Much love to my People(Taking a long hiatus)

Media3...

Peace family.  I hope you’ve all been well.  I know there’s a lot of things going on in the world right now.  Every day there’s some news about politics,racist incident,police brutality or celebrity gossip.  Most of the mainstream “news” is designed to distract us from real progress.  I have gotten a lot of information from WordPress,Facebook,Youtube,Twitter,Google,Yahoo and Instagram.  As well as the cable news and talk shows.Media2...

I do a lot of research for my posts.  It takes a quite a bit of work to find the right videos and pictures for a specific post.  But social media can be very draining at times. You can wear yourself out when trying to fight racism,expose conspiracies and decode this matrix we are currently trapped inside.  We are living in a synthetic reality.  I hope people have learned something from my blog over the last six years.  I have uploaded over 1,000 posts in that time.   But I couldn’t have done it without the help of other bloggers.  There are a few people who have shown me great support over the years.

The Plan...

There are many bloggers and people I’ve chatted with on YouTube.  And many of them have opened my eyes to the deception around me.  They have made me look at things from a different perspective.  They made me challenge my own personal beliefs.  I’d like to thank fellow bloggers such as Moorbey,Land of Kam,Diary of a Negress,Original Black Woman,Onitaset Kumat,HungLikeJesus,Melanin Man,Chef Ahki,Shelby Courtland,Amos Magazine,Cliff Green,Lumumba Afrika,Chantel Keona,Sparking Thoughts,Cree7,Adunola the Oracle,Tahtahme Xero,Ajua Luv,Kelley,Sunny Delyte, CC Saunders,Jakke Brown,Brotha Wolf,No Black Pete,BlackMyStory,4thAngelsBowl,Queen Afua,Truth Angel,Naga Kanyah, Cynical Afrikan,Malaika Mutere,Alicia Monet,Trojan Pam(R.I.P),Queen Adira,Akings Truth,Hugh Cipher,Omay Farlane,Nidotopian Warrior,Wyzedome,Black Empowerment,Brother Osei, King Lo the Rastar,One Tawny Stranger,OldSchoolBlog,Roshumba Monique and Infinite Alkhemist.  I want to thank each and every one of you. You all have your own unique perspective on this crazy world we live in.  I want to thank each and every one of you for the information you’ve all given me over the years.  But I’ve been burned out as of late.  I have my own personal problems I’m going through.  I know you all have your problems as well.  I’ve taken breaks before but this one will probably be longer.  I have some things I need to work out.  And to be honest,trying to wake up people drains you.  I’ve been on this journey for a very long time.  It takes it’s toll on you.  But I do want to make something clear.  I have not giving up on my people.  Many times black people do let me down.  But I have not thrown in the towel on freedom and liberation.  That will always be priority number one. I’m not sure when I’ll be back blogging full time.  Even though I wont be blogging I’ll still be around.  I guess you could say I’m going “underground” for awhile.  I think 2019 will be a very stressful year for all of us.  I’m not sure what it will be but I feel as though something is coming. I think we all should be preparing in these uncertain times.  Look out for your family and friends. You guys take care. Peace and blessings. Your brother,KP.

Media4...

 

Weaponized Technology: What is Total Individual Control Technology?(Part 2 of 2)

Phone13..

Total Individual Control Technology is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs (Targeted Individuals). Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of the technology via gangstalking.

According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment upon poor, homeless and weak people who have little or no chance of fighting back.

In interviews or presentations such as this and this, Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.

TIC Story...

Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:

“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”

“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”

“This technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is seeing and hear what target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”

“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”

“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”

“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”

“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moments notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”

“This technology can also be used to read the thoughts of the target in real time … they can read your thoughts verbatim as they occur within your own mind.”

“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”

Phones3...

The Drive to Create a Worldwide DNA Database

This leads into another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning. It is no coincidence that Amazon and Google are racing each other, along with Microsoft, IBM and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.

Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.

Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!

Social Engineering with Total Individual Control Technology

Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets. On his website GangstalkerWars.com, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.

In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.

Phones1...

The Rising Danger of the Private Security Firm Industry in America

Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I covered in this 2-part series, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top secret information. These security firms, like the MIC itself, appear to operate above and outside the law.

The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims, and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.

The Human Rights Loophole: False Diagnoses

Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses. Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers, since his claims and testimonies will be dismissed as the ravings of a madman.

This is a similar tactic to what is used with other victims of mind control. In my interview with Max Spiers, he touched on the use of the Big Pharma “false memory” foundation, which includes bogus therapists and psychiatrists who convince mind control victims that they’re having false memories (when they are actually recalling how they were tortured and programmed).

The Infrastructure Underlying Total Individual Control Technology

The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar and cell phone towers. Often, the antennae are camouflaged (hidden behind walls). Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.

Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power

In concluding, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.

Hopefully this testimony can serve as a wakeup call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter. The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.

Article from tapnewswire.com

Cryptocurrency: Good investment or One World currency?(Part 1 of 2)

Bit2....jpg

As I’m pretty sure by now, most of you have heard in some form or fashion the word “cryptocurrency” being tossed around in the media & social media due to the most popular form of cryptocurrency by the name of Bitcoin (BTC) reaching a value level of as high as $7,380.56 per coin.  To some people, the mere fact that this form of currency is so valuable is enough to get most people excited as they sit around pondering the possibilities of transforming this currency into a fiat currency to where they can essentially ball out of control.  To other people, most honestly have no clue what cryptocurrency is, why it’s so valuable, why people are so excited about it, & why people are rushing to get involved in the cryptocurrency market.  Well, I’m about to give you the most elementary explanation that I can think of in order to help you understand what cryptocurrency is, why cryptocurrency WILL dominate the future & more importantly why you SHOULD get involved in this market, especially if you are black.

Everything from money to social media activities are centralized (controlled by some organization).  The stuff you post to Facebook is stored on Facebook servers all across the world that are owned & controlled by Facebook.  Every time you withdraw money from an ATM machine, send money via PayPal, pay for something using a debit/credit card, all of those transactions must go through a bank (centralized) to where the bank controls the actual process of sending/receiving, recording & verifying transactions before the disbursement of funds…for a fee of course.  These transactions themselves are stored on servers owned & controlled by these institutions as well.
These servers are very important for a reason.  These servers process & store the information they collect from you (in addition to data mining this information to be sold to third party companies who then send you a bunch of junk via email or snail mail to convince you to buy).  Another reason these servers are so important is because these servers are also extremely valuable to hackers roaming the internet looking to compromise a server to gain access to the information residing on the server to be later sold on the black market (think identity theft).  The problem with these servers is that in the grand scheme of things, they represent single point of failures that are constantly being attacked & exploited for nefarious purposes.  All of the information that you’ve posted to Facebook ONLY resides on Facebook’s servers spread out across the world.  This information does not reside on any of Google’s servers which means if someone managed to wreck havoc on Facebook’s system causing the site to crash or something catastrophic to where your information was compromised (as in recent issues involving Yahoo!), then you couldn’t turn to Google’s servers in an attempt to retrieve the information you had stored on Facebook’s servers, because they are not connected in that manner to allow for the free flow of data to be exchanged & stored.  I have a decade+ background in IT & I have a master degree in Information Assurance.  My master degree alone is basically a degree that focuses on protecting information floating around being stored on servers.  So the problem is a very real problem that most people are unaware of.

Cryptocurrencies function off of a technology called blockchain.  Blockchain essentially eliminates the single point of failure aspect by removing the storage of data on centralized servers owned by private/public entities.  The data on the blockchain whether it is financial transactions, social media activities etc are stored across a gigantic network of computers called nodes to where the information stored cannot be controlled by one entity or hacked causing severe problems due to single point of failure issues I described above.  The reason the data on the blockchain cannot be hacked is because the data resides on a distributed network is highly encrypted to where a hacker can’t just hack one single point on the blockchain, they would have to hack the entire blockchain essentially.  Also, the data residing in the blocks on the blockchain are constantly updated across the network to wherever you access the data on the network, the data will be the same.

Bit1...

Here’s an example of what I mean by the data being centralized & decentralized in addition to the data being “mirrored” across the network no matter where you are to access the data.

