World’s First Anti-Propaganda Search Engine Launching Soon

(NaturalNews) For the last six months, I have been working hard on the development of a breakthrough search engine that will finally offer a credible search alternative to the NSA-funded, surveillance-state search engines currently dominating the web.

Next week, I’ll be opening the webmaster URL submit page for the world’s first independent, anti-propaganda search engine that filters out corporate propaganda and government disinformation. The search engine is free to submit to and free to use. It’s funded entirely by advertising that appears on the search results page.

Uniquely, this independent search engine either bans or flags (with a warning) all corporate propaganda and government disinfo websites. Just as Google flags search result URLs containing malicious code that can infect your computer, we will flag search result URLs containing malicious propaganda that can infect your mind.

This means you won’t find the CDC’s vaccine propaganda dominating search results, for example. Instead, you’ll find a universe of independent websites that have been suppressed, censored or outright banned by Google. You’ll also be able to help protect the integrity of the search results by flagging corporate propaganda and government disinfo using the clickable feedback icons present on the search results pages.

It’s time for a credible alternative to the “New Evil Empire”

Why is this needed? Google is now known as “the new evil empire” according to this Fox Business article. It quotes Google Chairman Eric Schmidt as saying:

We don’t need you to type at all because we know where you are. We know where you’ve been. We can more or less guess what you’re thinking about … Is that over the line?

“Google may very well be the most sinister threat and wicked incarnation of them all,” writes Fox Business author Steve Tobak. “The Google Empire is expanding into everything from self-driving cars and virtual reality to broadband fiber and neural networks. It’s even collecting genetic and molecular information from thousands of people to map humans in a way that’s eerily reminiscent of how it maps the world’s streets.”

The search engine I’m launching engages in NO surveillance of users. It does not record your search history or click history, nor does it link your IP address to any activity. Instead of spying on you, it protects your privacy while delivering far more accurate and truthful independent search results from non-corporate-controlled information sources.

Google is actively punishing truth-telling websites that diverge from “official” sources

In addition to functioning as the police state surveillance branch of the NSA, Google is actively censoring Independent Media websites, punishing those sites’ rankings merely because they challenge the propaganda and fraud of the status quo.

Google’s search results are now determined by each page’s so-called “factiness” — a new algorithm that punishes all content which disagrees with official sources such as the criminally operated CDC, the pharma-controlled science journals, and biotech-infiltrated universities. Independent, truthful information is now punished in Google rankings, a search engine which has abandoned ranking based on merit and is now pushing rankings based on propaganda.

This shift effectively makes Google a real-life Ministry of Truth that censors the truth and promotes corporate propaganda (and government disinfo), all while spying on you to boot. It’s a lose-lose proposition: At the same time you are handing over your psychological profile to the search engine, it’s also filling your mind with lies disguised as “facts” from official sources. Think about it: Google heavily promotes Wikipedia, a discredited disinfo and defamation website largely edited by corporate-funded trolls hiding behind anonymity. Even though Wikipedia was co-founded by a “porn king” and carried child porn imagery on its site, Google gives it high rankings while punishing the independent media websites that actually publish the truth.

Google also strongly favors mainstream media news sources — precisely the news outlets that spew the most blatant disinformation about everything that matters: Central Banks, government debt, politics, economics, health care, immigration, crime, culture and more. Virtually all news sites that print the truth have been systematically removed from Google News over the last few years, and there is little doubt that Google plans to effectively remove all “alternative” websites from its index by penalizing them into oblivion.

On top of all that, Google is of course an extension of the NSA. It monitors your searches to build a psychological profile of who you are and how you think. Google has become the Orwellian surveillance apparatus it once assured us it could never be. And more than ever, the need now exists for a committed, trusted, alternative search engine that focuses on indexing independent, truth-telling websites rather than the lying “official sources” that Google strangely considers to be “trustworthy sources.” (If you trust CNN or MSNBC on anything, you probably need to have your head examined…)

The first search engine that launches with a Code of Ethics

This search engine will be the first in the world that launches with a Code of Ethics, outlining the permanent boundaries and limits of what the engine will do.

I’m still working on the final Code of Ethics guidelines, but they will cover these key areas:

• No indexing of sites promoting porn, gambling or Big Pharma.
• No surveillance of users and no storage of search history from users.
• No sharing of search data with the NSA or other spooks.
• No “gaming” of search results to favor my own projects (such as Natural News).

Created to support the courageous voices across the Independent Media

For over 13 years, I’ve been one of the top voices in the Independent Media, speaking out with truth-telling articles on the big issues of our day such as vaccine mandates, health freedom, food freedom, the coming global debt collapse, constitutional rights and civil liberties. Over this time, I’ve watched the rise of the Independent Media which has earned far higher viewership and trust than the old-school “mainstream media”.

There are so many powerful voices of truth emerging today that it’s just astonishing to watch them work. Some of my favorite voices are people like Aaron Dykes and Melissa Melton from TruthStreamMedia.com and Jon Rappoport from NoMoreFakeNews.com. I’m also, of course, a huge fan of Robert Scott Bell at NaturalNewsRadio.com. But there are so many more that are also deserving of some public recognition, too.

The point is there are tens of thousands of courageous, independent voices of truth who are joining the fight for humanity by printing the truth about the corporate poisoners and Big Brother government. My aim with this search engine project is to help give these voices of truth a platform for increased exposure. While Google is censoring and silencing voices of courage and truth, I want to empower them with a new search engine that will actually favor their content over the lying mainstream media.

So for all of you in the Independent Media, you’re invited to submit your site URL and get indexed. This new search engine could become a dominant source for your web traffic, especially as Facebook is clearly experimenting with its own “publisher kill switch” that can cause all independent publishers to immediately lose all Facebook traffic.

The day is probably not too far off when Google and Facebook ban all independent media websites. When that day comes, it’s projects like the one I’m launching that will be the last remaining portals to real journalism and independent reporting. (For this reason, the entire project is also being mirrored offshore as well as hosted domestically.)

We’ll be opening up the submit page this week. Stay tuned to Natural News this week for details on this launch.

Help us spread the word across the Independent Media so that webmasters, bloggers and independent journalists know this is coming. Finally! A place where their efforts will be recognized rather than suppressed…

World’s First Anti-Propaganda Search Engine Launching Soon

Secret Surveillance by Lasha Darkmoon

Lasha Darkmoon yet again with an outstanding article.

Imagine a world in which you are being spied on 24/7 by an all-seeing Eye. And be aware that Big Brother is watching you, not only from the US and Britain but also from Israel.

NSA-eye.jpg  -  1Mass surveillance is the new norm. Big Brother is watching you and listening to you always. With the help of microscopic cameras and wireless concealable microphones and precise location tracking devices, he is keeping his tabs on you twenty-four hours a day.

He is randomly searching you on trains. He is groping you at airports.  He is flagging you down in remote country locations and ordering you to open the trunk of your car so that he can inspect it for drugs, stolen children, and human heads in plastic bags. If you’re a woman, he can taser you and rape you and then put you in handcuffs for resisting arrest.

Orwell never imagined it could be quite so bad.

According to whistleblower Edward Snowden, we now have “the largest program of suspicionless surveillance in human history”.

NSA official William Binney, who resigned from the agency in protest over its systematic violation of privacy laws, has revealed that the US government has “assembled on the order of 20 trillion transactions about US citizens. The data that’s being assembled is about everybody. From that data, they can target anyone they want.”

Guardian correspondent Glenn Greenwald confirms this. “No human communication can be allowed to take place without the scrutinizing eye of the US government,” he tells us. “This is the animating principle of the US Surveillance State. Mass surveillance is the hallmark of a tyrannical political culture.”

Another famous whistleblower, Thomas Drake, is equally candid. “There is no constraint,” he points out grimly. “The United States is now a surveillance state. “This is the new normal.”

No digital or electronic communication you make is secure. Many of your secrets are already known to someone. Your private life is subject to the minutest and most persistent scrutiny. You may be interested to know that Snowden is so paranoid about his privacy that wherever he is—in airports, hotels, libraries—“he puts a large red hood over his head and laptop when entering his passwords to prevent any hidden cameras from detecting them.”

All your emails—past, present and future—are there for someone to read. Every day the NSA records trillions of emails and phone calls. Your calls are not only being recorded but sophisticated voice recognition devices enable some geek in a cubicle to pluck your voice out of a million other similar-sounding voices. Your online chats, your calls over Google Voice, Skype, and other voice-over-internet systems, are all on record. Every website you visit, someone knows you’ve been there and how long you’ve lingered on each item.

Did you know that the Internet giants who said to you, “Trust us, we will never betray your secrets to anyone!” have deceived you and let you down? Did you know that Google has betrayed you to Big Brother? That Microsoft has betrayed you, that Facebook and Apple have betrayed you, that AT&T and Verizon have betrayed you?

You probably heard the shocking news recently that Broadband and telecommunications giant Verizon is now offering its customers hard-core porn titles with child and incest themes. (See Verizon Defends Pimping Child Porn).

Lurid titles include “I Banged My Stepdad,” “Mom, Daughter and Me,” and “Pigtail Teens Pounded”.

Verizon’s Associate Director for Advertising, John P. Artney, defended his company’s decision to promote incest and child porn. “Consumers today have extraordinary choice,” he enthused.  “The explosion in choice is a tremendous benefit to consumers.”

This is bad enough, but it gets worse.

Did you know that Israeli security and surveillance company, Verint Systems, has for years had back-door access to all the traffic passing through Verizon? This means that anyone who uses Verizon to access incest and child porn has all his porn-viewing history automatically transmitted to Israel.

Not only do the spooks in Utah (NSA) and the spooks in Cheltenham, England (GCHQ), have their tabs on internet users at all times.

Big Brother is also watching you from Tel Aviv.

How is most of our personal data gathered?  Well, it passes under the oceans through fiber-optic cables which Big Brother has learned to tap. The tiny filaments inside the cables utilize pulsating flashes of light to transmit up to 100 billion bits of data per second.

If Big Bother is based in America, Big Sister hangs out in the UK. The Government Communications Headquarters (GCHQ) is located in Cheltenham, England. It is now commonly acknowledged that Britain is the world’s intelligence superpower. This is partly due to Britain’s advantageous  Atlantic location between the US and Europe.

“The UK has a huge dog in this fight,” Snowden told the Guardian recently. “They [GCHQ] are worse than the US.” By ‘worse’ he means better at invading the privacy of people, without any moral qualms or legal constraints.

GCHQ.jpg  -  2We learned recently that GCHQ (pictured) was tapping into 600 million telephone calls each day. A huge number of these, being transatlantic calls, are naturally of intense interest to the Americans. These calls are accessed by tapping into more than 200 fiber-optic cables that snake their way across the Atlantic like slimy, seaweed clad serpents. Each of the cables carries data at a rate of 10 gigabits per second. This works out to roughly 21 petabytes a day – “equivalent to sending all the information in all the books in the British Library 192 times every 24 hours.”

According to this writer’s calculations, if a reader set out to read all the books in the British Library at the rate of one book a day—that means getting through 13,950,000 books—it would take him roughly 6.5 million years to complete his task.

Hoovering up all the secrets of the world every day is clearly an impossible task, even if the entire population of the world were engaged in full-time snooping.

Out of the vast “haystack” of data, it is necessary only to find the “needles”. The government keeps telling us they are not interested in the minnows, only the sharks and killer fish, i.e., the terrorists.

I don’t think we should believe them, since they lie to us on principle.

