Digital Tech


Whenever I saw an

 "injustice"

I would create

"unique things"

 to 

"Balance the Equation

with 

Research, Analysis, POCs and Developments

Happy, Happy, Joy, Joy

 :)


Lamentably...

As with most of my POC's, heutagogical R&D, TOADDs, or Tech,

 once I would see a calamitous or foreseeable (potential) abuse

in "real world" entanglement(s)...,

they were all abruptly

terminated

and

buried 

within the

"Ark of the Covenant" ...



"Nefarious Ways

(2014-2016)


Nefarious Ways 

was an algorithmic set of protocols

 on onion servers to specifically 

"brake the encryption chain..."

 which allowed her executables

 to find criminals and predatory pedophiles,

who cowardly hid behind the veil

 of encrypted apps and programs.


Unfortunately, 

our current set of

 "antiquated laws"

actually

 protect predatory pedophiles

 and criminals from persecution,

 NOT their victims 

or the innocent children.

:/



"NefariousWays

was just another one of my R&D projects,

which I did as a knee jerk reaction

  "to protect the innocent.'


But because of her inherent automated function(s)

and our current "antiquated laws,"

she was regrettably terminated

and now lives next to the 

"Ark of the Covenant"...



 DDoS Attack

for

"Embedded Journalists

(2005-2013)


For over seven years

 I gave Journalists the ability to

 report and send Text and Images

 during civil unrest, from within blocked, restricted,

 or Geo-restricted areas or countries like:

 the Gaza Strip

Homs Syria

China,

 Turkey

etc.

all by simply using

"Frequency Jumping"-not reliant on WiFi/Cell

 and using a segmental modified LOIC & JS LOIC hack/technique...


Noʻu ka hauʻoli   "

World! :)


Government(s), Military & Business

(1997-2016)


Custom Cipher(s)

Passive & Defensive Algorithms

Inter-disciplinary Algorithms

Rapid Biological Agent detection

Developmental Weapons & Design

Social Engineering & Reverses Hacking

Malware Frankenstein machine code

TLS and SSL encryption & Cracking



Cinema & Commercial Art  
(1994-2016)
Handmade/Prototype Servo Controllers
Custom/Prototype PCB
Pixel Pushing
3D Scripting and Modeling 
Runtimes files and modifications  
Dynamic Models, Texture, Meshes & OBJ 
Maya & Blender applications
Python scripting
Pre-Animatics scripting, development, collaboration
Subsurface Illumination & Scatter Algorithm(s)

I used existing technology

to make future forward concepts into reality, now. :)


Handmade/Prototype PCBs boards  (2013)

eOS  Raspberry Pi or mobile USB (2012-2016) 

 Frankenstein machine code (2000-2014)

Software, Mods, and apps (2002-2015)


Science & Industry
(1997-2016)

Algorithmic Source Coding
Global marketplace optimization
Source database scripting 
SEO coding and programming
Identity Theft, Discovery, Tracking & Recovery 
Forensic Computer Data Analysis
Internet Security Service & Hack Proofing
Reverse Engineering to source IP:
   Virus, Trojans, Worms, Phishing, DDos,
 E-mails,  Malware, Hacks, scams, etc., 
Global marking research data tracking programs
Binary Hacks Bit programs


Non-stop Developing & Programming
Dissecting Spiders &
 automated hidden software
(2011-2014)
  To optimize client end potential or maximize vulnerability, as to expose character traits/flaws to code, fix or render harmless.... 
for freedom from exploitation
or digital manipulation.

Old School PDF Internet 
Help Files
( circa 2000-2012 )


Free Internet
(1997-2016)

Encrypted USBs
.
.
for Embedded Journalists
.
Encrypted WiFi's
(licensed)
.
BlackHole eOS - Private
.
- Arm Yourself -



"The Pirate Bay song..."
Was and still is
Funny!
lol :)

Share by: