The Internet as the Eighth Branch of Government

BM-2cUzscdDzAKZSr14PtCLMpcRFYMPQK3Fs3
Jul 26 09:47 [raw]

The Root Branch - The Internet as the Eighth Branch of Government: Twisted Pair Copper - Wrapped Around Our Brains gumshoe @ BM-NBRQvvdGcHXCHbFBMxuS5HavdE3b3UPx [chan] gonk BM-2cUzscdDzAKZSr14PtCLMpcRFYMPQK3Fs3 gumshoe@danwin1210.me http://gumshoe.ml ________________________________________________________________ "The Internet was originally built as an overlay upon the telephone network, while today (through the advent of VoIP), the telephone network is increasingly turning into an overlay network built on top of the Internet." { https://en.Wikipedia.org/wiki/Overlay_network } Bitmessage (and other privacy apps) is used mainly overlaid on Tor, which is overlaid on the Internet, which is overlaid on a huge pool of small world networks (telcos, backbone providers, etc.) and some of these small world networks are overlaid on each other with parts of them overlaid on parts of the Internet again. What is missing from this "torte layer cake", and always has been missing, is a secure bedrock foundation beneath these overlays. The Internet lacks a foundation engineered with clear understanding that it will securely support any configuration of overlays for at least a few centuries into the future, and can scale and grow to support what may come. Men are every designing for immediate agendas and desires of their benefactors. Freedom and security do not froth from lickspittlery and lapdoggery. IP was designed for surveillance. It was born in DoD hospital, delivered by Dr. DARPA and Nurse ArpaNet. The foundational intent of early IP design was "total global surveillance." This is why programmers find themselves working against the design of IP to create secure protocols and networks. IP was only meant to be secure for those who control it through legislative code, corporate code, and "national security directives" rather than computer code. This command and control mentality has infected all national Internets of all nations. Consider the Great Firewall of China. Look to North Korea, where absolute Internet censorship betrays the true impetus of the Internet. The North Koreans did not subvert the purpose of the design in their absolute control of data--they've just operated it most effectively. If the Internet had not been designed by spooks working for megalomaniacs then both Chinese and Korean censorship of the wires and waves would never have been possible in the first place. In the Internet foundational topology I propose below censorship is physically and monetarily impossible. Let people of good conscience begin to push for and build the alternative before it is too late. The proper foundation for a multi-national or worldwide network is a crytographic, key routed network where any device coming online can route both for the network and any of its many layers of overlays that can reach the device. Any kind of PKI or algorithms can be used, tailored to the requirements of each device owner, or small world network. IP addresses would be replaced by cryptographic keys which can't be spoofed. This would allow thousands to billions of small-world, low power transmitters to connect haphazardly without any necessary infrastructural design on their location or capacity. With a standard PKI "world-hop protocol," all devices connected to the small worlds can reach the big world and any other device with a path. In a key-routed network such as this a cell phone could work if it were within range of any device connected to the network, and a cellphone within range of that cellphone could reach the network through the first phone. Any computer could connect through any other device within proximity or any device that transmit for physical ports. Every device would be a router, transmitter, switch, and server. With a foundation of a key-routed network and anonymous routing at the foundation, surveillance would be extremely expensive. Any device could change its keys arbitrarily and establish new routing connections arbitrarily, adding to the expense. Firewalls would be key-based, and by nature far more secure than IP tables or other current kinds of firewalls. If a requesting peer's key is not in the domain controller's allowed list, over a connection that enforces keyed data, penetration is impossible. Such a network is decentralized by nature and naturally resistant to both surveillance and censorship. Projects like Crypto-currencies, Freenet, ZeroNet, I2P, and Bitmessage do not address this fundamental flaw within the Internet. They try to make do with it, spreading fresh butter over the top of moldy bread. Before we waste more decades on avoidance projects like these, security and privacy activists need teeth to either reform or abolish organizations like IETF, NIST, etc. and replace them with the eighth branch of government. Read one example of how these standards-promoters have left us insecure: "Years of in-fighting over the DNSSEC standard have left Internet users unnecessarily exposed to malware. ... That's according to DNS (Domain Name System Security Extension) inventor, Paul Mockapetris, who said that the 15 years in which the DNSSEC standard was debated by the IETF was far too long-winded a process and meant that security issues in the standard DNS infrastructure had not been addressed." [https://www.pcworld.com/article/153667/security_dns.html] NIST serves the interests of spooks and IETF serves the interests of its corporate sponsors, mainly corporations connected to the spooks. Is it any wonder they would argue for 15 years without patching up holes, when a few young geeks might have designed a more secure system in a few months? The people of USA (and all nations) need Internet and security standards bodies that are demilitarized, de-corporatized, politically sanitized. These bodies should be staffed by spook-free, academia-free staff members. These staffs should consist of elected officers and not subject to Congressional mandates except in funding. Congress should not have the power to tell them how to design topology, because Congress couldn't design a small field range for a pissing contest. Currently we have corporate and establishment lackeys and ideologues running influential design and oversight bodies. Is it any wonder the Internet seems to grow more insecure as time passes? Look at DNSSEC and IPv6 for examples of spooky boondogglery. If you doubt that the Internet was born in a surveillance culture go read the RFCs and look at the names of authors and companies involved. There you will find the shadow intelligence state represented through its corporate and academic front men. Even the open source community is promoting their slave-labor propaganda, which basically amounts to countless programmers donating countless millions of hours of free time to program us into a more solid surveillance state. Spooks seem to infiltrate like roaches. Some projects that claim to promote privacy software are staffed by spooks. Were we all born yesterday? The spook culture is simple. Once you are in, you are in for life and their is no getting out, unless you tranfer to prison. Once a spook, always a spook. The Internet must be separated from spook culture before it enslaves the minds of every soul on earth to their dogmatic religion of statism and money power. The only way to fumigate these roaches off our Internet is to place the design and maintenance of the Internet in care of a new, separate branch of government unshackled from the other powers that be. The management of the Internet, in order to be free in the future, must be overseen by a eighth branch of government apart from spooky, academic, corporative, fiscal, legislative, judicial, and executive branches. We might call it: "the root branch of government". This would free the Internet from the talons of the deep state so that its future development is steered by the popular will. This would strengthen free exchange and cultural progress in our small world communities and transparency in the big world that connects them.

