Tuesday, September 16, 2014

Earthship


There are many projects out there, but earthship.com has to be one of the most creative and at the same time available for everybody, anywhere in the world. Even if you can't afford their tuition fees and blueprints, the ideas are there for you follow, and start living off the grid.

-DM


http://earthship.com

http://earthship.com/mexico
http://earthship.com/Designs/global-model







Friday, September 12, 2014

Biometrics and the eyePhone... by @feexitmx






Biometrics is the science and technology that measures and analyses biological information. For technology purposes, biometrics are all those body features such as DNA, fingerprints, retina and iris, facial and voice patterns, and hands measures; all these just for authentication issues. Bio metrical authentication is something common in many governmental and private security systems.
 
 

To prevent information theft, the biometric data is encrypted… it is said that the use of biometrics improves the security and possibly we won't have to use passwords anymore; but to what extent we will be destroying the sacred principles of privacy just to get a little bit of comfort. As Thomas Jefferson once said: Those who would trade in their freedom for their protection deserve neither.

 
 

It's just technology, and we believe that. There is nothing wrong with it, matter of fact, we cherish it!; the problem is the organization(s) who compiles it, analyzes and stores this information. It's true that in many occasions passwords are forgotten, especially when someone else assigned them; but it is also true that companies responsible for protecting these data have their own "tiny mistakes"... or would like you to ask the girls again?

[Pulls up a knife] Did somebody hurt you my boy?

 
 

AGNITiO = Voice recognition. 
FingerQ= wants your fingerprints.  
Nok Nok Labs= also wants your fingerprints.  
CrucialTec= is a remote control with a fingerprint scanner. 
GO-Trust = Is a Java microSD card, that replaces the process of password authentication… yes, Java
Sonavation = personal biometric device… your own badge.  
Eyelock= wants to use your iris as a password. 
Tobii= eye scanner, does not offer a thing, security-wise, but it is awesome when it comes to tracking. 
Digital InnerID and your yummy fingerprints.

I can't believe...
 




 
The International Biometric Society
http://www.biometrics.gov/

Zdi… come again?

During his presentation at
HOPE/X (Hackers On Planet Earth) in New York, Jonathan Zdziarski presented the case study: "Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices" — Zdziarski mentions that there are 3 backdoors running in almost 600 million iPads & iPhones, and that there is a good chance that the NSA uses them to collect information.
 

Apple's response to Zdziarski was... beautiful: "...backdoors are diagnostic functions and do not compromise user privacy and security.". Just like the girls… or like Bonjour.







@feexitmx
www.feexit.mx
rp@feexit.mx

Wednesday, September 10, 2014

#battleforthenet #NetNeutrality #InternetSlowDown

Because we believe that people should communicate just because WE ALL live in this planet; that's why we participate with our hearts, souls and voices... #battleforthenet #NetNeutrality #InternetSlowDown

Friday, September 5, 2014

The Waterfall 1.0



Cascada de las Brisas. Cuetzalan, Puebla. Mexico. 

Are smartphones part of the New World Order?




Are smartphones part of the New World Order?



This article was not written with the intention of "sataniz
e" technology, or to criticize the communication and socialization habits of individuals. The approach that Feexit's R&D would like to make is that technology is a TOOL, not a way of life nor life itself. In R&D we see trends, myths and problems, and we are always looking for new ideas to make LIFE easier for people; but unfortunately, many people take the new trends in technology as if they were, somehow, a chance to buy a new life. As information loads increase, and the access to that information becomes easier, the degree of skepticism in people doubles. It is not about having solid evidence anymore (paper, audio, video… etc). Nowadays it is a matter of beliefs; “whatever the mass believes” that comes from the socialization process; in some other cases, it is plain ego. Very few people dare to think that just because they are using a Smartphone they are being manipulated and introduced into a structure that allows Governments and large corporations to control "their environment".

"EVERYBODY KNOWS THAT" when you buy a phone:
  1. You will be screwed for the next 12, 18 or 24 months, because of that contract with Mobile Operator. 
  2. Through the eyes of the world, the person is happy, successful and sophisticated because he/she is using cutting edge technology… Quoting JosĂ© Nero: “Technology is that which is being used". 
  3. The socialization process will be fulfilled because there is a “capacity” to talk-exist-interact with other people through the most popular and accepted Apps (for society)… Candycrush? (Don't believe us? Stop using your mobile and social networks for a month). 
  4. You can have access to whatever it is that you consider your "favorite music" and watch videos on Youtube... etc. 
  5. Once more, the ghost of “basic” socialization through Facebook, Twitter and other social networks.


