The Truth About Schools

vigilantcanuck:

You Don’t Go To School To Educate And Enlighten Yourself (If That’s What Your Thinking). It’s All About Crafting Good Little Workers Who Won’t Be So Bothersome To The Extreme Upper Classes Of Society. It’s An Effective Means Of Neutering An Individual’s Creativity And Intelligence So That We’re Easier To Control. Which Is Why The State Heavily Invests In Public Education And To A Lesser Extent Post Secondary Education.

Originally posted on Nutrition, Philosophy, Freedom:

Stefan Molyneux just put out a new video on school.  In close to 45 minutes he covers the history of government schooling, going back hundreds of years.  Very interesting to see the roots of it all and why it was started.  It goes well beyond the Prussians and their plans for obedient workers and soldiers.  Have a watch down below.  Well worth it.

Also, a great time to repost an article I wrote about six months ago called The Absurdity of Public Education.  I did my best to dismantle the supposed benefits and the glorification of government schools.

And here is a recent interview by Brett of the School Sucks Project – where he talks to Dr. Jody Underwood on the current problems with public schools.  Its a great conversation. And as always I’d recommend anything on the School Sucks website.  If the name implies its just for…

View original 192 more words

Highly Spiritual And Not Religious

morality

It’s Time That I Share Something With Regards To My Personal Beliefs. First Of All Spirituality To Me Has Been More Enlightening And Uplifting Than Religion Ever Will Be. The Issue That I Have With Religion Is The Amount Of Control It Has Over An Individual. Similar To How The State Has Control Over The Governing Of An Individual. Religion And The State Are Two Different Entities But Share A Similar Goal. Which Is To Dominate And Control Every Aspect Of The Individual Either By Force, Coercion Or Direct Intervention.

orwell

Religions Historically Have Marketed Themselves As The One And Only Solution To Get Closer To Divine Spirit Known As God. Well As It Turns Out You Never Actually Feel That Divine Power Nor Do You Ever Get The Opportunity To Do So. Instead You End Up Giving Away Your Power And Liberty To Entities You Know Nothing About. So What Is God Exactly? An All Powerful And Knowing Being That Knows Better Than To Tell You How To Behave And Evolve Spiritually. To Me It Sounds Like A Perfectly Crafted System Designed Solely To Keep Individuals From Achieving Total Enlightenment On Their Own. Which Is A Form Of Thought Control In A Lot Of Ways. Just Like How The State Tells How To Think And Feel With Their System Of Political Correctness

Parallels in Totalitarianism and Thought Control

When Comparing Religion To The State, Just Remember That Both Entities Seek Total Domination And Control. Meaning The Amount Of Mind Control To Do That Requires A Population Of Unintelligent And Unquestionable People Who Are Willing To Believe Just About Anything. One, Is The Bureaucratic Control Of Information Which Limits The Consciousness Of An Individual, This Is Usually Achieved Via A Fascist Or Totalitarian State. Two, Religious Control Is Known To Censor Information From It’s Devout Followers In Order To Control Their Subconscious Thought Processes. Below Is A Link To A Research Document (BB) That Shows Parallels Between George Orwell’s 1984 And Religious Devotion.

BB

__________________________________________________________________________

Islam Is Not Religion As It Is More Of A Totalitarian State, It Has It’s Own Governing Laws, Police Forces, Militia’s And A Brutal Judicial System.

Follow Reason – Not People, Movements, and Parties

Originally posted on Nutrition, Philosophy, Freedom:

14c980972e78d132e59448bd7af2de6b

Seeking Truth – Facing Ourselves

We can find our ideas from many sources; religion, the media, schools, governments, eastern philosophies, western philosophies, and so on.  What “sticks” is a little different for each person.  We are exposed to information every day.  We all have different backgrounds.  We all have access to different data.  We have predispositions based on how we were raised, or what our parents repeated when we were children.  And we can seek out fresh ideas and judge for ourselves what is right and correct and what isn’t.  From many different sources we develop a philosophy to live by.  We all have one, whether we know it or not.  This article will mainly concern the philosophy of Ayn Rand.  But we will also discuss the general ideas of learning new things, challenging ourselves, and developing a good system of thinking to thrive and enjoy our lives.

Ayn Rand…

View original 10,584 more words

VPNs: Which Ones Value Your Privacy?

vigilantcanuck:

Proxy.sh Is On The List For Being A Reliable VPN Provider

Originally posted on Privacy Blog:

Torrentfreak has published its annual survey of privacy-oriented VPN services, digging into each one’s technical, legal and business practices to see how seriously they take the business of protecting your privacy. The survey results may be seen (in great detail!) at http://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228.

I was pleased to see Private Internet Access rated highly. It is the VPN I use and I wrote about it earlier at http://goo.gl/xedsMY.

View original

Pay As You Go VPN Service

proxysh

Recently I Gave This VPN Provider A Spin To See How Stacks Up. First Of All It’s A Very User Friendly Company With Plenty Of Support If You Need It. Secondly The Prices Are Very Reasonable Costing You Anywhere From Two To Fifteen Dollars American Per Month With Plenty Of Payment Options Available. They Take All Major Cards (Visa, Mastercard), PayPal, PaySafe, WebMoney To Bitcoin Transfers And SMS And Fixed Tax Phone Call Options. Their Payment Plans Are Very Flexible So You Have The Option Of Paying For Just Three Days Of Access Up To Dedicated Servers With Full Support. Some Other Features Worth Mentioning: Non-Logging Chat Services (XMPP And Cryptocat), Their Own DNS Servers (Which Is A Good Option For Bypassing Regional Content Blocking), A SOCKS5 Proxy, An Anonymous Pastebin Clone And A Tor Exit Node.

Front End Software

Connecting To Proxy.sh Servers Can Be Done A Number Of Different Ways. Some Options Are Easier To Use Than Others. The Easiest Option To Connect To There Servers Is A Program Called Safejumper. Which Is Available For All Major Operating Systems Including Linux. Other Front End Program Also Include OpenVPN, Tunnelblick And Viscosity.

Privacy

‘Zero-Knowledge’ Privacy Means The Server Is Never Capable Of Viewing Plain Text Data; Therefore, The Data May Never Be Compromised Through Mismanagement, Prying Eyes, Or External Bodies Looking To Gain Access.

Zero Knowledge Privacy

Proxy.sh States That It Doesn’t Log User Activity Across Their Servers. However If Your Going To Be An Asshole And Use Their Services For Nefarious Criminal Purposes, Expect No Privacy Or Access To Services Even If You’ve Paid For It. Because To Them Bad Apples Will Ruin The Bunch And There Are Claims To Back Up That Policy.

Also They Say That They Bring Their Own Kernel To Each Deployed Server And That All Server Applications Run From The Random Access Memory, Which Is Erased Upon Every Power On Cycle.

There Are Also Other Functions That Exist To Safeguard The Privacy Of It’s Users, Which Is Transparency Reports. Which Identify Any Copyright Infringement Activity That Has Occurred On Their Services. In Which Case They Just Block Ports, Rather Than Hunting Down Individual Users Who Use Proxy.sh To Download Copyrighted Protected Content. Blocking Ports Just Means It’s Harder To Access Their Servers Shortly After One Or More Port Has Been Deleted From Service. It’s A Form Of Collective Punishment. But Instead It Affects Everyone And Not One Individual In Particular.

Speed

Some Reviews Of Proxy.sh Are Variable Some Peg The Speed To Be In A Range Of About 10-30 Mbps Sometimes It’s Peaks At 45 Mbps. But This Depends Primarily On Your Connect To The Internet Mainly What Kind Of ISP You Do Business With, What Country Your In Or Type Of Connect You Have. Whether It Be Cable, DSL, Dial Up, Satellite Or Mobile GSM (Aka Routing The Internet Through A Smartphone Or With A GSM Wifi Router)

Reliability

The Times That I Did Try It Was Good For At Least Five Hours Of Causal Web Surfing. Then After It Would Slow Down Considerably And Usually If This Happens Then You Would Only Have To Manually Change Server Locations To Have It Return To Functional Speed. Download Speeds Were About The Same As My Causal Web Surfing Speeds With Brief And Periodic Moments Of Lag. But One Thing You Have To Remember It’s A Proxy Connection. Meaning The IP Address Changes Frequently To Avoid Network Detection, Hence Why You Might Encounter Periods Of Lag.

The Good

  • Plenty Of VPN Access Points Around The Globe
  • Accepts Many Payment Options, Including Bitcoin
  • Many Extra Features Such As XMPP, DNS, SOCKS5, TOR
  • Company Incorporated, Operates Off-Shore (Victoria, Seychelles)
  • VPN Software Available For All Modern Operating Systems
  • Decent Prices, Pay As You Go

The Bad

  • Notifies Users Of Upcoming Server Monitoring Is Likely A PR Stunt Meant To Highlight Their Full Transparency Policy
  • Employs Collective Punishments, Because Of Other Users Misconduct
  • Their VPN Software Doesn’t Work So Well With Windows, Works Pretty Well Mac OSX And Linux.
  • Do As I Say, Not As I Do

Encryption Is The Blood Of The Modern Internet As We Know It Today

gnupg-1

Most If Not All Of The Encryption That’s Used Today Either Has Originated From Phil Zimmermann’s PGP Program Written In 1991 Or From The Free Open Source Impelmentation Forked From Phil Zimmerman’s PGP, Know As GnuPG.

Why I Wrote PGP

By Phillip Zimmerman

Part Of The Original 1991 PGP User’s Guide (Updated In 1999)

Whatever You Do Will Be Insignificant, But It Is Very Important That You Do It.

~ Mahamta Gandi

________________________________________________________________________________________

It’s Personal. It’s Private. And It’s No One’s Business But Yours. You May Be Planning A Political Campaign, Discussing Your Taxes, Or Having A Secret Romance. Or You May Be Communicating With A Political Dissident In A Repressive Country. Whatever It Is, You Don’t Want Your Private Electronic Mail (Email) Or Confidential Documents Read By Anyone Else. There’s Nothing Wrong With Asserting Your Privacy. Privacy Is As Apple-Pie As The Constitution.

The Right To Privacy Is Spread Implicitly Throughout The Bill Of Rights. But When The United States Constitution Was Framed, The Founding Fathers Saw No Need To Explicitly Spell Out The Right To A Private Conversation. That Would Have Been Silly. Two Hundred Years Ago, All Conversations Were Private. If Someone Else Was Within Earshot, You Could Just Go Out Behind The Barn And Have Your Conversation There. No One Could Listen In Without Your Knowledge. The Right To A Private Conversation Was A Natural Right, Not Just In A Philosophical Sense, But In A Law-Of-Physics Sense, Given The Technology Of The Time.

But With The Coming Of The Information Age, Starting With The Invention Of The Telephone, All That Has Changed. Now Most Of Our Conversations Are Conducted Electronically. This Allows Our Most Intimate Conversations To Be Exposed Without Our Knowledge. Cellular Phone Calls May Be Monitored By Anyone With A Radio. Electronic Mail, Sent Across The Internet, Is No More Secure Than Cellular Phone Calls. Email Is Rapidly Replacing Postal Mail, Becoming The Norm For Everyone, Not The Novelty It Was In The Past.

Until Recently, If The Government Wanted To Violate The Privacy Of Ordinary Citizens, They Had To Expend A Certain Amount Of Expense And Labour To Intercept And Steam Open And Read Paper Mail. Or They Had To Listen To And Possibly Transcribe Spoken Telephone Conversation, At Least Before Automatic Voice Recognition Technology Became Available. This Kind Of Labour Intensive Monitoring Was Not Practical On A Large Scale. It Was Only Done In Important Cases When It Seemed Worthwhile. This Is Like Catching One Fish At A Time, With A Hook And Line. Today, Email Can Be Routinely And Automatically Scanned For Interesting Keywords, On A Vast Scale, Without Detection. This Is Like Driftnet Fishing. And Exponential Growth In Computer Power Is Making The Same Thing Possible With Voice Traffic.

Perhaps You Think Your Email Is Legitimate Enough That Encryption Is Unwarranted. If You Really Are A Law-Abiding Citizen With Nothing To Hide, Then Why Don’t You Always Send Your Paper Mail On Postcards? Why Not Submit To Drug Testing On Demand? Why Require A Warrant For Police Searches Of Your House? Are You Trying To Hide Something? If You Hide Your Mail Inside Envelopes, Does That Mean You Must Be A Subversive Or A Drug Dealer, Or Maybe A Paranoid Nut? Do Law-Abiding Citizens Have Any Need To Encrypt Their Email?

What If Everyone Believed That Law-Abiding Citizens Should Use Postcards For Their Mail? If A Nonconformist Tried To Assert His Privacy By Using An Envelope For His Mail, It Would Draw Suspicion. Perhaps The Authorities Would Open His Mail To See What He’s Hiding. Fortunately, We Don’t Live In That Kind Of World, Because Everyone Protects Most Of Their Mail With Envelopes. So No One Draws Suspicion By Asserting Their Privacy With An Envelope. There’s Safety In Numbers. Analogously, It Would Be Nice If Everyone Routinely Used Encryption For All Their Email, Innocent Or Not, So That No One Drew Suspicion By Asserting Their Email Privacy With Encryption. Think Of It As A Form Of Solidarity.

Senate Bill 266, A 1991 Omnibus Anti Crime Bill, Had An Unsettling Measure Buried In It. If This Non-Binding Resolution Had Become Real Law, It Would Have Forced Manufacturers Of Secure Communications Equipment To Insert Special “Trap Doors” In Their Products, So That The Government Could Read Anyone’s Encrypted Messages. It Reads, “It Is The Sense Of Congress That Providers Of Electronic Communications Services And Manufacturers Of Electronic Communications Service Equipment Shall Ensure That Communications Systems Permit The Government To Obtain The Plain Text Contents Of Voice, Data, And Other Communications When Appropriately Authorized By Law.” It Was This Bill That Led Me To Publish PGP Electronically For Free That Year, Shortly Before The Measure Was Defeated After Vigorous Protest By Civil Libertarians And Industry Groups.

The 1994 Communications Assistance For Law Enforcement Act (CALEA) Mandated That Phone Companies Install Remote Wiretapping Ports Into Their Central Office Digital Switches, Creating A New Technology Infrastructure For “Point-And-Click” Wiretapping, So That Federal Agents No Longer Have To Go Out And Attach Alligator Clips To Phone Lines. Now They Will Be Able To Sit In Their Headquarters In Washington And Listen In On Your Phone Calls. Of Course, The Law Still Requires A Court Order For A Wiretap. But While Technology Infrastructures Can Persist For Generations, Laws And Policies Can Change Overnight. Once A Communications Infrastructure Optimized For Surveillance Becomes Entrenched, A Shift In Political Conditions May Lead To Abuse Of This New-Found Power. Political Conditions May Shift With The Election Of A New Government, Or Perhaps More Abruptly From The Bombing Of A Federal Building.

A Year After The CALEA Passed, The FBI Disclosed Plans To Require The Phone Companies To Build Into Their Infrastructure The Capacity To Simultaneously Wiretap 1 Percent Of All Phone Calls In All Major U.S. Cities. This Would Represent More Than A Thousandfold Increase Over Previous Levels In The Number Of Phones That Could Be Wiretapped. In Previous Years, There Were Only About A Thousand Court-Ordered Wiretaps In The United States Per Year, At The Federal, State, And Local Levels Combined. It’s Hard To See How The Government Could Even Employ Enough Judges To Sign Enough Wiretap Orders To Wiretap 1 Percent Of All Our Phone Calls, Much Less Hire Enough Federal Agents To Sit And Listen To All That Traffic In Real Time. The Only Plausible Way Of Processing That Amount Of Traffic Is A Massive Orwellian Application Of Automated Voice Recognition Technology To Sift Through It All, Searching For Interesting Keywords Or Searching For A Particular Speaker’s Voice. If The Government Doesn’t Find The Target In The First 1 Percent Sample, The Wiretaps Can Be Shifted Over To A Different 1 Percent Until The Target Is Found, Or Until Everyone’s Phone Line Has Been Checked For Subversive Traffic. The FBI Said They Need This Capacity To Plan For The Future. This Plan Sparked Such Outrage That It Was Defeated In Congress. But The Mere Fact That The FBI Even Asked For These Broad Powers Is Revealing Of Their Agenda.

