Not to preach to the choir, this next video is a shareable link. With just a small amount of Holocaust propaganda, enough to make the forced vaccine problem seem unsolvable, it’s otherwise an intelligent discussion. It’s found on Biological Medicine, a channel I subscribe to on Rumble. Reinette Senum and vaccine expert Dr. Sheri Tenpenny have packed a lot of information into this, but I’ve added quite a bit more.
Dr. Tenpenny explains exactly how the covid vaccines will start working in 3-6 months.
This is the point in which a wider circle of targeted people become aware, as the understanding ripples out.
This next video explains the global attack on America being attempted by the IMF and the Federal Reserve. I listened to this several times to get the full impact. It’s important to understand the connection between seemingly unrelated events.
In researching the actual people who created these cryptocurrencies, I came across Stephen Turner and Adam Back. Adam Back is conjectured to be the creator of Bitcoin who is called Satoshi Nakamoto. Adam Back published several papers with Stephen Turner whose computer expertise includes genetics research.
In researching genetic experimentation, I found these interesting bits of information. I’m passing this on so that my readers can learn along with me, as we discover all the different substances that scientists can put into a vaccine and what those substances do. This is all from Wikipedia, therefore not to be trusted entirely, but here are some understandable basics.
Did you know that Bats have the unique quality of having jumping genes? A jumping gene is called a TE.
“A transposable element (TE, transposon, or jumping gene) is a DNA sequence that can change its position within a genome, sometimes creating or reversing mutations and altering the cell’s genetic identity and genome size. Transposition often results in duplication of the same genetic material. Barbara McClintock‘s discovery of them earned her a Nobel Prize in 1983.”
Here’s the computer connection:
“Helitrons were the first group of TEs to be discovered by computational analysis of whole genome sequences. In most mammals Helitron’s presence is negligible and limited to remnants of old transposons, with the exception of bat genomes, which are populated by numerous young elements.“
“Helitrons seem to have a major role in the evolution of host genomes. They frequently capture diverse host genes, some of which can evolve into novel host genes or become essential for Helitron transposition.”
“In 2016, one of the first mechanistic studies of helitron transposition was published in order to shed light on the different steps of transposition. Based on a consensus sequence, it reconstructed the likely ancestor of the Helibat family of helitrons present in the genome of the little brown bat (Myotis Lucifugus), the only group of mammals possessing an important number of helitrons in their genome. This active transposon was inserted into a plasmid acting as the helitron donor. An antibiotic resistance gene was included between the two terminal sequences of the helitron to enable isolation of the cells where transposition occurred.”
The word “therapeutic” is used to describe research that is obviously not therapeutic at all, in practice.
Zinc finger nucleases(ZFNs) offer a way to cause a site-specific double-strand break to the DNA genome and cause homologous recombination. Plasmids encoding ZFN could help deliver a therapeutic gene to a specific site so that cell damage, cancer-causing mutations, or an immune response is avoided.”
“Specific zinc-finger motifs were engineered to recognize distinct DNA sequences. The ZFN-encoding mRNA was injected into one-cell embryos and a high percentage of animals carried the desired mutations and phenotypes. Their research work demonstrated that ZFNs can specifically and efficiently create heritable mutant alleles at loci of interest in the germ line, and ZFN-induced alleles can be propagated in subsequent generations.”
The list of Adam Back projects linked and copy/pasted below includes this very, very interesting link:
NSA’s backdoor key from lotus notes — O=MiniTruth CN=Big Brother
“Anyway as clearly inside the application somewhere would be an NSA public key that the NSA had the private key for, I tried reverse engineering it to get the public key.
In doing this I discovered that the NSA public key had an organizational name of “MiniTruth”, and a common name of “Big Brother”. Specifically what I saw in my debugger late one night, which was spooky for a short moment was:O=MiniTruth CN=Big Brother
Literary note: for those who have not read Orwell’s prescient “1984” the Ministry of Truth was the agency who’s job was propaganda and suppression of truths that did not suit the malignant fictional future government in the book, and “Big Brother” was the evil shadowy leader of this government. The whole book is online here.“
The NSA’s Public Key…
- hashcash partial hash collision based proof-of-work algorithm (used as the mining function in bitcoin and for anti-DoS in email various systems)
- credlib credential library with chaum and brands ecash/credentials.
- Cebolla pragmatic IP anonymity
- PGP Stealth software to add steganography support to pgp2.x
- OpenPGP implementations and libraries
- code to compute human memorable test vectors for ciphersaber-2.
- Eternity USENET a censorship proof virtual web space using USENET as a document store
- Cypherspace distributed data haven project
- hashcash is the bitcoin mining function.
- how bitcoins uses hashcash fractional difficulty, automated inflation control
- cache of Satoshi Nakamoto‘s wikipedia page which the editors deleted??
