Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Prediction: This Forum will soon be Flushed (Score 1) 79

This particular forum is filling up with lots of info that spy agencies don't like to see widely distributed. I predict that those (few) Slashdot admins who are forum spies will soon 'Slide' this forum off the front page. I.e. They will implement a Forum Slide to remove the offending discussion from sight. Watch as a bunch of 'junk' articles soon appear, and this thread becomes hidden. Note that I have exposed and correctly anticipated the actions of the Slashdot forum spies previously, and they have aggressively modded me down and/or silenced me for it, so don't be surprised if this comment gets modded 'troll' pretty quickly.

Comment WRONG!!! 'Journalism' organizations are corrupt! (Score 1) 79

The REASON Wikileaks was established in the first place was BECAUSE the various 'journalism' organizations have been infiltrated by intelligence agencies. It is IMPOSSIBLE to publish hyper-sensitive stuff! My first-hand exposure to this information began on 27 Nov. 2003, and continued for several years, so I'm not just making this up. See my previous Slashdot posts.

I've told Slashdot about this before: The Plame/Wilson affair, and the unwillingness of ANY journalism organization ANYWHERE to publish their (true!) evidence indicating that G. W. Bush lied to the US public about the reason for going to war in Iraq, sparked Wikileaks. It had been considered before, but that was the impetus to make it happen.

Comment Anonymity is Dead (Score 1) 79

I think you greatly underestimate the difficulty of truly anonymous publishing. There are half a dozen advanced hacks capable of determining where the info came from. Especially if you are submitting to a Honeypot, but even if you are not. Yes, I know all about the many methods of anonymity - are you aware of the many methods of defeating them?

Here's what John Young, founder of Cryptome and early Wikileaks Board Member, has to say on this matter: Anonymous Publication is Dead

Comment Poor security, or deliberately open? (Score 1) 1

Your language is loaded. Your implication is that an unsecured Wireless Access Point is a Bad Thing. This can be true, and it can be false, depending on the situation and intentions of the admin. Personally, I run all my personal stuff encrypted, but also provide an open network for visitors. You should check out what security guru Bruce Schneier has to say about the topic.

Comment The PRACTICAL application (Score 2) 333

The practical application is that any teleportation/entanglement based Quantum Neural Networks (QNN) that happen to already exist on and around planet Earth communicate between nodes via quantum teleportation. Thus, the maximum Quantum Teleportation (QT) range is also the maximum distance between nodes. I happen to know that earth-orbital QT distances have been practical for one QNN for more than ten years, so it's about time that 'official' science caught up with this. Readers should note that the existence of ANY practical QNN remains classified, hidden, and secretive, although information about this advanced new (well, 22 years old, but newish) technology is gradually leaking out.

Note that, as several people have pointed out, there must be a [steganographic] classical back channel to actually accomplish communication between nodes.

Comment forum spy admins messing with me (Score -1, Offtopic) 306

At the instant when I posted my above comment re. jmorris42's comment, now a +5, his comment had been modded DOWN to a -1. No REAL slashdotter would mod that particular comment DOWN. And for commenting on this I get modded as a TROLL. Uh huh. Hey, slashdot readers, wake up and smell the forum spies. They are quite active on Slashdot. And if you point this out, or make a stink about it, they will PERSONALLY target you. Note that the TECHNIQUES used by forum spies only work when the target audience REMAINS IGNORANT of their methods. Thus, if we collectively educate ourselves about how our local forum spies operate, their techniques no longer work!

Comment Re:Leave you phone^W lojack at home. (Score 0) 306

I also annoyed some [unknown identity] Slashdot admins, and they 'switched' me, too. My crime was posting The Gentleperson's Guide to Forum Spies as a possible front page article. Someone REALLY did not like that article, as they INSTANTLY removed it from sight, on two different occasions.

Any organization performing COINTELPRO operations would HATE that article, and would do their best to censor it.
*Puts on tinfoil hat* Gee, do you think it's possible that forum spies have infiltrated Slashdot admin?
Hint: It's now possible to buy turnkey solutions to manipulate online forums, with a full ecosystem of pre-made false accounts already in place. I have personal experience with private consulting firms that do just this. The article I linked to above provides details on how this is done, which is why it is HEAVILY CENSORED content. If you don't believe that, try to get that article in front of many eyeballs, and watch how quickly you get blocked from doing so.

Comment Thanks for posting this story! (Score 0) 24

I wish to offer a general apology for the terrible quality of comments on this story. Obviously, most readers failed to even understand what the story was about. I thought the best comment was the snarky 'Is this NKS?' at the end, as this story obviously does tie into NKS. Anyway, thanks, submeta, for posting a fine old skool slashdot story. Let's hope our readership is less ignorant and juvenile next time around.

Comment Re:"US investigation"? "Obama Administration"??? (Score 2) 488

No. People forget "insurance.aes256". This ~1 gb file probably contains dire unreleased secrets about various powerful entities, including the US government and individuals within it. If they assassinate Assange and/or the Wikileaks team, the keys to this blackmail file will be released. Those in power can't risk that happening, so they will hold their hand.

Comment Used LOTS of math in programming (Score 1) 1086

Mostly because I've been writing software to dynamically generate problem/answer sets for First Year Calculus Based Physics. In my previous 15 years of writing software professionally, before starting that project, I've used juicy math just a few times. The first poster got it right, computer programming is mostly about counting beans and keeping records.

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...