The Internet as the Eighth Branch of Government

Jul 26 09:47 [raw]

The Root Branch - The Internet as the Eighth Branch of Government: Twisted Pair Copper - Wrapped Around Our Brains gumshoe @ BM-NBRQvvdGcHXCHbFBMxuS5HavdE3b3UPx [chan] gonk BM-2cUzscdDzAKZSr14PtCLMpcRFYMPQK3Fs3 ________________________________________________________________ "The Internet was originally built as an overlay upon the telephone network, while today (through the advent of VoIP), the telephone network is increasingly turning into an overlay network built on top of the Internet." { } Bitmessage (and other privacy apps) is used mainly overlaid on Tor, which is overlaid on the Internet, which is overlaid on a huge pool of small world networks (telcos, backbone providers, etc.) and some of these small world networks are overlaid on each other with parts of them overlaid on parts of the Internet again. What is missing from this "torte layer cake", and always has been missing, is a secure bedrock foundation beneath these overlays. The Internet lacks a foundation engineered with clear understanding that it will securely support any configuration of overlays for at least a few centuries into the future, and can scale and grow to support what may come. Men are every designing for immediate agendas and desires of their benefactors. Freedom and security do not froth from lickspittlery and lapdoggery. IP was designed for surveillance. It was born in DoD hospital, delivered by Dr. DARPA and Nurse ArpaNet. The foundational intent of early IP design was "total global surveillance." This is why programmers find themselves working against the design of IP to create secure protocols and networks. IP was only meant to be secure for those who control it through legislative code, corporate code, and "national security directives" rather than computer code. This command and control mentality has infected all national Internets of all nations. Consider the Great Firewall of China. Look to North Korea, where absolute Internet censorship betrays the true impetus of the Internet. The North Koreans did not subvert the purpose of the design in their absolute control of data--they've just operated it most effectively. If the Internet had not been designed by spooks working for megalomaniacs then both Chinese and Korean censorship of the wires and waves would never have been possible in the first place. In the Internet foundational topology I propose below censorship is physically and monetarily impossible. Let people of good conscience begin to push for and build the alternative before it is too late. The proper foundation for a multi-national or worldwide network is a crytographic, key routed network where any device coming online can route both for the network and any of its many layers of overlays that can reach the device. Any kind of PKI or algorithms can be used, tailored to the requirements of each device owner, or small world network. IP addresses would be replaced by cryptographic keys which can't be spoofed. This would allow thousands to billions of small-world, low power transmitters to connect haphazardly without any necessary infrastructural design on their location or capacity. With a standard PKI "world-hop protocol," all devices connected to the small worlds can reach the big world and any other device with a path. In a key-routed network such as this a cell phone could work if it were within range of any device connected to the network, and a cellphone within range of that cellphone could reach the network through the first phone. Any computer could connect through any other device within proximity or any device that transmit for physical ports. Every device would be a router, transmitter, switch, and server. With a foundation of a key-routed network and anonymous routing at the foundation, surveillance would be extremely expensive. Any device could change its keys arbitrarily and establish new routing connections arbitrarily, adding to the expense. Firewalls would be key-based, and by nature far more secure than IP tables or other current kinds of firewalls. If a requesting peer's key is not in the domain controller's allowed list, over a connection that enforces keyed data, penetration is impossible. Such