What we do not know is that:

  1. Someone has access to contacts, notes, messages, photos, etc. without any authorization… and no, saying “I do not want to...” is not enough. "I thought I erased them". 
  2. Someone knows where you are... and no, it's not your boyfriend/girlfriend; wife/husband... bookie. Would you like to ask Malte Spitz about it? 
  3. A large number (80%) of conversations are recorded and stored by a "disguised" App, to later be sent through Wi-Fi to some "unknown location", the same principle applies to text messages and other operations proper of a "Smartphone”. 
  4. You will need some black humor for this one, but you pay on a monthly basis to be spied upon.

There are way too many articles and essays about technology; but most of the time, they won't talk about us, HUMANS, and what lose because of the addictions generated by the Smartphone and Technology in general. “EVERYBODY KNOWS THAT” there are beautiful things outside, things that need to be shared (that's why they have Instagram); but there is no application or emulator that will allow you to have a proper drink in a restaurant or a bar; with colleagues, relatives or friends. Even though we are living in a great time in human history, due to the abundance of information and knowledge; for most people life happens through a screen, a screen that for the new generations is influencing their personal development.

EVERYBODY KNOWS THAT” the use of these devices is addictive; and just like PORN, yes, PORN! (Erototoxins); we as individuals are being isolated and lead to believe that coexistence is only possible through a device connected to a social network. We are being conditioned to believe that the world out there is so dangerous and evil, that it is almost impossible to meet good people in the real world (sadly, most people do believe that).



In the article The Ghosts of our Fathers we explained the monitoring system that covers most of the planet (or at least, the most populated areas), in which the individual believes that the Internet is in fact one form of entertainment and simultaneously the way to socialize… Wall-E?.

“EVERYBODY KNOWS” and by “knowing” they can be sure that this planet is part of a control experiment that “Daddy Government” has designed to know "EVERYTHING" about us and to keep us from making the things that will affect whatever they consider the best for the family-country; yes, because they DO LOVE US very much… on their unique way, that is.


Going back to the concept of "EVERYBODY KNOWS" and altering it just a bit; everybody should know what MAC really is (no, not the CIA-financed company...Steve Jobs). MAC, or MAC address, is a unique and mandatory identifier for each computer connected to a network of any kind and anywhere. The same principle applies to mobile phones, tablets, iPod Touch, etc. Everything what it is connected to a network, must be identified and it must be through this unique MAC address. Example: Malte Spitz???


“EVERYBODY KNOWS” what the IMEI number is (we hope!), the International Mobile Equipment Identity

is like the Eye of Sauron, it knows where you are, where you connect from and even when you change your SIM card (Mobile Network Operator) thanks to IMEI you will not be able to hide the fact that the phone is yours (the things change if you get robbed, though)…

“This is a Feexit community service”

Before your telephone gets robbed, make sure to dial this code in your phone, in order to obtain the IMEI number.
*#06# Write it down (not in the phone, of course!) and keep it safe.

There is a myth out there that we shall name "Myth #66", in which there is a belief that when the phone is off, all communications die. The answer is NO

Even though the device is off, it will remain detectable in the network and the location can be set by means of triangulation, because the device keeps emitting radio signals and these signals come from the IMEI. So even if its on, off or you set it on fire, “… they know that you will buy a new device... probably the newest and most advanced, that you will obviously pay for it and will remain part of that New World Order;

meaning, being isolated and virtually enslaved, losing touch with the real world while they enjoy the real wealth that comes out of your daily labor and translates into massive consumption (which they own); do not forget that they also feed from that "delicious intelligence" you give them every time your personal life goes into a social network (they also feed from the things you do not publish, malware?) - Numeratti by Stephen Baker


Remember, when a device has greater capacity, accessibility and connectivity; it is easier to be identified, monitored and intervened.


Dude, everybody knows that!”


Microsoft Office features your name, name of the machine, initials, name of the company and any information to review the documents that are created. According to this Microsoft article, the best way to remove metadata (remember?) is the following... Tools | Options | Security Tab | "Remove personal information from this file on save".

Even though...




This is the ”
How to safety publish sanitized reports “ guide by the NSA, a very interesting document.


id@feexit.mx





Wednesday, September 3, 2014

The ghosts of our fathers.




 
The ghosts of our fathers.
(Los fantasmas de nuestros padres.  Published on August 29th, 2014)


All this happened after 9/11, 2001; and it seems like it was planned years before. The clearest piece of evidence is The USA PATRIOT ACT ; Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001; a document that was written and approved in less than 40 days, around 363 pages that due to the events that followed it is safe to say that Jim Sensenbrenner did not even read them; but "somehow" are the guideline when it comes to National Security all over the world.

