Saturday, July 15, 2017

10 Things The Government Doesn't Want You To Know

Below are some simple truths that governments around the World often don't tell us. To see the sources for each fact, click on the corresponding photos.
1. Approximately 56 BILLION animals are killed EVERY YEAR.

 2. Animal agriculture is the leading cause of SPECIES EXTINCTION.


3. Animal agriculture is responsible for more greenhouse gas emissions than the entire transportation industry COMBINED.


4. WorldWatch Institute estimated animal agriculture to be responsible for 51% of ALL greenhouse gas emissions.


5. Animal agriculture is responsible for 91% of AMAZON DEFORESTATION.


You're halfway there > https://www.plantbasednews.org/post/10-things-the-government-doesnt-want-you-to-know

Doug Casey Explains Why College Is A Waste of Money


I recently sat down again with Casey Research founder Doug Casey to discuss a troubling trend: the fast-rising cost of a college education. Read our conversation below to see why Doug says relying on - and paying for - today's educational paradigm "makes as much sense as entering a Model T Ford in the 24 Hours of Le Mans"…
Justin: Doug, I recently had an interesting conversation with my sister.
She told me that her financial advisor suggested she start setting aside $500 to $1,000 a month to pay for her son’s college education. That’s because a four-year college education is apparently going to cost between $400,000 and $500,000 18 years from now.
Her advisor clearly arrived at this figure based on how fast college tuition costs have been rising, which is about 6% per year based on my research.

But you have to wonder if the cost can keep rising at this rate. It seems to me that no one will go to college if it’s going to cost a half-million bucks.
What do you make of this trend?
Doug: Well, the first thing—my advice to your sister is to get a new financial advisor. I fear that she’s relying on a complete imbecile. She should fire him immediately, and for a number of reasons.
Number one is his assumption that the trend of higher college costs is going to continue to a totally unaffordable level. In fact, the cost/benefit ratio of going to college is already so out of whack that the whole system has to change radically. A college degree, even now, is of only marginal value; most everybody has one. And things that everybody has are devalued. You’re quite correct that colleges and universities today are dead ducks as businesses. Unless you’re going to learn a trade, like doctoring or lawyering, or you’re going for science, engineering, or math, where you need the formal discipline and where you need lab courses, it’s a total misallocation, even a waste of money to go to college today.
So I applaud the fact that all these colleges and universities are dead men walking, that they’re all going to go bankrupt. They are totally overrun and infested with cultural Marxists and progressives, militant leftists that are propagandizing kids with absolutely the wrong kind of values. It’s astonishing that parents are willing to pay even today’s prices to subject their kids to four years of indoctrination. So I’m glad that they’re all going bankrupt.
Justin: But don’t you need a college education to get ahead in life?
Doug: It’s not necessary to go to college. You’re likely to be corrupted, and indebt yourself like an indentured servant for many years to come. The question is: Do you want an education, or do you just want a piece of paper that says you logged the time in a classroom? These are two different things. Getting an education is strictly a matter of motivation and self-discipline, not paying money to sit in a classroom. If you’ve got half a brain, you realize that you want the knowledge, not the diploma, and there’s no necessary correlation between them. Nobody can “give” you an education; it’s something you must gain for yourself.
Most top universities now have their courses online. You can get an education by listening to these courses. And even when you’re driving your car, you should be playing CDs by The Teaching Company. They have the best professors in the world giving command performance lectures. And you can hear them an unlimited number of times. This is much better than listening to some also-ran drone on, while you may have cut the class, or be half asleep, or not taking good notes.
Technology has changed the whole landscape of education. Its cost is approaching zero, not the stratosphere, as your sister’s advisor seems to think. If the kids insist on going to college and indenturing themselves, as well as cluttering their minds with irrelevancies and false data, then they should only consider, say, Harvard, or very few schools like it. At least there the prestige, and qualifications for admission, are so high that the connections they make may compensate for the many downsides.
And anyway, Ray Kurzweil’s right about the Singularity, in my opinion. And he’s upped the date to when it’s going to occur to 2029, which is only 12 years from now, at which point the whole world will have changed in ways that will change the nature of life itself. So forget about saving to send your kids to college; and that goes double for your grandkids.
Justin: I thought the same thing, Doug.
You see, my sister’s advisor suggested that she and her husband set up a 529 plan, which is basically a tax-friendly way to save money for college. I asked her what would happen to the money if her son didn’t go to college. She said she could use the money to pay her for grandchildren’s college education.
But, like you said, the world is going to be very different 12 years from now. Who knows what it’s going to look like 40 or 50 years from now?
Doug: Over the next generation the world is going to change totally and unrecognizably from the way it is right now. Technological change is compounding at an exponential rate. It’s always been exponential, quite frankly. Ever since the invention of fire. But we’re now in its later stages; it’s like a Saturn rocket taking off, very slowly at first, but constantly accelerating.
It’s going to be fascinating and fantastic to watch what happens over the next 20 years. And relying on, and paying for, today’s educational paradigm makes as much sense as entering a Model T Ford in the 24 Hours of Le Mans.
Justin: I agree 100%. We’re living in very exciting times.
Anyway, thank you for taking the time to speak with me, Doug. It was a pleasure, as always.
Doug: You’re welcome.
*  *  *
Every month, Doug shares his unique insights in The Casey Report, our flagship publication. If you sign up today, you’ll get complete access to all of our archived content, including recent essays by Doug on the Greater Depression, the migrant crisis, and technology. You’ll also receive specific, actionable advice to help you protect and grow your personal financial empire. You can sign up for a risk-free trial of The Casey Report right here.

