Tor Honeypot Attack

It’s a hilarious demand for hackers to make of anything that enforcement should be ramped up to begin with. One topic that has really caught my attention was how last year the entire management of the tor browser project allowed itself to be upended by sexual misconduct allegations made against one of its members. This software gets widely recommended in the security community for being capable of effectively encrypting your internet connection against many types of potential adversaries....

April 26, 2018

Preservation of Online Video Game Servers

Project Goals: Art Restoration & Preservation of Newly Formed Video Game Era High Speed Real Time Encrypted Networking Negotiation of Terms With Large Corporations and Their Excessive Use of Legal Force Liberation of Art Through Encryption, Anonymity, and Distributed P2P Client Networking The plan I had at the beginning was to effect a noticeable problem that was starting to crop up all over the place. Encryption kept coming up over and over again in the media....

April 27, 2016

The American Psychological Association's Involvement in CIA Torture

Jean Maria Arrigo, among others, attempted to expose the crimes of the APA’s involvement in torture for over a decade before the information even began to become public knowledge. In COPS11 she and her colleagues divide operational psychology into two fields: adversial, which is highly suspect, and collaborative, which quite ambiguously serves to ‘optimize performance’. What then follows consists in a brief survey of recent developments in the field of American psychology from the beginning of the 20th century onward....

February 12, 2016