Jump to content
The World News Media

James Thomas Rook Jr.

Member
  • Posts

    6,689
  • Joined

  • Last visited

  • Days Won

    153

Everything posted by James Thomas Rook Jr.

  1. Every time I was in a Catholic Hospital, it cheered me up .... I Iooked, and obviously felt better better than that guy on the wall.
  2. It's a good thing for the jewelry business that Jesus did not drown.
  3. .... except for the boy in the back with a Home Depot bucket on his head ..... and the gal up front with the broken yo-yo.
  4. Oh ... I dunno .... I was raised as a Jehovah's Witness and my Children's Books were not like that ! Of course, My JW mother was a strong woman, and a strict disciplinarian.
  5. i just sent Wikipedia $20.80, which I do once a year. If you can afford it, and appreciate what they do ... send them some money. I use Paypal, which has worked PERFECTLY for me for over 20 years.
  6. Whatever it is you wrote, it is obviously not important, or you would have translated it into English, so 50 separate people would not have to.
  7. People have to learn at as young an age as possible ... that actions have consequences.
  8. A young, beautiful Sister publicly dancing around in a thong bikini would be sinful. Me doing it would be GROSSLY sinful.
  9. This is what parents SHOULD do. The last time I saw "black bars" over people's eyes in photos was in 1965, in a "True Detective" pulp magazine. She looks pretty young to be Mob Bosses' Gun Moll.
  10. Dark web From Wikipedia, the free encyclopedia Jump to navigation Jump to search This article is about darknet websites. For the part of the Internet not accessible by traditional web search engines, see Deep web. The dark web is the World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access.[1][2] The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.[3][4][5][6][7] The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.[8] The Tor dark web may be referred to as onionland,[9] a reference to the network's top-level domain suffix .onion and the traffic anonymization technique of onion routing. Terminology The dark web has often been confused with the deep web, which refer to the parts of the web not indexed (searchable) by search engines. This confusion dates back to at least 2009.[10] Since then, especially in reporting on Silk Road, the two terms have often been conflated,[11][12][13] despite recommendations that they should be distinguished.[5][14][15][16] Definition Main article: Darknet Darknet websites are accessible only through networks such as Tor ("The Onion Routing" project) and I2P ("Invisible Internet Project").[17] Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain ".onion".[18] While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing anonymous hosting of websites.[19] Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer.[20] Due to the high level of encryption, websites are not able to track geolocation and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.[21] The darknet is also used for illegal activity such as illegal trade, forums, and media exchange for pedophiles and terrorists.[22] At the same time traditional websites have created alternative accessibility for the Tor browser in efforts to connect with their users. ProPublica, for example, launched a new version of its website available exclusively to Tor users.[23] Content Web-based onion services in January 2015[24] Category Percentage Gambling 0.4 Guns 1.4 Chat 2.2 New (not yet indexed) 2.2 Abuse 2.2 Books 2.5 Directory 2.5 Blog 2.75 Porn 2.75 Hosting 3.5 Hacking 4.25 Search 4.25 Anonymity 4.5 Forum 4.75 Counterfeit 5.2 Whistleblower 5.2 Wiki 5.2 Mail 5.7 Bitcoin 6.2 Fraud 9 Market 9 Drugs 15.4 Web-based onion services in February 2016[25][26] Category % of total % of active Violence 0.3 0.6 Arms 0.8 1.5 Illicit Social 1.2 2.4 Hacking 1.8 3.5 Illicit links 2.3 4.3 Illicit pornography 2.3 4.5 Extremism 2.7 5.1 Illicit Other 3.8 7.3 Illicit Finance 6.3 12 Illicit Drugs 8.1 15.5 Non-illicit+Unknown 22.6 43.2 Illicit total 29.7 56.8 Inactive 47.7 Active 52.3 A December 2014 study by Gareth Owen from the University of Portsmouth found that the most commonly hosted type of content on Tor was child pornography, followed by black markets, while the individual sites with the highest traffic were dedicated to botnet operations (see attached metric).[27] Many whistleblowing sites maintain a presence[28] as well as political discussion forums.[29] Sites associated with Bitcoin, fraud related services and mail order services are some of the most prolific.[27] In July 2017, Roger Dingledine, one of the three founders of the Tor Project, said that Facebook is the biggest hidden service. The Dark Web comprises only 3% of the traffic in the Tor network.[30] A more recent February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services.[31][32] Botnets Botnets are often structured with their command and control servers based on a censorship-resistant hidden service, creating a large amount of bot-related traffic.[27][33] Bitcoin services Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration.[34][35] A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into money.[36][37] Darknet markets Main article: Darknet market Commercial darknet markets, which mediate transactions for illegal drugs[38] and other goods, attracted significant media coverage starting with the popularity of Silk Road and Diabolus Market[39] and its subsequent seizure by legal authorities.[40] Other markets sell software exploits[41] and weapons.[42] Examination of price differences in Dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the Dark web. One such study was performed on Evolution, one of the most popular crypto-markets active from January 2013 to March 2015.[43] Although it found the digital information, such as concealment methods and shipping country, "seems accurate", the study uncovered issues with the quality of illegal drugs sold in Evolution, stating that, "... the illicit drugs purity is found to be different from the information indicated on their respective listings."