Board index JoyofSatan666 Spying Technology

Spying Technology

For those who wish to establish a relationship with Satan.

Topics of discussion include: Demons, Magick, Satanic Witchcraft and much more!

http://www.joyofsatan.org/

Post Sat Apr 15, 2017 8:35 pm
Hoodedcobra666 User avatar
Site Admin

Posts: 1495
Location: America
If you pay close to tech around, it is becoming highly dangerous and intrusive. Technology, lovely as it is, is only a tool. Driven by the minds that are behind it. And when you have mass psychos controlling it, it's bad news.

Notice how the latest phones like IPhone and Samsung come with all these things like voice recognition. The sample of which do get sent and stored in google and servers. This could be easily done locally in the phone, but they just want to do this otherwise. To collect samples.

Now we also have biometric scanning, and the scanning of the iris, done by the phone. Instead of Jews rallying you in the gulag to get these infos about you. You give them on your own. Facebook works in the same context. Jewbook knows more secrets about you than any secret state police could ever know 50 years earlier.

There is a science that deals with recognition of the iris in China, and it's part of Chinese medicine. You can see many things through the eyes. Including mental health, health in general and other things.

Needless to say, in the attention of the correct people with ill will. Things can go real grim. One needs to see innocent girls who just take a few naked selfies and one day wake up to find themselves posted on the whole internet. Then things take a life of their own. I know some people actually aspire this, or think it's not that of a biggie. Erm, it's a hoax. And it can prove deadly too. Many girls and other innocents are hunted down by predators, online. Blackmail and other hints build upon this as well.

I have noticed and took measures after noticing in regards to Windows. Windows forcefully updates, and doesn't make any sense as to why. Probably more Addons. The Pcs are known to get ruined by updates. And it kills them slowly, while it should "improve" them.

Devices like android phones get more and more powerful, with more ram and processing power. But speed is essentially capped as to what it was a few years ago. No matter the extra ram (temporary memory) the innate software of the phone still consumes most of it. It's just additional espionage software added, and its blantant.

Linux seems by far, better. Windows 10 is a literal piece of crap. It spies everything you do, in your face too as well. It doesn't even try to hide it. Nobody needs to hack you, because your personal computer belongs to the hackers already. Nowdays technology contains everything.

The Jews amass all this data, and they play the world with it. They can know secrets, tendencies, aspirations and dreams, all by searching their database. Needless to say, what Snowden said when he said that this is the problem of the Future, this was something people need to understand.

I point at Snowden because to a few dumb sleepwalkers, it may be that this is a conspiracy hat saying these things. But Snowden is worse than any tinfoil hat in what he reveals pretty much. Saying the situation is worse than anyone can initially understand.

This is a major issue, and can turn Orwellian really easily. People assume that since nobody knocks their door, or that since they think of themselves are irrelevant, it's all fine. So they can give all their personal existence to the big brother. This is however totally damning, and when people meet the consequence, it's bad.

What do people think the selfie camera is about? Taking selfies? Or actually taking a pic on your mug every time you open the phone? Or let's say the NSA looking at you through a camera? It's funny how even the Jew Reptile Zuckerberg who made his alien Facebook database of goyim, was taping the camera of his own computer. Notice also how in all laptops, the microphones are built in, and there is no socket to activate them, or mute them physically.

So it's better to keep a degree of secrecy, and keep everything of importance either on physical paper, or on your own head. Nobody can hack into your head as easily. There are many ways (research and learn) to bring this situation under control, for example.

In Orwells 1984, every house had a giant screen that could look at them, hear them, and monitor them. Nobody knew when, so this added to the larger terror. Indeed it seemed as if it didn't even do it.

The enemy needs to go down, and people who are decent need to settle this thing from governments or whatever else. And throw these plans in the purging fire.

And we're in 2017...
http://www.joyofsatan.org

Come by and check Azazel's Marketplace!

http://www.josmarket.org

LATEST YOUTUBE VIDEO:

"Rabbi Megamix 666"

https://youtu.be/D6_QgkNzYss

Post Sat Apr 15, 2017 9:12 pm

Posts: 260
Location: 4th Reich
The Reich must rise soon. If we fail, any future resistance may actually have no choice but use emp attacks and things to destroy infastructure to defeat the termintaor/1984 opressed tech that is developing. The NS must gain control of places like the NSA while we still have a chance to steer it in the proper direction. 100 years from now if trends continue, assuming any resistance evens survives, they literally would have to destroy server warehouses and things. This would leave whatever side survives to rule over people living like the Amish like it's the year 1800 which would be very sad.

Post Sat Apr 15, 2017 9:21 pm

Posts: 260
Location: 4th Reich
We also must nationalize or expell companies like GOOGLE or APPLE.

Post Sat Apr 15, 2017 10:22 pm

Posts: 1007
Location: Celtiberia

Image


It is no coincidence that guys like (((mark zuckerberg))) appear in photos with the webcam and the microphone of their laptops blocked and covered.
Ahora es cuando debemos luchar con todas nuestras fuerzas, nunca dejes para mañana lo que puedas hacer hoy, el tiempo es ahora!
post27628.html?hilit=El%20momento%20es%20ahora#p27628






Image

Post Sun Apr 16, 2017 12:38 am

Posts: 130
I just saw a video on jewtube that I thought I should share.
It's not about spy techs but instead military techs that everyone
should be aware of.

[url]https://youtu.be/j0XWwmLVPtI[/url

Post Sun Apr 16, 2017 3:55 am

Posts: 203
Wotanwarrior wrote:
Image


It is no coincidence that guys like (((mark zuckerberg))) appear in photos with the webcam and the microphone of their laptops blocked and covered.

I'm wondering if even old smartphones
Can do this

Post Sun Apr 16, 2017 4:29 am

Posts: 233
I really can't say a lot because it would be detrimental to my well being if I were to prove my point by stating resources but I'll share this....

Let's say... I have a friend who involves themselves with attending conventions where tech companies discuss future products and plans. There are people whom are very in favor of the "spying technology" and there are those who are very opposed to it. The ones who oppose it would warn and offer products to like minded individuals in place to combat such technologies and mention the fact that if they "went public" with some "technologies" they would be terminated from their job. It was an insider convention so to speak.

There will be many future technologies, that will be listed as items that can increase "productivity" in the workplace. But really, it's spying at its finest with data collection at the core. Let's say... you work for someone doing office work but half of your day is invested on YouTube videos, you're clearly an incompetent, worthless, money losing worker. So they'll fire you, and at a click of a button they'll share that information with other companies so you never get hired again. (If you find that hard to believe Casinos already engage in said practices with "Player Clubs" by labeling cheaters, how much people spend, how often, when, and amount of winnings. That information is shared between casinos for their benefit) Just as a birth certificate number carries information, more information can be added to that number, and said numbers can be looked up.

My point is this. There are many gentiles in the tech industry whom oppose this. Not everyone in the industry is for this technology. But we really need to fight it as a whole, what I share is but one example of much more gruesome things to come, things my friend can't mention.

One needs to interpret "data collection" as nothing more than "gathering evidence", that's all it is at its core.

Please don't interpret this as me bragging, I share this to bring light on a fairly unknown subject and to compliment HP's sermon.

____

On a lighter note, MS's description of Spyware is in the WIN10 Policy. Quite ironic huh?
Also here's a WIN10 photo of proof their spying a member made in the Yahoo groups.

Image

Post Sun Apr 16, 2017 4:42 am

Posts: 233
I should also mention! For any and all JoS users that use Win7 or Win8 and not Linux as Hooded Cobra already stated updates will literally cripple and destroy your OS forcing a user to upgrade.

Seek GWX Control Panel and NEVER10 to prevent such updates from occurring.

GWX: http://www.majorgeeks.com/mg/getmirror/ ... nel,1.html

NEVER10: https://www.grc.com/never10.htm

Always try to prevent association of your legal name with technological devices. Of course, with debit and credit cards there's no avoiding it. However, in the event they do trace it back to you and accuse you... One always has the ability to say their identity was stolen and all liability falls short, in theory...

Post Sun Apr 16, 2017 5:52 am

Posts: 743
Anne Flowers wrote:
I should also mention! For any and all JoS users that use Win7 or Win8 and not Linux as Hooded Cobra already stated updates will literally cripple and destroy your OS forcing a user to upgrade.

Seek GWX Control Panel and NEVER10 to prevent such updates from occurring.

