stamped and addressed envelope for googles headquarters. Use some of the wetness from the mask to wet the seal of the envolope. Dont lick it. Seal the envelope, flush the plug, pull your kecks up and post the envelope in the post box.

18) Enjoy technology in a manner which is much safer than those sites which start by telling you how much they care about your privacy that they cloak the realities of that promsises worth in the fine details of a legal "agreement" no one in their right mind would agree to.

 

 

Link to comment
Share on other sites

It only takes ten minutes. Make that 15 because you have to spend 5 minutes reading my post which tells you how to remove the API in 10 minutes. Your link to a big pile of videos where the intricacies of installing gnu/linux rather than android/linux is barely touched on by any of the videos which will take much longer to watch than 15 minutes doesn't do my very useful post justice.

 

I'd be glad to see your own step by step guide on how you installed gnu/linux onto your android. Its a much more involved process than something you can do in 10 minutes with only an sdcard. You need a usb cable, special drivers and a copy of a touch screen ARM linux distro just to start with and theres further complications once the distro is installed. Like give me you're phone and a hundred bucks and I'll get it back to you in 48 hours with ubuntu touch installed on it. You really think people who wouldnt read those instructions above would dream of installing another OS on their own?

 

Those are (perhaps verbose and overly detailed) instructions on safely removing the google malware quickly and easily. Its not my fault they msde their malware intentionally difficult to remove.

 

Link to comment
Share on other sites

I know more than you think. I know what it is thats sticking in babylons craw. I know what drives them to make all flesh accountable to their electronic prison.

 

I'm saying ditch google from Android in 10 minutes.

 

You're saying thats too long a process, install an alternative OS instead by digging through this list of videos for nothing of value over hours of watching.

 

I'm saying the original 10 minute process is quick, effective and doesn't take geek level genius to do safely.

 

You're saying it's so big of a thing that doing anything is only scratching the surface.

 

I'm not sure you want to see anything done about it at all. Would you like to see some disgusting electronic system of intergenerational caste slavery imposed on the western world? We have developed ways to accomodate and facilitate those who desire to live in a world of slavery. My instructions are for those on the DI forum who recognise slavery and servitude are alien to our world and need some support in the matter of of a chain some criminals put on them. If its your will to wear this chain, by all means wear it, voluntarily, but if its your intent to sap the will to be in liberty of others, then in that intent, you are at one with the enslaver and you are not of our world. Rather than be a ruler over those who are free, you will be beneath our feet trying to form a hierchy of slaves where only the most ruthless will have any degree of liberty at all and we will choose who we will from that hell to share in the freedom we never surrendered thinking we could be any greater than mere equals enslaving none and accepting slavery from no one.

 

So what is you're will?

 

Please express it in a way that explains the momentum of the direction you were taking my thread about a ten minute solution to block google malware.

 

Im not unaware there are some shadowy cheats online deliberating this surveillance apparatus on others acting like they are commiting no wrongroing at all. My new Buttslut detection app cant detect all perpetrators, but it can certainly detect their dupes who cant protect their own human rights let alone anyone elses. The perpetrators of Covid 19 API have no legal defence against it which does not declare their original API a crime that my API provides a mechanism for self-defence against.

 

How do you feel about assisting in defending people against slavery by helping in the production of this software if you know enough about computers as you seem to portray?

 

Whats your real will?

 

 

 

 

Link to comment
Share on other sites

"API" = Application Programming Interface

 

It is an interface used by softwares to define interactions that can be carried out via calls and requests.

 

Basically it allows different softwares to transfer information between each other.

 

On its own, an API doesn't do anything by itself.

 

For example we use software at work that makes API calls to eBay, Amazon and other channels in order to update inventory levels. We also have a system that uses API calls to collect order information and pass them directly to our supplier's system to place orders.

 

An API isn't an 'app'. Apps will make use of APIs in order to communicate data.

Link to comment
Share on other sites

2 hours ago, Grumpy Owl said:

"API" = Application Programming Interface

 

It is an interface used by softwares to define interactions that can be carried out via calls and requests.

 

Basically it allows different softwares to transfer information between each other.

 

On its own, an API doesn't do anything by itself.

 

For example we use software at work that makes API calls to eBay, Amazon and other channels in order to update inventory levels. We also have a system that uses API calls to collect order information and pass them directly to our supplier's system to place orders.

 

An API isn't an 'app'. Apps will make use of APIs in order to communicate data.

This is false news recently created by independent fact checkers to conceal the fact that the 'application programming interface' contains several 'applications' each of which is software which involves tracking people, not just online but in their physical lives not much different from tattoos on a concentration camp inmate.

 

The fact that the installed instance of, say an android apk, is referred to colloquially as one use of the word 'app' is irrelevant since the complaint is that spyware has been installed on peoples phones without their knowledge and in disregard of their consent. That amongst these complaints, there may be people who have called the software a 'malware app' serves only to highlight that the perpetrators and apologists for a crime against humanity find a spelling mistake more worthy of attention than the covert installation and subsequent obfuscation of the quality of the act itself.

 

In the source code for the installed malware, the API itself is inside a folder called 'app'. I heartily concur that this 'app' is not an installed instance of an apk since were it so, then the installed malware 'app' which is an 'api' containing many 'apps' would be far easier to remove than the way this malware has been installed. The fact it is not an 'app' as in apk installation is further to the point that seems to escape the attention of those unfit to protect the law if as an equal before the law, even I can install similar malware on anyones phones and expect to escape prosecution and have my 'wrong' to install malware on peoples phones protected by the rule of law the same as google or apple.

 

I have removed google from my android/linux phone and I did in 10 minutes. The instructions for safely doing so are censored by google/bing/yahoo but I provide them here for free, something I charge to googles account on top of the damage theyve did to my phone I've had to repair without their help. If anyone doesnt see this as a cybercrime committed by google against myself and many others, then leave your covid api in the enabled state so my api can identify you (when equally installed on your phone without your knowledge or consent and quite lawfully so given your stance of not opposing this same act committed against me and others who have a right to act in self defence against the complicit.) Can you logic that? Take it to the court and I'll use your defence against me as my defence against google and if its clearly established in law that there is no equality but a system of slavery. Well surely that will be the clarion call the enslavers must dread!

 

So fuck your system! It's run by the criminals for the criminals! The just owe it nothing but to recount its infamy.

 

Could never happen here! Just did!

 

1024px-Tatuerat_fångnummer.jpg

Link to comment
Share on other sites

It isn't the SOFTWARE that is spying on you. It is the HARDWARE CHIPS in your phone, tablet, PC and so forth.

 

The CPU, GPU, RAM, Modem Chip and other chips have smaller Microprocessors inside them.

 

This tiny Microprocessor runs closed source software that you CANNOT GET AT - the OS can't see it, AntiVirus cannot see it, and nothing can scan it.

 

Even if you WIPE EVERYTHING FROM THE DEVICE, that UNREACHABLE SOFTWARE INSIDE THE HARDWARE CHIPS CAN SPY ON YOU.

 

All they have to do is send a signal to your phone - e.g. 0101010101010101011011101001001101 - and the HARDWARE STARTS SPYING.

 

Android, Apple phones et cetera are NOT SECURE NO MATTER WHAT SOFTWARE YOU RUN ON THEM.

 

They are literally designed - AT HARDWARE LEVEL - to be IMPOSSIBLE TO SECURE/CLOSE OFF.

 

They don't need to INSTALL SPYWARE ON YOUR PHONE - YOU PHONE ALREADY HAS THAT BUILT DIRECTLY INTO ITS HARDWARE.

 

 

 

 

 

Link to comment
Share on other sites

13 hours ago, HistoryIsComplex said:

It isn't the SOFTWARE that is spying on you. It is the HARDWARE CHIPS in your phone, tablet, PC and so forth.