Back in the day on Microsoft Word a person would type a paper, save the paper, & then email the paper to somebody to make corrections.  The person whom the email was sent to would get the email, open MS Word, make corrections, email you the paper back, then you would make necessary changes to the paper.  This entire process was centralized to where only one party had control of the paper at a time and the other party couldn’t get access to the paper until the owning party relinquished control.

Now, we have Google Docs (basically cloud computing) to where multiple parties at the same time can access, view and/or edit the paper in real time without waiting for one party to relinquish control of the paper (decentralized).

Bit4...

How this ties into the data floating around on the blockchain is…you’re not inputting your data into just one entity and entrusting that one entity to do the right thing as far as processing and safeguarding your data (for a fee in most instances).  You are now putting your data across a distributed network to where copies of that data will exist in multiple places at once.  So, if I upload some data from my home computer on the blockchain, my data will be added to the blockchain which will then be replicated across the network and not just sitting on one server that I would need to gain access to (think…logging into Facebook, you’re essentially logging into a site that stores your updates on their servers).  In a decentralized scenario, in theory, I would be able to log into my gmail account and still be able to access my data on Facebook.

Now some of you are probably wondering how this data is protected if this data is “free floating” on the blockchain versus the data (supposedly) being protected on some entity’s servers.

Simple, the data is encrypted (it’s encrypted on these entity’s servers too by the way…or at least should be).  But the encryption on the blockchain isn’t CENTRALIZED, meaning you are not relying solely on that one entity to encrypt & protect your data.

So how the encryption works is fairly simple for the most part.  Blockchain works off of an encryption practice called asymmetric encryption.  Asymmetric encryption involves the use of a public & private key to gain access to data.  Any data you put on the blockchain is encrypted to where the data looks like a bunch of meaningless letters, numbers & symbols that would literally take decades (if not longer) to decipher.

A private & public key can be thought of this way…

You maintain a mailbox at a UPS store.  UPS gives you 2 keys:  one to access the UPS store and the other key to access your personal mailbox within the store.  The UPS store key that you possess is the same key that some random person with a mailbox at the UPS store would possess as well, but that random person does not have your private key (or shouldn’t) to access your personal mailbox.

So on the blockchain, what tends to happen is, people constantly give out their public key to pretty much anybody who wants it for the purpose of exchanging data (and/or “money”…cryptocurrency).  But to unlock or gain access to the item in the transaction, a person would need your private key to do so.  So basically what takes place is, Person A wants to send an item to Person B.  Person A sends an item to Person B using Person B’s PUBLIC KEY.  This item is encrypted within Person B’s PUBLIC KEY.  Person B receives the item from Person A.  Person B now uses his PRIVATE KEY to decrypt his PUBLIC KEY to get access to the item Person A sent him.  If anybody were to intercept Person B’s PUBLIC KEY, they would NOT be able to access the data encrypted on that public key without having access to Person B’s PRIVATE KEY.  Person A can’t even get access to the data he sent Person B because Person A used Person B’s PUBLIC KEY to encrypt the data and ONLY Person B’s PRIVATE KEY can decrypt Person B’s PUBLIC KEY.  Got it?  Good.

Now, all of these transactions are continually updated across the blockchain network in a matter of minutes to where each transaction is essentially “etched in stone” to where a new “block” is created in the overall network which is then duplicated everywhere on the network (think of my Google Docs analogy).  This is important because in order to hack the system, every other block that was created prior to the new block would have to be hacked as well which would require computing power that probably doesn’t exist to even make it worth somebody’s time & effort to attempt.  You can’t just hack one block, all the blocks are connected which mean you would have to hack ALL OF THE BLOCKS.  Also, you can’t delete data on the block once the data is recorded.  Now for the sake of this blog article, I’m choosing not get too technical beyond this point to prevent really confusing the hell out of people who have no idea how this works, but just want a basic general understanding of the technology behind it.

What I really want people to understand is why one Bitcoin is currently worth over $7K and why black people need to seriously get caught up on this technology to where you could benefit big from it in the coming years.  Crytocurrency (Bitcoin and other coins) is an intangible asset that rewards people for participating in the creation, maintenance & growth of the blockchain.  These people are called miners.  These people allow for their computers to be used as nodes for creating the actual blockchain which allows for you to engage in peer-to-peer transactions which also allows for you to remove the middleman & their fees out of the process.  They also allow for your data to be distributed without the need for a centralized distribution point that is owned by one entity.

