Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China's Conquest of Internet, ICANN + Quantum Encryption
FR research, please share w. others | Arthur March

Posted on 09/24/2016 9:40:29 AM PDT by Arthur Wildfire! March

Please brace for just one thick sentence:

ICANN's power is mainly legal, and a contract with ICANN could trigger a violent dispute over international law.

~ ~ ~

Bluntly stated: giving away ICANN could ultimately trigger a cyber war or worse.

~ ~ ~

Raw Power and International Law

When you face a super power like the USA it helps to have raw power. China probably assumes it will not come to that, but just like nuclear deterence, they need the war-making capability.

And the Chinese already enjoy raw power. Their encryption is superior, their nuclear capability suffices, and they are now experienced at cyber warfare.

Compare that to the US -- NSA recently got hacked. That was supposed to be the best encrypted, best protected agency in our nation. Imagine if all of our satellites got simultaneously hacked. We would be blind and appear weak in the eyes of the world.

International Law

The reason China is building a compound to welcome ICANN is international legitimacy. Other tyrants seeking to censor online speech can seek a shiny new contract with Obama's Free Range ICANN.

Bluntly stated: ICANN helps China build a large alliance to alienate the USA if it comes to a full-scale 'cyber-war'.

~~~

China's Cyber-Skirmishes, Probing with Bayonets

It's been widely reported that China is already waging a cyber-war. But in my opinion those are just skirmishes, raids to test their capability and possibly pick up more tech, intel to blackmail, etc.

~~~

Superior Chinese Encryption

China developed something revolutionary.

Back in 2014, the UK Telegraph reported that China developed 'quantum encryption'. It's a pioneering concept said to be impenetrable to hackers.

Here's a more recent headline:

Aug 20, 2016:

China's Latest Leap Forward Isn't Just Great—It's Quantum - WSJ

by The Verge:

China’s quantum network could soon span two continents, thanks to a satellite launched earlier today ... the Quantum Science Satellite is designed to distribute quantum-encrypted keys between relay stations in China and Europe. When working as planned, the result could enable unprecedented levels of security between parties on different continents. [snip]

That was written in August 15 -- mid-August of this year, the same time that Strickling boasted of his criminal transition plan of ICANN.

But actually, here's a March 2016 report ...

[Be advised -- the article is difficult to wrap your brain around.]

China's Quantum Satellite Could Change Cryptography Forever

-- by Jeffrey Lin, P.W. Singer, and John Costello [at popsci.com]

[snippets]

... China is poised to launch a project that may provide the path to an uncrackable communications system, by turning messages quantum and taking them into space. The new Quantum Space Satellite (QUESS) program is no mere science experiment. China is already becoming a world leader in quantum communications technology ... a strategic asset for Chinese power worldwide.

[snip]

Quantum entanglement is the act of fusing two or more particles into complementary “quantum states.” In such states, no particle can be independently described, instead the particles exist in a hazy shared quantum state that “collapses” when observed. Quantum encryption thus takes advantage of this feature, using it to detect would-be eavesdroppers, whose presence causes quantum states to collapse and reveal their spying to legitimate parties. Additionally, the complexity of quantum mechanics makes it virtually impossible to reverse engineer the quantum key generated through quantum entanglement.

[snip]

[link to be provided in followup post]

...

I am left to believe that it's unlikely that the USA currently stands a chance against China in a cyber-war until we work out better encryption ourselves, and we would have to develop it WHILE sustaining cyber-bombardment. We would need our developers to get off the internet completely, and that would slow down their progress.

The only reason why China doesn't dominate the internet yet is probably because they want us to keep importing their goods.

But it runs deeper than that. What about satellites?

Satellites are critical to dominance of today's internet.

Back in March 16 Bill Gertz wrote:

~

China, Russia Planning Space Attacks on U.S. Satellites

China and Russia are preparing to attack and disrupt critical U.S. military and intelligence satellites in a future conflict with crippling space missile, maneuvering satellite, and laser attacks, senior Pentagon and intelligence officials told Congress on Tuesday. [snip]

[The the primary concern in the article was a direct military threat ...]

U.S. Global Positioning System satellites remain vulnerable to attack or jamming.

[snip]

~

So yes, our targeting systems would be blinded. That in itself would would be decisive in cyber-warfare.

But destruction of GPS satellites is also a 'raw force' threat to our communications satellites as well. While our GPS is blinded, they can pick off our com-sats one-by-one. No more cell phones, no more wireless internet -- just landlines. We would be back in the '70s while China becomes the world's hub of online communications.

I doubt that China wants to destroy our economy let alone 'nuke' our cities. However, they would love to prove their super power status and be viewed as the world's new technological leader. And if they can't beat us via encryption, they can wipe out our communications satellites directly, one at a time, until we kowtow to their 'reasonable' demands.

In fact, it might be prudent to ask President Obama if it is already too late to oppose China's dominance. Behind closed doors he might be feeling 'blackmail pressure' to hand over ICANN to them as a gesture of surrender.

~~~

Brain Drain to China Quite Possible

If the US loses prestige regarding ICANN, it is possible that talent will 'drain' into China rather than the US. We currently draw in so much talent from the world that some of us feel contempt toward 'foreign geeks', but mark my words -- we benefited greatly from the 'foreign geeks' who fled from Nazi Germany into the US. And our weakness [loss of prestige] could cause us to lose that edge.

Even US college grads could feel enticed by job offers in China.

In such a climate, how could we ever hope to improve our encryption and win a prolonged cyber-war?

~~~

We should Not Trust Obama -- specifically why

The most glaring reason to not trust Obama is that his administration refuses to even contemplate the dangers in public.

Instead, they attempted two brazen stabs at spin:

1. Deregulation

The Obama administration claims that he is 'deregulating' the internet with a 'Free Range ICANN'.

First off, ICANN is assisting China in suppression of free speech. That's a good indicator of what a 'Free Range ICANN' looks like.

Secondly, the internet is the USA's most deregulated industry, and that all foreign governments want to do is increase its regulation.

A man who ought to know something about how foreign governments tick is John Bolton: “But the fact is, under American control, it’s had remarkable growth. It’s been kept free. It’s been able to withstand a lot of pressure to try and set rules that favor one side or another. And in an international environment, I can tell you from my own experience, when you get all kinds of governments from all over the world setting standards and making decisions, it will be far less free than it is now ... "

Bolton called the Internet handover “a mistake of such colossal proportions that you would have thought we’d have a huge debate about it in this country.”

2. A 'Gift to Russia'

The Obama administration also claims that renewing the contract would be a 'gift to Russia'.

First off, I'm not yet aware of Russia building any facilities for ICANN's relocation. China is.

Secondly, many in Obama's adminstration are or were close to the Clinton family. And it is well-documented that the Clinton administration sold US technology to China in exchange for illegal campaign funding. That includes satellite technology and encryption technology as well -- a corrupt gift from the Clintons.

[More on how Bill Clinton paved the way for this coming up in a followup post.]

Thirdly, Obama and Hillary Clinton dropped the ball on encryption. Why?

Fourthly, Obama has been begging China to buy bonds throughout his administration. He is beholden to them and thus this administration should recuse itself from this debate for that reason alone.

~~~

Conclusion:

Military intel is nothing like modern media. Your enemy doesn't 'spell out' his plans -- he simply attacks. And surprise preemption has been the trend in the history of modern warfare. So you don't have the luxury of being certain about 'friend or foe' until it is too late.

Renewing ICANN's IANA functions contract may help unravel China's apparent designs. While that could make us appear to be 'control freaks' in the world's eyes, we need a competent Executive Branch to navigate this clear and present danger.

More importantly, trusting the Clintons with our military and communications technology another time around would only make the problem worse. They gave massive amounts of it away before and would most likely do it again.

I'm putting libertarians on notice -- if you have any love for internet freedom of speech and online intellectual property rights, your choice is clear: Hillary Clinton must lose this election unless you think that high-tech drone development will fail to suppress China's people even more than they already are. The helplessness of China's people is getting worse every year. The government's technology outstrips human iniative.

It's true that ICANN could fracture. It's true that China's cyber-war might escalate regardless. But we are talking about the USA's Number 1 exporter. China might prefer a seamless transition -- a clean contract with the official ICANN organization.

We might owe China a lot of bond debt, but we do not owe them our nation's soul.


TOPICS: Extended News; Foreign Affairs; News/Current Events
KEYWORDS: 114th; 2016issues; china; corruption; globalism; icann; internetgiveaway; nationalsecurity; obama; trump; tyranny
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 last
To: The Westerner; bushwon

‘Do You Have 3 Minutes at Lunchtime to Save the Internet?’

That would be an excellent headline for tomorrow if there’s still time.

Only question is: ‘which sidebar’?

Breaking news is for updates on something not fully understood yet — such as a recent call from a congressional staffer.

But I’m backing you up, bushwon, because you are speaking from that perspective. But it is understandable that people got mad.

God BLESS you!


101 posted on 09/28/2016 3:58:48 AM PDT by Arthur Wildfire! March (ICANN giveaway complete any day now. Call Congress. Yes to SB3031 HR5418)
[ Post Reply | Private Reply | To 97 | View Replies]

To: The Westerner; bushwon

BBC experiments with holographic TV...
http://www.mirror.co.uk/news/uk-news/could-holographic-televisions-next-big-8897419

The brain drain already begins to shift out of the USA.

I suspect one of the reasons might be this: why bring cutting edge tech to the US when we keep getting hacked? It’s too hazardous for innovators.

But if we can keep ICANN a little longer, Trump can shore up our encyrption and take measures against China’s plan.


102 posted on 09/28/2016 4:15:55 AM PDT by Arthur Wildfire! March (ICANN giveaway complete any day now. Call Congress. Yes to SB3031 HR5418)
[ Post Reply | Private Reply | To 98 | View Replies]

To: Arthur Wildfire! March

BUMP!!!


103 posted on 09/28/2016 5:25:29 AM PDT by Freedom56v2 (Call Congress today to support the PROTECTING INTERNET FREEDOM ACT SB3034 HR5418)
[ Post Reply | Private Reply | To 102 | View Replies]

To: palmer; CodeToad; old-ager

old-ager wrote:

Here’s a tasty tidbit for y’all. Anyone running the “root” “name servers” for the “Internet” can hijack ANY domain at ANY time. So, they can make your email and web traffic go someplace else. Have you ever reset a password via a link sent in email? What if your email went to someone else due to a DNS hijack?

[unquote]


104 posted on 10/01/2016 11:40:22 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 53 | View Replies]

To: Arthur Wildfire! March; old-ager
Anyone running the “root” “name servers” for the “Internet” can hijack ANY domain at ANY time.

They've had 20 years to do so and have not so far (except by accident). The 12 organizations running the root servers report to a committee and the committee reports to both ICANN and the US Dept of Commerce. Nothing will really change in that kind of plumbing and if someone changed it, it would be quickly reverted or bypassed.

105 posted on 10/01/2016 12:08:29 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 104 | View Replies]

To: palmer

“Nothing will really change in that kind of plumbing and if someone changed it, it would be quickly reverted or bypassed.”

Then why is ICANN changing at all then? Of course someone seeks to make changes.


106 posted on 10/01/2016 2:00:40 PM PDT by CodeToad
[ Post Reply | Private Reply | To 105 | View Replies]

To: CodeToad

ICANN can do plenty of damage in plenty of ways once under foreign control, but I don’t think screwing up the root servers would be their line of attack. If they took that authority away from the 12 current organizations and gave it to 12 authoritarian governments then I would worry.


107 posted on 10/01/2016 2:12:06 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 106 | View Replies]

To: palmer; old-ager; Myrddin; CodeToad

Myrddin wrote:

OLSR
http://www.olsr.org/mediawiki/index.php/Projects

Freifunk
https://freifunk.net//en

The two links above take you to software packages that implement distributed mesh networks that can operate off your standard Windows/Linux machines to establish city wide networks using WiFi. A little extra effort is required to link mesh networks together. You may have to construct a local DNS from the standard “bind” software found on Linux or hack together something on Windows using ActiveDirectory to support your DHCP and LDAP databases to re-integrate your local area. If an EMP, war or financial collapse take down the internet on a world-wide basis, you can cobble up sufficient infrastructure with Linux and these mesh networks to re-establish some level of “normal” in your city or region.

I used OLSR to create a rolling mesh network with 802.11b devices on each railcar. A train wrapped around a mountain that lacks line of sight from car to car will have a good mesh path using OLSR. I chose OLSR because it constantly updates routes and minimizes latency to transmit a data packet. That was crucial to my system design. The alternative AODV using by Freifunk minimizes transmitter on time by performing route discovery only when it is time to move a packet. That introduces latency for route discovery, but reduces power consumed and over the air bandwidth required to continually update the connectivity maps.

I stopped doing daily work with OLSR in 2009 when Obama’s arrival trashed my program finances. The OLSR2 work started after that point in time, so I don’t have much “hand’s on” with that one.

[unquote]


108 posted on 10/04/2016 5:15:28 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 105 | View Replies]

To: palmer; old-ager; Myrddin; CodeToad; The Westerner; bushwon

Cyber-security remains a vital issue although not as urgent as the election.

And Trump takes this seriously. Our work was helpful in forming an information nerve-center.

I found the transcript of Trump’s speech and will post it to ‘all’ [so as not to clog your pings]:

https://www.donaldjtrump.com/press-releases/donald-j.-trump-remarks-on-cybersecurity


109 posted on 10/04/2016 5:32:44 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 105 | View Replies]

To: All

After losing ICANN, cyber-security’s urgency has plummeted for the moment but might well be the top issue for a President Trump to address. It affects:

1. Counter-terror
2. The Brain Drain
3. US technology [who wants to manage innovation with poor encryption?]

4. National Security.
5. The economy.
6. US prestige. [which also affects the brain drain and US tech]