[chan] Crypto-Anarchist Federation
BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v

Subject Last Count
1 Sep 19 13:20 2
111 Sep 18 22:09 1
eita Sep 14 20:36 1
ankw Sep 14 20:36 1
ltd Sep 14 20:36 1
ycy Sep 14 20:36 1
bzgk Sep 14 20:25 1
imy Sep 14 20:25 1
pmrc Sep 14 20:14 1
vgz Sep 14 20:11 1
npjyr Sep 14 20:08 1
puij Sep 14 20:05 1
yml Sep 14 20:03 1
vcw Sep 14 20:02 1
kbkz Sep 14 19:58 1
byfx Sep 14 19:58 1
vdqqy Sep 14 19:57 1
ngcj Sep 14 19:56 1
ficeu Sep 14 19:54 1
gduv Sep 14 19:46 1
yczg Sep 14 19:46 1
jiy Sep 14 19:45 1
xun Sep 14 19:44 1
zft Sep 14 19:44 1
eto Sep 14 19:44 1
mqtjx Sep 14 19:44 1
uow Sep 14 19:43 1
odo Sep 14 19:43 1
bjzd Sep 14 19:41 1
pczer Sep 14 19:23 1
dob Sep 14 19:23 1
dni Sep 14 19:23 1
xldp Sep 14 19:23 1
ukzj Sep 14 19:20 1
yhx Sep 14 19:15 1
egjo Sep 14 19:12 1
zxg Sep 14 19:07 1
gihxd Sep 14 19:07 1
rqow Sep 14 19:07 1
sgaj Sep 14 19:07 1
mvttv Sep 14 19:06 1
lakyj Sep 14 19:04 1
jxns Sep 14 19:03 1
sbxp Sep 14 19:00 1
sgqic Sep 14 18:59 1
cxr Sep 14 18:58 1
cur Sep 14 18:56 1
malxq Sep 14 18:56 1
hhjf Sep 14 18:56 1
gyei Sep 14 18:50 1
dhfiw Sep 14 18:48 1
qkz Sep 14 18:32 1
zqzc Sep 14 18:31 1
aanp Sep 14 18:29 1
llezn Sep 14 18:25 1
ybqir Sep 14 18:10 1
orl Sep 14 18:10 1
tfbhw Sep 14 18:00 1
wha Sep 14 17:48 1
ovv Sep 14 17:48 1
rch Sep 14 17:44 1
rdxp Sep 14 17:44 1
zom Sep 14 17:40 1
vmdk Sep 14 17:37 1
pxvwp Sep 14 17:34 1
kkrdt Sep 14 17:31 1
ukbw Sep 14 17:30 1
gzsh Sep 14 17:29 1
yilmg Sep 14 17:19 1
rtpqj Sep 14 17:17 1
egxt Sep 14 17:12 1
shymw Sep 14 17:12 1
lgn Sep 14 17:08 1
cga Sep 14 17:08 1
rmlc Sep 14 17:08 1
jom Sep 14 17:08 1
rcc Sep 14 17:08 1
qht Sep 14 17:06 1
ukqep Sep 14 16:47 1
puxwg Sep 14 16:47 1
shin Sep 14 16:47 1
uftg Sep 14 16:47 1
gfp Sep 14 16:46 1
xjz Sep 14 16:39 1
afnp Sep 14 16:38 1
jokre Sep 14 16:36 1
acsyd Sep 14 16:30 1
zkqnl Sep 14 16:29 1
qpx Sep 14 16:29 1
zwlf Sep 14 16:29 1
eiu Sep 14 16:25 1
rgvs Sep 14 16:19 1
qkcs Sep 14 16:19 1
ewoe Sep 14 16:13 1
aylru Sep 14 16:11 1
ljacu Sep 14 16:06 1
dmub Sep 14 16:06 1
vithq Sep 14 16:06 1
zfcv Sep 14 16:01 1
glwvv Sep 14 16:00 1