Remote "Rogue" Access Points...
Testing a POCs in the "Real World" is extremely dangerous. Not just from people or software trying to stealing my POC's or PIP while testing; but mostly from the fear of being "Digital Fingerprinted", "discover", or Virginia Farm boy would come running. So I would use additional random credentials, spoofed fingerprints, and piggyback on rogue access points... to try to keep my privacy tests online, private:)
From 2002 to 2016, I created, used, and distributed physical (wired and wireless) Remote Random Rogue Access Points, which were loaded with software, like my eOS, Tor, and Spoofed Relays that helped connect to remotely assessable IP's, gateways, portals, and nodes.... This mini encrypted network helped me connect to access points around the world, to simply avoid my local IP provided(Spectrum), known/unknow DNS, or governmental agencies hardware/software, so I can safely and
unbiasedly test or validate my own PIP algorithms, techniques,
POC, protocols, TOADDs, etc... :)
End of Line NOte:
Unfortunately after July of 2016, I started to systematically removed and terminated all of my hardware, software, and wireless remote access points, mostly become our digital frontier had increasingly become too dangerous for my to test or play on, especially with all those digital landmine (foreign and domestic) that servers, Governments, Agencies, and Countries use everywhere... :/
So regrettably,
all those core rogue access points
where remotely terminated/destroyed
and software now lives next to the
"Arc of the Covenant "...
Having said that now in 2022...
I can not idlely sit by when I see countries being attacked for a land grab or greed, and the kill innocence people.
I then remembered that some of my Remote Random Rogue Access Points were still alive, and that I had a large idle bot army (that I confiscated years ago from czech team), and I decided to put them back into use.
I volunteered and worked for the Armed Forces of Ukraine/IT Army, other associated groups, and digital developers, who fund, program, and push the digital cyber warfare realm(s) forward, by using programs and techniques to detect, exploit, and implement software to release/decentralize data (which helps find illegal or foreign oligarchies digital assets), where "automated functions" then can injects digital cypher locks, data destroying encryption programs or malware-to permanently nuke an oligarchies illegal or foreign income(s), digital wallets or assets during Russia's illegal invasion of Ukraine (circa February 25, 2022 to......? )
...End of Line...
" Update... "
Since Putin decide to make a land grab for Ukraine,
by invading and actively enforcing/causing Ukrainian genocide, You know I could not sit idly by...
I revived remotely assessable IP's, gateways, portals, nodes, bots, and volunteered to works with the Armed Forces of Ukraine/IT Army, other associated groups, and digital developers, who fund, program, and push the digital cyber warfare realm(s) forward, by using programs and techniques to detect, exploit, and implement software to release/decentralize data (which helps find illegal or foreign oligarchies digital assets), where "automated functions" then can injects digital cypher locks, data destroying encryption programs or malware-to permanently nuke an oligarchies illegal or foreign income(s), digital wallets or assets during Russia's illegal invasion of Ukraine (circa February 25, 2022 to...? )
...End of Lecture...
NOte:
Classified and Non-Classified Material:
*TOADDs: Theoretical Observation Antecedent Derivation & Deviations
WARning:
I am indemnified by my 'Freedom of Speech' protected by the First Amendment to the United States Constitution, Article 1, Section 8, Clause 8 of the U.S. Constitution, as it relates to Federal law according to 17 U.S.C. Section 102(a), the ' Freedom of Information Act ', and the Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO).
I have never professionally worked for
the NSA, FBI, QHCG, Blah, Blah, Blah...
I always did everything "in the open" with ethical authority.
I intentionally allowed (and currently) the NSA (and others) to prob my servers, cell phones, laptops, and data files;
all in an effort to prove that I am/was NOT a Terrorist, Hacker, Foreign Agent, Hacktivist, Warmonger or Enemy Combatant.
I am just Me. :)
Copyright infringement is a civil and criminal offense. Do not recreate or copy any of my Intellectual Propriety-IP, content or data here within this website. Willful violation(s) can result in penalties beyond $100,000 per infringement. No portion of this site may be reproduced, printed, photocopied or copied by any other means of digital or mechanical reproductions, without prior written permission, from this website's owner.
FACT:
Google, Amazon, Instagram, and Facebook,
all know more about you and your "intimate privacy", than the: NSA, CIA, Homeland, FBI, GCHQ, MSS, FSB, etc..., combined!!!!! :(
Fact:
Your "Right to Privacy" under the The Bill of Rights, which refers to the concept that one's personal information is protected from public scrutiny, is constantly violated by Google, Amazon, Facebook, etc.; they all abuse your trust, by collecting "private information" in the race to exploit your personal information/habits for money and profits.
This is a sad Fact! :(
Thank you for your interest!
I will get back to you, within the Near Distant Future; as it all depends on your personal perspective of space time, minus the mean lifetime of an 238U isotope, multiplied by the equal distance of M87's accretion disk, divided by the null flux rate of a decaying prompt neutron lifetime and multiplied by the weight of Uranus.
Mahalo :)
Oops, there was an error in the Matrix with sending your message.
Please try again later this century. Mahalo :)