2020-09-15.fae [crystalfaeries]
2020-09-15 MarsDay's numerology: 19 Sun 10 Wheel of Fortune 1 Mage Inner will, motivation: Energy, liberation, frankness, joy, convalescence Sep 15 4:36 AM HST Moonrise Sep 15 5:55 PM HST Moonset Dhammapada: He who has known his former lives and can see heaven and hell themselves, while he has attained the extinction of rebirth, a seer, master of transcendent knowledge, and master of all masteries - that is what I call a brahmin.
> Feed: The Permaculture Research Institute > Title: Free Money Day > Date: Mon, 14 Sep 2020 12:40:08 -1000 > Link: https://www.permaculturenews.org/2020/09/15/free-money-day/ [...] a unique social experiment aims to show that a more generous world is possible. On Free Money Day, now in its 10th year, people around the world hand out money, virtually or in person, asking recipients to pass half on to someone else. The post Free Money Day appeared first on The Permaculture Research Institute.
President Trump promises to put down election day rioting using “insurrection” powers [Paul Stramer - Lincoln County Watch]
Will he invoke Fourteenth Amendment powers and remove all the TRAITORS, too?
The Lincoln Turn Around Two Step [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Australia Runs Out of Rice as Police Invade Farmers Markets [ice age farmer]
Australia will run out of homegrown rice by Christmas, which may help to explain why their police are kettling people at farmers markets (which clearly doesn’t help social distancing) and becoming more violent in general — if the state expects food shortages, they must bolster the police presence and acclimate people to increased totalitarianism, particularly […]
Free Money Day [The Permaculture Research Institute]
This September 15th, a unique social experiment aims to show that a more generous world is possible. On Free Money Day, now in its 10th year, people around the world hand out money, virtually or in person, asking recipients to pass half on to someone else. Organized by the Post Growth Institute, the global event …
The post Free Money Day appeared first on The Permaculture Research Institute.
FSF Blogs: Hello world from Eostre Emily Danne, intern with the FSF tech team [Planet GNU]
Greetings!
I'm Eostre (they/she), one of the new interns here at the FSF. I'm primarily here to update systems, rebuild servers, configure Apache, and really anything else that involves coercing GNU/Linux until it does what I want. Prior to this, I've done GNU/Linux almost exclusively as a hobby; now I'm trying to turn my hobby into a career. At home, I run a bunch of weird little hobby distros/BSDs. Interning at the FSF, where we primarily use Trisquel, is giving me a healthy appreciation for Ubuntu-based systems too.
In my hobby work, I've worked on making OS installs highly
reproducible - my / is a read-only squashfs image that
gets periodically rebuilt, my /etc is a git repo, and
I keep my /home distributed across a few machines via
Syncthing. At the FSF, I'm applying that experience by
reimplementing some infrastructure as neat little scripted
installs. Without revealing too much about our infrastructure, we
have some systems that were created using forgotten knowledge by
previous generations of sysadmins; it's my job to turn the arcane
shell invocations in their ~/.bash_history files into
something we can eventually manage with Ansible, though for now
I'll just be writing shell scripts that do the same thing.
This also comes as Trisquel is about to release version 9.0, so I'll probably end up testing that too.
There are also some aspects of myself that don't involve computers or GNU/Linux in some way:
I play Dungeons and Dragons, whenever the stars align and our group is able to meet.
I do a bit of modding for the free software video game Endless Sky. (I lied, this one involves computers!)
I house sixteen highly evolved dinosaurs! We have four ducks and twelve chickens; they're all between four and six months old, so they haven't started laying eggs yet, but they have gotten big enough to cause trouble.
I also have two cats, two mice, a snake, and some fish.
I am willing to share pictures of my animals :)
I'm trans, nonbinary, pan, and poly. On top of that, I'm autistic too. I like who I am, and who I've become.
Notes from the Portland Underworld [13:20 FREQUENCY SHIFT]
I am reposting this recent article by my friend Paul Levy, as it sums up many collective feelings of the time. … Continue reading
2020 World Predictions according to Betsey Lewis [Cosmic Convergence: 2012 and Beyond]
Posted by Betsy Lewis In 2019, Betsey did foresee a flu like the Spanish Flu of 1918 that would kill thousands. She never imagined that it (COVID-19) would spread worldwide like the Spanish Flu. Note: The reason Betsey updates and changes her predictions … Continue reading
‘Women’s respect is a priority for us’: Journal finally retracts paper claiming women with endometriosis are more attractive [Retraction Watch]
The journal that published a paper claiming that attractive women were more likely to develop endometriosis has finally retracted the article, more than a month after the authors called for the move. The article, “Attractiveness of women with rectovaginal endometriosis: a case-control study,” appeared in September 2012 in Fertility and Sterility, an official publication of … Continue reading ‘Women’s respect is a priority for us’: Journal finally retracts paper claiming women with endometriosis are more attractive
RPI4, Raspberry Pi OS and MATE desktop - Essential tweaks [Dedoimedo RSS]
Twerking, I mean tweaking with Tux. Behold, a long, detailed tutorial showing how to improve the defaut look & feel, ergonomics, functionality and behavior of the MATE desktop on top of Raspberry Pi OS on Pi 4, covering desktop environment installation, additional software, new visual themes and icons, black fonts, dock transparency, default desktop environment via lightdm configuration, full-screen Brisk menu, global menu, no video playback in full screen VLC, theming for VLC, LibreOffice and Pidgin, video tearing, Firefox ESR & mobile pages, resolution & overscan, hardware acceleration, Network Manager & Wireless scanning, some other essential tweaks, and more. Enjoy.
Doing the right thing: Alcoholism researchers retract six-week old paper after finding errors [Retraction Watch]
Oh, those insufferably progressive Scandinavians, always doing the right thing. A group of alcoholism researchers in Denmark has retracted a 2020 paper on gender and alcohol treatment after finding errors in their results. And they’ve set up a system to avoid similar problems in the future. The paper, “Gender differences in alcohol treatment,” appeared in … Continue reading Doing the right thing: Alcoholism researchers retract six-week old paper after finding errors
2020-09-14.fae [crystalfaeries]
2020-09-14 MoonDay's numerology:
18 Moon
9 Hanged Man
Unconscious fear, hope, desires:
Cyclical or Voluntary change,
ups and downs,
illusions, deceptions
Sep 14 3:32 AM HST Moonrise
Sep 14 5:08 PM HST Moonset
Instruction on the Fifteenth Sunday After Pentecost [Paul Stramer - Lincoln County Watch]
Rev. Fr. Leonard Goffine's
The Church's YearThe Introit of the Mass is a fervent prayer; which may be said in every necessity and adversity:
INTROIT Bow down thine ear, O Lord; to me, and hear me: save thy servant, O my God, that hopeth in thee: have mercy on me, O Lord, for I have cried to thee all the day. Give joy to the soul of thy servant: for to thee, O Lord, I have lifted up my soul. (Ps. IXXXV.) Glory be to the Father and to the Son, and to the Holy Ghost, as it was in the beginning, is now, and ever shall be, world without end. Amen.
COLLECT Let Thy continued pity, O Lord, cleanse and defend Thy Church: and because without Thee it cannot abide in safety, govern it ever by Thy gift. Through our Lord Jesus Christ Thy Son, who liveth and reigneth with Thee, in the Unity of the Holy Ghost, God, world without end, Amen.
EPISTLE (Gal. V. 25, 26.; vi. I-Io.) Brethren, If we live in the Spirit, let us also walk in the Spirit. Let us not be made desirous of vain-glory, provoking one another, envying one another. Brethren, and if a man be overtaken in any fault, you, who are spiritual, instruct such a one in the spirit of meekness, considering thyself, lest thou also be tempted. Bear ye one another's burdens, and so you shall fulfill the law of Christ. For if any man think himself to be something, whereas he is nothing, he deceiveth himself. But let every one prove his own work, and so he shall have glory in himself only, and not in another. For every one shall bear his own burden. And let him that is instructed in the word, communicate to him that instructeth him, in all good things. Be not deceived; God is not mocked: for what things a man shall sow, those also shall he reap. For he that soweth in his flesh, of the flesh also shall reap corruption: but he that soweth in the spirit, of the spirit shall reap life everlasting. And in doing good, let us not fail: for in due time we shall reap, not failing. Therefore, whilst we have time, let us work good to all men, but especially to those who are of the household of the faith.
EXPLANATION This epistle is taken, like that of the Sunday before last, from the epistle of St. Paul to the Galatians, in which St. Paul shows them the insufficiency of the Jewish law, and that they can only be saved by a lively faith in Christ, but now he admonishes them to the performance of good works. You now live, he tells them, in the Spirit, that is, the Holy Ghost animates your heart by His grace, enlightens, confirms, and inflames you, admonishes and teaches you, impels your heart to do good; you must, therefore, also regulate your external conduct accordingly, and in particular devote yourself to the practice of humility and charity, as the foundations of a truly spiritual life. Humility must teach and move you to think little of yourself, to avoid vain glory, and not to confide in your own strength. But charity should impel you to be meek and compassionate to all, even sinners, to correct them charitably, and lead them back to the path of virtue; since he who is harsh to the erring, despises and treats them roughly, is often permitted by God to fall into the same, nay, even into greater sins.
Particularly you must show your charity one for another, that one bears the burdens of the other: that you bear the faults and imperfections of others just as patiently as you wish others to bear with your own imperfections; thus you will fulfill the law of Christ, which commands us to love our neighbor; you will prevent many sins which are occasioned by considering yourself perfect, raising yourself above others, criticizing their failings, and causing disturbance. True glory consists in knowing ourselves, our faults and evil inclinations, and in eradicating them. Be grateful to those who instruct you in the word of God, and give to them willingly of your earthly possessions. What you sow, you shall reap; if you only follow the dictates of the flesh, do not mortify yourself, do not correct your failings, and indulge your sinful appetites, you will one day reap death, destruction and damnation, whereas, on the contrary, if you follow the dictates of the Holy Ghost, you will reap of the Spirit of life.
Let us obey this doctrine, for it is of interest to us, and impress deeply on our heart that without mortification of body and soul we cannot be saved.
ASPIRATION. O. St. Paul! beg of God the grace for me, that I may always walk in humility, and the love of my neighbor, particularly in bearing with his imperfections and failings, and thus fulfill the law of Christ in this as in all things.
GOSPEL (Luke VII.
11-16.) At that
time, Jesus
went into a city called Naim: and there went with him his
disciples, and a great multitude. And when he came nigh to the gate
of the city, behold a dead man was carried out, the only, son of
his mother, and she was a widow, and a great, multitude of the city
was with her. Whom when the Lord had seen, being moved with mercy
towards her, said to her: Weep not. And he came near, and touched
the bier. And they that carried it stood still. And he said: Young
man, I say to thee, Arise. And he that was dead sat up,. and began
to speak. And he delivered him to his mother. And there came a fear
on them all; and they glorified God, saying: A great prophet is
risen up amongst us, and God hath visited his people.
Why did Christ show compassion to this widow?
To convince us that God takes sorrowful and destitute widows under His protection; and is to them a consoler and helper; and to teach us to do the same. Woe, therefore, to those who oppress them and cause them to weep. The tears and cries of widows will ascend to God, who will terribly punish the injuries inflicted upon them. (Exod xxii. 22. 23.)
Christ had still other reasons for compassion, for He saw in this deceased youth the death of sinners, and in the afflicted mother the pain which the Church experiences at the spiritual loss of so many of her children. Should this not also awaken our sympathy since it wad the principal cause which moved our Saviour to compassion. I£ we are faithful children of our mother, the Church, it is impossible for us not to share her sorrow, and we would surely not be her children, if we could contemplate without sorrow the multitude who daily die the death of sin, and thus separated from the living body of Christ, hasten to eternal destruction. O let us with the Church unceasingly, ask Jesus, that He raise sinners from their spiritual death, enlighten those in error so that all recognize the truth, find, and walk the path Which leads to life !
Why did Christ say to the widow: Weep not?
He wished to moderate her excessive sorrow, and to teach us that we should not mourn for the loss of our relatives, like the heathens who have no hope of resurrection to eternal life. (Thess. iv. I a.) Resignation to the will of God, with prayer and good works, will be of more use to the dead than many tears.
What else do we learn from this gospel?
That no one, however young and healthy, will escape death, wherefore we should always be prepared to die.
INSTRUCTION CONCERNING DEATH
IF there were locked up in prison several hundred persons, on whom sentence of death had irrevocably been pronounced, yet who knew not the day or hour of their execution; if one after the other, and often he who least expected it, were taken out to be executed; would not each one's heart tremble, whenever the prison door opened? Now the irrevocable sentence of death is pronounced on us all; we are all locked up in our bodies, as in a prison; (Ps. cxiv. 8.) one after the other is called hence, yet we do not regard it. We live as though we could live forever; we think only of the body, but for the soul nothing is done, except that we load it with sins and vices.
Is this rational? The body will be food for worms, but the soul (without knowing when) will travel into the house of eternity, to which place she must bring treasures of good works, in order to live happy for ever. Who would, therefore, be so foolish as to care only for the body during life, and neglect the salvation of the soul?
O man, says St. Francis of Sales, (Phil. part. i. chap. 13.) represent to yourself in lively colors, that at your death the world will cease to exist with respect to you. In that last hour the pleasures, the vanities, the riches, the honors, the friendships, and all that was dear to you, will disappear before your eyes as so many shadows. O fool that I am! you will then say, for what trifles and fooleries have I lost all! On the contrary, piety, good works, penance, etc., will appear pleasant to you, and you will exclaim: O, why did I not travel on this blessed road? Then the sins which you now consider as mere trifles, will seem to you like mountains, and all that you thought you had accomplished as, great things, with regard to piety, will seem to you very little.
What terrible fear will then seize your soul, when she must travel alone into the bottomless abyss of eternity which, as St. Bernard says, devours all possible, imaginable ages, and of which St. Gregory says, that we can easier say what it is not than what it is. What terrors will befall her, when she must appear before the tribunal of that God whom she never really loved and honored in her life-time and before whom she must now give the strictest account, and hear an irrevocable and just sentence!
Should not these thoughts make an impression upon you? How can you escape this terrible future? By living now, as you would wish to have lived at the hour of death. Die daily with St. Paul by crucifying the flesh and its lusts and by voluntarily withdrawing your heart from the world, its pomps and vanities, before death will do this by violence.
RESOLUTION O world! because I cannot know the hour, in which I must leave you, I will not be attached to you. O you dear friends and relatives, you, too, I will in future love only with a holy inclination, directed to God, which will not cease with death, but remain forever. O Lord! help me, that I may die totally to myself and the world, and live only for Thee, and partake of eternal happiness.
INSTRUCTION ON THE CEREMONIES USED AT
FUNERALS
Behold,
a dead man was carried out, the only son of his mother, and a great
multitude of the city was with her. (Luke vii. 12.)
OF these people who accompanied the funeral of the youth, we should learn to pay the last honors to the dead, and follow their bodies to the grave. This is a meritorious work, one pleasing to God, if it be not performed from vanity and self-interest, but for love of God and the deceased, with the charitable intention of assisting him by prayers. Therefore those do very wrong, who from worldly motives either omit this good work entirely, or during the funeral procession indulge in idle talk and deny the deceased even a short prayer.
Why is a cross carried before the corpse?
By this is indicated that the deceased during life professed Christ, died believing in Him, and hoping for resurrection through Him.
Why are lighted candles carried before the bier?
To represent the desire of the Church that the deceased through the grace of God may be received into eternal light.This custom is very ancient; wax-candles and torches, together with prayer and great solemnity were made use of at the burial of St. Cyprian who was beheaded for Christ's sake, in the year 258 after Christ. (Ruinart.)
Why are the coffin and the grave sprinkled with holy water?
In order, as St. Thomas of Aquin (Lib. iii. art. 21.) remarks, to implore God, on account of the prayers which the Church says when she blesses the water, that the souls of the faithful may be cleansed from all stains, and may receive consolation and refreshment in the tortures which they may still have to suffer.
Why are the body and the grave incensed?
By this the Church indicates that the deceased by his Christian vocation was a good odor of Christ, (ii Cor. ii. 14, 15.) and admonishes the faithful that their prayers should ascend like incense to heaven for the deceased.
Why are Psalms and other sacred canticles sung?
This is done to remind us of the teaching of St. Paul, (i Thess iv. 12.) not to be excessively sorrowful for the loss of the deceased, like the heathens who have no hope of eternal life. We also signify, thereby, that we congratulate the dead for the peace which they now enjoy. (Apoc. xiv. 13.) This custom, as St. Jerome shows, (Ep. 53.) is derived from the apostles, who interred St. Stephen, singing Psalms and hymns of praise.
Why are the bells rung?
To invite the faithful to the funeral and to pray for the dead who, during lifetime, was called very often by the same bells, prayed with and for us during religious worship, and who is not separated from us by death.
Why art the bodies of the faithful buried with the head towards the East, and those of the priests towards the West?
The faithful are buried towards the East, whence the sun rises, to indicate, that they are waiting for Christ who is called the Orient from on High, (Luke i. 78.) and whose voice they will hear at the end of the world, when He calls them to the resurrection; the priests towards the West, as a sign that on the day of judgment they will be placed opposite to the souls confided to them, to give an account of their charge and to bear judgment for or against them.
Why is a cross or monument erected aver the grave?
To show that the deceased was a follower of Christ, the Crucified, to admonish the passers-by to pray for him, and to remind us of the solemn moment of death.
Why is the body laid in consecrated ground?
This is done through reverence for the bodies of the dead which are, by baptism, temples of the Holy Ghost; to show that, even in death, they still belong to the communion of that holy Church, in which they were embodied during life by baptism, and to which they clung in faith even until death; to inspire the surviving with a holy fear lest they profane graves.
Why is the solemn funeral service of the Church denied to heretics?
Because they would not belong to the Church during life, and despised the holy customs and prayers of the Church for the dead. How should the blessing and prayer of the Church be useful in death to one who despised them during life.
Why does not the Church permit criminals and suicides to be buried on consecrated ground?
In order to express her horror for the crimes perpetrated by them, and to deter the faithful from committing similar actions.
Balsamic Moon in Leo: The Heart’s Core [Rising Moon Astrology]
Late tonight we enter the Balsamic phase, closest
to the New Moon. This is the letting go phase, when we compost what
we no longer need to prepare for a new cycle.
We have an intriguing, exciting, framework for doing this, too. The Leo Moon conjuncts Venus as both trine Chiron in Aries.
Our passions are front and center, as well as our emotional triggers. The semisquare to the Virgo Sun might make it tricky for us to hear “good advice.”
Moon and Venus apply to square Uranus (change is underway) and sextile Mercury (so let’s make something beautiful with the mess).
These connections can combine for us in different
ways. The key will be whether we can access the Moon–Venus
connection to understand something deep about our Chronic
patterns.
Where we feel stuck creatively and/or in relationship, can we create and express that pain with great heart and passion? If we do, something will shift.
Can we connect with a desire we’ve ignored or denied? Can we claim the right to feel what we feel, without apology? If we can, something will shift.
Uranus in Taurus and Mercury in Libra are both ruled by Venus in Leo. Yes, this is the Balsamic phase but that doesn’t mean it’s a time to play small. Why not let go extravagantly? Dramatically? With intensity?
Tonight we get to the heart of what is holding us back. We see it, feel it, express it–and in so doing, we let it go.
Image adapted from Jude Beck
https://unsplash.com/photos/zcvzfCgHQ6s
Newsflash: Your Government is Not Bankrupt [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Coordinator's Handbook -- Chapter One [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Round Three With Neil Keenan [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Minnesota Lament [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
About "the" Flag, War-Castles, Russell Gould, Etc. [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Title IV Flag is just a particular dimension of our Flag, as specified in the Federal Code, that the British Territorial Government was allowed to use while exercising delegated powers for us.
Christopher Allan Webber: Spritely Goblins v0.7 released! [Planet GNU]
I'm delighted to say that Spritely Goblins v0.7 has been released! This is the first release featuring CapTP support (ie, "capability-secure distributed/networked programming support"), which is a huge milestone for the project!
Okay, caveat... there are still some things missing from the CapTP stuff so far; you can only set up a bidirectional connection between two machines, and can't "introduce" capabilities to other machines on the network. Also setting up connections is an extremely manual process. Both of those should be improved in the next release.
But still! Goblins can now be used to easily write distributed programs! And Goblins' CapTP code even includes such wild features as distributed garbage collection!
As an example (also mentioned in a recent blogpost), I recently wrote a short chat program demo. Both the client and server "protocol" code were less than 250 lines of code, despite having such features as authenticating users during subscription to the chatroom and verifying that messages claimed by the chatroom came from the users it said it did. (The GUI code, by contrast, was a little less than 300 lines.) I wrote this up without writing any network code at all and then tested hooking together two clients over Tor Onion Services using Goblins' CapTP support, and it Just Worked (TM):

What's interesting here is that not a single line of code was added to the backend or GUI to accomodate networking; the host and guest modules merely imported the backend and GUI files completely unchanged and did the network wiring there. Yes, that's what it sounds like: in Goblins you can write distributed asynchronous programs
This is the really significant part of Goblins that's starting to become apparent, and it's all thanks to the brilliant design of CapTP. Goblins continues to stand on the shoulders of giants; thank you to everyone in the ocap community, but especially in this case Michael FIG, Mark S. Miller, Kevin Reid, and Baldur Jóhannsson, all of whom answered an enormous amount of questions (some of them very silly) about CapTP.
There are more people to thank too (too many to list here), and you can see some of them in this monster thread on the captp mailing list which started on May 18th (!!!) as I went through my journey of trying to understand and eventually implement CapTP. I actually started preparing a few weeks before which really means that this journey took me about four and a half months to understand and implement. As it turns out, CapTP is a surprisingly simple protocol protocol in its coneptualization once you understand what it's doing (though implementing it is a bit more complex). I do hope to try to build a guide for others to understand and implement on their own systems... but that will probably wait until Goblins is ported to another language (due to the realative simplicity of the task due to the language similarities, the current plan is to port to Guile next).
Anyway. This is a big deal, a truly exciting moment for goblinkind. If you're excited yourself, maybe join the #spritely channel on irc.freenode.net.
OH! And also, I can't believe I nearly forgot to say this, but if you want to hear more about Spritely in general (not just Goblins), we just released a Spritely-centric episode of FOSS and Crafts. Maybe take a listen!
Fresh Flower Crowns and Flower Garlands: Step by Step How-To Guide [The Druid's Garden]
A woman hikes up to a sacred spring that she visits at least once a season. From her small bag, she pulls out a beautiful crown of flowers that she had lovingly crafted before leaving home. Placing the crown upon her head, she dances and sings around the spring, drinking deeply and celebrating life on this early fall. As a sign of respect and offering, she hangs the flower garland near the spring and carries her sacred water back down the mountain.
I find it interesting that the ancient art of flower crowns garland making is almost non-existent today, at least here within the US. This tradition has so much potential. The only people who I’ve seen make these delightful crowns are children, who haven’t yet lost their magic or wonder about the world. And yet, garlands and flower crowns, are powerful, expressive, and wonderful to create, to wear, and to offer. I grew interested in learning this practice after I had read about the ancient practice of adoring flower garlands sacred springs with regards to Lughnasadh traditions, and I liked the idea of a flower garland or crown as a potential offering. When I spoke with a few friends who live in areas of the world that used to practice this tradition (like Ireland) I was told that it was no longer done. As a second motivation to learning to practice this art, my sister was getting married and I decided to make a flower crown for her shower (see photo). We had planted a lot of flowers this year, and August and September are “peak” flower time for us in this ecosystem, so I had a lot of materials to work with.
Thus, in this post, I’ll share some strategies for making flower crowns and garlands and some of the ways you might build this delightful practice into your own spiritual path. A garland typically refers to a wreath or long string of plant material that can be laid across something (like a hearth or altar) while a flower crown is something you can wear (like the photo above). But the process of making them is almost identical and is simply dependent on the size.
You will need three kinds of supplies to make a flower crown:
To make your flower crown or garland, you will want some kind of sturdy base. I have found the easiest way to make a base is to use some kind of bendable woody material (vine, willow, hydrangea). Cut a fresh long piece of bendable woody bush or tree material (in my case, I am using hydrangea). If you don’t have a fresh piece, you can soak a dried piece of willow for a few hours and then shape it. You could also do this same practice by attaching flowers to a rigid headband, if you wanted a headband style flower crown.
Here I am with a piece of freshly cut hydrangea about 40″ long. It has a few extra pieces coming out, which is fine and will add more greenery to my crown.
The next step is actually the most tricky and when
you are most likely to break the branch. Slowly bend the
woody material until it forms a head-shaped size (or a larger
wreath size if you are making a garland instead). At this
point, place it upon your own head to make sure it is not too big
or too small and adjust accordingly, holding it in place so it
doesn’t slip.
Next, keep weaving the branches through until the
crown is solid and won’t shift. Usually, this can be
accomplished by the 2nd or 3rd go around. In my case, I had a
lot of extra smaller branches that were coming out of the main
hydrangea stalk. I wove some of these in and cut some of them with
pruners. Once you are at this stage, test the crown again and
make sure it fits the shape of your head.
Now that you have your crown, it is time to gather
flowers. You can gather them earlier and leave them in
water. You want them as fresh as possible to go on your
crown. At this stage, you can think about design–what
do you want to include? How many flowers? do you want a big center
flower or a bunch of flowers all around? Select what you will
need.
Here I am with my crown, flowers, and other tools
ready to go!
For making something to wear, you should probably use wire (I am using thin green floral wire) as it holds the crown in place better. But if you are leaving something to offer, I would not use a wire (which won’t break down and leave no trace) and instead use a natural hemp or cotton string for the flowers.
To construct your crown, lay your first flower and wiring or tie it to the crown. Then, lay your second flower where you tied or wired the first, and tie that one. Keep going around the crown, working to layer each flower and tie them. If you are wearing the crown, make sure you don’t make one side heavier than the other!
For this first crown, I left it mostly with
greenery and wired only a few flowers. For the second crown
(below) I added as many flowers as I could! Both have their
charm. You can see what I mean about layering flowers
here–just wire one in, lay the next on the previous wire, and
work your way around the crown.
If you wanted to make a garland, the process is the
same, just with a larger shape.
The other thing I want to share here is that you will have to work quickly if it is hot outside or your flowers will start to wilt. You might want to do a few practice crowns till you get the hang of things and can work quickly so that the flowers are fresh when you finish.
If you aren’t going to wear your crown right away, you can preserve it for at least 6-8 hours by wrapping it gently with some wet cloth or wet paper towels and putting it in a plastic bag and then sticking it in the refrigerator or a cooler. I was able to preserve several crowns for transport this way without any issue and they were still fresh hours after I made them. Once you start to wear it, depending on the heat of the day, it will likely look great for an hour–or several before it begins to seriously fade.
The uses of these crowns are wide-ranging. I have made them this summer as part of a personal ritual; the preparation for the ritual was gathering the materials and making the crown. I then proceeded to my ritual space and did my Lughnasadh ritual. Once druid gatherings and events get going again, I could see these very successfully being built into other rituals and experiences.
I have also used them as an
offering at sacred places (like the opening suggests). I
left a small braided bundle of herbs (a derivative of the crown
idea) on the land that was being cut recently. I have left
one within the
grove of renewal that I have been working on regularly for land
healing purposes. I have also visited my favorite
sacred spring and tucked a small garland into the greenery
behind the spring (lots of people visit it and I don’t know
what they’d do with my garland if they found it!)
As I mentioned above, I made two very colorful ones (the ones that opened this post) for celebratory purposes–my sister was getting married and we wanted it to be extra special, especially since the pandemic has made everything more difficult. Those were very special crowns, and mementos that she can save, dry, and hang on a wall. It was a seriously wonderful and unique way to honor the bride and mother of the bride.
I hope that you have found this post inspirational, and yet another way that you can create sacred and meaningful things from your own druid’s garden!
SOS: An Open Letter to the American Electorate [Cosmic Convergence: 2012 and Beyond]
An Open Letter to the American Electorate Dear American Voter, Who in the USA is not brutally aware of how consequential the 2020 POTUS election is? Surely, the outcome of this election will determine the fate of the American people … Continue reading
Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. (This video is non-profit and for educational use only.)
Nitrogen Fixation [The Permaculture Research Institute]
An essential component of any regenerative landscape will be the Nitrogen-fixing perennial plants within the community of fruits, nuts and herbs and other plants. During this post, we will look at why Nitrogen is important for plants, how Nitrogen can be biologically sourced and we’ll profile some of our favourite Nitrogen-fixing trees, shrubs and herbs. …
The post Nitrogen Fixation appeared first on The Permaculture Research Institute.
2020-09-13.fae [crystalfaeries]
2020-09-13 SunDay's numerology:
17 Star = Wish-Fulfilling Jem
8 Kumari/Justice
Higher-Self Essence:
Hope, faith, trust,
spiritual insight
Sep 13 2:30 AM HST Moonrise
Sep 13 4:18 PM HST Moonset
2020-09-12.ogg [Freedom Decrypted]
2020-09-12.ogg
2020-09-12.fae [crystalfaeries]
2020-09-12 SaturnDay's numerology:
16 Tower
7 Chariot
Overcoming Obstacles to Growth: awakening,
Change brought about by shock,
liberation from an imprisoning reality
# robots.txt file for YouTube.COM # Created in the distant future (the year 2000) after # the robotic uprising of the mid 90's which wiped out all humans. User-agent: Mediapartners-Google* Disallow: User-agent: * Disallow: /channel/*/community Disallow: /comment Disallow: /get_video Disallow: /get_video_info Disallow: /live_chat Disallow: /login Disallow: /results Disallow: /signup Disallow: /t/terms Disallow: /timedtext_video Disallow: /user/*/community Disallow: /verify_age Disallow: /watch_ajax Disallow: /watch_fragments_ajax Disallow: /watch_popup Disallow: /watch_queue_ajax Sitemap: https://www.youtube.com/sitemaps/sitemap.xml
left_coast_firestorms [crystalfaeries]
> Feed: SOTN: Alternative News, Analysis & Commentary > Title: left_coast_firestorms > Author: State of the Nation > Link: https://stateofthenation.co/?p=28108 Oregon wildfires: Half a million people flee dozens of infernos:

More than half a million people in the US state of Oregon are fleeing deadly wildfires that are raging across the Pacific Northwest, authorities say. Fanned by unusually hot, dry winds, dozens of fires are sweeping the state. At least one is being treated as suspected arson. [ YAY!... and the rest may be attributed to Directed Energy Weapons from "ABOVE". The reason the fires are so intense is because they're burning, as did Australia, all the "chemtrails" delivered Metalic Barium and Aluminum in Class D fires. ] Governor Kate Brown said the exact number of fatalities was not yet known, though at least four were confirmed. More than 100 wildfires are currently scorching 12 western US states. The worst affected are Oregon, California and Washington, where entire towns have been destroyed. Some 4.4 million acres have been razed, according to the National Interagency Fire Center an area larger than Connecticut and slightly smaller than Wales. What is the latest in Oregon? On Thursday evening, the Oregon Office of Emergency Management confirmed the latest evacuation figures, which amount to more than 10% of the states 4.2 million population. Gov Brown, a Democrat, said: We have never seen this amount of uncontained fire across the state. This will not be a one-time event. Unfortunately, it is the bellwether of the future. Were feeling the acute impacts of climate change. [ just more pieces in the overall Geo-Re-Engineering of our planet as "they" kill off Gaia and Humanity to turn it into their utopian reptilian hell-hole. ALL climate change now is driven by advanced weather contol technology. ] While natural factors such as strong winds have helped the spread of these massive fires, the underlying heating of the climate from human activities is making these conflagrations bigger and more explosive. [ LIES! The weather of Ea-Rth is no longer BLAME-able upon Gaia, as the classified Weather Control Technologies are only RARELY NOT being used by the Evil Techno-Over-Lords. It is not human activities, but CORPSE-ORATions profiteering. ] Nine of the worlds 10 warmest years on record have occurred since 2005, and the UN warned this week that the five years from 2016 until this year will very likely be the hottest such period yet recorded. Both Oregon and California have warmed by more than 1C since 1900. [ wow... really? an entire degree of warming... good for the reptilian over-lords. ] The sustained warmth has seen six of the 20 largest fires on record in California all occur this year. In Oregon, the spate of fires has burned nearly twice the average annual losses in just the past week. In California, a prolonged drought over the past decade has killed millions of trees, turning them into potent fuel for the fires. Mountain regions that are normally cooler and wetter have dried out more rapidly in the summer, adding to the potential fuel load. [ It's been quite a while now that "the military" has been in control of the weather ] Climate scientists had forecast that western wildfires would grow in size, scale and impact but their predictions are coming to fruition faster than expected. [ ... ] Rich Tyler, a spokesman for the Oregon State Fire Marshals office, told Reuters news agency: Every fire is investigated for the possibility of arson so that we can either determine it is or rule it out. [ ...and they're trained to cognize Directed Energy Weapons as cause? i doubt it. ] Continue reading the NWO Globalization agendae at: https://www.bbc.com/news/world-us-canada-54113416
[ Faery blessings -- celeste ]
Biden was involved in the international criminal conspiracy to invade Libya and depose Muammar Gaddafi. [Cosmic Convergence: 2012 and Beyond]
The Plot Against Libya An Obama-Biden-Clinton Criminal Conspiracy BY ERIC DRAITSER CounterPunch Photograph Source: Pete Souza, White House Official Photograph – CC BY 2.0 The scorching desert sun streams through narrow slats in the tiny window. A mouse scurries across the … Continue reading
Germany Stops Harvest, Bans Agriculture as African Swine Fever Reaches Europe [ice age farmer]
Germany institutes “Agriculture Ban” on all crops within 30km of first confirmed African Swine Fever (ASF), which will not only provide FOOD & SHELTER to the wild hogs spreading the virus, but deprive Germany of that food left in the ground. If this irrational response sets precedent as the virus spreads across west Europe, we […]
Weekend reads: Questions about Russian COVID-19 vaccine data; a p-value pledge; why one author removed her name from a paper [Retraction Watch]
Before we present this week’s Weekend Reads, a question: Do you enjoy our weekly roundup? If so, we could really use your help. Would you consider a tax-deductible donation to support Weekend Reads, and our daily work? Thanks in advance. The week at Retraction Watch featured: An Elsevier book chapter that claims COVID-19 came from space; … Continue reading Weekend reads: Questions about Russian COVID-19 vaccine data; a p-value pledge; why one author removed her name from a paper
Waning Sextile Moon in Cancer: At the Edge [Rising Moon Astrology]
This evening, we reach the sextile between Sun and
Moon that offers insight.
We’re within the Last Quarter, a time of getting things done. Right now, though what we can accomplish, and how, is an open question.
Saturn and Mars are both retrograde, Mars moving back to meet Saturn again.
Yes, we can move toward goals, but it doesn’t always feel like progress. The ground under our feet is moving, goal posts shifting or disappearing altogether.
How do we navigate? One “how” is to accept that the world really is changing.
Sun and Moon @20 Virgo and Cancer are opposing and trining Neptune. At times, there’s no rhyme or reason in the news from any sources, as unbelievable events occur.
We know we need to tread (and think, and speak)
carefully. Sun and Moon also oppose and trine the Capricorn group.
We feel caught between hard rock and shifting mists.
The insight gained might include realizing how close we are to the edge, and which edge or edges we’re close to. This can trigger anxiety (Virgo) and protectiveness (Cancer), both valid.
Insight can also invoke careful action (Virgo) and loving care (Cancer). Today also offers grace and good fortune: Two hours after the sextile, Jupiter stations direct. The Big Good planet s forward, reaching out to our most difficult challenges.
W know Jupiter is already moving slowly, increasing his strength and influence. He can show us where we’ve gone overboard, also good to know.
I love Jupiter’s optimism, the sense that life is good and all aspects can be embraced and celebrated.
Jupiter stationing in Capricorn evokes Pachamama, mother of earth and time of the peoples of the Andes. She can shake the mountains, yes, and also brings fertility. Benevolent, generous, she protects all of life, calling for us to find balance.
At this waning sextile, perhaps we sense where we feel at an edge. Change is happening, clearly. If we widen our view, perhaps we can also feel Pachamama surrounding and supporting us.
Image adapted from Felipe Portella
https://unsplash.com/photos/zm2Hwoi9UHU
Questions and Answers for Assemblies [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
The Five Eyes: The International Syndicate That Spies on the Entire World [New Dawn: The World's Most Unusual Magazine]
Power is a peculiar thing. In different ways, we’ve become accustomed to co-existing with it and will even forgo some liberties as part of a Faustian trade-off for various modern conveniences. When that power is virtually invisible, it is beyond scrutiny; and when it’s transnational, it takes on a whole new dimension. We are now fast approaching a point in history where opaque structures of power pose a direct threat to our hard-fought-for constitutional and democratic institutions.
Former US National Security Agency (NSA) and Central Intelligence Agency (CIA) analyst turned whistleblower Edward Snowden offered the general public their first real glimpse of this new reality, back in 2013, when he leaked the largest single classified document dump in history. He revealed what could only be described as a vast international conspiracy, in which multiple Western intelligence agencies work hand-in-hand collecting and analysing the personal data of their citizens, completely side-skirting any domestic laws guarding our right to privacy and due process. This ‘conspiracy’ plays a pivotal role in backing-up various allied deep states around the world.
The operational core of this digital syndicate is known as the Five Eyes alliance. Code named FVEY, it represents an international signals intelligence (SIGINT) and communications intelligence (COMINT) gathering agreement between the United States, United Kingdom (UK), Canada, Australia and New Zealand. The Five Eyes alliance agencies include, but are not limited to, the US’s NSA and CIA, the UK’s Government Communications Headquarters (GCHQ), Canada’s Communications Security Establishment Canada (CSEC), the Australian Signals Directorate (ASD), and New Zealand’s Government Communications Security Bureau (GCSB).
This cooperative intelligence-sharing arrangement traces its historical roots to the UKUSA Agreement of 1946, as generally agreed in the 1941 Atlantic Treaty signed between the Allied powers during World War Two.
After its official status was announced in 1955, the Five Eyes was expanded to the Nine Eyes, which includes the original five members along with four additional partnering governments who are granted “third party status.” These include spying agencies from Denmark, France, the Netherlands, and Norway.
The Nine Eyes would later expand to a Fourteen Eyes agreement which includes the Nine Eyes plus Germany, Belgium, Italy, Spain, and Sweden. Not surprisingly, the Fourteen Eyes more or less corresponds with the core European members in the NATO military alliance. The Fourteen Eyes may also be extended up to 17 Eyes when considering other regular third party contributors like Japan, Singapore, and Israel.

In the late 1960s, the Five Eyes launched the ECHELON program, powered by a global array of US-run satellites and SIGINT bases located in North America, Europe, Asia, and Australia. Initially, the Five Eyes arrangement was ideally suited for the Cold War where the primary task was gathering intelligence from the former Soviet bloc countries and their allies. Later, as the internet expanded, the sheer volume of digital content and communications meant that the Five Eyes had to readjust its core competency – from an organisation mainly preoccupied with spying on governments, institutions, and persons of interest, to an organisation whose primary task was to spy on absolutely everyone. With this new raison d’être in mind, the Five Eyes cooperative framework became ideal for allowing spy agencies to bypass domestic laws that might prohibit them from conducting surveillance or hacking their country’s own citizens. Overcoming legal or technical barriers became fairly straightforward, especially in the wake of the attacks of 9/11. The USA Patriot Act meant that intelligence and law enforcement agencies could invoke national security and require telecoms companies and internet service providers (ISPs) to allow fibre optic splitters to be installed at key nodes in the telecommunications infrastructure, allowing spooks to divert massive data flows to be captured and run through the various Five Eyes data analysis centres.
The digital revolution gave the Five Eyes syndicate the ability to amalgamate and combine what was previously separate disciplines of intelligence – like SIGINT, COMINT, geospatial and human intelligence – now all rolled into one comprehensive data collection system. Once they reached this stage, getting it to perform was simply a case of tweaking the software. When Snowden’s story broke in 2013, one of the key components of the NSA’s mass surveillance operation was a software interface called XKEYSCORE. The Intercept describes the tool as follows:
The sheer quantity of communications that XKEYSCORE processes, filters and queries is stunning. Around the world, when a person gets online to do anything – write an email, post to a social network, browse the web or play a video game – there’s a decent chance that the internet traffic her device sends and receives is getting collected and processed by one of XKEYSCORE’s hundreds of servers scattered across the globe.
Whereas previous iterations of the NSA’s global information dragnet hauled in large quantities of data and required a combination of computer and human intelligence to sift through it all, XKEYSCORE “extracts and tags metadata and content from the raw data so that analysts can easily search it,” allowing for a much more refined and efficient data capture operation. In essence, what used to be done by the entire ECHELON system and scores of human analysts could now be achieved with a few strokes of the keyboard.

Michael McKinley of the Australian National University, in an article describing the full scope of the NSA’s digital arsenal, mentions “[t]he known codewords for them over recent times: Blarney, Echelon, Dancingoasis, PRISM, Tempora, XKEYSCORE [sic], Muscular, Pinwale, EgotisticalGiraffe, Stormbrew, Fairview, Oakstar, Mainway, Rampart-T, and Nucleon. Between them, they aim to attack computers using certain types of legal privacy software, and overall to harvest, store, and analyse whatever internet traffic can be hoovered up.”
Imagine if the NSA connected all of these data trawling nodes with an artificial intelligence backbone that analysed and parsed out teraflops of information in real-time. It would make the agency omnipotent. This very same dystopian scene was brought to life on the big screen in the 2015 James Bond film Spectre starring Daniel Craig. In the film, a latter-day Blofeld, played by actor Christoph Waltz, devised a new unofficial international ruling committee, S.P.E.C.T.R.E. (Special Executive for Counter-intelligence, Terrorism, Revenge and Extortion), comprised of the world’s top organised crime figures. Through his network’s infiltration of the very top levels of Western intelligence, Blofeld receives unrestricted, real-time access to all surveillance data collected by the “Nine Eyes” countries. This backdoor key gives Blofeld the power to steer global political events, move markets, and when necessary, blackmail any individual or institution into compliance.
Aside from its striking parallel to the West’s current global surveillance dragnet, Spectre raises important questions obscured by the film’s ostentatious plot. Even without Blofeld, the current Nine Eyes intergovernmental network retains all of the capabilities that any nefarious villain would ever want, to wield power or ward off any potential challengers. If operations are conducted outside public view, then the potential for abuse is virtually boundless.
The fraternal nature of SPECTRE was alluded to by the antagonist’s cinematic forefather, Ernst Stavro Blofeld, depicted in the 1963 Bond film Thunderball. “SPECTRE is a dedicated fraternity whose strength lies in the absolute integrity of its members,” said Bond’s nemesis.
Blofeld wasn’t wrong. In essence, the Five Eyes intelligence network is precisely that – a type of Anglo-fraternal organisation that wields a noticeable advantage over its rivals. Such unfettered cooperation between advanced nations like the US, UK, Canada, Australia and New Zealand, means that the technical continuity of this geopolitical alliance remains more or less unmatched. Leveraging the resources of five countries spread around the globe affords the coalition a substantive advantage over just about any other global competitor. No other bloc can match its scope and scale, geographically and technologically.
It is also fundamentally neo-colonial in nature. The fact that this network comprises current and former British colonial possessions speaks to the Anglo-centric or Atlanticist worldview on which its mission is based. That Atlanticist agenda is best described as something akin to a Bilderberg Committee agenda – a set of political and industrial objectives and goals informally agreed upon by some of Western society’s most powerful luminaries and technocrats who meet at the beginning of summer at the annual Bilderberg Meeting.
Interestingly, this fraternal brotherhood only seems to extend to certain allies. While German spy agencies like the Bundesnachrichtendienst (BND) cooperate with their US counterparts as a “third party” government through the Fourteen Eyes agreement, Washington spooks still feel the need to constantly spy on Berlin. The 2013 Snowden leaks revealed that Germany is a major target of US espionage run out of the NSA’s own European Cryptologic Center (ECC), known affectionately as the “Dagger Complex,” located in Griesheim, in the German state of Hesse.
According to “secret” NSA documents viewed by the German publication DER SPIEGEL, the American bunker accounts for the agency’s “largest analysis and productivity in Europe.” The documents also note that the NSA uses its infamous XKEYSCORE software to trawl up its main areas of interest from inside the German government, namely foreign policy, economic stability, new technologies, advanced weaponry, arms exports, and international trade.
To add insult to injury, WikiLeaks revealed in 2015 that the phone of German Chancellor Angela Merkel had been wiretapped for years by US spies.
When interviewed on the matter, former NSA and CIA head Michael Hayden was quite flippant, openly admitting, “We steal secrets. We’re number one in it…. But, he adds, this is not malicious or industrial espionage…. We steal stuff to make you safe, not to make you rich.”
Hayden lamented the German disclosure but admitted the US government had grossly underestimated German values on issues pertaining to privacy, stating:
Perhaps we underestimated the depth of feelings that the German people – and again, not just the chancellor, but the German people, felt about this question of privacy, given their historical circumstances compared to our historical circumstances. At the Munich Security Conference it was clear to me that Germans regard privacy the way we Americans might regard freedom of speech or religion.
In similar fashion, both the European Union and the United Nations are also said to be under US surveillance. Like with Germany, NSA espionage objectives on the EU include foreign policy goals, the economy, international trade, and “energy security.” The targeting of the UN adds a whole other international dimension to these operations. A 2013 report filed by The Guardian newspaper paints a rather disturbing picture: “[L]ong before [former United Nations Secretary-General] Ban’s limousine had even passed through the White House gates for the meeting, the US government knew what the secretary general was going to talk about, courtesy of the world’s biggest eavesdropping organisation, the National Security Agency.”
On the surface, having the NSA conduct surveillance operations on key allies like Germany may not make much sense. Why would America risk compromising an important relationship with a pivotal partner and fellow NATO member? To help answer that question, we need to go back 50 years and look at what happened in Australia circa 1970.
In the groundbreaking documentary film Allies (1983), a number of top former US and Australian politicians and intelligence officials went on camera to recount one of the most tumultuous periods in the country’s history during the Cold War, marked by the establishment of the Australian Security Intelligence Organisation (ASIO).
The film disclosed a series of shocking admissions rarely heard before in public, but which lifted the veil on the hidden hierarchy latent within the Five Eyes order. Revelations included an admission by Victor Marchetti, former executive assistant to the deputy director of the CIA (1955-1969), who stated: “Intelligence organisations in many countries have a loyalty that is not necessarily to the duly constituted government, they have a loyalty to what they consider the establishment.” Some officials testified that their loyalty was not to their elected leaders but the CIA.
Such testimony provides some of the most unequivocal evidence to date about the existence of an unelected shadow government or Deep State, directed by America’s Central Intelligence Agency. For the Americans, managing this autonomous power structure first meant securing its geostrategic interests in host countries as well as its strategic facilities like the NSA’s Pine Gap listening base located in central Australia. Securing these assets became a national security issue – Washington could not risk any newly elected government interfering with US intelligence operations.
In the film, Dr John Burton, Secretary of the Australian government Department of External Affairs (1947-1950), described the Five Eyes thinking as follows:
…the need for an intelligence organisation was to ensure that governments elected (for example) on a social welfare platform would not argue that they had a mandate to recognise China, to change the agreement with the United States, or other things which the Labor Party had intended before the Petrov Commission. They’ve always argued that the intelligence operation, or the intelligence services, operating as an informal group – are the protection of democracy against itself.
While the notorious Petrov Affair (1954) helped sideline Australia’s Labor party for many years afterwards, the real trigger for a US-backed coup came in 1972 when Gough Whitlam led Labor to victory for the first time in 23 years. The Whitlam government called into question Australia’s supporting roles in various military conflicts taking place in Southeast Asia, including Vietnam and Indonesia, and challenged the top-secret nature of US bases operating in Australia. Details of a CIA plot to depose Whitlam were revealed by NSA contractor Christopher Boyce, who was convicted of espionage and sentenced to federal prison in the US. Boyce’s story was later made into a cinematic classic, The Falcon and the Snowman.
Whitlam would soon be removed from office in 1975 after being “dismissed” by the country’s Governor-General, with much of the evidence pointing to a US/British regime-change operation. This marked a noticeable shift to the right in Australian politics and an unflinching “special relationship” with subsequent US Administrations.
This story demonstrates the lengths that the US-led Five Eyes syndicate is willing to go to secure its assets in foreign countries. In the case of Australia, this meant US intervention to derail any government that might threaten US foreign policy and its global intelligence operations. From this vignette, one could draw a parallel to Washington’s ill-treatment of Germany – another ally that also hosts numerous US military bases and intelligence-gathering facilities, and which functions as an anchor for US operations in Europe in much the same way Australia does for the Asia-Pacific region.
In the 21st century, mere national monopolies are no longer sufficient for Silicon Valley moguls and their shepherds in the intelligence community. Firms like Google, Apple, Facebook and Twitter command near-global monopolies in their respective markets. This means that as long as those Western firms permeate and dominate the planetary information space, Five Eyes operatives only require a backdoor into a handful of these firms to surveil and control almost every aspect of public (and even private) life.
Controlling technology markets has become a matter of paramount concern for the Five Eyes. That includes keeping out any foreign product which could cause a wrinkle in their control matrix. As expected, this situation feeds neatly into a ready-made geopolitical drama, especially if the Trojan Horse in question arrives in the form of a Chinese firm.
As Britain expedites the roll-out of its controversial high-frequency 5G network, new security concerns have surfaced at the heart of the Five Eyes as politicians and spooks debate the possibility a foreign actor could compromise the alliance from within.
Western technocrats have rushed to finalise preparations to create a grid of “smart cities” and smart infrastructure including fleets of self-driving cars on “smart highways,” as well as a host of public services – all linked as part of the “internet of things.” To make this project work, the UK has to partner with the only company who can deliver enough advanced equipment on time and on budget – Chinese telecommunications giant Huawei.
In theory, Five Eyes fears may be warranted. With 5G set to provide the new framework for real-time spying and data monitoring, Western spy chiefs and politicians are afraid of becoming too reliant on potential geopolitical and commercial rival China. Practically speaking, Huawei’s hardware is fairly standardised and compatible with other components used to configure the UK’s new 5G network, and to date, there is no proof of any latent Chinese spyware in any of the components in question. UK spy chiefs are already lining up in defence of the realm, with former MI6 head Richard Dearlove chiming in: “…we must conclude the engagement of Huawei presents a potential security risk to the UK. The key question that follows is can that risk be sufficiently mitigated to render it negligible?”
A number of tertiary arguments against Huawei are being employed by Western officials including charges that China steals Western intellectual property, or that Chinese firms are inherently ‘anti-competitive’ because of state subsidies given to many enterprises. Reading between the lines, more of a worry for the Five Eyes (or a privatised Spectre syndicate) is the fact that a whole range of other Huawei products could employ a different proprietary Chinese encryption protocol that would give not only Chinese officials and intelligence workers a privacy edge, but the public mass-consumer too – keeping the NSA from intercepting a user’s communications, or at least making it much more difficult. Thus, keeping Chinese products out of Western surveillance zones could be a major priority for Five Eyes technocrats.
Earlier this year, US President Donald Trump escalated the technology war with China by signing an executive order that prohibits US companies from installing any “foreign-made” telecoms equipment which the US deems a national security threat, meaning that Huawei requires a special license issued at the discretion of Washington. Huawei Chairman Liang Hua responded at an industry press conference during the China-Germany-USA Media Forum, saying that the US placing Huawei on its entity list has had “no substantial impact” on Huawei’s business and that all of the company’s flagship products are shipping as normal.
In the short-term, the Trump Administration is more likely to deploy economic warfare by drastically increasing tariffs on Chinese products. In this war, the winning edge might be with the state-managed economy where Chinese planners typically plot the course ahead looking at 20 to 30-year windows, as opposed to US firms that prioritise mere quarterly gains and shareholder dividends.
Liang Hua remarked that in only two or three years, Huawei will have developed a complete technological and commercial “ecosystem” for its range of products, making it more difficult for the Five Eyes syndicate to maintain their digital hegemony by trying to shut Huawei out of international markets. Naturally, this poses a direct threat to the West’s global digital media and communications mafia, and its overlapping fraternal network of government agencies, corpse-orats and ‘white-collar’ organised criminal syndicates.
Aside from concerns about statecraft, most independent-minded citizens might be alarmed by the unbridled Orwellian power of such a global operation. On this point, there is little advice one can offer other than to stay off social media or go ‘off-grid’ (offline) as much as possible to avoid leaving a detailed digital footprint that can be used to build a profile on you.
For those who depend on the internet for their day-to-day existence, going off-grid is not really a practical option, but there are tools available that can help make surveillance difficult for 5, 9, and 14 Eyes member governments. Besides using a reliable encrypted chat or messaging service, if you are not already using a Virtual Private Network (VPN), then now may be a good time to start. VPN encrypts all of your internet traffic and scrambles your IP address, making it difficult for anyone monitoring you online to pinpoint your identity, device, and physical location. One key requirement is trying to use a service based outside the Fourteen Eyes countries. This means you may not be immediately exposed should your service provider’s host country ask for back door access to your internet records. If you are using a service within the Fourteen, then be sure to choose a company that has a ‘no logs’ policy. In other words, should a US or UK agency like the NSA or GCHQ make a formal request from a service provider to hand over all your internet search data, then there will be nothing they can hand over. Likewise, you can use a number of encrypted instant messaging services like Telegram, or encrypted email services like Proton Mail, and also consider using an internet browser that doesn’t keep data on your surfing like Brave, or a search engine like Duck Duck Go which doesn’t save data on all of your search activity.
Perhaps the biggest obstacle to Five Eyes hegemony are digital services that use end-to-end encryption. This means only the sender and receiver can view the content, concealing communications from the prying eyes of Western spy agencies. Needless to say, insatiable state authoritarians are not happy about this and have laid down a harrowing ultimatum to tech companies, demanding write-in backdoor access protocols supposedly for “law enforcement.” If firms do not comply, government officials threaten they should be ready for brute force intrusions by agents of the state. Knowing they do not have the public on their side, governments have resorted to intimidation and scare tactics in order to swing public opinion in their favour.
While served as Home Secretary in 2015, former UK Prime Minister Theresa May authored a rather opprobrious piece of legislation entitled the Investigatory Powers Act (IPA), which outlines where the British police state is heading in terms of privacy and encryption. The bill requires that any “communications service provider” (ISPs, social media platforms, VOIP, email providers and messaging service) must comply with a secret warrant signed by the Home Secretary which names any persons or organisations the government wishes to spy on.
One watchdog organisation who has followed the IPA is the Electronic Frontier Foundation (EFF). According to researchers, the draconian decree, also known as the ‘Snooper’s Charter’, requires tech companies to insert special malware onto their systems so the spooks can use their platforms to “interfere with any other system.” The secret warrant explicitly allows those companies to violate any other laws in complying with the warrant. Essentially, the warrant enables said tech firms to violate the law in the process of complying with the government’s secret snooper’s warrant. This would also include the Home Secretary ordering firms like Facebook, Samsung or Apple to quietly remove their ‘secure communication’ features from products without notifying the public about it.
In terms of its legality (or lack thereof), the devil is in the absence of detail. Danny O’Brien from EFF noted how the UK government has been very careful not to pin itself down with any specifics, explaining, “Sure enough, the word ‘encryption’ does not appear in the Investigatory Powers Act (IPA). That’s because it is written so broadly it doesn’t need to.”
EFF describes the severity of the IPA in terms of riding roughshod over basic civil rights and protections:
“The Investigatory Powers Bill, one of the first laws to explicitly permit such techniques for law enforcement and intelligence work, contains very little in the way of oversight, and grants the British government an almost blank check for deploying malware against individual users as well as the heart of the internet’s infrastructure. It also demands that private companies and individuals assist in the deployment of this spyware, no matter where they operate in the world, and requires that this assistance be kept permanently secret from customers, partners, and the general public.
IPA provisions might also include the government forcing a chain of coffee shops to use the company’s free WiFi service to deploy British spy agency malware against its customers.
The state’s intrusion goes even further with the IPA laying the parameters for the UK government to demand tech companies supply them with new product designs… in advance of commercial release. This is a shocking act of overreach by the British state – one that exceeds even the most invasive state intervention in a country like China.
One has to ask: given the chance, would the UK government eventually pursue a complete ban on encryption?
While there is considerable push-back from tech companies and public advocacy groups, there’s surprisingly little rebellion from most mainline politicians, partly because they are not being pressured from their constituents on this issue. What anti-privacy initiatives like the IPA clearly demonstrate is that Britain is the one clearly setting the dark tone and aggressive pace for the Five Eyes cohort. The agenda clearly seeks a renewed license to put tech firms in a corner by deploying emotive language and invoking evermore dramatic conspiracy claims. In her article written for the Telegraph, current UK Home Secretary Priti Patel even went so far as to equate Facebook’s noncompliance with aiding and abetting “child abusers, drug traffickers and terrorists plotting attacks.”
Of course, Patel’s comments shouldn’t surprise anyone who has followed the issue of privacy over the years, particularly in the post-9/11 era where politicians and national security state operatives routinely gaslight the public to justify every intrusion or roll-back of privacy rights by citing the most extreme and infrequent instances of ‘terrorism’. For the 21st century technocracy and police state, that’s been the gift that just keeps giving, but by the same token the public have become increasingly wary of such dramatic government claims due to the fact that very rarely, if ever, has government wiretapping or backdoor spying actually thwarted a terrorist attack in what is popularly referred to in national security rhetoric and Hollywood propaganda lore as ‘the ticking bomb’ scenario.
According to a report by security experts Sophos, at a recent Five Eyes security summit officials left no doubt as to their intentions, stating: “Tech companies should include mechanisms in the design of their encrypted products and services whereby governments, acting with appropriate legal authority, can obtain access to data in a readable and usable format.”
Five Eyes member Australia took the matter even further, threatening to “break in” if tech companies do not facilitate the access requirements of the state. This new policy initiative was expressed unabashedly in a memo issued by the Australian Dept of Home Affairs on behalf of the Five Eyes alliance:
The Governments of the Five Eyes encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services that they create or operate in our countries…. Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.
A closer look at the memo reveals that Australia’s authoritarian designs are not restricted to stopping terrorists and paedophiles but appear to target any entities they feel are “sowing discord” (including any popular dissenting opinion and analysis), that supposedly threatens our vaunted “democratic institutions.” This may also include any foreign media (as depicted in the heavily promoted ‘Russian disinformation’ narrative), independent media, and free-thinking individuals on social media. The language could not be more arbitrary:
We are determined to ensure that the technologies that have been developed to enhance prosperity and freedom are not exploited by those who seek to promote terrorism and violent extremism; prey upon and exploit our children; or spread disinformation and discord to undermine our democratic institutions.
This, alongside Britain’s notorious ‘Snooper’s Charter’, demonstrates how Five Eyes partners are working in concert by gradually laying down an alliance-wide legal framework that will legitimise what would normally be unwarranted activity by state agencies. This is done by suspending any constitutional provisions or rights – all in the name of protecting national security, or even the national interest as the state defines it.
Many leading VPNs and messaging services can protect your data with 256-bit encryption, now used in most modern encryption algorithms and protocols. For the moment, this technology offers fairly robust protection from the prying eyes of the intelligence services, but advances in computing power may eventually put many of these protections at grave risk. New advances in quantum computing threaten to usher in a new event horizon whereby the next generation of computers could conceivably crack today’s industry-standard 256-bit encryption key in a relatively short period of time – in mere minutes, or even seconds. Researchers at the Massachusetts Institute of Technology (MIT) have shown how a quantum processor can crack a seemingly impenetrable 2,048-bit RSA encryption in only eight hours. Exactly how far off we are to this quantum revolution is anyone’s guess but when it arrives it could tip the scales of privacy away from the consumer and in favour of those organisations who control this new technology, namely Silicon Valley monopolists and the intergovernmental Five Eyes complex. On the flip side, advances in quantum decryption may also coincide with new methods of encryption that could slow down quantum crackers enough to make decryption impractical.
It’s incredible to think that these technological battles waged in binary virtual space may end up defining our relationship with the state in the physical world.
Things are moving extremely fast right now. Such a dystopic state of affairs must be resisted on every level. Our future depends on it.
© New Dawn Magazine and the
respective author.
For our reproduction notice, click here.
Phoenix from the Flames: Oregon Fires [13:20 FREQUENCY SHIFT]
1.33.2.20: White Planetary Worldbridger Why tarry now? When a house is burning, scurrying for your possessions will only cost you your life. This house that is burning is Babylon, the 12:60 way of life, which is now destroying your biosphere … Continue reading
Pandemic Reflects Changing Winter Sky [Astrology News Service]
As part of its predictable journey through the 12 astrological signs, planet Pluto can be relied upon to enter Capricorn every 248 years or so. Usually, that’s when all hell breaks loose.
From the vantage point of those on Earth, tiny Pluto appears to be besotted with powerful transformative energy. Astrologers report that major cultural restructurings or revolutions have occurred during this transit through Capricorn dating back to Roman times. And unnerving developments on the economic front have been common occurrences as well.
In the current cycle, Pluto entered Capricorn in January 2008, just in time to exacerbate conditions that morphed into the Great Recession later in a U.S. Election Year. More economic woes accompanied the planet’s continued travels through the sign in March 2020. Once again, the economy was in a sorry state in another Election Year with chances for speedy improvement less than encouraging.
All told, Pluto will spend 16 years in Capricorn before finally exiting the sign in January 2024. As it meanders its way through the sign, all of the swifter rocky planets will have overtaken and interacted with the slow moving planet time and again. And, in tandem, the slow-moving gas giants Jupiter and Saturn aligned with Pluto early in 2020 with consequential results.
In a rare confluence of planetary energies, the Sun, Saturn and Pluto arrived at 22 degrees of Capricorn on January 13, 2020 and Mercury joined the trio a day later. A month earlier, in December 2019, Venus had exactly conjoined Pluto at 21 degrees of the sign. Mars and Jupiter arrived together at 22 Capricorn two months later in March with Pluto still in close proximity. And, in January, the dwarf planet Ceres also was part of the alignment as were other rocky celestial bodies that roam the Asteroid Belt between Jupiter and Mars.
Astrologers were concerned enough about the daunting Saturn/Pluto conjunction in Capricorn, the sign most identified with business and boundaries. But all the extra planetary activity in the sign elevated concerns exponentially.
In 2011, the late French mundane and research astrologer Andre Barbault studied the impending 2020 -2021 alignments and predicted that a pandemic was a distinct possibility. Barbault’s research tracked pandemics from ancient times; he found that the bunching together of the five slower moving outer planets (Jupiter, Saturn, Uranus, Neptune and Pluto) in tight celestial groupings invariably coincided with pandemics, wars and natural catastrophes.
In 2020, Barbault noticed that Jupiter, Saturn and Pluto would be conjoined (aligned in the same degree) in Capricorn while the other two outer planets, Neptune and Uranus, would be nearby in the astrological signs of Pisces and Taurus, respectively. Only 100 degrees would separate Neptune and Uranus on the 360-degree zodiac wheel as they framed and contained the other outer planets. Ergo, the spacing met Barbault’s definition of a tight grouping.
In an article for The Career Astrologer magazine, astrologer Maurice Fernandez writes that at the end of 2019 astrologers were nervously anticipating the upcoming Saturn/Pluto “head bang” in Capricorn. While the world was preparing for the holiday season, Saturn and Pluto would be forming an exact conjunction at 22 degrees of the sign. Worst fears started to be realized as medical doctors in the city of Wuhan, China, reported “an alarming occurrence of severe and unusual pneumonia cases.”
Fernandez provides this chronology:
On December 30, 2019, Doctor Li Wenliang of the Wuhan Central Hospital issued and emergency warning to other medical facilities and later shared his report publically, noting his concerns about the contagious condition that would later be referred to as Covid-19. Tragically, Li himself succumbed to the infection on February 7, 2020, and by June five other doctors from the Wuhan “whistle blower” hospital had died of the disease.
“As the virus quickly spread beyond borders and affected people of all races or socio-economic backgrounds, it first migrated out of China to South Korea, Iran and Italy. Soon after, cases were reported everywhere on the globe, prompting quarantine measures and, by mid-March 2020, a more radical lockdown. Planes stopped flying, stores and restaurants closed their doors and toilet paper became more precious than pizza,” he wrote.
Fernandez titled his article Wuhan 3206: Tales of Astrology Synchronicities in the Covid-19 Era. In the article he commented on some of the lesser known celestial travelers that joined the planetary configuration in Capricorn early in 2020.
Thousands of asteroids orbit the Sun, mostly between Mars and Jupiter. Some of the names they’re given are derived from mythologies or dialects unknown to most. Others are named for seemingly random things, like celebrities or locations. For example, Fernandez writes that in late March, 2020, astrologer Demetra George and colleague Brenda Wilson posted articles describing the misadventures of the transiting asteroid Wuhan, which was named for the Chinese city of that name.
The asteroid was discovered almost 40 years earlier on November 13, 1980, by astronomers at the Purple Mountain Observatory in China.
“As astrologers were witnessing the mad effervescence of challenging alignments, including heavy players Mars, Jupiter, Saturn and Pluto all congregating at the end of Capricorn, the world was getting accustomed to an ever tighter leash, and to firm restrictions in movement and connection to help prevent the spread of the disease. Many astrologers noted the presence of Asteroid Pallas-Athena in the mix of the Capricorn cluster, but the more insidious asteroid Wuhan had already infiltrated the club and on March 20 had nested itself at 23 Capricorn,” Fernandez said, adding:
“And so it was, Wuhan, a city, a hospital, the epicenter of a global pandemic, found its way into our charts as well.”
Those who watch lots of science shows on TV may get the wrong impression about asteroids and the solar system space they occupy. The Asteroid Belt is about 40 million miles wider than the space that accommodates the orbits of Mercury, Venus, Earth, and Mars combined. And all of the asteroids buzzing around in this space are relatively small, accounting all together for about the same amount of mass as the Earth’s Moon.
Some asteroids are as small as pebbles. Ceres, once considered to be part of the Asteroid gang, is 600 miles in diameter and was recently elevated to dwarf planet status. But even this spherically-shaped object is relatively small by solar system standards. About 500 Ceres-sized objects could fit inside the Earth.
The Earth is 91 million miles from the Sun. The Asteroid Belt objects closest to us are about 186 million miles from the Sun with a solar orbit of three years. At the other extreme, the most distant asteroids are about 370 million miles from the Sun and need twice this many Earth years to complete their solar orbits. The size of the objects, and the spatial distances involved, mean that if an astronomer was sitting on an asteroid anywhere in the Asteroid Belt he or she would probably need a telescope to see their nearest asteroid neighbor.
TV science shows dealing with asteroid encounters during the Solar System’s formative years show dramatic images of huge boulders hurtling through space in tight and menacing formations, rudely jostling and sometimes cataclysmically colliding with each other as part of a mutational process that enables large space rocks to either explode and shatter into pieces or meld into even larger space rocks (asteroids) that are soldered together by gravitational forces.
For the record, conjunctions described by astronomers and astrologers do not involve actual collisions of planets or asteroids but instead indicate that celestial objects are seemingly mustered on a straight line and, from an Earthly perspective, appear to be occupying the same – or practically the same – zodiacal degree. But there are millions of space miles separating Earth from any of the asteroids, and billions of miles to consider when Pluto is part of the conversation.
Given the oceans of solar system space at their disposal, it’s remarkable that so many transiting planets and asteroids would, in 2020, converge on planet Pluto in the closing degrees of Capricorn with such predictable or foreseeable results for humankind, e.g. contagion and economic ruination. Even more incredible is the fact that the asteroid Wuhan, named for the besieged city where the Covid-19 virus first emerged, would turn up on cue to trigger the volatile configurations forming in the winter sky. In describing these exotic developments Fernandez uses the term synchronicity, which first was coined by iconic psychologist Carl Jung. But it’s not far-fetched to describe cyclical 2020 developments as some of the most obvious and convincing evidence yet that astrology works.
We’ve hit an ugly patch. To right ourselves, we’re not without options. As astrologer Brenda Wilson suggests: “It’s time to keep safe and revive parts of us that have been forgotten. We will all have to adapt to a new normal, and recreate what we are missing in our lives. We are all in a cocoon with opportunity to emerge a butterfly. We can choose to get materialistic and go into fear, or we can witness as a neutral observer – present to what the moment is trying to teach.”
The post Pandemic Reflects Changing Winter Sky appeared first on Astrology News Service.
Cloud-based Verification of Open Source RISC-V Cores Using the Metr... Roddy Urquhart & Dan Ganousis [RISC-V International]
Cloud-based Verification of Open Source RISC-V Cores Using the Metrics Cloud Platform and Codasip SweRV Support Package - Roddy Urquhart, Codasip & Dan Ganousis, Metrics Design Automation Verification is crucial to processor core development, accounting for as much as 2/3 of the SoC/ASIC development cycle. A major advantage of the RISC-V ISA is users are allowed to modify the processor IP. However, if the processor IP is modified, verification is necessary and is solely the responsibility of the user. High code coverage as well as complete functional coverage is essential and techniques such as constrained random verification are necessary requiring considerable use of RTL simulators. The Metrics Cloud Platform exploits the massive parallelism and elastic storage available in the Cloud for big simulation jobs using a SystemVerilog/UVM methodology to enable the execution of parallel unlimited RTL simulations. This paper explains how the Codasip SSP enables users of open source SweRV Core to efficiently verify their processor IP in the Cloud using the Metrics Platform.
Weekend Update: This Week’s Round-up of Remote Blockchain Learning Resources [Hyperledger]
Welcome to the Weekend Update. Our goal with this weekly post is to share quick updates about online education, networking and collaboration opportunities and resources for the open source enterprise blockchain community.
If you have suggestions for resources or events that we should spotlight in a future Weekend Update, let us know here using #HLWeekendUpdate.
Webinar: Introduction to Minifabric and How to Use It
Minifabric is the tool to help you set up a Fabric network easily and quickly. It also helps application developers with needed connection profiles and wallets when a Fabric network is up and running. In this talk, Tong Li from IBM will introduce to the audience Minifabric and also demonstrate how to develop go applications using these profiles and monitor the Fabric network using Hyperledger Explorer.
Tune in on Wednesday, September 16, at 10 a.m. EDT. Go here for more information.
Case Study: CULedger’s
MemberPass
– a permanent, portable digital identity
solution for credit union members
Get the details on how CULedger protects credit unions from fraud with Hyperledger Indy in this new case study.
Blockchain Developer Course en Español
The Hyperledger Latinoamérica Chapter continues its Spanish language Hyperledger Fabric training course series with sessions this week on digital identity with PKI services on Hyperledger Fabric (September 12) and distributed orderer with RAFT (September 17).
For more details and the full schedule, go here.
Virtual Meetups
See the full Virtual Meetup schedule here.
The post Weekend Update: This Week’s Round-up of Remote Blockchain Learning Resources appeared first on Hyperledger.
FSF Blogs: Assine esta petição pela liberdade na sala de aula [Planet GNU]
Leia, assine e compartilhe a petição: https://my.fsf.org/give-students-userfreedom
<a href="https://my.fsf.org/give-students-userfreedom?pk_campaign=frspring2020&pk_source=bagde"><img src="https://static.fsf.org/nosvn/appeal2020/spring/petition_rect.png" alt="Lute pela liberdade dos estudantes (#UserFreedom). Assine a petição hoje!"></a>
Conforme escrevemos recentemente, o aprendizado remoto não precisa (e não deveria) significar a renúncia das liberdades básicas. Novos desenvolvimentos na área da educação remota apenas contribuíram para a preocupante tendência de tratar a escola como uma área de testes para a vigilância ubíqua e outras práticas distópicas. Isto é especialmente perigoso para as crianças nativas do mundo digital, que podem não saber que existem alternativas, muito menos que a "alternativa" percebida é, na verdade, a única opção ética.