People who are not miners invest in the cryptocurrencies that are being “mined” by these miners.  A miner is a person who basically uses their computer to solve complicated mathematical problems.  Each time they successfully solve a problem a coin is created.  These miners are paid in partials of coins that is based on a variety of factors.  The remaining partials are then placed on the market for non-miners to invest in or use as actual forms of currency to purchase items.  Matter of fact, Japan just recently recognized Bitcoin as a legit form of currency to purchase items.  There are even ATM machines in various countries (too include the US) that allow you to “withdraw” Bitcoin instead of dollars.

But here is what I really want black people to grasp & understand as this whole discussion relates to cryptocurrency and the blockchain technology…Black people need to think of this technology like it is the Internet 3.0.

When the internet first came out for general public use 20 something years ago, the internet was basically a place to visit websites and read stuff.  That was it.  The only people who were really making money off of the internet during that time were ISP’s (internet service providers) & people who registered domain names for the sole purpose of holding them and selling them to people later on (think if you bought Walmart_dot_com back then how much Walmart would have paid you to get that domain name).  You had a few other ways of making money here & there (the Dotcom Boom) but that was pretty much it.  Internet 2.0 ushered in the era of e-commerce & social media (where we presently are now).  As crazy as this may sound, a lot of people honestly didn’t think e-commerce or social media would take off.  A lot of people couldn’t fathom the idea of people buying products online or spending more time on a social media platform communicating to people than they did in real life.  But in the year 2017, look at how we communicate & engage in commerce now.  So now think of blockchain & cryptocurrency as internet 3.0 to where the internet will begin moving away from big companies like Google, Facebook, & banks controlling or having some influence on every aspect of everything that takes place on the internet.  The blockchain will not put these people out of business, but the blockchain will give people more power over how our data is being utilized on the internet.  This is all about ownership & control on the individual level versus relying on the big entities to do it for us.  Cryptocurrencies such as Bitcoin have proven that there is a real demand & shift taking place to where as this technology continues to grow & mature, a lot of potential money stands to be made.

Bit3....PNG

Cryptocurrencies function off of a technology called blockchain.  Blockchain essentially eliminates the single point of failure aspect by removing the storage of data on centralized servers owned by private/public entities.  The data on the blockchain whether it is financial transactions, social media activities etc are stored across a gigantic network of computers called nodes to where the information stored cannot be controlled by one entity or hacked causing severe problems due to single point of failure issues I described above.  The reason the data on the blockchain cannot be hacked is because the data resides on a distributed network is highly encrypted to where a hacker can’t just hack one single point on the blockchain, they would have to hack the entire blockchain essentially.  Also, the data residing in the blocks on the blockchain are constantly updated across the network to wherever you access the data on the network, the data will be the same.

Here’s an example of what I mean by the data being centralized & decentralized in addition to the data being “mirrored” across the network no matter where you are to access the data.

Back in the day on Microsoft Word a person would type a paper, save the paper, & then email the paper to somebody to make corrections.  The person whom the email was sent to would get the email, open MS Word, make corrections, email you the paper back, then you would make necessary changes to the paper.  This entire process was centralized to where only one party had control of the paper at a time and the other party couldn’t get access to the paper until the owning party relinquished control.

Now, we have Google Docs (basically cloud computing) to where multiple parties at the same time can access, view and/or edit the paper in real time without waiting for one party to relinquish control of the paper (decentralized).

How this ties into the data floating around on the blockchain is…you’re not inputting your data into just one entity and entrusting that one entity to do the right thing as far as processing and safeguarding your data (for a fee in most instances).  You are now putting your data across a distributed network to where copies of that data will exist in multiple places at once.  So, if I upload some data from my home computer on the blockchain, my data will be added to the blockchain which will then be replicated across the network and not just sitting on one server that I would need to gain access to (think…logging into Facebook, you’re essentially logging into a site that stores your updates on their servers).  In a decentralized scenario, in theory, I would be able to log into my gmail account and still be able to access my data on Facebook.

Now some of you are probably wondering how this data is protected if this data is “free floating” on the blockchain versus the data (supposedly) being protected on some entity’s servers.

Simple, the data is encrypted (it’s encrypted on these entity’s servers too by the way…or at least should be).  But the encryption on the blockchain isn’t CENTRALIZED, meaning you are not relying solely on that one entity to encrypt & protect your data.

So how the encryption works is fairly simple for the most part.  Blockchain works off of an encryption practice called asymmetric encryption.  Asymmetric encryption involves the use of a public & private key to gain access to data.  Any data you put on the blockchain is encrypted to where the data looks like a bunch of meaningless letters, numbers & symbols that would literally take decades (if not longer) to decipher.

A private & public key can be thought of this way…

You maintain a mailbox at a UPS store.  UPS gives you 2 keys:  one to access the UPS store and the other key to access your personal mailbox within the store.  The UPS store key that you possess is the same key that some random person with a mailbox at the UPS store would possess as well, but that random person does not have your private key (or shouldn’t) to access your personal mailbox.

So on the blockchain, what tends to happen is, people constantly give out their public key to pretty much anybody who wants it for the purpose of exchanging data (and/or “money”…cryptocurrency).  But to unlock or gain access to the item in the transaction, a person would need your private key to do so.  So basically what takes place is, Person A wants to send an item to Person B.  Person A sends an item to Person B using Person B’s PUBLIC KEY.  This item is encrypted within Person B’s PUBLIC KEY.  Person B receives the item from Person A.  Person B now uses his PRIVATE KEY to decrypt his PUBLIC KEY to get access to the item Person A sent him.  If anybody were to intercept Person B’s PUBLIC KEY, they would NOT be able to access the data encrypted on that public key without having access to Person B’s PRIVATE KEY.  Person A can’t even get access to the data he sent Person B because Person A used Person B’s PUBLIC KEY to encrypt the data and ONLY Person B’s PRIVATE KEY can decrypt Person B’s PUBLIC KEY.  Got it?  Good.

Now, all of these transactions are continually updated across the blockchain network in a matter of minutes to where each transaction is essentially “etched in stone” to where a new “block” is created in the overall network which is then duplicated everywhere on the network (think of my Google Docs analogy).  This is important because in order to hack the system, every other block that was created prior to the new block would have to be hacked as well which would require computing power that probably doesn’t exist to even make it worth somebody’s time & effort to attempt.  You can’t just hack one block, all the blocks are connected which mean you would have to hack ALL OF THE BLOCKS.  Also, you can’t delete data on the block once the data is recorded.  Now for the sake of this blog article, I’m choosing not get too technical beyond this point to prevent really confusing the hell out of people who have no idea how this works, but just want a basic general understanding of the technology behind it.

Cryptocurrency..

What I really want people to understand is why one Bitcoin is currently worth over $7K and why black people need to seriously get caught up on this technology to where you could benefit big from it in the coming years.  Crytocurrency (Bitcoin and other coins) is an intangible asset that rewards people for participating in the creation, maintenance & growth of the blockchain.  These people are called miners.  These people allow for their computers to be used as nodes for creating the actual blockchain which allows for you to engage in peer-to-peer transactions which also allows for you to remove the middleman & their fees out of the process.  They also allow for your data to be distributed without the need for a centralized distribution point that is owned by one entity.

People who are not miners invest in the cryptocurrencies that are being “mined” by these miners.  A miner is a person who basically uses their computer to solve complicated mathematical problems.  Each time they successfully solve a problem a coin is created.  These miners are paid in partials of coins that is based on a variety of factors.  The remaining partials are then placed on the market for non-miners to invest in or use as actual forms of currency to purchase items.  Matter of fact, Japan just recently recognized Bitcoin as a legit form of currency to purchase items.  There are even ATM machines in various countries (too include the US) that allow you to “withdraw” Bitcoin instead of dollars.

But here is what I really want black people to grasp & understand as this whole discussion relates to cryptocurrency and the blockchain technology…Black people need to think of this technology like it is the Internet 3.0.

When the internet first came out for general public use 20 something years ago, the internet was basically a place to visit websites and read stuff.  That was it.  The only people who were really making money off of the internet during that time were ISP’s (internet service providers) & people who registered domain names for the sole purpose of holding them and selling them to people later on (think if you bought Walmart_dot_com back then how much Walmart would have paid you to get that domain name).  You had a few other ways of making money here & there (the Dotcom Boom) but that was pretty much it.  Internet 2.0 ushered in the era of e-commerce & social media (where we presently are now).  As crazy as this may sound, a lot of people honestly didn’t think e-commerce or social media would take off.  A lot of people couldn’t fathom the idea of people buying products online or spending more time on a social media platform communicating to people than they did in real life.  But in the year 2017, look at how we communicate & engage in commerce now.  So now think of blockchain & cryptocurrency as internet 3.0 to where the internet will begin moving away from big companies like Google, Facebook, & banks controlling or having some influence on every aspect of everything that takes place on the internet.  The blockchain will not put these people out of business, but the blockchain will give people more power over how our data is being utilized on the internet.  This is all about ownership & control on the individual level versus relying on the big entities to do it for us.  Cryptocurrencies such as Bitcoin have proven that there is a real demand & shift taking place to where as this technology continues to grow & mature, a lot of potential money stands to be made.

Article by Gee Lowery

Esoteric Knowledge 101: Symbols all around Us(Part 3 of 3)

Signs8...

I was doing some research about ten years ago on symbolism.  And I noticed that there were many Freemasonic symbols on the Apple iphones millions of people use.  I personally believe that these phones can spy on us at anytime.  I believe these freemasons work with the government to spy on it’s citizens. I know for sure that the late Apple inventor Steve Jobs made some type of deal with the government. And in the process he became a billionaire. He sold out the public so that he could get rich. I believe the GPS(Global positioning system) in these phones know where you are at all times.  And that they can turn on the microphones and hear the conversations of your family and friends.  Many of these symbols are on the iphones and most are not aware of it. They know most people are in the dark about this.   They purposely put them in our faces knowing that most people don’t study symbology,the occult,sacred geometry and numerology.  This is esoteric knowledge many don’t know about. So I’m going to educate some of you on these symbols you see on your phones.

Signs7...

Most people have seen this one.  It’s probably the most obvious one.  It’s the App Store logo.  We’ve been looking at this one for years.  I also thought it was strange that the logo was a bitten apple.  I always thought it was a reference to the biblical Garden of Eden.  In the Bible the bite signifies the “sin of man” by disobeying God. I always believed it meant they would be using these phones in a sinful manner.

Signs4...

There is the Google Play logo.  Google Play is an app in which people can play music,games and movies.  The logo looks very much like the masonic pyramid capstone.

Signs2..

This is a very interesting one.  The Facebook App looks very much like the masonic Tubal Cain logo. When a Mason reaches the 32nd Degree, that of Master Mason, his codeword, his password, is Tubal-Cain. While this sounds unassuming and “sterile”, the truth is this, Tubal-Cain is of the lineage of Cain, as in Cain who slew Abel in the Book of Genesis.
In Genesis Chapter 4, verse 22, we see where Tubal-Cain is born of Cain, this chapter giving us the “family tree” of Cain’s off-spring.  I think the logos look way too similar to be a coincidence.  And I’m sure you all know by now that Fakebook…ahem…I mean Facebook collects all your information.  It’s stored into a central database so they know who are your family and friends.

Signs5...

The Google GPS app looks eerily like the Eye of Providence.  It is a symbol recognized by Freemasons everywhere as a  representation of the watchful care of the Supreme Architect. Are they the same symbol?  I’ll let you be the judge.

Signs1..

