11/9/18

the hard times

 The first stage of discovering a breach is the hardest, it is to be completely out of your ordinary... to play the role of an addict or deviant... then read the reactions on the social platforms, identify the accounts trying to leak your personal information, then pinpoint the weaknesses and determine the time at which everything started... know that this seems extremely painful for your human dignity, but it's okay, you must persevere to know, you must triumph and victory over the system is the hardest thing, but remember that you will be completely alone in this battle.

2/13/16

SM-T01

 Twitter has become a battleground

 for various political projects, where conflicting ideas and ideologies clash. 

8/9/15

SM-T02

Strategies for Gaining Full Control over Social Media Platforms like Twitter by Politicians and Military Officials


In today's digital age, social media platforms have emerged as powerful tools of communication with the potential to sway public opinion and shape political narratives. Twitter, being one of the most influential platforms, has become a battleground for politicians and military officials to drive their agendas forward. To achieve complete control over such platforms, politicians and military personnel adopt various strategies, which can be examined through the 5 Basic Objections framework.

3/5/15

Slavoj Žižek: Whither Zionism?

Source

In order to resolve the Israeli-Palestinian conflict, we should not dwell in ancient past—we should forget it.


In July 2008, the Viennese daily Die Presse published a caricature of two stocky Nazi-looking Austrians, one of them holding in his hands a newspaper and commenting to his friend: Here you can see again how a totally justified anti-Semitism is being misused for a cheap critique of Israel!”

This joke turns around the standard Zionist argument against the critics of the policies of the State of Israel: Like every other state, the State of Israel can and should be judged and eventually criticized, but the country’s critics misuse the justified critique of Israeli policy for anti-Semitic purposes.

9/18/12

gh0st

 Cell phones are powerful tracking devices that can be used by governments and corporations to monitor people's location, conversations, and surroundings, highlighting the importance of reducing tracking for personal freedom and identity protection.


Don't finance your phone through a carrier, buy it unlocked with cash to avoid giving out personal information and opening a line of credit.


Owning a phone with a private operating system, such as the pine phone or the librum 5 phone, can provide individuals with greater control over their privacy and data.


Activating a private phone and sim card should be done in a secure way, away from your home address or other cell phones, to ensure the protection of personal information.


To maintain operational security, it is important not to associate the private phone with any personal information, avoid logging into existing accounts, refrain from posting selfies or using social media, and avoid consuming the same media or streaming services that can uniquely identify you.


To ensure privacy, download media on a separate device and then transfer it to your phone, and stick to apps from the F-Droid store instead of the Google Play store.


Keeping your private phone away from non-private devices is crucial to maintain anonymity, as cellular companies can track your location even if the SIM is removed and cellular service is off on your device.


Using a free open source GNU Linux distro is recommended for rooting your phone and loading media, as it avoids potential data collection by Microsoft and ensures greater privacy.

8/3/09

Katharine Donnelly & Fugen Neziroglu, Overcoming Depersonalization Disorder

 When I'm around a group of people, it's like my brain checks out. I'm no longer there but somewhere slightly outside myself. I'm able to watch my reactions and to understand the feelings that should be there, but I suddenly feel that I don't have control over what I do. It's as if I've made a prior arrangement with my body about what it will do, as if my reactions are socially acceptable but aren't immediately coming from me. Feeling like you're not the one in control makes you feel that you're totally out ofcontrol, even if everything looks calm from the exterior.

9/20/08

the virus

 The strategies will be as follows:

• Buy yourself an American or Canadian number... because these two countries have prior security agreements regarding cybersecurity... it's not a solution, you will be hacked in all cases, but the communications companies will quickly learn about the organization's speed in accessing you. 

• Buy used devices or new ones (this depends on your financial capability)

• Set up multiple accounts to log into your phone, each account representing a specific persona. I suggest, for example: the athlete, the deviant, the addict, the musician, the poet, the painter, among other characters that you can comprehend in the future, or through your understanding of the persona and I will detail this thoroughly later.