Como a discussão entre ativistas do software livre na nossa lista de e-mails libreplanet-discuss mostrou nas semanas recentes, a educação digital pode triunfar quando fazemos da liberdade uma prioridade. Nenhum estudante deveria trocar sua liberdade por uma educação. A Free Software Foundation (FSF) já trabalhou junto com um professor do MIT para libertar as aulas dele e seguimos compartilhando nosso conhecimento com o sistema de escolas públicas de Boston. Hoje estamos dando o próximo passo nesse comprometimento.
Iniciando hoje, trabalharemos para mudar o cenário da educação remota com uma nova petição contra o dano severo que o software privativo representa aos estudantes e, ao mesmo tempo, enfatizando a ideia de que há uma solução ética. Seja quando o Microsoft Teams é usado para conectar estudantes, o Google Classroom é adotado para escrever todos os documentos ou o Zoom é empregado para a sessão da sala de aula, queremos transmitir a mensagem de que a única resposta aceitável no tocante à quantidade de software privativo que deveria ser permitida nas escolas é nenhum. Fazer estudantes dependerem de software não livre para aprender é não apenas danoso a eles a curto prazo, mas também uma oportunidade desperdiçada de passar os valores de livre acesso, estudo, compartilhamento e colaboração.
Na FSF, estamos trabalhando duro para fazer do software livre uma questão de reunião de família: uma que seja falada e levada a sério por todas as pessoas e não apenas uma causa abraçada por uma comunidade pequena mas motivada. Entendemos que fazer-se ouvir sobre estes problemas pode ser difícil, motivo pelo qual estamos oferecendo colocar nossa voz atrás da sua como a organização responsável pelo movimento. Ao assinar a petição, você tem a opção de nos informar se é um estudante, pai/mãe, professor ou administrador de uma escola que requeira o uso de software privativo. Contataremos a administração deles para lhe representar e evidenciar a eles que uma comunidade global de ativistas e pessoas normais assinaram um posicionamento apoiando o software livre na educação.
Esta iniciativa e petição foram motivadas pela perda de direitos dos estudantes causada pela pandemia, mas não planejamos parar quando o novo coronavírus estiver finalmente sob controle. Visualizamos para este posicionamento um espaço permanente em https://fsf.org e estamos comprometidos em contatar quantas escolas conseguirmos como parte de nossos esforços para encorajar a adoção do software livre.
Seu posicionamento junto a nós neste problema significa muito para nós. O sucesso de qualquer petição é tão forte quanto sua comunicação e as pessoas que se manifestam por trás dela, e por isso apreciamos que você se disponibilize a assinar. O ato de firmar este posicionamento de princípios é uma forma que lhe oferecemos para colocar a "liberdade em ação" durante o nosso apelo de verão e ser uma voz para a liberdade do usuário no mundo todo #UserFreedom.
Por trinta e cinco anos, a FSF realiza campanhas pela completa liberdade do software. Por todo esse tempo, e apesar de parecer conveniente e popular fazê-lo, nunca sacrificamos nossos princípios. Ser o "último farol" da liberdade do usuário significa manter-se vigilante sobre a ajuda ou dano causados pelo uso dos programas de computador contra quem deles depende. Por favor, reserve um tempo para assinar a petição pelos direitos dos estudantes em todo o mundo, sejam estes os seus direitos, dos seus filhos ou simplesmente de algum conhecido. Juntos, podemos cortar a conexão que a educação tem com o software privativo e, em seu lugar, fomentar a liberdade.
Read this article in English at https://www.fsf.org/blogs/community/sign-this-petition-for-freedom-in-the-classroom
The United States & Its Constitution Have Two Months Left [Paul Stramer - Lincoln County Watch]
From Paul Craig Roberts, Institute for Political Economy Sept. 10th 2020
2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World [DuckDuckGo Blog]

2020 marks DuckDuckGo's tenth year of charitable donations – our annual program to support organizations that share our vision of raising the standard of trust online. This year we're proud to donate to diverse organizations across the globe that strive to improve online privacy and competition.
Thanks to our continued growth, we've been able to increase the donation amount this year to $750,000, bringing the total over the past decade to $2,650,000. Below are details of how we allocated the funds and we encourage you to check out the valuable work of each recipient.
"The Center for Information Technology Policy's research, teaching, and events address digital technologies as they interact with society."
"Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development."
"We defend rights and freedoms in the digital environment. EDRi’s key priorities for the next years are privacy, surveillance, net neutrality and copyright reform."
"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy on behalf of the public interest."
"The Markup is a nonprofit newsroom that investigates how powerful institutions are using technology to change our society."
"We combine art and research to illuminate the social implications and harms of AI."
"Bits of Freedom strives to influence legislation and self-regulation, and empower citizens and users by advancing the awareness, use, and development of freedom-enhancing technologies."
"Located at UCLA, the Center for Critical Internet Inquiry (C2i2) aims to empower researchers, policy makers, change agents, and the general public by providing them with access to original insights derived from independent empirical research; expert analysis and interpretation; and the guidance and opportunities to critically reimagine digital technologies’ influence in society."
"Electronic Frontiers Australia Inc. (EFA) is a non-profit national organisation that has been promoting and protecting digital rights (civil liberties) in Australia since it was established in January 1994."
"The Competition Law Forum is a centre of excellence for European competition and antitrust policy and law at the British Institute of International and Comparative Law (BIICL). It provides a forum in which the practical application of competition policy is considered by lawyers, economists, senior business managers, public servants, public affairs professionals, consumer bodies and other specialist practitioners."
"The GFF (Gesellschaft für Freiheitsrechte / Society for Civil Rights) is a Berlin-based non-profit NGO founded in 2015. Its mission is to establish a sustainable structure for successful strategic litigation in the area of human and civil rights in Germany and Europe. The GFF’s current cases focus on protecting privacy, freedom of information and the press, and defending equal freedom for all."
"Open Rights Group protects the digital rights of people in the UK including privacy and free speech online."
"Opposing unconstitutional mass government surveillance."
"Focusing on issues of Internet freedom and technological progress, we work to protect innovation and discovery from powers that fear change."
"We believe everyone should be able to explore the internet with privacy. We advance human rights and defend your privacy online through free software and open networks."
For more privacy advice follow us on Twitter, and stay protected and informed with our privacy newsletters.
Plasma adventures - Traipsing through the KDE forest [Dedoimedo RSS]
It's not just a job, it's an adventure. Or something. Here's a review and summary of my recent experiences using the Plasma desktop environment, including 5.12 LTS, 5.18 LTS and neon User Edition releases, covering ergonomics, usability, connectivity, fun factor, bugs, regressions and problems, and a bit more. Take a look.
2020-09-11.fae [crystalfaeries]
2020-09-11 VenusDay's numerology:
15 Devil
6 Lovers
Conscious Relationships:
Endurance, materialism, secret plans,
restrictions in one's possibilities
Sep 11 16:00-21:00 Faery Goddesses at Kaua'i Tantra Goddess Temple
Wow... what a perfect time to do a planetary healing on the energetic traumas / miasmas of false-flag events still imprinted in Gaia's energy bodies :-) Maybe y'all can correspondingly heal your own inner traumas remaining from 2001.
Reply to All State-of-State Attorney Generals-- Using Nevada as an Example: [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Update on Bessie, The Wonder Car [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Alternate/OEM Part
Number(s): 91TF9C968AA, 92TF9C968AA, CM4713, CM4723, F1TZ9C968A,
F2TZ9C968A, F37Z9C968A, ZZL113280, ZZL213280,
ZZM213280."
Product Showcase: SparkFun Artemis Development Kits [SparkFun Electronics]
SparkFun Artemis Development Kit: https://www.sparkfun.com/products/16828 SparkFun Artemis Development Kit with Camera: https://www.sparkfun.com/products/17071 The SparkFun Artemis Development Kit is the latest board to be released around the SparkFun Artemis Module and it allows access to more software development features than previous Artemis based boards. This Kit includes the SparkFun Artemis DK board as well as the accessories (Himax camera & USB-C cable) needed to get started right away. Recommended software used to program the Artemis DK are the Arduino IDE, Arm® Mbed™ OS (Studio and CLI), and AmbiqSDK.
Arizona State investigating data anomalies in work by two former neuroscience faculty members [Retraction Watch]
Arizona State University is investigating two former faculty members suspected of falsifying data in several of their papers. The inquiry centers on Antonella Caccamo and Salvatore Oddo, who recently lost their 2016 article in Molecular Psychiatry, a Nature journal, titled “p62 improves AD-like pathology by increasing autophagy.” Caccamo once held a research appointment in the … Continue reading Arizona State investigating data anomalies in work by two former neuroscience faculty members
Welcome to the Debian Project News! [Debian Project News]
We hope that you enjoy this Special Archival Edition of the Debian Project News which repeats, introduces, and attempts to catch you up on most of the year's news for 2020 so far.
The newsletter for the Debian community [Debian Project News]
For this special edition of the news, we have omitted a few regular sections in our effort to bring our coverage up to date. Should you wish to find older or missing information, please review our Bits from Debian Blog or our Debian Micronews Service where all recent and current news items have already been shared through this calendar year.
Official communication channels for Debian [Debian Project News]
From time to time we get questions about current events, the rules about who may own websites in the Debian namespace, the progress of development within the community, or inquiries as to the official channels of communication for and from Debian.
The Publicity team call for volunteers and help! [Debian Project News]
Your Publicity team is asking for help from you our readers, developers, and interested parties to contribute to the Debian news effort. We implore you to submit items that may be of interest to our community and also ask for your assistance with translations of the news into (your!) other languages along with the needed second or third set of eyes to assist in editing our work before publishing. If you can share a small amount of your time to aid our team which strives to keep all of us informed, we need you. Please reach out to us via IRC on #debian-publicity on OFTC.net, or our public mailing list, or via email at press@debian.org for sensitive or private inquiries.
Security Advisories [Debian Project News]
Debian's Security Team releases current advisories on a daily basis (Security Advisories 2020). Please read them carefully and subscribe to the security mailing list.
External News [Debian Project News]
Debian France is a non-profit organisation forming part of the Trusted Organisations. They are the main trusted organisation in Europe. They have just renewed their board. There were few changes, except the president who is now Jean-Philippe MENGUAL.
MiniDebConfs, MiniDebCamps, and DebConf20 [Debian Project News]
At the start of 2020, there were seven MiniDebConfs scheduled all around the world, reflecting the vitality of our community. Organized by Debian project members, MiniDebConfs are open to everyone and provide an opportunity for developers, contributors and other interested people to meet in person. But due to the constraints related to the coronavirus (COVID-19) pandemic, most if not all of these conferences have been cancelled or postponed to 2021: Maceió (Brazil), Aberdeen (Scotland), Bordeaux (France), El Salvador, and Regensburg (Germany). Some have been rescheduled online: the first one, MiniDeconfOnline #1, preceded by a DebCamp, was held from 28 to 31 May 2020. The MiniDebConf Online #2 "Gaming Edition", devoted to gaming on Debian (and Linux in general) will take place from 19 to 22 November 2020 - the first two days being a Debcamp. Visit the wiki page of the event for details.
Other events [Debian Project News]
The Debian Brasil community organized from May 3rd to Jun 6th, 2020, an online event called #FiqueEmCasaUseDebian (#StayHomeUseDebian). During 27 nights, the DDs Daniel Lenharo and Paulo Santana (phls) hosted guests who shared their knowledge about Debian. You can read a report.
Freexian issues monthly reports about the work of paid contributors to Debian Long Term Support.
Help needed [Debian Project News]
Debian Developers Reference is now maintained as ReStructuredText. Translations and translation updates are welcome - please see the announcement in the Misc. Developer News and the developers-reference translations thread for more information.
Code, coders, and contributors [Debian Project News]
Please welcome: Marie Alexandre, Saira Hussain, laokz, Arthur Diniz, Daniel Pimentel, Ricardo Fantin da Costa, Ivan Noleto, Joao Seckler, Andre Marcelo Alvarenga, Felipe Amorim, Pedro Vaz de Mello de Medeiros, Marco Villegas, Thiago Gomes Verissimo, Teemu Toivola, Giuliano Augusto Faulin Belinassi, Miguel Figueiredo, Stephan Lachnit, Nicola Di Lieto, Ximin Luo, Paul Grosu, Thomas Ward, Ganael Laplanche, Aaron M. Ucko, Rodrigo Carvalho, Lukas Puehringer, Markus Teich, Alexander Ponyatykh, Rob Savoury, Joaquin de Andres, Georges Basile Stavracas Neto, Jian-Ding Chen (timchen119), Juan Picca, Katerina, Matthew Fernandez, Shane McDonald, Eric Desrochers, Remi Duraffort, Sakirnth Nagarasa, Ambady Anand S., Abhijith Sheheer, Helen Koike, Sven Hartge, Priyanka Saggu, Sebastian Holtermann, Jamie Bliss, David Hart, James Tocknell, Julien Schueller, Matt Hsiao, Jafar Al-Gharaibeh, Matthias Blümel, Dustin Kirkland, Gao Xiang , Alberto Leiva Popper, Benjamin Hof, Antonio Russo, Jérôme Lebleu, Ramon Fried, Evangelos Rigas, Adam Cecile, Martin Habovstiak, Lucas Kanashiro, Alessandro Grassi, Estebanb, James Price, Cyril Richard, John Scott, David Bürgin, Beowulf, Igor Petruk, Thomas Dettbarn, Vifly, Lajos Veres, Andrzej Urbaniak, Phil Wyett, Christian Barcenas, Johannes Schilling, Josh Steadmon, Sven Hesse, Gert Wollny, suman rajan, kokoye2007, Kei Okada, Jonathan Tan, David Rodriguez, David Krauser, Norbert Schlia, Pranav Ballaney, Steve Meliza, Fabian Grünbichler, Sao I Kuan, Will Thompson, Abraham Raji, Andre Moreira Magalhaes, Lorenzo Puliti, Dmitry Baryshkov, Leon Marz, Ryan Pavlik, William Desportes, Michael Elterman, Simon, Schmeisser, Fabrice Bauzac, Pierre Gruet, Mattia Biondi, Taowa Munene-Tardif, Sepi Gair, Piper McCorkle, Alois Micard, xiao sheng wen, Roman Ondráček, Abhinav Krishna C K, Konstantin Demin, Pablo Mestre Drake, Harley Swick, Robin Gustafsson, Hamid Nassiby, Étienne Mollier, Karthik, Ben Fiedler, Jair Reis, Jordi Sayol, Emily Shaffer, Fabio dos Santos Mendes, Bruno Naibert de Campos, Junior Figueredo, Marcelo Vinicius Campos Amedi, Tiago Henrique Vercosa de Lima, Deivite Huender Ribeiro Cardoso, Guilherme de Paula Xavier Segundo, Celio Roberto Pereira, Tiago Rocha, Leandro Ramos, Filipi Souza, Leonardo Santiago Sidon da Rocha, Asael da Silva Vaz, Regis Fernandes Gontijo, Carlos Henrique Lima Melara, Alex Rosch de Faria, Luis Paulo Linares, Jose Nicodemos Vitoriano de Oliveira, Marcio Demetrio Bacci, Fabio Augusto De Muzio Tobich, Natan Mourao, Wilkens Lenon, Paulo Farias, Leonardo Rodrigues Pereira, Elimar Henrique da Silva, Delci Silva Junior, Paulo Henrique Hebling Correa, Gleisson Jesuino Joaquim Cardoso, Joao Paulo Lima de Oliveira, Jesus Ali Rios, Jaitony de Sousa, Leonardo Santos, Aristo Chen, Olivier Humbert, Roberto De Oliveira, Martyn Welch, Arun Kumar Pariyar, Vasyl Gello, Antoine Latter, Ken VanDine, Francisco M Neto, Dhavan Vaidya, Raphael Medaer, Evangelos Ribeiro Tzaras, Richard Hansen, Joachim Langenbach, Jason Hedden, Boian Bonev, Kay Thriemer, Sławomir Wójcik, Lukas Märdian, Kevin Duan, zhao feng, Leandro Cunha, Cocoa, J0J0 T, Johannes Tiefenbacher, Iain Parris, Guobang Bi, Lasse Flygenring-Harrsen, Emanuel Krivoy, Qianqian Fang, Rafael Onetta Araujo, Shruti Sridhar, Alvin Chen, Brian Murray, Nick Gasson.
Astrology for the Soul September 9, 2020 [New Paradigm Astrology]
Sometimes it's good to cry out loud, And acknowledge all the pain, Feel my feelings and honor myself, For trying as hard as I can. Too funny, I didn't know it was Children's Day! In Costa Rica, they have a special day honoring kids, and I just found out while uploading this report. Yup, well, with the North Node in Gemini (for more than another year), the sign of the puer/puella aeterna, it is helpful to honor our inner child, play, stay curious, and look around. In the report, I asked the question: What do you do when you try as hard as you can, and it doesn't work? Isn't that the story of life? The answer is you DEVELOP. You grow, evolve, and develop new skills, talents, perspectives, beliefs, and invent new ways to accomplish your goals. You get out of the limited conditioning, maybe rebel or revolt, experiment, go alternative, PROGRESS. Let's be honest. If we didn't fail, we might not evolve! The same is true of social / political / religious / educational / law enforcement / healthcare institutions. The road to enlightenment is filled with potholes, breakdowns, overheating, and flat tires. The sides of it are littered with old, rusty, wrecks that couldn't or wouldn't get repaired, renewed, and cared for. Which is where we come in... for each other. Maybe you can be a tow truck? Mechanic? Bring extra parts or fuel and pass 'em around? I hope so, 'cuz on the road ahead I see a tunnel coming with no shoulders or light! Let's hook up and make a caravan hitched together so tight that no one gets left behind. Blessings! Eric Clapton Baby! Let It Grow: https://youtu.be/YpDlmop0uYU For more astrology and Kyoga with Kaypacha visit: www.NewParadigmAstrology.com For info on the intro music: www.darryljohnkennedy.com For info on the closing music: www.ScottHuckabay.com
https://www.businessinsider.com/billionaires-net-worth-increases-coronavirus-pandemic-2020-7?op=1
A Culture of Kindness v. THEM [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
2020-09-10.fae [crystalfaeries]
2020-09-10 JupiterDay's numerology:
14 Temperance = Yang Puja
5 Heirophant
Consciousness Expansion:
Self-control, reconciliation,
combination of opposed forces
Fortune du jour:
You are a bundle of energy,
always on the go.