Mason apron...The logo for Google mail(Gmail) is obviously a representation of the Royal Arch apron. The apron looks like the letter M so it fits perfectly.  Once you can see the deception it’s quite obvious.  Here’s a little information on the apron:

“As we have seen aprons have throughout the ages possessed a religious and symbolic meaning, a fact that is well applied to our own present apron as I will shortly demonstrate. However, there is little doubt that the Masonic apron evolved from those worn by operative masons to protect their clothes from becoming soiled. In medieval times all masons, whether Freemasons or Guild Masons, used aprons when at work, and the former also wore white leather gloves to protect their hands from the lime This type of apron used by the speculatives had changed very little in the middle of the 18th century from those used by the operative counterparts. These aprons were long, coming down to below the knees, with a flap or bib to protect the chest.It was the speculative masons who at some point in the 1750’s began to decorate their aprons with designs, usually painted by the owner’s own hand. A number of these examples can still be seen in the Museum and Library of Grand Lodge, but we must remember that at this time no definite scheme existed and each brother was free to adorn his own apron as he saw fit, usually including all the symbols of all the various degrees he had attained. Therefore, many of these designs included symbolism of such degrees such as the Mark, Chapter and Ark Mariner in addition to those of the Craft. In due course however, certain designs became more popular and more standardized. The two pillars with the letters that represented them, and often the names were even given in full became an accepted model for most aprons. To this central motif were added various other emblems such as squares, ladders and so forth which can be found in the 1st degree Tracing Board and Masonic Certificates issued to all Master Masons advanced to the 3rd degree.”

Signs3..

The Google Chrome logo looks a lot like the Divine King Sign.  It can also be represented doing the “okay” sign with your hand.

Drake  okay sign...jpg

Rapper Drake(above) is throwing up the sign to let you know who are is masters.  There are countless images on the internet of rappers,singers and actors throwing up his sign.  A little background on the sign:

First, we have the circle, indicating the sun deity and the Mason’s never-ending quest for more light. To Freemasonry, the circle also represents the female genitalia, or yoni. In the Hindu religion, the OK sign is a revered mudra (sacred gesture) meaning “infinity” or perfection. It is associated with the female genitalia — thumb and forefinger pressed together at the tips with the other three fingers extended.
In the practice of tantric yoga (sex rituals), the OK sign is a token of ecstasy, spiritual and physical. In ancient Sumeria and Persia, charms and amulets have been discovered of fingers and hands in the modern OK position, joined along with horns implying fertility. The three fingers extended outward are symbolic of ecstatic union with the Goddess, the third member of the pagan trinity.
In Satanism, when making this sign the three fingers not used to make the circle are considered symbolic of the unholy trinity — horned God, Goddess, and offspring (antichrist). Some go so far as to adopt the view that the bent three fingers are shaped as three number six’s, or 666. Thus, we have 666, the sun deity (Lucifer), the Goddess (Mystery, Babylon the Great, Mother of Harlots), and the beast (antichrist, 666), all in one unitary hand sign. Oh what a web of evil wicked men can weave around something seemingly so ordinary and mundane.
In the Illuminist philosophy, the OK sign becomes a sign indicating approval of the Divine King, their coming Lord of Light, whom we as Christians know as antichrist. To them it means, “He approves our undertaking.” This meaning is roughly equivalent to the words in Latin atop the all-seeing eye of Osiris on our U.S. one dollar bill—Annuit Coeptus.”
Signs6..

And last but not least are the logos for the  Apple App and Android Product stores.  These logos are clearly the same as the square and compass used in Freemasonry.  This symbol has been used in secret societies for many years. The square and circle shapes are related in Euclid’s 47th problem of “Squaring The Circle,” said to be the primary goal of the Masonic craft. Squaring the circle, however, does not in this case refer to a mathematical problem: it is a spiritual reference to man’s instinctive quest to harmonize our physical and spiritual natures.Since Antiquity, the square has represented the physical body. The circle, on the other hand, has always represented the soul. So in a nutsehell, he Square & Compasses thus symbolize Man’s state as an eternal soul manifesting in a temporary body. The circle is our spiritual side that cannot be seen.

So I hope you all enjoyed this esoteric series.  I hope I was able to educate you on a few things you didn’t know.  Let me know your thoughts.

 

My Skin is My Sin- Is it time to go underground?(Part 2 of 2)

Ninja1...