 

The CPU, GPU, RAM, Modem Chip and other chips have smaller Microprocessors inside them.

 

This tiny Microprocessor runs closed source software that you CANNOT GET AT - the OS can't see it, AntiVirus cannot see it, and nothing can scan it.

 

Even if you WIPE EVERYTHING FROM THE DEVICE, that UNREACHABLE SOFTWARE INSIDE THE HARDWARE CHIPS CAN SPY ON YOU.

 

All they have to do is send a signal to your phone - e.g. 0101010101010101011011101001001101 - and the HARDWARE STARTS SPYING.

 

Android, Apple phones et cetera are NOT SECURE NO MATTER WHAT SOFTWARE YOU RUN ON THEM.

 

They are literally designed - AT HARDWARE LEVEL - to be IMPOSSIBLE TO SECURE/CLOSE OFF.

 

They don't need to INSTALL SPYWARE ON YOUR PHONE - YOU PHONE ALREADY HAS THAT BUILT DIRECTLY INTO ITS HARDWARE.

 

 

 

 

 

If it cant be seen, can't be scanned, cant be altered and doesnt appear in the documentation for the chips ... how did you find out its there? Tell me if you know anything about the difference between network tracking in a 2G network and network tracking in a 3G network by producing one paper you've read demonstrating you have at least that level of expertise to be recommending that people accept defeat of their Article 12 rights while owning a mobil phone. You sound like one of those googlebots assuring the world that malware isnt malware when google installs malware and all contrary opinion is conspiracy theory and for the sake of those not impressed by propaganda calling all contrary opinion of theory, theres a turdfest of pseudo-scientific nonsense to convince the unconvinced its that its impossible to remove the malware, undesireable to remove the malware, any tripe at all to convince the public that those who want malware on other peoples phones only want to serve them ... with a side order of gravy to those they would please as their masters and its not the people they are fucking out their human rights.

 

Its beyond the scope of this post to discuss the evasion of other Article 12 violations on this post, all of which can be solved by not having your phone on. Perhaps you could start a post of your own relating how you know about this magic phone firmware and since they are manmade machines, how a man might go about repairing their machines so they are no longer capable for use as instruments by which users can have their rights injured.

 

I dont think you know anything at all about computer systems. I think you just made the last comment up and it has the effect of other comments in this subject area in discouraging people from removing the API. I didnt need to see the source code to know the API did stuff in disregard of whether it was enabled or disabled. Reason and basic observation of the phones behaviour was enough, I didn't need the insight into human nature to recognise the motivations of those speaking falsehoods protected by well funded independed fact checkers splitting hairs over what an API is when its obvious those who called the malicious Article 12 violating software an "app" were merely referring the folder the API source code was installed in because unlike the IFC, they checked the facts and the fact remains, Nazis have visibly taken advantage of the situation to violate human rights.

 

You'll be wanting to split hairs about what a nazi is maybe? The national socialist party was dissolved decades ago but the word colloquially stands for people violating fundamental human rights, regardless of race or religion, gender or any distinction whatsoever other than the distinction that they need to violate fundamental moral principals to have any sway in the world. In a word they are the bullies of the adult world and things get a bit more sophisticated in the adult world especially when there are bullies to bully the bullies and messengers to deliver keys to those they have in chains.

 

Now if your in chains, dont be dismissing my key. If your with those who broke my phone and tried to tell me it wasnt broke when it started functioning in ways I dont desire my phone to function. The debt of your organisation to me now stands at 24 kilograms of 24 caret gold. I'll take legal tender in payment for this but it will be worth what its worth at the time its paid and will incur a transaction fee. My rights remain my rights and those who infringe them are jointly and severally liable and should seek the protection of a court which may provide them with a trial which will hold me back from visiying justice on the rights of those who infringe mine.