GWX: http://www.majorgeeks.com/mg/getmirror/ ... nel,1.html

NEVER10: https://www.grc.com/never10.htm

Always try to prevent association of your legal name with technological devices. Of course, with debit and credit cards there's no avoiding it. However, in the event they do trace it back to you and accuse you... One always has the ability to say their identity was stolen and all liability falls short, in theory...
There is no need of any software as far as I'm concerned, all you have to do is disable the updates.
There is a new operating system that is based on open source and privacy and is very similar to windows, very cool, but it will take sometime before being completely done, it's called ReactOs.
Ubuntu is good too.
Namasatan

Post Sun Apr 16, 2017 7:30 am

Posts: 490
I was being watched by my webcam once, my third eye warned me.
Image

Post Sun Apr 16, 2017 8:04 am

Posts: 117
How about software for smartphones?

Also about windows.. I turned the updates off from the first time I layed hands on it. I understand some software needs to be updated like antivirus or adobe flash player but thats about it. I never update anything.

Skype has a tendency to make your phone and laptop slow so def something fishy there.


Anyway take care all. Maybe Ill restore that one old laptop to factory settings and put linux over it. Not sure yet.

Post Sun Apr 16, 2017 9:48 am

Posts: 130
Here's the link I posted earlier again guys.

Military Techs
https://youtu.be/j0XWwmLVPtI

Post Sun Apr 16, 2017 2:51 pm

Posts: 233
Aquarius wrote:
Anne Flowers wrote:
I should also mention! For any and all JoS users that use Win7 or Win8 and not Linux as Hooded Cobra already stated updates will literally cripple and destroy your OS forcing a user to upgrade.

Seek GWX Control Panel and NEVER10 to prevent such updates from occurring.

GWX: http://www.majorgeeks.com/mg/getmirror/ ... nel,1.html

NEVER10: https://www.grc.com/never10.htm

Always try to prevent association of your legal name with technological devices. Of course, with debit and credit cards there's no avoiding it. However, in the event they do trace it back to you and accuse you... One always has the ability to say their identity was stolen and all liability falls short, in theory...
There is no need of any software as far as I'm concerned, all you have to do is disable the updates.
There is a new operating system that is based on open source and privacy and is very similar to windows, very cool, but it will take sometime before being completely done, it's called ReactOs.
Ubuntu is good too.


Good to know! Thanks (: It concerns me that they openly state that they're excited to work with Google. Of course, this could just be politics of trying to look good and what not. But it raises an eyebrow nonetheless... In any case, it's always safe to assume that every OS is contains information and said information can be obtained. If this OS can run WinApps it can be infiltrated. All it takes is a user to install an application that releases user permissions to the app for "functionality" and you're vulnerable again. Despite what OS you use, (unless you take precautions to prevent such actions) everything can be found through the internet you use. Which contains, your IP and ISP. All things to determine location, and depending on your ISP's Privacy Policy they may be storing up any and all information for any purpose they desire. Which, can be shared.

Another thing one could do if they're concerned with privacy is have a standalone computer. A system, that cannot be connected to the internet in anyway. No network card, no nothing. You would just have to transfer files and .exes with an external.

Post Sun Apr 16, 2017 3:58 pm

Posts: 3
For any of you who are using windows 10, you can open up services.msc and disable the "Geolocation Service" and "Windows Update" to prevent their computers from been destroyed. Never less it still does not prevent spying.

Post Mon Apr 17, 2017 1:13 am

Posts: 743
Anne Flowers wrote:
Aquarius wrote:
Anne Flowers wrote:
I should also mention! For any and all JoS users that use Win7 or Win8 and not Linux as Hooded Cobra already stated updates will literally cripple and destroy your OS forcing a user to upgrade.

Seek GWX Control Panel and NEVER10 to prevent such updates from occurring.

GWX: http://www.majorgeeks.com/mg/getmirror/ ... nel,1.html

NEVER10: https://www.grc.com/never10.htm

Always try to prevent association of your legal name with technological devices. Of course, with debit and credit cards there's no avoiding it. However, in the event they do trace it back to you and accuse you... One always has the ability to say their identity was stolen and all liability falls short, in theory...
There is no need of any software as far as I'm concerned, all you have to do is disable the updates.
There is a new operating system that is based on open source and privacy and is very similar to windows, very cool, but it will take sometime before being completely done, it's called ReactOs.
Ubuntu is good too.


