#News: Gharr is going into Hiatus

Gharr is going into Hiatus due to the world being a worse place then what is was before, governments are implementing mass surveillance in a very forceful way, and often in secrecy. This Hiatus may be permanent, or last for a period of time…

Ghostmail, and LAVABIT closures, as well as the attack on people’s right to use strong encryption is just the tip of the iceberg on this controversial topic of mass surveillance as as we approach the age of “The Internet Of Things,” where spying on all the things in our lives will become even easier, and companies are often forced to hand over bulk information in the background without our knowledge (giving the illusion of privacy, and security). All this in a background of mass extinctions that even threaten humanity, and automation where lots of people can no longer return to work in the traditional way (but the sharing economy for example does give hope that our lives will continue to have meaning). This is a time when we need to communicate with each other more then ever, and share good ideas and solutions: but if the internet feels more like big brother, where someone checks up on our loyalty and obedience so existing power structures can remain in place, even if it dooms our world and future generation, that is a bad situation for 99% of us. So yes this is upsetting.

Who collects, owns, and decides what to do with our private data, and our lives is now a topic most of us will have to face up to eventually.

During my Hiatus, I wish you all the best of luck on learning about your future in a world where the governments will not respect your privacy (except with empty words) and mass surveillance is just a part of life.

Gharr Posts:

  1.  https://twitter.com/Gharr_home/status/779850906057572352
  2.  https://twitter.com/Gharr_home/status/779851438314749953

📎 #Privacy #Issues #IOT #Encryption

📎 Endace, a little-known New Zealand company in it’s early stages in 1994, developed pioneering network monitoring tools that would later be used all over the world by spy agencies, governments, and private industries to spy on us all (this to no surprise includes the telecommunications industries). This technology has also been used for questionable purposes by the Moroccan security agency implicated in torture for example. This infrastructure was planned and put into place very early in the Internets life it seems, but might have took off in 2001-2007. The SOPA and PIPA acts and the subsequent protests against them were probably futile, as governments had already constructed massive significant infrastructure and personnel to carry out the mass surveillance of us all within and around the telecommunications sectors (no doubt the spy agencies depend on this infrastructure along with various other software and hardware resources such as supercomputers, and imitation of legitimate servers, TOR servers, and telecommunications towers, as well as signal interception by various mobile units). Because of this early commitment and the now existing infrastructure, governments have gone ahead and implemented surveillance laws without our consent behind closed doors and even acts of laws (bills to acts) that have in some countries been mostly blacked out so we can’t know what is going on (because they will say that is was necessary) as well as unusually broad search warrants, that can on occasions allow authorities to spy on millions of people. https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/, http://abcnews.go.com/US/nsa-potentially-access-phone-data/story?id=42892417, “The U.S. Government Wants to Read Travelers’ Tweets Before Letting Them In” https://theintercept.com/2016/10/21/the-u-s-government-wants-to-read-travelers-tweets-before-letting-them-in/, “Feds use search warrants to get into fingerprint-locked phones #BioData #IOT” https://www.washingtonpost.com/news/the-switch/wp/2016/10/18/feds-use-search-warrants-to-get-into-fingerprint-locked-phones/ & http://www.dailyherald.com/article/20161022/business/161029726/.

📎 While radio waves can be intercepted, and police, and government employees may use imitation devices (including telephone tower imitation), this is still an interesting device. Onion Pi TOR Proxy [info]: https://n0where.net/onion-pi-tor-proxy/ ♦ The raspberry PI can also be used as a web-server, so you can have websites hosted on it: http://raspberrywebserver.com/serveradmin/get-your-raspberry-pi-web-site-on-line.html These devices give some insight into how the internet works, so they are also just interesting to study.


Last edited in Sept 2016
Gharr is currently in hiatus: “I miss writing all those articles, and sharing all those great things, and ideas on the internet.” Sept 2016

Shortened link to article: #News: Gharr is going into Hiatus [article]: http://wp.me/p10Tww-3Q1

—End of Article—

The Material below this point may, or may not be supported by the article, author, or any of those people or organizations that may be mentioned in the above article.
Any material below this point could be: adverts; endorsements; paid to click sites (some may try to trick you into clicking on them by using misleading graphics and/or words); misleading material; material that is for, or against the above article; or other types of material that is not part of the above article.
In single article view: this article does have an associated “Leave a Reply” and “Enter your comment here…” comment box below this point. You should get used to where this comment box is located before you try to leave a comment for this article.
Thank you for taking an interest in this WordPress page.


This entry was posted in Censorship, Government, Media, News, Private Organization, Public Organization, Technical, Technology, Web Site or Blog Related, World & Country, World Wide Organization and tagged , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s