Friday, July 14, 2017

I will reward anyone that can assist me with getting rid of my property

*I'm not fond by any means of living in the states and my family is attempting to hang this condo around my neck. I've lived in 9 or 10 countries and I apologize but the states barely slides in at #10.
I don't ask for favors, I pay for tasks performed. I have over 30,000 visitors, someone must want a condo where as the backyard is on a river and 1 block across the street is the Atlantic ocean.

*If it's in a picture, it's yours. Just that simple.


View full details > http://tinyurl.com/y9yv6835




















Turn Your Android Phone into a Universal Remote Control with These Cool Apps

Looking for a few appointment setters world wide / click the script & go

The Future of Flight – 10 ways new technology will change air travel

*Has anyone grasped what I'm doing? Did you read my posts about, "Making money legally, fast and easy"? All that I'm actually doing is blogging my life experiences as they happen, questioning the events and looking for answers. Then I share that with you.


Aviation has set to work on a raft of problems it has been solving very slowly over the decades. Aircraft are still too heavy, use too much fuel, are fairly cramped and - most important of all - generate a lot of carbon. As incremental improvement wane, designers have turned to much more radical solutions and emerging technologies in the hunt for bigger changes. Here we chart the key changes that are just around the corner thanks to visuals created by Imperial College and Airport Parking and Hotels (APH). Although some of the ideas are not new they might at last be possible. 

4. The Future of Flight - Going supersonic for good


Future Travel Experience Global 2017

FTE Global 2016 took place in Las Vegas, with 613 delegates and 50 exhibitors in attendance. View our highlights video to see what makes the show unique:

Future Travel Experience Global is firmly established as the world's leading meeting place where the most progressive airlines, airports, vendors, OEMs, government agencies, destination partners and various other travel industry stakeholders come together to reveal their latest customer experience plans and visions, and collectively define the end-to-end passenger experience of the future.

At the 12th FTE Global show, we are pulling out all the stops to inspire our delegates. In addition to delivering even more insight from industry leaders, technology giants, disruptors, academia and start-ups, we are planning to shake up the show with a greater variety of formats for our education and networking efforts, which will help to keep the event fresh and engaging.


More than 750 travel industry leaders are expected to descend upon Las Vegas for FTE Global 2017, which will include 'On the Ground', 'Up in the Air', 'Terminal Design & Delivery' and the new 'Labs and Start-up Symposium’ conference tracks, as well as an inspiring exhibition. The show will also host the 7th Future Travel Experience Awards ceremony, McCarran International Airport and Technovation Centre tours, industry briefings, and an unforgettable social and networking programme.

Dual sourced > http://www.futuretravelexperience.com/fte-global/




HOW TO NAVIGATE THROUGH THE UNDERGROUND INTERNET / TOR


We live in an era of free-flowing data, where any person with an Internet connection has seemingly all the information in the world at their fingertips. Yet, while the Internet has greatly expanded the ability to share knowledge, it has also made issues of privacy more complicated, with many worrying their own personal information, including their activity on the Internet, may be observed without their permission. Not only are government agencies able to track an individual’s online movements, but so too are corporations, who have only become bolder in using that information to target users with ads. Unseen eyes are everywhere.
In this climate of data gathering and privacy concerns, a browser called Tor has become the subject of discussion and notoriety. Like many underground phenomena on the Internet, it is poorly understood, shrouded in the sort of technological mysticism that people often ascribe to things like hacking or bitcoins.
Tor is software that allows users to browse the Web anonymously. Developed by the Tor Project, a nonprofit organization that advocates for anonymity on the internet, Tor was originally called The Onion Router because it uses a technique called onion routing to conceal information about user activity. Perhaps ironically, the organization receives the bulk of its funding from the United States government, which views Tor as a tool for fostering democracy in authoritarian states.

Why the Internet isn’t secure

To understand how Tor is able to protect a user’s identity as they browse the Internet, it seems prudent to discuss exactly how the Internet works. The Internet is, at its most basic, the series of connections between computers across great distance. In the beginning, computers were isolated, unable to communicate with each other. As the tech got more advanced, engineers were able to physically link computers together, creating early networks. These networks still required the computers to be relatively near each other, however. Eventually, advances in fiber optics enabled networks to connect across continents, allowing for the Internet to be born.
Some computers house the data stored on the Internet, including web pages like Google. These computers are known as “servers.” A device used to access this information, such as a smartphone or PC, is known as a client. The transmission lines that connect clients to servers come in a variety of forms, whether fiber optic cables or wireless signals, but they are all connections.
Although clients initiate connections to get information from servers, the flow goes both ways. Data is exchanged across the Internet in packets. These packets contain information about the sender and the destination, and certain individuals and organizations can use this data to monitor who is doing certain things or accessing certain information on the Web.
It is not just the server that can see this data. Traffic analysis is big business, and many organizations, both private and governmental, can monitor the messages flowing between clients and servers. How, then, does Tor keep the user’s information secret?

How Tor has the answer

There are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user visits a website, however, their packets do not simply travel to that server. Instead, Tor creates a path through randomly assigned nodes on that the packet will follow before reaching the server.
The other important aspect of onion routing is how the packets are constructed. Normally, a packet will include the sender’s address and the destination, not unlike a letter. When using Tor, the packet is wrapped in successive layers of packets, like a nesting doll.
When the user sends the packet, the top layer tells it to go to Router A, the first stop on the circuit. When it is there, Router A takes off the first layer. The next layer tells Router A to send the packet onward to Router B. Router A does not know the ultimate destination, only that the packet came from the user and went to B. Router B peels off the next layer, seeing that the next stop is Router C. The process continues until the message reaches its destination. At each stop, the node only knows the available information: the last place the packet was, and the next place it will be. No node knows the complete path, and neither would anyone who observes the message being sent from a node.

How to get Tor

In keeping with the ideological aims of the Tor Project, Tor is free to use. Simply download and install the browser, which is a modified version of Firefox available for Windows, Mac OS X, and Linux. For mobile browsing, there is also an Android app called Orbot. Note that while the Tor browser is already configured to work properly, users on networks with firewalls or other security systems may experience difficulties. Moreover, careless Internet usage can still compromise one’s anonymity. Tor’s website has a comprehensive list of things to avoid doing while using the browser, as well as fixes for any problems that arise.

The Deep Web and Tor’s hidden services

Tor is valuable as a tool to protect the user’s privacy, but that is not its only function. The other, more infamous use for Tor is as a gateway into the Deep Web, the massive portion of the Web that is not indexed by search engines. The term “Deep Web” is thrown around in popular discourse, often in tones reserved for bogeymen. There are good reasons for this, but most of the Deep Web is fairly mundane. It is merely all the information that cannot be easily accessed through a Web search, which is a lot of data, actually.
The Internet, to use an old but apt cliche, is like the ocean. Like the surface of the world’s oceans, the surface of the Internet is mapped out, easily found via Google search. The bulk of the world’s oceans lie beneath the surface, however. The bulk of the Internet (around 80 percent) comprises pages unknown to most people, locked behind passwords and protocols.
*TOR Browser is advanced, you'll need to grasp Linux and don't trust most download sites. Just a thought.

WikiLeaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

This isn't even news anymore but, you know...

The latest revelations about the U.S. government’s powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of everyday devices can be turned to spy on their owners.
Televisions, smartphones and even anti-virus software are all vulnerable to CIA hacking, according to the WikiLeaks documents released Tuesday. The capabilities described include recording the sounds, images and the private text messages of users, even when they resort to encrypted apps to communicate.
While many of the attack technologies had been previously discussed at cybersecurity conferences, experts were startled to see evidence that the CIA had turned so many theoretical vulnerabilities into functioning attack tools against staples of modern life. These include widely used Internet routers, smartphones, and Mac and Windows computers.
In the case of a tool called “Weeping Angel” for attacking Samsung SmartTVs, WikiLeaks wrote, “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on, In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”
The CIA reportedly also has studied whether it could infect vehicle control systems for cars and trucks, which WikiLeaks alleged could be used to conduct “nearly undetectable assassinations.”
And a specialized CIA unit called the Mobile Devices Branch produced malware to control and steal information from iPhones, which according to WikiLeaks were a particular focus because of the smartphone’s popularity “among social, political diplomatic and business elites.” The agency also targeted popular phones running Google’s Android, the world’s leading mobile operating system.
Wikileaks said it redacted lists of CIA surveillance targets, though it said they included targets and machines in Latin America, Europe and the United States. The anti-secrecy group also said that by developing such intrusive technology — rather than helping tech companies patch flaws in their products — the CIA was undermining efforts to protect the cybersecurity of Americans.
“The argument that there is some terrorist using a Samsung TV somewhere — as a reason to not disclose that vulnerability to the company, when it puts thousands of Americans at risk — I fundamentally disagree with it, “ said Alex Rice, chief technology officer for Hacker One, a start-up that enlists hackers to report security gaps to companies and organizations in exchange for cash.
The trove released Tuesday, which The Washington Post could not independently verify and the CIA has declined to confirm, included 8,761 documents that were the first batch of a series of releases that WikiLeaks plans, it said.
This first group, at least, shows important differences from the 2013 revelations by the National Security Agency’s former contractor Edward Snowden. His trove of documents largely described mass surveillance of Internet-based communications systems, while the WikiLeaks release more often describes attacks on individual devices.
By targeting devices, the CIA reportedly gains access to even well-encrypted communications, on such popular apps as Signal and WhatsApp, without having to crack the encryption itself. The WikiLeaks reports acknowledged that difference by saying the CIA had found ways to “bypass,” as opposed to defeat, encryption technologies.
“The idea that the CIA and NSA can hack into devices is kind of old news,” said Johns Hopkins cryptography expert Matthew D. Green. “Anyone who thought they couldn’t was living in a fantasy world.”
Snowden’s revelations and the backlash made strong encryption a major, well-funded cause for both privacy advocates and, perhaps more importantly, technology companies that had the engineering expertise and budgets to protect data as it flowed across the world.
Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiatives, in part to protect their brands against accusations by some users that they had made it too easy for the NSA to collect information from their systems. Many websites, meanwhile, began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthened.
Encrypting apps for private messaging, such as Signal, Telegram and WhatsApp exploded in popularity, especially among users around the world who were fearful of government intrusion. In the days following the U.S. presidential election, Signal was among the most downloaded in Apple’s app store, and downloads grew by more than 300 percent.
Open Whispers Systems, which developed Signal, released a statement Tuesday, saying, “The CIA/WikiLeaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption.”

66 Ways to Protect Your Privacy Right Now

6 New Spy Technologies You Literally Can't Hide From

Featured Posts

Beautiful American Bully Pups for Sale

 

Popular Posts