Good to know! Thanks (: It concerns me that they openly state that they're excited to work with Google. Of course, this could just be politics of trying to look good and what not. But it raises an eyebrow nonetheless... In any case, it's always safe to assume that every OS is contains information and said information can be obtained. If this OS can run WinApps it can be infiltrated. All it takes is a user to install an application that releases user permissions to the app for "functionality" and you're vulnerable again. Despite what OS you use, (unless you take precautions to prevent such actions) everything can be found through the internet you use. Which contains, your IP and ISP. All things to determine location, and depending on your ISP's Privacy Policy they may be storing up any and all information for any purpose they desire. Which, can be shared.

Another thing one could do if they're concerned with privacy is have a standalone computer. A system, that cannot be connected to the internet in anyway. No network card, no nothing. You would just have to transfer files and .exes with an external.
On open source operating systems most programs are open source too, so you may know what code is in there, or people will just let you know from reviews.
Namasatan

Post Mon Apr 17, 2017 1:46 am

Posts: 80
One must track Internet data usage too, you never know where your data be used for jewish purposes like transmitting real time data of your device online...

Post Mon Apr 17, 2017 1:57 am

Posts: 80
What makes smartphones extremely vulnerable are those custom ROMs, I cannot understand how peoples trust them, most of them are created by some teenagers as I have seen in XDA forums.

Post Mon Apr 17, 2017 7:00 am

Posts: 101
What RTRs do we do after 20th of this month? It only says 16-20 of April.
Fear is an illusion.

Post Mon Apr 17, 2017 7:03 am

Posts: 101
And so the People of the world will wake up to their governments controlling them this year? Does it include countries like Finland which doesnt really have SO kike infulence too?
Fear is an illusion.

Post Mon Apr 17, 2017 12:59 pm

Posts: 23
There IS a way to achieve NEAR PERFECT privacy. Emphasis of near.

Now, things you may need.

1: Old computer hardware. Really old stuff. Pre 2000 if possible.
2: Linux without systemmd or something like that, it's in the latest CIA leaks.
3: No logs VPN
4: Never enter real data. Birthday, names, address, make things up
5: If you can do without speakers, disconnect them. If you really need to use it, download video/audio and listen to it offline. Speakers COULD serve as microphone if manipulated.
6: Have fun with VeraCrypt. Be creative about passwords.
7: No cloud. Whatsoever. Need backup? External HDD's and bury it. DO not install tools and utilities with cloud/update functionality.
8: Block trackers. ALL of them. Ublock and install as much rules as possible.
9: Use disposable/temporary emails or fake name.

As for Android stuf...... If you can root it [REALLY know what you're doing here!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!], go with a big blast.
https://copperhead.co/android/
https://blog.torproject.org/blog/missio ... nd-privacy

This is not a guarantee for TOTAL privacy, but it WILL make "intelligence" [oh, the irony!] agents sweat a lot.
I can't think of anything more secure.

Well, I can, and I do, and it's telepathy. Still prone to interception, but it's almost mathematically impossible to know when, where, what and how.
And we are not there [yet!].

Post Mon Apr 17, 2017 2:17 pm
Hoodedcobra666 User avatar
Site Admin

Posts: 1495
Location: America
Artanis wrote:
What RTRs do we do after 20th of this month? It only says 16-20 of April.


A New Schedule has been decided and will be posted in the upcoming days.
http://www.joyofsatan.org

Come by and check Azazel's Marketplace!

http://www.josmarket.org

LATEST YOUTUBE VIDEO:

"Rabbi Megamix 666"

https://youtu.be/D6_QgkNzYss

Post Mon Apr 17, 2017 2:18 pm
Hoodedcobra666 User avatar
Site Admin

Posts: 1495
Location: America
Thanks everyone guys for your replies/conversation. Very useful to know more. Let's not forget this is not because we have anything to 'fear', but because this is psychopathic manipulation of the masses and privacy invasion. People have to resist somehow.
http://www.joyofsatan.org

Come by and check Azazel's Marketplace!

http://www.josmarket.org

LATEST YOUTUBE VIDEO:

"Rabbi Megamix 666"

https://youtu.be/D6_QgkNzYss

Post Tue Apr 18, 2017 4:57 am

Posts: 233
GakunGak wrote:
There IS a way to achieve NEAR PERFECT privacy. Emphasis of near.

Now, things you may need.

1: Old computer hardware. Really old stuff. Pre 2000 if possible.
2: Linux without systemmd or something like that, it's in the latest CIA leaks.
3: No logs VPN
4: Never enter real data. Birthday, names, address, make things up
5: If you can do without speakers, disconnect them. If you really need to use it, download video/audio and listen to it offline. Speakers COULD serve as microphone if manipulated.
6: Have fun with VeraCrypt. Be creative about passwords.
7: No cloud. Whatsoever. Need backup? External HDD's and bury it. DO not install tools and utilities with cloud/update functionality.
8: Block trackers. ALL of them. Ublock and install as much rules as possible.
9: Use disposable/temporary emails or fake name.

As for Android stuf...... If you can root it [REALLY know what you're doing here!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!], go with a big blast.
https://copperhead.co/android/
https://blog.torproject.org/blog/missio ... nd-privacy


1. Debatable. Security companies need to update their game everyday because some many hackers, cyber terrorists or whatever you want to call them take pride in being able to infiltrate into the newest oldest stuff. Older software won't add extra weight to your "cyber wall" when so many others have knocked down said walls before.
2. Linux isn't fullproof, but it is better to a degree.
3. You still leave a trail trying to get to that VPN, unless you're so advanced to the point where you're scripting around everything. Proxying, scripting your IP to automatically change between countries (many many times), maybe remoting from a server in a different country. The possibilities are endless
4. Yes.
5. Unless you have a hankering for verbally speaking your plan in your living quarters this can't present much harm and can be quite advantageous. In theory, if a piece of technology doesn't have any personal imagery or auditory information that can be linked to you. It may"make them sweat" as you say, trying to link who's who to who. Especially if you work in busy environments like cafes and what not. But this can also be detrimental cause it could bring attention to yourself.

6. An encryption's power relies on its secrecy and the intricacy of the algorithm. For example, how well and heavily it scripts passphrases into algorithms and whether or not the algorithm changes or is "layered" and how often. If you spend a decent time looking on the internet, especially the deepweb (I do not recommend anyone go into the deepweb) you can find a key to any readily available encryption and if you can't find the key you'll certainly be able to obtain software that can "decrypt" the encryption. Granted it will take some time.

If you have the key, the encryption is useless.
Imagine you're in a building and you're trying to get past a locked door where the safe is. And you know the key to that door and safe is in the building. All you gotta do is find the key, it's that simple.

The German WW2 Enigma was rumored to be uncrackable, but the allies cracked it. (Maybe they cheated, who knows.) An encryption is a pattern. That's all it is, patterns can be understood given enough time. An encryption can save one time if infiltrators are trying to bust into the front door but it's not full proof.
__

I write these long posts cause I relate heavily and grew up with this topic. One can very easily waste hours upon hours of time trying to combat this bs only to find out it was for nothing and they're still on your tail. You can be off the grid on the internet, but the return on investment doesn't return the initial investment for what we're trying to accomplish. Just use your time wisely, that's all I'm saying. Time would be better invested into RTR's

Lastly,
Don't think the CIA, or the NSA for that matter is stupid. This may seem strange but this is also very debatable. The more you try to hide, the more curious they'll become. Pretending to be stupid can be a tactic on it's own. The poos like to have their cattle tagged and lined up. If things seem to be going to plan then there's nothing to worry about in theory
If you have any friends on facebook, try all your tricks then create an account on FB. If FB doesn't link you with relatives, friends, or local businesses, then you're on the right track. But I would really only concern myself with avoiding use of personal information. Forget the rest. I'm not worried, arguably we've the best protection in the Universe. A bomb couldn't stop Maxine, so what's some fat NSA agent behind a desk gonna do to Satan's Warriors?

Post Tue Apr 18, 2017 3:10 pm

Posts: 233
One last thing regarding Rooting cellphones as one member previously mentioned: If you're lost the best place you can refer to is XDA Developers: https://forum.xda-developers.com/
It's a great community, that offers ROMS, Kernals, and most importantly help to those who ask.

Rooting one's cellphone can be advantageous in terms of increasing performance, removing bloatware, increasing security and most importantly taking control of the device you own so it's not in manufacturer and cellular provider's hands. One piece of advice I wish to share, that I recommend you take seriously. Make sure you have at least TWO ROMs on your device. 1 ROM for the utmost of stability and the other ROM for the one you want. In the event the ROM you initially liked, crashes, dies, or whatever, you'll want the power to be able to switch to a stable ROM so you're not sitting on a useless phone until you get home to fix it.
Also, keep everything (e.g. photos, contacts, etc. ) on a MicroSD card in the event you need to uninstall and reinstall the ROM. Install all applications to the device itself, avoid storing it in the SD card.

Post Wed Apr 19, 2017 1:54 am

Posts: 5
Very helpful posts ,I would wish to ask I use my android cellphone for entering joy of Satan ,emailing and storing the PDF files of rtrs and other useful info I get on joy of Satan.the same phone I use for entering my facebook account which I have family members and close friends on it under my real name and real pictures of me.I also have a facebook page called exposing Jews under that account I use it to reveal the lie about Jews and stuff .recently I've had three bans from facebook for hatespeech against Jews and Israel.my question is not that dangerous to me ?might they be able to trace me?

Post Wed Apr 19, 2017 2:35 pm

Posts: 23
Anne Flowers wrote:
GakunGak wrote:
There IS a way to achieve NEAR PERFECT privacy. Emphasis of near.

Now, things you may need.

1: Old computer hardware. Really old stuff. Pre 2000 if possible.
2: Linux without systemmd or something like that, it's in the latest CIA leaks.
3: No logs VPN
4: Never enter real data. Birthday, names, address, make things up
5: If you can do without speakers, disconnect them. If you really need to use it, download video/audio and listen to it offline. Speakers COULD serve as microphone if manipulated.
6: Have fun with VeraCrypt. Be creative about passwords.
7: No cloud. Whatsoever. Need backup? External HDD's and bury it. DO not install tools and utilities with cloud/update functionality.
8: Block trackers. ALL of them. Ublock and install as much rules as possible.
9: Use disposable/temporary emails or fake name.

As for Android stuf...... If you can root it [REALLY know what you're doing here!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!], go with a big blast.
https://copperhead.co/android/
https://blog.torproject.org/blog/missio ... nd-privacy


1. Debatable. Security companies need to update their game everyday because some many hackers, cyber terrorists or whatever you want to call them take pride in being able to infiltrate into the newest oldest stuff. Older software won't add extra weight to your "cyber wall" when so many others have knocked down said walls before.
2. Linux isn't fullproof, but it is better to a degree.
3. You still leave a trail trying to get to that VPN, unless you're so advanced to the point where you're scripting around everything. Proxying, scripting your IP to automatically change between countries (many many times), maybe remoting from a server in a different country. The possibilities are endless
4. Yes.
5. Unless you have a hankering for verbally speaking your plan in your living quarters this can't present much harm and can be quite advantageous. In theory, if a piece of technology doesn't have any personal imagery or auditory information that can be linked to you. It may"make them sweat" as you say, trying to link who's who to who. Especially if you work in busy environments like cafes and what not. But this can also be detrimental cause it could bring attention to yourself.

6. An encryption's power relies on its secrecy and the intricacy of the algorithm. For example, how well and heavily it scripts passphrases into algorithms and whether or not the algorithm changes or is "layered" and how often. If you spend a decent time looking on the internet, especially the deepweb (I do not recommend anyone go into the deepweb) you can find a key to any readily available encryption and if you can't find the key you'll certainly be able to obtain software that can "decrypt" the encryption. Granted it will take some time.

If you have the key, the encryption is useless.
Imagine you're in a building and you're trying to get past a locked door where the safe is. And you know the key to that door and safe is in the building. All you gotta do is find the key, it's that simple.

The German WW2 Enigma was rumored to be uncrackable, but the allies cracked it. (Maybe they cheated, who knows.) An encryption is a pattern. That's all it is, patterns can be understood given enough time. An encryption can save one time if infiltrators are trying to bust into the front door but it's not full proof.
__

I write these long posts cause I relate heavily and grew up with this topic. One can very easily waste hours upon hours of time trying to combat this bs only to find out it was for nothing and they're still on your tail. You can be off the grid on the internet, but the return on investment doesn't return the initial investment for what we're trying to accomplish. Just use your time wisely, that's all I'm saying. Time would be better invested into RTR's

Lastly,
Don't think the CIA, or the NSA for that matter is stupid. This may seem strange but this is also very debatable. The more you try to hide, the more curious they'll become. Pretending to be stupid can be a tactic on it's own. The poos like to have their cattle tagged and lined up. If things seem to be going to plan then there's nothing to worry about in theory
If you have any friends on facebook, try all your tricks then create an account on FB. If FB doesn't link you with relatives, friends, or local businesses, then you're on the right track. But I would really only concern myself with avoiding use of personal information. Forget the rest. I'm not worried, arguably we've the best protection in the Universe. A bomb couldn't stop Maxine, so what's some fat NSA agent behind a desk gonna do to Satan's Warriors?


1: I meant use Linux [without systemmd] on older hardware. Because Intel processors, modems and other hardware have hardware backdoor that can bypass a lot of stuff. Older hardware is secure in a sense that it does not contain always-on connectivity.
2: Nothing is fullproof, unless you are into math and programming and create own operating system with layers of sandbox, each encrypted, each hashing each time during boot, etc... BUT, linux is good enough for normal user without telemetry etc...
3: Some VPN provide clients that encrypt data stream to a VPN server, so to your ISP [sampletext] would be [xHou8!hihxhihdfishsdf(&*!] whatever. And, if someone is actively looking for you, they'd have to breach VPN server, see that you're connected to ISP such-and-such and try to hack ISP to see who's connected at specified date and time. Then try to profile hundreds of thousands of users, WHO would take such measures to secure traffic. Number gets down to a thousand, or maybe even less. But still, that's a lot of people to analyze.
4: Glad we agree on something.
5: Same reason why Zuckie the Cuckie of Facebook covers microphone and camera. EVEN they are off [and there are tools that can intercept any call for microphone/camera, for example Qihoo 360 or Comodo], he still covers them. Just in case. It couldn't hurt.
6: Mathematics come into play. Still, for some things, these alphabet agencies do require backdoor access because they can't do them all.
Case in point, what happened to TrueCrypt. It got compromised. VeraCrypt is regurally audited and checked by security professionals. So, due to it's open code, it's really, really hard [BUT NOT IMPOSSIBLE!] to sneak in a piece of code. Like it was, for some time, famous Microsoft's Windows _NSAKEY....
Or Symantec's PIFTS.
Wanna secure stuff for windows? Go Qihoo 360 Total Security or Comodo. Both being vetted and recommended by https://www.youtube.com/user/cruelsister1

Post Wed Apr 19, 2017 3:22 pm

Posts: 233
Africanhitler wrote:
Very helpful posts ,I would wish to ask I use my android cellphone for entering joy of Satan ,emailing and storing the PDF files of rtrs and other useful info I get on joy of Satan.the same phone I use for entering my facebook account which I have family members and close friends on it under my real name and real pictures of me.I also have a facebook page called exposing Jews under that account I use it to reveal the lie about Jews and stuff .recently I've had three bans from facebook for hatespeech against Jews and Israel.my question is not that dangerous to me ?might they be able to trace me?


If Facebook is running in the background while you're accessing JoS or any other website for that it matter it records and logs everything from your internet history, current tabs open, how long you're viewing webpages, what you type, what you search, along with various other things. Facebook even has the capability of tracking your freaking mouse movements. SO..... If you've done just that in the past it is categorized and stored into your personal Facebook Profile for many many years, arguably forever. Said information can be shared to anyone. I deleted my FB account about 6 years ago, and about 2 years ago I attempted to recreate a new account out of sheer curiosity of the result and all of it's recommendations we're my previous associates, likes, and locations of where I was at the time. It was if my FB account never got deleted. Kikebook keeps everything. Remember that. YouTube, Twitter, and Google, all do the same thing to different calibers if they're running in the background.

Lastly, FB's security is a joke, they don't attempt to secure their user's personal information with the amount of seriousness they should. Anyone with a minuscule amount of knowledge with "hacking" (or willing to invest some time in researching how to do it) can find out all your personal information on your FB profile.
Facebook, is very very dangerous. It can be considered the king of spying. My recommendation is that you delete your account. Research it online first, FB can be very bothersome when it comes to something as simple as deleting your account.

Post Wed Apr 19, 2017 7:35 pm

Posts: 2720
kike kikerberg is a kike, so he wouldn't need to protect himself from being seen and heard by covering his webcams and mics. It looks more as if he is taking the piss out of the st00peed Goyim.
If you repeat a lie often enough, it becomes...

Shut up and click here

jew: Stupid goyim.

Click here to show your love for Misho

The Beast in the skies has risen - in time it would come. The lands have begun their schism; all bow to the Fallen One.

May the mighty Mjølnir
nail the bleeding and naked nazarene
upon the Pagan planks
pound in the painful nails now and hang him high and dry

Post Thu Apr 20, 2017 4:43 pm

Posts: 233
@GakunGak thanks for the clarification (: I'm glad there are other people here educated in this field.
Yes always, cover cameras.
All Good advice.

Post Fri Apr 21, 2017 4:44 am

Posts: 14
I just want to add here for those who use Ublock. Make sure that you use Ublock Origin and NOT Ublock/Ublock +. Ublock/Ublock + is created of a jew, needless to say that jew stole the fucking concept and NAME from the Gentile who originally created it in the first place, hence Ublock ORIGIN! The Gentile loving man who has complete understanding of people wanting and protecting ones private life did file a lawsuit. But got dismissed from what I could understand and therefore came up with a new name such as Ublock Origin.

This will prevent third part organizations to steal and sell your info. Ublock or Ublock + actually gather this information and store it. While they 'hide' behind "privacy" promises. Fucking kikes.

Take care!
Hail Satan!!!
Hallow be their name,
And blessed be their claim,
If you who trespass put down roots,
Then Hallow be your name.

Post Fri Apr 21, 2017 7:14 am

Posts: 23
Anne Flowers wrote:
@GakunGak thanks for the clarification (: I'm glad there are other people here educated in this field.
Yes always, cover cameras.
All Good advice.

Just imagine if folks here saw Mr. Robot [http://www.imdb.com/title/tt4158110/] and all of a sudden they rush to learn scripting, python, kali linux, network protocols, pen testing, etc....
If Hitler appeared in this timeline, it would be similar to [http://www.imdb.com/title/tt4176826/].
Now, combine these two, and he'd be unstoppable. Information warfare is considered a battlefield/battlespace today. It is no wonder ;)

Post Sun Apr 23, 2017 3:40 am

Posts: 233
(I don't know the validity of this statement but it seems plausible, if anyone can confirm this it will be appreciated)

So I was speaking with a friend this week about spying and Zuckerberg was brought up and he heard apparently that Kikeberg sticks a male end auxiliary cord into his microphone slot and snaps it off so the system or device would assume recording privileges to the microphone and not the built in microphone. Thus rendering microphone recording impossible. (Disabling the microphone on a device does not guarantee privacy) I find it interesting, and in the event you did need to record that can be remedied with bluetooth devices or a USB recording device.

Post Mon Apr 24, 2017 7:38 am

Posts: 50
In that sense though [in regards to mics and cameras] aren't desktop computers safer?

Also, aren't desktop computers better in regards to performance and such?
If someone doesn't need to carry a laptop around (or can use a USB stick to carry some files to another person, for example), there's no need to buy a laptop. I'm just saying... Laptops seem to be the best solution nowadays, but it's not really necessary to be that way. Go according to your own needs.
Build yourself on spiritual concrete and you will never fall.
My Youtube Channel for Animated Meditations

Post Tue Apr 25, 2017 3:53 am

Posts: 233
Yagami Light wrote:
In that sense though [in regards to mics and cameras] aren't desktop computers safer?

Also, aren't desktop computers better in regards to performance and such?
If someone doesn't need to carry a laptop around (or can use a USB stick to carry some files to another person, for example), there's no need to buy a laptop. I'm just saying... Laptops seem to be the best solution nowadays, but it's not really necessary to be that way. Go according to your own needs.


A Desktops major advantage is that of customization. With tablets and laptops you're pretty limited to what you can change and if you're using a Macbook you really can't change anything. I like laptops cause I'm usually moving around a lot and maneuvering a desktop with a monitor and keyboard can be quite bothersome. So, I require convenience, it's all preference.


Return to JoyofSatan666