Advances In Technology Will Not Permit The Maintenance Of The Status Quo, As Far As Privacy Is Concerned. The Status Quo Is Unstable. If We Do Nothing, New Technologies Will Give The Government New Automatic Surveillance Capabilities That Stalin Could Never Have Dreamed Of. The Only Way To Hold The Line On Privacy In The Information Age Is Strong Cryptography.

You Don’t Have To Distrust The Government To Want To Use Cryptography. Your Business Can Be Wiretapped By Business Rivals, Organized Crime, Or Foreign Governments. Several Foreign Governments, For Example, Admit To Using Their Signals Intelligence Against Companies From Other Countries To Give Their Own Corporations A Competitive Edge. Ironically, The United States Government’s Restrictions On Cryptography In The 1990’s Have Weakened U.S. Corporate Defenses Against Foreign Intelligence And Organized Crime.

The Government Knows What A Pivotal Rrole Cryptography Is Destined To Play In The Power Relationship With Its People. In April 1993, The Clinton Administration Unveiled A Hold New Encryption Policy Initiative, Which Had Been Under Development At The National Security Agency (NSA) Since The Start Of The Bush Administration. The Centerpiece Of This Initiative Was A Government-Built Encryption Device, Called The Clipper Chip, Containing A New Classified NSA Encryption Algorithm. The Government Tried To Encourage Private Industry To Design It Into All Their Secure Communication Products, Such As Secure Phones, Secure Faxes, And So On. AT&T Put Clipper Into Its Secure Voice Products. The Catch: At The Time Of Manufacture, Each Clipper chip Is Loaded With Its Own Unique Key, And The Government Gets To Keep A Copy, Placed In Escrow. Not To Worry, Though–The Government Promises That They Will Use These Keys To Read Your Traffic Only “When Duly Authorized By Law.” Of Course, To Make Clipper Completely Effective, The Next Logical Step Would Be To Outlaw Other Forms Of Cryptography.

The Government Initially Claimed That Using Clipper Would Be Voluntary, That No One Would Be Forced To Use It Instead Of Other Types Of Cryptography. But The Public Reaction Against The Clipper Chip Was Strong, Stronger Than The Government Anticipated. The Computer Industry Monolithically Proclaimed Its Opposition To Using Clipper. FBI Director Louis Freeh Responded To A Question In A Press Conference In 1994 By Saying That If Clipper Failed To Gain Public Support, And FBI Wiretaps Were Shut Out By Non-Government-Controlled Cryptography, His Office Would Have No Choice But To Seek Legislative Relief. Later, In The Aftermath Of The Oklahoma City Tragedy, Mr. Freeh Testified Before The Senate Judiciary Committee That Public Availability Of Strong Cryptography Must Be Curtailed By The Government Although No One Had Suggested That Cryptography Was Used By The Bombers.

The Government Has A Track Record That Does Not Inspire Confidence That They Will Never Abuse Our Civil Liberties. The FBI’s COINTELPRO Program Targeted Groups That Opposed Government Policies. They Spied On The Antiwar Movement And The Civil Rights Movement. They Wiretapped The Phone Of Martin Luther King. Nixon Had His Enemies List. Then There Was The Watergate Mess. More Recently, Congress Has Either Attempted To Or Succeeded In Passing Laws Curtailing Our Civil Liberties On The Internet. Some Elements Of The Clinton White House Collected Confidential FBI Files On Republican Civil Servants, Conceivably For Political Exploitation. And Some Overzealous Prosecutors Have Shown A Willingness To Go To The Ends Of The Earth In Pursuit Of Exposing Sexual Indiscretions Of Political Enemies. At No Time In The Past Century Has Public Distrust Of The Government Been So Broadly Distributed Across The Political Spectrum, As It Is Today.

Throughout The 1990s, I Figured That If We Want To Resist This Unsettling Trend In The Government To Outlaw Cryptography, One Measure We Can Apply Is To Use Cryptography As Much As We Can Now While It’s Still Legal. When Use Of Strong Cryptography Becomes Popular, It’s Harder For The Government To Criminalize It. Therefore, Using PGP Is Good For Preserving Democracy. If Privacy Is Outlawed, Only Outlaws Will Have Privacy.

It Appears That The Deployment Of PGP Must Have Worked, Along With Years Of Steady Public Outcry And Industry Pressure To Relax The Export Controls. In The Closing Months Of 1999, The Clinton Administration Announced A Radical Shift In Export Policy For Crypto Technology. They Essentially Threw Out The Whole Export Control Regime. Now, We Are Finally Able To Export Strong Cryptography, With No Upper Limits On Strength. It Has Been A Long Struggle, But We Have Finally Won, At Least On The Export Control Front In The US. Now We Must Continue Our Efforts To Deploy Strong Crypto, To Blunt The Effects Increasing Surveillance Efforts On The Internet By Various Governments. And We Still Need To Entrench Our Right To Use It Domestically Over The Objections Of The FBI.

PGP Empowers People To Take Their Privacy Into Their Own Hands. There Has Been A Growing Social Need For It. That’s Why I Wrote It.

Philip R. Zimmermann
Boulder, Colorado
June 1991 (updated 1999)

Please Consider Donating To GnuPG Project So That Future Generations Of Internet Users Can Enjoy The Benefits Of Online Privacy Without Interception Or Interference.

VPN + Tor + WRT = Better User Security And Less Intrusions Of Privacy

vpn + tor

It’s Looks Complicated But It’s Really Not That Hard Considering The Numerous Amounts Of Tutorials On The Net These Days When It Comes Setting Up A VPN Network On Your PC, Tablet Or Smartphone. In Which Case I Will Provide Links Below For Windows, OSX And Linux Users On How To Do That. As For Tor, There’s A Number Of Options Available To Connect The Network The First Method Is The Tor Browser Bundle. However I Don’t Recommend Using That Method, Seeing As The Program Files Are Stored On A Hard Drive. Which Can Leave Digital Fingerprints Behind, Even After The Program Files Are Deleted. The Second Method That I Personally Like To Use Is The Tails Incognito Linux Live Distribution That Only Runs Exclusively On The Ram Disk. Which Will Wipe Any Trace Of Your Activity Soon After You Restart Or Turn Off Your Computer. The Third Method Which Works Well With Android Modeled Tablet’s And Smartphones, Not Apple IPhones Or Windows Smartphones. For The Best Results Of Using Tor On Android Tablet’s Or Smartphones Is To First Root Both Devices (That’s If You Own Two Devices). Then The Next Step After Rooting Is To Flash Custom Firmware To Your Device(s). Keep In Mind That When You Do This, It Automatically Voids The Warranty On Your Device(s).

Now Lets Throw In The VPN, Tor And WRT Tutorial Links To Make Your Web Browsing Experience Slightly Less Intrusive. Although The NSA Or Other Alphabet Intelligence Agencies Are Currently Trying Or Have Broken Some VPN’s Services Currently On The Open Market. So Make Sure To Do Your Research First Before You Start Signing Up For VPN Services.

Connecting Windows & Mac OSX To The Tor Network

Connecting Debian Linux Based Distributions To The Tor Network

Connecting Red Hat & Suse Linux Based Distributions To The Tor Network

Connecting Android To The Tor Network

Downloading, Burning & Using Tails Amnesic Incognito Live System

_________________________________________________________________________

 Installing & Using A VPN On Windows & Mac OSX

Installing & Using A VPN On Linux Or BSD

This Might Get A Little Tricky When Trying To Use Tails Linux And Connecting To A VPN At The Same Time. Which Is Next To Impossible According To The Searches I’ve Done With Regards To Tails And VPN’s. It Seems That The Development Team Discourages The Pratice, Seeing As It May Pose As A Massive Security Issue During The Live Session. You Can Try Working Around It, But Just Remember That You Might Become A Bigger Target To Watchful Eyes.

There Is However Another Option To Consider If You Want To Use Tails Linux And A VPN At The Same Time. This Means Flashing Your Current Or New Wifi Router With Either DD-WRT, OpenWRT Or LibreWRT Firmware. Then Configuring The Flashed Router With A VPN (Links On How To Do This Will Be Posted Below). This Provides You With An Encrypted Router, The Privacy Of A VPN And To Top It Off With The Anonymity Of The Tor Network. This Can Be Also Be Used With The Tor Browser Bundle And Your Rooted Custom Firmware Android Tablet Or Smartphone With Orbot Installed. As Long As Your Connect To The Flashed And Encrypted Wifi Router Within Your Own Home.