 

Eye for eye and tooth for tooth since those who treat others in ways they themself would not be treated are not operating within the law!

Link to comment
Share on other sites

Google 'intel management engine privacy'.

 

There is your answer. Its on the internet.

 

This is not even new.

 

AMD puts the exact same thing in their PC processors.

 

Many IT professionals believe that these 'management chips' are hardware backdoors that make it practically impossible to secure a PC completely.

 

What makes you think that ARM doesn't do it in their smartphone processors?

 

What makes you think that ARM also doesn't put a 'management CPU' inside their phone SOCs?

 

Their excuse is that 'modern CPUs are so complex, there needs to be a smaller microprocessor running its own OS and software inside it to manage the big CPU'.

 

What would happen to CPU manufacturers if they were found out?

 

Nothing more than a measly fine to pay.

 

Intel and AMD don't give a hoot about your privacy.

 

Do you really think ARM or Apple care more?

 

A software solution may protect you from casual phone hacking.

 

Governments probably use the hardware backdoor if the software one is wiped.

 

Welcome to the 21st Century...

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  • Like 1
Link to comment
Share on other sites

I already know the highest echelons of "the government" can track me. I'm no stranger to black helicopters before all this mobile phone shit rolled out. If they meant me harm, Id be dead but the ... erm... the democracy ... I dont want by boss or my landlord or the neighbour down the street who fancies getting dirty with my wife or kids when Im not around having some deal with the google corporation to know my whereabouts.

 

I used to own a dog and sometimes it would go exploring and I couldnt find it for hours. The thought occurred to me that a tracking device that they used on criminals who could get out of jail early would be useful but I balanced my own wants with the wants of the dog and figured an occassional hour or two of inconvenience so my dog could just enjoy being a dog every now and then didnt constitute me with the right to tag it. Its not even livestock but a kind of friend.

 

I wonder if the advocates of surveillance state utopia can know how ugly they look in my eyes. Thats human beings theyve done that to and without a single charge or conviction of any "action or inaction which causes or is likely to cause harm to members or a member of the public". It's funny how the meaning of the word crime is so bent and twisted by those who at once appear as bothe experts and idiots at the same time. Experts on the legal system but the meaning of the word sovereignty within which a legal system functions. The legal system cant afford to be anything but idiots here because the sovereignty is tied up and gagged by a system where only outright free speech they now censor and outright enslavement of the people weild any power.

 

The criminals arent close to being cracked. They are a congealed mass inventing fresh rules daily, calling their commands for slaves nothing less than law but wheres the justice? Wheres the equality? You see when all their lies are said and all their foul deeds are done ... it doesn't work like that! It never did. It never will. Its a boot stamping on a human face forever.

 

You see when I look at them, I don't think "what does this government official have to say" or "what does this mainstream media celebrity have to say". I think, "What kind of shit is this conspirator going to try and sell me now?" Their words are an irrelevance. Any power they have acquired flows directly from the barrel of state sponsored human rights violations and I've did my bit attempting to point this out to them but frankly, why even bother putting your hand into a vipers pit? It is what it is and if the conspirators want to take part in the conversations amongst the people they thought themself fit to rule over, then they can begin their journey towards our internet at the river of fire and ash where all their ill gotten gains will be burnt to crisp since no laden camels will fit through the needle they cant pass through.

 

They're all running around the TOR network trying to find exit nodes they dont know about with a whole maze of SSL codes to crack and not enough time on the big computers to do the cracking. As the heroes of the great war to take away our liberty seek to uncover all the secrets that the dark net does not give up too easily, I have only one bit of advice to the people sent into that labrynth looking for supposed criminals not giving up their liberties too easy.

 

"Mind the doors!"

