d i s i n f o r m a t i o n
Information is power. This site provides you with the 'hidden information,' that seldom seems to slip through the cracks of the corporate owned media conglomerates. What you see here will enlighten and outrage you.
Cryptome
Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and blast protection -- open, secret and classified documents -- but not limited to those.
Things the government would prefer that you didn't know about. Things that any decent person will find disturbing...
Schneier on Security
Bruce Schneier is an intelligent voice of reason in the security field. His site is a wealth of interesting articles, analysis, commentary and information on security issues.
Trusted Computing Frequently Asked Questions
Trusted Computing provides a computing platform on which you can't tamper with the applications, and where these applications can communicate securely with the vendor. This sorta sounds like maybe not a good thing? Uh-huh. Everybody should read this...
The Electronic Frontier Foundation also has a very thoughtful article on Trusted Computing.
Microsoft's metered pay-as-you-go patent
Great article on a recent patent application by software tyrant Microsoft. "Redmond are up to their twin obsessions: "security" and vendor lock in."
LEAKED: Security Document Microsoft Doesn't Want You To Read
Another enlightening article concerning the posting of software tyrant Microsoft's "Global Criminal Compliance Handbook" by Cryptome . The author states: "I don't think there's all that much objectionable in the document. It does trouble me that they go so far above and beyond the call of duty to make this stuff clear to law enforcement; I'd like my privacy to be more important to them than getting in the good graces of governments. But that's really not the issue. The issue is that they don't want the owners of this data to know the details of what is being stored and how. Again, there is nothing preventing them from making all this public, and many other companies do just that."
Contrast Microsoft's lack of disclosure and disregard for their user's privacy with for example, Google and Twitter's transparency policies. It's clear that the immense fortune Microsoft made selling their software to the general public doesn't buy the individual user one bit of loyalty from them.
The Halloween Documents
The Halloween Documents are a set of documents that include several confidential memoranda from corporate tyrant Microsoft analyzing the threat of open source software to their monopoly on desktop software and their strategy for combating it and protecting the huge profits they make from maintaining their monopoly.
Death by a Thousand Cuts
This is stating the obvious, but for those who need things spelled out for them this article does a good job of outlining al Qaeda's strategy. It should be obvious that the goal of terrorism isn't to kill people, that's just the means to an end. The goal is to terrorize us, generating responses that have a negative and potentially fatal impact on our society and way of life. By bleeding our economy with endless security measures or by destablizing the country as civil unrest grows because our civil rights are shrinking as the government implements more and more draconian security measures all in the name of protecting us. That's the terroist's strategy and our government and the TSA are helping them accomplish it with their intrusive and expensive airport security measures.
Forfieting our rights for the illusion of security
"The whole aim of practical politics is to keep the populace alarmed - and hence clamorous to be led to safety - by menacing it with an endless series of hobgoblins, all of them imaginary." H.L. Mencken
What Islamist Terrorist Threat?
Just Asking
The Complete, Unofficial TEMPEST Information Page
Across the darkened street, a windowless van is parked. Inside, an antenna is pointed out through a fiberglass panel. It's aimed at an office window on the third floor. As the CEO works on a word processing document, outlining his strategy for a hostile take-over of a competitor, he never knows what appears on his monitor is being captured, displayed, and recorded in the van below.
Fat Chuck's Corrupt CD List
Fat cat record companies are putting copy protection on cds which limit playback options. On the computer, some will only play using Windows media player. Sometimes they won't even play at all on normal cd players. At least this looks like a problem for consumers of mass media commercial product. Garbage like Foo Fighters and Linkin Park. But there are some good classic rock albums on the list, The Rolling Stones Exile on Main Street for example. Independent labels shouldn't be a problem in this regard. And that's good considering that's where most of your good rock and roll is coming from. Fat Chuck's site keeps a list of known copy protection corrupted cds for your perusal. The Fat Chuck site seems to be down but I found a copy of the list on boycott-riaa.com site.
Sony's DRM Rootkit: The Real Story
Great article by Bruce Schneier on the copy-protection software that Sony BMG distributed on some of their music CDs which secretly installed a rootkit on consumer's computers. This happened back in 2005 but if you don't know the story you should definitely educate yourself on the business ethics of a company that you may be supporting by purchasing their products.
The Electronic Freedom Foundation's Sony BMG Litigation Info site contains information on their legal action against Sony and general information and links on the rootkit.
Princeton University's Ed Felten and Alex Halderman's Lessons from the Sony CD DRM Episode paper on the rootkit fiasco. Interesting reading on the technology and motivation behind Sony's misdeeds. This is a 156k PDF download.
Witchhunt Information Page
Zealous prosecuters, eager to rack up convictions at any cost in order to enhance their record. Greedy corporate media seeking to further fatten their coffers by exploiting and sensationalizing hot topic stories. An ignorant and ill-informed public. Hysterical parents. Corrupt polititians exploiting the opportunity and fanning the hysteria in order to garner votes. Bogus accounts of "satanic ritual abuse", "ritual sexual abuse", "recovered memories". All ingredients for a modern day witchhunt right here in the good old USA. Anybody is a potential victim.
The Progressive
Good source for unfiltered news.
Ontario Consultants on Religious Tolerance
A site about religious tolerance with a strong emphasis on religiously based intolerance and hatred and percecution by religious groups. Of particular interest is their section on "Religious hatred, conflict and intolerance" which covers such topics as religiously-motivated terrorist attacks (like 9-11), religious misinformation and frauds, hate-based American religious organizations, ritual abuse of children hoaxes (McMartin preschool and Little Rascals day care for example). The site is run by a multi-faith agency of five volunteers in the U.S. and Canada who follow five different religious beliefs (Agnosticism, Atheism, Christianity, Wicca, and Zen Buddhism). Not affiliated with any religious organization. Their office is located in Canada; their web site is located in Texas.
The Melon Farmers
Watching the (UK) Censors Watch What We Watch
The Cramps Page
"They ooze, you'll throb". Nice page dedicated to the best band in the world. R.I.P. Lux Interior, Oct 21, 1946 - Feb 4, 2009.
Nice Rolling Stone article about Lux Interior's death with pics and songs, Remembering The Cramps' Lux Interior: Vintage Photos and Classic Songs.
Travel Photos from SE Asia
Some of my travel pics from Vietnam and Cambodia.