In the article, En la ausencia de la verdad… (In the absence of the truth…yet to be translated) we explained how the NSA was born, and showed some of its greatest achievements. Snowden or not, all this adventures had already been exposed in different forums around the Deep Web and in many other underground communities… that was 10 years ago, today  Mainstream Media talks about it and in between lines they say: “…in spite of everything that happened and will happen; You, The User, will keep feeding us that delicious information. Good night.”

The Five Eyes

Every great mystery story has a super villain or a Secret Society; in this case, politicians that were “elected by the people”. They came together to protect their interests, no matter what.

 

 

The Five Eyes (FVEY) is an alliance between Australia, Canada, New Zealand, United Kingdom and the United States. These countries are united through a Multilateral Agreement, the
UKUSA Agreement  of joint cooperation in topics such as “Signals Intelligence”. Signals intelligence (SIGINT) is a system of intelligence harvesting by intercepting signals. Communications Intelligence-COMINT originate from the conversations of regular people; Electronic Intelligence-ELINT or electronic signals, are not necessarily used in communications and a “combined” interception (they are obviously encrypted); they also make Traffic Analysis (which gives them very valuable information). 

 

 
 

It is very important to mention that FVEY was born in 1941, became "something more stable" during the BRUSA Agreement in 1943; and became official March 5th, 1946. Back in those days, the only members were The UK and the United States; Canada, Australia and New Zealand joined later. 

 

         The Five Eyes=GBR, the USA, DOG, AUS & NZL

Up to this point everything seems to be Kosher, “your boundaries” and a “Code of Honor” have been established; but there's also a “Certification”, in which the NSA is allowed to spy on 193 countries that are useful to successfully gather more information; as well as to spy on organizations such as the World Bank, the International Monetary Fund, the European Union and The International Atomic Energy Agency.

 
 


Where's the Metadata,
lovey?

Even without having the complete conversation, metadata reveals a brutal amount of personal information. The One who owns your metadata has a full picture of your agenda, contacts or at least a complete list of people to whom you have called in the last few years. By having this information, they can figure out who is part of your immediate and closest circle, and who is not; and how often you talk to and text them. By doing so, they automatically have a “network analysis” with "different types of communities"; such as personal, professional and the one that they need to justify their reason to exist, criminal associations.

The phone records include fields such as location, time of the call & duration; who's the  snitch? Your nearest Cellphone Tower. Governments have always publicly denied to record and store this type of information, but Thomas Drake, “The original NSA whistleblower” says otherwise.

Just for you to know what your phone is capable of: Malte Spitz of the German Green Party, demanded Deutsche Telekom to surrender all the metadata generated by his phone in the last six months… He passed this information to ZEIT ONLINE and… http://www.zeit.de/datenschutz/malte-spitz-data-retention … “Back to you, Tom”. 





Numbers are not everything... we also have social networks, police reports, the information generated through purchases with credit/debit cards… all this is called “Intelligence Fusion”.

I know this will sound quite “ Sauron-esque”, but this is the best way to synthesize it:
“Put it together, Process it, Squeeze it, Make Alliances, Savor it & Know it all.”

Technology is not that developed so do not worry about killer droids knocking doors down, arresting and eliminating dissidents… (don’t forget about the drones, though!) at least that's what we know. Without being paranoid or falling into unfunded conspiracy theories, this is the list of things that we could compile about different Intelligence Groups around the world, and their true capabilities:


  1. They can track telephone numbers (both parties) during a call, this means location, time, and call duration... kiss kiss? 
  2. They can break into phone calls and text messages... in China. 
  3. They can open fake forums in the Internet (Internet CafĂ©). 
  4. They can hack the mobile phones of Presidents, Union & Political Leaders... and whomever they desire. 
  5. They can track communications of organizations such as Al Jazeera. 
  6. They can hack the video conference system of the UN. 
  7. They can track banking transactions. 
  8. They can track text messages (SMS). 
  9. They can hack into your email, chat (if you still use it) and browsing history. 
  10. They can map your social networks. 
  11. They can access the information contained in the apps on your phone. 
  12. They constantly try to attack "secret networks" such as Tor. The idea is to make users to communicate through less secure communication channels. 
  13. They can work undercover at Embassies to gain greater access to foreign networks. 
  14. They can install monitoring stations on building roofs to monitor conversations in the city. 
  15. They can break encryption codes on mobile phones. 
  16. They can hack computers that are not connected to the internet, by using radio waves (NSA can access computers not online using radio waves, they work together with small circuits that are already going in the machine or certain USB drives). 
  17. They can intercept telephone calls using “false towers”. 
  18. They can access computers through “pirate” Wi-Fi hot spots. 
  19. They can “install” a FALSE SIM card to control a mobile phone (is called GOPHERSET and literally, it is any hacker's wet dream. 
  20. They can break almost every encryption method… according to what Snowden said on January 2014: "they are still far away from that". 
  21. They can intercept packages (physically), open packages and make changes in certain devices… Old School, son!. 
  22. They can "connect" to Google and/or Yahoo to compile information, also monitor visits to Youtube and “likes” in Facebook... in real time. 
  23. They can monitor “behavior” in real time... as they did in Canadian Airports through free Wi-Fi. (More
  24. They can use information in real time to identify targets on drone attacks. 
  25. They collect the IP addresses of those who visit WikiLeaks. 
  26. Obviously, they can upload "misinformation" to harm the reputation of "adversaries"; create fake profiles and pages in every existing social network, etc. 
  27. They can intercept and store images taken with a webcam. 
  28. They can record phone calls and play them whenever they want; store images in emails, text messages, video conferences, etc. The goal is to feed their Facial Recognition Software.