[43] Less is known about consumer motivations for accessing these marketplaces and factors associated with their use.[44] Hacking groups and services Many hackers sell their services either individually or as a part of groups.[45] Such groups include xDedic, hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market.[46] Some have been known to track and extort apparent pedophiles.[47] Cyber crimes and hacking services for financial institutions and banks have also been offered over the Dark web.[48] Attempts to monitor this activity have been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal.[49] Use of Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks have also been made through leveraging the Dark Web.[50] There are many scam .onion sites also present which end up giving tools for download that are infected with trojan horses or backdoors. Fraud services There are numerous carding forums, PayPal and Bitcoin trading websites as well as fraud and counterfeiting services.[51] Many such sites are scams themselves.[52] Hoaxes and unverified content Main article: Hoax There are reports of crowdfunded assassinations and hitmen for hire,[42][53] however, these are believed to be exclusively scams.[54][55] The creator of Silk Road, Ross Ulbricht, was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped.[56][57] There is an urban legend that one can find live murder on the dark web. The term "Red Room" has been coined based on the Japanese animation and urban legend of the same name. However, the evidence points toward all reported instances being hoaxes.[58][59] On June 25, 2015, the indie game Sad Satan was reviewed by Youtubers Obscure Horror Corner which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events.[60] There are several websites which analyze and monitor the deep web and dark web for threat intelligence, for example Sixgill.[61] Phishing and scams Phishing via cloned websites and other scam sites are numerous,[62][63] with darknet markets often advertised with fraudulent URLs.[64][65] Puzzles Puzzles such as Cicada 3301 and successors will sometimes use hidden services in order to more anonymously provide clues, often increasing speculation as to the identity of their creators.[66] Illegal pornography There is regular law enforcement action against sites distributing child pornography[67][68] – often via compromising the site by distributing malware to the users.[69][70] Sites use complex systems of guides, forums and community regulation.[71] Other content includes sexualised torture and killing of animals[72] and revenge porn.[73] Terrorism There are at least some real and fraudulent websites claiming to be used by ISIL (ISIS), including a fake one seized in Operation Onymous.[74] In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac.[75] The Rawti Shax Islamist group was found to be operating on the dark web at one time.[76] Social media Within the dark web, there exist emerging social media platforms similar to those on the World Wide Web. Facebook and other traditional social media platforms have begun to make dark-web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web.[23] Commentary Although much of the dark web is innocuous, some prosecutors and government agencies, among others, are concerned that it is a haven for criminal activity.[77] Specialist news sites such as DeepDotWeb[78][79] and All Things Vice[80] provide news coverage and practical information about dark web sites and services. The Hidden Wiki and its mirrors and forks hold some of the largest directories of content at any given time. Popular sources of dark web .onion links include Pastebin, YouTube, Twitter, Reddit and other Internet forums.[81] Specialist companies with Darksum and Recorded Future track dark web cybercrime goings on for law enforcement purposes.[82] In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market take downs.[83] In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a 'Joint Operations Cell' to focus on cybercrime.[84] In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.[85] In March 2017 the Congressional Research Service released an extensive report on the dark web, noting the changing dynamic of how information is accessed and presented on it; characterized by the unknown, it is of increasing interest to researchers, law enforcement, and policymakers.[86] In August 2017, according to reportage, cybersecurity firms which specialize in monitoring and researching the dark web on behalf of banks and retailers routinely share their findings with the FBI and with other law enforcement agencies "when possible and necessary" regarding illegal content. The Russian-speaking underground offering a crime-as-a-service model is regarded as being particularly robust.[87] Journalism Many individual journalists, alternative news organizations, educators, and researchers are influential in their writing and speaking of the Darknet, and making its use clear to the general public. Jamie Bartlett Jamie Bartlett is a journalist and tech blogger for The Telegraph and Director of the Centre for the Analysis of Social Media for Demos in conjunction with The University of Sussex. In his book, The Dark Net,[88] Barlett depicts the world of the Darknet and its implications for human behavior in different context. For example, the book opens with the story of a young girl who seeks positive feedback to build her self-esteem by appearing naked online. She is eventually traced on social media sites where her friends and family were inundated with naked pictures of her. This story highlights the variety of human interactions the Darknet allows for, but also reminds the reader how participation in a overlay network like the Darknet is rarely in complete separation from the larger Web. Bartlett's main objective is an exploration of the Darknet and its implication for society. He explores different sub-cultures, some with positive implications for society and some with negative.