THIS POST IS CONTINUED FROM PART 7 , BELOW--
Smart code MUST accurately reflect obligations in the natural human language legal agreement.
In many respects, at least for lawyers, the
external model is only a small step further than the operational mechanics
derivatives counterparties already have in place.
Indeed, there are areas
where such automation already takes
place – for example, daily collateral flows are already automated in the manner described above in certain
margining arrangements.
That is not to belie the potential impact a widespread adoption of the external
model might have operationally, but merely to note that it would likely be a fairly
inconsequential step for lawyers.
In the external model, therefore, it is not
the contract itself that is ‘smart’, but rather the code building blocks that would accompany it and
would be used to execute it.
In the internal model, much of the legal
contract would likely remain in its present form but, critically, with certain conditional logic
elements of the legal contract rewritten in a more formal representation than
the current natural human language form.
A computer would then take that more formal
representation and execute the conditional logic automatically.
Lawyers would need to learn this programming
language to be able to draft smart
contracts. We cant have BOTTOM DREGS OF THE SCHOOL CEREBRAL BARREL LAWYERS
anymore.
When everybody and every tech in the world
was trying to build technology for our intermediaries – FIs, brokers and middle
men in trade deals there was one guy Satoshi Nakamoto who believed that no
intermediary should be involved in asset exchange and he invented blockchain,
which is primarily a decentralized database with great and magical
cryptography.
Blockchain can be used to guarantee that
results of clinical trials won’t be changed by pharmaceutical corporations to
fit desired results. Creating a unique
identifier for each clinical test and registering it in a blockchain, we can
guarantee its safety and integrity. In
the medical field, blockchain can also be used to ensure the correctness of
prescriptions for drugs.
Dubai announced that all government documents
should be secured with blockchain by 2020. Such step may be considered as a
prerequisite for agencies to stop using paper sooner or later.
Again, blockchain networks rely on a
decentralized infrastructure that can’t be controlled by any one person or
group. Unlike political regulation, blockchain governance is not emergent from
the community.
Rather, it is ex ante, encoded in the protocols and processes as
an integral part of the original network architecture. To be a part of a
community supporting a blockchain is to accept the rules of the network as they
were originally established.
In a blockchain transaction, you don’t have
to trust your counterpart to perform their obligations or properly record
transactional data, since these processes are standardized and automated, but
you do have to trust that the code and the network will function as you expect.
Blockchain networks resist political
governance because they are governed by everyone who participants in them, and
by no one in particular.
The power of blockchain technology is that it
can algorithmically enforce private agreements and community principles at a
global scale by shifting the cost of trust and coordination to the network.
This is what allows blockchains to create new markets where they couldn’t exist
before, whether for political or for economic reasons. To do this, we have to
be able to trust the blockchain, and to trust that no one controls it.
In today's traditional banking system, a
court might order a bank to freeze at-risk funds before a would-be thief has
the chance to abscond with them. In the blockchain's completely trustless
world, there is no such authority to implement the court's protective measures.
Similarly, banks can often unwind or alter fraudulent transactions, such as
those initiated by the victim of a scam. When settling a transaction on a
blockchain, there is comparatively little that can be done once the transaction
is broadcast to the network.
Short of convincing a substantial majority of
users to coordinate a hard fork and change prior entries to the ledger to
return the stolen funds, victims are out of luck.
The ineffectiveness of legal remedies is only
the tip of the proverbial iceberg when it comes to the legal uncertainties
associated with using blockchain technology.
Courts will soon have to grapple
with the jurisdictional implications of assets that exist solely in the cloud,
on hundreds of identical copies of a digital ledger, and are stored on
computers throughout the globe.
For these and other reasons, anyone curious
about the blockchain-ULU ( or is it blockchain-UDU? ) and its disruptive potential should consider
the effect that existing, somewhat-incompatible laws could have on society's
ability to regulate this emerging technology.
Not all legal principles can easily be
converted or encoded into technical code or be expressed by means of Boolean
logic (in which values are reflected as either true or false), for example,
requirements of reasonableness and good faith.
Similarly, a machine may have difficulty applying or verifying
warranties that a certain state of affairs exists. For a smart contract to be
purely self-enforcing, we would need to build it in a way which addresses these
issues.
Smart contracts may need to anticipate every
possibility, including factors extraneous to the contract itself, for example,
if it later becomes evident that the agreement or performance is illegal.
While
this may be possible in relation to real-time performance (such as buying a
Coke from a vending machine), this becomes more complex in long-term contracts.
The DAO hack is again a good example of the need to anticipate multiple
permutations.
Many of these issues can be addressed by the
careful crafting of both the legal agreement and the smart code.. Our current
legal system has been developed around traditional contracts, using
well-established principles that have developed over time, such as
reasonableness. Smart Contract 2.0 must bring new and unique challenges and
risks, which will require creative legal and technical thinking.
Smart contracts are a natural progression for
the legal system, and traditional lawyers will need to rise cerebrally to meet their challenges.
For Smart Contract 2.0, our role as lawyers
must extend beyond finding a way to apply traditional contract principles to
smart contracts, to understanding and developing new constructs which support
the operation of smart contracts.
We may also need to start applying Boolean
logic. After all, the aim is to develop the perfect smart contract which admits
no ambiguity, can be interpreted in a binary fashion and anticipates every
possible outcome.
Smart
Contract 2.0 will certainly need the BRAINY,
CREAM OF THE SCHOOL CEREBRAL BARREL
"smart lawyer".
IoT is
also implicitly about automating everything. And that implies bringing a lot of
business concepts along for the ride -- including the idea of a contract to
govern business transactions by.
Contract law has a rich history, with several
centuries of common law practice and legislation. So, when forward thinkers
propose to make contracts "smart" and power them through blockchain,
it's both exciting and daunting.
One of the biggest issues in IoT is knowing
who you are connecting to. That requirement for trust mechanisms across
millions or billions of sensors is what makes a distributed system like a
blockchain vital
The Internet of Things is rapidly expanding
its potential to transform everyday life with smart homes, cities, farms and
manufacturing facilities.
This development is already taking place,
however, he current server infrastructure and internet architecture is unlikely
to be able to support the imminent IoT revolution.
With so many devices
connected to the internet, management and security are a concern. The servers
will become overloaded and represent a single point of failure, making the
system vulnerable to cyber-attack.
Blockchain allows digital information to be
distributed but not copied and in doing so has created a new type of internet
that seems incorruptible. Initially designed for financial transactions
blockchain technology can be used to record just about anything of value.
The
objective is to create a single version of any particular transaction,
containing more information than what can be offered by any one singular
system, revealing transparent, real-time data for various uses.
The technology itself underpinning blockchain
consists of encryption enabling security and anonymity, mutual consensus
verification resulting in collective network updates and hence an accurate
dataset at all times without the need for a central governing authority.
By providing a secure mesh network,
blockchain can deliver a platform for IoT to interconnect reliably and avoid
the threats that plague central server models.
There are companies already
using blockchain to power IoT systems, especially in the agriculture and
manufacturing industries where there is a need for remote sensors and
automation. IoT, powered by blockchain technology, enables a low power, secure
network that can remotely manage physical operations without centralized cloud
servers.
Smart homes are the next port of call for
blockchain technology. Companies
are using blockchain to secure smart
home IoT ecosystems by storing biometric and authentication data on a private
blockchain. In this way, blockchain is able to verify identity of IoT devices
and the people interacting with them to prevent compromised devices usurping
the platform.
Right now, IoT is mainly concerned with
collection of data, remote monitoring and device automation. Going forward, the
transition is likely to be towards a network of autonomous devices that
interact with each other and the surrounding; and make input-based smart
decisions, without any human involvement.
Blockchain has the potential to support this
communal economy based on machine-to-machine interactions
Blockchain will permit the monetization of
data, whereby IoT device owners can sell data generated from IoT sensors for
digital currency.
With
the ability to create a secure and equal framework for interactions, where no
one individual is in charge, incidentally levels the playing field and opens a
development platform for digital entrepreneurs.
Adaptive/continuous analytics is about ‘What are the appropriate actions /decisions,
and how can we adapt to the latest changes?’
The interdependence between IoT and AI also
works the other way. IoT’s capacity to enable real-time feedback is critical to
adaptive learning systems, since other technologies do not really enable this
advanced type of AI/analytics. So they both need each other.
Blockchain technology serves as a platform
that allows the transit of digital information without the risk of being
copied.
Imagine a spreadsheet that’s practically
augmented tons to times across a plethora of computing systems. And then
imagine that these networks are designed to update this spreadsheet from time
to time. This is exactly what blockchain is.
Information that’s stored on a blockchain is
a shared sheet whose data is reconciled from time to time. It’s a practical way
that speaks of many obvious benefits. To being with, the blockchain data
doesn’t exist in one single place. This means that everything stored in there
is open for public view and verification.
Further, there isn’t any centralized
information storing platform which hackers can corrupt. It’s practically
accessed over a million computing systems side-by-side, and its data can be
consulted by any individual with an internet connection.
It is vital to note, blockchain cannot be
controlled by a single people, entity or identity, and has no one point of
failure. Just like the internet has
proven itself as a durable space since last 30 years, blockchain too will serve
as an authentic, reliable global stage for business transaction as it continues
to develop.
Veterans of the industry claim that
blockchain lives in a state of consciousness. It practically checks on itself
every now and then. It’s similar to a self-auditing technology where its
network reconciles every transaction, known as a block, which happens aboard at
regular intervals.
This gives birth to two major properties of
blockchain – it’s highly transparent, and at the same time, it cannot be
corrupted. Each and every transaction that takes place on this server is
embedded within the network, hence, making the entire thing very much visible
all the time to the public.
Furthermore, to edit or omit information on
blockchain asks for a humongous amount of efforts and a strong computing power.
Amid this, frauds can be easily identified. Hence, it’s termed incorruptible.
There isn’t a defined rule or regulation
about who shall or can make use of this immaculate technology. Though at
present, its potential users are banks, commercial giants and global economies
only, the technology is open for the day to day transactions of the general
public as well. The only drawback blockchain is facing is global acceptance.
All IoT transactions on the Blockchain will
be timestamped thus ensuring that they are available essentially – for
posterity.
Navigating the human element needs to be a
central component of an IoT strategy. Workers must be informed, trained and
motivated to help ensure that IoT information flows freely through systems and
is used to reduce the guesswork of decision-making.
The IoT involves smart
devices, deployed at scale, collecting massive quantities of data every day.
And that data must be trustworthy.
Internet of Things (IoT) may be better
understood by breaking it down into four elements:---
The widespread use of inexpensive sensor
technology by billions of devices to collect data
The ubiquitous data networks through which
that data then flows
The scalable, shared data center resources in
the cloud, which ingest that data
The analysis of the data (often referred to
as big data”), to extract value which justifies the considerable investments
and challenges involved in the first three parts
WHEN I CHANGE MY EMAIL PASSWORD , I GET A OTP
( ONE TIME PASSWORD ) ON MY MOBILE.
IT IS IMPORTANT TO HOOK UP AADHAR TO MOBILE PHONE, BANK ACCOUNTS, PAN CARDS, VOTER
IDs, PASSPORT, DRIVER LICENCE ETC
INDIA WILL SOON ABOLISH INCOME TAX AND GO FOR
BTT
Last week, criminals launched a phishing scam
against MyEtherWallet owners, reportedly earning over $15,000 over the course
of a few hours.
The phishing email, claimed that the wallet
provider was implementing a hard fork update, urging the victims to unlock
their accounts using their Keystore Files or private keys, synchronize their
wallets and verify their ETH and token balances.
By doing all that, one could
have exposed their private keys along with providing information on the hackers
about his wallet balance.
The hackers went to great lengths to make the
phishing site look almost identical to the legitimate MyEtherwallet.com site,
even going to the lengths of registering an almost identical domain.
Only upon
closer inspection was it clear that the site used a Unicode trick and that
there was a comma under the t.
When someone followed the link and entered
their details, the phishers would then have access to a victim’s wallet,
allowing for the transfer of funds
Blockchain account holders who have been
tricked by the scam are asked to attempt to change their passwords and contact
Blockchain for help.
To help protect their accounts against
phishing scams Blockchain account holders can enable 2-Step-Verification on
their accounts .
This is an extra layer of security that will prevent
cybercriminals from gaining access to their accounts even if they have stolen
their account credentials.
A number of blockchain and cryptocurrency
companies have fallen victims to phishing scams that utilize the messaging
service Slack
Have you ever received a threat that your
account would be closed if you didn't respond to an email message?
Phishing email messages, websites, and phone
calls are designed to steal money. Cybercriminals can do this by installing
malicious software on your computer or stealing personal information off of
your computer.
Cybercriminals also use social engineering to
convince you to install malicious software or hand over your personal
information under false pretenses. They might email you, call you on the phone,
or convince you to download something off of a website.
Phishing is the attempt to obtain sensitive
information such as usernames, passwords, and credit card details (and,
indirectly, money), often for malicious reasons, by disguising as a trustworthy
entity in an electronic communication.
The word is a neologism created as a
homophone of fishing due to the similarity of using a bait in an attempt to
catch a victim. According to the 2013 Microsoft Computing Safety Index,
released in February 2014, the annual worldwide impact of phishing could be as
high as US$5 billion
Phishing is typically carried out by email spoofing
or instant messaging, and it often directs users to enter personal information
at a fake website, the look and feel of which are identical to the legitimate
one and the only difference is the URL of the website in concern.
Communications purporting to be from social
web sites, auction sites, banks, online payment processors or IT administrators
are often used to lure victims. Phishing emails may contain links to websites
that are infected with malware.
Phishing is an example of social engineering
techniques used to deceive users, and exploits weaknesses in current web
security.[8] Attempts to deal with the growing number of reported phishing
incidents include legislation, user training, public awareness, and technical
security measures.
Phishing attempts directed at specific
individuals or companies have been termed spear phishing. Attackers may gather personal information
about their target to increase their probability of success. This technique is
by far the most successful on the internet today, accounting for 91% of attacks.
Threat Group-4127 used spear phishing tactics
to target email accounts linked to Hillary Clinton's 2016 presidential
campaign. They attacked more than 1,800 Google accounts and implemented
accounts-google.com domain to threaten targeted users.
The most common form of phishing is the
general, mass-mailed type, where someone sends an email pretending to be
someone else and tries to trick the recipient in doing something, usually
logging into a website or downloading malware. Attacks frequently rely on email
spoofing, where the email header — the from field — is forged to make the
message appear as if it was sent by a trusted sender.
However, phishing attacks don’t always look
like a UPS delivery notification email, a warning message from PayPal about
passwords expiring, or an Office 365 email about storage quotas. Some attacks
are crafted to specifically target organizations and individuals, and others
rely on methods other than email.
A phishing attack specifically targeting the
enterprise’s top executives is called whaling, as the victim is considered to
be high-value, and the stolen information will be more valuable than what a
regular employee may offer. The account credentials belonging to a CEO will
open more doors than an entry-level employee. The goal is to steal data,
employee information, and cash.
Whaling also requires additional research
because the attacker needs to know who the intended victim communicates with
and the kind of discussions they have. Examples include references to customer
complaints, legal subpoenas, or even a problem in the executive suite.
Attackers typically start with social
engineering to gather information about the victim and the company before
crafting the phishing message that will be used in the whaling attack.
Aside from mass-distributed general phishing
campaigns, criminals target key individuals in finance and accounting
departments via business-email compromise (BEC) scams and CEO email fraud. By
impersonating financial officers and CEOs, these criminals attempt to trick
victims into initiating money transfers into unauthorized accounts.
Clone phishing requires the attacker to
create a nearly identical replica of a legitimate message to trick the victim
into thinking it is real. The email is sent from an address resembling the
legitimate sender, and the body of the message looks the same as a previous
message.
The only difference is that the attachment or
the link in the message has been swapped out with a malicious one. The attacker
may say something along the lines of having to resend the original, or an
updated version, to explain why the victim was receiving the “same” message
again.
Vishing stands for “voice phishing” and it
entails the use of the phone. Typically, the victim receives a call with a
voice message disguised as a communication from a financial institution.
For
instance, the message might ask the recipient to call a number and enter their
account information or PIN for security or other official purposes. However,
the phone number rings straight to the attacker via a voice-over-IP service.
Snowshoeing, or “hit-and-run” spam, requires
attackers to push out messages via multiple domains and IP addresses. Each IP
address sends out a low volume of messages, so reputation- or volume-based spam
filtering technologies can’t recognize and block malicious messages right away.
Some of the messages make it to the email inboxes before the filters learn to
block them
In a recent phishing campaign, Group 74
(a.k.a. Sofact, APT28, Fancy Bear) targeted cybersecurity professionals with an
email pretending to be related to the Cyber Conflict U.S. conference, an event
organized by the United States Military Academy’s Army Cyber Institute, the
NATO Cooperative Cyber Military Academy, and the NATO Cooperative Cyber Defence
Centre of Excellence.
While
CyCon is a real conference, the attachment was actually a document containing a
malicious Visual Basic for Applications (VBA) macro that would download and
execute reconnaissance malware called Seduploader.
A number of senior cyber security pros were
in for an embarrassment after it came to light that they fell for a phishing
scam conducted by Fancy Bear, a Russian hacker group.
Fancy Bear used a malicious code in a Word
document that it sent to cyber security pros who were to attend the Cyber
Conflict US conference.
Fancy Bear is a Russian cyber espionage group. They employ zero-day vulnerabilities and use
spear phishing and malware to compromise targets. Fancy Bear's targets have
included Eastern European governments and militaries, the country of Georgia
and the Caucasus, security-related organizations such as NATO, as well as US
defense contractors Academi (formerly known as Blackwater) and Science
Applications International Corporation (SAIC)
Paranaoid travellers have always been wary of
hotel Wi-Fi. Now they have a fresh justification of their worst wireless
networking fears: A Russian espionage campaign has used those Wi-Fi networks to
spy on high-value hotel guests, and recently started using a leaked NSA hacking
tool to upgrade their attacks.
Russian hacker group Fancy Bear, has targeted
victims via their connections to hacked hotel Wi-Fi networks
Fancy bear have used EternalBlue, the leaked
NSA hacking tool, as one technique to broaden their control of hotel networks
after gaining an initial foothold via phishing or other techniques
Once those hackers take control of hotels'
Wi-Fi, they’re using that access to harvest victim computers’ usernames and
passwords silently, with a trick that doesn’t even require users to actively
type them when signed onto the hotel network.
The attackers used a network-hacking tool
called Responder, which allowed them not only to monitor traffic on the
hijacked networks, but also to trick computers connecting to them to cough up
users' credentials without giving victims any sign of the theft.
When the
victim computer reaches out to known services like printers or shared folders,
Responder can impersonate those friendly entities with a fake authentication
process, fooling the victim machine into transmitting its network username and
password. And while the password is sent in a cryptographically hashed form,
that hashing can sometimes be cracked.
If the Fancy Bear cyberattack was successful,
the team would attempt to siphon any secretive data from victims' computers. In
one of its most famous attacks, it exfiltrated tens of thousands of emails from
the DNC network, which were later leaked online for the world to see.
Cyberwarfare includes denial of service attacks, hacker
attacks, dissemination of disinformation and propaganda, participation of
state-sponsored teams in political blogs, internet surveillance using SORM
technology, persecution of cyber-dissidents and other active measures.
Ten months ago at Estonia's Tapa military
base, Estonian soldiers noticed their contacts were disappearing from their
phones and music that they had never downloaded would start playing
DHINKA CHIKKAA DHINKA CHIKKKA
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Barah maheenay mein, Barah tareekay se,
In 12 months, in 12 different ways
Tujhko pyaar jataunga re
I shall express My love
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Barah minute bhi lagta hai ab na tere bin reh paunga
re
It feels now that I can't even live without You for
12 minutes
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Haye January mein jab aayegi winter, on kar lenge
chaahat ka heater
In January when there shall be winter, We will turn
on the heater of Love
February jitni chhoti rajaai, Jis mein khelein hum
chhupan chhupayi
The blanket shall be as small as February in which
we shall play hide and seek
March hoga romantic mahina, Woh karenge jo kiya
kabhi na
March shall be a romantic month, We shall do what we
haven't done before
April mein jo hum mil na paaye, Hoga kya kuch nikalo
upaaye
We will find a solution if we are not able to meet
in the month of April
Ik tujhse chatting main karne ki khaatir, Internet
lagwaunga re
Just to chat with You, I will get an internet
connection
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Garmi aayegi phir jab May mein, Poolside mein party
karenge
In the hot month of May, we shall do poolside
parties
June mein lenge lamba vacation, Hum chalenge kisi
hill station
In June we shall take a long vacation and we shall
go to a hilly area
Haan July mein saavan jo barse, Tujhse yeh mann
lipatne ko tarse
In July when there is monsoon, I would love to
embrace You tightly
Aish poori August karenge, Aisa kuchh bandobast
karenge
We shall enjoy the whole of August, We shall make
prepartions for that
London le jaaunga, Paris ghumaunga, World tour
karwaunga re
I shall take You to London and Paris, I shall take
You on a world tour
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Mujhko lagta hai yaara September, Ik ho jaayega aana
tere ghar
I think that in September, I shall be coming to your
home
Phir October aaye toh suraj, Doobta dekhenge rakh
kaandhe pe sar
And We shall together in October see the setting sun
with our heads
on each other's shoulders
Jab tak aayega very November, Kar chuka hoga dil tu
surrender
You would have surrender your heart to me till
November
Baat pakki ho baarah December, Dil se iss dil ka
thappa laga kar
Our marriage will get fixed on 12th of December,
with the stamp
of one heart over the other
Na gaadi hogi na ghodi hogi, Paidal hi baarat launga
re
There won't be any car or horses, I shall bring the
procession on foot
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Barah maheenay mein, Barah tareekay se
In 12 months, in 12 different ways
Tujhko pyaar jataunga re
I shall express My love
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Barah minute bhi lagta hai ab na tere bin reh paunga
re
It feels now that I can't even live without You for
12 minutes
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
Dhinka chika, Dhinka chika
Dhinka chika, Dhinka chika
A..A..A..A..
DOUBT AAH GAYA MANN MANDIR MEIN
SHOULD THESE DANCERS
TIP TOE
DO PELVIC THRUSTS
DO SOMESAULTS
DO TRAPAZE
DO ROPE CLIMBIMG
DO ACROBATICS
DO BODY CONTORSIONS
ROTATE ON HEAD / ROUND ZE POLE
DO GYMNASTICS
AND SPLAY THEIR LEGS WHILE WEARING THONGS
SO THAT WE CAN GET A GENEROUS VIEW OF PIG SORPOTEL SHIT LADEN ASSHOLES
RAMESH GOPI NAIR-- NAY-- BROWN SAHIB REMO DSOUZA --BATAAOH NAAH-PLEAJJJE ?
PUT THIS COMMENT IN REMO DSOUZAs WEBSITE
Below: This is Demi Moore , showing her shit laden asshole ( pig sorpotel flavored ) --peek a boo behind her thong
Below: I used to hate Mika Singh's songs --till he sang this number
Aaja Pyaar Ki Ho Deal
Come on let’s make a
deal of love
Deal Bole To Heart,
Heart
Deal means heart
Amma Yaar Sauda Sauda,
Oho…
No, it means deal
Dono Deal Kare Seal
Let’s seal this deal
together
Tight, Tight Very Tight
Aankhon Se Ho Agreement
May there be an
agreement with the eyes
Oho…
Chale Us Pe Permanent
May it remain permanent
Aa Ha… Ha…
Aur Hasraton Ke Court
Mein
And in the court called
desire
Yeh Dil Ke Judge Kahein
Let this judge called
heart say
Order... Order...
Khaali-Peeli,
Khaali-Peeli Rokne Ka Nahi
Don’t stop me without
any reason
Tera Peechha Karoon To
Tokne Ka Nahi
If I follow You then
don’t scold me
Hai Tujh Pe Right Mera
I have a right over You
Tu Hai Delight Mera
You’re my delight
Tera Rasta Jo Rokoon
If I stop You in Your
path
Chaunkane Ka Nahi
Then don’t be shocked
Tere Doggy Ko Mujh Pe
Bhaunkne Ka Nahi
Your dog shouldn’t bark
on me
Tera Peechha Karoon To
Tokne Ka Nahi
If I follow You then
don’t scold me
Khaali-Peeli,
Khaali-Peeli Rokne Ka Nahi
Don’t stop me without
any reason
Tu Mere Agal Bagal Hai,
Main Tere Agal Bagal Hoon
You’re in my vicinity ,I’m in Your vicinity
Tu Mere Agal Bagal Hai,
Main Tere Agal Bagal Hoon
You’re in my vicinity,
I’m in Your vicinity
Haaye Fokatiyon Sa
Pyaar Karoonga
I’ll love You like a
broke man
Baaton Se Hi Pet
Bharoonga
I’ll satisfy You with
only talks
Miss Call Pe Phone Tu
Karna
If I miss call You,
You’ll call me back
Mar Jaoon Na Pyaar Mein
Warna
Otherwise, I’ll die in
Your love
Nahi Bolta Mamma
Otherwise why should mE mother have said this
Har Heart Ka Bhookha
That every heart is
hungry (for love)
Majnu Se Kam Tu Sochne
Ka Nahi
Never have desires less
than a Romeo does
Sachcha Aashiq Hoon
I’m a true lover
Mujhe Tokne Ka Nahi
Don’t scold me
Dhichkiyon…
(Sound of a bullet
being fired)
Tere Doggy Ko Mujh Pe
Bhaunkne Ka Nahi
Your dog shouldn’t bark at me
Khaali-Peeli,
Khaali-Peeli Rokne Ka Nahi
Don’t stop me without
any reason
Tera Peechha Karoon To
Tokne Ka Nahi
If I follow You then
don’t scold me
Tu Mere Agal Bagal Hai,
Main Tere Agal Bagal Hoon
You’re in my vicinity,
I’m in Your vicinity
Ho... Ghar Se Nikalne
Ka Time To Bata
Tell me the time when
You come out of Your home
Taaki Rahoon Main Mod
Pe Khada
So that I can stand on
the corner of the street
Rehta Hoon Main Aaj-Kal
Busy
I remain busy nowadays
Wait Karna Hai Mushkil
Bada
Waiting for You is a
difficult job
Main Road Romeo, Dil
Jod Romeo
I’m a road-side Romeo,
I’m the Romeo who bonds his heart with others
Raste Mein Mujhko
Chhodne Ka Nahi…
Don’t leave me standing
alone on the road
Chaahe Dil Tod, Sar
Phodne Ka Nahi
Even if You break the
heart, don’t break my head
Tere Doggy Ko Mujh Pe
Bhaunkne Ka Nahi
Your dog shouldn’t bark at me
Khaali-Peeli,
Khaali-Peeli Rokne Ka Nahi
Don’t stop me without
any reason
Tera Peechha Karoon To
Tokne Ka Nahi
If I follow You then
don’t scold me
Tu Mere Agal Bagal Hai,
Main Tere Agal Bagal Hoon
You’re in my vicinity,
I’m in Your vicinity
Estonian troops on the base now have to
follow a "no smartphones" policy and are forced to remove their SIM
cards.. It's gotten so bad that their superiors order them to jump into lakes
during operations to make sure they're following the policy, and some soldiers
are even wrapping their phones in condoms…
The victims of the phone hackings
have largely been the 4,000 NATO troops currently stationed in Poland and other
Baltic states
DONALD TRUMP SEND 59 TOMAHAWK CRUISE MISSILES
FROM TWO US NAVAL SHIPS , INTO A REMOTE SYRIAN AIR BASE.
HARDLY
ANY MISSILE FOUND ITS TARGET—WASTE OF 75 MILLION USD
SAUDI KING CAME TO KNOW THE HARD WAY THAT HIS GOLDEN ESCALATOR FOR DESCENDING FROM HIS PLANE KOSHER STYLE COULD BE STALLED.
PUTIN SOMETIMES DOES GAAND MASTI
Security firm Cisco Talos announced that it
has discovered a sophisticated phishing operation carried out by Russian hacker
group Fancy Bear and targeted at cyber security professions attending the cyber
security conferences
Fancy Bear posed as event organisers and sent
an email to the targeted individuals with a detailed itinerary of the
conference which they lifted from the conference website.
The emails contained
a Word document titled "Conference_on_Cyber_Conflict.doc" that
contained a well-known reconnaissance malware dubbed 'Seduploader'. Seduploader
Payload is a downloader used by Sednit's operators as reconnaissance malware
Fancy Bear targeted cybersecurity
professionals for good reason – they are privy to huge amounts of vital data.
These conferences are attended by large enterprises, security vendors, and
government bodies, making them a huge payload for any hacker
Blockchain, the underlying technology of
cryptocurrencies offers a completely unique approach to cybersecurity.
Some of the major corporations in the world,
like Lockheed Martin and the US military, have deployed blockchain for securing
their data. In India too, state governments of Andhra Pradesh and Telangana, as
well as a few commercial banks are using this blockchain-ULU ( or is it
blockchain-UDU ? ) technology to protect their database records and fight
against cybercrime.
Recently, attackers had hacked into Equifax’s
network that led to a potential compromise of sensitive data of over 146
million of its users, all of which was held in a centralized location. Equifax
Inc. is a consumer credit reporting agency. Equifax collects and aggregates
information on over 800 million individual consumers and more than 88 million
businesses worldwide.
Founded in 1899 and based in Atlanta, Georgia, it is one
of the three largest credit agencies along with Experian and TransUnion (known
as the “Big Three”)
The company claims to have discovered evidence of the
cybercrime event on July 29, 2017 Equifax did not immediately disclose whether
PINs and other sensitive information were compromised, nor did it explain the
delay between its discovery of the breach in July and its public announcement
in early September.
Equifax stated that the delay was due to the time needed to
determine the scope of the intrusion and the large amount of personal data
involved..
Three Equifax executives sold
almost $1.8 million of their personal holdings of company shares days after
Equifax discovered the breach but more than a month before the breach was made
public
In the corridors and break rooms of Equifax
Inc.'s giant Atlanta headquarters, employees used to joke that their enormously
successful credit reporting company was just one hack away from bankruptcy.
They weren't being disparaging, just brutally honest.
Founded in the 19th
century as a retail credit company, Equifax had over the years morphed into one
of the largest repositories of Americans' most sensitive financial data, which
the company sliced and diced and sold to banks and hedge funds. In short, the
viability of Equifax and the security of its data were one and the same.
Hackers
homed in on a bounty of staggering scale: the financial data—Social Security
numbers, birth dates, addresses and more—of at least 146 million Americans.
Equifax breach compromised personal information of over 42% of the U.S.
population. Equifax reports that the breach began as early as mid-May 2017. It
wasn’t discovered until July 29. The company says hackers discovered and
leveraged a vulnerability in a web application.
By the time they were done, the attackers had
accessed dozens of sensitive databases and created more than 30 separate entry
points into Equifax's computer systems.
The massive breach occurred even though
Equifax had invested millions in sophisticated security measures, ran a
dedicated operations center and deployed a suite of expensive anti-intrusion
software..
The true scale of the cyberattack’s impact
remains to be seen.
The impact of the Equifax breach will echo
for years. Millions of consumers will live with the worry that the
hackers—either criminals or spies—hold the keys to their financial identity,
and could use them to do serious harm. Besides amassing data on nearly every
American adult, the hackers also sought information on specific people.
Attorneys general in at least five states are
looking into why credit-reporting firm Equifax Inc. didn’t tell the public for
nearly six weeks about the massive data breach that potentially compromised the
personal information of 146 million Americans.
The architecture of blockchains is not
designed for massive data sets. In the
case of Equifax, the company’s business practice is about using algorithms to
query a massive repository of customer records in order to spit out a credit
score.
While consumers and companies could use a blockchain to access the
score, it’s still up to the credit bureaus to protect the underlying pool of
personal information. Doing that requires segregating sensitive data and
properly encrypting it. Their focus should be on the latest encryption and
security techniques for hardening and protecting data sources..
Websites like Equifax require users to enter
multiple pieces of sensitive information in order to authenticate themselves
and utilize that website’s services. Using blockchain consumers can limit the
amount of personal information used to authenticate themselves.
Consumers will have sovereign authority over
their personal information when operating on blockchain since transactions are
securely verified by permissioned participants. Hacks of centralized databases
(Equifax) are inevitable. Decentralization of personal identity information
storage is the only way forward,
In the future, blockchain infrastructure will
help mitigate the effect and scope of cyberattacks through its two fundamental
characteristics: decentralization and cryptography. Incidents like the Equifax hack lend credence
to the benefits of blockchain in enhancing cybersecurity.
Bypassing centralized
servers and databases will spread consumer information across secured peer-to-
peer networks protected by layers of cryptography.
Blockchain in its purest form obsolesces
central authorities. However, in order to truly protect consumers, identity
management on blockchain must be backed by a robust, established legal
framework.
But while blockchain can’t be a substitute
for good data hygiene, the technology will have a role in helping individuals
exert control over their identity.
Blockchain may be marvelous but it’s not a magic bullet.
MOST OF THE INTERNET VIRUSES ARE CREATED BY RIVAL
ANTI-VIRUS COMPANIES , WHO THEN SELL THE CURE ..
THEY KNOW HOW TO CURE AS THEY
ARE THE REASON WHY THE VIRUS WAS INTRODUCED , IN THE FIRST PLACE.
Blockchain technology uses a decentralized
security model as compared to traditional centralized cybersecurity models,
eliminating the perils of the single point of breach. This has been the
perennial limitation of traditional methods of enterprise security
On a blockchain, the data is stored and
distributed on decentralized networks without the authority of any single
entity. Every new block of information being added to a chain is encrypted with
a part of the previous chain, making the historical record of data
unchangeable.
It is designed in a way that if a hacker tries to alter anything
on the blockchain, it will cause a change in the entire data signature, which
can be easily identified and isolated to alert the network administrators.
For
a hacker to successfully attack the blockchain network, it would require him to
simultaneously alter the constantly-updating nodes, making it almost immune to
tampering.
To connect to any network, public keys are
used for authentication and encryption under the current public key
infrastructure (PKI). By attacking the central repository where certificates
are stored, hackers can easily fake user identities and break encrypted
exchange of data.