~~~~~~~~~~~~~~~~~~~~~

DONALD J. TRUMP PROMISES IMMEDIATE ACTION ON CYBERSECURITY IN HIS ADMINISTRATION

https://www.donaldjtrump.com/press-releases/donald-j.-trump-remarks-on-cybersecurity

It is a privilege to be here this morning with so many distinguished members of our armed services.

Before we get started with our Q & A, I’d like to address one of the most important aspects of America’s national security, and that’s cybersecurity.

To truly make America safe, we must make cybersecurity a major priority for both the government and the private sector.

Cyber theft is the fastest growing crime in the United States.

As President, improving cybersecurity will be an immediate and top priority for my Administration.

One of the very first things I will do is to order a thorough review of our cyber defenses and weaknesses, including all vital infrastructure.

Cyber-attacks from foreign governments, especially China, Russia, and North Korea along with non-state terrorist actors and organized criminal groups, constitute one of our most critical national security concerns.

Hillary Clinton’s only experience in cybersecurity involves her criminal scheme to violate federal law, engineering a massive cover-up, and putting the entire nation in harm’s way. The fact that a former Senator and Secretary of State claimed not to know what the letter “C” means is just one more example of why she’s unfit to hold public office.

The scope of our cybersecurity problem is enormous. Our government, our businesses, our trade secrets, and our citizens’ most sensitive information are all facing constant cyber attacks.

Just consider some of these recent hacks:

JP Morgan Chase had 73 million emails stolen.

E-Bay was invaded and gave up 150 million passwords.

Target was attacked and gave up 40 million credit card numbers.

Attacks like these are happening on a regular basis both in the United States and around the world, and the costs in our privacy, our security and on our financial sector are extraordinary.

Identify theft, financial laundering, as well as ransom ware – involving the extortion of a hacked institution – are all becoming increasingly common.

Incredibly, hackers were able to obtain at least 20 million identities of people who underwent FBI background investigations.

The information hacked contains facts discovered by the FBI in doing background checks for people seeking positions with the Federal Government. It is a treasure trove which can be easily used for blackmail.

The fact that this highly classified information was so poorly protected demonstrates that cybersecurity is just one more area where the Obama Administration has failed.

We should not let this be like the history of the Mafia which was allowed to grow into a nation-wide organization which infiltrated and corrupted so many areas of society for such a long time.

We can learn from this history that when the Department of Justice, the FBI, the DEA and state and local police and prosecutors were combined in Task Forces directed at the Mafia, they were able to have great success in prosecuting them, seizing their business interests and removing their infiltration from legitimate areas of society.

As President, I will instruct the Department of Justice to create Joint Task Forces throughout the United States to work together with Federal, State, and local law enforcement authorities and international law enforcement to crush this still-developing area of crime.

