THIS POST IS CONTINUED FROM PART 14, BELOW--
YEH BACKDOOR CHEEZ KYA HAI BHAIYYA ?
YEH “ILU ILU” JAISA MAAL HAI KYA ?
India must take Putin's help and build our own CHIPS . Our nuclear submarines must have our own chips. A submarine which can be POLLED and cannot hide is as good as dead in a war.
IN MODERN WARS ONLY AN IDIOT WILL TRY TO KNOCK PUNCH OUT AN INCOMING MISSILE IN THE AIR
WE SAW SAUDIS USING AMERICAN PATRIOT MISSILES TO BLOCK YEMENI MISSILES AND FALLING PHUTT ON THEIR FACES
On November 5, Yemeni forces launched a Borkan-2 (Volcano-2) missile against King Khalid International Airport, located 35 kilometers north of the Saudi capital Riyadh— and it could NOT be intercepted .
On 7th April 2017, we saw Russia knock out more 36 of the 59 Tomahawk cruise missile—IN THE AIR-- sent from 2 US warships to knock out Shayrat airbase in Syria
MODERN MISSILES MUST BE WITH WW3 IN MIND.
INDIA WILL BE PULLED DOWN BY THE JEALOUS ZIONIST LED WESTERN NATIONS AS THE WHITE JEW / CHRISTIAN WILL NEVER SUBMIT TO BLACK HINDU RULE.
ALL IT REQUIRES IS A KILL CHIP --
THE MISSILE WILL WORK IN TESTS AND FIELD TRIALS .
IN A REAL WAR THE MISSILE WILL NEVER EVER HIT ITS TARGET - FOR THE KILL CHIP WILL BE ACTIVATED..
THIS KILL CHIP IS NO BIG TECHNOLOGY --
IT IS BASIC TECHNOLOGY WHICH EVERY UNDER GRADUATE ELECTRONIC STUDENTS CAN ACHIEVE.
WHY DID THE INDIAN MAIN STREAM MEDIA PRAISE MODI WHEN HE SIGNED THE DEAL FOR 36 RAFALE FIGHTER JETS FROM JEW RUN DSSAULT — WHEN THEY HAVE NEVER EVER PRAISED HIM BEFORE?
Zionists will use Pakistan to pull down India.
As soon as Modi came to power he QUIETLY cleared the Israeli Barak Missile deal-using two in one Arun Jaitley ( defence / finance minister ) . We all knew this would happen .
When India has a FULL BLOWN WAR with Pakistan which will be triggered by a Zionist FALSE FLAG ATTACK on Pakistan’s nuclear facilities – the ENTIRE Arab oil/gas rich desert kingdoms will give their military hardware QUIETLY with Zionist support to Pakistan -like fighter jets/ missiles/ submarines etc.
In this scenario India can never hope to have MORE fighter jets or missiles than Pakistan .
Note: Pakistanis guard the Wahabi Ibn Saud bloodline palace in Saudi Arabia -Pakistani / Egyptian pilots operate the fighter jets of the place guard.
All oil rich desert crypto kings do NOT trust their own people's army and they have Rothschild protecting them with private merceneries. As soon as oil runs out these CRYPTO JEW kings will no longer get Rothschild's protection and people will grab power . .
MISSILES / FIGHTER JETS / DRONES ARE KNOCKED OUT BY FRYING ITS ELECTRONIC CHIPS FROM A SATELLITE -- OR HIJACKING ITS CHIPS .
WHEN YOU HIJACK A CHIP, THE ENEMY DRONE IS YOURS- TO BE REPROGRAMMED AND USED AGAINST THE ENEMY .
Every Zionist fighter jet manufacturer has a system to hijack the microprocessors by a KILL SWITCH that is activated by remote control .
every fighter jet has more than a 1000 chips - it is impossible to destect which is the TROJAN HORSE CHIP.
USA is worried bout Chinese chip invsions and US Defense Advanced Research Projects Agency (DARPA), the Pentagon's R&D wing, has a secrey program named " Trust in Integrated Circuits "
This US Trust program has already started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry.
It is practically IMPOSSIBLE to exhaustively test chips with BILLIONS of logic gates.-
A mobile phone can be tested to check out if the phone's various functions work. Any extraneous circuitry that doesn't interfere with the chip's normal functions won't show up in these tests. And it is IMPOSSIBLE to detect this.
Testing of chips is done –say one in a thousand . It is IMPOSSIBLE to test every single chip.
It involves hundreds of man hours of grinding away a thin layer of the chip, put the chip into a scanning electron microscope, and then take a picture of it, repeating the process until every layer of the chip has been imaged.
Spotting a tiny discrepancy amid a chip's many layers and billions of transistors is IMPOSSIBLE and the chip is destroyed in the process.
For ICs destined for mission-critical systems, it is IMPERATIVE to test every chip without destroying it.
A kill switch is any manipulation of the chip's software or hardware that would cause the chip to die outright--to shut off a TEJAS 2 missile-launching electronics
Users will NEVER be aware of the malicious intrusion--the enemy could use it to bypass battlefield radio encryption.
THE ONLY WAY OUT IS TO TAKE PUTINs HELP IN DEVELOPING OUR OWN CHIPS PROGRAM. RUSSIANS / CHINESE ARE AHEAD OF THE ZIONISTS.
Chip security to a barricaded home against thieves . The front door and windows might offer vault like protection, but there is a an unknown rear window deep in the basement for malicious use by the enemy who designed and built your home .
Chips can be down graded or made to have a lesser shelf life ( expiry date ). All it needs is a small nick of the chip’s copper wiring. The fault, is IMPOSSIBLE to detect. The chip fails due to electromigration: as current flowed through the wire, eventually the metal atoms would migrate and form voids, and the wire would break.
If the chip goes into a defense satellite, where it's supposed to work for 20 years but fails after 2 years -- you have a very expensive, inoperative satellite.
To create a controlled kill switch, they add an extra logic to a microprocessor, which can be done either during manufacturing or during the chip's design phase. A saboteur could substitute one of the masks used to imprint the pattern of wires and transistors onto the semiconductor wafer—so that the pattern for just one microchip is different from the rest.
Modern fighter jets use field-programmable gate arrays (FPGAs)--a generic chip that can be customized through ENEMY software. If you put the FPGA in a military system, someone else can reprogram it. Libya and Syria has faced these problems. Building a kill switch into an FPGA could mean embedding say 500 transistors within its billions.
Malicious chips have BACK DOORS.
A kill switch is any manipulation of the chip's software or hardware from a satellite that would cause the CHIP to die outright
An enemy who embeds a kill switch in every commercial router could devastate the whole national security without ever targeting the Defense Department directly.
The timer could be programmed with a single command- The whole defence mechanism fails.
Chip alteration can even be done after the device has been manufactured and packaged, provided the design data is available.
Focused-ion-beam etching machine ( FIB ) shoots a stream of ions at precise areas on the chip, mechanically milling away tiny amounts of material like Microsurgery with the beam acting like a tiny scalpel to remove material, cut a metal line, and make new connections.
They can dig several layers to get to the intended target. It is IMPOSSIBLE to detect.
They can reroute signals to the transistors that are already in place because chips commonly contain large blocks of unused circuitry, leftovers from previous versions of the design.
Soft X-ray tomography can be used to penetrate the chip for inspection but not strong enough to do irreversible damage.
There is a technique called Boolean equivalence checking to analyze what types of inputs will generate certain outputs. This process can be reversed- to detect monkey play.
Unlike India Pakistan has refused to allow KILL CHIPS in their defence mechanism both offensive and defensive. . At a recent hearing, a U.S. House Committee on Foreign Affairs addressed Pakistan's ongoing refusal to let the United States help it secure its nuclear arsenal with American technology.
A hacker who's able to reverse engineer the drone's flight software can impersonate that controller to send navigation commands, meanwhile blocking all commands from the drone’s legitimate operator. You can inject packets and alter waypoints, change data on the flight computer, set a different coming home position
The Wi-Fi connection between its telemetry module and a user’s tablet uses weak "WEP" or "wired-equivalent privacy" encryption, a protocol long known to be crackable in seconds. That would allow any attacker in Wi-Fi range to break into that connection and send a so-called “death” command that kicks the drone’s owner off the network.
The connection between that telemetry module and the drone itself uses an even less-secured radio protocol. CHIPS used in mesh networking, do have built-in encryption capabilities. But in order to avoid latency between the user’s commands and the drone, the drone doesn’t implement that encryption function, leaving the drone open to a man-in-the-middle attack in which another malicious machine could join the same network
A hacker can inject a command to turn on the drone's motors without touching the tablet or telemetry box meant to control it. But in a more malicious attack an unseen hijacker could just as easily control the drone to make it unresponsive, or worse, to crash it to where it took off from , or to simply fly it away and steal it.
In 2011, Iranian engineers jammed the GPS signal for an U.S. RQ-170 Sentinel drone, then spoofed its coordinates to make it land in Iran instead of its base in Afghanistan
You can send a command to the camera, to turn it to the wrong side so they don't receive the desired information...or you can steal the drone, all the equipment attached to it, and its information.