Encryption is performed to ensure the safety
and privacy of information sent from one party to another. “Keys” are used to
lock (encrypt) and unlock (decrypt) the data that’s transmitted, and if a
single key is used for this purpose then symmetric encryption is said to have
occurred.
This method only works when the key that’s used is kept absolutely
secure, and as a secret between the two communicating parties. Public Key Infrastructure
(PKI) uses a combination of asymmetric and symmetric processes.
An initial
“handshake” between communicating parties uses asymmetric encryption to protect
the secret key which is exchanged to enable symmetric encryption.
Asymmetric
encryption is used for the rest of the communication, once the secret key has
been exchanged. Digital certificates are vital to PKI operations. Each
certificate acts as an “electronic fingerprint” for a digital transaction,
giving a unique identity to each key pair, and establishing the identity of
communicating parties within a group.
A Public Key Infrastructure (PKI) is a
framework which supports the identification and distribution of public
encryption keys. It provides a set of procedures and policies for establishing
the secure exchange of information and enables individuals and systems to
exchange data over potentially unsecured networks like the Internet and to
authenticate and verify the identity of the party they’re communicating with.
PKI is a standards-based technology that
enhances security policies with communications protocols, mechanisms, and
procedures to facilitate confidential and trusted exchanges of information
between different parties within and outside an organization.
The
infrastructure framework also provides security services such as
authentication, integrity checking, confidentiality, and non-repudiation (legal
non-deniability).
The PKI based identity on a blockchain is new
security technology.. Blockchain technology is being used to protect sensitive
records and to authenticate the identity of a user. Keyless Security
Infrastructure (KSI) stores data hashes on blockchains and runs a hashing
algorithm for their verification.
Public Key Infrastructure (PKI), an
encryption approach which is particularly vulnerable to man-in-the-middle and
DDoS attacks, is therefore deleted out of the equation.
Any data manipulation
can be easily spotted as the original hash is available on other nodes linked
to the system, enabling banks to go beyond asymmetric encryption and caching in
public keys.
Though blockchain has several advantages over other systems, there
are still a few challenges in terms of compliance, regulations and enforcement
that will need to be addressed. For example, regulatory issues demand clarity
over jurisdictions and how to comply with KYC (Know your customer) and AML
(anti - money laundering) laws.
Using technologies like PKI (Public Key
Infrastructure) to encrypt the data and store it in the cloud creates a
tremendous load and has serious scalability limitations.
Finally, the
centralised architecture of most IoT solutions, means that there are serious
resiliency issues. All transactions are processed in the cloud and
unavailability of these cloud resources could lead to a complete stop of your
business operations.
Blockchain being a distributed ledger, it can be used to
distribute computation, it can be used to log transactions and business
operations. KSI (Keyless Signature Infrastructure) blockchain is a technology
that can be used to provide integrity of all assets, cloud and devices
included.
With KSI, a cryptographically secure hash is
created for each asset that we need to protect and it is stored in the
blockchain. This allows us to perform audits to see if any data has been
tampered with.
Every change is logged and unwanted changes in data can be
detected and acted on. At any point in time, anybody can validate what the
truth should be.
By using KSI blockchain, we can log not only
data changes in the cloud, but we can also log software changes and
configuration changes at the device level. We can make sure that any change on
our IoT device is logged and any unwanted changed can be acted upon.
With
blockchain we can make sure secure the data throughout its entire lifecycle.
With the distributed architecture of blockchain we also remove the limitations
that we have with centralised cloud architectures, both in terms of computation
as well as resiliency.
Keyless Signature Infrastructure (KSI) is a unique,
permission-based participation, and independently verifiable calendar hash
Blockchain to prove data integrity in perpetuity. Data records can only be
added to the calendar hash Blockchain, never removed.
Each new record is
cryptographically linked to all previous records through the progression of the
calendar hash Blockchain. Since records are cryptographically linked and
nonreversible, it is impossible for one party to manipulate previous records
without breaking the overall consistency of the database.
Data participates in
the calendar hash Blockchain through an adaptive and distributed architecture
for a reliable, resilient system that produces an immutably timestamped Keyless
Signature of the data item. Data is independently verifiable at the point of
consumption through the widely-witnessed/distributed calendar hash Blockchain.
This makes Keyless Signatures ideal for the recording of events, medical
records, AM part provenance, transaction processing (smart contracts), and
proving data provenance.
Blockchain-based keyless signature
infrastructure (KSI), helps to securely manage the public keys, thus
eliminating the risk of breach.
Because the data is not stored on one server,
but distributed to many parties, even if there is an attack on one system, it
will not be affected. That is where the blockchain really helps in preventing
data breach attacks
Blockchain creates a trusted
environment. Blockchain allows users to
deal with others whom they ordinarily cannot trust, without the need of a
neutral third party or regulator.
Using advanced cryptography, a blockchain is
unreadable to the members it is shared with. It is based on hash functions that
are constantly updated, making it more secure than simple encryption. The
distributed nature of blockchain removes the presence of blind trust in third
parties.
When you can trust everyone in the whole
chain, it becomes safer and safer to transact upon. The current roll outs we
see are communities which have deployed blockchain from the starting to the end
point, from bank to the trader. When all parties are fully able to trust each
other in a business environment, it is good for security.
To connect to any network, public keys are
used for authentication and encryption under the prevalent public key
infrastructure (PKI). The keys are awarded through digital certificates managed
on an authorized central server. By attacking the central repository where
certificates are stored, hackers can easily fake user identities and break
encrypted exchange of data.
Because the data is not stored on one server,
but distributed to many parties, even if there is an attack on one system, it
will not be affected. That is where the blockchain really helps in preventing
data breach attacks
Keyless signature infrastructure relies on
the use of hash function cryptography as compared to the traditional asymmetric
key cryptography used in public key infrastructure, and provides real-time
signature validation to ensure comprehensive enterprise security
In a blockchain, an identity of a user can be
tied to a tamper-proof hash, making it almost impossible for someone to copy
the identity. By matching the identity of an individual tied to the blockchain
hash, the entire identity management system can be reconstructed in case of a
mishap.
Blockchain technology is also being used to
serve as an alternate for HTTP web protocol. The Inter Planetary File System
(IPFS) uses blockchain protocol and hash cryptography to make a more secure
form of internet.
HTTP is the
foundation of data communication for the World Wide Web. Hypertext is
structured text that uses logical links (hyperlinks) between nodes containing
text. HTTP is the protocol to exchange or transfer hypertext.
InterPlanetary
File System (IPFS) is a protocol designed to create a permanent and
decentralized method of storing and sharing files. It is a content-addressable,
peer-to-peer hypermedia distribution protocol. Nodes in the IPFS network form a
distributed file system.
InterPlanetary File System. It’s an
hypermedia distribution protocol created to make the web faster, safer, and
more open. The IPFS is designed to provide a decentralized alternative to the
current http protocol that is censorship resistant and much more efficient.
IPFS is a peer-to-peer network run by
multiple nodes that store files that are submitted to the network. These nodes
store only content that are interesting, including common indexing information
that helps users find the nodes that keep the files they are looking for within
the network.
Each file submitted to the network is given a
unique cryptographic hash that allows the IPFS network to automatically delete
duplicates and track version history for every file. Historic versioning
prevents information from being easily erased. Since the files are provided by
distributed nodes, download speeds are higher.
These characteristics make the IPFS a perfect
place to store data, which can be referenced and time stamped with blockchain
technology.
IPFS and the Blockchain are a perfect match!
You can address large amounts of data with IPFS, and place the immutable,
permanent IPFS links into a blockchain transaction. This timestamps and secures
your content, without having to put the data on the chain itself.
This creates a sort of beneficial
relationship between the two technologies. Since blockchain technology is not
fit to store large amounts of data, the IPFS can be used by blockchain
applications that need a publicly accessible database. While the immutability
provided by miners and the transparency of the blockchain, make it the perfect
place to timestamp content and make it publically verifiable.
Certain big internet players have redundant
data centers across the globe, but this merely proves the point that the
internet has strayed from its mission.
IPFS’s vision is grand: it purports to
re-architect today’s internet, which is monopolized by platforms like Google,
YouTube and Facebook.
THESE BIG KOSHER PLAYERS CENSOR THE SOCIAL
MEDIA. IF YOU SAY ONLY 5.9 MILLION JEWS DIES, INSTEAD
OF SIX, THEY TAKE YOUR SITE DOWN.
The internet is conceptually broken.
Our content is stored on servers by hosting
and server companies (cloud hosts are merely clouding this fact). If the servers
of the hosting company in question go down – our content is also down.
Moreover, if your host decides to take down your content – they can do that.
Under the current model, our content /
resources / information / knowledge is inherently censorable, extinguishable,
and corruptible.
WIKIPEDIA PUBLISHED TERRIBLE LIES ABOUT
HINDUISM—AND OUR GOVT HAS DONE NOTHING ABOUT IT
The Turkish government has blocked access to
Wikipedia in April 2017 because Wikipedia wouldn’t take down an article that
claimed that Turkey was sponsoring Al Qaeda and ISIL. The ban is still active.
The government of China has blocked around one fifth of the world’s population
from accessing websites like BBC, YouTube, Facebook, Twitter, Amnesty
International and many, many others. It’s using what’s called “The Great
Firewall of China”.
IPFS’s core improvement over HTTP is that it
provides a means to retrieve content from a distributed network of storage
providers, using a hashing function of the file to point to where the content
is stored on the internet.
IPFS is working to reinvent the internet on
the protocol level. IPFS decentralizes storage
Any computer on the network can be a server.
Storage is decentralized and distributed. Since things / content are not
addressed by IPs, there is no inherent need for static IP addresses. This
eliminates the need for dedicated data centers, and reliance on hosting
providers. This means that content is addressed by its cryptographic hash.
A
piece of content is named by its content, not by the location of its server. If
we compare our strayed internet model to addressing a book by the physical
address of a library and the number of the shelf the book is on, IPFS goes back
to naming / addressing a book by its title.
Content-addressing (by way of hashes) ensures
data integrity, because if even one letter in any stored file changes, the hash
is completely different. This opens up the possibility of versioning content
similar to git commits. Reverting, transparency, and immutability are all
available with this model.
Content-addressing means that we can have
CDN-level distribution and efficacy of fetching content, because content can be
distributed on hundreds or thousands of nodes all over the internet in a
redundant way. This ensures we can still easily require the same content
regardless of where we are fetching it from – even if half the internet is
down.
In this system, circumventing things like the Turkish Wikipedia
censorship becomes child’s play. Users can easily require same content from
their local “swarm” of nodes inside Turkey. Any node on the IPFS network, once
it retrieves the content (like a website for viewing), can cache it and become
a trustable source of the same content.
In the existing internet model, if a piece of
content is moved somewhere else, all links to it need to be updated.
Content-addressing means that the same
content – hosted anywhere, or moved anywhere – is still accessible under the
same address. The HOW part is up to the protocol
One of the appealing features of IPFS is its
protocol versatility
Coupled with its DHT lookup scheme, this
allows for development of applications that are immune to censorship attempts
and able to “flow” under the radar. The implications of these two components
(decentralized architecture and protocol versatility) are big.
A distributed hash table (DHT) is a class of
a decentralized distributed system that provides a lookup service similar to a
hash table: (key, value) pairs are stored in a DHT, and any participating node
can efficiently retrieve the value associated with a given key.
Responsibility
for maintaining the mapping from keys to values is distributed among the nodes,
in such a way that a change in the set of participants causes a minimal amount
of disruption. This allows a DHT to scale to extremely large numbers of nodes
and to handle continual node arrivals, departures, and failures.
DHTs form an infrastructure that can be used
to build more complex services, such as anycast, cooperative Web caching,
distributed file systems, domain name services, instant messaging, multicast,
and also peer-to-peer file sharing and content distribution systems.
Notable
distributed networks that use DHTs include BitTorrent's distributed tracker,
the Coral Content Distribution Network, the Kad network, the Storm botnet, the
Tox instant messenger, Freenet and the YaCy search engine.
Hashgraph consensus algorithm is an entirely
new distributed ledger technology that is much more cost-effective (no
proof-of-work), 50,000 times the speed, safer (Byzantine), more efficient (no
stale blocks) and mathematically fairer than the blockchain.
This is the future of the internet and
decentralized technology.
The "hashgraph" is a data structure
which stores stores and updates information with an algorithm which allows a
distributed and decentralised community to reach consensus between
nodes/members in a fast (250,000 transactions per second) and secure (Strong
Form Byzantine Fault Tolerant) way with mathematically proven fairness in the
absolute ordering of transactions.
Leemon Baird is the innovator of the
hashgraph distributed consensus algorithm, and the Co-founder and CTO of
Swirlds Inc.. He co-founded Trio
Security and BlueWave Security which were both acquired.
Capt Ajit Vadakayil puts his money on Dr
Leemon Baird Baird Co-founder and CTO of Swirlds Inc. to create a system better than blockchain (
and its additional chrons asshole creating hardfork )
Unlike the blockchain, hashgraph is fast with
a high throughput (300,000+ transactions per second pre-sharding), fair
(mathematically proven fairness with consensus time stamping), and secure
(asynchronous byzantine fault tolerant).
These properties expand its use to complex
markets, auctions, crypto-currency micro payments, live games (even MMOs), and
much more.
There are five different approaches to
reaching distributed consensus. One is Proof-of-Work, which started with Bitcoin
(blockchain).
The second is a Leader-Based system like
PBFT, Raft, and Paxos.
Then, there is economy based, commonly
referred to as Proof-of-Stake, where we’re kind of gambling money on our votes
and hoping that we will come to a consensus in the same way that economies come
to a consensus, except that they don’t always.
Then, there are Voting-Based systems that go
back decades,-- very slow.
And now there’s hashgraph, which is virtual
voting, which means you get all those strong guarantees that we’ve had for
decades (with voting), but it’s incredibly efficient because we don’t actually
send any votes over the internet. Hashgraph gives us a full history of how we
talk to each other.
Hashgraph is a superior distributed ledger
technology system that eliminates the need for massive computation and
unsustainable energy consumption like those of Bitcoin and Ethereum. Most
importantly, it is able to reach a consensus.
It has mathematically proven fairness (via
consensus time stamping) meaning no individual can manipulate the order of the
transactions.
In the blockchain world, a miner can choose
the order for which transactions occur in a block, can delay orders by placing
them in future blocks, even stop them entirely from entering the system.
Consensus time stamping prevents an
individual from affecting the consensus order of transactions.
Once an event occurs, everyone knows about it
within a couple of minutes. Only the effects of the transaction are necessary
in storing, everything else can be discarded
This shrinks the amount of storage currently
needed (Bitcoin: 60GB) to a fraction of 1GB, allowing a smart phone to now act
as a node.
Improved Security: Asynchronous Byzantine
Fault Tolerant: No member can prevent the community from reaching a consensus,
nor can they change the consensus once it has been reached.
With Byzantine, a consensus can be reached,
whereas in the blockchain world, it is only a probability that increases over
time.
If no consensus is ever reached, conflicts
will always occur. This is why hard forks that result in alt coins, such as
Bitcoin Cash and Bitcoin Gold are occurring.
100% Efficient: No mined block ever becomes
stale.
In the blockchain, transactions are put into
containers (blocks) that form a single, long chain. If two miners create two
blocks at the same time, the community will eventually choose one and discard
the other.
In hashgraph, every container is used and
none are discarded.
Inexpensive: avoids proof-of-work (PoW),
meaning it does not have to waste computations to slow itself down, therefore
the expensive, custom hardware is no longer necessary.
In the blockchain, if new blocks arrive too
quickly they can be discarded. This is why Bitcoin is currently PoW, as this
artificially slows down the mining process — hence the expensive hardware
needed to mine.
With hashgraph, every member can create
transactions and containers whenever they want.
While Ethereum is looking at PoS with Casper,
our algorithm uses something called Virtual Voting — its a voting
system — without having to do the votes. Hashgraph uses a protocol called
“Gossip about Gossip” to achieve consensus. Gossip is a well known computer
science term, which can be defined as calling any random node and telling that
node everything you know, that it does not know.
In distributed ledger technology the
“baseline” or minimum bandwidth required is that the transactions go to every
node. Gossip about Gossip refers to attaching a small additional amount of
information to this Gossip, which contains the last person we talked to, hence,
we are gossiping about the information we gossiped. Using this information, we
can build the Hashgraph.
Once we have the Hashgraph, it is extremely easy to
know what a node would vote, because we know what each node knows, and when
they knew it. We now can use the data from the Hashgraph as an input to 30 year
old voting algorithms, and achieve consensus essentially for free.
These 30
year old voting algorithms have strong math proofs- they are Asynchronous
Byzantine Fault Tolerant which means we
know when we will achieve consensus, guaranteed, and our math proofs make no
assumptions about the speed of the internet, due to firewalls, ddos attacks,
viruses or botnets.
In addition, because of gossip about gossip, Hashgraph is
extremely fast, (250,000 transactions/sec), and we also get fair ordering and
time stamping on every event.”
Swirlds hashgraph provides unparalleled
performance compared to alternative platforms that can only process thousands
of transactions per second. The hashgraph can process 100,000's of transactions
per second, making it possible for CULedger to directly address a much broader
set of use cases.
Swirlds hashgraph is the only platform that
meets the requirements for fully distributed trust in a distributed ledger and
provides the highest level of security in the market by achieving all four of
the criteria for banking-grade security, including:
Immutability of Transaction History - No
single party can change the order of the transactions applied to the ledger.
DDoS (Distributed Denial of Service)
Resilience - No single party can disrupt the flow of transactions throughout
the ledger, making it DDoS resilient. Competing platforms are highly
susceptible to DDoS attacks.
Using competing platforms, if even a single member
of the network is compromised or malicious, then the attacker can direct a DDoS
attack against a single computer that disrupts the flow of transactions for the
entire network. This is not possible with hashgraph.
Fair Access - No single party can prevent the
flow of transactions into the ledger. Competing platforms put the power of
which transactions are accepted into the hands of a single party.
Fair Ordering - No single party can influence
the order of transactions that the network ultimately agrees on. Competing
platforms put the power of transaction order into the hands of a single party.
With hashgraph, timestamps on transactions are determined by the community as a
whole, not a single leader.
The hashgraph algorithm is resilient to DDoS
attacks and ensures mathematically proven fairness in the absolute ordering of
transactions.
Swirlds is a platform to build and run shared
worlds — fully distributed applications that harness the power of the cloud
without servers. Applications built on the Swirlds platform create trust in
peer-to-peer networks without a central server, leveraging the hashgraph
consensus algorithm to deliver high transaction throughput, low consensus latency,
and fairness in transaction order.
Rapidly gaining traction across a wide swath
of categories from gaming to online collaboration to financial services,
Swirlds is building the trust layer of the internet by enabling developers to
create fair, fast and secure applications.
AIYYOOOOOOOOO
IPPIDI NAAN PAKKAVAI ILLAI
BLOCKCHAIN-ULU ( OR IS IT BLACKCHAIN-UDU
) FOLKS IN TELUGULAND HAVE FALLED PHUTTT
ON THEIR FACES AT THE STARTING LINE EVEN BEFORE THE STARTING GUN WENT BAANG !
http://ajitvadakayil.blogspot.in/2017/10/blockchain-smart-contracts-part-8-capt.html
READ ABOUT HASHGRAPHS
PUT THIS COMMENT IN THE WEBSITES OF -
CM OF ANDHRA NAIDU
CM OF TELENGANA KCR
FINANCE MINISTER
PMO
PM MODI
LAW MINISTER
EDUCATION MINISTER
I&B MINISTER
ASK FOR AN ACK
capt ajit vadakayil
..
READ ABOUT HASHGRAPHS
PUT THIS COMMENT IN THE WEBSITES OF -
CM OF ANDHRA NAIDU
CM OF TELENGANA KCR
FINANCE MINISTER
PMO
PM MODI
LAW MINISTER
EDUCATION MINISTER
I&B MINISTER
ASK FOR AN ACK
capt ajit vadakayil
..
IN HASHGRAPH THERE AINT NO MINING !
Hashgraph does not require mining and is a
variation of Proof of Stake.
Proof of Stake (PoS) concept states that a
person can mine or validate block transactions according to how many coins he
or she holds. This means that the more Bitcoin or altcoin owned by a miner, the
more mining power he or she has.
Proof of work is a requirement to define an
expensive computer calculation, also called mining, that needs to be performed
in order to create a new group of trustless transactions (the so-called block)
on a distributed ledger called blockchain.
Proof of work is not only used by the bitcoin
blockchain but also by ethereum and many other blockchains.
Mining serves as two purposes:---
To verify the legitimacy of a transaction, or
avoiding the so-called double-spending;
To create new digital currencies by rewarding
miners for performing the previous task.
When you want to set a transaction this is
what happens behind the scenes:---
Transactions are bundled together into what
we call a block;
Miners verify that transactions within each
block are legitimate;
To do so, miners should solve a mathematical
puzzle known as proof-of-work problem;
A reward is given to the first miner who
solves each blocks problem;
Verified transactions are stored in the public
blockchain
Proof of stake is a different way to validate
transactions based and achieve the distributed consensus.
It is still an algorithm, and the purpose is
the same of the proof of work, but the process to reach the goal is quite
different.
All the network miners compete to be the
first to find a solution for the mathematical problem that concerns the
candidate block, a problem that cannot be solved in other ways than through
brute force so that essentially requires a huge number of attempts.
When a miner finally finds the right
solution, he announces it to the whole network at the same time, receiving a
cryptocurrency prize (the reward) provided by the protocol.
From a technical point of view, mining
process is an operation of inverse hashing: it determines a number (nonce), so
the cryptographic hash algorithm of block data results in less than a given
threshold.
This threshold, called difficulty, is what
determines the competitive nature of mining: more computing power is added to
the network, the higher this parameter increases, increasing also the average
number of calculations needed to create a new block.
This method also increases
the cost of the block creation, pushing miners to improve the efficiency of
their mining systems to maintain a positive economic balance.
This parameter update should occur approximately every 14 days, and a new block is generated every 10 minutes.
This parameter update should occur approximately every 14 days, and a new block is generated every 10 minutes.
Unlike the proof-of-Work, where the algorithm
rewards miners who solve mathematical problems with the goal of validating
transactions and creating new blocks, with the proof of stake, the creator of a
new block is chosen in a deterministic way, depending on its wealth, also
defined as stake.
No block reward
Also, all the digital currencies are
previously created in the beginning, and their number never changes.
This means that in the PoS system there is no
block reward, so, the miners take the transaction fees.
This is why, in fact, in this PoS system
miners are called forgers, instead.
Below: HEY MINER-- FUCK OFF !
ANY IDIOT CAN FIGURE OUT THAT BLOCKCHAIN IS A IMMATURE SYSTEM
Instead of some small subset of participants
being responsible for validating transactions and adding to the ledger (like
miners in blockchain), all nodes contribute.
Consequently, there is less need to incentivize through
fees. Transaction fees are therefore expected to be very small, thereby making
Hashgraph viable for micropayments.
A Blockchain lottery is used to award and
compensate a miner for packaging and publishing a block of transactions to the
community. One concern revolves around transaction packaging.
Because a miner
in Blockchain can exercise discretion in how transactions are assigned to and
sequenced within a block, this can significantly alter the impact of
settlement.
Consider a situation where several people bid on the last share of
stock and these bids all arrive at the same time and are for the same price.
The actions of the miner in Blockchain will influence the outcome of transactions. The techniques used by the miner may or may not be fair.
The actions of the miner in Blockchain will influence the outcome of transactions. The techniques used by the miner may or may not be fair.
With a hashgraph, no individual can delay or
manipulate the order of transactions. In a hashgraph, transactions are ordered
based on when the majority of the active community receive them.
Consensus timestamping of transactions occurs
when the majority of the community (as defined by the community) agrees to the
validity of the block and its transactions.
This approach eliminates the
incentive to either bribe miners or delay a transaction from entering the
system.
Since the definition of fairness can vary (first in, highest bid, status, randomness, … or some combination of these) it is critical that the community select and contractually adhere to a transaction processing model that best addresses their needs.
Since the definition of fairness can vary (first in, highest bid, status, randomness, … or some combination of these) it is critical that the community select and contractually adhere to a transaction processing model that best addresses their needs.
The miner and consensus-driven approach of
Blockchain mean that the time it takes for consensus is measured in minutes
based. Bitcoin has a 1 MB per block limit and a settlement time that averages
10 minutes.
This timing has everything to do with risk avoidance and is
designed to give participants time to validate the transactions in the block.
The more confirmations associated with a transaction the lower the probability
of fraud.
Hashgraph approach allows
every community member to add block(s) at any time avoiding the Blockchain
lottery.
Every time a block is added, the community is made aware of the addition and once the majority of the community confirms receipt of the block and its contents, its order and addition to the ledger is finalized.
This approach means that there is no governor or limit to how fast transactions can be processed.
Every time a block is added, the community is made aware of the addition and once the majority of the community confirms receipt of the block and its contents, its order and addition to the ledger is finalized.
This approach means that there is no governor or limit to how fast transactions can be processed.
This way, if each participant has enough bandwidth to download 3,000
transactions per second, then this is the speed of the system. Hashgraph
consensus times are dependent upon the time it takes the majority of the
community to validate the transactions in the block.
Hashgraph approach as Byzantine, meaning that
no single member of the community can stop the community from reaching
consensus (subject to the rules established by the community for reaching
consensus).
The hashgraph approach also looks to be more efficient since there
are no calculations necessary to slow down how blocks are mined or work that is
discarded. This will ultimately make the hashgraph approach less expensive to
implement.
The Hashgraph Network provides a distributed
ledger implementation that has the following properties:--
no user registrations or "accounts"
required
no root account or central authority
no native currency
no genesis ledger
fairness
byzantine
efficient (no mining)
ACID
In computer science, ACID (Atomicity, Consistency,
Isolation, Durability) is a set of properties of database transactions intended
to guarantee validity even in the event of errors, power failures, etc.
In the
context of databases, a sequence of database operations that satisfies the ACID
properties and, thus, can be perceived as single logical operation on the data,
is called a transaction.
For example, a transfer of funds from one bank account
to another, even involving multiple changes such as debiting one account and
crediting another, is a single transaction.
How is Hashgraph different?
There are five different approaches to
reaching distributed consensus. Firstly we have Proof-of-Work, which started
with Bitcoin.
The second is leader-based systems like PBFT, Raft, and Paxos.
Then there is economy-based, commonly referred to as Proof-of-Stake, where
forgers stake cryptocurrency on votes in order to reach consensus.
Then,
there’s voting-based which are too slow to be used in real systems.
Finally
there’s Hashgraph, which uses virtual voting and is incredibly efficient
because it does not actually send any votes over the internet.
Below: Meet the elephant-ULU of blockchain-UDU
The Achilles Heel of permissioned networks is
ignored …
The most important security mechanism used in
public networks is removed in permissioned networks, to improve performance.
Proof-of-Work is replaced with trust in network members. But what are members
trusted to do or not to do?
What is the
nature of that trust?
The answer is disturbing.
In a DDoS attack, an attacker can flood a
computer with enough messages to stop that computer from communicating. If the
attacker has enough resources to flood all the computers, they can shut down
the network.
But if they can only shut
down a few computers, the network can keep running. The challenge for current
permissioned systems is that they use Leaders, which allows DDoS attacks to
succeed even when only a single computer is attacked.
In order to prevent DDoS across a
permissioned network, each member must trust every other member to protect
their computers.
If even a single member
of the network is compromised and can communicate with outside attackers,
transaction flow for the entire network can be shut down by merely attacking
one computer at a time.
To understand why this is the case, it’s
important to understand how pre-Bitcoin consensus algorithms work.
Leader-based algorithms such as Paxos, RAFT,
PBFT and variants have existed for decades, and require a Leader or
Coordinator.
All nodes send all transactions to the Leader, and the Leader has
responsibility for putting transactions in order and sending them to all nodes.
Conventional databases can use these algorithms for ensuring consistency across
all database instances.
Non-PoW blockchain algorithms invariably have
a Leader. For example, members of the network might take turns publishing
blocks of transactions. Because an attacker can predict who will next publish a
block, the attacker can DDoS the appropriate member.
Voting-based consensus algorithms enable a
community to decide on a yes / no question, which can be extended to put all
transactions in order.
But even for a single yes / no question, there can be
many rounds of voting, and in each round every peer sends a vote to all other
peers, and perhaps even a receipt on each vote received.
Voting-based systems
don’t require a Leader, and as a result are resilient to DDoS attacks. However,
voting systems have been around for decades, and few in the industry use them
because of their gross inefficiencies in bandwidth.
Hashgraph-based consensus combines
voting-based consensus algorithms with virtual voting, making it possible to
have the benefits of voting-based algorithms without the need to send votes
over the network.
The result is
exceptional performance and DDoS resilience, without the need for inefficient
and costly Proof-of-Work.
Today the most prominent platforms for
creating private, or permissioned, distributed consensus networks primarily use
Leader-based algorithms.
For example, according to the official documentation,
R3 Corda uses RAFT, and HyperLedger Fabric uses PBFT.
As a result, each member
must trust every other member to prevent malicious insider threats and malware
infections that enable an attacker to DDoS the Leader.
The good news is that both of these
organizations have made clear that the currently used consensus algorithm is a
pluggable component of their architecture.
Clearly this decision was made in
anticipation of a new generation of algorithms that will, for the first time,
enable true ‘bank-grade’ security.
Until then, it will be hard to ignore the
elephant in the room.
Hashgraph is a data structure and consensus
algorithm that is faster, fairer, and more secure than blockchain.
Hashgraph uses two special techniques:--
(1)
Gossip about Gossip and
(2) Virtual Voting to achieve fast, fair and
secure consensus.
Gossip is a well-known computer science term,
which can be defined as calling any random node and telling that node
everything you know, that it does not know
A gossip protocol is a style of computer-to-computer
communication protocol inspired by the form of gossip seen in social networks..
Modern distributed systems often use gossip protocols to solve problems that
might be difficult to solve in other ways, either because the underlying network
has an inconvenient structure, is extremely large, or because gossip solutions
are the most efficient ones available.
The term epidemic protocol is sometimes
used as a synonym for a gossip protocol, because gossip spreads information in
a manner similar to the spread of a virus in a biological community.
Computer
systems typically implement this type of protocol with a form of random
"peer selection": with a given frequency, each machine picks another
machine at random and shares any hot rumors.
A gossip protocol is one that satisfies the
following conditions:--
The core of the protocol involves periodic,
pairwise, inter-process interactions.
The information exchanged during these
interactions is of bounded size.
When agents interact, the state of at least
one agent changes to reflect the state of the other.--
Reliable communication is not assumed.
The frequency of the interactions is low
compared to typical message latencies so that the protocol costs are
negligible.
There is some form of randomness in the peer
selection. Peers might be selected from the full set of nodes or from a smaller
set of neighbors.
Due to the replication there is an implicit
redundancy of the delivered information.
In distributed ledger technology, the
“baseline” or minimum bandwidth required is that the transactions go to every
node.
A gossip protocol can achieve this transfer of information / syncing
process exponentially fast. Gossip about Gossip refers to attaching a small
additional amount of information to this Gossip / transaction payload, which
are two hashes containing the last two people talked to (hence, gossiping about
the information gossiped).
Using this information, a Hashgraph can be built and
constantly updated as more information is gossiped, on each node.
Hashgraph consensus algorithm, is proposed
for replicated state machines with guaranteed Byzantine fault tolerance.
It
achieves fairness, in the sense that it is difficult for an attacker to
manipulate which of two transactions will be chosen to be first in the
consensus order. It has complete asynchrony, no leaders, no round robin, no
proof-of-work, eventual consensus with probability one, and high speed in the
absence of faults.
It is based on a gossip protocol, in which the participants
don’t just gossip about transactions. They gossip about gossip. They jointly
build a hashgraph reflecting all of the gossip events. This allows Byzantine
agreement to be achieved through virtual voting.
Byzantine fault tolerant protocols are
algorithms that are robust to arbitrary types of failures in distributed
algorithms. With the advent and popularity of the Internet, there is a need to
develop algorithms that do not require any centralized control that have some
guarantee of always working correctly.
The Byzantine agreement protocol is an
essential part of this task
Nakamoto Consensus, the set of rules that
govern Bitcoin and other systems, has been to first solution to the Byzantine
generals problem applied to peer-to-peer networks open to anonymous nodes.
Unlike the other systems, hashgraph is proven
to be fully asynchronous byzantine. This means it makes no assumptions about
how fast messages are passed over the internet, making it resilient against
DDoS attacks, botnets, and firewalls.
Hashgraph is mathematically guaranteed to
reach consensus and be secure as long as less than one-third of participants
are malicious (which is something that must always be assumed for DLT).
In
Bitcoin, there is never a moment in time where you know that you have consensus
and you’ll never be wrong. All that happens is that you become more confident
over time, but it’s not byzantine.
Guaranteed mathematically – that’s where the
byzantine fault tolerance purely asynchronous all comes in. You do this with
zero communication. You get it for free and in a fraction of a second. That’s
hashgraph.
Swirlds hashgraph is the only platform that
meets the requirements for fully distributed trust in a distributed ledger and
provides the highest level of security in the market by achieving all four of
the criteria for banking-grade security, including:
Immutability of Transaction History – No
single party can change the order of the transactions applied to the ledger.
DDoS (Distributed Denial of Service) Resilience – No single party can disrupt the flow of transactions throughout
the ledger, making it DDoS resilient. Competing platforms are highly
susceptible to DDoS attacks.
Using
competing platforms, if even a single member of the network is compromised or
malicious, then the attacker can direct a DDoS attack against a single computer
that disrupts the flow of transactions for the entire network. This is not possible with hashgraph.
Fair Access – No single party can prevent the
flow of transactions into the ledger. Competing platforms put the power of
which transactions are accepted into the hands of a single party.
Fair Ordering – No single party can influence
the order of transactions that the network ultimately agrees on. Competing
platforms put the power of transaction order into the hands of a single
party.
With hashgraph, timestamps on
transactions are determined by the community as a whole, not a single leader.
The hashgraph algorithm is resilient to DDoS
attacks and ensures mathematically proven fairness in the absolute ordering of
transactions. A Distributed Denial of
Service (DDoS) attack is an attempt to make an online service unavailable by
overwhelming it with traffic from multiple sources.
In computing, a
denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator
seeks to make a machine or network resource unavailable to its intended users
by temporarily or indefinitely disrupting services of a host connected to the
Internet.
Denial of service is typically accomplished by flooding the targeted
machine or resource with superfluous requests in an attempt to overload systems
and prevent some or all legitimate requests from being fulfilled
In a
distributed denial-of-service attack (DDoS attack), the incoming traffic
flooding the victim originates from many different sources. This effectively
makes it impossible to stop the attack simply by blocking a single source.
A DoS or DDoS attack is analogous to a group
of people crowding the entry door or gate to a shop or business, and not
letting legitimate parties enter into the shop or business, disrupting normal
operations.
Criminal perpetrators of DoS attacks often
target sites or services hosted on high-profile web servers such as banks or
credit card payment gateways. Revenge, blackmail and activism can motivate these
attacks.
DDoS attacks have been carried out by diverse
threat actors, ranging from individual criminal hackers to organized crime
rings and government agencies. In certain situations, often ones related to
poor coding, missing patches or generally unstable systems, even legitimate
requests to target systems can result in DDoS-like results.
In a typical DDoS attack, the assailant
begins by exploiting a vulnerability in one computer system and making it the
DDoS master. The attack master system identifies other vulnerable systems and
gains control over them by either infecting the systems with malware or through
bypassing the authentication controls (i.e., guessing the default password on a
widely used system or device).
A computer or networked device under the
control of an intruder is known as a zombie, or bot. The attacker creates what
is called a command-and-control server to command the network of bots, also
called a botnet.
The person in control of a botnet is sometimes referred to as
the botmaster (that term has also historically been used to refer to the first
system "recruited" into a botnet because it is used to control the
spread and activity of other systems in the botnet).
Botnets can be comprised of almost any number
of bots; botnets with tens or hundreds of thousands of nodes have become
increasingly common, and there may not be an upper limit to their size.
Once
the botnet is assembled, the attacker can use the traffic generated by the
compromised devices to flood the target domain and knock it offline
There are three types of DDoS attacks.
Network-centric or volumetric attacks overload a targeted resource by consuming
available bandwidth with packet floods.
Protocol attacks target network layer
or transport layer protocols using flaws in the protocols to overwhelm targeted
resources. And application layer attacks overload application services or
databases with a high volume of application calls. The inundation of packets at
the target causes a denial of service.
"Gossip - information spreads by each
member repeatedly choosing another member at random, and telling them all they
know"
"Hashgraph - a data structure that
records who gossiped to whom, and in what order. "
Gossip about gossip - the hashgraph is spread
through the gossip protocol. The information being gossiped is the history of
the gossip itself, so it is “gossip about gossip”. This uses very little
bandwidth overhead beyond simply gossiping the transactions alone. "
"Virtual voting - every member has a
copy of the hashgraph, so A can calculate what vote B would have sent
him, if they had been running a traditional Byzantine agreement protocol that
involved sending votes.
So B doesn’t need to actually his the vote. Every
member can reach Byzantine agreement on any number of decisions, without a
single vote ever being sent."
Bitcoin security is based on economic
assumptions but is extremely very inefficient. In fact, Bitcoin tends to
concentrate power away from it's users and into cartels which can be considered
a systemic risk.
Proof of Stake has similar risks but the
difference is at least with Proof of Stake you get the efficiency gains in
exchange for the same risk of concentration of power around cartels.
Once the Hashgraph is built, it is extremely
easy to know what a node would vote, because we know what each node knows, and
when they knew it.
We now can use this data as an input to a 30 year old voting
algorithm (which have strong security guarantees, maths proofs of being
Asynchronous Byzantine Fault Tolerant but typically lack the speed necessary
for real world implementation), and know which transactions have reached
consensus quickly.
The result of using this methodology is that
we get the benefit of 30 year old voting algorithms which have have strong math
proofs of being Asynchronous Byzantine Fault Tolerant (meaning that we know
when we will achieve consensus, guaranteed, and our math proofs make no
assumptions about the speed of the internet, due to firewalls, ddos attacks,
viruses or botnets), speed (due to use of a gossip protocol) and fair ordering
and time stamping on every event.
Hashgraph does not suffer wasteful
computational cycles of blocks to arrive at consensus (and hence the power
savings).
Hashgraph is the only bank-grade consensus
algorithm as a result of the following properties:--
Mathematical proof of asynchronous Byzantine
fault tolerance;
Resilience to DDoS attacks, network
partitions, sybil attacks and firewall/virus attacks; and
Mathematical proof of fairness of ordering,
access, and timestamps.
Hashgraph is not currently available on a
public network / ledger so there is no cryptocurrency at this time. They will do it sooner than later
Hashgraph is currently only available on a
private network so its patents allow for market advantage in enterprise /
commercial applications. This is not designed to stifle creativity or expansion
of the emerging ecosystem, but to protect technological innovations that took
years to develop.
If you want to use Hashgraph on a private
network, you can apply for an enterprise / commercial license by contacting
Swirlds.
Hashgraph is the technology. Swirlds is the
organization responsible for handling the licensing of Hashgraph.
Hashgraph reached 250,000+ transactions per
second (TPS) in a single shard, with geo-distributed nodes, on mid-range Amazon
AWS servers. Database partitioning would result in a much higher throughput.
This number comes from our internal testing on AWS in early 2017.
The security risks specific to DLTs come from
both internal and external attacks. An internal threat can include a computer
in the network that is infected with a virus or worm other malware, or is run
by a malicious party, or honest corporation that has a malicious insider with
access to the computer.
An external threat can include a Distributed
Denial of Service (DDoS) attack, where the attacker floods one or more
computers with enough messages to temporarily shut it down. Another external attack
is if an adversary owns a firewall surrounding some of the nodes in the
network, which it can use to block or delay messages.
A
consensus algorithm is characterized as BFT – ( Byzantine Fault Tolerance
)-- if it guarantees a moment in time
where all participants reach consensus, know that consensus has been reached,
and they are never wrong.
This can be contrasted with consensus algorithms
based on PoW, where participants slowly become more and more confident that
consensus is near, but may still not be correct.
There are different levels of
BFT, depending on the sorts of assumptions made about the network and
transmission of messages. The strongest type of BFT is asynchronous BFT.
Hashgraph is unique in supporting highest degree of BFT while still being very
efficient.
When a system is asynchronous BFT, it allows
for malicious actors controlling the network, deleting or slowing down messages
of their choosing. The only assumption made is that less than ⅓ are attackers,
and some messages eventually get transmitted over the internet.
Some systems
are partially asynchronous, which are secure only if the attackers do not have
too much power and do not manipulate the timing of messages too much.
For
instance, a partially asynchronous system could prove Byzantine under the
assumption that messages get passed over the internet in ten seconds. This
assumption ignores the reality of botnets, distributed denial of service
attacks, and malicious firewalls.
If unable to meet the criteria of
asynchronous BFT, it is preferable that they be asynchronous
less-than-Byzantine, rather than less-than-asynchronous Byzantine. In other
words, they should prove they are somewhat secure in the real world instead of
proving they are very secure in a fantasy world.
A Sybil attack refers to an attempt to
compromise a network through the creation of large numbers of spurious
identities – these are directed to act in collusion to inappropriately impact
the network.
Sybil attacks are a particular concern for public DLTs in which no
special permissions are required to become a node. Hashgraph inherently
protects against Sybil attacks due to the nature of the core consensus
algorithm which provides a mathematical guarantee that Sybil attacks cannot
succeed as long as less than one-third of the population is dishonest.
There is
a mathematical proof that one-third is the best that can be achieved by any
DLT.
A Distributed Denial of Service (DDoS) attack
occurs when it is possible to disrupt the flow of transactions for the entire
network by targeting a single or a few computers. Different DLTs vary in their
vulnerability to DDoS.
Leader-based systems give special permissions to a
particular node and are highly susceptible because the current leader is a
bottleneck and is vulnerable to being targeted in the DDoS. Even if the role of
the leader rotates amongst nodes, other nodes necessarily know the current
leader, and so could direct a DDoS.
PoW systems are resilient to DDoS because
it’s difficult to predict which miner will solve the inverse hash and publish a
block. Consequently, the attacker would not know which miner should be
targeted.
Hashgraph doesn’t use PoW, but neither does it have a Leader. So Hashgraph provides DDoS resilience without the inefficiency and cost of PoW.
Hashgraph doesn’t use PoW, but neither does it have a Leader. So Hashgraph provides DDoS resilience without the inefficiency and cost of PoW.
Fairness refers to the ability of DLTs to
prevent the ordering of transactions from being unduly manipulated.
Hashgraph
is fair in that it serializes all transactions with cryptographic timestamping,
unlike blockchains where miners determine the order in which transactions are
placed within each block. In certain use cases, the transaction order is
important.
Consider for instance two different people purchasing shares in a
stock – the first order to go through will likely get a cheaper price. Hashgraph
orders transactions according to the median timestamp of when the population of nodes received them –
thereby ensuring they are recorded fairly.
Hashgraph Distributed Consensus Platform
Enables Developers to Build Serverless, Secure Apps in the Cloud.. Swirlds is a
software platform designed to build fully-distributed applications that harness
the power of the cloud without servers.
Now you can develop applications with
fairness in decision making, speed, trust and reliability, at a fraction of the
cost of traditional server-based platforms.
Java is a general purpose programming
language with a large open source ecosystem and resources for developer
support.
There are also advantageous security measures in the Java development
environment, such as sandboxing, that
will allow the platform in the future to run untrusted applications, while
protecting the user and their hard drive from those applications.
In addition to Java, they want the option for
developers who would like to develop in other programming languages, such as
Python or JavaScript. This is part of the Hashgraph development roadmap.
Hashgraphs technology is cost-effective, as it doesn’t
require proof of work like Bitcoin does. It also is quicker, with a transaction
throughput of 50,000 times that of most blockchains.
The mathematically proven
fairness of Hashgraph means that no individual can manipulate the order of
transactions. Miners prioritize
transactions based on network fees in the cryptocurrency world.
In Bitcoin, transaction fees are used to
incentivize miners to confirm transactions by including them in a block which
is then appended to the previous blocks, creating a ‘block chain’.
Hashgraph utilizes virtual voting, which
doesn’t require actual votes. Instead, hashgraph uses Gossip to determine how
nodes would vote. In this system, every node will know what other nodes know
and when they knew it.
The blockchain model has five key problems in
its implementation. These include the issues of scalability, processing power
and time, storage, a skills gap, and legal and compliance issues.
All of the nodes that maintain the blockchain
do exactly the same thing. Here is what millions of computers do:--
They verify the same transactions in
accordance with the same rules and perform identical operations.
They record the same thing into a blockchain
(if they were fortunate enough to be allowed to do so).
They store the entire history, which is the
same for all of them, for all time.
There is no paralleling, no synergy, and no mutual assistance. There is only instant, millionfold duplication.
It’s the opposite of efficient and is IMMATURE
If each network node does the same thing,
then obviously, the bandwidth of the entire network is the same as the
bandwidth of one network node. But do you know exactly what that is?
The Bitcoin network is capable of processing a maximum of seven transactions per second — for the millions of users worldwide.
The Bitcoin network is capable of processing a maximum of seven transactions per second — for the millions of users worldwide.
Aside from that, Bitcoin-blockchain
transactions are recorded only once every 10 minutes. To increase payments
security, it is standard practice to wait 50 minutes more after each new record
appears because the records regularly roll back
You have heard of miners and giant mining farms built
next to power stations?
What do they actually do?
They burn a lot of electricity for no purpose at all for 10 minutes, “shaking” blocks until they become “beautiful” and thus eligible to be added to a blockchain..
What do they actually do?
They burn a lot of electricity for no purpose at all for 10 minutes, “shaking” blocks until they become “beautiful” and thus eligible to be added to a blockchain..
The
electricity consumed to achieve that is the same as the amount a city with a
population of 100,000 people would use.
APCO Modi want to use wind and solar power-- TEE HEEEEEE .
APCO Modi want to use wind and solar power-- TEE HEEEEEE .
And don’t forget the expensive custom
mining equipment, which is almost useless for any purpose other than mining
bitcoins.
Blockchain optimists like to say that miners
maintain the stability and security of the Bitcoin network. This is true, but
the problem is that miners are protecting Bitcoin from other miners.
If only one-thousandth of the current number
of miners existed, and thus one-thousandth of the electric power was consumed,
then Bitcoin would be just as good as it is now.
It would still produce one block per 10 minutes, process the same number of transactions, and operate at exactly the same speed.
It would still produce one block per 10 minutes, process the same number of transactions, and operate at exactly the same speed.
The risk of a 51% attack applies to blockchain
solutions as well.
If someone controls more than half of the computing power currently being used for mining, then that person can surreptitiously write an alternative financial history.
If someone controls more than half of the computing power currently being used for mining, then that person can surreptitiously write an alternative financial history.
That version then becomes reality. Thus, it
becomes possible to spend the same money more than once. Traditional payment
systems are immune to such an attack.
Bitcoin has become a prisoner of its own
ideology.
“Excessive” miners cannot stop mining; that would dramatically increase the probability of a single person controlling more than half of the remaining computing power.
“Excessive” miners cannot stop mining; that would dramatically increase the probability of a single person controlling more than half of the remaining computing power.
Mining is still lucrative, and the network is still
stable.
However, if the situation changes (if, for example, the price of electricity increases), the network may come across a huge number of “double spending” incidents.
However, if the situation changes (if, for example, the price of electricity increases), the network may come across a huge number of “double spending” incidents.
All “independent” miners are merged into
pools (technically, they’re cartels).
They have to merge on the assumption that it’s better to have a small but stable income than a huge payoff maybe every thousand years
They have to merge on the assumption that it’s better to have a small but stable income than a huge payoff maybe every thousand years
Blockchain is open, and everyone sees
everything.
Thus, blockchain has no real anonymity.
It offers pseudonymity instead.
Putting aside the significant issues that crooked users have with that, here’s why pseudonymity is bad for honest users.
A simple example: I am transferring a few bitcoins to my mother. Here’s what she can learn:
Thus, blockchain has no real anonymity.
It offers pseudonymity instead.
Putting aside the significant issues that crooked users have with that, here’s why pseudonymity is bad for honest users.
A simple example: I am transferring a few bitcoins to my mother. Here’s what she can learn:
How much money I have at any given time.
How much I spent and, more important, what I
spent it on. She could also find out what I bought, what I gambled on, and what
politician I supported “anonymously.”
Alternatively, if I paid back my friend for
some lemonade, I would thus let him know everything about my finances. That’s
hardly a trifling matter:
Would you reveal the financial history of your credit card to everyone you knew?
Keep in mind that this would include not only past but also future transactions.
Would you reveal the financial history of your credit card to everyone you knew?
Keep in mind that this would include not only past but also future transactions.
Some disclosure may be tolerable for
individuals, but it is deadly for companies.
All of their contracting parties, sales, customers, account amounts, and every other little, petty detail would all become public.
Financial transparency is perhaps one of the largest disadvantages of using Bitcoin.
All of their contracting parties, sales, customers, account amounts, and every other little, petty detail would all become public.
Financial transparency is perhaps one of the largest disadvantages of using Bitcoin.
So so so
if someone tells you that the invention of the blockchain-ULU ( or is it
blockchin-UDU ) can be compared with the
invention of the Internet in terms of importance— tell him BALLS !
If a blockchain is not a robust network with
a widely distributed grid of nodes, it becomes more difficult to reap the full
benefit.
If a blockchain is used as a database, the information going into the database needs to be of high quality. The data stored on a blockchain is not inherently trustworthy, so events need to be recorded accurately in the first place.
If a blockchain is used as a database, the information going into the database needs to be of high quality. The data stored on a blockchain is not inherently trustworthy, so events need to be recorded accurately in the first place.
The phrase 'garbage in, garbage out' holds
true in a blockchain system of record, just as with a centralized database.
There is one notable security flaw in bitcoin and other blockchains: if more than half of the computers working as nodes to service the network tell a lie, the lie will become the truth.
This is called a '51% attack' and was highlighted by Satoshi Nakamoto when he launched bitcoin. For this reason, bitcoin mining pools are monitored closely by the community, ensuring no one unknowingly gains such network influence.
There is one notable security flaw in bitcoin and other blockchains: if more than half of the computers working as nodes to service the network tell a lie, the lie will become the truth.
This is called a '51% attack' and was highlighted by Satoshi Nakamoto when he launched bitcoin. For this reason, bitcoin mining pools are monitored closely by the community, ensuring no one unknowingly gains such network influence.
A smart contract is a piece of code that is
stored on an blockchain, triggered by blockchain transactions and which reads
and writes data in that blockchain's database. That's it !
A smart contract is just a fancy name for
code that runs on a blockchain, and interacts with that blockchain's state.
The problem with smart contracts isn’t just
that people’s expectations are overblown, it's that these expectations are
leading many to spend time and money on ideas that cannot possibly be
implemented.
Often, the first use case proposed is a smart
contract that changes its behavior in response to some external event. For
example, an agricultural insurance policy which pays out conditionally based on
the quantity of rainfall in a given month.
The imagined process goes something like
this: The smart contract waits until the predetermined time, retrieves the
weather report from an external service and behaves appropriately based on the
data received.
This all sounds simple enough, but it’s also
impossible. Why? Because a blockchain is a consensus-based system, meaning that
it only works if every node reaches an identical state after processing every
transaction and block.
Everything that takes place on a blockchain
must be completely deterministic, with no possible way for differences to creep
in.
The moment that two honest nodes disagree about the chain's state, the entire system becomes worthless.
The moment that two honest nodes disagree about the chain's state, the entire system becomes worthless.
Now, recall that smart contracts are executed
independently by every node on a chain. Therefore, if a smart contract
retrieves some information from an external source, this retrieval is performed
repeatedly and separately by each node.
But because this source is outside of the blockchain, there is no guarantee that every node will receive the same answer.
Perhaps the source will change its response in the time between requests from different nodes, or perhaps it will become temporarily unavailable. Either way, consensus is broken and the entire blockchain dies.
But because this source is outside of the blockchain, there is no guarantee that every node will receive the same answer.
Perhaps the source will change its response in the time between requests from different nodes, or perhaps it will become temporarily unavailable. Either way, consensus is broken and the entire blockchain dies.
So, what’s the workaround? Actually, it’s
rather simple. Instead of a smart contract initiating the retrieval of external
data, one or more trusted parties ("oracles") creates a transaction
which embeds that data in the chain. Every node will have an identical copy of
this data, so it can be safely used in a smart contract computation.
In other words, as I have written before--an
oracle pushes the data onto the blockchain rather than a smart contract pulling
it in.
When it comes to smart contracts causing
events in the outside world, a similar problem appears. For example, many like
the idea of a smart contract which calls a bank’s API in order to transfer
money. But if every node is independently executing the code in the chain, who
is responsible for calling this API?
If the answer is just one node, what happens
if that particular node malfunctions, deliberately or not? And if the answer is
every node, can we trust every node with that API's password? And do we really
want the API called hundreds of times?
Even worse, if the smart contract needs to know whether the API call was successful, we're right back to the problem of depending on external data.
Even worse, if the smart contract needs to know whether the API call was successful, we're right back to the problem of depending on external data.
As before, a simple workaround is available.
Instead of the smart contract calling an external API, we use a trusted service
which monitors the blockchain’s state and performs certain actions in response.
For example, a bank could proactively watch a blockchain and perform money transfers which mirror the on-chain transactions. This presents no risk to the blockchain’s consensus because the chain plays an entirely passive role.
For example, a bank could proactively watch a blockchain and perform money transfers which mirror the on-chain transactions. This presents no risk to the blockchain’s consensus because the chain plays an entirely passive role.
Looking at these two workarounds, we can make
some observations.
First, they both require a trusted entity to
manage the interactions between the blockchain and the outside world. While
this is technically possible, it undermines the goal of a decentralized system.
Second, the mechanisms used in these
workarounds are straightforward examples of reading and writing a database. An
oracle which provides external information is simply writing that information
into the chain.
And a service which mirrors the blockchain’s state in the real world is doing nothing more than reading from that chain. In other words, any interaction between a blockchain and the outside world is restricted to regular database operations.
And a service which mirrors the blockchain’s state in the real world is doing nothing more than reading from that chain. In other words, any interaction between a blockchain and the outside world is restricted to regular database operations.
Now—about using a smart contract to automate
the payment of coupons for a so-called "smart bond". The idea is for
the smart contract code to automatically initiate the payments at the
appropriate times, avoiding manual processes and guaranteeing that the issuer
cannot default.
Of course, in order for this to work, the
funds used to make the payments must live inside the blockchain as well,
otherwise a smart contract could not possibly guarantee their payment.
Recall that a blockchain is just a database,
in this case a financial ledger containing the issued bond and some cash. So,
when we talk about coupon payments, what we’re actually talking about are
database operations which take place automatically at an agreed time.
While this automation is technically
feasible, it suffers from a financial difficulty. If the funds used for coupon
payments are controlled by the bond's smart contract, then those payments can
indeed be guaranteed.
But this also means those funds cannot be used by the bond issuer for anything else.
And if those funds aren’t under the control of the smart contract, then there is no way in which payment can be guaranteed.
But this also means those funds cannot be used by the bond issuer for anything else.
And if those funds aren’t under the control of the smart contract, then there is no way in which payment can be guaranteed.
In other words, a smart bond is either
pointless for the issuer, or pointless for the investor. And if you think about
it, this is a completely obvious outcome.
From an investor’s perspective, the whole point of a bond is its attractive rate of return, at the cost of some risk of default. And for the issuer, a bond's purpose is to raise funds for a productive but somewhat risky activity, such as building a new factory.
There is no way for the bond issuer to make
use of the funds raised, while simultaneously guaranteeing that the investor
will be repaid. It should not come as a surprise that the connection between
risk and return is not a problem that blockchains can solve.
The biggest challenge in deploying
blockchains is the radical transparency which they provide.
For example, if 10 banks set up a blockchain
together, and two conduct a bilateral transaction, this will be immediately
visible to the other eight.
While there are various strategies for mitigating this problem, none beat the simplicity and efficiency of a centralized database in which a trusted administrator has full control over who can see what.
While there are various strategies for mitigating this problem, none beat the simplicity and efficiency of a centralized database in which a trusted administrator has full control over who can see what.
Some people think that smart contracts can
solve this problem. They start with the fact that each smart contract contains
its own miniature database, over which it has full control.
All read and write operations on this database are mediated by the contract’s code, making it impossible for one contract to read another’s data directly. (This tight coupling between data and code is called encapsulation, and is the foundation of the popular object-oriented programming paradigm).
All read and write operations on this database are mediated by the contract’s code, making it impossible for one contract to read another’s data directly. (This tight coupling between data and code is called encapsulation, and is the foundation of the popular object-oriented programming paradigm).
So, if one smart contract can’t access
another’s data, have we solved the problem of blockchain confidentiality? Does
it make sense to talk of hiding information in a smart contract? Unfortunately,
the answer is no.
Because even if one smart contract can’t read
another’s data, that data is still stored on every single node in the chain.
For each blockchain participant, it’s in the memory or disk of a system which that participant completely controls.
And there’s nothing to stop them reading the information from their own system, if and when they choose to do so.
For each blockchain participant, it’s in the memory or disk of a system which that participant completely controls.
And there’s nothing to stop them reading the information from their own system, if and when they choose to do so.
Hiding data in a smart contract is about as
secure as hiding it in the HTML code of a web page.
Sure, regular web users won't see it, because it's not displayed in their browser window.
But all it takes is for a web browser to add a ‘View Source’ function (as they all have), and the information becomes universally visible.
Sure, regular web users won't see it, because it's not displayed in their browser window.
But all it takes is for a web browser to add a ‘View Source’ function (as they all have), and the information becomes universally visible.
Similarly, for data hidden in smart
contracts, all it takes is for someone to modify their blockchain software to
display the contract’s full state, and all semblance of secrecy is lost.
A half wit programmer could do that in an
hour or so.
The smart contract for a financial ledger
performs the same three tasks as the administrator of a centralized database:
checking for sufficient funds, deducting from one account and adding to
another.
Both of these paradigms are effective, and
each has its advantages and disadvantages. To summarize, bitcoin-style
transaction constraints provide superior concurrency and performance, while
Ethereum-style smart contracts offer greater flexibility.
So to return to the question of what smart
contracts are for: Smart contracts are for blockchain use cases which can’t be
implemented with transaction constraints.
Given this criterion for using smart
contracts, I’m yet to see a strong use case for permissioned blockchains which
qualifies.
In 2016, the Decentralized Autonomous
Organization (DAO) announced that a hacker had exploited a vulnerability in
Ethereum, a blockchain platform utilized by the group. The total loss to the
DAO was reported at $150 million.
The flaw was not in the blockchain platform
itself, but rather in the smart contract. The hacker was able to trigger a
recursive send vulnerability where the act of sending funds triggered another
“send funds” request.
Etherium had done exactly what it was supposed to do, but
a loophole in the smart contract code exposed the organization to a hack. It
was reported that the DAO lost $60 million in just the first 12 hours.
Remember that there are no standards for
testing smart contracts, and having “adequate” testing exposes the company to
potential risk.
Smart contracts are only as smart as the
programming code on which they are based.. The DAO hack was enabled by a
vulnerability in the code of the blockchain’s smart contract.
The attacker’s
knowledge of a particular feature in the code demonstrated that such an
asymmetry in information could prove to be a lucrative, if nefarious or even illegal,
competitive advantage.
Blockchain technology lacks a history of
secure code, and specialists have not yet had enough time to anticipate what
those flaws might be. Others, too, have suggested that smart contracts be
written, tested, and deployed in well-defined processes with strong controls
around them
Yet, some have cautioned against the
implementation of too many security protection measures, which would decrease
the efficiency of the blockchain and may obviate the value of the technology in
the first place.
Blockchain, cannot entirely eliminate or automate the
human dimension of trust.
The stability of the entire blockchain depends on its users placing stock in the individuals who able to verify the code, thereby ensuring that smart contracts will be executed as intended.
The stability of the entire blockchain depends on its users placing stock in the individuals who able to verify the code, thereby ensuring that smart contracts will be executed as intended.
The democratic nature of the blockchain and
the current application of smart contracts might be a double-edged sword: while
users at the base of the pyramid may benefit from some reductions in
transaction costs as a result of less intermediation, without lawyers and other
middlemen, it is unclear what protections or legal recourse these users would
have in the event that their blockchain-enabled transactions are compromised.
Furthermore, if even highly financially-literate and tech-savvy consumers
cannot see fatal flaws in the smart contract code, can we reasonably expect
less financially- and technically-literate users at the base of the pyramid to
catch these same mistakes, even if the code is theoretically open to the public
eye?
And even if users at the base of the pyramid
could afford the services of lawyers who were well-versed in blockchain and
smart contract coding, can we really be certain these individuals could
recognize and enforce airtight smart contracts?
It is naïve, and even dangerous, to take an
overly optimistic and utopian vision of blockchain and smart contract
technology without further scrutiny of these unresolved fundamental issues on
the alignment of economic incentives of users, consensus mechanisms, and trust.
Smart contracts are pieces of code that
leverage the power of the Blockchain technology to facilitate, verify, or
enforce the negotiation or performance of contracts.
Smart contracts are pieces of software, not contracts in the
legal sense, that extend blockchains’ utility from simply keeping a record of
financial transaction entries to automatically implementing terms of multiparty
agreements.
Smart contracts are executed by a computer
network that uses consensus protocols to agree upon the sequence of actions
resulting from the contract’s code
The Ethereum network, which is valued at
around 32 Billion USD, is struggling to deal with scaling issues despite its
lack of actual user base
Initial coin offering (ICO) is an unregulated
and controversial means of crowdfunding via use of cryptocurrency which can be
a source of capital for startup companies. In an ICO a percentage of the newly
issued cryptocurrency is sold to investors in exchange for legal tender or
other cryptocurrencies such as Bitcoin.
The term may be analogous with 'token
sale' or crowdsale, which refers to a method of selling participation in an
economy, giving investors access to the features of a particular project
starting at a later date. ICOs may sell a right of ownership or royalties to a
project.
The success of initial coin offerings (ICOs)
as a new fundraising model is undoubtedly attracting an influx of tech talent
to develop on Ethereum and other blockchain protocols. With over $1.25B raised
this year to date, ICOs have surpassed early-stage venture capital funding.
Furthermore, teams have raised tens of millions of dollars with only simple
whitepapers describing their ideas. Some ideas are truly innovative and have
captured the public’s imagination regarding what is theoretically possible with
smart contracts. In practice, however, the vast majority of ICOs are for
projects that are not yet feasible due to the technical limitations of blockchains.
Blockchains, as it stands today, are limited
in their ability to scale.
Blockchains may be suitable for some niche
use cases, but they do not work well for mainstream use due to scaling issues. Bitcoin
and Ethereum are only processing three and five transactions per second (tx/s),
respectively. To support Visa, Ethereum would need to scale to thousands of
tx/s
While a decentralization consensus mechanism
offers some critical benefits, such as fault tolerance, a strong guarantee of
security, political neutrality, and authenticity, it comes at the cost of
scalability.
The number of transactions the blockchain can process can never
exceed that of a single node that is participating in the network. In fact, the
blockchain actually gets weaker as more nodes are added to its network because
of the inter-node latency that logarithmically increases with every additional
node.
In a traditional database system, the
solution to scalability is to add more servers (i.e. compute power) to handle
the added transactions. In the decentralized blockchain world where every node
needs to process and validate every transaction, it would require us to add
more compute to every node for the network to get faster. Having no control
over every public node in the network leaves us up shit creek without a paddle.
As a result, all public blockchain consensus
protocols that operate in such a decentralized manner make the tradeoff between
low transaction throughput and high degree of centralization.
In other words,
as the size of the blockchain grows, the requirements for storage, bandwidth,
and compute power required by fully participating in the network increases. At
some point, it becomes unwieldy enough that it’s only feasible for a few nodes
to process a block — leading to the risk of centralization.
In order to scale, the blockchain protocol
must figure out a mechanism to limit the number of participating nodes needed
to validate each transaction, without losing the network’s trust that each
transaction is valid. It might sound simple in words, but is technologically
very difficult.
Since every node is not allowed to validate
every transaction, we somehow need nodes to have a statistical and economic
means to ensure that other blocks (which they are not personally validating) are
secure.
Even if a block looks valid from the
perspective of a node not directly validating that block, making the data for
that block unavailable leads to a situation where no other validator in the
network can validate transactions or produce new blocks, and we end up stuck in
the current state. (There are several reasons a node might go offline,
including malicious attack and power loss.)
Transactions need to be processed by
different nodes in parallel in order to achieve scalability. However,
transitioning state on the blockchain also has several non-parallelizable
(serial) parts, so we’re faced with some restrictions on how we can transition
state on the blockchain while balancing both parallelizability and utility.
The bitcoin scalability problem is a
consequence of the fact that blocks in the blockchain are limited to one
megabyte in size. Blocks larger than one
megabyte are automatically rejected by the network as invalid. Bitcoin blocks carry the transactions on the
bitcoin network since the last block has been created. This allows for around
three transactions per second maximum capacity rate.
A fork referring to a blockchain is what
happens when a blockchain splits into two paths forward. Forks on the bitcoin
network regularly occur as part of the mining process. They happen when two
miners find a block at a similar point in time. As a result, the network
briefly forks.
This fork is subsequently resolved by the software which
automatically chooses the longest chain, thereby orphaning the extra blocks
added to the shorter chain (that were dropped by the longer chain). A blockchain
can also fork when developers change rules in the software used to determine
which transactions are valid
A hard fork is a change of rules that allows
to create new blocks not considered valid by the older software. A hard fork term refers to a situation when a
blockchain splits into two separate chains in consequence of the use of two
distinct sets of rules trying to govern the system..
A hard fork can split a
network if all the network participants don't follow the fork. For example,
Ethereum Classic came into existence as a result of the hard fork of the
Ethereum network, which was a response to the DAO hack
Each block on the Bitcoin blockchain takes 10
minutes to mine . The Ethereum blockchain was built to support smart contract
applications and so the transaction speed is much faster, at 15 transactions
per second. The pace of exchange on the internet is even speedier.
For example,
45,000 transactions per second are processed by Visa. In advertising, the
number of transactions is even more so. The Facebook Audience Network serves
ads to 1 billion people per day , and Google ads receive 29.8 billion
impressions per day.
The extraordinary transaction demands of the
digital world have led many blockchain critics to posit that the technology
will never scale. While it's true that public blockchains using proof-of-work
consensus algorithms across thousands of nodes are too slow for programmatic
ads or any real-time system, private blockchains do not harbor such
constraints.
Private blockchains can be built using different consensus
algorithms and channels, such as the Lightning Network. The Lightning Network
allows for instant value transfers through the implementation of off-chain
transactions.
Distributed purists may take issue with the concept of private
blockchains because they are centralized, but there may be some cases when
private blockchains are more appropriate, such as in certain enterprise and
governance models .
Another component of blockchain technology is
that it is a harbinger of transparency. Because all transactions are recorded,
there is no "black box" in which any single participant can hide
their actions.
The reason that this transparency is so revolutionary is that
many of our existing systems are opaque and convoluted, allowing malicious
actors to take advantage of the dark alleyways, so to speak, and steal data and
value without repercussions.
Blockchains provide "streetlights"
so that there are no hidden passageways. Some people have made the "too
much of a good thing can hurt you" argument about this added transparency.
In the long run, however, transparent pricing does nothing but good for buyers
and sellers in the marketplace.
As each new block generates, it gets
increasingly more difficult and energy intensive to generate the next block.
Bitcoin mining alone uses 27 times as much energy
as the entire Visa network.
Unfortunately, in practice, this leads to
scaling problems across two dimensions: energy use and speed.
The networks are also slow.
Currently, the Ethereum network currently
caps out at around 13 transactions per second; ETH-based tokens such as OMG,
Golem, & Civic cap out at around half of that, 7 transactions per second.
An app of Facebook’s size makes around ~200K API requests per second. In
Ethereum world, instead of API requests, users pay ether “gas” to run smart
contracts.
Running these smart contracts counts as a
transaction. This “gas” has a maximum limit set per block in the Ethereum
protocol.
Simply increasing the block size to allow for
a higher amount of gas won’t work because it sacrifices decentralization — only
industry-size miners could afford to participate. In addition, whatever scaling
solution we introduce must also not sacrifice a reasonable amount of security.
The challenge is what Vitalik calls the “scalability trilemma”: building a
system that fulfills “decentralization”, “scalability”, and “security”.
This means Ethereum transaction capability
needs to grow by an astounding multiple of x25,000 to handle the network
traffic of a decentralized app comparable to Facebook.
As nodes in the network use more computing
power to generate new blocks, the puzzles miners need to solve get harder.
Thus, more and more computing power is consumed by the network, but as miners
work harder, no new benefits are generated.
The power is being consumed to prevent
individual miners from influencing the network for their own benefit and
recording those transactions that would most benefit any particular miner as
the next block on the chain, but the computational power consumed by the
network does not generate any independent value.
Vitalik Buterin, the 23-year-old creator of
Ethereum, has proposed transitioning Ethereum from a proof-of-work system to a
proof-of-stake system.
In a proof-of-stake system, entities can
stake a portion of their tokens in the system on one new block or another. The
block with the most stake behind it is the one added to the blockchain. A
reward of network tokens is given to a random sampling of nodes on the network
that chose to validate the latest block the network adds to the blockchain.
All the participants on the network are
encouraged to validate the genuine version of the network in order to have a
chance of receiving a reward for validating the genuine block.
In theory, proof-of-stake networks wouldn’t
see spiraling energy requirements as miners vie for cryptocurrency with
computational resources, which could make it more scalable.
For Ethereum to change from proof-of-work to
proof-of-stake, a centralized group of Ethereum developers need to update the
network’s code. Then users on the Ethereum network will decide if they want to
use the new version of Ethereum or continue to use the old version.
If they
split, and some use the old version and some the new, then the chain undergoes
a “hard fork,” and both versions of Ethereum are available.
Plasma is a scalability solution for
blockchains.
Plasma whitepaper details a collection of standard smart
contracts used to create a tree of side-chains aptly called Plasma chains.
These Plasma blockchain trees allow for off-chain transactions; transactions
that only periodically commit hashed updated balances to its adult or root
chain.
Plasma, the collection of smart contracts,
includes a multitude of key innovations that together make up a powerful tool
in the battle towards scaling Ethereum’s capacity.
Among these innovations are computation concepts such as MapReduce, an evolved Proof-of-Stake consensus proposal, and submittable fraud proofs.
Among these innovations are computation concepts such as MapReduce, an evolved Proof-of-Stake consensus proposal, and submittable fraud proofs.
Proof-of-Stake, as the name implies, is a
consensus algorithm that relies on users within the Plasma chain to stake some
token amount in return for interest at some later point in time.
Stakers not only purchase stake bonds, but in
doing so they also commit themselves to propagating and broadcasting the exact
same number of blocks when said bonds are due.
Opting for a tree structure
allows Plasma to run MapReduce computations.
Instead of clusters of databases, we run
MapReduce on Plasma chain trees. This is by far Plasma’s most important scaling
solution.
The New York Stock Exchange, however, would
need tens-of-thousands tx/s. Internet-of-Things, social media networks,
massively multiplayer online (MMO) games, and other non-financial applications
would need hundreds-of-thousands to millions of tx/s, Buterin continued.
Scaling blockchains to this capacity would
likely require a significant tradeoff in security. Blockchains, therefore, are
unable to support most interesting financial applications, let alone the entire
internet. Fortunately, there’s a brand new approach to distributed consensus
that does not suffer from the shortcomings of blockchains.
Hashgraph is a blockchain-alternative that
achieves high scalability without sacrificing security. It has been proven to
handle around 300,000 tx/s in a single network, and is expected to do millions
of tx/s with sharding. It is asynchronous byzantine fault tolerant, meaning it
has bank-grade security.
In addition, Hashgraph is fair in that it
serializes all transactions with accurate timestamping, unlike blockchains
where miners determine the order in which transactions are placed within each
block. It uses an entirely different data structure than blockchains to achieve
consensus, and it is a generational leap ahead of Ethereum.
When a company is successful, it starts to
sell more products and buys more resources. That means that the leaders of the
company have to hire more staff to deal with the sales and the new purchases.
For instance, the company may face legal problems, so it will hire some lawyers
and open a legal department. These issues have to do with finding solutions to
deal with growth. This is called scalability.
Introducing proof-of-stake is going to make
the blockchain a lot faster because it is much more simple to check who has the
most stake then to see who has the most hashing power.
This makes coming to a
consensus much more simple. At the same time proof-of-stake makes the
implementation of sharding easier. In a proof-of-work system it will be easier for
an attacker to attack individual shards which may not have high hashrate.
Also, in POS miners won’t be getting a block
fee, and they can only earn via transaction fees. This incentivizes them to
increase the block size to get in more transactions (via gas management).
Gas
is the internal pricing for running a transaction or contract in Ethereum. A miner can decide to increase or decrease
the use of gas according to its needs.
The gas system is not very different
from the use of Kw for measuring electricity home use. One difference from
actual energy market is that the originator of the transaction sets the price
of gas, to which the miner can or not accept, this causes an emergence of a
market around gas
The ability to tolerate what computer
scientists call "byzantine failures" is a crucial part of
blockchains' ability to maintain reliable records of transactions in a
transparent, tamper-proof way.
Essentially, it imagines a group of Byzantine
generals and their armies surrounding a castle and preparing to attack. To be
successful, these armies must all attack at the same time.
But they know that
there is a traitor in their midst. The problem they face is one of launching a
successful attack with one, unknown bad actor in their system.
The metaphor describes a problem that plagues
many computer networks. When a group is trying to make a collective decision
about how it will act, there is a risk that traitors within the group may send
mixed messages about their preferences.
The traitors may tell some members of
the group that they wish to do one thing, and tell other members of the group
the opposite. This can cause problems for the group's ability to coordinate its
actions effectively.
If some members of the group are led to believe one thing
and others believe something different, group members will fail to act in
unison. The group's cohesiveness and effectiveness will then break down,
exactly as the traitors would desire.
Examples of Byzantine failures-- honeybee
swarms have to find a new home, and the many scouts and wider participants have
to reach consensus about which of perhaps several candidate homes to fly to.
And then they all have to fly there, with their queen. The bees approach works reliably, but when
researchers are so unkind as to offer two hives, equally attractive by all the
criteria bees apply, catastrophe ensues, the swarm breaks up, and all the bees
die..
Byzantine failures are considered the most
general and most difficult class of failures among the failure modes. A
Byzantine fault is any fault presenting different symptoms to different
observers.
A Byzantine failure is the
loss of a system service due to a Byzantine fault in systems that require
consensus.
In fault-tolerant computer systems, and in
particular distributed computing systems, Byzantine fault tolerance (BFT) is
the characteristic of a system that tolerates the class of failures known as
the Byzantine Generals' Problem
Hashgraph is a fair and fast, byzantine fault
tolerant consensus algorithm.. It has mathematically proven fairness via
Consensus Time Stamping.
Hashgraph
eliminates the need for the massive computational and energy requirements that
Proof-of-Work consensus succumbs to.
Using the ‘gossip about gossip’ protocol
enables hashgraph to be lightweight, nimble and much like gossip between
friends, is able to spread exponentially and almost by definition is
transparent.
For example, the Bitcoin blockchain is about 60GB in size, where
as hashgraph uses a fraction of that memory, about 1GB, allowing cell phones to
act as nodes.
Gossip about gossip uses votes instead of ‘blocks’, and as a
result can achieve
transaction times the likes of which blockchain can only
dream of.
If used to create another cryptocurrency,
hashgraph will eliminate the issue of network forks caused by network
congestion thanks to its ability to scale infinitely.
Some blockchains are
Byzantine and others are Fault Tolerant, but no blockchain is both Byzantine
AND Fault Tolerant. With hashgraph, the network is guaranteed to be Byzantine
Fault Tolerant, 100% of the time.
Unlike a blockchain where a miner can choose
the order for which transactions occur in a block, can delay orders by placing
them in future blocks, and can even stop them entirely from entering the
system, the hashgraph consensus method timestamps each node (event), so
assumptions are no longer required, ergo Byzantine.
In other words, no member
can prevent the community from reaching a consensus, nor can they change the
consensus once it has been reached.
Blockchain merely assumes that a consensus
was reached as probability approaches whereas hashgraph guarantees it thanks to its
generational “gossip about gossip”.
While Ethereum is looking at PoS with Casper,
hashgraph algorithm uses Virtual Voting
– its a voting system – without having to do the votes. Hashgraph uses a
protocol called “Gossip about Gossip” to achieve consensus.
Gossip is a well
known computer science term, which can be defined as calling any random node
and telling that node everything you know, that it does not know. In
distributed ledger technology the “baseline” or minimum bandwidth required is
that the transactions go to every node.
Gossip about Gossip refers to attaching
a small additional amount of information to this Gossip, which contains the
last person we talked to, hence, we are gossiping about the information we gossiped.
Using this information, we can build the Hashgraph. Once we have the Hashgraph,
it is extremely easy to know what a node would vote, because we know what each
node knows, and when they knew it.
We now can use the data from the Hashgraph
as an input to 30 year old voting algorithms, and achieve consensus essentially
for free.
These 30 year old voting algorithms have strong math proofs- they are
Asynchronous Byzantine Fault Tolerant, which means we know when we will achieve
consensus, guaranteed, and our math proofs make no assumptions about the speed
of the internet, due to firewalls, ddos attacks, viruses or botnets.
In
addition, because of gossip about gossip, Hashgraph is extremely fast, (250,000
transactions/sec), and we also get fair ordering and time stamping on every
event.
Think of Swirlds as a distributed Oracle, in that their main clients
would be corporations and institutions that want to leverage the decentralized
properties of permissioned consensus algorithms with absolutely no possibility
of downtime, rather than just cryptocurrencies used by enthusiasts and
cypherpunks alike.
In the blockchain world, a miner can choose
the order for which transactions occur in a block, can delay orders by placing
them in future blocks, even stop them entirely from entering the system. If two
miners create two blocks at the same time, the community will eventually choose
one and discard the other.
In the blockchain, if new blocks arrive too
quickly they can be discarded. This is why Bitcoin is currently PoW, as this
artificially slows down the mining process – hence the expensive hardware
needed to mine.
In hashgraph, every container is used and
none are discarded. With hashgraph, every member can create transactions and
containers whenever they want.
In block chain, a transaction can be delayed
by one or two mining periods, if many of the miners are refusing to include it.
In alternatives to blockchain based on leaders, this delay can be extremely
long, until the next change of leader.
But in the hashgraph, attackers cannot
stop a member from recording a transaction in any way other than cutting off
their internet access.
The hashgraph is fast. It is limited only by
the bandwidth. So if each member has enough bandwidth to download 4,000
transactions per second, then that is how many the system can handle.
That
would likely require only a few megabits per second, which is a typical home
broadband connection. And it would be fast enough to handle all of the
transactions of the entire Visa card network, worldwide.
The Bitcoin limit of 7
transactions per second can clearly be improved in various ways. Though some
ways of improving it, such as a gigantic block size, could actually make the
fairness of the system even worse.
The hashgraph is provable. Once an event
occurs, within a couple of minutes everyone in the community will know where it
should be placed in history. More importantly, everyone will know that everyone
else knows this.
At that point, they can just incorporate the effects of the
transaction, and then discard it. So in a minimal crypto currency system, each
member (each “full node” in blockchain terminology) needs only to store the
current balance of each wallet that isn’t empty.
They don’t need to remember
any old blocks. They don’t need to remember any old transactions. That shrinks
the amount of storage from Bitcoin’s current 60 GB to a fraction of a single
gigabyte. That would even fit on a typical smartphone.
The hashgraph is Byzantine.
This is a
technical term meaning that no single member (or small group of members) can
prevent the community from reaching a consensus. Nor can they change the
consensus once it has been reached. And each member will eventually reach a
point where they know for sure that they have reached consensus.
Blockchain
does not have a guarantee of Byzantine agreement, because a member never
reaches certainty that agreement has been achieved (there’s just a probability
that rises over time).
Blockchain is also non- Byzantine because it doesn’t
automatically deal with network partitions.
If a group of miners is isolated
from the rest of the internet, that can allow multiple chains to grow, which
conflict with each other on the order of transactions.
It is worth noting that
the term “Byzantine” is sometimes used in a weaker sense. But here, it is used
in its original, stronger sense that (1) every member eventually knows
consensus has been reached (2) attackers may collude and (3) attackers even
control the internet itself (with some limits). Hashgraph is Byzantine, even by
this stronger definition.
In blockchain, work is sometimes wasted
mining a block that later is considered stale and is discarded by the
community. In hashgraph, the equivalent of a “block” never becomes stale.
The hashgraph is inexpensive, in the sense of
avoiding proof-of-work. In Bitcoin, the community must waste time on
calculations that slow down how fast the blocks are mined.
As computers become
faster, they’ll have to do more calculations, to keep the rate slow. The
calculations don’t have any useful purpose, except to slow down the community.
This requires the serious miners to buy expensive, custom hardware, so they can
do this work faster than their competitors.
But hashgraph is 100% efficient, no
matter how fast its “blocks” are mined. So it doesn’t need to waste
computations to slow itself down. (Note: there are blockchain variants that
also don’t use proof-of-work; but Bitcoin does require proof-of-work).
The
hashgraph is timestamped. Every transaction is assigned a consensus time, which
is the median of the times at which each member first received it. This is part
of the consensus, and so has all the guarantees of being Byzantine and provable
The hashgraph is DoS resistant. Both
blockchain and hashgraph are distributed in a way that resists Denial of
Service (DoS) attacks. An attacker might flood one member or miner with
packets, to temporarily disconnect them from the internet. But the community as
a whole will continue to operate normally.
An attack on the system as a whole
would require flooding a large fraction of the members with packets, which is
more difficult. There have been a number of proposed alternatives to blockchain
based on leaders or round robin.
These have been proposed to avoid the proof-of-work
costs of blockchain. But they have the drawback of being sensitive to DoS
attacks.
If the attacker attacks the current leader, and switches to attacking
the new leader as soon as one is chosen, then the attacker can freeze the
entire system, while still attacking only one computer at a time. Hashgraph
avoids this problem, while still not needing proof-of-work.
The hashgraph is optionally non-permissioned,
while still avoiding the cost of proof-of-work. A permissioned system is one
where only trusted members can participate.
An open system is not permissioned,
and allows anyone to participate. Standard blockchain can be open if it uses
proof-of-work, but variants such as proof-of-stake typically have to be
permissioned in order to be secure.
A hashgraph system can be designed to work in
a number of different ways. One of the more interesting is to use
proof-of-stake, allowing members to vote proportional to their ownership of a
particular cryptocurrency.
A good cryptocurrency might be widely used, so that
it is difficult for an attacker to corner the market by owning a large fraction
of the entire money supply. If a large fraction of the currency owners all
participate in a hashgraph system, then proof-of-stake will make it safe from
Sybil attacks, which are attacks by hordes of sock-puppet fake accounts.
Such a
system would be secure even if it were not permissioned, while still avoiding
the cost of proof-of-work. Why does hashgraph have these properties? Because
it’s like a tree that’s braided, not pruned.
The Sybil attack in computer security is an
attack wherein a reputation system is subverted by forging identities in
peer-to-peer networks.
In a Sybil attack, the attacker subverts the reputation
system of a peer-to-peer network by creating a large number of pseudonymous
identities, using them to gain a disproportionately large influence.
It s a
dangerous digital world out there. Security and antivirus software is important
for any network.
One way security can break down is in a Sybil attack. Named
after the case study of a woman with multiple personality disorder, a Sybil
attack is a type of security threat when a node in a network claims multiple
identities.
Sybil attacks have appeared in many scenarios, with wide
implications for security, safety and trust. For example, an internet poll can
be rigged using multiple IP addresses to submit a large number of votes. Some
companies have also used Sybil attacks to gain better ratings on Google Page
Rank.
In both blockchain and hashgraph, any member
can create a transaction, which will eventually be put into a container (the
“block”), and will then spread throughout the community.
In blockchain, those
containers are intended to form a single, long chain. If two miners create two
blocks at the same time, the community will eventually choose one to continue,
and discard the other one. It’s like a growing tree that is constantly having
all but one of its branches chopped off.
In hashgraph, every container is used, and
none are discarded. So all the branches continue to exist forever, and
eventually grow back together into a single whole. This is more efficient.
Furthermore, blockchain fails if the new
containers arrive too quickly, because new branches are sprouting faster than
they can be pruned. That is why blockchain needs proof-of-work or some other
mechanism to artificially slow down the growth.
But in hashgraph, nothing is
thrown away. So there is no harm in the structure growing quickly. Every member
can create transactions and containers whenever they want. So it is very
simple, and tends to be very fast.
Finally, because the hashgraph doesn’t
require pruning, it is simpler, which allows more powerful mathematical
guarantees, such as Byzantine agreement and fairness.
Distributed databases
such as Paxos are Byzantine, but not fair.
Blockchain is neither Byzantine nor
fair.
But the Swirlds hashgraph is both Byzantine and fair.
Hashgraph is
written in Java
SOMEBODY ASKED ME
YOU STOPPED BLOGGING- YET YOU DID A “EXTRA
LONG COMMENT“ ON BLOCK CHAIN
WITH A MIGHTY VADAKAYIL BACK SWING –WHICH WOULD
PUT JOHN FUCKIN’ GALT TO SHAME
INDEED !
THE MOST FERTILE BRAINED MEN ON THIS PLANET
WENT GA GA ABOUT BLOCKCHAIN –ULU ( OR IS IT BLOCKCHAIN-UDU )
THIS IS
A SYSTEM WHICH REQUIRED CHOOT MINERS , SPENDING HUMONGOUS AMOUNTS OF
ELECTRICITY –
A SIMPLE EMP ATTACK ON POWER GRIDS CAN MADE BLOCKCHAIN-ULU ( OR IS IT BLOCKCHAIN-UDU ) FALL PHUTTTT ON ITS FACE , RIGHT?
A SIMPLE EMP ATTACK ON POWER GRIDS CAN MADE BLOCKCHAIN-ULU ( OR IS IT BLOCKCHAIN-UDU ) FALL PHUTTTT ON ITS FACE , RIGHT?
AFTER THAT WHAT SHALL WE DO WITH THE HARD FORK USED TO CREATE AN EXTRA CHRONS ASSHOLE TO KEEP THE SHIT FLOWING?
WHOSE ASSHOLE SHALL WE SHOVE INTO?
BLOCKCHAIN IS LIKE GANDHI
GANDHI IS INDEED AS HOLY AS GOD
BUY HEY, HE NEEDS A BLOCKCHAIN – NAY— AN ENEMA
KIT ( TO INJECT FRESH YOUNG GIRLs SHIT
INTO HIS LARGE INTESTINE )
AND ALSO TWO YOUNG TEENAGED GIRLS TO SLEEP WITH HIM UNDER THE SAME BLANKET, FOR GOOD MEAYYYURRE -NAY--MEASURE-- TO CONTINUE DOING HIS HOLY JOB
AND ALSO TWO YOUNG TEENAGED GIRLS TO SLEEP WITH HIM UNDER THE SAME BLANKET, FOR GOOD MEAYYYURRE -NAY--MEASURE-- TO CONTINUE DOING HIS HOLY JOB
BRRAAAYYYYYYYYYYYYYYYYYYYYY !
LET US DANCE--WHILE SINGING THE PRAISES OF GANDHI-- NAY--- BLOCKCHAIN--
DHINKA CHIKKA DHINKA CHIKKA
HITLER IS UPSET !
HITLER SELLS ALL HIS BITCOINS
HITLER TOO WAS A MINER
In 2016, a vulnerability in the DAO smart
contract allowed hackers to steal $74 million USD from 11,000 individuals.
Bitcoin is not byzantine. It’s not even
byzantine under bad assumptions.
Guaranteed mathematically – that’s where the
byzantine fault tolerance purely asynchronous all comes in.
In hashgraph you do this with zero communication. You get it
for free and in a fraction of a second.
PERIOD !
CHINA DOES 82% OF THE WORLDs MINING -WHY ?
Chinese mining pools control more than 82% of
the Bitcoin network’s collective hashrate. Most mining pools are in China.
1. AntPool
Antpool is a Chinese based mining pool,
maintained by the ASIC manufacturer, BitMain. Antpool has mined nearly 20% of
all blocks over the past year. Antpool currently has a hashrate of about 675
Petahash per second (PH/s).
AntPool
disguises its true hashrate by running subsidiary pools. These are said to
include ViaBTC, BTC.com, GBMiners, CANOE and possibly others.
2. F2Pool / DiscusFish
F2Pool, also known as DiscusFish, is based in
China. F2Pool has mined about 18.5% of all blocks over the past twelve months-- it controls about 380 PH/s.
3. BTCC
BTCC is China’s third largest Bitcoin
exchange and also operates a large mining pool. The BTCC pool has mined about
11% of all blocks over the past year. It controls about 240 PH/s.
4. BW Pool
BW, established in 2014, is another mining
company based in China. BW’s pool has mined about 10% of all blocks over the
last year. It controls in the region of 225 PH/s.
China is home to four of the five largest
Bitcoin mining pools over the past year.
Cloud mining is where you pay a service
provider to miner for you and you get the rewards.
KOSHER controlled Georgia is home to BitFury,
one of the largest producers of Bitcoin mining hardware and chips.
BitFury
currently mines about 15% of all bitcoins.
The main difference between the Bitfury pool
and other mining pools is that Bitfury is a private pool.
Bitfury, the company, makes its own mining
hardware and runs its own pool. So, unlike Slush or Antpool, Bitfury cannot be
joined if you run mining hardware at home.
IT IS NOT JUST —ROTHSCHILD IS BEHIND THE BITCOIN
SHADOW
Bitcoin miners are crucial to Bitcoin and its
security. Without miners, Bitcoin would be vulnerable and easy to attack. Miners are responsible for the creation of all
new bitcoins.. Mining is now mostly
done in large, specialized warehouses with massive amounts of mining hardware.
Antpool in China remains the largest Bitcoin
mining pool in terms of its Bitcoin network hash rate. Antpool holds roughly
15% of the total hash rate of all Bitcoin mining pools.
Chinaman Jihan Wu is the co-founder of
BITMAIN, one of most recognized and valuable bitcoin companies.. Jihan Wu
founded Bitmain maintains AntPool which holds the largest hashrate distribution
amongst mining pools; currently AntPool mines 17 % of all blocks.
INDIA GOES BITCOIN-ULU ( OR IS IT BITCOIN –UDU?)
ADANIs FORTUNE COOKING OIL IS NOW USING BOLLYWOOD ACTOR AKSHAY KUMAR AND THE INDIAN ARMY
http://bestmediainfo.com/2017/11/akshay-kumar-wears-rajiv-bhatia-s-apron-to-cook-for-jawans-in-fortune-oil-s-latest-brand-film/
IS THIS WHY MODI MADE JNU WOMAN NIRMALA SITARAMAN AS OUR DEFENCE MINISTER ?
WHY IS THE INDIAN ARMY COMMERCIALIZED ? IS THE ARMY CHIEF INVOLVED ? WHO HAS GIVEN SUCH LIBERTIES ?
WE WANT SEVERE FINES TO BE SLAPPED ON THE MAKERS OF THIS AD
PREVIOUSLY THESE LIARS CLAIMED THAT FORTUNE VIVO COOKING OIL CAN CURE DIABETES
WE THE PEOPLE OF INDIA WANT TO KNOW IF THE MODI GOVT SUPPORTS THIS ADANI WILMAR FORTUNE VIVO VEGETABLE OIL , WHICH CLAIMS TO CONTROL DIABETES .. THIS RUNS COUNTERSENSE TO SCIENCE . . . .
BEING CAPTAIN FOR 30 YEARS MY SHIPS HAVE CARRIED WILMAR OIL FOR YEARS , AND I KNOW WHO THEY ARE , AND HOW THEY SOURCE THE OIL ..
WHAT ARE THE INGREDIENTS OF THIS MAGIC ADANI VEG OIL?
HAS THE HEALTH MINISTER DONE A STUDY ? . . . OR IS IT GUJARATI EXEMPTED ? . . .
IS IT GM OIL ?
WHERE IS THE TEST CERTIFICATE BY THE INDIAN GOVT LABORATORY ? . .
https://www.youtube.com/watch?v=lV1GMOgg43Y
THIS IS THE STATE OF INDIA-- A BANANA REPUBLIC --RULED BY AN APCO BRANED PM ..
PUT THIS COMMENT IN ARMY CHIEFs, DEFENCE MINISTERs, PMO, PM MODI, HEALTH MINISTER, I&B MINISTER, WEBSITES
capt ajit vadakayil
..
http://bestmediainfo.com/2017/11/akshay-kumar-wears-rajiv-bhatia-s-apron-to-cook-for-jawans-in-fortune-oil-s-latest-brand-film/
IS THIS WHY MODI MADE JNU WOMAN NIRMALA SITARAMAN AS OUR DEFENCE MINISTER ?
WHY IS THE INDIAN ARMY COMMERCIALIZED ? IS THE ARMY CHIEF INVOLVED ? WHO HAS GIVEN SUCH LIBERTIES ?
WE WANT SEVERE FINES TO BE SLAPPED ON THE MAKERS OF THIS AD
PREVIOUSLY THESE LIARS CLAIMED THAT FORTUNE VIVO COOKING OIL CAN CURE DIABETES
WE THE PEOPLE OF INDIA WANT TO KNOW IF THE MODI GOVT SUPPORTS THIS ADANI WILMAR FORTUNE VIVO VEGETABLE OIL , WHICH CLAIMS TO CONTROL DIABETES .. THIS RUNS COUNTERSENSE TO SCIENCE . . . .
BEING CAPTAIN FOR 30 YEARS MY SHIPS HAVE CARRIED WILMAR OIL FOR YEARS , AND I KNOW WHO THEY ARE , AND HOW THEY SOURCE THE OIL ..
WHAT ARE THE INGREDIENTS OF THIS MAGIC ADANI VEG OIL?
HAS THE HEALTH MINISTER DONE A STUDY ? . . . OR IS IT GUJARATI EXEMPTED ? . . .
IS IT GM OIL ?
WHERE IS THE TEST CERTIFICATE BY THE INDIAN GOVT LABORATORY ? . .
https://www.youtube.com/watch?v=lV1GMOgg43Y
THIS IS THE STATE OF INDIA-- A BANANA REPUBLIC --RULED BY AN APCO BRANED PM ..
PUT THIS COMMENT IN ARMY CHIEFs, DEFENCE MINISTERs, PMO, PM MODI, HEALTH MINISTER, I&B MINISTER, WEBSITES
capt ajit vadakayil
..
Captain
Here is an article that says US Debt problem is not manageable.
----
http://www.zerohedge.com/news/2017-10-31/will-americas-prosperity-be-completely-wiped-out-our-growing-debt
The federal government is now 20.4 trillion dollars in debt, and most Americans don’t seem to care that the economic prosperity that we are enjoying today could be completely destroyed by our exploding national debt.
"Over the past decade, the national debt has been growing at a rate of more than 100 million dollars an hour, and this is a debt that all of us owe. When you break it down, each American citizen’s share of the debt is more than $60,000, and so if you have a family of five your share is more than $300,000. And when you throw in more than 6 trillion dollars of corporate debt and nearly 13 trillion dollars of consumer debt, it is not inaccurate to say that we are facing a crisis of unprecedented magnitude."
---
If Trump or someone who have balls, mint a coin, and call it a "20 Trillion USD" coin, and wipes the slate clean, what will be implications?
I am sure whichever the president does that, he will be assassinated. Will it solve problem? Don't think so. Federal Reserve is one evil Private Bankers Association, no one has balls to fight against.
Your thoughts sir?
-Cheers
Shan
Here is an article that says US Debt problem is not manageable.
----
http://www.zerohedge.com/news/2017-10-31/will-americas-prosperity-be-completely-wiped-out-our-growing-debt
The federal government is now 20.4 trillion dollars in debt, and most Americans don’t seem to care that the economic prosperity that we are enjoying today could be completely destroyed by our exploding national debt.
"Over the past decade, the national debt has been growing at a rate of more than 100 million dollars an hour, and this is a debt that all of us owe. When you break it down, each American citizen’s share of the debt is more than $60,000, and so if you have a family of five your share is more than $300,000. And when you throw in more than 6 trillion dollars of corporate debt and nearly 13 trillion dollars of consumer debt, it is not inaccurate to say that we are facing a crisis of unprecedented magnitude."
---
If Trump or someone who have balls, mint a coin, and call it a "20 Trillion USD" coin, and wipes the slate clean, what will be implications?
I am sure whichever the president does that, he will be assassinated. Will it solve problem? Don't think so. Federal Reserve is one evil Private Bankers Association, no one has balls to fight against.
Your thoughts sir?
-Cheers
Shan
https://timesofindia.indiatimes.com/india/social-media-pokes-fun-at-ministers-vande-mataram-rendition/articleshow/61377738.cms
BASTARD BENAMI MEDIA
FIT ONLY FOR CRICKET AND BOLLYWOOD
WANTS TO FIRE OVER SOCIAL MEDIA s SHOULDERS..
BASTARD BENAMI MEDIA
FIT ONLY FOR CRICKET AND BOLLYWOOD
WANTS TO FIRE OVER SOCIAL MEDIA s SHOULDERS..
MEDIA WHORES-- COMMIES FROM BROKEN HOMES
KNOWING THE LYRICS IS NO BIG DEAL-- THE INTENTION AND AN EFFORT TO BE PART OF THE SONG MATTERS
capt ajit vadakayil
..
Captain,
You blogged 7 parts on Block-chain technology only to tell us in the 8th part that the entire Block chain concept is a sham and POS !
Hahahahahhaha........unbelievable......this back-swing is like a horse kicking a man's nuts !!! :D
You blogged 7 parts on Block-chain technology only to tell us in the 8th part that the entire Block chain concept is a sham and POS !
Hahahahahhaha........unbelievable......this back-swing is like a horse kicking a man's nuts !!! :D
https://timesofindia.indiatimes.com/india/russias-relationship-with-india-second-to-no-country-russian-envoy/articleshow/61410312.cms
INDIA MUST SIGN A TREATY WITH RUSSIA
THAT A WAR ON INDIA , WILL BE A WAR AGAINST RUSSIA
DONT BOTHER ABOUT VICE VERSA SITUATION --AS NO NATION HAS THE GAAND MEIN TATTI TO ATTACK RUSSIA.
RUSSIA CAN DESTROY BRITAIN WITH JUST ONE SARMAT 2 UNSTOPPABLE ICBM.
RUSSIA CAN MAKE USA A RADIOACTIVE WASTELAND WITH JUST 16 UNSTOPPABLE SARMAT2 ICBMs
THIS TREATY WILL KEEP CHINA AWAY
INDIA MUST SIGN A TREATY WITH RUSSIA
THAT A WAR ON INDIA , WILL BE A WAR AGAINST RUSSIA
DONT BOTHER ABOUT VICE VERSA SITUATION --AS NO NATION HAS THE GAAND MEIN TATTI TO ATTACK RUSSIA.
RUSSIA CAN DESTROY BRITAIN WITH JUST ONE SARMAT 2 UNSTOPPABLE ICBM.
RUSSIA CAN MAKE USA A RADIOACTIVE WASTELAND WITH JUST 16 UNSTOPPABLE SARMAT2 ICBMs
THIS TREATY WILL KEEP CHINA AWAY
RUSSIA NEEDS INDIA MORE THAN INDIA NEEDS RUSSIA
WHEN THE WHOLE WORLD TRIED TO BRAND RUSSIA AND EVIL EMPIRE --INDIA THE ONLY MORAL VOICE OF THIS PLANET SHORED UP RUSSIA - PUTIN KNOWS THIS AND HE MUST BE GRATEFUL.
####################
PUT THIS COMMENT IN
PM MODIs
PMO ( I ASK MY READERS --JUST PUTTING A COMMENT IN PMO MEANS NOTHING--I KNOW THE BASTARD WHO DELETES IT )
CHIEFS OF ALL THREE AIR FORCE/ NAVY/ ARMY
AJIT DOVAL
DEFENCE MINISTER
HOME MINISTER
ASK FOR AN ACK
capt ajit vadakayil
..
https://timesofindia.indiatimes.com/home/environment/global-warming/carbon-dioxide-levels-grew-at-record-pace-in-2016-un-says/articleshow/61339924.cms
UN WAS CREATED BY JEW ROTHSCHILD
IT IS STILL A POODLE OF JEW ROTHSCHILD WHO WANTS TO PUSH PARIS COP21-- DONALD TRUMP BLOCKED IT GLEANING INFO FROM MY BLOGSITE
WE SEND OUR SOLDIERS TO AFRICA ON UN PEACE KEEPING MISSIONS-- WE KEEP WATCH WHILE WHITE JEWS STEAL
INDIA CONTRIBUTES THE HIGHEST SOLDIERS
AND OUR ELECTED PMs KEEP THIS A BIG SECRET---THAT OUR SOLDIERS HAVE THE HIGHEST MORTALITY RATE
THIS IS THE GREATEST DECEIT MY OUR PM MODI-- HE WILL NEVER TALK ABOUT THIS IN MANN KE BAAATH OR HIS TWITTER SITE -AS THIS WILL CRAMP HIS APCO STYLE OF MILKING VOTES, USING HIS FAALTHU ETHOS.
http://www.thehindu.com/opinion/blogs/blog-datadelve/article6547767.ece
CARBON DI OXIDE IS A GOOD GAS
MODI USED CHITPAVAN PRAKASH JAVEDEKAR AT PARIS COP21-- TOTAL CAPITULATION TO WHITE JEWS ..
