Remote "Rogue" Access Points...

    Testing a POCs in the "Real World" is extremely dangerous. Not just from people or software trying to stealing my POC's or PIP while testing; but mostly from the fear of being "Digital Fingerprinted", "discover", or Virginia Farm boy would come running. So I would use additional random credentials, spoofed fingerprints, and piggyback on rogue access points... to try to keep my privacy tests online, private:)

      From 2002 to 2016, I created, used, and distributed physical (wired and wireless) Remote Random Rogue Access Points, which were loaded with software, like my eOS, Tor, and Spoofed Relays that helped connect to remotely assessable IP's, gateways, portals, and nodes....  This mini encrypted network helped me connect to access points around the world, to simply avoid my local IP provided(Spectrum), known/unknow DNS, or governmental agencies hardware/software, so I can safely and unbiasedly test or validate my own PIP algorithms, techniques, POC, protocols, TOADDs, etc...  :)

End of Line NOte:


      Unfortunately after July of 2016, I started to systematically removed and terminated all of my hardware, software, and wireless remote access points, mostly become our digital frontier had increasingly become way too dangerous for my to test or play on: especially with all those digital landmine servers (foreign and domestic) from Governments, Agencies, and Countries that are almost impossible to avoid...  :/


So regrettably,

all my core rogue access points

where destroyed or remotely terminated,

and it's software now lives next to the

"Arc of the Covenant "...

" Update... 2022 "


   Having said all of that...


   When Putin decide to make a land grab for Ukraine land, by invading and  killing thousand of Ukrainian people, You should know by now that I would never sit idly by...

 

   So to balance the equation of warfare, I simply revived any accessible servers, IP's, gateways, portals, nodes, remote "Rogue" access points, activated automated bot armies, blah, blah, blah...


   ... And then volunteered to works with the Armed Forces of Ukraine/IT Army, other associated groups, and digital developers, who fund, program, and push the digital cyber warfare realm(s) forward, by using programs and techniques to detect, exploit, and implement software to release/decentralize data (which helps find illegal or foreign oligarchies digital assets), where "automated functions" then can injects digital cypher locks, data destroying encryption programs or malware-to permanently nuke an oligarchies illegal or foreign income(s), digital wallets or assets during Russia's illegal invasion of Ukraine (from circa February 25, 2022 to...? )


End of Soap Box Lecture


  End of Line?