Understand this: everyone, no matter how insignificant, is of potential interest to Big Brother, for anyone who has a guilty secret can be blackmailed.

Listen to Orwell who knew all about these shady characters:

“The old civilizations claimed that they were founded on love or justice. Ours is founded upon hatred.”

“The old civilizations claimed that they were founded on love or justice. Ours is founded upon hatred.”

“The old civilizations claimed that they were founded on love or justice. Ours is founded upon hatred.

The object of persecution is persecution.The object of torture is torture. The object of power is power.

Power is in inflicting pain and humiliation. Power is in tearing human minds to pieces and putting them together again in new shapes of your own choosing.” (Here)

Yes, that’s the New World Order for you: hatred, persecution, torture, power for power’s sake. This is what Big Brother wants. He wants power. Omnipotence. One of the prerequisites of omnipotence is omniscience.

And this is why Big Brother wants to know everything about you.

The powers that be say they’re only interested in catching the big fish, i.e., the “terrorists” who are ceaselessly plotting new 9/11s. They are not interested in you and me: in our private lives, our sordid little affairs, our telephone flirtations, our Skype romances or amorous emails. Things like that don’t interest them. False! The Petraeus affair proves the contrary.

We offer the Petraeus affair as proof that terrorism is not the only thing that interests these people.

They tell you that you have nothing to fear. Not if you’re a law-abiding citizen. Did they tell that to General Petraeus, a law-abiding citizen and pillar of the community?

General Petraeus and his mistress, Paula Broadwell

General Petraeus and his mistress, Paula Broadwell

Remember this: Petraeus was careful. Mega careful not to be caught doing anything he shouldn’t.  All he was guilty of was a little extramarital flutter.

He didn’t even send his mistress, Paula Broadwell, any emails. He kept them hidden in his drafts folder, hundreds of them, so that pretty Paula, his official biographer, could access them there through a password.

The general thought he was being clever, playing the old “draft folder trick”, letting Paula read his unsent emails and then deleting them later.

In spite of all these precautionary measures to maintain his privacy, the spooks hacked into his computer and sniffed out his secret love life, forcing him to resign.

General Petraeus was not engaged in terrorism. He was not planning a military coup or an attack on the White House. He was not thinking of bombing Dimona or the Israeli Knesset. All he was doing was sending billets-doux to his mistress Paula Broadwell, saying silly things like “I love you.” And for this he was ruined and forced to resign.

Petraeus had been critical of Israel. And so the people on Israel’s payroll went into attack mode. Many Zionist Jews were delighted at his downfall.

Foremost among General Petraeus’s enemies, his chief nemesis, was US Representative Eric Cantor, highest-ranking Jewish member of Congress in its history, and, incidentally, a cosponsor of legislation to cut off all US taxpayer aid to the Palestinians.

Image: U.S. House Majority Leader Cantor takes part in a panel discussion titled "The Awesome Responsibility of Leadership" at the Milken Institute Global Conference in Beverly Hills, CaliforniaIt was into the hands of this arch-Zionist, Eric Cantor (pictured), that General Petraeus’ private emails fell. Allegedly, they had been passed on to him by a whistleblower at the FBI.

This story is unconvincing and has never been proved.

Cantor, who is a personal friend of Israeli Prime Minister Benjamin Netanyahu, probably got his information straight from the horse’s mouth – in Israel.

Given that President Obama himself knew nothing about Petraeus’s emails, how can one explain the uncanny coincidence of the private correspondence  of a high-ranking American general, seen as hostile to Israel, falling into the hands of America’s most preeminent Israel Firster?

It cannot be easily explained.

Was the fall of Petraeus a Jewish plot? What else could it have been? The entire Petraeus affair is a cautionary tale whose moral is: Don’t cross Big Jewry.

The Petraeus affair demonstrates beyond a reasonable doubt that even our sex lives are of interest to Big Brother – especially to Big Brother in Israel.

The idea that we are all being spied on in a responsible way, and that we have nothing to fear unless we are terrorists, will not bear scrutiny. The famous Latin tag Quis custodes custodiet? — Who will watch the watchers? — says it all. We are referring here to Israeli infiltration.

The fact that everything known to the NSA (US) and GCHQ (UK) is also known to Israeli intelligence, through Israeli internet giants like Verint and Narus, is a cause for extreme concern.

Apart from Jonathan Pollard, a long list of American Jews have spied for Israel. Surprisingly, none of these Jews have been prosecuted and punished. Paul Wolfowitz, Richard Perle, Steven Bryen, Douglas Feith, Michael Ledeen, Steven Rosen, Keith Weissman, Jane Harman—the list goes on—have never been brought to justice.

They cannot be indicted, no matter what crimes they commit, because they appear to be beyond the law. The law applies only to ordinary citizens — to you and me. The ruling elite, now disproportionately Jewish, remains untouchable.

James Petras puts it like this:

Because of the power and influence of the Presidents of the 52 Major American Jewish organizations, Justice Department officials have ORDERED DOZENS OF ISRAELI ESPIONAGE CASES TO BE DROPPED.

Israel is a key overseas ally of the National Security Agency, as has been documented in the Israeli press (Haaretz, June 8, 2013). Two Israeli high tech firms, Verint and Narus, WITH TIES TO THE ISRAELI SECRET POLICE (Mossad), have provided the spy software for the NSA.

And this, of course, has opened a window for Israeli spying in the US against Americans opposed to the Zionist state.

(See here, emphasis added)

So here we have two Israeli companies, Verint and Narus, with unlimited access to the private data of the entire population of America. Verint taps the communication lines at Verizon. Narus does the same at AT&T. And both companies, we learn, “have extensive ties to Israel, a country with a long and aggressive history of spying on the US.”

It doesn’t take a genius to connect the dots.

FUGITIVE FROM JUSTICE

FUGITIVE FROM JUSTICE

Then there is Jacob “Kobi” Alexander (pictured), a former Israeli intelligence officer who founded Verint Systems, the Israeli company that monitors all the telephone calls at Verizon. He is now a fugitive from justice.

Former head of Comverse, parent company of Verint, Kobi Alexander is now a wanted man who fled US justice to Africa and is reportedly now hiding out in Israel.

“It is important to note,” Christopher Bollyn writes, “that Kobi Alexander and Comverse were closely connected to Odigo, the Israeli messaging service that was used to warn Israelis to stay away from the World Trade Center on 9-11.”

Wanted by the FBI on three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes, Kobi Alexander’s exact whereabouts are now unknown.

It comes as no surprise to learn that two of Tobi Alexander’s top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were charged with similar crimes. Both pleaded guilty and are now behind bars. Like Tobi Alexander, both are Israeli citizens.

These are the criminal types who have access to the private details of millions of people not only in America but all over the world. It’s frightening. You might as well hand over the keys of your national security to the Jewish mafia.

POLICE STATE AMERICA

POLICE STATE AMERICA

“National security is a euphemism for Jewish rule.” – JB Campbell

__________________________________________

This is an edited abridgement, brought up to date with the latest developments,
of a long 2-part article published last year called “Mass Surveillance in the Orwellian Police State”.
It was published yesterday on Veterans Today

ORIGINAL ON LASHA DARKMOON’S SITE HERE

Mega Encryption

MMM, Mega Encryption. A few days back we talked about MaidSafe. Then we featured an article about Mesh. Now we add some details about Mega. Everything to do with security seems to begin with the letter M these days. Marvellous.

You can obtain a free account with Mega at www.mega.co.nz. You receive 50Gb of free, encrypted storage. Coming in the second quarter of 2014 is encrypted chat, voice calls (a la skype) and video conferencing. We recommend Mega to the thousands of Open Free Press readers everywhere.

About Mega

Mega is a global technology business headquartered in Auckland that delivers encrypted, cloud based services that enable private, secure online communication and collaboration for businesses and individuals.