UN WAS CREATED BY JEW ROTHSCHILD
IT IS STILL A POODLE OF JEW ROTHSCHILD WHO WANTS TO PUSH PARIS COP21-- DONALD TRUMP BLOCKED IT GLEANING INFO FROM MY BLOGSITE
WE SEND OUR SOLDIERS TO AFRICA ON UN PEACE KEEPING MISSIONS-- WE KEEP WATCH WHILE WHITE JEWS STEAL
INDIA CONTRIBUTES THE HIGHEST SOLDIERS
AND OUR ELECTED PMs KEEP THIS A BIG SECRET---THAT OUR SOLDIERS HAVE THE HIGHEST MORTALITY RATE
THIS IS THE GREATEST DECEIT MY OUR PM MODI-- HE WILL NEVER TALK ABOUT THIS IN MANN KE BAAATH OR HIS TWITTER SITE -AS THIS WILL CRAMP HIS APCO STYLE OF MILKING VOTES, USING HIS FAALTHU ETHOS.
http://www.thehindu.com/opinion/blogs/blog-datadelve/article6547767.ece
CARBON DI OXIDE IS A GOOD GAS
MODI USED CHITPAVAN PRAKASH JAVEDEKAR AT PARIS COP21-- TOTAL CAPITULATION TO WHITE JEWS ..
MODI HAS AWARDED PADMA VIBHUSHAN TO TWO ROGUE GURUS -- SRI SRI RAVISHANKAR AND SADGURU JAGGI VASUDEV
BOTH ARE PRETENDING TO BE GREAT ENVIRONMENTALISTS -- SUDDEN SPONTANEOUS KNOWLEDGE --LIKE SRUTI OF VEDAS ?
I CAN PUT THIS GRUESOME DUO THROUGH A THOUSAND ITEM EXAM-- BOTH WILL SCORE ZERO-- AND THIS INCLUDES INDIAs NGT
http://ajitvadakayil.blogspot.in/2016/04/most-potent-greenhouse-gases-nitrous.html
http://ajitvadakayil.blogspot.in/2016/12/arctic-ice-melt-and-methane-time-bomb.html
http://ajitvadakayil.blogspot.in/2016/06/methane-time-bomb-arctic-ice-meltdown.html
http://ajitvadakayil.blogspot.in/2017/05/nitrate-water-pollution-chemical.html
READ ALL 6 PARTS OF THE POST BELOW---
http://ajitvadakayil.blogspot.in/2017/05/ground-water-resources-of-india-capt.html
I AM NOT A PRETENDER-- FOR 30 YEARS I COMMANDED CHEMICAL TANKERS --WITH 100% KNOWLEDGE OF THE ENVIRONMENT AND ITS RULES
http://ajitvadakayil.blogspot.in/2014/06/ganga-manthan-cleaning-of-river-ganges.html
http://ajitvadakayil.blogspot.in/2014/03/vanishing-lakes-rain-water-harvesting.html
http://ajitvadakayil.blogspot.in/2014/05/interlinking-rivers-of-india-capt-ajit.html
http://ajitvadakayil.blogspot.in/2015/11/foam-froth-on-bangalore-lakes-capt-ajit.html
PUT THIS COMMENT IN THE WEBSITES OF PM, PMO, FOOD MINISTER, WATER MINISTER, ENVIRONMENT MINISTER, YOGI ADITYANATAH, I&B MINISTER, LAW MINISTER , CJI, SUPREME COURT BAR COUNCIL, ATTORNEY GENERAL, PRAKASH JAVEDEKAR, HOME MINISTER, DEFENCE MINISTER, FINANCE MINISTER
AND ALL DESH BHAKTS
capt ajit vadakayil
..
https://timesofindia.indiatimes.com/home/environment/pollution/centre-turns-to-sewage-eating-microbes-to-treat-ganga-water-at-54-new-sites/articleshow/61336579.cms
BE WARNED
GANGA DOES NOT NEED SEWAGE EATING BACTERIA LIKE OTHER RIVERS ON THIS PLANET...
GANGA HAS ITS OWN SELF CLEANING BACTERIA BUSTING BACTERIOPHAGES ....NO OTHER RIVER ON THIS PLANET HAS THIS UNIQUE LIVING CREATURES...THIS IS WHY GANGES IS A HOLY RIVER....
Bacteriophage, is a virus, any of a group of viruses that infect bacteria—it literally means “bacteria eater”
WHO IS GIVING PM MODI ALL THIS DEVASTATING ADVISE? .. HIS WHITE JEWS MASTERS IN ISRAEL?...
PROTECT GANGA AGAINST CHEMICAL ( FROM TANNERIES ) AND PLASTIC POLLUTION--THAT IS ALL THAT IS NEEDED...
Thousands of varieties of such phages exist, each of which may infect only one type or a few types of bacteria.... The nucleic acid may be either DNA or RNA and may be double-stranded or single-stranded...
During infection a phage attaches to a bacterium and inserts its genetic material into the cell. ..
After this a phage follows one of two life cycles, lytic (virulent) or lysogenic (temperate). .. Lytic phages take over the machinery of the cell to make phage components... They then destroy, or lyse, the cell, releasing new phage particles...
After the discovery of antibiotics in the 1940s it was virtually abandoned. With the ever increasing rise of anti-biotic resistant bacteria , phages will now command fresh attention..
More than 120 years ago there was a cholera outbreak in India and dead bodies were dumped in the upper river... Yet strangely Ganges water did NOT spread the cholera down the river . ...
Ganges is heavily populated with phages which multiply rapidly , travel fast and home in on targets ...
They are harmless to humans because they are strain specific. ... This means phages that infect the cholera bacterium can only infect the cholera bacterium and no other bacteria....
When a bacteriophage finds a bacterium with proteins which match its receptors, it can insert DNA or RNA into the bacterium and direct the organism to start producing replicas of the virus.....
Phages have been keeping keeping bacteria in check for three and a half billion years! Antibiotics have been around for a few decades are they are already failing to do their job.....
I ASK MY READERS - SPREAD THIS COMMENT LIKE WILD FIRE.. INDIA IS BEING RULED BY DESH DROHIS OR VERY IGNORANT PEOPLE...
http://ajitvadakayil.blogspot.in/2014/06/ganga-manthan-cleaning-of-river-ganges.html
WARNING-- DO NOT INTRODUCE EXTERNAL BACTERIA .. THIS WILL KILL GANGA ....
capt ajit vadakayil
..
THIS POST IS NOW CONTINUED TO PART 9, BELOW--
CAPT AJIT VADAKAYIL
..
ReplyDeleteVatsal
October 30, 2017 at 6:39 PM
Hi Captain Ji,
This is with regards to Mr. Rajesh Maurya using the link to your blogsite on his website http://upajvardhakindia.com/. The text on his site that links to your blogsite is "Source of inspiration". He has got himself in the watsapp group of your supporters and intends to use it as a spring board for promoting his business.
He is making tall claims that his organic manure can improve the potency of fertilizers made from desi cow dung and urine by 4 times. Everything points to his intention of using marketing gimmicks for personal gains using the network of your supporters.
ReplyDelete
################
Vatsal
October 30, 2017 at 6:41 PM
So, I request on behalf of your supporters to make Mr. Rajesh remove the link to this site as the intention for his website does not confirm to the mission statement of this blogsite.
ReplyDelete
Replies
################
Capt. Ajit Vadakayil
October 30, 2017 at 7:14 PM
PUT THIS IN HIS WEBSITE
############################
RAJESH MAURYA,
YOU SHALL NOT USE MY NAE TO PROMOTE YOUR BUSINESS
BE WARNED
CAPT AJIT VADAKAYIL
..
#########################
I HAD A FOLLOWER NAMED DHRUV
ONE DAY JUST FOR KICKS I REVEALED THAT MY BLOGSITE IS WORTH 14 MILLION USD.
I KNEW THAT DHRUV KA MANN MANDIR MEIN LADDU PHOOTENGA
SURE ENOUGH THE SAME HOUR HE OPENED A FACEBOOK PAGE ON MY NAME ,( WHEN I DONT EVEN KNOW HIM OR SEEN HIS FACE ON A PHOTO) -- WITH HIS PASSWORD OF COURSE
THESE ARE THE TYPE OF GREEDY PEOPLE WHO CAUSED US TO BE SLAVES FOR 800 YEARS .
Capt ajit vadakayil
..
Pranaam Captain,
DeletePutting your bloglink on website www.upajvardhakindia.com was with prior permission...under the tag SOURCE OF INSPIRATION.
Now your orders for not using the bloglink on company website will be executed.
Only a clarification and assurance that nothing of the sort that using your name to promote business was there and in future too i will never tarnish your name and image. I put the link of blogsite with your prior permissiom which was granted with the paramount clause...as i always saw you as my role modeli wanted to put your bloglink on company site as my gratitude. Using your name for business promotion is a wrong claim without any substantial proof. My business will be with farmers who are so much active on internet. I never wanted that some farmer reader of your blog to buy the product bexause of your name, and an intelligent farmer who reads and understands your blog will buy my product for your name instead of its quality.
And to prove that i follow you from my heart and soul, your orders which are supreme for me will be executed.
I will never let you or your name down sir.
PRANA JAYE PAR VACHAN NA JAYE
PRANAAM
🙏🙏🙏
REGARDS
Rajesh Maurya
Pranaam Capt.
DeleteYou have the right to grant or withdraw your permissions but my stand remains same. I was grateful to you, I am grateful to you and will remain grateful to you.
I am not a greedy man sir. I am going to take even single paisa to my grave nor i do not intend to transfer illgotten wealth to my next generation.
Be assured that i am not the one who will let his own ideal/role model down.
🙏🙏🙏
Pranaam.
Kindly publish both of my comments.
Hi Captain,
DeleteU must stop these people from taking th content of your blog & making money from it ,bcoz these people when they get popular or get some fame or they start earning money from it,then after that they may manipulate,poison,edit,eroticize,the content of your information in order to get more & more money from Global Elites,& to achieve their ulterior motives.They will start changing the information once they get more money,in order to make Hindus self-hating .& Again Hinduism will face a big blow.
Warning them is not enough,you must not allow anyone to use your content for money making,although you don't believe in copyright,bt in case if people want to make money out of the wisdom,knowledge,& time you hav spend to tell th truth,then in such case you must take action against them.
V hav many people like Devdutt Pattnaik,Amish Tripathi,Abhinav Gupta , Ramachandra Guha,Amritya Sen ,all these people they initially praised Sanatan Dharm ,it's philosophies & Bharat ,& once they got decent supporters & followers they started their real work of defaming Sanatan Dharm,Bharat & all Hindus.This did & still does a lot of damage to what normal people think about Sanatan Dharm & Bharat & it does make Hindus self-hating,& more & more anti-hindu people are produced.& Sanatan Dharm & it's followers again gets a 1000 cuts.
Even Max Miller when he was hired by Hunter Commission for manipulated,poisoning,eroticizing Vedas ,in doing that he initially praised Sanatan Dharm & Hindus in manipulated Vedas & as the fake Vedas went ahead their were filled with lies & lies to make Hindus self-hating & to prove Vedas are non-sense.This is th damage these kind of people do.
So please take action against him & set an example that nobody ever uses your information,knowledge for money.
Thanks
Your remarks Captain sir
DeleteI am now a hasbara and deshdrohi because i put your bloglink on my site
www.upajvardhakindia.com
with your permission.
I gave the clarifications and my word.
Now your take sir
🙏🙏🙏
previously you had accused a hardcore fan of monetizing in twitter which in reality twitter had started promoting some ads in between our tweets .you mistook it thinking he was using ads to make money . that guy went into depression because of you
Deletenow you said that some guy named dhruv had opened facebook page to make money .it was not facebook but infact was a blogsite .facebook does not has such feature
you are easily getting misleaded by some followers . i know you dont have time to check each and every shit but please dont casue heartache to your desh bhakt readers
HEY RHINO
DeleteII HAVE THE ENTIRE CORRESPONDENCE BETWEEN DHRUV AND ME -- OVER HIS FACEBOOK CREATION USING MY NAME AJIT VADAKAYIL.
SO EASY BOY !
DeleteI am not going to slip into depression.
But capt can earmark his hasbara readers here.
This is why capt. still not putting his remarks.
Tomorrow the bloglink from company site will be deleted without any hard feeling towards anybody.
Rajesh maurya
Rajesh Maurya
DeleteNever use Captain's work for making money ,his work is priceless,if he had thought of making money from his work he would have made billions.So v as his followers shouldn't use his work for our own money matters & our interests.
Thanks
Hey Mr.
DeleteRhino From Manas
Just think before commenting , with whom you are playing with.
Hi Captainji, I remember Rajesh Maurya asking your permission sometime back.
DeleteI got the message sir,
DeleteThank you.
I DO NOT ALLOW ANYBODY TO MAKE MONEY USING THE NAME VADAKAYIL
DeleteIF I WANT I CAN MAKE HUGE MONEY FROM THIS BLOG
I DONT NEED OTHERS TO MAKE MONEY --BY FIRING OVER MY SHOULDER
THIS BLOGSITE IS TRUSTED -- I AM THIS PLANETs NO 1 ON SOCIAL MEDIA-- BECAUSE PEOPLE REALISE I DONT MAKE MONEY OUT OF MY WORDS
RAJIV MALHOTRA PRETENDS HE IS SAVING HINDUSIM-- YET HE IS MAKING MONEY FORM HIS FAALTHU BOOKS ON ANCIENT INDIA AND SANATANA DHARMA .. HE DOES NOT HAVE THE BALLS TO UTTER THE WORD R
RAJIV MALHOTRA WANTS TO WRITE RAMAYANA--BUT HE IS SHIT SCARED OF UTTERING RAVANs NAME
Dadaji,
DeleteRajesh has been following you for a long time. I have found his behaviour consistant throughout. He has nothing but respect for you and your work. When he sent me the site I thought it was a positive one with regards to what we have learnt here. I dont see any intent from him personally in profiting from your name. Only you can judge the others. http://www.upajvardhakindia.com/
With Gratitude
Sir,
DeletePutting your bloglink on website under the tab "SOURCE OF INSPIRATION" is not for making money but for my gratitude towards this blogsite and you and it was with your prior permission too. A simple remark about not to use the bloglink was enough and equal to order for me. Some person says i am making business out of this is the wrong claim. Anyway Thanks for timely order.
I am not rajeev malhotra. I was a soldier and i am true to my salt. Whatever i can contribute from my side for Bharatmata...i will.
Bloglink will be removed from website www.upajvardhakindia.com tab "SOURCE OF INSPIRATION" tommorow.
I fail to understand how can i make money like this.
Can anyone explain how come i make money by expressing my gratitude to captain and his bloglink.
Most of the farmers are not capt blog followers...and those who follow read and understand will not buy because of capt blogsite link that is on company website under the tab "SOURCE OF INSPIRATION" devoid of product quality.
Hi Captain,
DeleteTh work Rajiv Malhotra does he is left with no options he has to take indirect path, he requires funds bcoz the Global Anti-hindu Forces have a whole strong Institutionalized ecosystem in every possible department,even if someone knows th truth , nobody is going to accept it,unless you get a seat on the table in which Global Anti-hindu Forces are already sitting.
In this ecosystem, Islam has a seat via Arab & Middle-East funding,Christianity has a seat via Vatican & Christian countries money Jews hav a seat via Rothschild Money,even Buddhism has a seat via Chinese & Japanese money,Hindus don't even hav a seat & if they don't hav a seat their, how will Hindus put their point on global level which are all very institutionalized & funded heavily.
You can Disagree sir,but I think Rajiv Malhotra has no other way than to th one he has choosen, like u hav brought lots of confused Hindus out of darkness & self-hatred , similarly Rajiv Malhotra has also done a good amount of work in bringing lots of confused,self-hating Hindus out of darkness,his scale of influence & followers is less than you but I think he has done good work .Atleast he didn't sell out like Devdutt Pattnaik,Amrtya Sen,Romila Thapar,Amish Tripathi,Abhinav Gupta & many more.
Sir his path may b different,but as long he is not Anti-hindu & working for Hindu cause & is speaking against Global Anti-hindu Forces,till then Hindus should support him
Sir , everyone can't b same , everyone has their own problems so they choose different path ,& if that path is against our enemies then v should support him.
Thanks
The kind of work Rajiv Malhotra does, he needs to be physically in US to do it. And if he utters R word he will no doubt lose his green card.
DeleteBut he has gone to the extent of mentioning that people like wendy doniger and sheldo pollock are jewish people. And I also remember in one video he said one cannot say anything against Jews in US because you will be immediately labelled as a anti semite and legal action will be taken.
I have read some of his books. I guess we need them too.He is doing what he can.
Shailesh M
DeleteU r spot on.
Rajiv Malhotra obviously has limitations because of socio-political dominance of Jews in US,& it's not easy to tackle the whole Rothschild System alone.
Thanks
Hey Rajesh,
DeleteYou may not be making money from the site's name, but please go through reader Vatsal's comments above.
By sending links in Whatsapp and other groups it may come across to other's that you are using Captain's name to sell products.
Your site sells products, right? Even if for farmers. By sharing in groups and links to the blog, people can be influenced to think that Captain endorses this. Which may not be the case.
Hasbara comments over this maybe overreaction, but please in any commercial venture do think twice how other people will interpret what you say/write!
And if you want to acknowledge Captain's work, why not in a personal blog,Fb, etc? Just avoid it on the site which is an e-commerce venture.
Regards.
https://www.youtube.com/watch?v=KWs0xAtdHuc
DeleteDO NOT MAKE VADAKAYIL A CONMAN
https://www.youtube.com/watch?v=K78t2-W2jag
All those readers were not my customers and can never be whom i posted the link in group. What i posted was the the website link and SOURCE OF INSPIRATION tab...and mentioned to check. Not said anyone to buy product.
DeleteDo you think selling one bag organic manure to capt fans which they dont need even, who are in a whatsapp group will make indian agriculture organic, for that i have to sell it to farmers. To do that i followed every legal proceedure. Putting bloglink was only my gratitude to the bloglink and capt. Nothing else.
If someone thinks Vadakayil brand is super success in organic manure....it is not.
Even if i trademark "VADAKAYIL ORGANIC MANURE" and try to sell its no gurranty that it will succeed. Manure users do not know Capt. I do not use capt name to generate traffic to my site.
There is no question of making Capt Ajit Vadakayil conman. How can someone do so.
How many of the 35 cr followers and readers of capt blog publicly declare that they or their venture if any is INSPIRED by Capt.
Declaring too needs gut. Had i been a scoundrel i could have TRADEMARKED "VADAKAYIL" brand to mint money if it was possible.
Capt Sir
Stay assured
From my side nothing will happen which shows you as a conman...a person cannot be conman until he himself decides to be one....no other person can make someone conman.
To make you conman, first i need to be conman.
And being me conman is not a possibility.
I may be a fool compared to your wisdom but no less patriotic and honest.
Your orders will be followed. Every paramount clause you put and behaviour you expect from your readers, i know, and i guarranty for the compliance.
Regards
🙏🙏🙏
Check the link on website atleast and explain how can the link favour me to make money. It shows that the founder of this company is inspired by someone...and it is a bloglink and a person behind blogs.
DeleteI used to refer capt bloglink and name in meetings with agriculture department chairpersons on related topics, which i think i must stop.
People post on complaint/department sites, minister/pmo sites. My working is different. I catch the official if i can and show him what capt says on a relevant topic and ask him to read and act if he can. Many people thanked me later for refering them the capt bloglink and insisting them to read.
If it tarnishes Capt's image , i request for a clearcut direction for me in this regard.
🙏🙏🙏
Drake sir,
DeletePutting captain bloglink on a public limited company site under the tab SOURCE OF INSPIRATION is what..? Isn't it the acknowledgement. What it is...misleading to public who dont even know captain ajit vadakayil.
I never intended that capt readers and followers should buy my product but my intention was that my consumers who can understand should read capt. If a public ltd company declares its SOURCE OF INSPIRATION on its website...people may like to know that source which may be their initiation to reading capt blogs.
DeleteCAPTAIN WRITES,EXHUMES TRUTH AND WANTS IT TO BE READ, GRASPED AND EXECUTED.
isnt it so, only capt can clarify.
If capt asks me not to visit his site, I will do what capt wishes.
🙏🙏🙏
https://www.youtube.com/watch?v=Un3x7VHcr-o
ReplyDeleteDOUBT AAH GAYA MANN MANDIR MEIN
SHOULD THESE DANCERS SWING AROUND A POLE
AND SHOW US THEIR TWATS AND ASSHOLES
RAMESH GOPI NAIR-- NAY-- BROWN SAHIB REMO DSOUZA --BATAAOH NAAH-PLEAJJJE ?
PUT THIS COMMENT IN REMO DSOUZAs WEBSITE
russians are not ashamed to do namaste ...... but chutney mary and pickle john are
Deletehttps://www.youtube.com/watch?v=M_KHlvvFkAc&feature=youtu.be
ReplyDeleteDOUBT AAH GAYA MANN MANDIR MEIN
SHOULD THESE DANCERS
TIP TOE
DO PELVIC THRUSTS
DO SOMESAULTS
DO TRAPAZE
DO ROPE CLIMBIMG
DO ACROBATICS
DO BODY CONTORSIONS
ROTATE ON HEAD
DO GYMNASTICS
AND SPLAY THEIR LEGS WHILE WEARING THONGS
SO THAT WE CAN GET A GENEROUS VIEW OF PIG SORPOTEL SHIT LADEN ASSHOLES
RAMESH GOPI NAIR-- NAY-- BROWN SAHIB REMO DSOUZA --BATAAOH NAAH-PLEAJJJE ?
PUT THIS COMMENT IN REMO DSOUZAs WEBSITE
INDIAN WOMEN WHEN THEY DANCE HAVE GRACE
DeleteTHIS BASTARD REMO DESOUZA HAS KILLED INDIAN DANCING
WESTERN DANCES HAVE ZERO GRACE --
WHAT IS ALL THIS BULLSHIT TIPTOEING AND WHIRLING AROUND?
INDIAN DANCE CREATES JOY
https://www.youtube.com/watch?v=ozmimKVtX-A
THE SAME PARVATI KHAN FEMALE IN THE VIDEO ABOVE --SANG JIMMY SONG 35 YEARS AGO-- AS A YOUNG GIRL
https://www.youtube.com/watch?v=bY_SdcYQLl8
ReplyDeleteKevin Spacey is Scum of the Earth
https://timesofindia.indiatimes.com/home/environment/global-warming/carbon-dioxide-levels-grew-at-record-pace-in-2016-un-says/articleshow/61339924.cms
ReplyDeleteUN WAS CREATED BY JEW ROTHSCHILD
IT IS STILL A POODLE OF JEW ROTHSCHILD WHO WANTS TO PUSH PARIS COP21-- DONALD TRUMP BLOCKED IT GLEANING INFO FROM MY BLOGSITE
WE SEND OUR SOLDIERS TO AFRICA ON UN PEACE KEEPING MISSIONS-- WE KEEP WATCH WHILE WHITE JEWS STEAL
INDIA CONTRIBUTES THE HIGHEST SOLDIERS
AND OUR ELECTED PMs KEEP THIS A BIG SECRET---THAT OUR SOLDIERS HAVE THE HIGHEST MORTALITY RATE
THIS IS THE GREATEST DECEIT MY OUR PM MODI-- HE WILL NEVER TALK ABOUT THIS IN MANN KE BAAATH OR HIS TWITTER SITE -AS THIS WILL CRAMP HIS APCO STYLE OF MILKING VOTES, USING HIS FAALTHU ETHOS.
http://www.thehindu.com/opinion/blogs/blog-datadelve/article6547767.ece
CARBON DI OXIDE IS A GOOD GAS
MODI USED CHITPAVAN PRAKASH JAVEDEKAR AT PARIS COP21-- TOTAL CAPITULATION TO WHITE JEWS ..
MODI HAS AWARDED PADMA VIBHUSHAN TO TWO ROGUE GURUS -- SRI SRI RAVISHANKAR AND SADGUTU JAGGI VASUDEV
BOTH ARE PRETENDING TO BE GREAT ENVIRONMENTALISTS -- SUDDEN SPONTANEOUS KNOWLEDGE --LIKE SRUTI OF VEDAS ?
I CAN PUT THIS GRUESOME DUO THROUGH A THOUSAND ITEM EXAM-- BOTH WILL SCORE ZERO-- AND THIS INCLUDES INDIAs NGT
http://ajitvadakayil.blogspot.in/2016/04/most-potent-greenhouse-gases-nitrous.html
http://ajitvadakayil.blogspot.in/2016/12/arctic-ice-melt-and-methane-time-bomb.html
http://ajitvadakayil.blogspot.in/2016/06/methane-time-bomb-arctic-ice-meltdown.html
http://ajitvadakayil.blogspot.in/2017/05/nitrate-water-pollution-chemical.html
READ ALL 6 PARTS OF THE POST BELOW---
http://ajitvadakayil.blogspot.in/2017/05/ground-water-resources-of-india-capt.html
I AM NOT A PRETENDER-- FOR 30 YEARS I COMMANDED CHEMICAL TANKERS --WITH 100% KNOWLEDGE OF THE ENVIRONMENT AND ITS RULES
http://ajitvadakayil.blogspot.in/2014/06/ganga-manthan-cleaning-of-river-ganges.html
http://ajitvadakayil.blogspot.in/2014/03/vanishing-lakes-rain-water-harvesting.html
http://ajitvadakayil.blogspot.in/2014/05/interlinking-rivers-of-india-capt-ajit.html
http://ajitvadakayil.blogspot.in/2015/11/foam-froth-on-bangalore-lakes-capt-ajit.html
PUT THIS COMMENT IN THE WEBSITES OF PM, PMO, FOOD MINISTER, WATER MINISTER, ENVIRONMENT MINISTER, YOGI ADITYANATAH, I&B MINISTER, LAW MINISTER , CJI, SUPREME COURT BAR COUNCIL, ATTORNEY GENERAL, PRAKASH JAVEDEKAR, HOME MINISTER, DEFENCE MINISTER, FINANCE MINISTER
AND ALL DESH BHAKTS
capt ajit vadakayil
..
https://timesofindia.indiatimes.com/india/sc-slams-mamata-government-on-aadhaar-plea-says-state-cant-challenge-law-passed-by-centre/articleshow/61333732.cms
ReplyDeleteGOOD !
Capt,
DeleteThats just a technical point.... individual/ngo could file that pil.. will soon be ...
https://timesofindia.indiatimes.com/home/environment/pollution/centre-turns-to-sewage-eating-microbes-to-treat-ganga-water-at-54-new-sites/articleshow/61336579.cms
ReplyDeleteBE WARNED
GANGA DOES NOT NEE SEWAGE EATING BACTERIA LIKE OTHER RIVERS ON THIS PLANET...
GANGA HAS ITS OWN SELF CLEANING BACTERIA BUSTING BACTERIOPHAGES ....NO OTHER RIVER ON THIS PLANET HAS THIS UNIQUE LIVING CREATURES...THIS IS WHY GANGES IS A HOLY RIVER....
Bacteriophage, is a virus, any of a group of viruses that infect bacteria—it literally means “bacteria eater”
WHO IS GIVING PM MODI ALL THIS DEVASTATING ADVISE? .. HIS WHITE JEWS MASTERS IN ISRAEL?...
PROTECT GANGA AGAINST CHEMICAL ( FROM TANNERIES ) AND PLASTIC POLLUTION--THAT IS ALL THAT IS NEEDED...
Thousands of varieties of such phages exist, each of which may infect only one type or a few types of bacteria.... The nucleic acid may be either DNA or RNA and may be double-stranded or single-stranded...
During infection a phage attaches to a bacterium and inserts its genetic material into the cell. ..
After this a phage follows one of two life cycles, lytic (virulent) or lysogenic (temperate). .. Lytic phages take over the machinery of the cell to make phage components... They then destroy, or lyse, the cell, releasing new phage particles...
After the discovery of antibiotics in the 1940s it was virtually abandoned. With the ever increasing rise of anti-biotic resistant bacteria , phages will now command fresh attention..
More than 120 years ago there was a cholera outbreak in India and dead bodies were dumped in the upper river... Yet strangely Ganges water did NOT spread the cholera down the river . ...
Ganges is heavily populated with phages which multiply rapidly , travel fast and home in on targets ...
They are harmless to humans because they are strain specific. ... This means phages that infect the cholera bacterium can only infect the cholera bacterium and no other bacteria....
When a bacteriophage finds a bacterium with proteins which match its receptors, it can insert DNA or RNA into the bacterium and direct the organism to start producing replicas of the virus.....
Phages have been keeping keeping bacteria in check for three and a half billion years! Antibiotics have been around for a few decades are they are already failing to do their job.....
I ASK MY READERS - SPREAD THIS COMMENT LIKE WILD FIRE.. INDIA IS BEING RULED BY DESH DROHIS OR VERY IGNORANT PEOPLE...
http://ajitvadakayil.blogspot.in/2014/06/ganga-manthan-cleaning-of-river-ganges.html
WARNING--DO NOT INTRODUCE EXTERNAL BACTERIA .. THIS WILL KILL GANGA ....
capt ajit vadakayil
..
PUT THIS COMMENT IN THE WEBSITES OF PM, PMO, FOOD MINISTER, WATER MINISTER, ENVIRONMENT MINISTER, YOGI ADITYANATAH, I&B MINISTER, LAW MINISTER , CJI, SUPREME COURT BAR COUNCIL, ATTORNEY GENERAL, PRAKASH JAVEDEKAR, HOME MINISTER, DEFENCE MINISTER, FINANCE MINISTER--CM s OF ALL STATES THROUGH WHICH THE RIVER PASSES. ( LEAVE OUT THAT STUPID BONG WOMAN )
DeleteAND ALL DESH BHAKTS
Yup,you are right . This is how phages were discovered actually(in river ganga),even wiki admits it. Phages are the true antibiotics. Most of the phages research happened in Soviet Union so the west didn't take notice of this "communist science" but now they are in the wake of antibiotic resistant bacteria.
DeleteJi,
DeleteTo Ministry of Rejuvenation of Ganga River
Your Registration Number is : MINWR/E/2017/00910
Thanks
Namaskara!
DeleteIs there a possibility where we collect some water from Ganga and pour it into all other rivers and get these good viruses introduced to all rivers.
_/\_
Alupa raaja,
DeleteI don't think it will success as every water have it's own difference
I saw in Allahabad.....Yamuna and Ganga water don't mix with each other...u can see the colour difference....
Even u can see the difference in kanyakumari rock memorial.....bay of Bengal, Arabian sea, Indian ocean meets at this place but none of that mixes with each other
U can see green water on one side, blue on the other, white on the other
Even if u mix Yamuna and Ganga water in a bottle....after sometime u can see the two colour of water on one above....
Water didn't mixes as they have diff properties
Dear Captain,
Deletedone.
Your Registration Number is : PMOPG/E/2017/0574524
supremecourt@nic.in,
secy.inb@nic.in,
ravis@sansad.nic.in,
m.subbarayan@nic.in,
feedback-mha@nic.in,
mib.inb@nic.in,
minister.hrd@gov.in,
request-hrd@gov.in,
jscpg-mha@nic.in,
pstohrm@gov.in,
ppchaudhary@gmail.com,
wim-dfs@nic.in,
jsabc-dea@nic.in,
jsrev@nic.in
Sent to PMO:
DeletePMOPG/E/2017/0574663
http://annavonreitz.com/fulfordreport.pdf rothschild's new base cum casino is china .... they might try take over as world police [thief]man
ReplyDeletehttp://annavonreitz.com/vladimir.pdf
ReplyDeletehttp://annavonreitz.com/beingstupidpart8.pdf
ReplyDeleteROTHSCHILD TRIED TO FOOL HIS CREATION RELIGIONS ---VEERASHAIVA LINGAYTHS AND SIKHS INTO CREMATING THE DEAD..
ReplyDeleteSIKHS TURNED OUT TO HAVE EARTHY WISDOM--THEY TOLD THEIR CRYPTO JEW LEADERS "FUCK OFF "
LINGAYATHS BURY THEIR DEAD-- THEY ARE NO LONGER HINDUS.. THEY HAVE PUNISHED THEMSELVES AS THEIR SOULS ARE TRAPPED ON EARTH FOREVER.
http://ajitvadakayil.blogspot.in/2012/11/rip-impossible-with-burial-world-is.html
YOU DONT NEED TO CONVERT ANY MAN TO HINDUSIM--WE DONT HAVE A PROCEDURE
THE ONLY THING WHICH MAKES A MAN A HINDUS IS THE LAST OF THE 16 SAMSKARAS --CREMATION
IF A MAN "INTENDS" THAT HIS BODY MUST BE CREMATED WHEN HE DIES--HE BECOME A HINDU. THERE IS NO NEED TO WRITE IT IN HIS WILL. HE JUST NEEDS TO ENTRUST SOME WELLWISHER MALE
THE HOLY BOOK GURU GRANTH SAHIB WAS DECLARED BY JEW ROTHSCHILD AS THE LAST LIVING GURU ( ELEVENTH ) .
HE USED THIS BOOK IN THE HANDS OF A CRYPTO JEW SIKHS WEARING 5K ON THE BATTLE FIELDS OF WW1 AND WW2 --AS AN ORACLE--SIKHS WERE NAIVE AND GULLIBLE .
ALEXANDER THE GREAT , CONSULTED AN ORACLE AT DELPHI BEFORE HE CAME TO INDIA. THIS WOMAN TOLD HOMOSEXUAL ALEXANDER THE GREAT TO MARRY AN INDIAN WOMAN- OR HE WOULD DIE IN INDIA..