"What about the world, lovey?"

 
 


When I wrote the original entry in Spanish, I limited the scope to Mexico… the current situation over here is of a raising Authoritarian State. The mass keeps blaming the Government, Political Parties and various institutions for this; but the mass knows how to use its selective memory quite well. Internet was not designed to be a form of entertainment, nor a toy; it was not designed to be an "outlet" to record the lives of frivolous, empty and insecure people; nor to be the epicenter of a dumbification catastrophe. 

Fifteen years ago the internet was a source of wisdom and the best tool to “unlearn” the indoctrination that schools promoted (of course there was porn, scams, and all that...); there are people who invested more than 10 hours a day learning from different cultures and perspectives, creating new paths to follow; always expanding their horizons in search of something greater, gaining absolute command over "toys" such as Sub7 (Cheers, Mobman!). The main goal was “screw”, our friends (hiding .exe files in documents, then enjoying such exploits like turning off their screens or opening their CD trays).



Time passed, things became easier and now Grandma (even Grandma!) has a Facebook account and keeps sharing all that crap. One day YOUR BELOVED GOVERNMENT, made a proposal that even though everyone recognized as draconian became Law; and it became Law because of fear. People forgot (or failed to understand since day 1) that the Internet is like the real world, it is a dangerous place if you are not careful.


Unfortunately for the mass, the majority of those who learned to use the Internet in its early stages (and probably wrote the foundation) continued to be careful with what they shared and never dropped guard; no matter how "friendly" the internet got. This is why when those draconian laws (which we saw their glimpses 13 years ago) came into effect, they didn't panic; they just activated the "contingency measures” already considered. It is true that they don't like to share knowledge unless one proves itself worthy of it; in some other cases they do not share because they only know how to explain it on simple terms (language). People like Aaron Swartz were murdered; many others are just seeing how things unfold. 

 


A couple of years ago there was a phrase that served as a welcome to Deep Wiki:
"The Internet can make you more intelligent or more stupid, it all depends on your questions. (making the right questions, that is!)"

 
 

Prevention and anonymity are not applications that you just download, they are survival instincts that can only developed once you open your eyes; the new Laws and ones that are probably on their way, are merely control exercises. This is why all those demonstrations and parades; Twitter-#hashtag-Wars, Facebook "educational photos", Youtube vlogs and any other form of discontent will not yield positive results; no collective action will echo because this is a personal problem; it is a matter of choice, responsibility, intelligence, sovereignty and overcoming challenges to improve the spirit… like we used to do while playing with Sub7. 


“Extras”

There are people who are afraid of being rejected and because of that they automatically discard any idea that contradicts whatever the mass believes and protects; there is nothing wrong with dissent, in fact the best ideas have come out of minds that think without fear. It is true that you cannot learn everything in a single afternoon; but it has to start somewhere, it has to start sometime...

 
 

 
The Toys
ICReach NSA's Google.
Buggedplanet is a website that indexes by country, the companies and services that have been tapped and that currently store metadata. (Make sure to download and learn how to use Tor)



The Conversation with Gene Hackman and Harrison Ford ... There are no computers (as we know them), but there are many surveillance and privacy violations...

1984... the 1956 version! Just… brilliant!

1984
with John Hurt, Richard Burton, Suzanna Hamilton, Cyril Cusack & Peter Frye.

WarGames
When the game… is no longer a game.

Brazil
… with Jonathan Pryce, Robert De Niro, Katherine Helmond, Ian Holm, Bob Hoskins, Michael Palin & Kim Greist.

Enemy Of The State
with Gene Hackman &
Will Smith… The Conversation's remake.

Swordfish
with Halle Berry, John Travolta & Hugh Jackman.

Die Hard 4 with Bruce Willis.

The Internet's Own Boy for Aaron Swartz

.


-@dasmulo