I will make certain that our military is the best in the world in both cyber offense and defense. I will also ask my Secretary of Defense and Joint Chiefs to present recommendations for strengthening and augmenting our Cyber Command.

As a deterrent against attacks on our critical resources, the United States must possess the unquestioned capacity to launch crippling cyber counter-attacks. This is the warfare of the future, America’s dominance in this arena must be unquestioned.

Cybersecurity is not only a question of developing defensive technologies but offensive technologies as well.

For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible. We should turn cyber warfare into one of our greatest weapons against the terrorists.

To enhance the defense of the other agencies of government, including our law enforcement agencies, we will put together a team of the best military, civilian and private sector cybersecurity experts to comprehensively review all of our cybersecurity systems and technology.

The Cyber Review Team will proceed with the most sensitive systems first, but ultimately all systems will be analyzed and made as secure as modern technology permits.

I will also require that follow-up reviews take place on a regular basis determined by the sensitive nature of the security involved.

The review will include providing exact recommendations for the best combination of defensive technologies tailored to specific agencies.

This will include the various methods of internal monitoring, attack and penetration, investigation of suspected hackers or rogue employees, and identity protection for government employees.

The review team will also remain current on the constantly-evolving new methods of attack, and will attempt to anticipate them and develop defenses as often as possible before major breaches occur.

This group of experts will set up protocols for each agency and government officials, requiring them to follow best practices.

They will also establish a training program for all government employees to make certain they understand what defenses are available and utilize them, along with a continuing education program so everyone is aware of the newest methods of both attack and defense.

Those who violate classification rules will be held responsible to the fullest extent of the law. I will appoint an Attorney General who will reform the Department of Justice like it was necessary after Watergate. My Attorney General will restore the integrity of the Department of Justice.

Today is just the beginning of a long and overdue national discussion of how to protect ourselves from modern cyber-crime and evolving national security threats, and how to develop the cyber offense strategies necessary to gain a critical security edge in the 21st century.

Thank you again for being here, and now let’s begin our discussion.

— Donald Trump

[unquote]


110 posted on 10/04/2016 5:38:20 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 109 | View Replies]

A better summary:

Cyber-security is not be a top campaign issue, but it might well be the most urgent prolbem for a President Trump to solve. It affects:

1. Counter-terror
2. The Brain Drain
3. US technology [who wants to manage innovation with poor encryption?]

4. Nuclear and conventional military effectiveness.
5. Missile defense.
6. The economy.
7. US prestige. [which also affects the brain drain and US tech]


111 posted on 10/04/2016 5:47:56 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 110 | View Replies]

To: Democrat_media; palmer

Democrat Media, I’m reposting you here because this is where most of the technical posting is concentrated ...

[repost of Democrat_media]

[quote]

I’m a coder with years of experience and I’m definitely going to try to create a new
alternate Internet based on mesh networks , or die trying. I’ll keep you posted on any breakthroughs and or when we can port to the new Internet. I’ll start with these 2 links.
Seems like there might be a market for apps that link to other apps on other smartphones or pcs peer to peer like creating a distributed mesh internetwork. Im going to use erlang, websockets a lot of the whatsapp architecture

https://techcrunch.com/2016/03/13/building-a-brand-new-internet/

https://www.popularresistance.org/creating-an-alternative-internet-to-keep-the-nsa-out/

https://techcrunch.com/2016/03/13/building-a-brand-new-internet/

[— democrat_media, unquote]


112 posted on 10/04/2016 6:00:58 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 111 | View Replies]

To: Arthur Wildfire! March

Was wondering how you fared this weekend? You must have been wrung out. Good to get an optimistic ping from you. Thank you for shouting to us and waking us up. Perhaps the upside will be an aggressive movement among software developers to create a viable alternative?


113 posted on 10/04/2016 11:33:25 AM PDT by The Westerner ("Giving Away the Internet or Any Part of It Is Sheer Lunacy" Jim Robinson)
[ Post Reply | Private Reply | To 109 | View Replies]

To: The Westerner

Thank you for all of your support and encouragement. People may be ‘gun shy’ about ICANN now. They got their transition and so far the other shoe hasn’t dropped.

It will drop in due time. They have better negotiation leverage now that they passed the final hurdle. ICANN will sell out — that is their history.