WHEN ALEXANDER MARRIED ROXANNA , HIS HOMO GREEK MALE ANAL SEX PARTNER ( ALEXANDER WAS RECEIVING US THE ASSHOLE ) WAS VERY ANGRY.
http://ajitvadakayil.blogspot.in/2010/05/alexander-great-and-king-porus-hidden.html
VEERASHAIVA LINGAYATHS HAVE DECLARED THEY ARE NOT HINDUS-- SORRY, WE DONT WANT THEM IN SANATANA DHARMA.
http://ajitvadakayil.blogspot.in/2015/04/cp-brown-and-yogi-vemana-capt-ajit.html
SIKHS HAVE WIND IN THEIR EARS--THEY CRY--OUR HERO MAHARAJA RANJITH SINGH COULD NOT BE DEFEATED BY THE BRITISH-- TEE HEEEE- THAT IS BECAUSE ROTHSCHILD HAD A TREATY WHERE HE USED RANJITH SINGHs SIKH KINGDOM AS A BUFFER
http://ajitvadakayil.blogspot.in/2013/02/maharaja-ranjit-singh-rise-and-fall-of.html
MARATHA MANOOOS LEADERS HAVE WIND IN THEIR EARS--THEY BOAST-- WE FUCKED THE MIGHTY SIKHS
SORRY-- PESHWAS WERE CRYPTO JEWS--CREATED/ ARMED / FUNDED BY JEW ROTHSCHILD ( JUST LIKE ISIS )
THE WHITE BRITISH SOLDIER NEVER FOUGHT AGAINT MUGHALS -- TRUTH IS STRANGE--- THEY USED MARATHAS , LED BY CRYPTO JEW ( CHITPAVAN ) PESHWAS--AS A CURRY LEAF--USE AND DISCARD .
WITHOUT ROTHSCHILD SUPERIOR LONG RANGE GUNS, MARATHAS COULD HAVE NEVER FUCKED THE MIGHTY SIKHS
http://ajitvadakayil.blogspot.in/2013/07/unknown-history-of-sikhs-and-sikhism.html
THE BR AMBEDKAR CLAN MAHARS MUST KNOW-- THEY FOUGHT BETTER THAN SIKHS IN WW1 AND WW2-- ROTHSCHILD DID NOT USE THEM IN HIS PHOTOS--BECAUSE THEY WERE NOT PHOTOGENIC ENOUGH
http://ajitvadakayil.blogspot.in/2015/10/the-only-dalit-freemason-of-india-capt.html
THE INITIAL KHALISTNAI LEADERS WERE ALL CRYPTO JEWS WEARING 5K
GURU GRANTH SABIB WAS COMPLIED BY A WHITE ROTHSCHILD AGENT JEW MAX ARTHUR MACAULIFF- -- WEARING 5K-- HE PACKED THE BOOK WITH FAKE DASA VERSES ..
DASAS NEVER EXISTED--THE BHAKTI MOVEMENT NEVER EXISTED --HINDUS BELIEVED IN SHRADDHA --NOT BHAKTI .
capt ajit vadakayil
..
Lingayats who read your blogs.
DeleteWill one day cremate the dead.
This the power of this blog.
https://twitter.com/realDonaldTrump/status/925005659569041409
ReplyDeleteDONALD TRUMP
LISTEN UP
DO NOT BE DEFENSIVE AGAINST ROTHSCHILD AGENT GERMAN JEW ROBERT MUELLER
BE ON THE OFFENSIVE
DECLARE HIM "PERSONA NON GRATA "--HE IS UNFIT TO HEAD AN INVESTIGATION, AS HE IS ON THE SIDE OF HILLARY AND THE TRAITOR ESTABLISHMENT SWAMP
China trying to divert water off brahmaputra river
ReplyDeleteNAVIKA KUMAR OF TIMESNOW TV-- SAYS GHULAM ALI IS AN INDIAN AND WE LOVE HIM
ReplyDeleteSORRY BABY NAVIKA -- HE IS A RABIDLY ISLAMIC PAKISTANI CITIZEN
WE HAD A INDIA PAKISTAN SINGING CONTEST HOSTED BY BONEY KAPPOR
GHULAM ALI GAVE FULL MARKS TO A PAKISTANI SINGER WITH A TOTALLY CRACKED THROAT
AT THAT TIME ASHA BHONSLE ASKED "WHAT THE HELL IS GOING ON--HIS THROAT IS CRACKED"
GHULAM ALI DARES BACK " I GAVE HIM FULL MARKS IMAGINING HIS THROAT IS NOT CRACKED".. IT WAS A TOTAL FARCE
BASTARD
THE MC WAS AYESHA THAKIA
THOUGH AYESHA IS INDIAN --WE GOT THE FEELING THAT THIS MUSLIM WOMAN IS ON PAKISTANs SIDE--WHOLE SALE . HER HUSBAND IS RABID MUSLIM SP POLITICIAN ABU AZMIs SON
THREE MUSLIM JUDGES TWO FROM PAKISTAN ( ATIF ASLAM / ABIDA PARVEEN ) AND ONE ( RUNA LAILA ) FROM BANGLADESH WERE RABIDLY MUSLIM
UPSTART ATIF ASLAM WAS ALL THE TIME TRYING TO INSULT ASHA BHONSLE -- YET SHE KEPT HER COOL.
ATIF ASLAM CANT SING WITHOUT ELECTRONIC MIKES BOOSTING HIS VOICE BOX FLUTTERING ( malayalam thooval adi--feather flutter )
HE IS NOT EVEN A SINGER
IN THE FINALS -- THE INDIAN SINGER SHOULD HAVE WON-- BUT THE PRIZE WENT TO A PAKISTANI .
THIS PAKISTANI BOY SANG WELL , BUT THE INDIAN WAS BETTER
SEND THIS TO NAVIKA BABYs WEBSITE
capt ajit vadakayil
..
MAHIRA KHAN IS NO LONGER THE FRESH FACED PAKISTANI BEAITY
DeleteNOW SHE WEARS WAR PAINT ON HER FACE --LOOKS LIKE A SUCKED OUT MANGO
http://ajitvadakayil.blogspot.in/2012/08/truck-art-of-pakistan-capt-ajit.html
Respected Captain Vadakayil
ReplyDeletehttp://www.insightsonindia.com/2017/10/30/upsc-civil-services-mains-exam-2017-general-studies-paper-1-question-paper/
http://www.insightsonindia.com/2017/10/30/upsc-civil-services-mains-exam-2017-general-studies-paper-2-question-paper/
It seems you have started making an impact on UPSC question papers too. here is one such question from GS papers of UPSC mains 2017 exam:
Q. “Inspite of adverse environmental impact, coal mining is still inevitable for development”. Discuss
Q. Is the National Commission for Women able to strategize and tackle the problems that women face at both public and private spheres? Give reasons in support of your answer.
no questions on Gandhi, Ambedkar etc this time around.
https://timesofindia.indiatimes.com/india/kerala-love-jihad-case-consent-of-the-girl-is-important-says-supreme-court/articleshow/61335510.cms
ReplyDeleteThe conversion mafia is Kerala is more powerful than the Beggar's Mafia. Remember the case of Govindachamy!
In the case of Akhila, the Kerala HC became suspicious when the Jihadis produced a quick marriage certificate in court just to avoid court proceedings. The HC promptly annulled the marriage. But as per court orders, she has the freedom to live as per islam, actively practicing that cult.
The full story goes like this. Akhila like any other teenager from an average family, wants to pursue a higher degree. She joined a Homoeopathy College at Salem. Her roomate in the hostel influenced and brainwashed her into embracing Islam.
Her father submitted a petition during the month of January 2016 alleging the illegal detention of her at Saibana’s house. The division bench of Justice CK Abdul Rahim and Justice Shaji P Chaly reviewed the petition and dismissed the same. Again in August 2016, her father filed a habeas corpus petition with the Kerala HC. The petition was heard by a bench comprising of Justice Surendra Mohan and Justice Abraham Mathew.
In September 2016, Akhila filed a petition stating that having heard about the teachings of Islam from her roommates, she attended a course at Satyasarani and had become Muslim by conversion. She refused to accompany her parents and maintained that Saibana's father Aboobacker was her guardian. The bench after conducting the investigations, suggested Akhila should move out of her current premises and continue her residential internship to practice Homeopathic Medicine. The bench was of the suggestion that completing her course would provide Akhila a better direction rather than pursuing her faith in Islam. This order was passed on 19th December 2016. But in a surprise turn of events, Akhila appeared before the court with a complete stranger by name Shafin Jahan on 21st December 2016 and provided evidences for completion of her marriage as per Muslim religious rites. They said that the marriage was performed by the Khazi of Puthoor Juma Masjid in the presence of relatives of both family
https://www.youtube.com/watch?v=xG4sUahVBps
ReplyDelete
DeleteASHA BHONSLE AND OP NAYYAR MADE FANTASTIC SONGS --WHICH THE SANDS OF TIME CANNOT ERODE
https://www.youtube.com/watch?v=lUWbc5MaTI0
DURING OUR LAST OLD ALUMNI MEET , CHITRA SANG THIS SONG-- IT POURED COLD WATER OVER US .. I OBJECTED LOUDLY
http://ajitvadakayil.blogspot.in/2011/08/old-alumni-meet-kendriya-vidyalaya-no-1.html
THIS IS A OP NAYYAR / ASHA BHONSLE SONG
MUSIC COMPOSER / DIRECTOR OP NAYYAR AND SINGER ASHA BHONSLE CREATED THE BEST LOVE SONGS — ALL KNEW SOMETHING WAS GOIN’ ON BETWEEN THEM. YOU CANT CREATE CLASSIC JUST LIKE THAT
THEIR LOVE SONGS TUGGED AT HEART STRINGS !
When Asha’s talent was not recognized by anybody in Bollywood, Nayyar recognized her potential and gave patronage to her. He was the composer who first gave Asha her own distinct identity.
Nayyar first met Asha in 1952, at the music recording of Chham Chhama Chham. He first called her for a film called Mangu (1954)
They split on August 5, 1972. It is not clear what made them part their ways.
On being asked the reason for their parting, O P Nayyar once said, "I know astrology very well. I knew that one day I had to part with her. Something also happened, that upset me, so I left her." Nevertheless, he also said "...now that I am seventy-six, I can say that the most important person in my life was Asha Bhosle. She was the best person I ever met."
The parting of Asha Bhosle and O.P. Nayyar was bitter, and probably therefore she has hesitated to give Nayyar his due.
While talking about O.P. Nayyar in an interview with The Times of India, she once remarked - "Whichever composer gave me work, it was because my voice was suited to his music at that point. No one musician did me any favor by asking me to sing for him."
The two split in 1972. Prior to that, they had recorded this song “Chain se humko kabhi aapne jeene na diyaa”.
The records of this song became popular even before the movie was released. In fact, the song became so popular that the Filmfare magazine chose Asha Bhonsle as the Filmfare female playback singer of the year for their 1974 awards function.
O P Nayyar did not have too many friends left in the film industry-out of sheer jealousy as he lived a VERY flashy lifestyle .
Now that he was estranged from Asha Bhonsle too, Asha Bhonsle used her clout with the makers of the movie to get this song deleted from the movie though the song was already picturised on Rekha and had got quite popular.
By public demand this heart rending song could NOT be trashed.
Asha did not attend the Filmfare awards ceremony, though O P Nayyar did.
OP Nayyar accepted the award on her behalf.
While returning back from the award function with the lyricist S H Bihari, O P Nayyar tossed the award out of the car and heard it break.
Needless to say,this was the last song of Asha Bhonsle under O P Nayyar’s music direction.
https://www.youtube.com/watch?v=a5BCzMrdE5U
chain se hamko kabhi aapne jeene naa diyaa
zahar bhi chaahaa agar, peenaa to peene naa diyaa
( YOU HAVE NEVER ALLOWED ME TO LIVE IN PEACE
I WANTED POISON , YOU DID NOT ALLOW ME TO CONSUME IT )
capt ajit vadakayil
..
https://www.youtube.com/watch?v=Z5-cy5Brd0c
DeleteTHIS IS ABHIJEETs VOICE -- AN EXCELLENT SINGER
THIS IS VIBHAVARI APTE--AN UNKNOWN SINGER
https://www.youtube.com/watch?v=vPPSangaJ-4
CHITRA SAND THIS SONG AT OUR OLD ALUMNI MEET --AND IT POURED COLD WATER OVER OUR COLLECIVE HEARTS.
I OBJECTED LOUDLY
http://ajitvadakayil.blogspot.in/2011/08/old-alumni-meet-kendriya-vidyalaya-no-1.html
Lyrics translated to English, as 80% of my readers are foreigners.
sweetheart come, take me in your arms -- we may never have such a lovely night again — we may never get such a chance in this lifetime — come into my arms — we are indeed fortunate to have this timeless moment — let us gaze at each other to our hearts contents — come to me sweetheart, let me cry once again in your arms — for I know not, when my tears of love will ever flow again--
AIYYOOOOOOOOOOOOOO
MODERN SONGS ALL ALL BULLSHIT --THE GOLDEN ERA IS GONE----
GONE GONNAY GONNE
#########################################
I ASK MY READERS --WHOSE VOICE HAS MORE EMOTION -- MALE ABHIJEETs OR FEMALE VIBHAVARIs ?
########################
MEN TAKE LONG TIME TO GET OVER AN AFFAIR-- FOR FEMALES IT IS LIKE FARTING-- THEY JUST MOVE ON
capt ajit vadakayil
..
NEVER PUT A YOUTUBE VIDEO WITHOUT TELLING WHAT IT IS
DeleteATIF ISAM IS NOT A SINGER
HE LABOURS HARD OVER HIS VOICE BOX FLUTTERING--WHICH COMES NATURAL TO GOOD SINGER
ONCE ABHIJEET HAD TOLD THIS ON TV .. HE SAID ATIF ASLAM CANNOT SING WITHOUT ELECTRONIC PROCESSING OF HIS VOICE
THE MUSLIM LOBBY KEPT ABHIJEET OUT OF BOLLYWOOD . HE IS AN EXCELLENT SINGER
MY CREW USED TO FORCE ME TO SING THE SONG BELOW--ABHIJEET VERSION
https://www.youtube.com/watch?v=QSjtKrZwVIQ
Suchitra ni is so beautiful ! God bless her always
DeleteMahesh bhatt has started Pakistani singers in Bollywood and this is era when Sonu nigam, udit Narayan, Kumar Sanu, Abhijeet, Shreya ghosal, Alka yagnik has been sided from Bollywood
DeleteEven if anyone in India play antakshiri......90% of the song sang will be classic.....no one remembers the lyrics or tunes of this crap new songs
Captain,
DeleteJust listen Abhijeet song CHAND TAARE TOD LAAYU, SAARI DUNIYA PAR MAI CHHAHU...BAS ITNA SA KHWAAB HAI
it will touch ur heart
Shrikant Agarwal
DeleteMahesh Bhatt is a converted Muslim he keeps Hindu name to fool people.
David Headlee lived in his house when David had came to Mumbai for doing photography/videography of different places in Mumbai which were planned to b attacked on 26/11 & were attacked.
Mahesh Bhatt was also present on the stage with Congress politicians when the book 26/11 RSS KI SAAJISH was launched to build the fake narrative of Hindu terror.
The whole Nexus is huge
In one of my replies on BlockChain series Part 7 where Captain had written Y Pakistan celebrated on Ahmed Patel victory there I hav written about the whole Nexus which exists.Y can see my reply their .
Thanks
I RESPECT SARDAR PATEL AS THE BUILDER OF MODERN INDIA. HE HAS BALLS
ReplyDeleteHE HAD THE BALLS TO SAY THAT GANDHI IS THE WHITE INVADERs AGENT
BR AMBEDKAR HATED GANDHI
WHEN GANDHI DIED PRESS WENT RUNNING TO AMBEDKAR FOR A SOUND BYTE--
AMBEDKAR SAID " THANK GOD THE ECLIPSE HAS LIFTED FROM INDIA"
BECAUSE HE SAID THIS --I WILL NOT REVEAL CERTAIN DAMAGING THINGS ABOUT AMBEDKAR
AND BECAUSE ROTHSCHILD DID NOT GIVE GANDHI NOBEL PEACE PRIZE-- I WILL NOT REVEAL THE MOST DAMAGING PARTS ABOUT HIM.
http://ajitvadakayil.blogspot.in/2013/04/razakers-of-mim-operation-polo-to-annex.html
DEAD MEN TELL NO TALES-- GANDHI WAS KILLED BY A 4TH BULLET
GANDHI WAS BITTER LIKE ANNA HAZARE --TOTALLY SIDELINED AFTER INDEPENDENCE
Hi Captain,
DeleteOnce u said Sardar Patel was also a Rothschild Jew agent like Gandhi,Nehru,Ambedkar.
But I think no matter what Sardar Patel was a Man of Steel he integrated 565 princely states into Indian Union,half of Punjab,Kashmir & West Bengal which we hav with us at present,is also becoz of Sardar Patel .
& People should also remember Sardar Patel on January 1948 in his speech at Kolkata Maidan,he raised a valid question & said Y did majority of Muslims who voted for Muslim League didn't went to Pak after Partition, why did Heart & mind of Muslims all of a sudden changed???
Thanks
https://economictimes.indiatimes.com/news/defence/china-doing-rehearsal-for-an-ambitious-project-to-divert-brahmaputra-waters/articleshow/61338571.cms
ReplyDeleteLooks like Xi is more and more misguided into bullying India!
Himalayas are a part and parcel of Indian culture. The Himalayan ecosystem is crucial for all South East Asian Nations. At any cost, all Indians must unite chase and drive the dragon away from the Himalayas, beyond the Tibetan Plateau
https://rightlog.in/2017/10/gandhi-no-mahatma-01/
ReplyDeleteGandhiji was totally snubbed by every one after the 1946 Navy mutiny. Nobody listened to his evangelical speeches. This had totally frustrated him and eventually became an attention seeker.
Read the Quotes in the above link and decide if you still wish to call him a Mahatma
OROP PROTESTS ARE NOW LED BY KHALISTANI AGENTS
ReplyDelete95% OF THE PEOPLE IN THE ARMY NEVER RISKED THEIR HIDES--EVEN AN IOTA
NAVY AND AIRFORCE RISKED EVEN LESS
I WORKED IN A MOST DANGEROUS AND MERCILESS FIELD EVERY SINGLE DAY -- YET I DONT BOAST ABOUT IT LIKE THESE OLD PUFFED UP RETIRED ARMY OFFICERS
Hi Captain,
DeleteThat is so true about these continuing OROP protests. The pensions for Armed Forces in India is quite generous. I myself come from a family with many retired military officers who themselves are a bit surprised at the generosity of the Indian Govt. A retired Brigadier gets nearly one lakh rupees pension per month which is quite good if they live in a smaller town or village.
And this pension is for life.
Most officers are quite happy with this but it's the Khalistan brigade which somehow wants more and more always. Their greed is endless.
Regards
https://www.washingtonpost.com/world/asia_pacific/the-place-where-communists-can-still-dream/2017/10/26/55747cbe-9c98-11e7-b2a7-bc70b6f98089_story.html?utm_term=.7faef0700889
ReplyDeleteOn the occasion of the 100 years of Bolshevik October revolution, the International Communists have discovered the system existing still in Kerala. Today, there are just 5 nominally communist nations in the world. In Cuba, the revolution survives as a decrepit museum piece. The autocratic forms of RED capitalism prevails in China, Vietnam and Laos. In North Korea, it has become a nuclear-armed cult of personality and police state.
Washington Post and New York Times are known as the mouth pieces of Liberal Democrats. According to the newspaper, the here of Communist revolution is the Finance minister Mr Thomas Isaac and not the CM
JNU STUDENT AND KERALA FINANCE MINISTER T.M. THOMAS ISAAC IS BEING WATCHED
DeleteCM PINARAYI VIJAYAN HIMSELF WILL SOON FRY THIS FELLOWs BALLS
He is a central committee member of the Communist Party of India (Marxist).
He is divorced from his wife-- JNU student Nata Duvvury
His daughter Sara is married to a German Jew Max, son of Dr. Frank Mecklenburg of Rothschild founded Leo Baeck Institute
The Leo Baeck Institute is an international research institute with centres in New York City, London and Jerusalem that are devoted to the study of the history and culture of German-speaking Jewry
WE ARE NOT IDIOTS !
DONALD TRUMP
ReplyDeleteLISTEN UP
CHARGE ROBERT MUELLER FOR "OBSTRUCTING JUSTICE" AND MISLEADING THE NATION
PUT HIM ON THE BACKFOOR
DECLARE HIM "PERSONA NON GRATA "
CHARGE THAT HE IS DELIBERATELY GOING AFTER CHAFF AND NOT THE GRAIN
ASK WHY MUELLER DOES NOT ADDRESS THE CRIME OF HILLARY DELETING HER EMAILS --SOME OF THEM FROM JEW ROTHSCHILD
https://timesofindia.indiatimes.com/world/china/china-plans-to-divert-brahmaputra-waters-to-its-xinjiang-region-through-1000-km-long-tunnel/articleshow/61346091.cms
ReplyDeleteRespected ajit sir
ReplyDeleteUS Judge Blocks Trump Ban on Transgenders Serving in Military.
https://sputniknews.com/us/201710301058671021-us-block-trump-ban-transgender/
Thats pathatic.....he should arrest those judges.
Sir please resume blogging.....we are waiting for sanatan dharama serious...it should go to 1008.
Regards
Gunjan Arya
ONE TRANSGENDER NAMED CHELSEA MANNING SCREWED USA
DeleteYOU CANT TRUST HORMONE DRIVEN HIJRAS WITH NATIONS SECRETS
https://en.wikipedia.org/wiki/Chelsea_Manning
https://m.facebook.com/story.php?story_fbid=10212640463398710&id=1598988153 this man calles Advani a Trojan horse also hints at avb
ReplyDeleteCII president was talking of promotink Blockchain to bring in transparency on DD talk show
ReplyDeleteHello Captain,
ReplyDeleteMy brother has moderate/severe diabetic retinopathy, would isotine eye drops be suitable to help him with this condition?
Hi Captain,
ReplyDeleteCould you enlighten us about the Nagaraja temple in Mannarsala? Also, why are snakes worshipped as Gods? Can they bless or curse?
http://ajitvadakayil.blogspot.in/2012/07/king-cobra-and-snake-temples-of-kerala.html
Deletenamaskhar captain. This comment is for the readers, request the readers to educate yourselves to reach higher self of your atma. Please do not disturb captain with all your petty things complaining like small children. Many times captain requested us to use our conscience. Please use it and apply it in all modes of life. There is no use of captain writing blogs when we cannot practice a single teaching from it. Captain is doing a greatest service to humanity in saving the planet from all ends. he has to waste his precious time on petty things. It takes lot of mental and physical energy to be always on the edge the seat. Readers please behave yourselves as a true indian by heart. Lets us take the country forward to higher realms. People have been stabbing bharatmata from all sides and we need to stand firm to attack. do not show your weakness as this what the whites are using the power of divide and rule. Lets all unite and serve our country bharathmata which is marching towards being superpower. We should be thankful to captain in showing us the true teachinhs of sanatana dharma. Let us apply the valuez in our daily life for our future generations.
ReplyDeletehttp://indianexpress.com/article/india/coal-burying-goa-after-road-and-rail-river-at-risk-as-coal-floats-by-mormugao-port-pollution-4914699/
ReplyDeleteBlack coal dust along transport corridors and "white powders" on its beaches..
Saw on telly "run for unity ".. Twenty thousand participated ...Do such events actually make an impact?Or just optic bubblegums.
ReplyDeleteALL THESE MARCHES AND RUNS ARE FOR PROPAGANDA
DeleteWHEN A COUPLE OF WHITE JEWS WERE KILLED IN PARIS CM FADNAVIS RAN LIKE USAIN BOLT AND LIT OF VT STATION IN FRENCH COLOURS-ALBEIT UPSIDE DOWN
JEWESS MERKEL ( WITH HITLERs CHIN AND EYES ) LED A MILLION STRONG CHARLIE HEBDO MARCH ALONG WITH NETANHAYU AND JEW SARKOZY..
THIS MARCH WAS A LIE--USING PHOTOSHOP TRICKS
WANNA SEE A REAL PHOTO?
IN THE POST BELOW--JUST SEE A PHOTO WHERE ALL JEW LEADERS HAVE LINKED THEIR ARMS TOGETHER OF THE STREET --LEADING A MILLION PEOPLE BEHIND THEM
ACTUALLY THE PEOPLE BEHIND THEM WERE ONLY TWO HUNDRED ( OST POLICE AND SECURITY ) .
YOU CANT COUNT THEM
I WANT ALL MY READERS TO SEE THIS PICTURE
WHITE JEW READERS THRIVE ON DECEIT.
http://ajitvadakayil.blogspot.in/2015/11/the-french-revolution-conceived-and.html
https://www.sciencedaily.com/releases/2017/10/171030134625.htm
ReplyDeleteThe common practice of growing influenza vaccine components in chicken eggs disrupts the major antibody target site on the virus surface, rendering the flu vaccine less effective in humans.
Hi Ajith
ReplyDeleteWhile I always thought you had some intuition, but you appear to misread the river linking thingy of Modi. It is being done exactly because Brahmaptra may be cut off before reaching India by the zionist Chinks and so the other Indian rivers like Yamuna and wasted Ganga water going to Bay of Bengal will be diverted to save Assam.
Modi has always been ahead of China. Others like Jaggi and 3Sri are only trying to grab limelight and divert from main issue.
INDIA IS A PENINSULA
DeleteA LIMITED AMOUNT OF RIVER WATER MUST FLOW TO THE SEA-- TO PREVENT SALT WATER INGRESS INTO COASTAL AQUIFERS
- AND TO PROVIDED ABUNDANCE OF FISH IN COASTAL AREAS
Hi Captain,
ReplyDeleteI just saw a documentary called 'What the health' and they were making some interesting points. Are the following statements true ?
- Meat is a bigger culprit in causing diabetes in america than sugar
- All dairy products are bad for you. Casomorphin from diary products could cause SIDS, autism in kids
- Fish is also bad for you because they could have PCBs, mercury, saturated fat and cholesterol. Pesticide or herbicide bio-accumulate in the fish flesh
- Low fat vegan diet is the best
Please clarify this for me Captain.
Thanks,
Hari
https://timesofindia.indiatimes.com/world/rest-of-world/tokyo-police-arrest-man-find-multiple-bodies-in-apartment/articleshow/61353814.cms
ReplyDeleteJAPAN HAS A SUICIDE AND SEXUAL PERVERSION PROBLEM
THEY HIDE IT
IT SHOULD BE ADDRESSED
JAP WOMEN DONT WANT TO MARRY ANY MORE-- AS THEY HAVE BEEN RAPED IN THEIR YOUNG AGE
http://ajitvadakayil.blogspot.in/2013/05/fumaroles-for-free-energy-and-hydrogen.html
http://ajitvadakayil.blogspot.in/2010/05/hibernation-with-hydrogen-sulphide-gas_9313.html
http://ajitvadakayil.blogspot.in/2017/02/the-bushido-code-of-samurai-capt-ajit.html
http://ajitvadakayil.blogspot.in/2011/08/netaji-subhash-chandra-bose-untold.html
FAKE JAP HONOUR !
Added Ganga information as Feedback.
ReplyDeleteFeedback is submitted successfully
We shall revert to you though an email within 7 days.
Ji,
ReplyDeleteWe have already done Mars travel - Is interstellar travel beyond exosphere with live humans (leaving limits of age) is possible in future with time limitation and wormhole ? Do our purana's says any thing? If in outer space the atmosphere is needed to find a stars/planet/comets is it possible we see them if it has negligible atmosphere and does not reflect light (almost 0%) - how can we avoid clash ?
Thanks
https://timesofindia.indiatimes.com/city/delhi/2-groups-of-africans-go-on-rampage-at-hospital/articleshow/61349650.cms
ReplyDeleteTHERE ARE THOUSANDS OF MUSLIM AFRICANS IN INDIA
THEY HAVE BURNT THEIR PASSPORTS
MOST ARE STREET DRUG COURIERS
THE WOMEN PROVIDE SEX AND COOK FOR THEM
THEY COME OUT ONLY AT NIGHT -- AS IN DAYTIME HIDDEN SECURITY CAMS CAN IDENTIFY THEM
RAHUL GANDHI AND YEHURY WANTS TO GIVE MUSLIMS ROOHINGYAS REFUSE IN INDIA
HEY--WHY DISCRIMINATE THESE BLACK AFRICANS
LET US GIVE THEM REFUSE AND ALSO A RAJYA SABHA SEAT
WE GAVE REFUGE TO PARSIS--WHAT HAPPENED ?
WHY DID JEW ROTHSCHILD KNIGHT 65 PARSIS ? FOR PRAYING ALONG WITH HIM ?
EVEN TODAY PARSIS REFUSE TO INTEGRATE INTO INDIAN SOCIETY.
IN OPEN COMPETITION NO PARSI CAN WIN ANY COMPETITION MENTAL OF PHYSICAL --YET THEY GET "SPONSORED " LIKE JEWS
ADI GODREJ--RIDICULED "HINDU RATE OF GROWTH"
I KNOW HOW ROTHSCHILD GAVE LAND TO HIS AGENT PARSIS ..
http://ajitvadakayil.blogspot.in/2010/11/drug-runners-of-india-capt-ajit.html
BEFORE ROTHSCHILD CAME TO INDIA--PARSIS WERE CONSIDERED GOOD ENOUGH ONLY TO BE RADDHIWAALAS.
https://www.youtube.com/watch?v=z60cGKI99rM
WATCH THE YOUTUBE VIDEO ABOVE
capt ajit vadakayil
..
PUT ABOVE COMMENT IN PMO, PM MODI, HOME MINISTER, DEFENCE MINISTER, LAW MINISTER , CJI , FINANCE MINISTER, YOGI ADITYANATH, I&B MINISTER, EDUCATION MINISTER AND DESH BHAKT LEADERS
DeleteDear Captain,
Deletedone.
Your Registration Number is : PMOPG/E/2017/0574574
supremecourt@nic.in,
secy.inb@nic.in,
ravis@sansad.nic.in,
m.subbarayan@nic.in,
feedback-mha@nic.in,
mib.inb@nic.in,
minister.hrd@gov.in,
request-hrd@gov.in,
jscpg-mha@nic.in,
pstohrm@gov.in,
ppchaudhary@gmail.com,
wim-dfs@nic.in,
jsabc-dea@nic.in,
jsrev@nic.in
https://timesofindia.indiatimes.com/entertainment/hindi/bollywood/bikini-babe-tanishaa-mukerji-soaks-some-sun-in-goa/photostory/61353132.cms
ReplyDeletePAID NEWS
NO MATTER HOW MUCH SOME OF THESE STARLETS PAY MONEY TO ADVERTISE THEMSLEVES
THEY WILL NOT GET A ROLE
TANISHA MUKHERJEE-- AGE 40-- BARREN
https://m.timesofindia.com/india/make-in-india-projects-come-undone/articleshow/61349989.cms
ReplyDeleteUndone as no kickbacks??Or just beurocratic cussedness?
Captain,
ReplyDeletePlz clarify the motive of govt
Ongc has acquired hpcl....
Hpcl is acquiring Mangalore refinery to become 2nd largest oil refinery in India
BJP spokesman sambit patra is one of the director in ongc now
Why govt is merging all small PSU banks into large
Why govt is merging oil companies
Why govt is divestment PSU companies
Is it good for this companies in future
This is strategic disinvestment
DeleteIn this section gov shares stake with private corporate company through market exchange rate.
Some part such management ,coordination functions, quality management are given under control of private share holding
But its not privatisation still these public sectors are fully under control of gov.
Consolidated into a big company all those companies can be easily handed over to a foreign power in one go
DeleteConsolidation is better for PSU Oil Industries. They will survive that way. Earlier, Arun Shourie wanted to destroy PSU Oil companies in favor of Reliance. He wanted to give away the Pipeline section to Reliance. He also introduced an accounting system thru KPMG consultants which would reduce the Book value of companies to the minimum (it decided value of machineries based on their weight !!!).
DeleteA consolidated Oil Industry can better compete in international bidding as PQC (pre-qualification criteria) asks for turnover. profit and how much expertise the company have in different technical fields.
Sir,
ReplyDeleteSee this they are saying burning wood to cook food is the cause for death.
https://www.ndtv.com/india-news/new-study-shows-which-pollutant-killed-most-indians-in-a-year-1769126?pfrom=home-lateststories
COME HELL
DeleteCOME HIGHWATER
MODI WILL IMPORT GAS FROM KOSHER COMPANIES IN USA
IN KERALA THERE IS SO MUCH FIREWOOD THAT WE DONT KNOW WHAT TO DO WITH 90% OF IT
Why dont you use firewood for cooking and water heating purpose ? Instead of using LPG which releases nano fine particles you can use this firewood . Your readers will ape you religiously
DeleteModi is importing gas because people like you who dont want to use traditional methods. Modern Lifestyle modern diseases
Also Kosher companies in USA are selling gas at cheaper prices than Kosher companies in middle east .So whats the problem ?
LPG and CNG have made hell indian cities especially ncr and delhi .
DeleteSpecially lpg and CNG vehicles are more dangerous than cooking gas
Deletehttp://www.timesnownews.com/entertainment/article/mersal-row-shatrughan-sinha-favours-vijay-says-demonetisation-was-a-mistake/116002
ReplyDeleteShatrughan Sinha says ‘Demonetisation was a mistake’
Why dont bjp throw this idiot out of the party ?
HIS PATHETIC DAUGHTER WAS SITTING IN THE FRONT ROW OF AIB ROAST- AND GUFFAWING LIKE A DONKEY WHO HAS SEEN FRESH SHIT FOR EVERY DIRTY ANAL SEX JOKE
DeleteSir,
ReplyDeleteI played all the solfegio frequencies on a speaker and then standing in front of it inhaled largely and tightened all my muscles of the body and then after holding my breath and my tightened muscles I afterwards released both the breath and the tightened muscles and suddenly my senses got loose I started feeling dizzy and my ears started ringing and the sounds from the speaker pinched or say started squeezing my senses to the upper most part of my head and I felt as if I am going to loose control of my body and walking 2-3 steps to the speaker I paused it by the space bar on my laptop and all these things suddenly stoped and I came out normal again I never told anyone this because I felt it is type of stupidity which I did but if there is something related to this can you please tell if you know something related or abut this?
Bacon27...
DeleteThat is a vaso-vagal syncope!! You just hyperventilated and held your breath.
Such games can cause death if no attendant or friend is around to observe.
Captain has put many vidoes of such breath-holding games in older posts.
Please go through those and google "breath-holding games". It is not the frequency but the stupid game.
Stay away from it and NEVER DO ALONE.
Thankyou
Deletehttp://ajitvadakayil.blogspot.in/2017/10/blockchain-smart-contracts-part-8-capt.html
ReplyDeleteREAD ABOUT HASHGRAPHS
PUT THIS COMMENT IN THE WEBSITES OF -
CM OF ANDHRA NAIDU
CM OF TELENGANA KCR
FINANCE MINISTER
PMO
PM MODI
LAW MINISTER
EDUCATION MINISTER
I&B MINISTER
ASK FOR AN ACK
capt ajit vadakayil
..
https://www.popsugar.com/news/JK-Rowling-Responds-Trump-Hillary-Clinton-Tweet-Oct-2017-44197050
ReplyDeleteONLY HALF WITS READ JK ROWLINGs BOOKS
##############
ALL HER READERSHIP AND SALES IS HYPED UP--SHE DOES NOT HAVE 40% OF THIS BLOGSITEs READERSHIP
450 million: Number of Potter books sold worldwide ( SIC )
73: Languages in which books are available
##################
https://www.blogger.com/profile/14410812789424637654
MY PROFILE VIEW IS 365 MILLION- ASSUMING PEOPLE WHO CLICKED READ ONLY ONE POST ( OUT OF 1259 ) . PEOPLE CLICK ON PROFILE ONLY ONCE JUST TO SEE WHO THIS FOUL MOUTHED FELLOW IS .
HER BOOK TRUCKS GET HIJACKED ON LONDON STREETS BY SCREAMING TEENAGERS
BAAAP RE !
BRAAAAAAAAAAAAYYYYYYYYYYY !!
PUT THIS COMMENT IN JK ROWLINGs WEBSITE . ASK HER IF SHE KNOWS WHO BUILT THE STONEHENGE -- OR WHO THE DRUIDS ARE --OR HOW MANY SNAKES ST PATRICK DROVE AWAY
Capt ajit vadakayil
..
What is your estimation of Agatha Christie? She is acknowledged as the creator of all time highest selling detective fictions. The number of her books sold are second only to the Bible. She has been moderately criticised for her "anti-semitism" in earlier novels, which she "corrected" in her later works.
Deletehttps://timesofindia.indiatimes.com/sports/badminton/days-of-lin-dan-and-lee-chong-wei-dominating-are-over-kidambi-srikanth/articleshow/61359867.cms
ReplyDeleteJAI JAI KIDAMBI
BHAARATEEYA KIDAMBI
https://timesofindia.indiatimes.com/business/india-business/former-rbi-chief-rajan-ideal-choice-to-head-us-fed-report/articleshow/61359213.cms
ReplyDeleteINDEED
WHEN I WROTE THAT THIS FELLOW AND HIS FATHER ( RAW OFFICER R GOVINDARAJAN ) WERE ROTHSCHILDs AGENTS NOBODY BELIEVED ME
SO SO SO -- a RAW official's son leaves India on a scholarship for a PhD at MIT (a major recruiting ground for the CIA), and then settles in the United States for the next 30 odd years ....
30 years later, the Italian Waitress government rolls out the red carpet for him and invites him back to India, first making him the Chief Economic Advisor and now the Governor of the RBI.
YOU DONT GET TO HEAD THE FED UNLESS YOU ARE ROTHSCHILDs AGENT AND APPROVED BY BILDERBERG CLUB INNER KOSHER CORE
http://ajitvadakayil.blogspot.in/2011/09/shrewd-club-within-naive-bilderberg.html
http://ajitvadakayil.blogspot.in/2016/06/gpi-dog-shall-wag-gdp-tail-not-vice.html
http://ajitvadakayil.blogspot.in/2011/01/murky-truths-of-inflation-and.html
PUT THIS COMMENT IN THE WEBSITES OF --
PMO, PM MODI, FINANCE MINISTER, LAW MINISTER, CJI, HOME MINISTER, YOGI ADITYANATH, DEFENCE MINISTER, EDUCATION MINISTER, I&B MINISTER
SRI SRI RAVISHANKAR DOES NOT REPRESENT HINDUS, OR INDIA
ReplyDeleteWE KNOW WHY THIS HOMOSEXUALITY PUSHING RASCAL IS SUCH A FAVOURITE OF BENAMI MEDIA--AND ROTHSCHILDs APCO BRANDED MODI , WHO AWARDED HIM PADMA VIBHUSHAN..
http://www.firstpost.com/india/homosexuality-not-a-crime-in-hinduism-says-sri-sri-ravi-shankar-1283843.html
THIS FELLOW DYES HIS BEARD-- 99% OF THE TIME HE TRIES TO CAMOFLAUGE HIS GARGANTUAN PAUNCH --AND HE CANNOT TALK ON ANY SUBJECT EXTEMPORE
HE IS THE DUFFER WHO SAID SOUR VINEGAR MADE OUT OF ROTTING VEGETABLES/ FRUITS IS ENZYME
http://edition.cnn.com/2017/10/30/entertainment/kevin-spacey-allegations-anthony-rapp/index.html
ReplyDelete99% HOMOSEXUALS ARE PEDOPHILE AND SEXUAL PREDATORS
IF ANY HOMOSEXUAL OBJECTS--
PLEASE SUBMIT TO A NARCO TRUTH SERUM TEST SO THAT WE KNOW HOW MANY MINORS HE OR SHE HAS SEXUALLY MOLESTED
Sir, ru considering writing a book. Please do. Its going to be number one seller. Or atleast assign copyright or authorize me to publish on your behalf (all profits, royalties only goes to u). Even without book publisher, the material u have can be formaulated into a book n circulated widely. Do consider the same, n write to me on swathi123200@gmail.com, if interested. I want to pro bono assist u.
DeleteSorry,
DeleteWe as a reader are quite happy with this blog.
We do not want books.
The days of books are gone.
Enough books are written.
This blog is already circulated to more then billion people.
Deletehttp://www.hindustantimes.com/tv/family-guy-joked-about-kevin-spacey-hiding-kidnapped-kids-in-his-basement-in-this-2005-viral-clip-did-they-know/story-mGdVdPS3aqXqrfQNMhts3K.html
DeleteBoondocks, South Park, even Family Guy on the lowest keys been telling the truth about the industry for years... we laughed through it
It almost feels like Seth MacFarlane knows a lot of Hollywood secrets and uses family guy to deliver them piece by piece
Family Guy, The Simpson’s, 30 Rock, etc, these shows slip in jokes about the very predatory nature of Hollywood’s elite & no one catches it.
To
DeleteAgoobwa
You said
(authorize me to publish on your behalf all profits, royalties only goes to u).
-------------------------------
If sir wanted to mint money .
He could have earned in crores by this blog.
AGOOBA
DeleteLUMUMBA
MUMUNGA
MATUNGA
Sir,In MK Ultra programme(Mind control)it is said that our brain functions on 6 waves namely
ReplyDelete1.Alpha 2.Beta 3.Gamma 4.Delta 5.Theta 6.Omega
Now there are 6 elite forces of US Armed forces
1.Delta force(considered as most elite commandos) 2.Navy SEALs(US Navy Commandos) 3.Green Berets(Army commandos) 4.Rangers(75th regiment ranger unit)5.Marines(US Naval Infantry)6.Pararescue(USAF commandos)
The Delta force was inspired by Delta waves.
Hello Sir,
ReplyDeleteOff topic but I have to ask this question.
How legit is the English translation of Mahabharata by K.M Ganguly?
I can see the mentions of Brahmanas having pork and venison and other things that sounds odd to me.
Also the translation was carried out during British regime, so it further creates doubts.
Sorry if this topic is already discussed but I want to clear this great doubt of mine.
Thanks.
Hindu Religious texts are manipulated,eroticised,poisoned,edited both online(Google + Wikipedia) & offline by Rothschild System & their stooges,to make Hindus self-hating,confused so that they can b converted to another religion & they start abusing Sanatan Dharm & which in turn will denigrate Sanatan Dharm image in eyes of people .
DeleteMost of our real copies of scriptures hav been stolen by Rothschild Jews during th time they were in India, & the original copies are with them in London House of Commons,Old British library,Sorbital Library of France & with researchers & scientists of west.
Vedas are Vigyan Granth (they hav all true scientific knowledge & they are eternal truth ,& our 12-strand DNA Maharishis got access to these knowledge from th God )
After 1857 revolt ,Hunter Commission was set by Rothschild Jews to manipulate,eroticise,poisoned all the Hindu religion scriptures & original scriptures were stolen by them.Max Muller was assigned the task to prove Vedas as nonsense & he injected ,edited th Vedas & wrote false lies like Vedic Humped Desi cow's meat is eaten by Rishis,in this way he manipulated Vedas.
Wendy Doniger,Sheldon Pollock,Audrey Truschke,Devdutt Pattnaik,Romila Thapad,Amish Tripathi,Abhinav Gupta all are also doing the same work.
B aware about their ulterior motives & tell others also
Sir,
ReplyDeleteWe are tired of Subramanya Swami
Just complains.
Latest
Rahul Gandhi Citizenship.
no no...he is following up with action...remember both the gandhis are out on bail in the Herald case because of swamy...
Deletethe problem is he is a one man show....he needs backup to dig out information and evidence...
hi capt
ReplyDeleteWHAT IS THE MEANING OF FORMALISM? AND ASLO RUSSIAN FORMALISM
DeleteCommies write that formalism is ‘art for art’s sake’. BALLS ! What do these cunts know !
Commie write that frmalists prioritize the medium over the content. Formalism concentrates on the set of rules a language has (competence), and not on the usage of this set when producing phrases (performance). BALLS AGAIN!
White formalists believe that the art-object can be isolated from social, cultural and historical influences and examined as an autonomous whole - TEE HEEE . When they wipe their shit laden asshole with toilet paper —it must be such a hole—nay- WHOLE .
Formalism is a description of something in formal mathematical or logical terms. Formal language theory, the discipline which studies formal grammar and language, is a branch of applied mathematics.
Formalism rejects notions of culture or societal influence, authorship, and content, and instead focuses on modes, genres, discourse, and forms. Its applications are found in theoretical computer science, theoretical linguistics, formal semantics, mathematical logic, and other areas
The Śulba sutras are one of the appendices to the great Védas. Vedas had within it the entire concept of divine Math.
In computer science, Backus–Naur form or Backus normal form (BNF) is a notation technique for context-free grammars, often used to describe the syntax of languages used in computing, such as computer programming languages, document formats, instruction sets and communication protocols. They are applied wherever exact descriptions of languages are needed: for instance, in official language specifications, in manuals, and in textbooks on programming language theory.
The idea of describing the structure of language using rewriting rules can be traced back to Panini.
Panini’s grammar includes early use of Boolean logic, of the null operator, and of context free grammars, and includes a precursor of the “Backus–Naur” form (used in the description programming languages) .
Panini lived 7500 years ago. The white invader kicked him forward in time as the Big Bang of the bible was only in 4004 BC.
Boolean Algebra served the basis of early transistors and capacitors used in early primitive form of the computer.
CHOOT CHOMSKY DOES NOT KNOW LIBGUISTICS OF SANSKRIT CANNOT BE APPLIED TO A DUMB LANGUAGE CALLED ENGLISH
Jew Rothschild stole the technical texts BRAHMANAS ( part 2 ) and the ARANYAKAS ( part 3) of our Vedas—leaving us with SAMHITAS ( ridiculed as cowherds’s verses ) and UPANISHADS ( philosophy )
Sanskrit is rich in many mathematical features like its logic, context free grammar, in particular Boolean logic, null operator, etc.
A context-free grammar is simple and mathematically precise mechanism which gives methods by which phrases in language are built from smaller blocks, capturing the “block structure” of sentences in a natural way. It’s where formalism is applied which is base for mathematical study.
This wouldn’t have been possible without implicit and explicit knowledge and application of mathematical tools.
Capt ajit vadakayil
..
Thanx capt for clearing doubt U TRULY HAVE A GENIUS ABSTRACT MIND TO UNDESTAND AND MAKE IT SIMPLE TO EXPALIN.IF JEW HAD NOT STOLEN BRAHMANAS ETC WE COULD HAVE BUILT QUANTUM COMPUTER BY NOW
Deletecapt here is link by lady Dr. Kalyani Vallath (Part I) expaling the above
Deletehttps://youtu.be/GNzm2rpai_M
https://m.timesofindia.com/india/aadhaar-a-threat-to-national-security-sc-will-strike-it-down-subramanian-swamy/amp_articleshow/61356203.cms
ReplyDeleteSubramaniam Swamy's priorities are personal grudges more than the nation's security...
DeleteIn a few years' time he will turn against Modi also...
DONALD TRUMP
ReplyDeleteLISTEN UP
LINK
HILLARY-- JOHN PODESTA-- TONY PODESTA --SBERBANK- UKRAINE- ROTHSCHILD
John Podesta left the LOBBYING firm ( Podesta Group ) in 1993, and Tony Podesta left the firm on October 30 2017, after finding out about increased scrutiny of the firm
Podesta Group represents KOSHER American corporations, who funded Clinton Foundation
Podesta Group has violated the US Foreign Agents Registration Act in the course of its work for the ECMU.
The Podesta Group was a MAJOR lobbying firm that participated in a 2012–2014 public relations campaign organized by Paul Manafort on behalf of the ECMU and Ukraine's pro-Russian Party of Regions
This the campaign was designed with the stated goal of improving Ukraine's standing among Western audiences as a possible prelude to Ukrainian membership in the European Union.
The Podesta Group represents he interests of Russia's largest financial institution, Sberbank which controls more than 32 percent of Russian banking assets.
Podesta Group received HUGE amounts of money from the Saudi government
At the same time, Tony Podesta is also a top campaign contributor and bundler for Hillary Clinton. So while one brother runs the campaign, the other brother funds it with earnings that come, in part, from the Saudis.
John Podesta served as President Bill Clinton’s chief of staff, founded the influential DC think tank Center for American Progress (which regularly touts Saudi “reforms”), and was counselor to President Obama.
The Podesta-Clinton-Saudi connection should be seen in light of the recent media exposes revealing the taudry pay-to-play nature of the Clinton Foundation. Top on the list of foreign donors to the foundation is Saudi Arabia, which contributed between $10 million and $25 million.
On Christmas Eve in 2011, Hillary Clinton and her closest aides celebrated a massive $29.4 billion sale to the Saudis of over 80 F-15 fighter jets, manufactured by Boeing, a company which coincidentally contributed $900,000 to the Clinton Foundation.
DONALD TRUMP--LISTEN UP-- GO FOR THE JUGULAR
THE TIME IS NOW!
capt ajit vadakayil
..
Dear Captainji,Readers
ReplyDeletehttp://www.newindianexpress.com/states/tamil-nadu/2017/oct/31/tamil-nadu-ips-trainee-officer-does-a-munnabhai-in-upsc-exam-1687576.html
https://timesofindia.indiatimes.com/city/hyderabad/ips-officer-jailed-for-cheating-in-upsc-wife-arrested-in-hyderabad/articleshow/61350964.cms
QUOTE---
According to the officer, Karim admitted to wrongdoing. The IB officers handed him over to the Egmore police, who booked him under sections 420 (cheating and dishonesty) and120b (criminal conspiracy) of IPC and section 66 of the IT Act and took him into custody .
Friends told investigators that after Karim met with an accident recently and failed police fitness tests, he believed he was left with no option but to opt for IAS. They also said that Karim had topped the CAT exam.---UNQUOTE
What a Fall to Disgrace. This guy had many options even after suffering accident and failing police fitness tests. But he had chosen the Wrong path to achieve something.
Persons occupying High Positions in Civil Services should set Examples rather than falling prey to Greed and take the easy way.
With Regards,
Rajkiran
Arrest warrant against Rose McGowan for possession of "controlled" substance..
ReplyDeleteThis is how the Weinstein cookie shall crumble....
http://www.independent.co.uk/arts-entertainment/films/news/rose-mcgowan-arrest-warrant-drugs-possession-controlled-substance-harvey-weinstein-sexual-harassment-a8028576.html
DeleteHARVEY WEINSTEIN IS A ROTHSCHILD AGENT
HE DOES NOT GIVE A ROLE UNLESS HE GETS A BLOWJOB
HE SUPPLIES TO STARTS TO RICH JEWS
HE HAS THE PROTECTION OF ADL -- AND TOP POLITICIANS WHOM HE HAS HONEY TRAPPED BY HIDDEN CAMS
http://ajitvadakayil.blogspot.in/2016/01/of-honey-traps-and-pots-capt-ajit.html
NETAJI SUBHASH CHANDRA BOSE LIED TO INA WHEN HE SPOKE " I HAVE NO CHILDREN INA SOLDIERS ARE MY CHILDREN"
ALL THIS WHEN HE HAD WHITE GERMAN JEWESS WIFE AND A DAUGHTER--LYING BASTARD
http://ajitvadakayil.blogspot.in/2011/08/netaji-subhash-chandra-bose-untold.html
WOULD CAPT AJIT VADAKAYIL EVER LIE LIKE THIS ?
capt ajit vadakayil
..
capt thanx for making us laugh for song that you have typed. had a hearty laugh at home. ha ha ha. appreciate your patience for typing the song. the whole film industry is really disgusting. i believe at least south indian industry produce good songs than Bollywood. wonder whether these people have conscious to judge the performance of the artists. how do they listen to such pathetic songs, dances and films?
ReplyDeleteTODAY IS INDIRA GANDHIs DEATH ANNIVERSARY.
ReplyDeleteSHE WAS A DESH BHAKT— A WOMAN WHO HAD BALLS OF STEEL !
SHE WAS MURDERED BY JEW ROTHSCHILD FOR NATIONALING HIS BANKS— USING GULLIBLE SIKHS
THIS BLOGSITE SALUTES THIS HEROINE !
Capt ajit vadakayil
..
Dear Captainji, Readers
DeleteJFK Killed After trying to shut down Rothschild's (US) Federal Reserve ...
https://www.linkedin.com/.../jfk-killed-after-trying-shut-down-rothschilds-us-1963-br...
Case Closed: JFK Killed After Shutting Down Rothschild's Federal ...
https://www.linkedin.com/.../case-closed-jfk-killed-after-shutting-down-federal-reserv...
JFK Killed Rothschild's Fed Reserve In 1963: Secret Memo Shows ...
https://politicalvelcraft.org/.../jfk-killed-rothschilds-fed-reserve-in-1963-secret-memo-...
ExecutiveOrder(11110 signed with authority June4,1963) is still VALID even today
Just like former Indian PM Ms IndiraGandhi was killed by R agents, former US President JohnFKennedy (JFK) was killed by R agents(including CIA,FBI,Rogue Military Personnel,etc).
With Regards,
Rajkiran
Ji,
ReplyDeleteSouth China Morning Post - 1000 km Brahmaputra tunnel
China is perfecting the technology it will require to build a 1,000-km tunnel from Tibet to the water-starved Xinjiang region. The report had said the technology is being tested in a 600-km project linking the plains of China with water sources in Tibet.
The proposed tunnel, which would drop down from the world’s highest plateau in multiple sections connected by waterfalls, would “turn Xinjiang into California”, one geotechnical engineer said.
http://www.scmp.com/news/china/society/article/2116750/chinese-engineers-plan-1000km-tunnel-make-xinjiang-desert-bloom
Massive Diversion Projects
http://www.scmp.com/news/china/policies-politics/article/2113930/china-diverts-10-billion-cubic-metres-water-arid-north
Thanks
"MOST OF THE INTERNET VIRUSES ARE CREATED BY RIVAL ANTI-VIRUS COMPANIES , WHO THEN SELL THE CURE ..
ReplyDeleteTHEY KNOW HOW TO CURE AS THEY ARE THE REASON WHY THE VIRUS WAS INTRODUCED , IN THE FIRST PLACE"
Ajit ji,
Viruses are created, not just on the internet! Whatever you said above applies in that field too.
Create a problem, observe the reaction then don't solve it, just treat the symptoms. It's all business. Everything is so one sided. Maza he nahi aa raha! I am sick of this dimension.
This Marathi paper is commie mentality paper..always have koanasta or commie writers editorials....now height is that made Pervert Hugh hefner a Hero , women empowerer, fighter for women right...ridicules..Ajit sir chk sure
ReplyDeletehttps://www.google.co.in/amp/www.loksatta.com/agralekh-news/the-success-story-of-playboy-founder-hugh-hefner-1561856/lite/
Captain
ReplyDeleteHere is an article that says US Debt problem is not manageable.
----
http://www.zerohedge.com/news/2017-10-31/will-americas-prosperity-be-completely-wiped-out-our-growing-debt
The federal government is now 20.4 trillion dollars in debt, and most Americans don’t seem to care that the economic prosperity that we are enjoying today could be completely destroyed by our exploding national debt.
"Over the past decade, the national debt has been growing at a rate of more than 100 million dollars an hour, and this is a debt that all of us owe. When you break it down, each American citizen’s share of the debt is more than $60,000, and so if you have a family of five your share is more than $300,000. And when you throw in more than 6 trillion dollars of corporate debt and nearly 13 trillion dollars of consumer debt, it is not inaccurate to say that we are facing a crisis of unprecedented magnitude."
---
If Trump or someone who have balls, mint a coin, and call it a "20 Trillion USD" coin, and wipes the slate clean, what will be implications?
I am sure whichever the president does that, he will be assassinated. Will it solve problem? Don't think so. Federal Reserve is one evil Private Bankers Association, no one has balls to fight against.
Your thoughts sir?
-Cheers
Shan
JEW OBAMA HAS SOLD USA TO ROTHSCHILD
DeleteROBERT MUELLER SHOULD BE INVESTIGATING OBAMA--WHY HE NEVER REVEALED THE 20 TRILLION DEBT , IN ANY OF HIS SOTU SPEECHES
IF CHINA WANTS TO SCREW USA THEY CAN--THEY ARE THE LARGEST HOLDERS OF US DEBT
IN THE LINK BELOW, LOOK AT THE TOP LEFT HAND CORNER -- 20.45 TRILLION USD DEBT
http://www.usdebtclock.org/
Hilly Billy Yanks do not know that the Social Security Trust Fund, aka retirement money, owns most of the national debt.
The U.S. Treasury manages the U.S. debt through its Bureau of the Public Debt.
The debt falls into two broad categories: Intragovernmental Holdings and Debt Held by the Public.
Intragovernmental Holdings. This is the portion of the federal debt owed to 230 other federal agencies. It totals $5.6 trillion, almost 30 percent of the debt. Why would the government owe money to itself? Some agencies, like the Social Security Trust Fund, take in more revenue from taxes than they need. Rather than stick this cash under a giant mattress, these agencies buy U.S. Treasurys with it.
By owning Treasurys, they transfer their excess cash to the general fund, where it is spent. Of course, one day they will redeem their Treasury notes for cash. The federal government will either need to raise taxes or issue more debt to give the agencies the money they will need.
Debt Held by the Public. The public holds the rest of the national debt ($14.7 trillion). Foreign governments and investors hold nearly half of it. One-fourth is held by other governmental entities. These include the Federal Reserve, as well as state and local governments. Fifteen percent is held by mutual funds, private pension funds and holders of savings bonds and Treasury notes. The remaining 10 percent is owned by businesses, like banks and insurance companies. It's also held by an assortment of trusts, companies, and investors.
As the nation's central bank, the Federal Reserve is in charge of the country's credit. It doesn't have a financial reason to own Treasury notes. So why did it double its holdings between 2007 and 2014?
That's when it ramped up its open market operations by purchasing $2 trillion in Treasurys. This quantitative easing stimulated the economy by keeping interest rates low. It helped the United States escape the grips of the recession.
Did the Fed monetize the debt?
Yes, that's one of the effects. The Fed purchased Treasurys from its member banks, using credit it created out of thin air. It had the same effect as printing money. By keeping interest rates low, the Fed helped the government avoid the high-interest rate penalty it would usually incur for excessive debt.
MONEY OUT OF THIN AIR?
DO YOU KNOW WHY PRICES OF GOODS ALWAYS GO UP AND NEVER DOWN ?
THERE IS A METHOD TO THIS ROTHSCHILD MADNESS.
THIS IS WHY I SAY—95% OF INDIAN PROFESSORS WHO TEACH ECONOMICS NEED TO BE SACKED.
AND HULLO SWAMY—YOU HAVE BECOME SENILE. YOU ARE NOT THE OLD SWAMY
http://ajitvadakayil.blogspot.in/2011/01/murky-truths-of-inflation-and.html
USA NEEDS A WAR WITH INDIA AND CHINA FIGHTING EACH OTHER--THIS IS THE ONLY WAY THEY CAN COME OUT OF THEIR UNPAYABLE DEBT
THE G7 NATIONS ARE BEGGARS
THE UNSC IS MANNED BY BEGGARS WITH VETO POWER
http://ajitvadakayil.blogspot.in/2017/07/can-china-afford-war-with-india-come-on.html
http://ajitvadakayil.blogspot.in/2017/08/can-china-afford-war-with-india-come-on.html
APCO MODI--WE WE SEE YOU HUGGING WHITE JEWS--WE CRINGE AND SQUIRM
DO YOU KNOW THE MEANING OF NATIONAL HONOUR ?
http://ajitvadakayil.blogspot.in/2016/06/gpi-dog-shall-wag-gdp-tail-not-vice.html
capt ajit vadakayil
..
PUT THIS COMMENT IN THE WEBSITES OF --SWAMY, PMO, PM MODI, FINANCE MINISTER, SMRITI IRANI ( IF SHE DANCES HARD DHINKA CHIKKA SHE MAY UNDERSTAND ), LAW MINISTER, CJI, SUPREME COUR BAR COUNCIL, HOME MINISTER, DEFENCE MINISTER, YOGI ADITYANATH COMMERCE MINISTER , MEA, AND WEBSITES OF DESH BHAKTS
DeletePranam Captain
DeleteIndia is doing no different as all us retired people's pension money with LIC. I must have paid more than 4 million as income tax over the last 30 years service and get no benefits. Every Indian's investments with LIC pension are now in danger. See latest finance jhol!
http://www.mydigitalfc.com/companies-and-markets/bank-recap-bill-too-could-be-handed-over-lic
https://timesofindia.indiatimes.com/india/furore-as-army-told-to-build-3-mumbai-bridges/articleshow/61378026.cms
ReplyDeleteJNU WOMAN NIRMALA SITARAMAN CONCENTRATES ON WOMEN AND HIJRA ( IN NAVY ) EMPOWERMENT
######### SUBJECT—JUDGES WANT SALARY HIKE ##############
ReplyDeleteSORRY--... COLLEGIUM JUDICIARY IS NOT ALLOWED BY OUR CONSTITUTION AND THEY DESERVE NO HIKE..... CANCEL THEIR EXTENSIVE BRITISH COLONIAL STYLE VACATIONS..... INDIA IS THE ONLY NATION ON THIS PLANET , WHERE COLLEGIUM JUDICIARY ELECTS JUDGES . .THEY SCUTTLED NJAC . . . IN THE RECENT PAST COLLEGIUM JUDICIARY SAVED SEVERAL TRAITORS WHO HAVE TRIED TO KILL BHARATMATA . . PEOPLE LIKE JEW NOAM CHOMSKY GIVE FIATS TO COLLEGIUM MELORDS .. . BEFORE 1947 ALMOST ALL OUR JUDGES WERE IN THE PAYROLL OF JEW ROTHSCHILD . . . WE KNOW COLLEGIUM JUDGES HAVE FOREIGN SUPPORT WHEN THEIR LEGISTLATE , DO EXTREME JUDICIAL OVERREACH . . . . . . . THE TIME HAS COME FOR "WE THE PEOPLE" TO DECLARE --WHATEVER LAWS HAVE BEEN CREATED BY JUDGES ARE ALL NULL AND VOID -- WE KNOW THESE " JUDGE CREATED LAWS "…. THE DAY WILL COME WHEN THE SYSTEM WILL BREAK DOWN -- THE JUDGES WILL BE JAILED--THEY WILL LOSE THEIR PENSIONS…. THIS WILL HAPPEN WHEN UPSET POLICE TELLS THE JUDGE " MAKE YOUR OWN ARREST… WE ARE DONE WITH JUDGES PLAYING GOD !"…. PM MODI-- WE ELECTED YOU FOR 5 YEARS -- YOU HAVE ALLOWED COLLEGIUM JUDGES TO SHIT ON BHARATMATAs FACE -- WE THE PEOPLE ARE SHOCKED AND DISMAYED… WHO RULES INDIA ? PM MODI OR THE " SOLI / FALI IMMIGRANT GANG " ?... KYA HO RAHA HAI ?... WE DONT WANT LAWYER TURNED JUDGES TO INTERFERE WITH BHARATMATAs SECURITY-- EXTERNAL ( ROHINGYAS ) OR INTERNAL ( NAXALS/ ISLAMIC SEPARATISTS )… KASHMIRI MUSLIMS WHO HAVE DRIVEN AWAY HINDU PANDITS, USURPED THEIR LANDS AND DESTROYED THEIR TEMPLES -- ARE CALLING THEMSELVES "MINORITY" AND MILKING THE BENEFITS -- NCM / NHRC ( CONTROLLED FROM ABROAD ) PLAYS ALONG… WE THE PEOPLE DEMAND TO KNOW-- THE ITALIAN WAITRESS GAVE 10 BILLION EUROS TO ITALY ZONE--- MODI GAVE 10 BILLION USD TO AFRICA AND 10 BILLION USD TO BANGLADESH…. WHAT HAVE YOUR DONE FOR KASHMIRI PANDITS SO FAR ? TEENAGED KASHMIRI PANDIT SCHOOL GIRLS ARE STILL LIVING IN TENTS ?... JUDGES HAVE DESTROYED THIS WATAN DUE TO ENDLESS HAIRSPLITTING , MAKING DECISIONS OUT OF CONTEXT--WITHOUT DHARMA OR NATURAL JUSTUCE…ENOUGH IS ENOUGH!
Go0gle for the blogpost below---
........................................... TIME HAS COME TO SAVE THE WATAN .. THE TIME IS NOW VADAKAYIL ........................................
capt ajit vadakayil
..
PUT ABOVE COMMENT IN PMO, PM MODI,LAW MINISTER, FINANCE MINISTER, YOGI ADITYANATH, HOME MINISTER WEBSITES
DeleteABOVE COMMENT WAS SPAMMED BY TIMES OF INDIA
Deletehttps://timesofindia.indiatimes.com/india/social-media-pokes-fun-at-ministers-vande-mataram-rendition/articleshow/61377738.cms
ReplyDeleteBASTARD BENAMI MEDIA
FIT ONLY FOR CRICKET AND BOLLYWOOD
WANTS TO FIRE OVER SOCIAL MEDIA s SHOULDERS..
MEDIA WHORES-- COMMIES FROM BROKEN HOMES
KNOWING THE LYRICS IS NO BIG DEAL-- THE INTENTION AND AN EFFORT TO BE PART OF THE SONG MATTERS
capt ajit vadakayil
..
http://www.hindustantimes.com/jaipur/8-killed-20-hurt-as-transformer-explodes-in-shahpura-near-jaipur/story-XdShwCAdIEZRCs6DI8aLvL.html
ReplyDeleteIN INDIA NEVER RENT A HOME NEXT TO A TRANSFORMER
Transformers require a comprehensive maintenance plan to ensure their proper functioning and longevity
IN INDIA WE DONT EVEN KNOW WHAT ABOVE MEANS .. ASK THE POWER MINISTER --DOES HE HAVE A TRANSFORMER POLICY
IN PUERTO RICO-- I GAVE WARMING THREE DAYS IN ADVANCE OF THE HURRICANE-- PUT OFF THE GRID-- PROTECT YOUR TRANSFORMERS-- THE MUFFS BUST 99% OF THE TRANSFORMERS
Today, transformers are installed in stiff steel tanks. The risk of explosions can be reduced if the industry changes to “soft” housings that absorb energy in the same way as modern car bodies
Car bodywork is designed with soft zones that absorb energy from collisions by crumpling
IN SHIPSs BOILERS FURNACES WE HAVE WEAK SPOTS WHICH BUST EARLY AND PREVENT A TOTAL DISASTER
All large transformers use oil for insulation and cooling, as this greatly reduces energy losses and improves reliability ..In the wake of a large internal fault, the gas expands violently, causing a powerful and extremely rapid pressure build-up in the transformer tank.
If the tank ruptures, combustible gases will leak out. If these are ignited, an explosion will follow
INDIA IS NOT PREPARED FOR AN EMP ATTACK BY PAKISTAN USING TACTICAL NUKES
WE DONT HAVE THE INFRASTRUCTURE TO CHANGE BUST TRANSFORMERS IMMEDIATELY USING HEAVY LIFT HELICOPTERS
HULLO RK SINGH-- DO YOU KNOW THE MEANING OF EMP ?
Read all 4 parts of post below
http://ajitvadakayil.blogspot.in/2015/11/world-war-3-sans-gps-and-emp-taken-out.html
MODI SELECTS HIS MINISTER ON THE BASIS OF THEY CAPABILITY IN GIVING HIM AN EGO MASSAGE-- NONE OF THEM ARE SELF STARTERS.
HULLO JNU WOMAN NIRMALA SITARAMAN--DO YOU KNOW HOW TO PROTECT INDIA FROM A EMP ATTACK ?
STOP YOUR WOMENs EMPOWERMENT SCHEME- NOW YOU WANT ARMY TO BUILD BRIGES IN MUMBAI--SO THAT MODI CAN MILK VOTES ?
MODI--WHEN WE HEAR YOUR PUERILE MANN KE BAATH --WE SQUIRM... IF AS A CAPTAIN I DO THIS MY CREW WILL THROW ME OVERBOARD...
capt ajit vadakayil
..
PUT ABOVE COMMENT IN THE WEBSITES OF RK SINGH, PIYUSH GOYAL, NIRMALA SITARAMAN, PM MODI, PMO
ReplyDeletecapt ajit vadakayil
..