MISSILES / FIGHTER JETS / DRONES ARE KNOCKED OUT BY FRYING ITS ELECTRONIC CHIPS FROM A SATELLITE -- OR HIJACKING ITS CHIPS
These kill chips are NOT high tech stuff. Even a student of any undergraduate college can make this. There was a time when the yanks boasted that nobody could take their drones down. Then a couple of students made them eat crow -- not only can the drones be destroyed from mid air-- it will go back and kill the man who launched it.
All military fighter jets have a KILL CHIP and nuclear submarines have SIGNATURE revealing chips embedded – and India must buy military hardware only from TRUSTED nations.
IF INDIA HAS TO BE A SUPERPOWER IN 16 YEARS , WE NEED TO INVEST 6 BILLION IN A FABLAB
INDIAN NEEDS 18 NUCLEAR SUBMARINES ASAP-- AND ALSO A 6 BILLION USD FAB LAB TO MAKE CHIPS
WE CAN GIVE 10 BILLION USD AS CHARITY TO AFRICA AND BANGLADESH , RIGHT?
THE ITALIAN WAITRESS GAVE 10 BILLION EUROS TO “ ITALY ZONE” SO THAT THEY CAN DRINK PREMIUM WINE
The integrity of Bitcoin depends on a hash function called SHA-256, which was designed by the NSA and published by the National Institute for Standards and Technology (NIST).
The NSA, detailed key elements of Bitcoin long before Bitcoin ever came into existence. Much of the Bitcoin protocol is detailed in this document, including signature authentication techniques, eliminating cryptocoin counterfeits through transaction authentication and several features that support anonymity and untraceability of transactions.
The document even outlines the heightened risk of money laundering that’s easily accomplished with cryptocurrencies. It also describes “secure hashing” to be “both one-way and collision-free.”
If you assume that the NSA did something to SHA-256, which no outside researcher has detected, what you get is the ability, with credible and detectable action, they would be able to forge transactions. The really scary thing is somebody finds a way to find collisions in SHA-256 really fast without brute-forcing it or using lots of hardware and then they take control of the network
In other words, if the SHA-256 hash, which was created by the NSA, actually has a BACKDOOR ENTRY METHOD for cracking the encryption, it would mean the NSA could steal everybody’s Bitcoins whenever it wants. (Call it “Zero Day.”)
BIG BROTHER CAN SEIZE CONTROL OF MONEY ANYTIME AND CRASH FOREIGN GOVERNMENTS ( LIKE ZIMBABWE ) WHO DO NOT PLAY KOSHER BALL
An attacker an extract the secret crypto key from a system by analyzing the pattern of memory utilization or the electromagnetic outputs of the device that are emitted during the decryption process.
Every cryptocurrency becomes obsolete with the invention of large-scale quantum computing.
Once China manages to build a working 256-bit quantum computer, it can effectively steal all the Bitcoins in the world (plus steal most national secrets and commit other global mayhem at will).
SHA-256 is a member of the SHA-2 cryptographic hash functions designed by the NSA. SHA stands for Secure Hash Algorithm.
Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity.
A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.
A one-way hash can be generated from any piece of data, but the data cannot be generated from the hash.
SHA-256 is used in several different parts of the Bitcoin network:---
Mining uses SHA-256 as the Proof of work algorithm.
SHA-256 is used in the creation of bitcoin addresses to improve security and privacy.
SHA, are a family of cryptographic functions designed to keep data secured. It works by transforming the data using a hash function: an algorithm that consists of bitwise operations, modular additions, and compression functions.
The hash function then produces a fixed size string that looks nothing like the original. These algorithms are designed to be one-way functions, meaning that once they’re transformed into their respective hash values, it’s virtually impossible ( oh yeah ? ) to transform them back into the original data.
A few algorithms of interest are SHA-1, SHA-2, and SHA-5, each of which was successively designed with increasingly stronger encryption in response to hacker attacks. SHA-0, for instance, is now obsolete due to the widely exposed vulnerabilities.
A common application of SHA is to encrypting passwords, as the server side only needs to keep track of specific user’s hash value, rather than the actual password.
This is helpful in case an attacker hacks the database, as they will only find the hashed functions and not the actual passwords, so if they were to input the hashed value as a password, the hash function will convert it into another string and subsequently deny access.
Additionally, SHA exhibit the avalanche effect, where the modification of very few letters being encrypted cause a big change in output; or conversely, drastically different strings produce similar hash values. This effect causes hash values to not give any information regarding the input string, such as its original length.
In addition, SHAs are also used to detect the tampering of data by attackers, where if a text file is slightly changed and barely noticeable, the modified file’s hash value will be different than the original file’s hash value, and the tampering will be rather noticeable.
Due to the exposed vulnerabilities of SHA-1, cryptographers modified the algorithm to produce SHA-2, which consists of not one, but two hash functions known as SHA-256 and SHA-512, using 32 and 64-bit words respectively
The CONSENSUS protocol will fail its purpose if the majority of the individuals in the network decide to turn dishonest and cheat the rest of the network. This is known as “51% Attack”.
Because it is built on the assumption that the majority of a crowd is always honest.
SO WE HAVE THE COWBOY POSSE LED BY TRUMP ( INTERNATIONAL WHITE SKINNED COMMUNITY ) RIDING AFTER THE BAD MANGY OUTLAW KOREAN KIM, RIGHT ?
They say—“The sharing economy is already a proven success with companies like Uber and AirBnB flourishing”. We are being brainwashed like JUSTICE IS BLIND false narrative nonsense !
"JUSTICE IS BLIND" JUDICIAL SYSTEM STARTED WITH PROPAGANDA THAT ALMIGHTY JEW ROTHSCHILD AND AN OLD DYING LEPER LYING ON THE STREET IN CHENNAI WILL GET SAME IMPARTIAL JUSTICE, FROM THE COLLEGIUM MELORD.
THIS SYSTEM WAS PERMANENTLY HIJACKED TO PUNISH A FATHER WHO KILLED A RICH JEW WHO ANALLY RAPED AND KILLED HIS 6 YEAR OLD SON.
THE NEW FALSE NARRATIVE IS ---SEE “JUSTICE IS BLIND”— IT IS BLIND TO THE REASON WHY THE JEW WAS KILLED –IT JUST CONSIDERS THE "MAGNITUDE OF THE CRIME".
CONTEXT AND PRINCIPLES OF NATURAL JUSTICE ( DHARMA ) WAS FLUSHED DOWN THE SHITPOT .
THIS IS WHY JEW ROMAN POLANSKI WHO ANALLY RAPED SEVERAL YOUNG GIRLS IS STILL GETTING FILM AWARDS –
-- WHILE ANAND JON WHO GOT A BLOWJOB FROM SOME GOLD DIGGING MODEL WHORE, IS SENTENCED TO 59 YEARS IN JAIL
This 12 part series on HIJACKED JUSTICE is only 40% complete.
I am sick and tired of it !!
GANDHIs AHIMSA WAS A FALSE NARRATIVE.
GANDHIs SELECTIVE AHIMSA WAS ALSO LIKE “JUSTICE IS BLIND “ BULLSHIT.
KILL THEM BAD GERMANS ( WHO NEVER HARMED BHARTAMATA ) —BUT KISS THE WHITE BRITISH INVADER WHO SHAT ON BHARATMATAs FACE, INFICTED A THOUSAND CUTS ON HER, ROBBED HER BLIND , AND MADE US SLAVES
GANDHI IS THIS PLANETs GREATEST RECRUITER OF SOLDIERS EVER-- FOR WAR AND KILLING –SO THAT HIS MASTER JEW ROTHSCHILD CAN CARVE OUT ISRAEL.
Gandhi recruited 13 lakh ( 1.3 million ) Indian soldiers in the first world war – out of which 111000 ( 1.11 lakh ) Indian soldiers were killed .
Gandhi recruited 25 lakh ( 2.5 million ) Indian soldiers in the second World war. Out of this 243000 ( 2.43 lakh) soldiers were killed.
ROTHSCHILDs MEDIA MADE GANDHI A HERO AND IMPORTED THIS KATHIAWARI CRYPTO JEW JAIN FROM SOUTH AFRICA FOR THIS REASON.
TODAY IF YOU GO TO ANTWERP, THE RICHEST INDIANS IN THE ROTHSCHILD CONTROLLED DIAMOND MARKET ARE KATHIAWARI / PALANPURI CRYPTO JEW JAINS
Below: The MK Ultra mind control programme has the initials of these two Rothschild agent BRAINWASHERS
This CRYPTO JEW Gujju Jain community who monopolized diamond trade gets a BULLET TRAIN to Mumbai so that they can avoid airport customs
Bitfinex of creating Tether coins out of thin air— they threaten to sue anybody who tells the truth..
Tethers are being funneled to other exchanges through Bitfinex. Third party deposit addresses are used to obfuscate the paper trail.
Tether is 'pegged' to the United States Dollar, however operates as a currency board, holding United States Dollar in reserve and issuing a cryptocurrency token for each reserve dollar. The exchange rate is 1 Tether (USD₮) to 1 United States Dollar (USD$).
Tether attempts to derive its value directly from United States Dollars held in reserve at Tether Limited. Tether can be stored as value, spent as a medium of exchange and has a fixed unit of account like a traditional fiat currency
Tether is not a legal tender currency or a financial instrument. The ownership of Tether has no contractual rights, other legal claims, or guarantees against losses.
Tether Limited is not a bank and does not hold required reserves at the Federal Reserve. Tether tokens are not legal tender currency and are not covered by deposit insurance.
Tether does not operate in countries and locales which do not regulate cryptocurrencies. Tether is not a legal tender currency, and thereby attempts to circumvent traditional government and regulatory controls.
Tether transactions allegedly violate regulatory compliance banking standards such as Know Your Customer and anti-money laundering standards required of financial institutions.
The Tether model is to hold all United States Dollars in reserve so that it can meet customer withdrawals upon demand.
Bitfinex imposed a withdrawal minimum of $250, which likely prevents over 74% of its customers form withdrawing.
Tether purports to make reserve account holdings publicly available; however, these holdings have not been audited. In the event of a liquidity crisis, insolvency and/or government ban, exchanges and counterparties can exchange Tether in lieu of United States Dollars.
Tether allows customers to conduct financial transactions in United States dollars without using the actual fiat currency; without intermediaries; and without banks.
Tether is closely connected with Bitfinex, which is ranked around the third largest cryptocurrency exchange (by volume) in the world. Tether was initially based on the Bitcoin blockchain ecosystem but in June 2017 it transitioned to the Litecoin blockchain ecosystem.
WARNING : Bitcoin is mixing itself with the real world economy. Day before yesterday ( Sunday ) the Chicago Board Options Exchange began offering bitcoin futures, allowing investors to speculate on whether the digital currency's price will go up or down.
Yesterday marked the first full day of trading, and it's a historic move. Unlike traditional commodities, bitcoins aren't physical assets and unlike currencies, there isn't a central bank that backs bitcoins. Bitcoins live on computer servers.
Chicago Board of Exchange tweeted on Sunday that its website was receiving heavy traffic after trading began. Bitcoin whose price has soared roughly 1,500 percent since the start of the year, got a lift from the new activity on the Chicago exchange. It jumped eight percent in less than 10 minutes.
Futures are a type of contract in which a buyer and a seller agree on a price for a particular item to be delivered on a certain date in the future, hence the name. Futures are available for nearly every type of security but are most famously used in commodities..
The futures signal greater mainstream acceptance of bitcoin but also open up bitcoin to additional market forces. The futures will allow investors to bet that bitcoin's price will go down - a practice known as shorting - which currently is very difficult to do.
Bitcoin is the world's most popular virtual currency. Such currencies are not tied to a bank or government and allow users to spend money anonymously.
They are basically lines of computer code that are digitally signed each time they are traded.
They serve merely to facilitate money laundering and illicit, anonymous payments.
Others say they can be helpful methods of payment, such as in crisis situations where national currencies have collapsed.
It is the other way around as we saw with Zimbabwe
Bitcoin and Litecoin are RIDING HIGH IN TANDEM –why ?
The digital currency, which is a fork of digital sibling Bitcoin, rose to as much as $ 300 after starting out 2017 at $4.33.
Litecoin was the first to alter Bitcoin and the most significant difference is that it takes 2.5 minutes for Litecoin to generate a block, or transaction, in comparison to Bitcoin’s 10 minutes.
There is a limited supply of 84 million litecoins, compared to 21 million bitcoin. Currently, 54,268,358 litecoin and 16,736,137 bitcoin are in circulation. Litecoin transactions take just over two minutes to go through, compared to an average of around nearly 300 minutes for bitcoin.
Litecoin is a peer-to-peer cryptocurrency and open source software project released under the MIT/X11 license. Creation and transfer of coins is based on an open source cryptographic protocol and is not managed by any central authority.
Litecoin was released via an open-source client on GitHub on October 7, 2011.
The Litecoin network went live on October 13, 2011. It was a fork of the Bitcoin Core client, differing primarily by having a decreased block generation time (2.5 minutes), increased maximum number of coins, different hashing algorithm (scrypt, instead of SHA-256), and a slightly modified GUI.
Litecoin uses scrypt in its proof-of-work algorithm, a sequential memory-hard function requiring asymptotically more memory than an algorithm which is not memory-hard
Below: 50 kilos is being supported by the spinal column away from body -- with swaying motion--dangerous for a 61 year old man
Below: 15 kilos is being held upside down behind the shoulder -- dangerous for a 61 year old man
CAPT AJIT VADAKAYIL