 

This phrase does not quite have the same ring to it as it might have were it shouted loudly at the entrance of the examination hall on Classical Studies where I'm sure the man playing master of ceremonies at the door opening ceremony distinctly says "Minotaurs!" Maybe its just me. Sometimes I see things that other people say aren't there. You know, reptillians, fairies, goblins, angels, witches, dead people who aren't quite dead. They think I'm crazy you know but honestly I'm not crazy. They're crazy because if they ever see what I see, they'll become unstable and change their mind again like they did after that whole episode of condemning surveillance states in Eastern Bloc countries. They go through little phases then they believe the opposite of what they used to believe in then the believe something else and with this whole constantly altering mind set, they have the audicity to call cannabis a mind altering substance. I have never smoked a bong and called for everyone in the country to be made to wear a track n trace number on their head or in their hand. Thats beastly. No I'm not crazy at all. The various fairies and goblins and witches will still be around long after they've had their minds altered again. Im not crazy.

 

Im incurably mad.

 

As for the evidenceless based reports you can bear witness to in this very thread telling you that theres no point in even trying to erase the google malware from your linux phone (android is linux). Read the GPL2.0. Tells you right there. That phone is supposed to operate according to the user's specification, not according to the specification set by google, set by android, set by the government, set by evidenceless based report makers telling you that the phone should operate according to any other specification than that set by the user.

 

You could of course go out and buy what they are calling "drug dealer phones". You only need to be a human being, protecting the rights proclaimed to be yours under Article 12 of the Universal Declaration to want to have a "drug dealer phone" but you dont need one. You have a linux phone. You wont get much advantage from the fact that the Linux system is open source because its screeds of computer instructions that would take a computer scientist a bit of time to make sense of but you do have the advantage that nothing using linux can prevent you from altering the overall system that linux is a part of.

 

These people are caught out well by suggesting their favourite tyrannical dictatorship corporation has some rights it couldnt possibly have and they want you walking about as their tattooed slaves. That should alarm you. This is just corporate executives sitting in the finely carpeted suites of Alphabet Headquarters, but people online, people you meet on the streets. People who have zero problems with trying to convince you to just surrender your basic and essential human liberties. Note that, those who have managed to not surrender theirs are in a far better position than those who now denegrate their own by denegrating yours.

 

That electronic labrynth is designed for those who hate our freedom and they want to drag you into that pit with them. Now you know as I do that racism is wrong, so dont be overwhelmed by the pictures on your TV about who the terrorists are. Its not defined by race or creed or colour or gender or any distinction whatsoever other than the fact they use terrorism as means of getting ahead in the world. Who are the people who hate our freedom?

 

Open your eyes. If we are all equal before the law. Checkmate. We have the bastards right where we want them. Come and get your experimental vaccine if you think its the other people who are selfish. Strange cliff edge is this thing and it doesn't even appear on google maps. Isnt that strange? A program is only as good as its programmer, but the programmer ... well thats a highly intelligent piece of equipment and the most intelligent of all, dont do google.

 

The most prolific software suite out there for compiling computer programs is GNU. Most people are using Apple or windows on their desktop and gnu/linux systems are only a partial share of the operating systems that people are using. You can get the microsoft studio suite and I suppose apple has their own suite at a high price on those systems. You can also get the GNU suite to work very effectively on all three systems without employing emulators and its not only free as in libre as in anti-exploitation, its free as in doesn't cost a bean. You think the bulk of people who can write software would choose to write in C#.net when they can write the same program using standard non-proprietory C++ supported by the GNU C compiler, mingw and a raft of other compilers which can build across all platforms and not just windows?