Publications and Tech Reports
- Aug 02 – “Hashcash – A Denial of Service Counter Measure” (5 years on), Tech Report, Adam Back
- Aug 02 – “Hashcash – Amortizable Publicly Auditable Cost-Functions” , Tech Report, Adam Back
- Dec 01 – “Non-Interactive Forward Security”, Tech Report, Adam Back
- May 01 – “Freedom 2.1 Security Issues and Analysis”, Zero-Knowledge Systems White Paper, Adam Back, Ian Goldberg and Adam Shostack
- Apr 01 – “Traffic Analysis Attacks and Trade-Offs in Anonymity Providing systems”, Information Hiding 2001, Adam Back, Ulf Möller and Anton Stiglic
- Mar 01 – “An Auditable Namespace”, Tech Report, Adam Back
- Dec 00 – “Freedom 2.0 Mail System”, Zero-Knowledge Systems Inc White Paper, Adam Back, Serge Chevarie-Pelletier, Bill Heelan, Graydon Hoare, Roger McFarlane, Christian Paquin, Deniz Sarikaya
- Aug 00 – “Forward Secrecy Extentions for OpenPGP”, Internet Draft, Ian Brown, Adam Back, Ben Laurie
- Jun 98 – “Non-Transferable Signatures using PGP”, Usenix Annual Technical Conference, 98, Ian Brown and Adam Back
- Sep 97 – “The Eternity Service” (aka Eternity USENET) Phrack Magazine, Vol 7, Issue 51, Sep 1997, Adam Back
- Apr 97 – “ Hashcash – A Denial of Service Counter-measure“, original announce, Adam Back
- Aug 95 – “The Simple Key Search Protocol“, Internet Draft, Adam Back, Andrew Brown, Piete Brooks (used for breaking 40 bit Netscape SSL)
- See also distributed systems publications at the bottom of this page
- crypto related perl hacks: export-a-crypto-system signature file collection
- RSA export-a-crypto-system munitions T-shirt home page
- NSA’s public keys from Microsoft’s CAPI
- NSA’s backdoor key from lotus notes — O=MiniTruth CN=Big Brother
Breaking weak crypto
- c2’s Hack Netscape! challenge, break page
- Brute forcing RC4-40 attempted Microsoft Access (failed due to lack of specs)
- Brute forcing Netscape’s SSL 1st Challenge, testing, 2 independent breaks
- Brute forcing Netscape’s SSL 2nd Challenge 32 hours
- UK crypto export regulations
- PGP timeline short history of PGP
- Cypherpunks anti-License (CPL)
- Talking PGP Inc. out of building GAK enabling features into pgp 5.x
- GAK resistant design principles for crypto protocol designers, implementors and standards people
- People with crypto related pages.
Crypto Mailing lists
- The cypherpunks mailing list
- The cryptography moderated crypto mailing list (mostly low social significance tech discussion) archive
- The coderpunks list is dead try the cypherpunks-moderated list. (Old coderpunks archives can be found here archive)
- bluesky global-scale distributed storage mailing list bluesky
- The p2p-hackers list
- The steganography mailing list
- The ukcrypto mailing list, crypto politics in the UK
Cypherspace Internet Security – Services
Distributed Systems Publications
- Feb 96 – “Transformations for the Optimistic Parallel Execution of Object-Oriented Programs” [.ps.gz], Proceedings of Parallel Object-Oriented Methods and Applications Conference (POOMA ’96), Adam Back and Stephen Turner
- Dec 95 – “Parallelization of General Purpose Programs using Optimistic Techniques from Parallel Discrete Event Simulation” [.ps.gz], PhD Thesis, Adam Back (Thesis supervisor: Stephen Turner)
- Oct 95 – “A Parallelizing Compiler and Run Time System based on Optimistic Execution” [.ps.gz], Tech Report R334, Department of Computer Science, University of Exeter, 95 Adam Back and Stephen Turner
- May 95 – “Using Optimistic Execution Techniques as a Parallelisation Tool for General Purpose Computing” [.ps.gz], Proceedings of High-Performance Computing and Networking (HPCN) Europe, 95 Adam Back and Stephen Turner
- Apr 95 – “Time-Stamp Generation for Optimistic Parallel Computing” [.ps.gz], Proceedings of the 28th Annual Simulation Symposium, 95, Adam Back and Stephen Turner
- Oct 94 – “General Purpose Optimistic Parallel Computing” [.ps.gz], Proceedings of the 7th PARSYS User Group Meeting, PARSYS 94 Stephen Turner and Adam Back
- Oct 94 – “A T9000 Implementation of the p4 Parallel Programming Model” [.ps.gz], International Conference on Transputer Research and Applications, 94 Stephen Turner and Adam Back
- Mar 94 – “General Purpose Optimistic Parallel Computing”, (later published at PARSYS 94 — see above), Dept of Computer Science, University of Exeter, Tech Report R296 Stephen Turner and Adam Back
- 94 – “Time-Stamp generation for the parallel execution of program control structures”, (Likely early draft of Annual Simulation Symposium 95 — see above), Tech Report R289, Deptartment of Computer Science, University of Exeter, Adam Back and Stephen Turner
- 94 – “A GNU CC compiler for the transputer”, Tech report R295, Department of Computer Science, University of Exeter, Chris Berry, Adam Back and Stephen Turner
- Dec 93 – “Portability and Parallelism with Lightweight p4” [.ps.gz], BCS PPSG Conference on General Purpose Parallel Computing, 93, Adam Back and Stephen Turner
Related work by Stephen Turner
- Jul 97 – “Optimistic Network Computing and its Performance Control”, ICS’97 – Workshop: Performance Data Mining: Automated Diagnosis, Adaption, and Optimization, Stephen Turner
Dr. Tenpenny has explained that the vaccines interfere with our natural immune functions. This next research explains the consequences. You can see that logically these adverse reactions would appear slowly over time.
Splicing antibiotic resistant genes into DNA for research purposes dovetails eerily into this research into the effects of infections of the brain’s outer layers, the meningeal layers.
Unexpected role of interferon-γ in regulating neuronal connectivity and social behaviour
Immune dysfunction is commonly associated with several neurological and mental disorders. Although the mechanisms by which peripheral immunity may influence neuronal function are largely unknown, recent findings implicate meningeal immunity influencing behaviour, such as spatial learning and memory1. Here we show that meningeal immunity is also critical for social behaviour; mice deficient in adaptive immunity exhibit social deficits and hyper-connectivity of fronto-cortical brain regions…”