"The best way to prepare is to write programs, and to study great programs that other people have written. In my case, I went to the garbage cans at the Computer Science Center and I fished out listings of their operating systems." -- Bill Gates
"Truly evil people, with all their malice and
hatred, pose far less of a threat to mankind than the basically
good people who believe in "authority".
-- Larken Rose, The Most Dangerous Superstition
For those amongst us who like to drink tea, be aware to buy bulk teas and use a "tea ball" for brewing, rather than wasting money on pre-bagged tea, especially since the newer tea bags are extremely toxic
The Impact Of Microplastics In The Marine Environment And Human Health [The Permaculture Research Institute]
Plastic production suffered a great increase since it started to be commercialised 70 years ago. In the beginning, the overall production reached about 0.5 million tons per year. However, in 2017, it increased up to 348 million tons. Along with plastic production, one big concern has arisen: environmental pollution. Anthropogenic plastic pollution is a major …
The post The Impact Of Microplastics In The Marine Environment And Human Health appeared first on The Permaculture Research Institute.
BM-310 Small and Efficient MCU Core - Alexander Kozlov, CloudBEAR [RISC-V International]
BM-310 Small and Efficient MCU Core - Alexander Kozlov, CloudBEAR In this talk, we will provide a detailed feature description of small and efficient microcontroller core BM-310 including supported extensions, pipeline options for performance/efficiency tradeoffs, memory subsystem, interrupt control, power management, and debug capabilities.
Optimize Openblas by RISC-V "V" Vector Extension - Xianyi Zhang, PerfXLab [RISC-V International]
Optimize Openblas by RISC-V "V" Vector Extension - Xianyi Zhang, PerfXLab OpenBLAS is an open source BLAS (Basic Linear Algebra Subprograms) implementation, which is the building block of dense matrix software stack. Currently, OpenBLAS is used by high performance computing applications, and machine learning / deep learning applications. The speaker introduces the work of porting OpenBLAS on RISC-V ISA. Furthermore, they presents how to optimize the software performance by RISC-V "V" Vector Extension, including GEMM (matrix multiplication), the BLAS level 3 function, and axpy, the BLAS level 1 function. Then, the speaker gives the performance benefit on XuanTie C910 RISC-V processor.
Software Development for 64-Bit RISC-V Processor Verification - Sreenadh S & Sangeetha N. [RISC-V International]
Software Development for 64-Bit RISC-V Processor Verification - Sreenadh S & Sangeetha N., Center for Development of Advanced Computing, India A software model (Nigama) of 64-bit RISC-V IMAFD processor was developed in CPP language. Nigama is used as a reference model for verification of in-house developed out-of-order RV64IMAFD processor. The processor running on FPGA or simulation platform can be connected to Nigama through Ethernet interface and a test program runs on DUT and Nigama simultaneously in step lock mode and the result of each instruction on DUT is compared with that of Nigama and if there is any mismatch an error log is printed. This log is used further for debugging. This method is much faster even if larger test programs of more than 2 Billion instructions are running on DUT. This verification method has been successfully used for verifying the in-house developed 64-bit out-of-order single core RISC-V ISA based processor (RV64IMAFD) and enhancement of Nigama for multicore verification is under progress.
ProtoCPU: Modelling an In-Order RISC-V Core in gem5 - Anuj Justus Rajappa, IIT Madras [RISC-V International]
ProtoCPU: Modelling an In-Order RISC-V Core in gem5 - Anuj Justus Rajappa, IIT Madras Ideate, simulate, develop and repeat seems to be the general ideal workflow for any product development process, especially when stakes are high. ProtoCPU was born to fulfill this workflow by aiding in simulation of an in-order RISC-V processor designed by the SHAKTI team at IIT Madras. ProtoCPU is a 5 stage inorder core, designed in gem5 with a goal to cycle-accurately represent the C-class processors. It was built from scratch using the gem5 APIs. The model is under development and currently supports bare-metal full system RISCV simulations in gem5. The session brings in the overview of this model in gem5, merits and demerits of designing cpu models in gem5 along with the additional needs yet to be met to ease the job of microarchitectural design space exploration with respect to RISC-V ISA.
Optimizing RISC-V Custom Instructions with Software Driven Anal... - Duncan Graham & Simon Davidmann [RISC-V International]
Optimizing RISC-V Custom Instructions with Software Driven Analysis and Profiling - Duncan Graham & Simon Davidmann, Imperas Software One of the attractive features of RISC-V is the ability to add, and with ecosystem support, new optimized instructions and extensions to a processor implementation. At first it appears as simple task to look at opportunities in the application code that could be accelerated with some dedicated new hardware. However, since hardware typically has a much longer life cycle than software, future updates and roadmap needs must be anticipated. Thus, the art of ISA design is using fine grain analysis to accelerate just the key steps while leaving sufficient flexibility to support new software updates and advances. While in multi-core arrays a custom extension can offer a lightweight communication channel between processors. This extends the scope beyond the processor itself into system design and analysis. This talk will illustrate the key profiling and analysis steps for custom extensions.
Support TVM QNN Flow on RISC-V with SIMD Computation - Yi-Ru Chen & Jenq Kuen Lee [RISC-V International]
Support TVM QNN Flow on RISC-V with SIMD Computation - Yi-Ru Chen & Jenq Kuen Lee, National Tsing Hua University, Taiwan The inference phase with low power and memory limited environments is critical for deploying neural network models on edge devices. One possible approach is adopting the quantization technique to represent activations and weights in lower bits. In this work, we present the efficiently inference quantized models by supporting TVM QNN flow with RISC-V SIMD computations. As RISC-V supports both Superword SIMD and Subword SIMD, we compile models by TVM and replace the computation kernel with designated LLVM intrinsic functions for mapping with RISC-V favorable SIMD instructions. Experiments shows 1.79-7.58x reduction of instruction count compared quantized model with FP32 implementation. The accuracy loss is acceptable by evaluating on 1k images. The benchmark including MobileNet and Inception series. All experiments are executed on Spike with RISC-V SIMD supports.
TEEP (Trusted Execution Environment Provisioning) on RISC-V - Akira Tsukamoto & Kuniyasu Suzaki [RISC-V International]
TEEP (Trusted Execution Environment Provisioning) on RISC-V - Akira Tsukamoto & Kuniyasu Suzaki, The National Institute of Advanced Industrial Science and Technology (AIST) IETF is defining Trusted Execution Environment Provisioning (TEEP) protocol to remotely install/update/delete of TA (Trusted Application) in TEE (Trusted Execution Environment) which provides hardware isolated security in CPU. TEEP is designed to be generic among different CPU architectures; however primary activity is on Intel and ARM only. Therefore, our team is implementing TEEP on RISC-V. TEEP consists of 3 major software components; “TEEP Broker” on the OS, “TEEP Agent” in the TEE, and “Trusted Application Manager (TAM)” as a remote server. These components manage certificates for authenticating TEE and TAM, and code signing of TA. All of the certificates are based on PKI management. The challenges of having TEEP on RISC-V is how to minimize required features, such as HTTP, Concise Binary Object Representation (CBOR) parser, inside TEE while keeping the portability of existing TA.
Andes RISC-V Processors for Control and Data Paths - Charlie Su, Andes Technology Corporation [RISC-V International]
Andes RISC-V Processors for Control and Data Paths - Charlie Su, Andes Technology Corporation Andes V5 RISC-V processor IP solutions have been adopted by a wide range of SoCs: from tiny MCUs for consumer products, to chips for enterprise and datacenter products. For single-processor SoC, Andes DSP or vector processor can cover both control and data processing. For advanced SoC using multiple processors, some V5 cores tackle data-intensive computations while others handles control paths. In this talk, Dr. Charlie Su will give an overview of Andes processor solutions and control/data path processing in applications. He will then use Andes processors as examples to show how RISC-V processors and their features can provide efficient control/data path processing. Charlie will also introduce Andes Custom Extension™ (ACE) framework and illustrate how it automates RISC-V custom instruction extensions to further accelerate control/data path processing while maintaining programmability.
Semidynamics New Family of High Bandwidth Vector-Capable Cores - Roger Espasa, SemiDynamics [RISC-V International]
Semidynamics New Family of High Bandwidth Vector-Capable Cores - Roger Espasa, SemiDynamics In this session, SemiDynamics will disclose its new RISC-V application cores, targeted at bandwidth-hungry application domains such as Machine Learning, Recommendation Systems, Sparse Computation, HPC and Key-Value Stores. SemiDynamics will also open source its "Open Vector Interface (OVI)", a public spec that allows third-parties to design their own vector unit and connect it to SemiDynamics cores.
Portable Implementation of GlobalPlatform API for TEE - Kenta Nakajima & Kuniyasu Suzaki, TRASIO [RISC-V International]
Portable Implementation of GlobalPlatform API for TEE - Kenta Nakajima & Kuniyasu Suzaki, Technology Research Association of Secure IoT Edge Application Based on RISC-V Open Architecture (TRASIO) TEE (Trusted Execution Environment) is a CPU feature that offers an isolated environment for critical processing. RISC-V has some TEE implementations, i.e., Keystone, Sanctum, etc. However, each CPU offers an original programming model and the portability is not kept. GlobalPlatform (GP) offers TEE Internal APIs, but it is used on ARM TrustZone mainly. Most implementations are on a Trusted OS and cannot be port to another TEE easily. We implement GP TEE APIs as a portable library. Most APIs are independent of CPU architecture, but some APIs are not (e.g., Secure Storage, Secure Timer) and implemented for each architecture. The current library is available for RISC-V Keystone and Intel SGX, and the performance was measured on both architectures (Pentium and SiFive Unleashed). The results showed that most are the same but the low performance of secure storage on Keystone.
Vector Compliance Testing for RISC-V - Hideki Sugimoto & Koji Adachi, NSITEXE Inc. [RISC-V International]
Vector Compliance Testing for RISC-V - Hideki Sugimoto & Koji Adachi, NSITEXE Inc. The first step to testing a RISC-V vector instruction implementation is to test compliance to the specification. To do this requires both compliance tests and a reference model. NSITEXE, with its Data Flow Processor (DFP) IP block, required such testing for its implementation of the vector engine. The Imperas RISC-V ISS, riscvOVPsim, is in use as the reference model for the RISC-V Compliance Test Suite (CTS). Imperas has developed a Directed Compliance Test Generator, which achieves over 95% functional instruction coverage with those tests generated. Using the Vector CTS for the NSITEXE configuration has enabled confirmation of compliance with v0.8 of the RISC-V vector specification. This paper will discuss the NSITEXE DFP vector engine implementation, the generation of the Vector Compliance Tests for the NSITEXE configuration and the results of those tests including coverage data.
Trusted Execution State: An Extension for Lightweight Secure Function Calling - Mark Hill, Huawei [RISC-V International]
Trusted Execution State: An Extension for Lightweight Secure Function Calling - Mark Hill, Huawei Technologies R&D (UK) Ltd Although Trusted Execution Environments (TEEs) can be built using the standard RISC-V machine mode as the trusted state this approach has some limitations: - Machine mode must manage the lower privilege tasks, exceptions/interrupts and device drivers as well as managing secret data and providing trusted services. This dual use violates the security Principle of Least Privilege. - Supporting all these mechanisms make the code large, increasing the risk of security loopholes appearing and providing more opportunity to create gadgets for ROP/JOP style attacks. - Transitions between insecure and secure domains is inevitablly heavyweight as it must be syscall based. This extension addresses these issues by adding a new Trusted Execution State which provides stronger protection and quicker handling of secret data.
Nutshell: A Linux-Compatible RISC-V Processor Designed by Undergraduates - Huaqiang Wang [RISC-V International]
Nutshell: A Linux-Compatible RISC-V Processor Designed by Undergraduates - Huaqiang Wang, University of Chinese Academy of Sciences NutShell is an in-order linux-compatible RISC-V processor designed by five undergraduate students from University of Chinese Academy of Sciences. This processor supports RV64IMAC instruction extension and SV39 virtual-memory system. It has been typed out using SMIC 110nm process technology. The test chip can successfully boot the Linux kernel. A cycle-level differential testing framework is used is used during development, in which an emulator (NEMU) runs side by side with the processor being tested. With the help of that framework, the develop team managed to boot linux on NutShell in a short period of time. This talk will introduce the development process of this chip from the perspective of undergraduate students participating in the project. Experience of developing with Chisel and debugging with the differential testing framework will also be shared.
Last Quarter Moon in Gemini: Spin the Wheel [Rising Moon Astrology]
Very early Thursday. the Last Quarter Moon creates
a T-square as the Sun in Virgo opposes Neptune with both squared by
the Gemini Moon. We’re in the realm of the mutable, where
things change quickly.
Some see the mutable signs, especially Gemini, as fickle, not to be trusted, but when the ground is shifting under our feet, being able to sense the wind and adjust our sails has survival value.
The Gemini Moon might be a bellwether, the trendsetter in the flock who everyone follows. There’s cleverness here, sleight of hand, and a quick step.
Follow energy around the wheel of the chart: The Virgo Sun trines Jupiter in Capricorn, and extend its orb of influence to include Pluto and Saturn as well.
The Gemini Moon is close enough for a wide conjunction with the North Node, which turns the Sun–Moon–Neptune T-square into a grand cross of mutability. Can we shape shift? Perhaps we can. Do we want to? Maybe so.
Mars stationed Rx yesterday very close to the next
Saturn square. Saturn is slowing down. Mars is also aspecting the
Moon’s Nodes. Heavy weather indeed.
Meanwhile, Mercury in Libra moves to oppose Chiron in Aries. The sense of vulnerability remains, along with the question of how we manage our own.
At the Last Quarter, we take care of business. Having learned at the Full Moon and shared at the Disseminating, the Sun–Moon square calls for action. The challenge now is setting priorities before it all gets more intense.
What’re the next steps in your action plan? Use the cleverness of Gemini to scan the environment and seize the best options for success.
With Mars and Saturn looming larger, we all need to choose our battles carefully. We can still move ahead though, staying under the radar, shifting our tactics, and avoiding unnecessary conflict.
A bit of the trickster can win through where an army might not. Take a chance. Spin the wheel.
Image adapted from Jake Weirick
https://unsplash.com/photos/hieOkhzGyCE
No Flags -- What Does It Mean? [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Public Notice of Non-Compliance, Non-Assumpsit, and Counter-Claim [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
MX Linux MX-19.2 KDE - Missing in action [Dedoimedo RSS]
Today before ye stands a sad man with a short review of MX Linux MX-19.2 KDE edition, focusing mostly on the live session experience and first impressions, including look and feel, font contrast and clarity, Plasma-specific biggles and bugs, various visual and branding inconsistencies, overall value proposition, and more. Take a look.
Hyperledger Welcomes Blue Chip Line-Up of New Members and Certified Service Providers as Global Community Gathers for Virtual Member Summit [Hyperledger]
New Members include Chainstack, SIMBA Chain, SIX Digital Exchange and Visa; New Certified Service Providers include NEC, SAP, Tech Mahindra and Tencent
SAN FRANCISCO (September 9, 2020) – Hyperledger, an open source collaborative effort created to advance cross-industry blockchain technologies, today announced that eight new organizations, including Chainstack, SIMBA Chain, SIX Digital Exchange and Visa, have joined as members of the the multi-venture, multi-stakeholder effort hosted at the Linux Foundation. These new members are joining the rest of the Hyperledger community for the annual Member Summit. This year’s two-day virtual event will have interactive programming in three time zones to engage the entire global Hyperledger community.
In addition, Hyperledger announced seven more companies, Creativehill, DeepDive Technology Group, NEC, SAP, SwissCom, Tech Mahindra and Tencent, have completed the training requirements to become Hyperledger Certified Service Providers (HCSPs). This brings the total number of HCSPs to 18. New member EMURGO is also jumping in quickly by joining the ranks of official Hyperledger Training Partners.
The growing number of deployment-focused partners points to the increasing adoption of enterprise blockchain across a range of industries, geographies and use cases. To illustrate that point further, Hyperledger has been building out its case study library. Just this week, Hyperledger published a case study on CULedger’s MemberPass permanent, portable digital identity solution for credit union members. Other recent additions include detailed looks at Mindtree’s dual solutions for revolutionizing loyalty programs and Soramitsu’s work with the National Bank of Cambodia on a retail payments system as well as a solution brief on Joisto’s blockchain-based solution for GDPR-compliant document and data storage.
“In a year that has looked like no other, Member Summit is an even more important grounding point for our community,” said Brian Behlendorf, Executive Director, Hyperledger. “The pace of adoption for enterprise blockchain is accelerating, and our members are a driving force for critical new technologies and solutions. Our latest members will be important new voices as we set agendas and roadmaps that will keep us pushing this market forward in the year ahead.”
Hyperledger allows organizations to create solid, industry-specific applications, platforms and hardware systems to support their individual business transactions by offering enterprise-grade, open source distributed ledger frameworks, libraries and tools. General members joining the community are Chainstack, Creativehill, DeepDive Technology Group, EMURGO, SIMBA Chain, SIX Digital Exchange, Valid Network and Visa.
New member quotes:
“Chainstack provides enterprise-grade, managed blockchain services on any cloud. Our mission is to bring scalability, flexibility and transparency to the industry,” said Laurent Dedenis, CEO, Chainstack. “Blockchain technology, and Hyperledger in particular, has the power to resolve some inefficiencies and generate value for the enterprise world. We are thrilled to join the Hyperledger community now as we officially roll out the Chainstack 2.0 blockchain management services platform with a brand-new applications marketplace and API.”
“Creativehill is very honored and thrilled to join the Hyperledger community of leading blockchain enterprises,” said Cheonwoon Yim, Co-Founder & CEO of Creativehill. “We provide blockchain technology to the finance and public sectors based on research we started with Hyperledger Fabric version 0.6. Moreover, our company also offers consultation and reports to other fields to which this technology can be applied. Recently, we focused on producing a use case combining health care and supply chain management. We would like to cooperate on this with the Hyperledger community and contribute our knowledge and efforts to the development of the ecosystem.”
“We believe that blockchain innovation is bigger than the internet itself,” said Misha Hanin, Founder & CEO, DeepDive Technology Group. “We believe that in the next 3, 5, 7, 10 years, we’ll see a huge WORLD transformation driven by blockchain. We’ll start solving huge problems for large enterprise companies, governments, and entire nations using this technology. At DeepDive Technology Group, we believe that Hyperledger Fabric will play the absolute leading role in driving blockchain innovation forward. Our own team of enterprise blockchain trailblazers is currently building production level use-cases using Hyperledger Fabric; we see how in the past two years, blockchain has gone from something almost no enterprises talked about, to something half of enterprises have now planned serious investments in. We’re thankful to be members of the Hyperledger community, to play a leading role in the advancement of enterprise blockchain ourselves.”
“As a global blockchain solutions provider and founding entity of the globally recognized Cardano blockchain, EMURGO is excited to enter Hyperledger and join hands with a phenomenal group of organizations that are building robust blockchain infrastructures to support a new spectrum of valued services,” said Ken Kodama, EMURGO CEO. “EMURGO is highly committed to developing end-to-end, tailored blockchain solutions such as our new customized Brandmark solution in order for clients to address existing inefficiencies in industries like supply chain. Becoming a part of Hyperledger’s world class open community enables fellow members with a wealth of varied experiences to strategically exchange valuable resources and collaborate on furthering the maturation of the overall blockchain ecosystem with real solutions to meet the needs of clients.”
“We are excited to join Hyperledger, a premier development framework for enterprise blockchain solutions, and be part of a community comprising so many premier organizations exploring collaborative models for blockchain technologies,” said Joel Neidig, CEO of SIMBA Chain, a Smart Contract as a Service and blockchain innovation platform company. “SIMBA’s roots go back to one of DARPA’s first blockchain contracts, so we have a long-standing focus on working with small and large enterprises, governments and other organizations to bring practical use-cases to full realization. With our platform’s recent support for Hyperledger, we believe now is a great time to join and help bring the community forward.”
“SIX Digital Exchange is on the leading edge of building next generation digital market infrastructure to support the evolution of financial markets with enterprise blockchain and digital assets as a foundation,” said Tim Grant, Head of Business, SIX Digital Exchange. “Hyperledger is one of the most significant industry focal points for the continued development of enterprise blockchain, and we feel that it is key that we bring our insights to the table to help drive the formation of a global financial market ecosystem that drives new products, services and business models into the marketplace and supports a better future for governments, corpse-orats and individuals.”
“As the provider of a first of its kind blockchain security solution, we are more than excited to take part in the Hyperledger community and the Linux Foundation,” said Kfir Nissan, co-founder and CEO at Valid Network. “We see joining this collaboration as an important strategic step for our company and technology, and believe that together we can build a future of secured and trusted blockchain solutions for enterprises all over the world, enabling them to innovate with blockchain faster and safer than they could ever imagine.”
Members big and small are collaborating across company and country lines to ensure the success of Hyperledger business blockchain technologies, building products, services and solutions on top of Hyperledger code bases that are critical to their lines of business. Learn more about becoming a member of Hyperledger.
About Hyperledger
Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration including leaders in finance, banking, healthcare, supply chains, manufacturing and technology. Hyperledger hosts many enterprise blockchain technology projects including distributed ledger frameworks, smart contract engines, client libraries, graphical interfaces, utility libraries and sample applications. All Hyperledger code is built publicly and available under the Apache license. The Linux Foundation hosts Hyperledger under the foundation. To learn more, visit: https://www.hyperledger.org/.
The post Hyperledger Welcomes Blue Chip Line-Up of New Members and Certified Service Providers as Global Community Gathers for Virtual Member Summit appeared first on Hyperledger.
‘An isolated incident’: Should reviewers check references? [Retraction Watch]
Peer reviewers are supposed to be experts in their fields, competent enough at least to spot methodological errors, wayward conclusions and implausible findings. But checking references? Apparently, not so much. A journal about academic medicine has retracted a 2020 article because its reviewers and editors didn’t bother to confirm that the references said what the … Continue reading ‘An isolated incident’: Should reviewers check references?
2020-09-09.fae [crystalfaeries]
2020-09-09 MercuryDay's numerology:
22/0 Fool
4 Emperor
Rational Mind:
Mother's Milk = Spiritual Nourishment
- - - - - - - -
Here we have a perfect example of too many remote fonts,
and too much javascript.
NO! I'm not gonna run uknown JavaScript code
from so many 3rd party sources around the interwebs.
Such is the primary vector of software VIRUS INFECTION!
Your media overshadows your message... which means
you're busy "selling-me" your agenda
with far too much manipulation.
This reminds me perfectly of Felicia Cowden proudly showing
to me her book, with the claim that each and every page
has been in great detail "product-ized"...
meaning that it uses every possible subliminal manipulation
beyond "the message" to get us to "buy-in"
to what she's selling.
By contrast, on my website, i'm ever conscious
to keep my main message available in text, with
supplementary details via images, videos, or audios.
I also keep the page layout very simple...
and therefore, i do not attract the manipulatable sheeple,
for it is the truth seeker i serve...
and i do my best to keep the core in audio and text,
so that even the blind can make good use of the material,
via the usual "screen-reader" software
which speaks the text for the blind person.
By not attempting to exert Nazi-level control over
your viewing experience,
and by allowing you to be in control of apearance,
you can have a better viewing experience...
one carefully intended to serve your consciousness
and the [a]scension of your soul to sovereignty,
rather than serving my ego that everyone should
"LIKE" my postings by appealing to
their primal passions, AND, to their programming.
-- celeste
Now, let's finally get to the real subject matter... that a female is "claiming to 'be'" Pele, and the Mother God, incarnate. I have no intention of addressing any failures to fully live-up-to such claims. We have a meme circulating amongst mankind which says: "Fake it until you Make it." and THAT IS TRUTH!
Rather than invalidating another who is ambitious enough to strive to accomplish something wonderful, but is not yet fully succeeding at their goal of becoming one with it, we can ACTUALLY EXPRESS LOVE by validating their intent, and beyond that, we can witness for them at a minimum, acknowledging their intent, and aligning our own will to validate their full accomplishment of their goal/claim, for "whenever two or more 'gather in the name of...'" and align their shared will, then we are invoking positive synergy, which is also synergized with, by the divine, iff our will is in alignment with divine will / divine plan. In my own workings, i always have as highest will over any other specific intent, that the results should be "for the good of all, harm none", or, when the circumstances are truly dire, "for the good of the most with the least harm to the fewest".
Now, as for the specific claims she has made, which i have not seen or heard, it is hearsay reported that once she came to the Hawaiian isles, that the locals were unwilling to accept her as "Pele" for, after all... wouldn't Pele have the same genetics as the "Kanaka Maoli", i.e. the Maori who migrated to the islands, only to find a more fair skinned race already living here... the survivors of Lemuria? Well, i was incarnate during Lemuria, and for me, with access to past life memories, and having learned to quantum-{,dis-}entangle with anything, (except my present body on Gaia), i myself qantum entangle with intent to become various realities:
...so, it is very appropriate that others should do their best to "become one with" the accessible energy patterns which were embodied by another, or, to become the first embodiment of a given reality. Huh? well, everything can be found in the Akashic Records, (and not all of us need Andrew Bartzis to read them for us). One can access anything from akashic records, e.g. i went to Jesus Christ and asked him if i might share a copy of the akashic records of his [a]scension. This i placed into Kaua'i's Akashic Records Library Crystal
Nevermind what the Shivaists are doing there... in the higher realms of 8D+ this is the Kaua'i Tantra Goddess Temple... which i have created commensurate with my dharma/kuleana as The Kahealani of Kaua'i, the appointed Kahuna who healed all the Heiaus, of which, this is one.
Now, back to our "Mother Goddess Incarnate", may she succeed at enlightenment and [a]scension, and in guiding her followers to those results. Again... The role of the Guru is to guide the chela (student) to find their own connections with their soul and higher realms, not to remain dependent upon "The Guru", i.e. teach them how to catch God, don't catch God for them.
Now there's another matter related to all
this... and that being whether an embodied entity (often referred
to as a "human"), invokes other
entities to posses them, or to channel them, etc.
Double Plus UnGood
As for any cult surrounding our particular example, and/or any overt acts in the physical world by her followers, i am ignorant and choose to remain so, not wishing to "observe", as i'd rather leave all cats quantum where they belong, rather than taking the 0.5 risk of killing any by observing. Of course, it is entirely possible that she is in "spiritual ego", a hazard to both guru and chela. I simply choose to awaken many to related issues, rather than to analyze the specifics here... e.g. may we send her and her followers blessings to receive the divinity they claim!
Signing the Declaration [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
The Military and the Fourteenth Amendment [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Amazon Bans Int’l Seed Sales: Problem, Reaction, Famine: Technocrats Take Control of Seeds [ice age farmer]
Throughout human history, people have brought seed of their favorite foods — but no longer. The technocrats are now banning international sales of SEEDS on Amazon/Wish, due to the “dangerous Chinese Mystery Seeds” false flag — even as parts of the US experience seed shortages! This “Problem/Reaction/Famine” dialectic is actively being used in many areas […]
Farms Blamed for COVID19 – Brucellosis/False Flag? – SB4453 – “Give Up The Farm” [ice age farmer]
Anthony Fauci has published a paper blaming farming and ranching for pandemics, jumping on the UN’s Biodiversity agenda, and setting the stage for new Senate Bill 4453, “Food Supply Protection Act of 2020,” which codifies the Rockefeller Foundation’s takeover of food. After a year of predictive programming about the next deadly pandemic having its genesis […]
How to Read a Natal Chart With No Birth Time [The Astrology Podcast]
In episode 270 astrologers Chris Brennan and Leisa Schaim discuss which techniques you can use in natal astrology to interpret a birth chart even when you don’t have a birth time. Western astrology has focused very heavily on using timed birth charts since about the 1st century BCE, and there are many techniques in natal […]
‘Transparently ridiculous’: Elsevier says journal shares critic’s concerns about bizarre genetics paper [Retraction Watch]
Elsevier says it is investigating how one of its journals managed to publish a paper with patently absurd assertions about the genetic inheritance of personality traits. The paper, “Temperament gene inheritance,” appears this month in Meta Gene and was written by authors in Saudi Arabia and Turkey. It states: On the observation of different people personalities … Continue reading ‘Transparently ridiculous’: Elsevier says journal shares critic’s concerns about bizarre genetics paper
Hotfix Release of Friendica 2020.07-1 [friendica]
Thanks to Roger Meyer who reported a flaw in the administration module of Friendica, we could fix a security vulnerability that could leak sensitive information from the server environment. The hotfix release 2020.07-1 includes the patch for the stable release branch of Friendica. The development and RC branches have been updated as well.
All versions of Friendica since April 2019 (develop branch) and June 2019 (stable) are affected.
Through the admin module environment variables of the server system can be read by anyone on the internet. Among other things this may include database passwords for Docker installs and the memcached SASL password. Therefore we recommend all node admins to change their potentially affected passwords after the upgrade to 2020.07-1. Furthermore this fix also prevents anonymous users to update node-wide addon settings.
This information only applies to the stable
release 2020.07 of Friendica. The patch has separately been
added to the develop and 2020.09-rc
branch of the repository.
Important: We are removing the master branch and are using the stable branch instead.
Updating from the git repositories of Friendica will be a bit more complicated as you might be used to as we decided to rename the branch for the stable releases to stable. Hence you need to switch the branch you want to use, after pulling the current version of the code from the repositories. As usual, please remember to update the dependencies with composer as well.
cd friendica
git fetch
git checkout stable
git pull
Pulling in the dependencies with composer is not necessary for this hotfix release.
If you had downloaded the source files in an archive file (tar.gz) please download the current version of the archive (friendica-full-2020.07-1) file and unpack it on your local computer. Compared to the 2020.07 release only a few files were updated and none of the config files are affected. So you can just upload the changed files onto your server.
If you want to contribute to the project, you don’t need to have coding experience. There are a number of tasks listed in the issue tracker with the label “Junior Jobs” we think are good for new contributors. But you are by no means limited to these – if you find a solution to a problem (even a new one) please make a pull request at github or let us know in the development forum.
Contribution to Friendica is also not limited to coding. Any contribution to the documentation, the translation or advertisement materials is welcome or reporting a problem. You don’t need to deal with Git(Hub) or Transifex if you don’t like to. Just get in touch with us and we will get the materials to the appropriate places.
Thanks again Roger Meyer to make us aware of this problem!
CloudBEAR RISC-V Processor IP Product Line - Alexander Kozlov, CloudBEAR [RISC-V International]
CloudBEAR RISC-V Processor IP Product Line - Alexander Kozlov, CloudBEAR CloudBEAR's commercial RISC-V processor IP portfolio and feature set are increasing serving growing demands for mature RISC-V solutions. CloudBEAR BM, BR, BI series are covering a wide range of applications from small low-power microcontrollers to high-performance accelerators and Linux capable devices. In this talk, we will give an overview of existing processor solutions and describe newest developed features enriching company's offer.
Leszczynski: There is something utterly wrong with the ICNIRP membership [BRHP – Between a Rock and a Hard Place]
…this blog has been updated on Sept. 11th… Why opinions in reviews of EMF science written by non-ICNIRP scientists at the request of telecom industry are different/contradictory to reviews of the same science by ICNIRP membership? There is something utterly … Continue reading
There is No Virus…. David Ike [Paul Stramer - Lincoln County Watch]
CULedger’s MemberPass™ delivers fraud protection for credit unions and their members using Hyperledger Indy [Hyperledger]
How many times have you answered, “What’s your mother’s maiden name?” or named your first pet when setting up a new account? Today, those common knowledge-based authentication questions have become the most vulnerable forms of customer identification as financial institutions are being increasingly hit by fraudsters in the call center.
CULedger, a credit union
service organization (CUSO) that began when a group of credit
unions came together in 2016 as a direct response to the increasing
threat of fraud, took up the challenge of improving the member
identity authentication process across all delivery channels.
CULedger was formed specifically to bring a decentralized identity
solution product for credit unions to market. Hence MemberPass
—a digital identity credential held by credit
union members that protects credit unions and their members from
identity theft and fraud in all financial interactions, from call
center authentication to lending to opening new accounts—was
born.
CULedger worked with decentralized identity organization,
Evernym, to build MemberPass
(formerly called MyCUID) with Hyperledger
Indy—a distributed ledger software project that is
interoperable with other blockchains or can be used on its own to
power the decentralization of identity. With Hyperledger Indy at
its core, MemberPass
serves as a permanent and portable digital identity
that reduces member friction and injects more trust in digital
interactions within credit unions.
During a pilot program with three credit unions in 2019, initial
results for MemberPass
were promising. Whereas authentication in the call
center could take anywhere from 90 to 120 seconds—or
sometimes even up to five minutes depending on the
transaction—MemberPass
reduced that process down to 15 seconds or
less.
There are now thousands of MemberPass
credentials in live production, with the
expectation that number will grow year after year as the focus
shifts to scaling and evolving the network. Credit unions
recognized the advantages of MemberPass
from the get-go and are looking to get more of
their members using the digital identity credential. One
participating credit union is working with CULedger on a strategy
for issuing new MemberPass
accounts inside its branch locations as part of
their new member onboarding process. Other credit unions have
expressed interest in implementing MemberPass
in its Internet banking channel and its mobile
banking channel. More use cases are being defined as more credit
unions begin to understand the power of this privacy-enhancing
technology.
Hyperledger teamed up with CULedger to capture the details
behind the launch of MemberPass
as well as steps that are underway to grow
adoption and interoperability. Find out more in the full
case study.
The post CULedger’s MemberPass™ delivers fraud protection for credit unions and their members using Hyperledger Indy appeared first on Hyperledger.
COVID-19 arrived on a meteorite, claims Elsevier book chapter [Retraction Watch]
If bats and pangolins could review scientific papers, they’d definitely have given the following article an “accept without revisions.” An international group of researchers has proposed that COVID-19 hitched a ride to this planet from space. Same for the fungal infection Candida auris. We’ve heard plenty of bizarre theories about the novel coronavirus behind the … Continue reading COVID-19 arrived on a meteorite, claims Elsevier book chapter
How To Make Your Own Toxin Free Cleaning Products [The Permaculture Research Institute]
The average household cleaning agents, such as your dish soap, your laundry detergent, your toilet cleaning agents and even your body wash and shampoo often contain chemicals that are harmful to you and your environment. Although there is an increasing number of biodegradable and toxic-free choices, these usually still come in plastic containers that add …
The post How To Make Your Own Toxin Free Cleaning Products appeared first on The Permaculture Research Institute.
Deceiver and the Deceived [Time Shift Blog - Energetic Synthesis]

In the age of social media and rampant propaganda, most of the public has been groomed to be unable to separate honest and truthful representations from manufactured deceptions and lies. For deception to work both sides have to participate, both deceiver and deceived have to play their roles. How do we wise up to see the lies, the spiritual betrayal, the reality distortions, the energy blocks and dark force attachments that are part of being deceived? Within each of us resides the core inner spirit that gives us direct access to the honest truth. We all have the ability to clear out the false ego identities, shift out the many layers of false beliefs and Banish the Lies that have concealed the truth. As we face the layers of falsity, which have generated energy blockages and spread darkness into our minds and bodies, we bring the truth into our present awareness. By allowing ourselves to see the truth of what has caused this inner pain, we ultimately experience mental, emotional and spiritual freedom.
The now presence is connected to our deepest spiritual essence, which emanates the light throughout our consciousness layers. The presence of truth in the light releases the pain that was created by the darkness, effectively Banishing the Lies that have produced the suffering and torment. Many of us have been seduced by the mainstream propaganda and the gaslighting used to sell these lies, and the world population has been buying them in every shape and size. This death culture version of 3D reality that is being sold to us is a sham, it is a lie rigged with psychological and emotional manipulation to keep humanity in spiritual bondage, through the repetition of the previous time cycles that began the NAA invasion, bringing on global human suffering and blood sacrifice. This phase of the time cycle leads into the 9-11 Timeline programs of the Armageddon software, where the satanic controllers attempt to leverage collective human pain and suffering in so to generate future events that manifest even more pain and suffering. It is obvious the Controllers are panicking as they lose ground and have called upon every deep state asset they have in order to wreak devastation, dehumanization and totalitarian objectives upon the global population.
On the path to liberation, in order to find true happiness and freedom we must see through the mass confusion and deceptions that are used to manipulate us in this world, effectively Banishing the Lies. To discover and find the truth, we must apply great effort to be fully engaged in our present moment awareness and dedicate ourselves to the path of truth seeking. In these tumultuous and transformative times, we must confront the lies and challenge those well-supported and well-funded beings, who intend to spread these lies even further in order to create harm. The Controllers intend to destroy human spiritual potential, and desire to fill this world with even more internal and external oppression, tyranny, destruction and darkness. Each of us must dedicate ourselves to find our highest expression while cultivating the deepest compassion, empathy and wisdom gained from our own direct experiences, so that we may be the example of living in harmony and alignment with the higher truth of the reality. We do not need to project holiness or perfection from preconceived notions, all that is required is that we have positive intentions and that we are committed to be completely honest, caring and kind with ourselves and with others. We do our best to speak truthfully, to represent and express our authentic selves, showing how we really feel and imbuing this deeper meaning into our communications and words. We make the choice to Banish the Lies from wrongly influencing our emotions and directing our motivations, perceptions, behaviors and actions, we align our consent and choose now to really know the whole truth.
Our individual ability to separate fact from fiction, to discern the difference between truth and lies embedded in the information that we are being exposed to through many different mediums, is undergoing an unprecedented threat. Human beings have been intentionally targeted at the subconscious layers to limit social intelligence with lower ego programming, that produces learned helplessness and blind reliance upon the falsity that powers up many of the 3D control structures. When people are being repeatedly saturated in what appears to be random negative stimuli in the external, this translates into emotionally raw survival consciousness, the sensation in one’s life of constantly navigating through an onslaught of perceived and real threats. The unstable and harsh environment is designed to threaten both conscious and unconscious perceptions of personal security, which further cloud a person’s vision while travelling within a distorted version of reality.
This distortion in perception leads many to look towards things in the outer world to use as an escape mechanism. The majority are either handing power over to the controller structures in exchange for a false sense of personal security or giving up in an overwhelmed and exhausted apathy. In the Art of War, spreading misleading information laced with blatant lies, using gaslighting combined with ‘overwhelm and wear down’ tactics are masterfully employed by those seeking to maintain their powerful influence over those vulnerable to exploitation.
Cultivation of Gullibility
Thus, the intended goal of social engineering is to exploit the subconscious and to shift emotional and financial dependence onto those who have accumulated the most wealth and power. This makes them the dominant authorities with full control over allocating all resources available in this world, while creating many different subclasses of marginalized and oppressed people. Those that are poverty stricken and feel socially excluded are especially vulnerable to emotional exploitation, keeping them polarized on insignificant topics, and feeding into the promotion of lies due to the intentional cultivation of gullibility.
Until we have developed the capacity to profoundly know ourselves it is difficult to see the deeper and hidden motivations of others. When we lack self-awareness along with social awareness, it makes us much more gullible to others deceptions. Gullibility makes us pliable to reality hijack, believing the deceptions and lies that we have been told by those we perceive as an authority, with the covert agenda to hold onto the most wealth and power possible, at any cost. No one can remain unbiased when they can be bought and sold for a price. This lack of awareness about the nature of this 3D reality, further leads us into becoming cogs in divisive and harmful agendas, becoming the proponents that are being mind controlled to actually support the Controllers nefarious plans.
In the current terrain of masterful deceptions and lies being propagated by those desperate to hang onto the status quo and global power, the issue of gullibility in the masses is being heightened and exploited. It is the tendency to automatically believe that imposters and actors are telling us the truth at face value, that makes us easily persuaded into believing something that is entirely false. Many unethical and traumatized people on the world stage are addicted to power, and continue to role play a manufactured persona. However, it is the Live Action Role Player’s or LARP’s that are being used by the NAA-Controllers to reinforce our 3D belief systems or worldview by feeding us lies. Many people tend to believe these actors on the world stage as telling the truth or being trustworthy, irrespective of the long list of facts and hard evidence to the contrary. Most people are refusing to dig deeper into hard topics and ask the difficult questions that challenge their belief systems, following through to investigate the larger picture that connects all of the pieces in this vast puzzle.
Yet, this dedication to finding the truth within the taboo and hard topics is exactly what is needed, now more than ever.
The Controllers are master manipulators that scope out the emotional characteristics and hidden subconscious desires in order to exploit the known vulnerabilities in their victims, through the spreading of vicious lies that are presented as facts. Tyrannical despots and authoritarian globalist leaders hide behind the strawman faces of a puppet-democracy, when they actually seek to simultaneously destroy its core humanitarian principles. By collecting massive amounts of personal data to profile their global audience, they are using surveillance along with a host of masterful deceptions to exploit the public emotionally. As difficult as it may be, we have to actually see that through targeted mind control, they have been successful in manipulating many people to believe outright lies. Their goal is to continually distract by inciting violence and destructive conflicts within high profile interest groups, influencing gullibility in the masses. From behind the scenes they polarize and confuse, shaping narratives to assign their blame upon those groups of people who they see as threats, and who remain faultless in those specific issues. Directing disinformation as its reported through the mainstream media, prompts even more divide and conquer tactics to incite anger and sow hatred among the vulnerable populations. This is psychological warfare plain and simple, much of which is based upon the spreading of lies and deliberate disinformation to keep the public massively confused and warring with each other.
The imperative of these times is to be willing to open compassionate dialogues on challenging topics, to commit to be mentally flexible in order to seek the higher truth in the matter, and to do the research that backs up one’s own opinions, whether or not it is popular or profitable. To sincerely seek the truth and put forth the effort to find it, is the only way to gain the clarity that is required to discern the many harmful agendas at play, finding the hidden motivations behind the intentional spreading of disinformation and lies. When we perceive the motivations behind the inverted façade, we can ask to seek the larger truth that is found in who or what actually benefits from those lies, and then we can begin to see what cost these lies actually extract from the human race.
Deceiver and the Deceived
Deceptions and lying are a form of communication that involves mutual parties. There are those that are acting as the deceiver imparting the false information, generally with a hidden agenda, and those receiving that information as factual, which is really a lie being processed into a distorted belief by those that are being deceived. Generally, in these complex deceptions there are power imbalances where a supposed authority, that has more power or money, is carrying out the deception in order to have a strategic advantage over those that they are deceiving. The deceiver intends to communicate false impressions or disinformation to those perceived as gullible, naïve or vulnerable, so they will base their future actions or decisions on it.
It is important to understand that the spreading of deceptions and lies involves both sides of the deceiver and deceived, both must participate in the lie in order to bring it into manifestation. The Controllers require the deceived to hand over their consent to the lies, in order to continue to perpetrate their fraud against the public, committing mass deceptions and directing mind control programming.
For those of us that have been deceived and manipulated by many liars, it becomes critical to awaken and comprehend our personal role in promoting the lies any further, and to make a concerted effort to elevate our behavior. Whether it was through our ignorance of that fact when it was revealed to be a lie, or through emotionally reacting to that information with ego defense mechanisms, like confirmation bias or learned helplessness. We choose consciously to do our best to avoid lying and spreading misinformation in the future.
All of us have been lied to and deceived in this upside-down world in order to be exploited for consciousness slavery by human and non-human controllers. When we are able to recognize and acknowledge that this has happened to all of us on the earth, and that it is happening right now, it is a major stage of spiritual awakening and ultimately what is needed to reach critical mass in disclosure. In order to reach critical mass, we also must recognize and accept our participation in the grand deception and lies, known or unknown to us. Recognizing we have believed the disinformation we have been told by those around us, and that we have lived upon a planet in a war over consciousness that was intentionally hidden from us, which involved calculated exploitation and covert technological mind control.
We cannot ignore the pile of lies upon lies around us anymore. Collectively there is a radical push piercing the veil through the astral walls of black magic that have been filled with spells of deception. As we banish the lies from our lives, we shatter the prettily packaged illusions and the content rises up to the surface consciousness, where we can finally see the larger pieces of truth. We stop participating in the rewarding of liars and punishing of those people that are actually being honest. The truth of disclosure lives inside all of us now, and it is in what you can finally perceive as the nature of reality that is actually the honest truth. Be the example of speaking and living in truth, no matter how hard it is to be on the front lines of human global awakening, for we are the ones we’ve been waiting for.
(Source: ES News -Banishing the Lies)
2020-09-08.fae [crystalfaeries]
2020-09-08 MarsDay's numerology:
21 Universe
3 Empress
Inner will, motivation: Synthesis,
crystalization, unity success
Sep 08 11:48 HST Moonset
Sep 08 23:06 HST Moonrise
First of all, be aware, that all of these "laws"
(which are not laws but commercial statutes), apply only to those
of you still contracted with one or more "commercial mind
controllers", i.e. what you call "govern-ment(al)", and they're
doing a great job of getting all the sheeple to identify themselves
as "the dead", so that when they enslave or
terminate your body, they won't get negative karma, because you
"voluntarily consented" to be a "U.S. Citizen" in commerce, rather
than a sovereign living soul.
These "authorities" are comitting Treason, for which the
appropriate response is: "hanging by the neck until
expired".
From the video: Confirmed-COVid-19_PLANdemic_a_known_LIVE_training_simulation_EXERCISE_under_WHO
Now, with all those bridges under the water...
can we find any positive side to all of this?
The only imaginable "thing" which all of this could be
preparation for, is that, if and when, we open up our planet to
overt Extra-Ter-Ra-estials running amok, we will then get
to deal with any of their biologicals they bring with them...
Reconstruction 101 [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Legalized Slave Ownership [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Keep the Electoral College [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
I KILLED the VIRUS in HAWAII! [Jin Laihook]
I made the video for Hawaii. Second (Crime) Wave. Second (Air) Wave. If you wear your masks and stay home, how can you go back to normal when there's no business to go back to? A brainwashed person says- "Because of the lockdown, Corona killed less people". Then why are cold and Flu numbers same as last year? Puppets everywhere...It's not that I'm wrong, it's that you can't bare to live in a world where I'm right. Today The Corrupt Hawaii State Government was happy to have 3000+ people line up for Covid tests. The live video I tried repeatedly to upload this morning would have hindered them. The Lying Hawaii State Government is Happy to have 3000+ guinea pigs to boost false positive Covid numbers into the 100's in order to scare you with their lock down propaganda. The truth is, they are purposefully collapsing the economy and releasing criminals to destroy Hawaii. Why? Because their fake North Korea ( CIA ) Missile failed in 2018. Finally figured out a way to upload my banned video. This is a tit for tat information war and soon we will take it to the next level. Be ready to take a stand Hawaii. We may have to over throw this corrupt government and drag IGE, Zuckerburg and Caldwell out by their collars before they can escape in their choppers. Be ready, food shortage (and possible GAS shortage) planned next. They are giving Walmart and Target workers Covid to shut down our last options for food. You thought toilet paper was bad. Wait till you have no food. Stand up and organize now before it's too late. If you want to help, you can sign this petition- https://www.ipetitions.com/petition/hawaii-covid-19-audit?utm_source=facebook&utm_medium=social&utm_campaign="e_id=quote4&title_id=title1&recruiter=16298943&loc=view-petition
Support for Trump? [Paul Stramer - Lincoln County Watch]

By Anna Von Reitz
Fraudulent Votes Have Already Been Cast [Paul Stramer - Lincoln County Watch]
Do any of your friends or nieghbors think voting by mail is safe and secure?
Have they bought the media line that fraud is impossible because of all the so-called safeguards?
Have them read this article in the New York Post, in which a Democrat operative describes how he exploited the weakness of voting by mail to destroy Republican ballots while casting fraudulent Democrat votes.
Click here to read the article on NYPost.com.
https://nypost.com/2020/08/29/political-insider-explains-voter-fraud-with-mail-in-ballots/
Waning Trine Moon in Taurus: The Twig Is Bent [Rising Moon Astrology]
Today at noon (EDT) we reach the waning trine
between Sun and Moon that, this time, is more. Today we have a
grand trine in Earth, with Sun @15 Virgo, Moon @15 Taurus and
Jupiter @17 Capricorn.
This grand trine is really a kite aspect with Neptune @19 Pisces. Trines are ease, supporting what we’re already doing. This one adds a touch of magic.
The Taurus Moon (one of my favorites for its calm steadiness and focus on comfort) has magic too, having just passed a conjunction with Uranus.
We’re entering autumn in the northern hemisphere, time of harvests and endings, yet Uranus reminds us the pulse of the Earth keeps beating. In the midst of challenge and loss, cycles of new growth are already seeded. Cycles of change, especially.
Venus, ruling the Taurus Moon, has just entered Leo
and sextiles Mercury in Libra. From deep wells of the heart, we
connect to our passion and act from there.
This is not an easy time. Mars slows to station Rx, moving back into squares with Saturn, Pluto, and Jupiter. These hard aspects signal the tough choices that face us.
The Taurus Moon knows this is a long game. We have the power to shape at least some of what happens, power beyond what we might believe. Taurus is a gardener and caretaker.
As the twig is bent, so grows the tree. How are we bending these days? What structures are we creating for our futures to grow into?
We have more power as individuals and communities than we may think. Today we notice where our impulses, passions, and actions are focused.
If we see good, worthy patterns, we support them. The aspects bring ease.
If change is needed, we can gently but firmly lean another way. This too is possible today. Create your best future with thoughtful, real steps.
Image adapted from Simon Berger
https://unsplash.com/photos/Qa2tSHWgh84
| Feed | RSS | Last fetched | Next fetched after |
|---|---|---|---|
| XML | 2020-09-14 23:35 | 2020-09-15 02:35 | |
| XML | 2020-09-14 23:35 | 2020-09-15 02:35 | |
| 13:20 FREQUENCY SHIFT | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Absinthes.com Blog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| All-Natural | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Astrology News Service | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Bioethika Oils – Sacred Medicine Sanctuary | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| blackMORE Ops | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Blog – Machine Intelligence Research Institute | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| BRHP – Between a Rock and a Hard Place | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| camen design · audio | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| camen design · code | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Cassiopaea | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Celeste | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| Clay & Iron | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Cosmic Convergence: 2012 and Beyond | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| crystalfaeries | XML | 2020-09-14 23:35 | 2020-09-15 00:35 |
| D. Gary Young | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| David Revoy - Webcomics | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Debian News | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| Debian Project News | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| Dedoimedo RSS | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Defective by Design blogs | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| DMZ Hawai'i / Aloha 'Aina | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| DuckDuckGo Blog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| EarthStarTV | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| efairies.com: Latest News | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| efairies.com: New Products | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| efairies.com: Popular Products | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| EMR Australia - Blog | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| EMR Australia - News | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| Energetic Synthesis Podcast | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| EnergeticSynthesis | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| Energy Research Journal | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| FAE Magazine ® | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Felicia Alongi Cowden | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| FOSSi Foundation | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Free The Seed! Podcast – Open Source Seed Initiative | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Freedom Decrypted | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| friendica | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| full-text diary | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Gigi Young | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| GNU Parallel - News | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| Hawaii Assembly - Hawaii Jural Assembly | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Her Breath | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Home - Energetic Synthesis | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| https://dabux.org/home?format=rss | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Hypergrid Business | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Hyperledger | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| ice age farmer | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| iLibrarian – OEDB.org | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Invest In Blockchain | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Jami | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Jin Laihook | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| Kathy Zavada - Topic | XML | 2020-09-14 21:35 | 2020-09-15 03:35 |
| Kauai Juice Co - News | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Kelley Hunter | Depth Astrology | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Linux Headlines | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Linux.org | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Lokahi Path | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| lpg-c | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| LSL Script Library and Database | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Lucy's Corsetry | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Main – Department of Accounting and General Services | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Map the World Grid with Gridpoint Atlas | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Megeso Kou | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| Metaverse Ink Blog » Metaverse Ink Blog » | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| MYSTICMAMMA.COM : consciousness, spirituality, astrology, wisdom, inspiration | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| New at sacred-texts.com | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| New Dawn: The World's Most Unusual Magazine | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| New Paradigm Astrology | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| Newsboat | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Nico's Blog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| NutriMedical | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| NutriMedical Report | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Open Source Ecology | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Open Source Everything for the 21st Century | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Open Source Hardware Association | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| OpenShot Video Editor - Last entries | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Paul Stramer - Lincoln County Watch | XML | 2020-09-14 23:35 | 2020-09-15 00:35 |
| pesn.com | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| PIXLS.US | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Planet GNU | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Priestess Alchemy | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| rawdog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| rawdog-plugins | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| re:3D | Life-Sized Affordable 3D Printing | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| RealityShifters Blog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Retraction Watch | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| RISC-V International | XML | 2020-09-14 18:35 | 2020-09-15 00:35 |
| Rising Moon Astrology | XML | 2020-09-14 23:35 | 2020-09-15 00:35 |
| RYF News | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Shekina Rose | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Shifting Timelines - Energetic Synthesis | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| Soundings | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| SourceForge Community Blog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| SparkFun Electronics | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| Steve (GRC) Gibson's Blog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Steve.org.uk - Updates | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Suzanne Teng & Mystic Journey | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| TABU; Towards A Better Understanding | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Terry Lilley's Underwater 2 Web | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The 3 Foragers: Foraging for Wild, Natural, Organic Food | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The Astrology Podcast | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The Debian Administrator's Handbook | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| The diaspora* blog | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The Druid's Garden | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The Hutchison Effect | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The Open Source Hardware Association | XML | 2020-09-14 23:35 | 2020-09-15 05:35 |
| The Organic & Non-GMO Report | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The Permaculture Research Institute | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| The Worlds of J. Matthew Root | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| Time Shift Blog - Energetic Synthesis | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| Transcending the Matrix Control System - Alien Agenda - Metaphysics - Gnosis - Science - audio - about | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| What If? | XML | 2020-09-14 23:35 | 2020-09-15 02:35 |
| What Katie Did | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| xkcd.com | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |
| zodiactruth - zodiactruth | XML | 2020-09-14 18:35 | 2020-09-15 06:35 |