114 posted on 10/05/2016 5:26:53 AM PDT by Arthur Wildfire! March
[ Post Reply | Private Reply | To 113 | View Replies]

China’s Hostile Cyber and Trade War: It’s Threat To National Security

http://www.freerepublic.com/focus/f-news/3477677/posts

As we witness the home stretch of the presidential election with candidate debates, campaign stops, and political ads, both parties have an opportunity to talk substantively about a serious trade issue – ongoing efforts by China to hack and steal intellectual property from U.S. companies and using stolen U.S. trade secrets to manufacture their own cut rate products. One assistant attorney for U.S. National Security describes the Chinese hacking campaign against the United States a true, “national security emergency.”

China has created what some describe as an army of hackers – numbering in the thousands – high tech soldiers that work to identify and steal intellectual property from various industrial, tech or defense related companies. China then uses the stolen intellectual property to produce nearly identical products with the information it hacks. Even worse, China then dumps these products into the United States or floods other countries’ markets with products at prices no nation can compete against.

[snip]

The recent U. S. Steel case is a classic example of what the Chinese are up to these days and how they must be stopped. U. S. Steel Corporation invested millions into the research and development of innovative, lighter and stronger steel products.

[snip]

It’s not just the steel industry that is fending off a massive Chinese cyber war and flagrant trade violations. CNN recently reported how the Chinese allegedly hacked into the heart of our banking industry, the FDIC. Westinghouse Electric, Allegheny Technologies and SolarWorld have reportedly been hacked and pilfered. Companies in engineering, manufacturing, chip design, telecommunication and pharmaceuticals are also dealing with cyber-attack and theft.

The US Justice Department describes China’s hacking campaign as the, “Great Brain Robbery” and a recent USITC report citied potential losses to US companies at more than $300 billion. That figure doesn’t take into account millions more many companies have lost in terms of brand value and increased costs for IP security.

American technology is especially crucial to our national defense, but Chinese intellectual property theft may one day force our own military to rely on Chinese technology or even worse, one day see our own technology used against us.

[snip]


115 posted on 10/07/2016 7:18:20 AM PDT by Arthur Wildfire! March (Hillary believes in a Trickle Up policy. Rob Haiti relief. Water down medicine.)
[ Post Reply | Private Reply | To 109 | View Replies]

Be prepared! How do we prepare for a possible Clinton presidency?

http://www.freerepublic.com/focus/f-chat/3481858/posts


116 posted on 10/18/2016 8:28:25 AM PDT by Arthur Wildfire! March (Hillary's Trickle Up policy: take bribes, sell sleazy pardons, water down AIDS medicine.)
[ Post Reply | Private Reply | To 115 | View Replies]

[quoting palmer]

I wrote: “Unfortunately, the NSA was hacked over the summer, and the US government demands that all encryption algorithms of US companies be stored there.”

Now for someone who knows something ...

[quote]

I had that argument with another freeper. He claimed there are secret encryption algorithms. I stated that there are no secret encryption algorithms. Of course I have no way of knowing that. However the NSA along with NIST have developed several public encryption algorithms that were reviewed and critiqued by top worldwide encryption experts. Those algorithms are in fact used by the government and most US companies. It would go against all accepted practice to use a secret algorithm.

A company that invents and uses its own algorithm is not doing itself any favors. The secrecy must be in the key and the key alone in order to assure that the a cyber loss is not a catastrophe. If you lose a key in a cyber attack you have lost one key and life goes on. If you lose an algorithm which, being code, is harder to protect than a key which is data, that is a catastrophe.

Thus I would end any speculation about secret encryption algorithms. I speak strictly as an applied crypto expert with two decades of experience, not as an insider or anything like that.

— palmer


117 posted on 10/22/2016 5:17:28 AM PDT by Arthur Wildfire! March (Hillary's Trickle Up policy: take bribes, sell sleazy pardons, water down AIDS medicine.)
[ Post Reply | Private Reply | To 116 | View Replies]

To: palmer

I archived your post here.

Thank you, FRiend.


118 posted on 10/22/2016 5:19:33 AM PDT by Arthur Wildfire! March (Hillary's Trickle Up policy: take bribes, sell sleazy pardons, water down AIDS medicine.)
[ Post Reply | Private Reply | To 117 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson