The arts of Invisibility

Here is what we argue for. That’s our manual to fight against the invasion of privacy. We have used the Quran and The Bible as a backbone to protect the rights of the people, and we see this as a mutual problem that must be solved before it’s to late

The Holy Quran: Al shura 40

And (they keep in mind that) the recompense of an evil done is a punishment equal to it (for an evil merits an equal evil). But he who pardons (an offender) and (thereby) improves the matter (and effects thereby a reform in the offender) shall have his reward from Allâh. Behold! He does not love the wrong doers.

The Holy Quran : Al hujurat ( the chambers)

12. O ye who believe! Avoid suspicion as much (as possible): for suspicion in some cases is a sin: And spy not on each other behind their backs. Would any of you like to eat the flesh of his dead brother? Nay, ye would abhor it… But fear Allah: For Allah is Oft-Returning, Most Merciful.

If our intent is to use the information gained to give ourselves an unfair advantage or to harm someone else, then eavesdropping is wrong. It is dishonest and unloving (Romans 13:8; Luke 6:31). Christians are to be “blameless and innocent, children of God without blemish in the midst of a crooked and twisted generation” (Philippians 2:15). Eavesdropping out of nosiness is being sneaky, which is dishonest (Proverbs 11:3)

The Holy Quran: 45. We ordained therein for them: “Life for life, eye for eye, nose or nose, ear for ear, tooth for tooth, and wounds equal for equal.” But if any one remits the retaliation by way of charity, it is an act of atonement for himself. And if any fail to judge by (the light of) what Allah hath revealed, they are (No better than) wrong-doers.

Matthew 5:38

“You have heard that it was said, ‘An eye for an eye, and a tooth for a tooth.’

Exodus 21:24

eye for eye, tooth for tooth, hand for hand, foot for foot,

 Leviticus 24:19-22

If a man injures his neighbor, just as he has done, so it shall be done to him: fracture for fracture, eye for eye, tooth for tooth; just as he has injured a man, so it shall be inflicted on him. Thus the one who kills an animal shall make it good, but the one who kills a man shall be put to death.read more.

There shall be one standard for you; it shall be for the stranger as well as the native, for I am the Lord your God.’”

C3A2EFD7-62D7-4FD7-B3A3-0D2F0A15353A

So why the invasion of privacy from the first place?

Perhaps governments utilize all their entities or affiliates to provide national security by tracking all unwanted actions. That’s fine. Although similar outcomes can be approached through better techniques, but that’s just the way it was made.

We exclude the spying of the governments for security purposes, our argument goes against invading the privacy of the public, which includes spying on innocent people.

This is mainly through social media platforms, or sometimes can be executed directly from the government office. Why they are doing this? They know what time you go to work, what time you wake up, what key words you use on google, if given the permission to the mic by you, all conversations are recorded, so why?

They tell the reason is because they aim to enhance the experience of the user by showing content with related interests. That’s just half of the story. If you get the full picture, you will understand why we are doing this. Technology is evolving and we are withdrawing back in terms of the intelligence of mankind. We keep gaining social anxiety through these technologies while the machine is getting smarter everyday. The machine will know everything about the people until it controls the mass through the commands of whoever is creating them.

Machine learning, AI and big data will eventually be used against the people. If someone disobeys the orders of the government, one click and he/ she is stopped. Do you get the dangers of implanting different computerized organs in the human body? Yes all these technologies are connected to each other as they ment to work as one system. Currently the danger isn’t that obvious, but after a generation or two, and perhaps more evil CEOs to show up, this will be obvious. From a human to another, even if you work for one of these tech companies or for a government organization, do you care about your children? If you do then you should research about this and then decide how to stop it

img_1592

Let’s ask again, why invading the privacy of innocent people?

Regardless to what was mentioned earlier, governments are creating the weapons of tomorrow through the people to fight against the people. One word: it’s to create a better controlling system.

The people have the right to fight against this. Understand that the law is corrupted and has many loopholes. As we have mentioned earlier, by the law of God, we state that an eye for an eye is one good solution. However, god also has mentioned that forgiveness is what believers seek for. Can we forgive these companies and governments? Yes if a replacing technology is introduced, and if we see all of this mess fading, not escalating.

The army of anonymous is growing everyday, containing X federal employees, whistleblowers, spys and top hackers. Perhaps it’s not our interests to get into this game, but we will if it became a must. It’s not the right time for it, but governments know that it’s going to happen and they will have no control over it.

This is not a personal issue so saying if you don’t like social media then don’t use it, we are just another brick of the wall.

Our interest is to bring this subject to court to put the subject of privacy invasion against the law of God. Do you think religion will go down in this? If you do, think twice. Governments fear this more than actually having someone attacking their system

Rule1: stay anonymous. Understand that your NAME does not belong to you. It belongs to the government and they collect your confirmation for this every time you reply to a letter that has your name printed in capital. You have the right not to answer, you have the right to rename your self outside of the system.

Rule2: the credit card is your first enemy. You never purchase your computers and accessories with a bank card. It makes your computers easy to trace as their MAC address and different info will be attached to the purchase information

Rule 3: batteries are your second enemy. You need to purchase computers, or devices that give you control over the battery. As replacing it with a self manufactured one is important, or taking it out is a key for being invisible. Some batteries contain tracing systems connected to your phone or computer which makes the phone or computer always on even if off.

Rule 4: try to avoid commercial systems. Never use windows, apple Ios, or even android. Think of open source systems and you must join the open source community. The main concept for all of this is to acquire the most important knowledge for tomorrow through a fun experience. Think of embedded systems, operating systems in flash drives, and laptops with certain features: battery can be replaced, no cameras, no mics, no Bluetooth, no WiFi. Use externals if needed. These are general rules and the purpose is to provide the keys to start your research

Rule 5: never use public WiFi nor your home WiFi. Never use a WiFi under your real identity and that’s possible in many ways depending on the country you live in. Logging to the internet through a microcontroller remains the number one option, or to use it as an external modem. You can find detailed tutorials regarding this in my YouTube channel.

Rule 6: you don’t need to speak english. You need to speak python and C++. You need learn networking. Understand that most operating systems were made with the C language. It’s time for the C++ to see the light in this. Learn python for networking. Learn both languages as a part of your life style

Rule 7: it’s fine to use VPN, but only if you have the code to do so. In other words: don’t use commercial applications.

Rule 8: the Dark Web is not made for kids, it’s not made for games, and your values matter the most. Why you are using the Dark Web?

Rule 9: encryption encryption and encryption. Use encrypted emails. Start with the commercial brands such as the proton mail. It’s connected to a court system so you get a full picture on how to use it. Never put your real identity

Rule 10 : Less GUI ( graphical user interface ), and limited multitasking systems. You will be creating individual files and each will serve as a standalone system for a specific task. Lynx can be used as the hub for all these creations. The idea is to avoid creating a container inside a container. There is no reinvention of the wheel in this as codes for this were written long time ago. All you need to do is to know how to use codes in the right time and place. 

The idea is to create fear and paranoia within these government entities, and if we succeed, this means that people will control the government. Let’s just reverse engineer what they did regarding the Covid19 “pandemic “ 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s