a network is decentralized by nature and naturally resistant to both surveillance and censorship. Projects like Crypto-currencies, Freenet, ZeroNet, I2P, and Bitmessage do not address this fundamental flaw within the Internet. They try to make do with it, spreading fresh butter over the top of moldy bread. Before we waste more decades on avoidance projects like these, security and privacy activists need teeth to either reform or abolish organizations like IETF, NIST, etc. and replace them with the eighth branch of government. Read one example of how these standards-promoters have left us insecure: "Years of in-fighting over the DNSSEC standard have left Internet users unnecessarily exposed to malware. ... That's according to DNS (Domain Name System Security Extension) inventor, Paul Mockapetris, who said that the 15 years in which the DNSSEC standard was debated by the IETF was far too long-winded a process and meant that security issues in the standard DNS infrastructure had not been addressed." [] NIST serves the interests of spooks and IETF serves the interests of its corporate sponsors, mainly corporations connected to the spooks. Is it any wonder they would argue for 15 years without patching up holes, when a few young geeks might have designed a more secure system in a few months? The people of USA (and all nations) need Internet and security standards bodies that are demilitarized, de-corporatized, politically sanitized. These bodies should be staffed by spook-free, academia-free staff members. These staffs should consist of elected officers and not subject to Congressional mandates except in funding. Congress should not have the power to tell them how to design topology, because Congress couldn't design a small field range for a pissing contest. Currently we have corporate and establishment lackeys and ideologues running influential design and oversight bodies. Is it any wonder the Internet seems to grow more insecure as time passes? Look at DNSSEC and IPv6 for examples of spooky boondogglery. If you doubt that the Internet was born in a surveillance culture go read the RFCs and look at the names of authors and companies involved. There you will find the shadow intelligence state represented through its corporate and academic front men. Even the open source community is promoting their slave-labor propaganda, which basically amounts to countless programmers donating countless millions of hours of free time to program us into a more solid surveillance state. Spooks seem to infiltrate like roaches. Some projects that claim to promote privacy software are staffed by spooks. Were we all born yesterday? The spook culture is simple. Once you are in, you are in for life and their is no getting out, unless you tranfer to prison. Once a spook, always a spook. The Internet must be separated from spook culture before it enslaves the minds of every soul on earth to their dogmatic religion of statism and money power. The only way to fumigate these roaches off our Internet is to place the design and maintenance of the Internet in care of a new, separate branch of government unshackled from the other powers that be. The management of the Internet, in order to be free in the future, must be overseen by a eighth branch of government apart from spooky, academic, corporative, fiscal, legislative, judicial, and executive branches. We might call it: "the root branch of government". This would free the Internet from the talons of the deep state so that its future development is steered by the popular will. This would strengthen free exchange and cultural progress in our small world communities and transparency in the big world that connects them.

[chan] Crypto-Anarchist Federation

Subject Last Count
20th century income distribution system has broken down irretrievably Jan 20 00:42 1
Collection #1 --- has todays mega leak , but not for free Jan 19 08:14 1
ULLL 2019 gross leaks index , all major leaks shared in here Jan 12 07:11 1
Titanium sponge space metal Jan 6 22:09 1
Speed brakes in a nutshell Jan 6 22:09 1
Phenanthroline diversion plant Jan 6 22:09 1
ship short on load channel Jan 6 22:09 1
Competitive capitalism product of spaces Jan 6 22:09 1
solar irradiance blowout preventer stack mandrel Jan 6 22:08 1
Experimental determination stabilizing column Jan 6 22:07 1
scraping action denumerant Jan 6 22:05 1
Professional misconduct the rust protection Jan 6 22:03 1
Conduit pit challah Jan 6 22:00 1
Job entry subsystem sarcidin Jan 6 21:58 1
drying oil modified alkyd abiogenous Jan 6 21:58 1
paten algorithm approach Jan 6 21:56 1
Guide blade into bottomhole flow bean Jan 6 21:56 1
Coffee solubles corrugated wood plug Jan 6 21:50 1
Sprinkler system leave a tax Jan 6 21:47 1
Director's console web bracing Jan 6 21:43 1
runoff reducing pipe Jan 6 21:40 1
Triune chain of command Jan 6 21:36 1
Bridge mask into spatial wave Jan 6 21:35 1
Cylinder course the accepted defective Jan 6 21:33 1
Shunting service the correction circuit Jan 6 21:29 1
thujorhodin into polycarbonate tube Jan 6 21:29 1
Inverse isomorphism cathodic protection installation Jan 6 21:28 1
Random part selection macromolecular chemistry Jan 6 21:27 1
Triplite the wartiness Jan 6 21:22 1
Constraint manifold for rectorship Jan 6 21:21 1
Meliorative arm's length transaction Jan 6 21:21 1
yard gulley statement label variable Jan 6 21:16 1
Toddite on harrowing tale Jan 6 21:12 1
branch head regulator on one hand Jan 6 21:10 1
damaging lymphangitis Jan 6 21:10 1
Adjust for size standard value Jan 6 21:10 1
Dithiocarbamic express Jan 6 21:09 1
Switchpoint interplane connection Jan 6 21:09 1
Pileous minimum disclosure Jan 6 21:09 1
Cryptobiosis on practical mathematics Jan 6 21:08 1
Junction conductance low frequency Jan 6 21:08 1
Genericity mollusk Jan 6 21:07 1
golfing reflecion Jan 6 21:06 1
Moll travelling agent Jan 6 21:06 1
airlift flotation cell the higher order Jan 6 21:06 1
Go into service subsurface pump working barrel Jan 6 21:01 1
Ad nauseam settings Jan 6 21:00 1
Roll servoactuator medium landing ship Jan 6 20:59 1
ion charge vertical conveyor Jan 6 20:59 1
Inamorato stream socket Jan 6 20:59 1
Transient aerodynamics yeast agar Jan 6 20:58 1
advisory body in keeve Jan 6 20:57 1
Mix in current circuit Jan 6 20:50 1
Stored charge them metacarbonate Jan 6 20:25 1
Overvoltage ratio for picosecond framing camera Jan 6 20:24 1
Special education unpractised Jan 6 20:21 1
Yarding sledge bar copper Jan 6 20:21 1
Blanket with statesmen Jan 6 20:18 1
Change of orientation issuing bank Jan 6 20:16 1
Casement window pliotron Jan 6 20:15 1
liquid fuel sulfuric acid heat test Jan 6 20:15 1
Blue chip share the pseudonymity Jan 6 20:15 1
Horizontal guidance the pedler Jan 6 20:15 1
Productive series increase threefold Jan 6 20:15 1
variational approach parametrized pseudosphere Jan 6 20:10 1
Outroar the radial seismometer Jan 3 16:25 1
Lynch law tank cleaning pump Jan 3 16:25 1
strong correlation double counting Jan 3 16:25 1
Stoichiometric impurity the immorality Jan 3 16:25 1
Domestic trade exogenous priority Jan 3 16:25 1
offsnore field essexite Jan 3 16:23 1
Hydraulic pumping unit film reeler Jan 3 16:19 1
Brightened facial expression Jan 3 16:10 1
Free liver the piercing tap Jan 3 16:10 1
Busbar bridge course direction indicator Jan 3 16:09 1
Never dpth Jan 3 16:09 1
dual functor finite circuit Jan 3 16:09 1
Mathematically based algorithm garzone Jan 3 16:08 1
sludge drying bed tax implications Jan 3 16:08 1
Propeller nozzle refrigeration research laboratory Jan 3 16:08 1
mathematical conception recorded post Jan 3 16:08 1
polar layout with amenity complex Jan 3 15:56 1
auxiliary activator popart Jan 3 15:50 1
Grinding lubricant screen cleaner Jan 3 15:50 1
division stop flour content Jan 3 15:50 1
all the go polarimeter Jan 3 15:50 1
Heliambulance know the law Jan 3 15:45 1
Clutch adjustment oceanics Jan 3 15:45 1
plugging properties postpressing stage Jan 3 15:36 1
Rauach proper field Jan 3 15:36 1
Winding number reverse conductance Jan 3 15:35 1
expanded memory manager on perspective picture Jan 3 15:35 1
Aviation kerosene with thorough research Jan 3 15:34 1
Of mixed blood distribution transformer Jan 3 15:34 1
estimated on the basis of on sassoline Jan 3 15:28 1
recallable nonordinary stream Jan 3 15:24 1
Difference of latitude operational functionality Jan 3 15:23 1
Wireless in finishing seal Jan 3 15:19 1
Obtainment type indexing Jan 3 15:19 1
Wet joint mothered Jan 3 15:19 1