BENAMI MEDIA HAS GONE GA GA OVER "EASE OF DONG BUSINESS" IN INDIA
ReplyDeleteWE DONT NEED ROTHSCHILDs AGENTS SETTING UP BUSINESS IN INDIA AND CHAINING BHARATMATA ALL OVER AGAIN
THERE IS NO NEED FOR MODI TO PUT GUJARATI SURMA IN HIS EYES AND HUG WHITE JEWS
Captain,
ReplyDeleteSpell bound awesome explanation although I have to still read and digest all the 8 parts.while companies like jp Morgan are still doing proof of concept on block chains we had a session shit presentation and explanation given on block chain you are really a master Pranam
The decision to let army build foot over bridges at Mumbai stations on grounds of speedy work efficiency has drawn flak from various leaders ....
ReplyDeleteRailway minister wants it done on "war footing".. not the usual "pussyfooting".....
I recollection t the army had to build a bridge for the Kalmadi special Games too in Delhi when a spanking new foot bridge collapsed before inauguration in 2010. Where was the hoo-ha brigade then?
ReplyDeleteCaptain,
ReplyDeleteA report by Tata hospital says that 20% of mouth and throat cancer cause bcoz of oral sex by human papilloma virus
Is it true
Is it not even safe with our married partner
Captain ,
ReplyDeleteMaharashtra govt has finalised the Ambedkar statue in indu mill at Dadar
It will be the biggest Ambedkar statue in the world with a car parking capacity of more than 1000
It will also have a library on Ambedkar life
Statue will be taller than statue of liberty more than 350 feet
Now let's see the traitors will they react or oppose on Ambedkar statue like they opposed Shivaji statue and told it a waste of money ey
Rothschild Jew & his agent Ambedkar did maximum damage to Sanatan Dharm.
DeleteV spit on both of them
We have NDTV doctor encouraging male gays to have oral sex—to sleep well
ReplyDeleteBASTARDS !
https://doctor.ndtv.com/living-healthy/a-little-foreplay-and-oral-sex-can-actually-be-beneficial-heres-how-1766466
ISRAEL DARLING VAJPAYEE WAS THE FIRST PM TO ENCOURAGE HOMOSEXUALITY. APCO MODI IS JUST CONSOLIDATING
MOSI GAVE PADMA VISBHUSHAN TO TWO HOMOSEXUALITY PUSHING ROGUE GURUS
WE KNOW WHY MODI CHOSE ARUN JAITLEY/ VENKAIH NAIDU AND SMRITI IRANI AS I&B MINISTER
HPV—the sexually-transmitted virus is also a leading cause of throat cancer (oropharyngeal cancer), and it spreads from person to person via oral sex
HPV is directly related to throat cancers. In India this has outpaced cervical cancer cases.
Women experience less HPV-related throat cancer, because they may have developed an immunological response to fight off cervical cancer. Men don’t have the same immunity.
HPV oral and oropharyngeal cancers are hard to discover
HPV-related cancers spread quickly to the lymph nodes-- they show up first as large swollen lymph nodes because the body has an immune response at the site of the lymph nodes
Oral cancers are sometimes called head and neck cancers, and include cancers of the mouth, lip and tongue, as well as cancers of the tonsils, oesophagus, larynx (voice box), nasopharynx (the area that connects the nose and throat) and the thyroid gland.
http://ajitvadakayil.blogspot.in/2016/03/say-no-to-hpv-vaccination-for-indian.html
HPV-related throat cancer symptoms include:--
Neck mass or swelling
Ear pain
Painful swallowing (like something is stuck in the back of your throat)
Snoring (as a new issue, without sudden weight gain)
Difficulty eating
Vocal changes (hoarseness)
Sore throat
Enlarged lymph nodes
Unexplained weight loss
HPV does not directly give you cancer, but it causes changes in the cells it has infected (for example, in the throat or cervix), and these cells can then become cancerous.
In the west 45% of throat cancers are HPV-related.. There are more than 100 types of HPV, and around 15 are associated with cancers. These 15 are known as high-risk HPV types.
The high-risk HPV types are also passed on through vaginal and anal sex, and are linked to:--
cervical cancer
vulval and vaginal cancer
anal cancer
penile cancer
laryngeal cancer
tonsil cancer
Some can be passed on through skin-to-skin contact and cause warts, including genital warts. The types of HPV that cause visible warts are low-risk and are not the same types that cause cancer.
PUT THIS COMMENT IN THE WEBSITES OF SMRITI IRANI, VANKAIH NAIDU, ARUN JAITLEY, MODI, PMO, HEALTH MINISTER.
SPREAD ON SOCIAL MEDIA
Capt ajit vadakayil
..
Master,
ReplyDeleteDoes chanting Mahamrityunjay Mantra daily have an positive effect in our body ? Wherever i search it's mentioned to chant 108 times ?
ॐ त्र्यम्बकं यजामहे सुगन्धिं पुष्टिवर्धनम्
उर्वारुकमिव बन्धनान्मृत्योर्मुक्षीय माऽमृतात्
Om tryambakaṃ yajāmahe sugandhiṃ puṣṭivardhanam
urvārukamiva bandhanānmṛtyormukṣīya mā'mṛtāt
Read all captain posts first
Deletehttp://ajitvadakayil.blogspot.in/2011/01/power-of-mantras-on-human-consciousness.html
http://ajitvadakayil.blogspot.in/2017/07/gayatri-mantra-savitr-savitur-saraswati.html
http://ewao.com/2017/10/30/india-throws-out-gates-foundation-due-to-conflicts-of-interest-with-big-pharma/
ReplyDeleteSome action finally Sir. India is throwing out Bill Gates Foundation.
Regards,
Prapulla
http://ewao.com/2017/10/30/india-throws-out-gates-foundation-due-to-conflicts-of-interest-with-big-pharma/
DeleteI HAD WARNED MODI AND JP NADDA
IN TAMIL NADU THE MANNARGUDI MAFIA USED IAS OFFICERS AND COLLECTORS TO THREATEN BLOGGERS WITH JAIL --FOR TALKING AGAINST INDIAN SCHOOL GIRLS BEING USED A GUINEA PIGS
MY BLOGPOST LINK BELOW AS REJECTED BY ALL INCLUDING THE HEALTH MINISTRY
http://ajitvadakayil.blogspot.in/2016/03/say-no-to-hpv-vaccination-for-indian.html
WHEN I WROTE ABOUT BILL GATES AND PRINCE CHARLES VISITING PUNE SERUM INSTITUTE ( MMR VACCINE MONOPOLY ) --AS IF IT WAS TAJ MAHAL -- IT WAS REJECTED BY THE HEALTH MINISTRY
THEN DONALD TRUMP TOOK UP THE CAUSE AND SAID HE WONT ALLOW SMALL BABIES TO BE VACCINATED WITH THREE IN ONE MMR VACCINE
http://ajitvadakayil.blogspot.in/2015/10/autism-in-india-and-triple-vaccine-mmr.html
THE PUNE SERUM INSTITUTE HAS NO HISTORY OF MAKING HUMAN VACCINES-- THEY WERE A STUD HORSE UNIT--MAKING STEROIDS FOR HORSES
ONE OF MY PARSI OFFICERS FATHER WAS A BIG SHOT IN THIS HORSE RACING/ STUD FARM. I KNOW THE SECRETS .
WE WILL NOT ALLOW INDIANS TO BE SUED AS GUINEA PIGS
http://ajitvadakayil.blogspot.in/2012/05/guinea-pigs-for-untested-medicines.html
PUT THIS COMMENT IN JP NADDAs, PMO, PM MODI, LAW MINISTER, I&B MINISTER , YOGI ADITYNATHs , HOME MINISTER, EDUCATION MINISTER, CJI, SUPREME COURT BAR COUNCIL WEBSITES--SPREAD ON SOCIAL MEDIA
capt ajit vadakayil
..
ADANIs FORTUNE COOKING OIL IS NOW USING BOLLYWOOD ACTOR AKSHAY KUMAR AND THE INDIAN ARMY
ReplyDeletehttp://bestmediainfo.com/2017/11/akshay-kumar-wears-rajiv-bhatia-s-apron-to-cook-for-jawans-in-fortune-oil-s-latest-brand-film/
IS THIS WHY MODI MADE JNU WOMAN NIRMALA SITARAMAN AS OUR DEFENCE MINISTER ?
WHY IS THE INDIAN ARMY COMMERCIALIZED ? IS THE ARMY CHIEF INVOLVED ? WHO HAS GIVEN SUCH LIBERTIES ?
WE WANT SEVERE FINES TO BE SLAPPED ON THE MAKERS OF THIS AD
PREVIOUSLY THESE LIARS CLAIMED THAT FORTUNE VIVO COOKING OIL CAN CURE DIABETES
WE THE PEOPLE OF INDIA WANT TO KNOW IF THE MODI GOVT SUPPORTS THIS ADANI WILMAR FORTUNE VIVO VEGETABLE OIL , WHICH CLAIMS TO CONTROL DIABETES .. THIS RUNS COUNTERSENSE TO SCIENCE . . . .
BEING CAPTAIN FOR 30 YEARS MY SHIPS HAVE CARRIED WILMAR OIL FOR YEARS , AND I KNOW WHO THEY ARE , AND HOW THEY SOURCE THE OIL ..
WHAT ARE THE INGREDIENTS OF THIS MAGIC ADANI VEG OIL?
HAS THE HEALTH MINISTER DONE A STUDY ? . . . OR IS IT GUJARATI EXEMPTED ? . . .
IS IT GM OIL ?
WHERE IS THE TEST CERTIFICATE BY THE INDIAN GOVT LABORATORY ? . .
https://www.youtube.com/watch?v=lV1GMOgg43Y
THIS IS THE STATE OF INDIA-- A BANANA REPUBLIC --RULED BY AN APCO BRANED PM ..
PUT THIS COMMENT IN ARMY CHIEFs, DEFENCE MINISTERs, PMO, PM MODI, HEALTH MINISTER, I&B MINISTER, WEBSITES
capt ajit vadakayil
..
If our army starts eating vegetable oil, God bless their health and God bless our borders. Question to promoters of vegetable oil - why does our body store extra fat as saturated fats (palmitic qcid and stearic acid) instead of storing them as polyunsaturated fats like the kind found in vegetable oil. The vegetable oils like soyabean oil were originally used to fatten the poultry up in the West so that farmers can sell them at higher price.
Deletethese days running around with a cancer patient ..... hospitals are milking them good ...... hospitals do not have any cure other than chemo with them ...... they say patient can eat anything ...... hum hai naa.
Deletecan write a thesis about the amount of bad karma goes on there.
Let the gays kill themselves off it is not like they will have a legacy to leave or next generation.
ReplyDeleteSir,
ReplyDeleteWho writes the scripts for the mind washing television serials in India ?? Is it true that it is being imported from foreign countries ??
Regards
Any doubt.
DeleteGlobal elites(Rothschild System) controls the world.
WOW Sir...Readers like me are having a field day here...8 parts of ABSOLUTE TECHNICAL awesome, well explained, knowledge on latest tech.Invaluable.
ReplyDeleteI wonder..why still...instead of asking questions or discussing possibilities...many readers here are involved in strange petty fights for trivial reasons...I can also see lot of "Guruji" guys missing over a few posts...LOL.
Sir,please continue this model...we need techincal study to really contribute to Nation's success.In Bangalore,so called IT Capital of Southern Hemisphere,there is not ONE person or training institute who can teach these stuff..
IPFS & Hashgraph is very impressive...will try to read more on these...
http://www.dailymail.co.uk/news/article-5037639/Teenage-barman-claims-Kevin-Spacey-flashed-hotel.html
ReplyDeletewhat % of hollywood actors are like this ?
Hi Captain,
ReplyDeleteRead the below post & what u think is it true???
This post is about Panic As Plane Carrying NBA Stars Hit By A UFO At 30,000 Feet
http://www.nnettle.com/news/3034-panic-as-plane-carrying-nba-stars-hit-by-a-ufo-at-30-000-feet
This comment has been removed by the author.
ReplyDeleteCaptain, You are insultings Telugus peoples with your Blockchain-ulu and blockchain-udu words. I used to love English language, but nowadays I am like englisvinglis, but I will use it anyway sort of guy.
ReplyDeleteI hope that some Telugu genius responds by writing a Bali-Sumatra programming language to develop jockchainulu or jockchainudu technology.
By the way, We all know it is a highly respectable Blockchain-uru :)
Captain,
ReplyDeleteYou blogged 7 parts on Block-chain technology only to tell us in the 8th part that the entire Block chain concept is a sham and POS !
Hahahahahhaha........unbelievable......this back-swing is like a horse kicking a man's nuts !!! :D
BACKSWING IS A CHANGE MANAGERs TECHNIQUE
DeleteWHEN INDIA SENT OUR ROCKET TO MARS--IT WENT THE OPPOSITE DIRECTION FIRST
Isro engineers employed an unusual "slingshot" method for Mangalyaan
Lacking enough rocket power to blast directly out of Earth's atmosphere and gravitational pull, it orbited the Earth for several weeks while building up enough velocity to break free. That helped avoid using a more expensive more expensive heavy launch vehicle.
Gravity assist, sometimes called an interplanetary slingshot (a CHOOT ter term), involves approaching an intermediate planet (not the one you initially start from, or are destined to go to) in a hyperbolic orbit.
A gravitational slingshot, gravity assist maneuver or swing-by is the use of the relative movement and gravity of a planet to alter the path and speed of a spacecraft, typically in order to save fuel, time, and expense
There was no gravity slingshot used on Mangalyaan.
We did 6 periapsis burns at Earth to raise the apogee, then a burn to go to the Mars Transfer Trajectory, then another burn when they get to Mars to put themselves in orbit
BALLS BRUTUS IS A HONORABLE GUY !
https://en.wikipedia.org/wiki/Gravity_assist
TEE HEEEEEEEEEEEE
capt ajit vadakayil
..
Haha, this is cool. Kinda feel vindicated now. I always felt something "uneasy" about Blockchain. Maybe that gut feeling is right.
DeleteHey Captainji, does your son have something to do with Hashgraph?
Deletecapt does a mohini again on bhasmasuras again...
DeleteTruly..baffling and amusing....thanks Captain.
DeleteCaptain, you are not a computer-guy, by profession or hobby.
ReplyDeleteYet, you have written an 8-part-blog on such a complex technology. Not only have you yourself understood such a complex-scheme (deliberately kept complex to fool people) but you also simplified it and made it extremely easy to understand in your blogs.
Not only keeping it technical, but also looking through the facade, you have identified and explained the "hidden-agendas" of such advanced-technologies. Such as how Blockchain is a scam and is used for land-grabbing, etc.
Anyone who would have began Part-1 thinking block chain is the future and will change India for the better, is now forced to go back to the drawing board and think again.
Right from minor technical details to overall agenda of why these technologies are promoted by the NWO.......you have covered everything !
Unbelievable..........this is an extremely amazing thing you have done ! It is impossible that such a level of clarity in thought can be seen elsewhere ! I guess only ultra-intelligent people like your Elder-Son can do better than you ! The standard you have set is extremely-extremely-high ! :)
Hello Captain, one interesting thing I have observed that all the current bollywood superstars are some how connected to Gandhi family. For example behenji turned MOD Priyanka Chopra's mother and aunt were associated with Indira Gandhi, same to same Amitabh's mother was a friend of Indira Gandhi, Shahrukh Khan's grandfather was a Congressman. In Hollywood you have to be a Jew to get on to the top And in Bollywood you have to be a friend/associate of Gandhi family to get on to the top.
ReplyDeleteRight. I simply don't think these "stars" deserve the credit they get. Stage acting is the real deal where you don't get any fresh takes and there is no video editing to brush over your mistakes. That's why many famed Bollywood personalities keep doing stage shows as they know any fool can become an actor if the director is good.
DeleteIts the director and technical staff that deserve all the credit. Actors are just lucky, just as someone born with a silver spoon. Some actors like Amitabh Bachchan and Akshay Kumar have admitted this publicly.
current bollywood heroines lacks grace/elegance.. only plastic acting not natural acting..
Deletehttps://www.spiritualresearchfoundation.org/spiritual-research/spiritual-phenomena/water-turning-red/
ReplyDeleteThey have a sattva tamas rajas theory to explain it. Site also lists a time line for ww3.. it beggars belief!
Captain !!! This is important !
ReplyDeleteDo you want to become bald in a few days ? Are you eager to have a shiny clean scalp free from hair ?
Watch this serial on "&TV" ---- "Paramav@tar Krishn@" ---- Mon-Fri 8:30PM IST.
My challenge is to watch it for just 1-week nonstop. You and anyone who knows the truths about fake-characters will rip your hair in frustration with this awful serial.
It is ABSOLUTELY WORST-HORRIBLE serial --- filled with shit of the highest order ! It is like a MAHA-SANGAM OF FAKE ROTHSCHILD BACKDATED CREATIONS !!!
All unnatural obese-kids are chosen for roles of Krishna, Balram and their friends. Some skinny malnutrition-affected guy is chosen for Sudhama's role for obvious reasons.
This show shows all crap.
---> Shabari became some "Cremation-ground-supervisor" because of the "Sin" of feeding half-eaten food to Lord-Ram. She is treated worse than untouchables and not allowed to enter the village. But she alwas goes through the village of Gokul foraging for food at midnight when nobody can see her. She is caught one-night and scolded by villagers. But obese-Krishna saves the day(or rather night) by giving the villagers a big-lecture on untouchability, caste and what-not.
---> Daksha's elder daughter was cursed by her father to become a cow-statue because she had helped Shiva and Sati to get married. Only obese-Krishna can set her free by touching her head.
---> Some guy (I forgot his name) was a rakshas in his last-life. His two wives wanted some rishis-fish-pool to be burnt because the guy's grandfather was killed by Matsya Avatar so they hate all fishes. Rishi curses them, but later amends it that they will become Gopis but will die in fire.
---> Some extremely weird rakshashas are the villains this time.
---> Kans' military commander is some "prethaa" (Soul still hanging around even after leaving the body)
---> Kans' thinks he is god and keeps abusing Vishnu. His chamchas keep calling him "Bhagwaan". He makes a statue of himself and keeps talking to it.
---> Without Exception, all the cows shown in the serial are "JERSEY-HOLSTEIN-COWS"
---> HERE IS THE BEST PART.........THIS SERIAL HAS A SMALL-OVERACTING-UNBEAREABLE-GIRL PLAYING THE ROLE OF RADHA !
This Radha is so damn irritating. Because not only are we seeing the excessive propagation of a fake-character. But also because this child-actor is horrible.
They keep putting Radha as a mischievous girls who keeps fighting with Krishna. They try their best to portray Radha as a cute girl and make the audience develop sympathy and affection for her.
---> For random reasons, they keep showing a close-up shot of Vishnu and Lakshmi looking at each-other. It gets on your nerves after 2-3 times.
I know all this because my family watches this SHIT-SHOW every-f@kin-day !!! It is the absolute worst thing ever.
Glorifying fat-kids with man-boobs is their idea of ---- "aww so cute boy".
You can write a 10-or-more part blog series on the fake characters they have propagated and/or created out of thin-air for this TV-serial.
The entire show is a Trojan-Horse !!! This show is like Pesticide ripping the stomachs of the Insects when they eat the pesticide-sprayed-foods in the farms.
This show is the pesticide and we Hindus are unfortunately, the insects.
Believe me when I say this Captain, it is that bad......see it for yourself at-least 1-2 episodes to get an idea.
https://www.youtube.com/watch?v=H68Hp8H79VU
Bastards have shown fake Radha as a chutney-mary who is sarcastic,bitter and angry
DeleteToday if you go to gujrat/rajastan say openly " RADHA IS FAKE" Chances are there you might be beaten by mob.
Only God can save hinduism
abcindiagogo
DeleteBest is not watch this Serials & Bollywood movies which only spread Hinduphobia & also tell others not to watch them
Speaking of Radha...
Deletehttp://www.newsx.com/national/yogi-adityanath-government-bans-meat-and-liquor-shops-in-mathuras-vrindavan-and-barsana
Twitter bans Trump adviser Roger Stone for threatening CNN staff
ReplyDeletehttps://www.google.co.in/amp/www.dailymail.co.uk/news/article-5028221/amp/Trump-ally-Roger-Stone-banned-Twitter-LIFE.html
BOTH CNN AND TWITTER ARE ROTHSCHILDs AGENCIES
DeleteMessage doing rounds.
ReplyDelete*A Great Feedback From an Army Veteran on Supreme Court's Order on Human Rights in Kashmir*
An Army veteran, who lost a family member to a militant’s bullet, has raised an agonising poser to the Supreme Court, *“How much do you know about the brutality of war?*
*How many of you have sent your progeny to the armed forces*?
*Have you ever lost a family member in the defence of the country*?
*Do you know the pain of losing a young son or having a widowed daughter or seeing your grandchildren grow up without their father*?
*If not, please do not impede our war effort. Human rights sound very nice when you and your families are safely ensconced in secure air-conditioned homes but not when you are facing bullets and stone of a unruly religious fanatic mob*.”
*Applying the Court directions to the Pulwama incident, an FIR will be lodged against Gunner Rishi Kumar who risked his life and killed two terrorists despite being hit on his headgear*.
Police investigations will carry on for years haunting him even when posted to other places in India.
*Courts will issue summons and demand his presence. He will be accused of depriving the ‘innocent’ jihadis of their human rights and asked to justify the killings*.
He will be queried, *Are you sure they were terrorists? They did not kill you, why did you kill them?*
He will be asked *"Did you give them adequate opportunity to surrender and reform themselves?"* *Did you give them a fair chance to escape?* *Did you fire warning shots in the air?"*
*Instead of lauding his bravery, he will be subjected to judicial witch-hunt. What a disgrace for the nation*!
*Subjecting active military operations to judicial review is an outlandish idea. Whereas all nations empower their soldiers to vanquish enemies of the state, India takes pride in shackling them*.
While addressing the U.S. Naval Academy in April 2010, *Secretary of Defence Robert M Gates of USA had said, “* *You have answered the trumpet call. For my part, I consider myself personally responsible for each and every one of you as though you were my own sons and daughters. And when I send you in harm’s way, as I will, I will do everything in my power to see that you have what you need to accomplish your mission – and come home safely."*
*Apparently, India’s Supreme Court thinks differently*. *Human rights of the enemies of the state appear to be far more important than the security of the country*.
*Finally, as a serving officer commented wryly, “The Supreme Court has given us two options* – *get killed and the country will honour your martyrdom* or
*kill the terrorist and face police/judicial investigations for years."*
His apprehensions are genuine and shared by the most. Wonder which soldier will look forward to serving in such antagonistic environment!
*Appeal to All Indians*:-
*However, Let us all make this a People's movement so that the Supreme Court will Reconsider the issue and Appreciate its gravity*.
*We cannot Fight for India on borders but We can Fight for our Soldiers Betterment from the safety of our homes*.
https://timesofindia.indiatimes.com/city/lucknow/mughal-descendant-stakes-claim-to-babri-masjid-site/articleshow/61377504.cms
ReplyDeleteHANG THIS FELLOW FOR CRIMES OF HIS EVIL FOREFATHERS
Dear Captainji,
ReplyDeleteThis is regarding the present NewYork attack by a ISIS LoneWolf member.
Cuomo: New York suspect appears to be a 'lone wolf' | TheHill
thehill.com/homenews/news/358144-cuomo-new-york-suspect-appears-to-be-a-lone-...
New York emerges defiant after ISIS-style truck attack, but questions ...
https://www.haaretz.com › U.S. News
How terrorists use propaganda to recruit lone wolves - The Conversation
theconversation.com/how-terrorists-use-propaganda-to-recruit-lone-wolves-85069
This is a FalseFlag Attack by R Agents to divert World,US people attention from Russian involvement in US Presidential Electioninquiry, other issues. May the Innocent souls lost in this cowardly attack rest in peace.
==
This is regarding China govt new scheme of Brahmaputra River Diversion project.
China Water Diversion can be addressed by following Ancient War Techniques. Use the enemy’s weapon against them with minimum collateral damage to India. These techniques have to be implemented by carefully studying Mahabharat War end days.Back then Balarama(Lord Krishna brother) has used his divine Plough to divert River Saraswati to River Ganga and decreased Yamuna River flow .One way can be placing HighSpeed Detonating Devices on either side of the mountains adjoining River Brahmaputra on Indian side of Border. All the People in that area must be alerted and shifted to safer place with suitable compensation. When Artificial Floods are triggered by China, these devices must be detonated with Quick Precision. Water has to be stopped flowing downwards instead must be diverted to Chinese,Myanmar,other South East Asia nations(Irrawady,Mekong,etc) side in reverse direction and the effects must be recorded simultaneoulsy. Chinese will have to get Indian Weapons taste.
Present China is reminding of USSR back in early 1990s during its collapse.If the present Commie China govt falls, there is every possibility of Birth of New Republics like Manchuria,Greater Mongolia(if they take Military risk and join Russia, Beijing, Access to Sea is also possible),EastTurkestan(Uighurstan-Xinjiang),Tibet,HongKong,Macau,Taiwan(Full Independence, may control some area of MainlandChina),More than 4 Han Republics,etc
India has to solve Rohingya issue by taking Hardline position. Myanmar Arakan State can be liberated with mercenaries,financial,political support. This way illegal Rohingyas must be identified and must be Deported to their Homeland Newly formed Republic. Sittwe Port,adjoining area connecting MizoramState can be under Indian Control.This is already posted by You few days ago.
Same way if Bangladesh does NOT take action on Illegal Bangladeshis, Sylhet,Chittagong,other Republics(if needed) must be liberated and Illegal Bangladeshis must be shifted to these New Republics.
India must Stop Appeasement Politics. The Sooner it gets stopped, the Better for the India’s Power Playing position across the Globe. India must Earn and Snatch the Global Super Power Status NOT take it. Enough of Self Loathing. Its Now or Never. Glory to India.
With Regards,
Rajkiran
http://www.newsx.com/national/yogi-adityanath-government-bans-meat-and-liquor-shops-in-mathuras-vrindavan-and-barsana
ReplyDeleteBEFORE THE WHITE INVADER CAME TO INDIA NOBODY HEARD OF RADHA
The Mahabharata or ancient Puranas mention Krishna , but NEVER EVER a woman named Radha.
RADHA NEVER EXISTED.. …SHE WAS A FAKE AND BACKDATED CREATION OF JEW ROTHSCHILD , LIKE ALL THE DASAS . …
All this bull about Radha being a mistress of Lord Krishna and all his thousands of Gopikas whom he flirted with , are all poisons injected into Hinduism by the white invader. ….
Krishna did NOT have 16000 virgin gopikas in vrindavan
SAHASRARA CHAKRA is a 1000 petalled lotus -- each with 16 kalas or aspects --..this works out to 16000
Narakasura kidnapped 16000 damsels-and Lord Krishna saved these damsels in distress. this is just an allegory
JAYADEVA WHO INVENTED RADHA NEVER EXISTED. HE WAS A FAKE AND BACKDATED CREATION OF JEW ROTHSCHILD.
The FAKE Geeta-Govinda was full of immoral sex and erotica to describe the ILLICIT love between "Radha" and a married Krishna.
At every desh drohi literary fest the JNU commies discussed Radha and her erotic lustful sexual affair with a married Krishna .
THOUGH KRISHNA CAME ON EARTH TO KILL DANTAVAKRA AND SHISHUPAPA-- HIS MAIN UNWRITTEN AIM WAS TO ELIMINATE 100 GENETIC ENGINEERED KAURAVAS……………..
http://ajitvadakayil.blogspot.in/2015/09/ethics-of-human-cloning-decided-6000.html
ALL RIDICULE HINDUS AS IDOL WORSHIPPERS.
THIS IS ABSOLUTELY WRONG
THE GOD IN SANATANA DHARMA ( ADVAITA ) IS THE MORPHOGENTIC CONSCIOUSNESS FIELD OF BRAHMAN WHICH CANNOT BE LICKED UP BY THE 5 HUMAN SENSES –
BrahmAn ( advaita Hinduism ) is empty space or macro and micro scale .
http://ajitvadakayil.blogspot.in/2016/12/perpetual-motion-of-orbiting-electrons.html
kabirDAS of immaculate conception , who floated on a lotus leaf ( like krishna ) down ganges river to be found by a Muslim weaver couple did NOT exist . hence the question of sant rampal being a re-incarnation of kabirdas does NOT arise at all .
kaliDAS who wrote about the FAKE mistress of lord krishna RADHA did not exist . so did surDAS who extolled the virtues of the FAKE radha . rothschild included verses of surdas in the holy book of sikhs guru granth sahib .
tulsiDAS who wrote about lord rama abandoning his pregnant wife sita who then delivered twins luv/ kush did not exist . Valmiki ramayana has no FAKE agnipariksha .
THE WHITE INVADER PAINTED MARYADA PURUSH LORD RAM AS A HEARTLESS HUSBAND WHO ABANDONED HIS PREGNANT WIFE.
SORRY , THIS STORY WAS INVENTED AND BACK DATED BY THE IMMORAL WHITE INVADER OVER BRANDY AND CIGARS.
raviDAS and chandiDAS who again extolled the virtues of the FAKE mistress of krishna radha did NOT exist .
ALL DASAS OF BHAKTI MOVEMENT ARE FAKE BACK DATED CREATIONS OF THE WHITE INVADER , TO DIVIDE AND RULE , MAKE THE HINDUS SELF LOATHING, AND DRIVE FISSURES INTO HINDUSIM .
WE INDIANS NEVER HEARD OF ANY DASA BEFORE THE WHITE INVADER CAME TO INDIA.
DASA written verses were packed into Guru Granth Sahib by Jew Rothschild who ruled India …
capt ajit vadakayil..
PUT ABOVE COMMENT IN THE WEBSITES OF--
DeleteYOGI ADITYANATH
PMO
PM MODI
EDUCATION MINISTER
I&B MINISTER
LAW MINISTER
CJI
SUPREME COURT BAR COUNCIL
AND ALL DESH BHAKT HINDU LEADERS
https://timesofindia.indiatimes.com/india/sc-asks-centre-to-prepare-scheme-for-special-courts-to-try-cases-involving-politicians/articleshow/61406112.cms
ReplyDeleteAT LEAST THESE CORRUPT POLITICIANS ONLY MADE MONEY... THEY WERE NOT TRAITORS..
FIRST WE NEED TO PUNISH JUDGES WHO WERE DESH DROHI----- WHO KEPT THE ILLEGAL COLLEGIUM JUDICIARY ALIVE, WHO CREATED THEIR OWN LAWS VIA PIL ROUTE, WHO LIVE FAR BEYOND THEIR KNOWN SOURCES OF INCOME- WHO GO ABROAD AGAIN AND AGAIN , WHO HAVE INFLICTED A MILLION CUTS ON BHARATMATA...
BEFORE 1947 ALMOST ALL OUR JUDGES WERE IN THE PAYROLL OF JEW ROTHSCHILD . . .
WE KNOW COLLEGIUM JUDGES HAVE FOREIGN SUPPORT WHEN THEIR LEGISLATE , DO EXTREME JUDICIAL OVERREACH . . . .
PEOPLE LIKE JEW NOAM CHOMSKY GIVE FIATS TO COLLEGIUM MELORDS ..
THE TIME HAS COME FOR "WE THE PEOPLE" TO DECLARE --WHATEVER LAWS HAVE BEEN CREATED BY JUDGES ARE ALL NULL AND VOID -- WE KNOW THESE " JUDGE CREATED LAWS "….
THE DAY WILL COME WHEN THE SYSTEM WILL BREAK DOWN -- THE JUDGES WILL BE JAILED--THEY WILL LOSE THEIR PENSIONS….
THIS WILL HAPPEN WHEN UPSET POLICE TELLS THE JUDGE " MAKE YOUR OWN ARREST… WE ARE DONE WITH JUDGES PLAYING GOD !"….
PM MODI-- WE ELECTED YOU FOR 5 YEARS -- YOU HAVE ALLOWED COLLEGIUM JUDGES TO SHIT ON BHARATMATAs FACE -- WE THE PEOPLE ARE SHOCKED AND DISMAYED…
WHO RULES INDIA ?
PM MODI OR THE " SOLI / FALI IMMIGRANT GANG " ?... KYA HO RAHA HAI ?...
WE DONT WANT LAWYER TURNED JUDGES TO INTERFERE WITH BHARATMATAs SECURITY-- EXTERNAL ( ROHINGYAS ) OR INTERNAL ( NAXALS/ ISLAMIC SEPARATISTS )…
KASHMIRI MUSLIMS WHO HAVE DRIVEN AWAY HINDU PANDITS, USURPED THEIR LANDS AND DESTROYED THEIR TEMPLES -- ARE CALLING THEMSELVES "MINORITY" AND MILKING THE BENEFITS --
NCM / NHRC ( CONTROLLED FROM ABROAD ) PLAYS ALONG… WE THE PEOPLE DEMAND TO KNOW--
THE ITALIAN WAITRESS GAVE 10 BILLION EUROS TO ITALY ZONE--- MODI GAVE 10 BILLION USD TO AFRICA AND 10 BILLION USD TO BANGLADESH….
WHAT HAVE YOUR DONE FOR KASHMIRI PANDITS SO FAR ? TEENAGED KASHMIRI PANDIT SCHOOL GIRLS ARE STILL LIVING IN TENTS ?...
JUDGES HAVE DESTROYED THIS WATAN DUE TO ENDLESS HAIRSPLITTING , MAKING DECISIONS OUT OF CONTEXT--WITHOUT DHARMA OR NATURAL JUSTICE…ENOUGH IS ENOUGH!
http://ajitvadakayil.blogspot.com/2017/10/time-has-come-to-save-watan-time-is-now.html
capt ajit vadakayil
..
PUT ABOVE COMMENT IN WEBSITES OF--
DeletePMO
PM MODI
LAW MINISTER
ATTORNEY GENERAL
SUPREME COURT BAR CUNCIL
I&B MINISTER
HOME MINISTER
DEFENCE MINISTER
AND WEBSITES OF DESH BHAKT LEADERS
ABOVE COMMENT IS SPAMMED BY TIMES OF INDIA
Deletehttps://www.veteranstoday.com/2017/10/31/trotsky-the-wall-street-thug/
ReplyDeleteA nice article with comments , of course the writer hints at R ie wall street bankers...