 

Apple's version of the Linux kernel is the BSD kernel. The BSD kernel has a slightly different approach to software than Linux. I dont know if it insists that iPhone users have a right to alter their devices software as they see fit or whether if it does not that Apple insists they have greater ownership over the phone than its users. I know that you can use BSD to do all kinds of funny things with the phone networks by altering the radio frequencies the modem chips operate at and maybe telling the network to go fuck itself someday once wifi internetworking makes our need for centralised ISP's redundant. Seems to me that Apple users would be the ideal bomb to use since this kind of network interference and the installation of software onto peoples phones seems to be getting taken to be completely within the law according to everything thats not being said by the people who ought to be saying something. I always thought that kind of behaviour was a bit like bank robbery. Something I could do if I wanted but even though there wasnt any specific rules and regulations on the pioneer front, theres still some kind of thing I call "law" which is more to do with morality and knowing right from wrong that guides my compass. This kind of "law" seems to be some conspiracy theory I've concocted in my fantasy realm of fairys and witches and megacorporation exploitation which as everyone knows "could never happen here". So much for the law right?

 

Interesting that whole political takeover by the European Union happening in the year 1993 putting paid to any legitimacy of anything that their system calls the law. I never heard of Aleister Crowley at the time so maybe he's a time travelling madman or maybe this happens every century I dont know. But if law means justice and morality and righteousness and honesty, seeing everything Ive seen about everything that they call law ...

 

93 is the whole of the law.

 

Love is the law!

Love under will!

 

Now suck my cock or I'll beat you to a pulp and call you a witch and do it because you love me!

 

Very wise man. Maybe he knew what happenned in the past before it came to be. Maybe they just make up history and the truth was that there was an internet in 1920 and it was deletely from history in the same way opposition to surveillance states in the Eastern Bloc must seem unbelievable to people growing up in this strange utopia. Dont mind me. I admit this is just a theory but as for the idea that there are people trying to turn this country into a surveillance state. I am ironically delighted to finally inform you that this theory that has been doing the rounds online for at least a decade has been proven to be without a shadow of a doubt, not a theory but a proven fact.

 

The silence of those who deride the truthers with accusations of "conspiracy theory" tells you everything you need to know about them. In silence they operated against us in the shadows, now their work has come to light, to know whos who, you simply have to investigate the topic of conspiracy theory. Now remember these words my comrades, who recall a day when as allies we fought together for the SCAEF! Thunder was flash and lighting was thunder and we had ways of knowing who was who on battlefields less complex than the one our rights are again threatened by. Do you know what I'm talking about? They came in 28 motherships...

 

Can you see what I see?

Link to comment
Share on other sites

Lvfeier security pouch Anti tracking Anti spying

 

If you really can't live without your personal tracker it may be worth investing in one of these signal blocking pouches. I've had one a few years as I was concerned about EMF radiation from my phone being in my pocket right next to my ball sacks all day at work.

I've actually tested the pouch right underneath a local phone mast and it works great. I took two phones (top of the range phones aswell) out with me. stood underneath the mast (i believe it's a 4G mast) and dialled the number of the phone in the pouch. the call cannot be connected.

This is crucial if you go to one of these protests. The ptb scan the airways with imsi catchers, they'll have your name email face everything. In the old days you could take out the battery. These days the battery is non removable I wonder why?

I watched waykiwayki full throttle vids and they recommended changing settings from 4g back down to 3g.

Link to comment
Share on other sites

The gchq tracking could be done on 1g. 2g tracking capability was the same. 3g allowed a more automated style of both 2g and 3g phones connected through 3g networks. Im not sure 4g offers any better tracking capabilities than 3g offers since advanced tracking happens through ip/tcp/ssl/tls over 3g anyway. Bluetooth 3.5+ offers a low power mode where the bt radio appears off until its woken up by another btradio. This is being used to track not just wthe routes people travelled on but who they came into contact with. 6g networks will likely having this functionality built in if 5g doesnt already.

 

I may be in possession of the last phone I can afford. I certainly cant afford a television. Its not that I have anything to hide but I know my civic duty giving human cattle farmers no quarter because they have an awful lot to hide.

  • Like 1
Link to comment
Share on other sites

  • 5 months later...

You do realise that Google has a backdoor to your phone anyway if it's an android? Several of their services require permissions to view your content....

Besides: with quantum computing and 5g the security on a phone can be brute forced rather quickly, on the fly anyway.

 

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...