Tuesday, January 28, 2014

Obama To Unveil Treasury IRAs, Or Planning For A Post-Monetization World

Wondering who will take over the mantle of Treasury bond buyer now that the Fed is stepping away? Curious of the government's next steps towards repression and control of wealth? Wait no longer. As the AP reports, President Obama will unveil a new retirement savings plan tonight that allows first-time savers to buy US Treasury bonds tax-deferred for retirement. Of course, this is not the mandatory IRA that remains somewhat inevitable (as the muddle-through fails) but is certainly a step in the direction we alerted readers to a year ago by which the government generously offers to help manage your retirement savings. Two words spring to mind... remember Poland.

Via AP,

Eager not to be limited by legislative gridlock, Obama is also expected to announce executive actions on job training, retirement security and help for the long-term unemployed in finding work.

Among those actions is a new retirement savings plan geared toward workers whose employers don't currently offer such plans.

The program would allow first-time savers to start building up savings in Treasury bonds that eventually could be converted into a traditional IRAs, according to two people who have discussed the proposal with the administration. Those people weren't authorized to discuss it ahead of the announcement and insisted on anonymity.

Of course, this is not what the CFPB suggested a year ago... We're sure the government is just trying to protect your retirement account from terrorists. From Bloomberg:

The U.S. Consumer Financial Protection Bureau is weighing whether it should take on a role in helping Americans manage the $19.4 trillion they have put into retirement savings, a move that would be the agency’s first foray into consumer investments.

That’s one of the things we’ve been exploring and are interested in in terms of whether and what authority we have,” bureau director Richard Cordray said in an interview. He didn’t provide additional details.

The bureau’s core concern is that many Americans, notably those from the retiring Baby Boom generation, may fall prey to financial scams, according to three people briefed on the CFPB’s deliberations who asked not to be named because the matter is still under discussion.

But it's getting close.

Though Poland remains the strawman...

Source: Zerohedge

Dead Sea Life Covers 98% of Ocean Floor After Fukushima

Sea life in the Pacific Ocean is dying off at an alarming rate, and the peak of all this death and destruction coincides with a certain nuclear disaster that ironically occurred on the Pacific coast of Japan. Still, scientists analyzing what’s referred to as “sea snot” point their finger at global warming, refusing to even mention the radiation from Fukushima. Normally, this snot covers about 1% of the floor. Now, it seems to be covering about 98% of it.

Dead Sea Life Covers 98 of Ocean Floor After Fukushima

According to the study published in the Proceedings of the National Academy of Sciences, life at the sea floor 145 miles out from the California coast has been analyzed for a total of 24 years now. There, the researchers measure the amount of ‘sea snot’ on the ocean floor. Sea snot is the highly technical term they use to describe dead sea life including fish, plankton, feces, and other organic oceanic matter. As mentioned, this snot covers about 1% of the floor, but now it seems to be covering about 98% of it.

“In the 24 years of this study, the past two years have been the biggest amounts of this detritus by far,” said marine biologist Christine Huffard, who works at the research station off of California. Multiple other stations throughout the Pacific have seen similarly alarming increases.

Throughout the study and the National Geographic coverage of it, climate change is blamed. Never mind the fact that the astronomical increase in sea snot occurred in conjunction with the Fukushima nuclear disaster—they don’t even bother to mention that.

The Fukushima Daiichi nuclear disaster occurred when an earthquake and subsequent tsunami hit the area on March 11, 2011. To this day, the amount of damage is unclear as the Japanese government along with TEPCO (the power company that owns the nuclear power plant) seem to be content to hide the truth.

Measurements taken in March 2012 show sea snot levels to be at about 1%. Just a few months later, they had grown to 98%.

After 24 years of measuring the dead sea life and recognizing that global warming is a slow-moving and ongoing effect, the scientists would have us believe the “explosion” of sea snot that occurred in just a few months’ time was a normal effect of climate change. Yeah, right.

The sheer fact that the effects of Fukushima were not even considered make the study and its findings all the more suspicious. One would think if climate change could dramatically change the volume of sea snot in a few short months, it would have had other similarly troubling effects on other aspects of the environment during the same period—effects we would notice. But it didn’t. Fukushima did.

Source: Global Research Report

New Snowden Interview (Full Video)

Friday, January 24, 2014

Apple Wants to Serve You Ads Using Mood-Reading Tech

Image via Flickr/Camillo Miller

While Google wants to get all up in your home appliances and your eyeballs, it looks like Apple’s pushing to get straight to the heart of their users. A patent application from the tech giant that was published today and picked up by Apple Insider describes a technology that would infer a user’s mood at any time in order to best serve them relevant ads.

It’s easy to hate. Sure it sounds like creepy mind-reading, but then so did predictive text when it first appeared. Hey, I still get freaked out when I look at a product on one site only to see it later pop up in an ad on another site (how did they know that’s the exact one I wanted?) But if we have to see ads—and they’re pretty useful if we want to get decent content for free—then they might as well be targeted to things we’re interested in. 

That said, the patent doesn’t suggest what kind of different things people might be interested in when they’re feeling happy, or depressed, or angry, and that’s where things could get a bit weird. BGR suggested tongue-in-cheek that unhappy people could be targeted with anti-depressant ads, while Tech Crunch proposed ice cream and whiskey might do well among the recently heartbroken.

The whole system laid out in Apple’s patent application makes for pretty compelling reading, if you can get through the stilted language. After all, it’s one thing to target ads based on a user’s age, sex, location, interests and so on—those are hard facts that can usually be found out with a few seconds’ search. But to get in their heads and recognise their emotions at any particular time? That’s a different matter.

At one rather amusing point in the application (humour’s admittedly thin on the ground in patent documents), the applicant considers the potential of asking users what mood they’re in before showing them an ad, but soon dismisses that as a bad idea:

One way of accomplishing this could be to query the user regarding their current mood prior to selecting an item of invitational content. A targeted content delivery system can then select an item of invitational content based on the user's response. However, such an approach could quickly lead to user aggravation, and likely a majority of users reporting a similar mood.

Instead, it lays out technologies that could infer someone’s mood a little less directly. “Mood-associated characteristic data” could include “heart rate, blood pressure, music genre, sequence of apps launched, rate of UI interactions, etc.” Some of those make more sense when you think of Apple products—music data could be taken from iTunes so content delivery systems can get a heads-up when you’re cracking out the emo records, and app behaviour could be sourced from iPhone usage.

As for heart rate and blood pressure—and the patent application also mentions adrenaline, perspiration, and temperature—that clearly suggests a potential wearable tech element (and something more sophisticated than a mood ring). They could be tasks for the yet-to-materialize iWatch, BGR suggests. The documents also mention the possibility of a camera to recognise facial expressions. 

That’s all very clever, but one major issue is that people present different moods in different ways. Therefore, the system would start by compiling one or more “baseline mood profiles” for individual users based on data collected over an initial period. Then, a variation from a person’s usual mood at any given time could be used to infer how they’re feeling at that point.

And in case tracking a person’s actual behaviour isn’t enough, the system could incorporate external events too. “For example, if a tragic event occurred, an inferred mood can be downgraded. In another example, if the day corresponds to a national holiday, an inferred mood can be elevated,” the patent suggests. “In yet another example, if the weather is particularly nice, an inferred mood can be elevated. Additional uses of user independent mood-associated data items are also possible."

Of course, this is just at the patent application stage, so we’re not likely to see it any time soon. Add to that the obvious privacy concerns of a company storing vast amounts of such highly personal data, as Apple Insider points out, and there’s clearly a lot of thought that would need to go into developing anything of the sort. 

But put all the technologies mentioned in the paper together, and it’s a rather thrilling reminder of how emotionally intelligent computers could one day be. 

Source: Motherboard

The Arctic Apple: A GMO Fruit That Won’t Go Brown

It seems like a given: slice an apple in the morning and by lunchtime those slices will have turned a rusty brown. Most of us have learned to accept that nature comes with blemishes, but apples that brown may be a thing of the past if the U.S. Department of Agriculture gives its approval to the newest GMO on the block, the non-browning Arctic Apple.

Neal Carter is an orchardist in Summerland, British Columbia, and the president of Okanagan Specialty Fruits (OSF). He says his GM apple is at the forefront of a new wave in biotech: quality traits. “As a GMO apple this is ‘biotech light,’” says Carter. “This is a very innocuous intervention where we’ve used an apple’s own DNA to turn off the protein called polyphenol oxidase that makes it go brown.”

Carter feels sure his Arctic Apples will pass final approval by the USDA and go on to find success in both the bourgeoning pre-sliced apple market and in the fresh fruit aisles of grocery stores. The first batch of Arctic Granny Smith and Golden Delicious apples made the rounds in consumer surveys last year, and Carter says that the response was overwhelmingly positive. According to the results, 80 percent of those who tried the GMO fruit would be willing to buy it if and when it’s made available.

The U.S. Apple Association (USApple) represents the apple industry on a national and international level. In a statement released this past July, it openly opposed deregulation of the Arctic Apple — but not due to concerns over safety and health.

“We don’t see that there’s any flaw in the technology as far as a safety issue,” Wendy Brannen, USApple’s director of consumer health and public relations, reiterated in a phone interview. What does concern her is how the public will react.

Read More

Thursday, January 23, 2014

Wheaties cereal found to contain so many metal fragments that they can be levitated with magnets

Wheaties breakfast cereal, manufactured by General Mills, has been found to contain so many microscopic fragments of metal that individual flakes can be lifted and carried using common magnets, a Natural News Forensic Food Lab investigation has found and documented. Photos of the microscopy investigation are posted now at labs.naturalnews.com

A video demonstrating Wheaties flakes clinging to magnets has also been posted at YouTube:
http://www.youtube.com/watch?v=T2jFace9D7o

The metal bits are added to Wheaties cereal to enhance the nutritional profile and claim a higher iron content on the label, but lab director and food scientist Mike Adams is skeptical of the formulation. "Adding shards of metal to a cereal is not nutritionally equivalent to nutritive minerals formed during the growth of grain-producing plants," he explains. "Bioavailability is vastly different."

Adams believes adding metal fragments to a cereal mix in an effort to claim a higher nutritional content on the box is "inherently deceptive" and points out that the manufacturer, General Mills, has also sold other deceptively-labeled cereals such as "TOTAL Blueberry Pomegranate" which contains no blueberries nor pomegranates.

Here's the shocking video of Mike Adams revealing Wheaties to contain shards of metal fragments while being lifted by magnets:



And here are some of the microscopy photos showing metal fragments in the Wheaties cereal (look for the small metallic shapes)







About the Natural News Forensic Food Lab

The Natural News Forensic Food Lab routinely conducts scientific testing of consumer products in the public interest, using atomic spectroscopy, microscopy and ingredient identity testing to better inform the public about what they're eating. Results of all investigations are published at http://labs.naturalnews.com

Google Chrome Can Listen to Your Conversations

Wednesday, January 22, 2014

Las Vegas Casinos jump on the Bitcoin bandwagon

Image credit: Miss Shari/Flickr

Less then a week after Bitcoin makes it’s presence in the professional sports market, the Cyrptocurrency is now showing face in Sin City.

Beginning on Wednesday, both the D and Golden Gate casinos in Las Vegas will be accepting Bitcoin as payment for goods and services.

There will be a total five locations within the casinos premises allowing payment in Bitcoin. Those locations include both hotel front desks, the D gift shop, American Coney Island and Joe Vicari’s Andiamo Italian Steakhouse.

Derek Stevens, co-owner of both casinos said in a statement that he is “proud that the D and Golden Gate will be the first casino properties to accept bitcoin.”

“We’re located in the growing high-tech sector of downtown Las Vegas, and like all things downtown, we’re quickly adaptive to new technology. The timing is right for us to launch this initiative, and I’m happy to be able to offer this to our customers.” Said Stevens.

Neither casino will be accepting the digital money for gambling purposes due to a Gaming Control Board decision to hold off on the currencies entrance into the gambling side of things.

Derek Stevens agrees with the Gaming Control Boards decision to keep Bitcoin away from gambling.

“I think it’s too early with the technology,” he told the Las Vegas Review. “We need a lot more information.”

This is yet another giant step forward for the young digital currency that is red hot as of late with its real world applications.

Besides making its way in with the Sacramento Kings basketball team, Bitcoin has also been recently accepted by retailer Overstock.com , travel site cheapair.com and gaming site Zynga.

Source: Eyes Open Report

Oxygen, Baking Soda, and Magnesium Cure with Dr. Mark Sircus

Dr. Sircus joins Bob Tuskin to discuss a major breakthrough with his Natural Allopathic Medicine Protocol. Oxygen therapy provides the body with what it needs to take on all ailments. They start of talking about Fukushima and quickly move into powerful health solutions.

Tuesday, January 21, 2014

New Radioactive Water Leak Discovered at Fukushima Plant

Robots to Get Internet Cloud Brain: "Wikipedia For Robots"



RoboEarth Project Aims To Build Cloud for Robots

 Cloud Robotics
The RoboEarth project aims to build a cloud computing platform for robotics. After four years of research, scientists at Eindhoven University of Technology (TU/e), Philips and four other European universities will present this online platform through which robots can learn new skills from each other worldwide.




A
 new project aims to connect the world’s robots so they will be able to learn from each other and from their human interactions.

It is part to a €5.6m ($7.6m) European Union research project known as RoboEarth. The work is a collaboration between six European universities and Philips, the Dutch electronics company.

The project seeks to create robots’ very own cloud: a vast network, database and computation engine “where robots can share information and learn from each other about their behavior and their environment.”

RoboEarth, then, is cloud storage and computing for robots: its database is intended to store knowledge created by both humans and robots in a robot-readable open format. To date, that knowledge is basic: maps to help mobile robots navigate; task information like how to pick up a cup; and object-recognition data such as digital models of real-world objects.

RoboEarth


The system also lets robots offload some of their computational tasks to “a powerful and secure” cloud-computing engine.

Most robots today perform discrete, pre-programmed tasks related to a small set of objects in a controlled environment. Some already use data-sharing systems, although almost all are proprietary. For example, the “autonomous robots” made by Kiva Systems, which is owned by online retailer Amazon, pool data about the constantly changing warehouses in which they operate, enabling them to navigate and work more efficiently.

The challenge, notes Markus Waibel of the Institute for Dynamic Systems and Control in Zurich, and one of the scientists behind RoboEarth, is that the “nuanced and complicated” nature of life outside these controlled environments cannot be defined by a limited set of specifications. In other words, to perform complex and useful tasks in the unstructured world in which humans actually live, robots will need to share knowledge and learn from each other’s experiences. They will also have to learn patterns that humans take for granted. For example, milk is usually kept in a refrigerator; the strange objects next to plates are usually knives and forks; glass objects break easily; and so on. In short, they will have to evolve and adapt to the real world, and do so autonomously.

RoboEarth Project

RoboEarth’s proof-of-concept demonstration is simple for humans, but hard for robots: serve fruit juice to a random patient in a hospital bed. In a fake hospital room at Eindhoven Technical University in the Netherlands, one robot mapped out the space, located the “patient’s” bed and a nearby carton of juice, then sent that data to RoboEarth’s cloud.

A second robot, accessing the data supplied by robot number one, unerringly picked up the juice and carried it to the bed. Unfortunately this test did not end in total success as Amigo then dropped the milk to the floor after delivering it to the bed-ridden patient.. But as Dr Waibel—who was the “patient” in question—points out, the demonstration still proved its point.

RoboEarth and a handful of similar initiatives, including Google’s cloud-robotics ROS platform, do, however, raise some questions.

As with many internet of things developments, security is variable, and physical machines that work alongside people in the real world will be tempting targets. Although RoboEarth’s cloud may itself be secure, it will take only one vulnerable node (robot) for hackers to gain control—a scary thought in a world where robots might be care-givers with access to private medical information and other personal data.

Lee Tien, a senior attorney at the Electronic Frontier Foundation, which seeks to protect individual rights in a digital world, worries that the fundamental requirements of projects such as RoboEarth—the collection, storage and sharing of as much data as possible—are at odds with the goal of “privacy by design” that many policymakers now support. If a robot is caring for a sick or elderly person, what happens if there is a family dispute over that care? Or a contentious divorce? Is all the robo-cloud data simply up for grabs by whomever manages to obtain or subpoena it? “The number of safeguards that will need to be put in place is staggering”, Tien told the Economist.



SOURCE  Eindhoven Technical University

REVOLUTION X: Revisiting the "Might-geist" of the Millennium

Saturday, January 18, 2014

Has the Sun gone to sleep? Strange solar behavior baffles astrophysicists

ATM security alert as Microsoft prepares to kill off Windows XP

Cashpoints around the world could be left vulnerable to hacker attacks.

It is believed millions are still running Microsoft's Windows XP, first introduced 13 years ago.

However, on April 8th, Microsoft will stop issuing securoty updates, in a bid to get people to upgrade.

Bill Gates at the Microsoft XP launch in New York October 25, 2001: The firm will finally stop supporting the software on April 8th.

Bill Gates at the Microsoft XP launch in New York October 25, 2001: The firm will finally stop supporting the software on April 8th.

THE CASHPOINT OF THE FUTURE

Cumbersome and slow cash machines with clunky buttons and tiny hard-to-see screens could soon be a thing of the past thanks to a range of next-generation ATMs.

Ohio-based security firm Diebold has created a touchscreen cash machine that works like a tablet computer, uses facial recognition and QR codes to identify and authenticate users, and has built-in safety cameras.

German-based engineers at Wincor Nixdorf have developed a machine that remembers the user's withdrawal history to offer more personalised options.

The aging OS, which was replaced by Windows Vista in 2007, Windows 7 in 2009, Windows 8 in 2012 and Windows 8.1 in 2013.

Experts say many of the ATMs may have to be dumped, and that 95% of ATMs in use runs windows XP.

'My bank operates an ATM that looks like it must be 20 years old, and there’s no way that it can support Windows 7,' Suzanne Cluckey, the editor of ATM Marketplace, a news site that serves the industry, told Bloomberg.

'A lot of ATMs will have to either have their components upgraded or be discarded altogether and sold into the aftermarket—or just junked.'

although more modern ATMs are unaffected, there are fears older version could be left vulnerable

although more modern ATMs are unaffected, there are fears older version could be left vulnerable

Experts say that as little as 15% of ATMs run on Windows 7, and warn the industry faces major problems.

Aravinda Korala, chief executive officer of ATM software provider KAL, says he expects only 15 percent of bank ATMs in the U.S. to be on Windows 7 by the April deadline.

'The ATM world is not really ready, and that’s not unusual,' he says.

'ATMs move more slowly than PCs.'

Source: www.dailymail.co.uk

POISON IN PIZZA HUT CHEESE


Leprino Foods, the world's largest Italian cheese manufacturer, is the nearly exclusive supplier of Pizza Cheese to the 6000+ Pizza Hut restaurants in the U.S. To make money, Leprino Foods uses patented processes that add GMO food starch, plus large volumes of water and salt to so-called Pizza Cheese. 

It gets much worse. Leprino Foods sprays Polydimethylsiloxane onto the "cheese". According to the original source for this information, this poison has not been approved as a food ingredient by the FDA. However, another site lists this as a food ingredient. Yet I do not recall reading this in the list of ingredients of anything from the supermarket. I believe that they add a whole lot of extra toxins in restaurant food that we never see, since they don't have to list the ingredients.

The levels are 90 X higher residue concentration than the FDA allows for use as a boiler water antifoaming agent!

Polydimethylsiloxane breaks down into formaldehyde when subjected to heat in excess of 150ºC. There is no safe level of formaldehyde.

In addition, as I tell people in "You're not fat, You're Toxic", you have the addition of glyphosate, the poison that is in Roundup, which comes from GMO plants fed to dairy cows (GMO corn, soy and alfalfa). That ends up in what little real cheese is in the cheese, as well as the meat.

Corporations don't care about you. Only you can care about you. Read the 55 easy-to-understand chapters in You're not fat, You're Toxic and save your looks, your health and your life.

Source

Source: relfe.com

Friday, January 17, 2014

Security firm RSA took millions from NSA: report

What's an encryption backdoor cost? When you're the NSA, apparently the fee is $10 million.

Intentional flaws created by the National Security Agency in RSA's encryption tokens were discovered in September, thanks to documents released by whistleblower Edward Snowden. It has now been revealed that RSA was paid $10 million by the NSA to implement those backdoors, according to a new report in Reuters.

Two people familiar with RSA's BSafe software told Reuters that the company had received the money in exchange for making the NSA's cryptographic formula as the default for encrypted key generation in BSafe.

"Now we know that RSA was bribed," said security expert Bruce Schneier, who has been involved in the Snowden document analysis. "I sure as hell wouldn't trust them. And then they made the statement that they put customer security first," he said.

RSA, now owned by computer storage firm EMC Corp, has a long history of entanglement with the government. In the 1990s, the company was instrumental in stopping a government plan to include a chip in computers that would've allowed the government to spy on people.

It has also had its algorithms hacked before, as has RSA-connected VeriSign.

The new revelation is important, Schneier said, because it confirms more suspected tactics that the NSA employs.

"You think they only bribed one company in the history of their operations? What's at play here is that we don't know who's involved," he said.

Other companies that build widely-used encryption apparatus include Symantec, McAfee, and Microsoft. "You have no idea who else was bribed, so you don't know who else you can trust," Schneier said.

In a statement issued Sunday, RSA said it "categorically" denied recent reports.

"We have worked with the NSA, both as a vendor and an active member of the security community. We have never kept this relationship a secret and in fact have openly publicized it," the company said in a statement. "Our explicit goal has always been to strengthen commercial and government security."

The statement goes on to rebut a number of claims, including that the company knowingly introduced a flawed numbers generator into its encryption libraries.

via CNet

Why You Should Care About the Death of Net Neutrality

5 Cryptocurrencies that Could Rival Bitcoin

2013 has been quite the year for Bitcoin. We have seen exponential growth in Bitcoin’s exchange rate and extensive coverage in the media. Another phenomenon we have witnessed this year is the proliferation of alternative cryptocurrencies, five of which we’ve provided below. What all of these cryptocurrencies have in common is that they rely on a decentralized network to keep track of transactions, and their scarcity and security is based on cryptography.

Note: All figures from coinmarketcap.com

Litecoin

Price: $25.26
Market Capitalization: $600 million

Of all the competing cryptocurrencies, Litecoin is the most similar to Bitcoin. It has been thought of as silver to Bitcoin’s gold, or MasterCard to Bitcoin’s Visa. It has also managed to gain the second-highest market capitalization next to Bitcoin. One key difference includes a different hashing algorithm designed so that mining Litecoins won’t result in a similar hardware arms race to the one Bitcoin is currently involved in. Litecoin mining these days involves rigs of video cards, or GPUs, similar to how Bitcoin mining was a few years ago, until its ASICs (application-specific integrated circuits) were designed from the ground up to mine Bitcoins. Litecoins also feature faster confirmation times due to shorter and faster block rewards. Litecoin is scheduled to produce 84 million Litecoins, four times as much as Bitcoin’s 21 million.

Peercoin

Price: $6.26
Market Capitalization: $131 million

Peercoin’s distinguishing feature is that it uses a method called proof of stake as part of its mining, or as Peercoiners often like to say, “minting.” Proof-of-stake rewards minters for the Peercoins they hold over time. This is measured in “coin days,” one coin day being equivalent to holding one coin for one day, similar to how a kilowatt hour is defined as using a kilowatt over the course of one hour. So the more coins you hold over a longer time, the more Peercoins you receive through minting. This is in contrast to most cryptocurrencies’ proof-of-work mining, which rewards miners based on how much computing power they contribute to the keeping track of transactions. Peercoin also uses proof-of-work mining in conjunction with proof-of-work minting, although Peercoin is programmed to eventually rely only on proof-of-work mining. The maximum limit for the number of Peercoins is 2 billion, which is so much higher than Bitcoin’s 21 million that it encourages inflationary pressure, which counterbalances the deflationary pressure caused by everyone trying to mint Peercoins by holding onto them.

NXT

Price: 4.1 cents
Market Capitalization: $40 million

Nxt is most similar to Peercoin in that is utilizes proof of stake to generate more coins, but unlike Peercoin, it uses proof of stake exclusively. The only way to get more Nxt coins is to hold them or exchange them in a process dubbed “forging,” in contrast to Bitcoin mining and Peercoin minting. This has a “green” appeal in that it requires no massive, power-consuming hardware rigs, just a small program that will run on pretty much any modern computer. This also has the practical appeal of not requiring users to invest in the extra hardware and electricity. Instead, you merely exchange something for your initial Nxt coins. Nxt’s developers also pride themselves on having written the Nxt code from scratch, while most alternative cryptocurrencies were developed from using Bitcoin’s code as a basis.

Namecoin

Price: $6.73
Market Capitalization: $52 million

Namecoin is similar to other cryptocurrencies, but with the additional feature of being a way to register domain names. Instead of .com or .net, Namecoin domain names have the .bit extension. Any method of registering and controlling a domain name is called a domain name system, or DNS. The current method of domain name registration is regulated by a nonprofit organization called the Internet Corporation for Assigned Names and Numbers, or ICANN. Because ICANN is a centralized organization, it ultimately has power over domain names and can shut down websites for political or other reasons. But because Namecoin is a decentralized network, no one is in control of it. Just like Bitcoin is a decentralized network that takes the power away from banks and other financial institutions, Namecoin is a decentralized network that takes the power away from ICANN or any other centralized DNS organization. Namecoin is also traded for its own sake, just like Bitcoin. It’s just like any other cryptocurrency but with the added feature of a decentralized DNS system, which amounts to more “intrinsic value,” which everyone is looking for.

Dogecoin

Price: 0.045 cents
Market Capitalization: $11 million

Dogecoin is a cryptocurrency inspired by the “Doge” Internet meme. Compared with the other cryptocurrencies, Doge is most similar to Litecoin. It uses scrypt, the same cryptographic function as Litecoin. A total of 100 billion Dogecoins will ever be mined, which is even more than Peercoin, yet because the block reward is so large and frequent (every minute), Dogecoin miners have already mined almost 25 billion Dogecoins, almost 25% of the total. While Doge gets my vote for the best Internet meme of 2013, you would think that a cryptocurrency wouldn’t manage to go far based on novelty. Yet Dogecoin’s market capitalization is almost $7 million. Wow.

Read More @ DailyReckoning.com

Monday, January 13, 2014

Check Out All The Things Google Has Bought Lately

Google just made a big, bold acquisition, scarfing up red-hot home-automation gadget company Nest for $3.2 billion.

Nest was founded by the guy who designed Apple's iPod. Nest products look like Apple products. Nest products are beloved by people who love Apple products. Nest products are sold in Apple stores.

Nest, in short, looked like a perfect acquisition for Apple, which is struggling to find new product lines to expand into and has a mountain of cash rotting away on its balance sheet with which it could buy things.

But Apple didn't buy Nest.

Google did.

And this appears to continue a pattern in which — in the bitter head-to-head battle between Apple and Google — Google is fixing its weaknesses (hardware) much faster than Apple is fixing its own weaknesses (software and services).

At first glance, in other words, it appears that Google's aggressiveness has once again caught Apple snoozing. And now a company that looked to be a perfect future division of Apple is gone for good.

Nest, of course, isn't the only company that Google has snapped up lately.

Kim Bhasin of the Huffington Post just tweeted this list of "things Google has bought lately," which is from Wikipedia. As you can see, over the past year, Google has bought no fewer than 21 companies. In addition to home automation products, Google has bought and is now developing and/or selling, among other things...

  • Humanoid robots
  • Traffic detection software
  • Airborne wind turbines
  • Computer vision
  • Robot arms
  • Robot wheels, and
  • Gesture recognition technology

Google acquisitions

Source: Business Insider

MUST KNOW INFO: Autonomous Killer Robots, Coming Soon

US 'superweeds' epidemic shines spotlight on GMO

The United States is facing an epidemic of herbicide-resistant "superweeds" that some activists and researchers are bl

The United States is facing an epidemic of herbicide-resistant "superweeds" that some activists and researchers are blaming on GMOs, an accusation rejected by industry giants.

According to a recent study, the situation is such that American farmers are "heading for a crisis."

Many scientists blame overuse of herbicides, prompted by seeds genetically modified to resist them.

"In parts of the country, weeds resistant to the world's most popular herbicide, glyphosate, now grow in the vast majority of soybean, cotton, and corn fields," many of which were planted with seeds resistant to the weedkiller, said the study published in the journal Science in September.

Earlier this month, the US Department of Agriculture (USDA) announced it was considering the release of new genetically-engineered seeds that are resistant to multiple herbicides.

But "weeds that can shrug off multiple other herbicides are also on the rise," the study said.

Nearly half (49 percent) of all US farmers said they had "glyphosate resistant weeds" on their farms in 2012, according to the most recent review from agri-business market research firm Stratus.

That's up from 34 percent of farmers in 2011.

Glyphosate is the name of the most frequently used herbicide in the United States and was created by agricultural biotechnology giant Monsanto in the 1970s.

Today, the US company markets it as Roundup while, among other versions, competitor Dow Chemical sells a similar product under the name Durango.

Monsanto also launched the first genetically modified seeds that tolerate glyphosate in 1996 and, in its earnings call this past week, mentioned the issue of weed resistance.

Still, the industry refuses to accept any responsibility for the "superweed" phenomenon.

"Herbicide-resistant weeds began well before GM crops," said a Monsanto spokeswoman.

A USDA spokesman told AFP the phenomenon has "been going on for decades, and has happened subsequent to the development of herbicides."

"It happens naturally with all herbicide modes of action. The plants select for resistance over time," he said.

But Bill Freese of the Center for Food Safety, an anti-GMO non-profit, said "GE crops greatly speeded up" the issue.

link to phys.org

That's a view shared by researchers such as Charles Benbrook of the Center for Sustaining Agriculture and Natural Resources at Washington State University.

Heavier doses of herbicides were used on fields that now harbor glyphosate-resistant weed, he noted.

A study published on the website of Pioneer, DuPont's GE seed unit, found that "glyphosate had been used for over 20 years prior to the introduction of glyphosate-resistant crops without any resistance issues."

But eventually, resistant weeds developed—"first in areas where glyphosate had been applied multiple times per season for many years," the study said.

Vicious Circle

The USDA, backed up by researchers, emphasizes that as such are not the source of "superweeds."

Instead, they blame "weed management tactics chosen by farmers" who have in large numbers adopted seeds alongside glyphosate marketed by Monsanto and its competitors.

A spokesman for Dow Chemical said "the problem is that past herbicide-tolerant cropping systems led to overuse of glyphosate, because growers saw no other strategy offering them comparable value."

Benbrook described a vicious cycle, saying " have become a major problem for many farmers reliant on genetically-engineered crops, and are now driving up the volume of herbicide needed each year by about 25 percent."

"Many experts in the US are projecting that the approval of new multiple herbicide tolerant crops will lead to at least a 50 percent increase to the average application of herbicide," he added.

Earlier this month, the USDA announced that, at the request of Dow Chemical, it would study allowing genetically engineered seeds on the market that can tolerate several at once—including a controversial weed killer 2,4-D that several scientific studies have blamed for cancer and amyotrophic lateral sclerosis, ALS, sometimes called Lou Gehrig's disease.

Source: Phys.org

As UFO Sightings Increase, Dr Steven Greer Makes Compelling Case For Alien Life

Abby Martin talks to UFOologist Dr. Steven Greer about his work with the Disclosure Project, an organization that has collected testimonies from over one hundred US government officials concerning the existence of extra-terrestrial life.

'Unequivocal' Cell Phones Cause Cancer

Sunday, January 12, 2014

Keiser Report: Let’s Encrypt the Internet! (E548 ft. Kim Dotcom)

Gov’t Secret Chemical Warfare Against The Public Exposed

Alex Jones and Dr. Edward Group expose the chemical warfare that’s been unleashed on the public: chemicals are added to the food supply that disrupt hormones, reduce fertility and wreck havoc on gender identity, effectively making men act like women and women act like men.

011114gaybomb

For example, a Kaiser Permanente study published online in the journal Birth Defects Research stated that in utero exposure to Bisphenol-A may adversely affect male genital development.

“This finding indicates that BPA may interfere with testosterone function during fetal development because the shortened AGD indicates under-developed male genitalia, likely due to an abnormal testosterone function,” the report read.

As you can see, the startling facts of this Brave New World program are hiding in plain view.

Source: Infowars

Tuesday, January 7, 2014

Kim Dotcom: The Man Behind Megaupload

Who is still trusting any U.S. tech company? More and more companies that are doing internet business are not going to locate in the U.S. any more. The NSA has triggered the biggest destructive event for the U.S. tech industry.” – Kim Dotcom

from VICE:

In October 2013, VICE News was invited to visit the infamous tech mogul and creator of Megaupload, Kim Dotcom, at his palatial property in New Zealand. Even though Kim is under house arrest—since he’s at the center of history’s largest copyright case—he’s still able to visit a recording studio in Auckland. So check out this brand new documentary we made at Kim’s mega-mansion and in the studio where our host, Tim Pool, got to lay down some backup vocals for Kim’s upcoming EDM album while talking about online surveillance, file-sharing, and Kim’s controversial case.

Acoustic Levitation: The Uplifting Power of Sound

Japanese scientists have released footage of acoustic levitation experiments that demonstrate the uplifting power of sound.

In this video, Yoichi Ochiai, Jun Rekimoto, and Takayuki Hoshi demonstrate acoustic levitation, which utilizes the properties of sound to cause solids, liquids and heavy gases to float.

As shown in the video, four phased arrays make an ultrasonic focal point, which is generated at an arbitrary position.

The standing waves provide suspending force under gravity.  The potential energy distribution is generated by the standing waves.

In the first demonstration using dry ice, the standing waves provide suspending force under gravity.

Particles are trapped in nodes of the standing waves in a horizontal setup, then trapped in nodes of the standing waves.  The particles are three-dimensionally manipulated in mid-air.

A variety of levitated objects are also shown, including various pieces of electrical material, wood, a screw, a nut, plastic, and soap droplets. The video notes that the workspace is touchable and open air.

Source: CNS News

Sunday, January 5, 2014

‘Jailbreaking’ Apple devices is becoming a hot underground industry

Each year, Apple releases a new version of the software running its iconic mobile devices, the iPhone and iPad. And each year, a small but dogged community of hackers sets out to break it — or, in the words of the hackers, “jailbreak” it.

The liberation imagery long seemed apt. Apple puts strict limits on how its devices can be used, requiring, for example, that all apps be bought through the company’s lucrative iTunes store. By comparison, the hackers styled themselves as plucky hobbyists seeking freedom from what they derided as Apple’s “walled garden” and into a promised land of virtually limitless new software.

That image has taken a beating in recent days as prominent hackers have battled allegations that they’ve been working not for ideals but for money. The supposed payoffs would have come from Chinese investors eager to cash in on the spread of Apple products in that country.

Although there’s no evidence money changed hands, the controversy has highlighted how Apple’s restrictions on its mobile devices have fueled the creation of alternative marketplaces, where the thrill of trying to outsmart one of the world’s richest companies mixes with at least the possibility of fat profits for those who succeed.

“Anything that can open up a whole new line of sales on [Apple devices] is certainly worth a lot to somebody,” said Brian Krebs, who covers Internet security issues on his blog, KrebsOnSecurity. “If you jailbreak it, it means there are millions of more apps to sell.”

Apps for mobile devices earned nearly $27 billion in 2013 and are projected to earn more than $76 billion in 2017, with Google’s Android operating system and Apple’s iOS platform the dominant players, according to Gartner, a research firm. Apple reported $9.3 billion in revenue last year from its iTunes store, which sells apps along with music, movies and electronic books.

Among the key growth markets is China, where lower-priced Android devices have a large lead and Apple is working to make inroads. It announced a deal in December to offer the iPhone through China Mobile, the world’s largest cellular carrier.

Apple’s tightly controlled ecosystem has long been part of its appeal. Company founder Steve Jobs, who died in October 2011, obsessed over every detail of the user experience, with the goal of having hardware, software and online services working together seamlessly.

The tradeoff came in control for consumers. While Google’s Android devices are made by many different manufacturers and can load apps from any store a user chooses, Apple makes it own products and rigorously oversees the apps available on iTunes, typically taking a 30 percent cut from every sale and barring developers who do not comply with the company’s many rules.

“Apple products are like beautiful crystal prisons,” said Peter Eckersley, director of technology projects at the Electronic Frontier Foundation, a civil liberties group. “Deviation from that is not allowed.”

Jailbreaking can allow users of Apple mobile devices substantial new powers — for example, to fake their locations to defeat location tracking and service blackouts. It can allow free “tethering” so users can direct data streams from their iPhones to other devices without paying for a separate connection. And it can allow the use of alternative browsers that have privacy settings not available on Apple’s Safari.

Advocates for the disabled, meanwhile, have sponsored a campaign to raise money in support of jailbreaking Apple’s latest mobile device operating system, iOS 7, because iTunes does not offer some apps they find helpful.

Jailbreaking devices removes key security features. One of the few successful iPhone attacks — a prank virus that changed the background screen to an image of British pop star Rick Astley — spread on jailbroken devices.

“Apple’s goal has always been to ensure that our customers have a great experience with their iPhone, and we know that jailbreaking can severely degrade the experience,” Apple spokeswoman Trudy Muller said in a statement. “As we’ve said before, the vast majority of customers do not jailbreak their iPhones as this can violate the warranty and can cause the iPhone to become unstable and not work reliably.”

Jailbreaks and other types of hacks once were widely available for free, but the security vulnerabilities they rely on have become valuable commodities, in part because of the demand from government intelligence services, such as the National Security Agency.

The recent controversy flared when, a few days before Christmas, a hacker group called the “evad3rs” released the first publicly available jailbreaking tools for iOS 7. The tools also loaded a Chinese app store, called Taig, for devices that were set to use the Chinese language.

That move triggered swift backlash, with critics accusing the hackers of selling out their users in a secret deal with Taig, whose app store included some pirated material. There also were fears — apparently unfounded — that the Taig program somehow provided private user data to the Chinese company.

“We are very upset that despite our agreement and review by their team, piracy was found in the store. It was not acceptable and they have been strenuously working to resolve the problem in good faith,” the evad3rs posted in a lengthy letter on their Web site. “We are sorry . . . Taig will be pulled from the jailbreak if it cannot be resolved.”

The evad3rs, who did not respond to requests for comment from The Post, soon pulled out of the deal with Taig. The hackers said in a second public letter: “There have been a lot of rumors listing various amounts we’ve been paid. We have received no monies from any group, including Taig.”

Also a few days before Christmas, somebody posted online what appeared to be a surreptitiously recorded conversation between another hacker, named Geohot, and a middleman attempting to buy a separate set of iOS 7 jailbreak tools for $350,000.

Although impossible to verify, the conversation appeared to take place before the evad3rs had released their jailbreak and was remarkably detailed, down to the tax consequences of the purported sale. The ultimate buyer, the unnamed middleman said on the recording, was a Chinese company.

Geohot, who did not respond to efforts to contact him, is George Hotz, a security researcher once sued by Sony for developing a hack into the PlayStation 3 gaming console. He acknowledged in a recent posting on his Web page that he had been in a race with the evad3rs to release an iOS 7 jailbreak but denied that he struck a deal to sell it.

“Full disclosure time, I was working on a public, free of charge, china not involved, old school jailbreak with a few others. evad3rs released first,” Hotz wrote.

He warned that both the jailbreaking tools released by the evad3rs and the ones he was developing relied on similar security weaknesses — often called “exploits” — that are now public. Companies typically close such loopholes once they are revealed.

In his note, Hotz said cryptically, “The exploits won’t be usable next time. No more jailbreaks ever?”

But, analysts say, the incentives for jailbreaks are unlikely to diminish — for hackers, for investors and for users eager to break free of Apple’s walled garden.

“The number one reason is that it gives you a feeling that you beat the system,” said Gartner analyst Whit Andrews. “Anytime any organization establishes stringent or rigid controls, it creates a social incentive to circumvent those controls.”

Source: The Washington Post

Saturday, January 4, 2014

It’s not just your phone calls – it’s YOU they are listening to

You, like most Americans, are friendly and like to mind your own business. You have 2.3 kids, a mortgage, and a loving spouse.

But, this is the 21st Century. A grand era of technology. Buck Rogers and H.G. Wells would be so proud of our technological advancements.

But so would Stalin, Mao and Hitler. The NSA’s recently leaked shopping catalog is chilling and would “harsh the mellow” of any regular Joe.

Let’s start with you.

You have a phone that you call home with. The NSA can listen in to your phone using PICASSO. It knows your phone book, your recent calls, where you’ve been, your PIN numbers that you’ve used, and can block your calls. Like if you’re being chased by black SUVs and you want to call 911 – tough luck, they’ve shut down your phone.

But the REAL interesting part of the PICASSO - it can collect LIVE AUDIO from the phone. Are you carrying on a great conversation about how much you think Obamacare is a scam? Your political dissent can now be recorded in real time and documented.

MONKEYCALENDAR can remotely send your previous locations via text message to the NSA.

The Apple iPhone isn’t even safe. DROPOUTJEEP is a software implant that can pull files, photos, address book, listen in on your conversations, capture images with the camera, and tell them your exact location – all being sent covertly through the SMS system.

CANDYGRAM should be called FAKEOUT because it mimics a cell tower. At 40,000 bucks a unit, it has been designed to be remotely erased in case it cannot be recovered.

How about your computer? We all know of PRISM and the other anagrams. Even your old computer isn’t safe.

SWAP and DEITYBOUNCE can be uploaded to Windows, LINUX, FreeBSD, or Solaris systems by the ARKSTREAM system to re-flash your computer’s BIOS to upload software via TWISTEDKILT to drop a payload. In other words, they can put files on your computer that you didn’t put on there, like child porn.

IRATEMONK alters your hard drive firmware and gains control of the Master Boot Record.

And the big guys aren’t immune from the NSA keyhole-peeking approach. Products such HEADWATER and HALLUXWATER are actually designed to defeat Huawei Eudeomon firewall servers and give the NSA a backdoor to many European and Asian companies. Don’t worry Cisco firewall owners, the JETPLOW can probably be found on your units.

TOTEGHOSTLY is designed for Windows Mobile PDA’s to do the same function as PICASSO and DROPOUTJEEP, including listening to conversations and taking photos.

Even old computers aren’t safe. The Windows XP system has been compromised by SOMBERKNAVE, that helps VALIDATOR “calls home” and deliver the data to the NSA agent.

And this is nothing more than Tyranny, aided by the very manufacturers that expect you to trust them. Dell, Microsoft, and so many others have been in cahoots with the NSA since day one.

There is no room for individualism in this world. The government is everywhere, they see and hear everything and they control everything that isn’t human. They observe and report your actions, your thoughts, your feelings and emotions . You might think you and your family are succeeding in a small rebellion for a short while, but eventually it catches up with you. You realize they knew all along, they are already working against you and at the end of the day, they will kill every subversive thought you may or will have. There is not a chance to be an individual in this dictatorship. They will get you. They always get you. And eventually, they get to you.

This article first appeared at Prepper Podcast Radio Network.

Grass - The History of Marijuana (Narrated By Woody Harrelson)

Wednesday, January 1, 2014

Artificial Fruit Drink Creates Its Own Cancer Causing By-Product

WARNING: On top of the GMO high fructose corn syrup, the ingredients inside this imitation fruit beverage pose the risk of forming a known carcinogen inside the bottle – just waiting for you to drink it.

It’s been more than 20 years since the FDA and beverage industry first learned that sodium benzoate and citric acid or ascorbic acid (Vitamin C) can create the carcinogen benzene while in the bottle together. The public was informed just seven years ago, and yet, many makers of artificial fruit drinks and sodas still frequently (and shamefully) use these ingredients in this risky combination on the market today, or with variant formulas like potassium benzoate, which has the same effect.

The soda companies and the FDA knew back in the early 1990s; the public didn’t find out until it made headlines in 2006 that these ingredients were creating a public health hazard no one wanted to address.

Supporting evidence:

From the American Chemical Society in 1993 – Benzene production from decarboxylation of benzoic acid in the presence of ascorbic acid and a transition-metal catalyst
http://pubs.acs.org/doi/abs/10.1021/jf00029a001

From 2008 Belgian study – Benzene formation from Sodium/Potassium Benzoate and Citric Acid is worsened by plastic bottle packaging
http://pubs.acs.org/doi/abs/10.1021/jf072580q

2008: Diet Coke to drop additive in DNA damage fear
http://www.dailymail.co.uk/news/article-1021820/Diet-Coke-drop-additive-DNA-damage-fear.html

Meanwhile, the same ingredient – added to your food as a preservative – also poses another admitted risk: the 40 year old thesis that artificial color dyes & additives – including sodium benzoate – were making kids hyperactive and/or ADHD and irritating allergies was officially confirmed and publicly recognized, prompting EU bans, in the 2007 Southampton study.

Supporting evidence:

Sodium Benzoate, Artificial Colors & ADHD/Hyperactivity in Children: Key Southampton Study from 2007 – Food additives and hyperactive behaviour in 3-year-old and 8/9-year-old children in the community: a randomised, double-blinded, placebo-controlled trial
http://www.thelancet.com/journals/lancet/article/PIIS0140673607613063/abstract

Artificial Food Colorings & Benzoate Preservative, from 2004: The effects of a double blind, placebo controlled, artificial food colourings and benzoate preservative challenge on hyperactivity in a general population sample of preschool children
http://adc.bmj.com/content/89/6/506.short

This artificial beverage – one of the least enlightened products anywhere on store shelves, and marketed directly to Hispanics already at a higher risk for food-derived health decline –  not only gives its customer base the literal formula for creating benzene, a known toxin, inside the bottle [sodium benzoate + citric acid + ascorbic acid (Vitamin C extract likely derived from corn)], but it also provides consumers with every opportunity for hyperactivity with ingredients Yellow #5 & Yellow #6 and sodium benzoate all in one batch, as well as every opportunity for obesity, diabetes, et al. via the ‘contains no juice’ yet filled with loads of high fructose corn syrup approach to refreshment.

With ingredients this good, why not just go into a science lab and guzzle down any random yellow liquid you find?

Further supporting evidence on this complex social issue may help address several concerns with no easy answer (or alternately no easy solution):

• Should oligopolistic cartels control the “free market”?

• Should Michael Bloomberg lead the way in dictatorial nanny state calorie control just because the majority of the food supply is laced with dangerous additives?

• Should U.S. taxpayers be forced to subsidize GMO corn & soy by the billions, along with filthy, toxic CAFO feedlots to produce beef & chicken, etc. et al. and pay Big Agra to effectively poison the population?

SLAVE MARKET FOODS: Studies, and a bit of common sense, show that classifications on the socio-economical scale such as low income, inner city and/or ethnic minority [Hispanic/Black]  predisposes consumers (who are equal under the law to protections against harm) to diabetes, obesity and other health risks as grocery stores in their area tend to sell lower qualities foods while food producers price high quality (or even halfway decent) foods out of reach.

Again, the product in this video (above) is a good example, as is this GMO- and artificial ingredient-filled powdered drink mix Truthstream previously covered.

Seriously, there are studies about poor people and the poor food they are all but forced to eat by circumstances.

How can this be right? Obviously, food stamps and the dependent population system is hurting not helping this phenomenon:

Barriers to Buying Healthy Foods for People With Diabetes: Evidence of Environmental Disparities
http://ajph.aphapublications.org/doi/abs/10.2105/AJPH.94.9.1549

Poverty and obesity: the role of energy density and energy costs
http://ajcn.nutrition.org/content/79/1/6.short

The economics of obesity: dietary energy density and energy cost
http://ajcn.nutrition.org/content/82/1/265S.short

Food Choices and Diet Costs: an Economic Analysis
http://jn.nutrition.org/content/135/4/900.short

Choosing to eat unhealthy junk foods rather then choosing healthy foods and living a healthy lifestyle at the individual level may be important and significant to the outcome of our life’s work, but there is no denying that the system is making a lot of these choices for people without their consent or full knowledge.

The poverty cycle cannot be explained just by irresponsible individuals; clearly many sectors of society are trapped in it, and a market-driven conspiracy to keep them down with shitty food is apparent. Sadly, this is a de facto reality, no matter whether “the elite” have planned it this way, or just failed to correct it…

Planned or not, there are clearly elements of dumbing down the population through diet, essentially social engineering sectors of the population to create a strata of efficient worker bees, subservient functionaries and helpless hoards of jellyfish consumers through targeted metabolisms (just as the queen bee is fed royal jelly all her life, and the drones and workers only get royal jelly in the first days of their lives…) that change the character of people and malnourish thoughts of liberation and creative prosperity.

“Diet, injections, and injunctions will combine, from a very early age, to produce the sort of character and the sort of beliefs that the authorities consider desirable, and any serious criticism of the powers that be will become psychologically impossible. Even if all are miserable, all will believe themselves happy, because the government will tell them that they are so.” – Lord Bertrand Russell, The Impact of Science on Society (1951)

Humans are capable of so much more, but the diet modern society has lived off of will not allow the population to attain this potential. Instead, people are treated as human capital/cattle. Think about it… you are what you eat holds as true as ever!

Source: Truthstream Media

2014 preview: Private internet to beat the spooks

What's the price of loss of trust? We will find out in 2014 as the after-effects of the revelations about the spying campaigns on the world's internet and cellphone networks become apparent.

The financial costs are already mounting. The Information Technology and Innovation Foundation, a Washington DC think tank, reckons US firms could lose $35 billion in sales in the next two years because of fears over snooping by the US National Security Agency (NSA).

The revelations might also change how we use the internet in more fundamental ways. World Wide Web inventor Tim Berners-Lee has warned that a lack of faith in privacy could make people interact less freely with one another online.

But there may be some benefits, too. People are now more aware of what they do online. For example, use of DuckDuckGo, a search engine that promises not to collect a user's personal information, soared in the weeks after the NSA's activities were revealed. This personal data protection is likely to accelerate next year.

We might also see the first signs of internet fragmentation. Some nations, including Brazil and Germany, are considering reining in internet routing to within their own borders, although such moves would play into the hands of authoritarian states and cause delays for international traffic.

Other methods to beat the spooks could also hit the mainstream, including ways of masking traffic and even local internet networks that keep sensitive data off the public internet.

Read more: "2014 preview: 10 ideas that will matter next year"

The NSA has hacked EVERY gadget you've ever owned-and is doing so NOW

Two days ago we observed the latest disclosure in the seemingly endless Snowden treasure trove of leaked NSA files, when Spiegel released the broad details of the NSA's Access Network Technology (ANT) catalog explaining how virtually every hardware architecture in the world has been hacked by the US superspies. We followed up with a close up of "Dropout Jeep" - the NSA's project codename for backdoor entry into every iPhone ever handed out to the Apple Borg collective (because it makes you look cool). Today, we step back from Apple and release the full ANT catalog showcasing the blueprints of how the NSA managed to insert a backdoor into virtually every piece of hardware known under the sun.

And so, without further ado, here is the complete slidebook of how the NSA hacked, well, everything.

Source: Zerohedge