[89] Bartlett gave a TEDTalk in June 2015 further examining the subject.[90] His talk, entitled "How the mysterious Darknet is going mainstream", introduces the idea behind the Darknet to the audience, followed by a walkthrough example of one of its websites called the Silk Road. He points out the familiarity of webpage design similar to consumer sites used in the larger commercial Web. Bartlett then presents examples of how operating in an uncertain, high-risk market like those in the Darknet actually breeds innovation that he believes can be applied to all markets in the future. As he points out, because vendors are always thinking of new ways to get around and protect themselves, the Darknet has become more decentralized, more customer friendly, harder to censor, and more innovative. As our societies are increasingly searching for more ways to retain privacy online, such changes as those occurring in the Darknet are not only innovative, but could be beneficial to commercial online websites and markets. Other media Traditional media and news channels like ABC News have also featured articles examining the Darknet.[91] Vanity Fair magazine published an article in October 2016 entitled "The Other Internet". The article discusses the rise of the Dark Net and mentions that the stakes have become high in a lawless digital wilderness. It mentions that vulnerability is a weakness in a network's defenses. Other topics include the e-commerce versions of conventional black markets, cyberweaponry from TheRealDeal, and role of operations security.[92] See also Cryptography portal Freedom of speech portal Information technology portal Internet portal Deepnet List of Tor hidden services
  11. Criteria of "Worthless Things" changes over time.... Knowing the multiplication tables by memory is very valuable. 30 years of that is hypnotic .... but worthless.
  12. Well.... at our Kingdom Hall, we used to have attached to the walls in both the restrooms fold-down "Baby Changing Tables". I went in, and one of the tables had been opened, and was down, and was ready for a baby to change. I stuck a yellow Post-It-Note (which I sometimes carry) on the table surface and closed it back up. The note read, in large print: "Baby changing table --- take a baby ... leave a baby". Soon afterwards, they removed both changing tables.
  13. An incompetent defense is no defense at all. It's embarrassing to be killed because you were incompetent, and a fool.
  14. The Policeman's body language when he sat down on the edge of the table did the trick. As Christians we should try to de-fuse any confrontations .... if we can. Sometimes ... it does not depend upon us. Knowing the techniques of how minds work is a necessary skill. At 5AM, outside a hotel in Greenville, South Carolina, as I was going to my car to go to work, some guy came up to me and demanded money. He was very insistent. In a calm low tone of voice I told him "I don't have any money ... in fact, if I emptied my gun in your stomach, I could not even afford more bullets." He looks down, and sees my revolver. "I want some money, man!" I said "Let me be clear ... I am NOT going to give you any money." He went away, and I went to work. It's easier to be a peacemaker, when you "have the drop" on the bad guys, and they know it ..... AND ... you many times do not have to actually bet your life. "STUFF HAPPENS", usually when you are not paying attention, or are a coward, and have what you think is a Bible Scripture to support that fear.
  15. There is more! The Dummy Song - Louis Armstrong.mp4 2 CHAIR pORNEA .mp4
  16. Speaking of dissonant, screeching notes amongst some pure ones ...about 45 years ago I was listening to my car radio and without any musical background was a large group of men singing in German what I thought was a German Beer Drinking song at an Oktoberfest, or something. It was INCREDIBLE ... the energy, the power, the determination. It got me excited! I wanted to be a part of that group! I wanted a big mug of BEER, and to wave it around, singing, too. I only heard it one time, but I still remember it to this day, 45 years or so later. It was really SOMEthing! At the end the radio host said that what you have just heard was a Nazi Gestapo marching song. I was taken aback, surprised, and a little bit ashamed of my visceral reaction. Since then ... I have tried to be a discordant and screeching note, whenever I can. I also dodge and weave. Just in case. .... better to be safe ... than sorry.
  17. The blood of innocent people is important. My family's and mine is more important than a criminal's who plans to kill us. BANG! ...and I sleep well at night.
  18. What is the difference between blasphemy, and heresy?
  19. I am O.K. with whatever happens except if when the gates of the Abyss are opened, out pops Jimminy Cricket, and Caleb and Sophia.
  20. Billy: That is a whole SEPARATE issue: The Constitution of the United States tells the Federal Government what powers it is allowed to have. Everything NOT SPECIFICALLY ENUMERATED ... is reserved to the States, or to the People. Constitutionally, the United States Federal Government is NOT permitted to be in the Health Care business. Period. Besides.... The ACA or "Obamacare" was never actually "insurance", anyway... because of the allowance that you could get it with pre-existing conditions. Try getting fire insurance on your home..... AFTER .... you home is already on fire. If you can, what you have bought is NOT insurance .... it is insanity. Same with Health Insurance ... Obamacare was fiscally bankrupt, before the first policy was sold.
×
×
  • Create New...

Important Information

Terms of Service Confirmation Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.