I’ve been on social media for over a decade. I have been in contact with black people on WordPress,Youtube and Twitter.  And I’ve had subscribers share my posts on Twitter,Tumblr and Facebook.  I have had some great conversations with black people here in the United States as well as Africa,Canada,London,Brazil and Jamaica.  We have talked about many subjects.  On my blog I have covered black power,black love,black families,African culture,black leaders,black business,survival skills,police brutality,politics,prison population,African history,racism,slavery,interracial marriage,biracial people,conspiracies and of courseEuropean global power. Through my years of research I realize that the government is spying on everyone.  The can track your whereabouts with your cellphone.  The FBI and CIA are also recording all your phone conversations.  And all your text messages are sent to a central database.  They also can hear your conversation at home with Smart TV’s.  They are constantly spying on us everywhere.

Ninja2...

All this unnecessary surveillance has gotten out of control. All of our information is being consumed by the government. We must keep in mind that most of the social media is owned by white people.  YouTube,Instagram,Twitter,Tumblr,Wordpress,Google,Snapchat and Facebook are all owned and controlled by Europeans.  With so much surveillance you can’t really make any moves without them watching you.  Not to mention they can find most people using their email.  At times it feels like you can’t go anywhere without a closed caption camera in your face. There are cameras in banks,schools,hotels,airports,hospitals,restaurants and bars.  We are really living in a prison planet.

And if all this surveillance wasn’t enough people you still have people willingly giving up their personal information.  They have trained us to give up our information voluntarily and can use that information to create a personal database about the person.  The video(above) is an Apple advertisement for the new iPhone X.  It shows that that you can unlock it with facial recognition.  Sounds pretty neat right?  I think it’s a bad idea.  The first iPhones could be unlocked with a password.  Then they had the iPhones that could be unlocked only with a person’s thumbprint.  Now they come out with phones with facial recognition.  It seems to me they are slowly collecting data on everyone.  I also would tell people to beware of these DNA tests that have become popular in the last few years.  Companies like MyHeritage,23andMe,AncestryDNA and Living DNA are not always accurate.  Just be mindful when using them.  I have a funny feeling they are collecting the DNA of people and studying their genes.  Who knows?  They could use your DNA to create a disease that only attacks people with certain DNA strands.

FBI1...

So I just want to know your thoughts.  Do you think we need to go underground?  How can you have a movement without racist government agencies(FBI,CIA) watching your every move?  I know some people who have left Youtube because of all the restrictions.  Then there are others who have stopped blogging at WordPress due to frustration.  Some of our people feel so beat down and they’ve decided to give up.  I get frustrated just like anyone else.  I’ve thought about leaving WordPress and Youtube at times. Trying to wake people up can get very tiring and it starts to wear on you. It’s not that I want to give up it’s just I want some practical solutions. I want our people to be free mentally and physically.  And it seems black people don’t want to change.  Not all…..but too many of us.

Bloggers..

Kemet1...

Do we need our own social media?  I have heard black people mention sites like Blaqspot.com.  And the conscious black dating site Kemet Klique.  I don’t know if they are totally 100% Black operated.  If someone knows please tell me.  I still need to do research on these black social media sites.  But I’m asking all my fellow bloggers.  I know I have a lot of intelligent subscribers.  I know some of you have some great ideas.  So I’m asking Onitaset,Land of Kam,Hung Like Jesus,Negress,Cree,Shelby Courtland,Trojan Pam,Kelley,CC Saunders,Amos Magazine,OriginalBlackWoman,TruthAngel,BlackMyStory,Melanin Man,Lumumba Afrika,Sparks,1TawnyStranger,King Lo the Rastar,Kween Jasira,Malaika Mutere,Sunny Delyte,Clifford Green,M’Bwebe Ishangi,Roshumba Monique,FourthAngelsBowl,Moorbey,Nidotopian Warrior,Universal Jones and Tired Sista for your thoughts.  I’m open to any suggestions.  Should we leave YouTube and WordPress?  If we do,how do we communicate with each other?  Should we do it through email?  I ask because we need our own private spaces to communicate without outside interference. We are all being watched at every turn.   maybe we need to move in silence like ninjas. Any black person on social media that is trying liberate the minds of our people are seen as a threat. They don’t seem to care if you’re a Moor,Pan African,Hebrew Israelite or into Kemetic spirituality. All that matters is you’re trying to inform the black collective and open minds. They draw strength from our confusion.  Confusion is the enemy to revolution. We need some real solutions.  I’m open to hear anything at this point.  I’d love to hear your suggestions.