We are currently witnessing the build up of the Tower of Babel in its final phase as the shadows are desperate to forge the one ring of power to control and subdue all the individuals of this planet as micro chipped slaves. I would like to explore the real intentions of the shadows and their agents and how the decentralized peer to peer ecosystem on the other hand is enabling and empowering individuals to be free hence disrupting the forging of the ring of control and deception.

One Ring to Find them by Identifying them

Anonymity has a long history dating back to the beginning of time. Anonymous writings have been found in many works such as Cave Paintings, Hieroglyphs, The Bible and Gawain and the Green Knight. In the 17th century, Benjamin Franklin used the pseudonym Silence Dogood to get his opinion published after being denied using his real name.

Under the cloak of anonymity people are more likely to express in ways that they normally would not if their true identity was exposed. One of the benefits of anonymity is that it allows people to express their views uninhibited, especially if it is an unpopular or controversial opinion.

Anonymity is the age old battle of individual freedom versus social programming. The political principles related to privacy are the same as ever from Egypt to Rome, despite changes in the means of communication. Controlling the means of communication is to control the expression itself.

During the Arab spring one of the first acts of the Arab regimes under attack was to control the means of communication and to eliminate the dissenters they could identify. The ability to identify is the first step that enables them to tag later.

In 1785, a resolution authorized the secretary of the Department of Foreign Affairs to open and inspect any mail that related to the safety and interests of the United States. In essence, the Continental Congress wanted to censor certain types of data. Among the first data to be censored were anti-Federalist letters and periodicals, which argued against ratifying the US Constitution unless it had a Bill of Rights. Thus, during the ratification debates, the anti-Federalists had great difficulty circulating material through the Federalist-controlled post office.

One of the founding father, George Washington, complained of mail tampering. James Madison, Thomas Jefferson, and James Monroe began to write to each other in codes. They encrypted their letters in order to preserve the privacy of their political discussion. Thus it enabled them to write to each other freely without any censorship.

The story continues till this day as how to negate the principles of the Bill of Rights and the Magna Carta in the digital era.

Google plus and Anonymity

Giant Goliaths such as Google and Facebook oppose online anonymity. This is because advertising is their major source of income and advertisers pay more for real identities that are connected with data that allows for real time tracking and marketing research. Moreover, these corporate are also motivated by their desire to reap the intangible benefits by aligning with centralized governments such as lobbying for most favorable legislation. Thus, most of the corporate are waging a cold war on online anonymity as it affects the bottom line of the centralized corporate.

Anonymity in short can be used as a form of identity encryption that protects against any centralized plutocratic government and centralized corporate intrusions.

One Ring to Bring them by tagging the private Communication and Transaction

If someone has access to the information about what you are communicating to whom, he also has access to the history of your transactions. He can therefore easily predict your next move.

For example say you are planning for a peaceful protest against a genetically modified seed company like monsanto. You purchased an online train ticket to travel to the city for the protest and also have interacted with the organizers via email. If anyone can tag the transaction of your train tickets and the information you have exchanged, they can either prevent you from participating in the protest or manipulate you into an entrapment.

There can be n number of case scenarios made possible using the information they track and tag about you. The only feasible solution is to encrypt the communication channel end to end and to engage in the transaction as anonymous as possible.

The flaw — if you have done nothing to hide then you have nothing to worry about

Two proverbs say it best: “Who watches the watchers?” and “Absolute power corrupts absolutely.” Cardinal Richelieu understood the value of surveillance when he famously said, “If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” Watch someone long enough, and you’ll find something to arrest or just blackmail with.

If the above statement is true then why does a government hide information and claim that the information is classified under the pretense of national security and hide the information for more than 100 years?

N Rings to Mix them

A mixing solution can be used to mix one’s funds with another’s funds. This will confuse the trail leading to the fund’s original source. However the issue with a mixing solution is that it involves third parties and anyone who is using the mixing service has to trust the mixing servers.

Shared Coin implements CoinJoin concept to protect the transactions as large as 50 bitcoins but the users have to choose Shared Coin option.

Shared Coin provides privacy for your transactions by combining your transaction with other people’s. Shared Coin uses a technique similar to CoinJoin to make your transactions private without needing to trust the Shared Coin service. Your coins never leave your control and therefore it is impossible for them to be stolen or confiscated.

Darkcoin also implements the CoinJoin concept, known as DarkSend. It engages a distributed collection of servers around its network which negotiate CoinJoin’s multiparty payments. Anyone can pay a thousand Darkcoins to set up the DarkSend servers and they are compensated with 10 percent of the new mined Darkcoins.

One Ring to Bind them in Darkness by locking into to a centralized network of machines and closed source software

What is vendor lock-in?

Vendor lock-in, also known as proprietary lock-in, is a situation in which a customer is highly dependent on a specific vendor for products and services and is unable to change the vendor without substantial switching costs. The duration of the lock is determined by the switching cost.

Microsoft software has a high level of vendor lock-in based on its extensive set of proprietary APIs. Their high degree of lock-in combined with their market share has made them subject to a number of antitrust lawsuits.

Microsoft’s application software has a lock-in feature through the use of proprietary file formats. The current version of Microsoft Office has a new format MS-OOXML to lock-in the customers.

Apple Inc. has also been well known for its lock-in practices. Since their market share has been relatively small for a long time their anti-trust exposure has been substantially less than that of Microsoft.

What is Backdoor and Asymmetric Backdoor?

Any backdoor is a symmetric backdoor which enables anyone who finds the backdoor to make use of it. The asymmetric backdoor was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology: Crypto ‘96. An asymmetric backdoor can only be used by the attacker who plants it, even though the full implementation of the backdoor becomes public. Since it is a cryptographically signed backdoor, it is computationally intractable to detect the presence of an asymmetric backdoor. This class of attacks have been termed as Keptography and they can be implemented in software, hardware or a combination of the two. Most likely NSA have inserted a asymmetric backdoor into the Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) standard.

There also exists an experimental asymmetric backdoor in RSA key generation. This OpenSSL RSA backdoor was designed by Young and Yung which utilizes a twisted pair of elliptic curves.

In January 2014, a backdoor was discovered in Samsung Android products, such as the Galaxy devices. The Samsung proprietary Android versions have a backdoor that provides remote access to the data stored on the device. It is possible to access the file system on the device through the modem as the modem is running Samsung proprietary Android OS which has the backdoor.

In late February 2014, Apple notified users of their OS of the goto fail backdoor that was caused by an error. This error voids the SSL authentication process and exposes the user to a Man in the middle attack.

In early March 2014, Red Hat notified users of the GnuTLS library of the goto cleanup backdoor. This bug voids the SSL authentication process and has exposed users since 2005 of the Red Hat, Ubuntu and Debian Linux OS to a Man in the middle attack.

Barnaby Jack, claimed to be able to hack pacemakers in order to kill patients remotely. That cost him his life. He was 36 and no cause of death has been reported. He was scheduled to speak at a Las Vegas hacker conference, where he intended to demonstrate his technique for hacking implantable medical devices in humans using the wireless and Backdoor in the device firmware.

Barnaby Jack developed a software that allowed him to remotely send an electric shock to anyone wearing a pacemaker within a 50-foot radius using a wireless frequency. He also hacked any insulin pumps that communicate wirelessly within 300 feet to variate the dose of insulin, thus forcing the patients into hypoglycemic shock.

Richard Stallman, the Gandalf

The GNU Project is a mass collaboration project, announced on 27th September 1983, by Richard Stallman at MIT. In contrast to Unix which was proprietary software, GNU is a freedom software. The project enables the user the freedom to use, share, study and modify the source code of the software. Its objective is to give users the freedom and control of their personal computers and other computing devices.

The goal of building a completely free software operating system was achieved in 1992 when the Linux kernel was released under version 2 of the GNU General Public License, which has ever since been used as GNU-Linux Operating System. GNU software enforces these freedom-rights legally through General Public License also known as GPL.

The project’s current work includes maintaining the GNU software stack. If anyone is convinced that this is the way forward and would like to contribute to GNU project you can donate Bitcoin.

BitHub is a another open source software that will automatically pay a percentage of Bitcoin funds for every commit to a GitHub repository.

What is the issue with centralized ring of power?

In conclusion the centralized ring of power violates and overrides the checks and balances of the whole system. Even if it was started based on a genuine intention such as safeguarding the interest of individuals or an ideal it ends up corrupting the whole system in the long run.

This has been, is and will be the very reason leading to the downfall of the empires and civilizations throughout the past, present and future.

May the (Open)Source be the Force

Tip This Article: 1H3GkpM4gy6w81LJ7qPBp9ivwoAVb7LrMQ

Share on Reddit and Twitter

Further Reading

Internet Control

Anonymity on the internet

Richard Stallman’s crusade for Free Software

Microsoft ooxml format

Barnaby Jack

NSA and Ontario tech firm

Bithub

Sharedcoin

Deep State