Mega’s browser-based User Controlled Encryption (UCE) is unique in providing automatic encryption for all data transferred to and stored on Mega’s cloud service. UCE means that only the user controls the encryption key. This provides a level of privacy and security that is unique, and allows Mega to position itself as “”.

The Mega service was launched on 20th January 2013. Mega currently has around 7 million registered users, with new user registrations exceeding 20,000 per day. Users have stored nearly one billion encrypted files in the Mega cloud and are currently uploading up to 11 million files per day.

Mega expects to release encrypted instant messaging and encrypted chat and video conferencing in the second quarter of 2014. Development of an encrypted email service is planned.

Mega News Release From January 19th 2014

When we launched MEGA a year ago, global mass surveillance by rogue governments under the pretext of fighting terrorism was still a wild conjecture and its proponents were often touted as conspiracy theorists. Edward Snowden’s revelations 137 days later fundamentally changed public attitudes and it became excruciatingly clear that security by policy (“we have access to your data, but we promise to keep it confidential and not misuse it”) had not been good enough. Anything short of security by design (“we cannot gain access to your data without you being able to find out”), for which strong end-to-end encryption is an essential prerequisite, now seems grossly insufficient.

MEGA was architected around the simple fact that cryptography, for it to be accepted and used, must not interfere with usability. MEGA is fully accessible without prior software installs and remains the only cloud storage provider with browser-based high-performance end-to-end encryption. The only visible signs of the crypto layer operating under MEGA’s hood are the entropy collection during signup, the lack of a password reset feature and the novel (and browser-specific) ways file transfers are conducted. Today, millions of business and personal users rely on MEGA to securely and reliably store and serve petabytes of data and we believe that this success is the result of MEGA’s low barrier to entry to a more secure cloud.

Since we opened MEGA to the public, we have added many of the initially missing bits and pieces: we have launched mobile apps for and a . Yet, our cloud storage product is still incomplete — tablet support, BlackBerry and Windows Phone apps and sync clients for MacOS and Linux are on their way, along with much more complete and accessible .

We would like to thank all users who put up with the teething issues during our beta phase, the critics who sparked healthy and often entertaining controversy around our design decisions and the security researchers who successfully participated in our bug bounty program.

This year, MEGA will evolve beyond mere cloud storage and become a feature-complete online collaboration and communication platform, all with no-compromise end-to-end encryption.

It has been an extremely busy year for us, and we’re looking forward to the next twelve months of providing a feature-rich secure cloud!

Mesh – Another Game Changer ?

You wait seven years for one game changing technology to turn up and then two turn up at once. First MaidSafe, now Mesh. Lead on MacDuff.

How An Under-Appreciated iOS 7 Feature Will Change the World

ORIGINAL ARTICLE HERE

firechat

A curious download hit Apple’s app store this week: a messaging app called FireChat.

It’s a new kind of app because it uses an iOS feature unavailable until version 7: the Multipeer Connectivity Framework. The app was developed by the crowdsourced connectivity provider Open Garden and this is their first iOS app.

The Multipeer Connectivity Framework enables users to flexibly use WiFi and Bluetooth peer-to-peer connections to chat and share photos even without an Internet connection. Big deal, right?

But here’s the really big deal — it can enable two users to chat not only without an Internet connection, but also when they are far beyond WiFi and Bluetooth range from each other — connected with a chain of peer-to-peer users between one user and a far-away Internet connection.

It’s called wireless mesh networking. And Apple has mainstreamed it in iOS 7. It’s going to change everything. Here’s why.

It can also extend an Internet connect to a place where none exists — for example, to a hotel basement, cave or to rural areas where cell tower connections are non-existent.

It does that through the mesh networking capability inherent in the Multipeer Connectivity Framework. With multiple users in the area, FireChat can relay messages just like the internet does, from node to node (phone to phone).

(Apple’s AirDrop works in the same way, by the way.)

Here’s an example. There’s an ultramarathon that takes place in California each year on a trail called Skyline-to-the-Sea. It’s a roughly 30 mile trail through giant redwood forests where there is no cell connectivity. Using FireChat or some other app that uses iOS 7’s Multipeer Connectivity Framework, race volunteers, staff and participants could extend Internet connectivity and communication in an ad hoc mesh network that extends the length of the course.

The benefit of such an ad-hoc network is how trivially easy it is to set up. Everybody just use FireChat or AirDrop or any other similar app. Boom! Connectivity for everyone.

You can imagine the uses in a disaster area where cell towers have been knocked out, or other situations where people need to communicate but where no WiFi or mobile broadband is available.

In many poor countries and areas, people might be able to afford cheap or used phones, but not wireless service fees. Wireless mesh networks can provide free Internet connectivity to entire villages, slums or towns.

And, of course, Multipeer Connectivity Framework-based mesh-networking apps like FireChat can become a factor for young people. For example, parents who have given their kids iPod Touch devices can chat with the family using FireChat without connecting to the Internet.

And teens who get in trouble with their parents and have their phone contracts cancelled or suspended can still chat with friends with their iPhones using FireChat (with the neighbor kid’s help).

Because FireChat can be used anonymously, it could be very secure. Not only is it hard or impossible to determine who the anonymous users are, it can’t even be hacked remotely over the Internet if no Internet connectivity is being used. This application and the services in iOS 7 that make it possible seem ideal for communication in repressive, Internet censoring countries.

The big picture here, though, which the public hasn’t understood at all (because apps like FireChat are so new) is that mesh networking is about to go mainstream for consumer use.

Note that Open Garden, the creator of FireChat, already offers wireless mesh networking on Android, but not in the form of a chat app — it’s just the networking.

Apple is a leader here with its Multipeer Connectivity Framework. But it appears that Google is also going big with consumer-level mesh networking also.

Google’s senior VP Sundar Pichai was interviewed at SXSW recently, and mentioned mesh networking twice in the context of wearable devices (such as those that support Google’s more recently announced Android Wear initiative, and also in the context of home automation.

With Apple and Google building in the foundations for app developers to easily create ad-hoc wireless mesh networks wherever they go, it’s only a matter of time before the wonders and power of mesh networking hits the public in a big way.

Think of wireless mesh networking as giving app developers the ability to create tiny, private or public Internets that are limited in time and place. It will have a somewhat similar impact as the Internet itself in how it undermines authority control over communication.

Ubiquitous wireless mesh networking could erase many of the places and situations where connectivity isn’t possible, or connectivity over the Internet isn’t desirable.

Kudos to Apple for building this into iOS 7. It’s the first major mainstream implementation of wireless mesh networking that I’m aware of.

Thanks Apple’s Multipeer Connectivity Framework, wireless mesh networking is here. It’s peer-to-peer. Get excited about it.
Read more at http://www.cultofmac.com/271225/appreciated-ios-7-feature-will-change-world/#QiGcRPTXh8HuAOrW.99

MaidSafe – The New Net

MaidSafe is the internet re-born: Faster, safer, cheaper and totally anonymous

By Luke Edwards ORIGINAL ARTICLE HERE

14 February 2014


It’s difficult to write this without hyperbole, but MaidSafe could potentially re-invent the internet much in the way apps changed software. A decentralised network that’s totally secure, anonymous and free for everyone to build on – is this the beginning of the end for the current internet?

MaidSafe is essentially a set of super-intelligent algorithms developed over the past seven years. This self-regulating network lets users offer spare drive space and in return delivers anonymous, super-fast internet.

Imagine having the freedom to speak out being in a country under the rule of a dictatorship, without the government being able to stop or even track individuals. The implications for freedom are great but so too are those for criminal use. Before we get into that though, what exactly is MaidSafe?

Safer surfing

Currently data such documents or a website, is stored in big server farms that need expensive cooling to run and are reasonably easy to hack. MaidSafe is different. It will break up that file and put its pieces, encrypted above military level, on different machines all over the world – owned by individuals (you, even) who have signed up to the service. Even if each of the pieces was found they’d be useless without the glue to put them all back together again in the right order.

And because you sign in with a unique key, even the MaidSafe network itself can’t find the data unless it’s you accessing it. When you log out, that data effectively fails to exist, until you’re back online.

But what if someone goes offline and I can’t get my document? Not a problem. There are always four copies on four different continents at any one time. So if a person goes offline, MaidSafe automatically copies one of the other three and redistributes a fourth. To lose any data four entire continents would need to go offline at once. That should ensure MaidSafe data is more secure than cloud services that rely on dedicated servers.

Faster finds

MaidSafe is faster than the current internet too and impervious to DDoS attacks. A Distributed Denial of Service attack is when a hacker kills a server by hitting it with so many page requests it collapses. However, when the “server” is made up of spare space on hundreds of thousands of home computers worldwide, it is near impossible to attack them all simultaneously.

In terms of web speed, MaidSafe caches a website locally, creating a copy each time it is viewed. The more it’s viewed the more it is cached and creating a greater number of locations from which to draw that website. That means the more popular a site is the faster it will actually run. It’s not dependent on a user accessing just one server and the bandwidth of the one firm.

With the pooled resources of so many computers it creates a sort of “mega-computer”, says MaidSafe. “Usually 90 to 95 per cent of data is shared in an enterprise. So MaidSafe can wipe out 95 per cent of stuff because it’s currently duplicated all over the current internet.”

Freedom to build

One of the potentially exciting features of this network is the lack of physical infrastructure. This means developers can get their apps and ideas up and running, on a huge scale, without spending a penny. This levels the playing field between big companies and the independent creators who currently might not be able to compete due to a lack of funds to rent storage space for their projects.

Since there are no servers, and unlimited space, MaidSafe lets users create any app or system they want for free.

And the lack of server maintenance could mean it is better for the environment and will save companies billions of dollars.

One of the first apps, due out later this month, will be a Dropbox-style offering. But since it relies merely on popularity rather than servers, the potential storage for each person is unlimited. And it’s more secure than anything on offer using the current internet.

MaidSafe plans to offer everything free but will take a one per cent fee where a development is making revenue. “We want to work with third parties otherwise we’ll have far too much power than one company should ever be allowed – it will end up working against us,” Pocket-lint was told.

Future gazing

The company’s ultimate goal is to have everything on MaidSafe. Everything. Like a souped-up version of the cloud. All hardware, be it tablets, phones, smart glasses or computers will become dumb terminals. Whatever you use will just need a sign-in password or retinal scan perhaps, and your entire operating system will be there just as you left it on a totally different device.

But since this network is completely anonymous and untraceable, how will search work? MaidSafe told us it’s going to leave this up to third parties like Google so they can choose how they’d prefer it to work. But policing the network is another issue that must be considered – otherwise serious criminals such as child abusers and paedophile rings are free to do as they please.

MaidSafe addressed the point while talking to Pocket-lint, but not in the way that will appease both sides of the free speech argument. “Anonymity, either you have it or you don’t – there’s no halfway house,” the company explained.

“It’s a bit like a kitchen knife manufacturer who makes really great sharp knives to cut bread, but then finds that his product was used in a knife attack.”

MaidSafe is designed with a logic system in place that offers anonymity and total freedom, to everyone. It offers potential for a more level internet that sticks to freedom of speech and anonymity for all. But at the potential cost of giving freedom to bad folk too. Not everyone will subscribe to that ideal, but it will be interesting to see how many do.

You can find out more from maidsafe.net.

Open Source 3D Printing

The RepRap Project is creating an open source development network of 3D printers. The new industrial revolution starts here.

Continue reading “Open Source 3D Printing”