The Internet - The first Worldwide Tool of Unification ("The End of History")

" ... Now I give you something that few think about: What do you think the Internet is all about, historically? Citizens of all the countries on Earth can talk to one another without electronic borders. The young people of those nations can all see each other, talk to each other, and express opinions. No matter what the country does to suppress it, they're doing it anyway. They are putting together a network of consciousness, of oneness, a multicultural consciousness. It's here to stay. It's part of the new energy. The young people know it and are leading the way.... "

" ... I gave you a prophecy more than 10 years ago. I told you there would come a day when everyone could talk to everyone and, therefore, there could be no conspiracy. For conspiracy depends on separation and secrecy - something hiding in the dark that only a few know about. Seen the news lately? What is happening? Could it be that there is a new paradigm happening that seems to go against history?... " Read More …. "The End of History"- Nov 20, 2010 (Kryon channelled by Lee Carroll)

"Recalibration of Free Choice"– Mar 3, 2012 (Kryon Channelling by Lee Carroll) - (Subjects: (Old) Souls, Midpoint on 21-12-2012, Shift of Human Consciousness, Black & White vs. Color, 1 - Spirituality (Religions) shifting, Loose a Pope “soon”, 2 - Humans will change react to drama, 3 - Civilizations/Population on Earth, 4 - Alternate energy sources (Geothermal, Tidal (Paddle wheels), Wind), 5 – Financials Institutes/concepts will change (Integrity – Ethical) , 6 - News/Media/TV to change, 7 – Big Pharmaceutical company will collapse “soon”, (Keep people sick), (Integrity – Ethical) 8 – Wars will be over on Earth, Global Unity, … etc.) - (Text version)

“…5 - Integrity That May Surprise…

Have you seen innovation and invention in the past decade that required thinking out of the box of an old reality? Indeed, you have. I can't tell you what's coming, because you haven't thought of it yet! But the potentials of it are looming large. Let me give you an example, Let us say that 20 years ago, you predicted that there would be something called the Internet on a device you don't really have yet using technology that you can't imagine. You will have full libraries, buildings filled with books, in your hand - a worldwide encyclopedia of everything knowable, with the ability to look it up instantly! Not only that, but that look-up service isn't going to cost a penny! You can call friends and see them on a video screen, and it won't cost a penny! No matter how long you use this service and to what depth you use it, the service itself will be free.

Now, anyone listening to you back then would perhaps have said, "Even if we can believe the technological part, which we think is impossible, everything costs something. There has to be a charge for it! Otherwise, how would they stay in business?" The answer is this: With new invention comes new paradigms of business. You don't know what you don't know, so don't decide in advance what you think is coming based on an old energy world. ..."
(Subjects: Who/What is Kryon ?, Egypt Uprising, Iran/Persia Uprising, Peace in Middle East without Israel actively involved, Muhammad, "Conceptual" Youth Revolution, "Conceptual" Managed Business, Internet, Social Media, News Media, Google, Bankers, Global Unity,..... etc.)

German anti-hate speech group counters Facebook trolls

German anti-hate speech group counters Facebook trolls
Logo No Hate Speech Movement

Bundestag passes law to fine social media companies for not deleting hate speech

Honouring computing’s 1843 visionary, Lady Ada Lovelace. (Design of doodle by Kevin Laughlin)

Friday, June 3, 2011

11 ways to circumvent internet blockades

RNW, 2 June 2011, by Willemien Groot

(Photo: Flickr / faungg)

Internet blockades are more the rule than the exception in non-democratic countries. But there are ways to get round them, even though no censorship circumvention tool is 100 percent safe. Rule number 1: you’re clever, but the authorities are cleverer.

There are plenty of circumvention tools, but using them carries a risk. That’s the main message of a recent study by human rights group Freedom House. It also depends exactly what you’re doing on the internet: uploading, downloading or just looking. Internet cafés never offer full anonymity. Owners can keep an eye your internet use remotely and report ‘abuse’ to the authorities.

USB stick

The more successful a circumvention tool becomes, the more likely it becomes that the authorities will block the site providing it. Tools you can store on a USB stick, and software available via other websites (mirrors), are therefore becoming increasingly important.

Circumvention tools are made both by non-governmental organisations and commercial companies, not only to support press freedom or activism, but also based on the simple philosophy that all information on the internet should always be available to everyone. Below is a summary of the 11 best-known tools.

  • Tor

    Developed by the Tor Project. Worldwide the best known circumvention and security tool.

    Pros: Easily available and easy to use. Good technical support.
    Cons: Makes connections slow.

  • Psiphon

    Developed by the University of Toronto’s CitizenLab. Connections run via different servers in different countries, making origins hard to trace. Works on the basis of invitation by Psiphon to counter abuse.

    No need to download software. Handy for use in internet cafés.
    Cons: Invitation is a built-in security shell, but also an obstacle for users who don’t know anyone to arrange an invitation for them. Psiphon has no official security certificate. Makes connections slow.

  • Ultrasurf

    Developed by Ultrareach, partner of the Global Internet Freedom Consortium. Works as a program in windows.

    Easy to use. Leaves no trace when uninstalled.
    Cons: Has a bad name because in the past it was said to have distributed viruses.

  • YourFreedom

    Developed by Reichert Network Solutions. Software is free, but possibilities are limited. Possible to pay for an upgrade.

    Good technical support.
    Cons: Possibilities of free version limited, especially for sending data.

  • JAP

    Developed by JonDonym, a commercial branch of the University of Dresden.

    Portable, so suitable for use in internet cafés. Reliable service, open source code. Design faults can be corrected.
    Cons: Still in the test phase. Makes connections slower.

  • Gpass

    Developed by World’s Gate Inc., partner of Global Internet Freedom Consortium. Not only provides secure connections but also enables encryption.

    Pros: Multiple secure routes, easy to install.
    Cons: Has to be installed on your computer from the Consortium website. Repressive governments block the site, making the software hard to get hold of.

  • Google Cache, Reader en Translation:

    Developed by Google. Handy for picking up information, not suitable for distribution from a security point of view.

    Accessible from any location, as long as Google and Gmail are available.
    Cons: Connection isn’t secure.

  • GTunnel

    Developed by Garden Networks for Information Freedom, has a long history in circumvention software for users in China.

    Suitable for Microsoft Windows. User can send information using GTunnel via Tor or Skype. This double security makes internet traffic securer and more anonymous but also slower. This can be a disadvantage in countries where internet runs via dial-up connections.
    Cons: Limited number of servers available, especially in Taiwan.

  • Freegate

    Developed by Dynamic Internet Technology (DIT). Works using a limited number of proxy servers in Taiwan and the US.

    Easy to use and can be stored on a USB stick, so also suitable for internet cafés.
    Cons: More than one version of the same software available. Status unclear. Limited number of servers. Questionable security.

  • Dynaweb

    Developed by Dynamic Internet Technology (DIT). Originally for China, but now also used in Iran. Works on the basis of proxy servers.

    Easy to use.
    Cons: Proxy servers aren’t secure. Analysts can easily find out who’s using Dynaweb. No scientific data on Dynaweb’s effectiveness. Unclear what the developers do with users’ personal details.

  • Hotspot Shield

    Originally developed by AnchorFree. for users of unsecured WiFi connections, not specifically for people in countries with repressive governments. Hotspot Shield also carries unsolicited advertising.

    Connection via VPN.
    Cons: Download can always be traced on the computer, even after the software has been fully uninstalled – a risk if a computer is confiscated. Users receive personalised ads, advertisers are allowed to use cookies. Not suited for use in non-democratic countries.


No comments: