Translate

Monday, December 31, 2012

Child rape a device to achieve immortality


The Eye Of Horus,  Egyptian God - the original 'horror' story


Hi, I am an avid reader of your blog, along with aangirfan, the slog,chris spivey and the needleblog and the Icke forum. I wanted to throw a few things into the mix, as I have noticed Bill Schnoebelen cropped up recently. I have listened to clip of Bill talking and he links to The Tunnels of Typhon, which is to do with the chakras and why the eye of horus is linked to access to the chakras. The anus is supposedly the eye of horus. 

There is more info on the subject on Sons-of-Liber-Typhon-by-Salvatore-Tommy-Ganci-SaToGa. Just my opinion, but I think that the rape of young boys has a lot to do with immortality etc and not just the obviously perverted sex act it is. I just want to get all the smart folks doing research to kick this around, as I think it is relevant to a lot of the child abuse going on worldwide.

On the Icke forum, somebody came up with a Leeds University Research Enterprise (LURE) link to Savile. I know that Graham Ovenden has a picture of a young girl titled Lure Me from 1971. May be relevant or may just be coincidence. Not much of a believer in coincidences though!

I use Ixquick as a browser but noticed that when I go on Rumor Mill News, it tells me how many posts there have been since I last visited. This is a browser that states your IP address isn't backtracked! I don't doubt that this email is going to be read by agencies that monitor the internet along with all phone calls. I cannot access some of the blog accounts from my home pc and my DI account appears to be blocked, so I've emailed you the above info. Don't mean to be a pain or lead people down dead ends but I've noticed the shills are out and about on Icke's site and value your credibility.

Regards, Steve

16 comments:

Anonymous said...

Eye of Horus...the anus...maybe.. also veiwed as Another meaning to the eye of Shiva...Asian ? Persian? Links to The Lingham..and the "eye" of the penis ??..

Anonymous said...

Ixquick is not a browser, it's a search engine. It doesn't record your IP address when you use it to search, that's all. You may have installed the Ixquick toolbar to your exisiting browser, but this has no effect on how other web sites log your details. It just makes web searches using Ixquick more convenient.

Anonymous said...

''The anus is supposedly the eye of horus''

The anus has one of the highest concentrations of blood vessels/capillaries in the human body. Pleasure or pain, child or adult... there are sadly sick f***s on this planet that know about this. Jimmy Savile certainly knew about it.

Regards.

Anonymous said...


There seems to be a "vermin" worse than rats roaming our planet.

There is only one end for this type of vermin & soon i hope.

How bad does it have to get before people make the right choice.

& act.

i think maybe we must listen to the music this evil band play to grasp a idea of his bent?

I'm Wreching

HETT

Rapture?

We were told there would be "signs" of the end times?

rebirth of Israel
building of the teple
mark of the beast 666 controlling of the global financial system

Droughts, Earth quakes, World distress a total mess.

Jesus says we won't know the time & hour?


Whilst people just babble tripe of end times.

Anonymous said...



Re:- Why do you have to make a google account for everything these days?

A/ For those that don't know, Google records and/or logs all your info. Keystrokes, IP Address' Geo tags etc. Rather than using google as your search page use startpage dot com it uses google to search but hides your IP Address for the search so Google can't track you.

HETT

Anonymous said...

HETT,

Privatize, HiideMyAss, and other VPN's go a long way too.

- Cobalt

Anonymous said...

Anyone thinking of using a VPN should think twice about using Hotspot sheild, they raised $52million from Goldman Sachs earlier this year, would you trust a company in bed with Goldman Sachs ?

Try duckduckgo as well for your search engine.

This is also worth looking at
Which VPN Providers Really Take Anonymity Seriously?
https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/

JimUK

Anonymous said...



CHEERS JIMUK

Clearly we have to be AWE with all the efforts of the our "TAP" Thankyou sir.

He's lifted the veil of secrecy of "so many meaty stories" EVERYDAY !!! Amazing.

This should & needs to be your "DAILY FIRST VISIT" EVERY DAY!!!!

TAP IS AN INSPIRATION TO US ALL.

"ITS WHAT YOU CAN OFFER IN SUPPORT" not poking shallow comments which virtually glow of the web page to any one with a modicum of intelligence.

MAY I TAKE THIS EARLY OPPOTUNITY TO WISH ALL VISITORS & SUPPORTERS :-

A HAPPY NEW YEAR to all girls-n-guys

Please keep up all your good work & MORE

Please for 2013

HETT

Anonymous said...

@ JimUK 6:20PM,

Who do you think runs/sponsors 'TorrentFreak'?

Do a DNS lookup (not an IP) and you can start joining the dots (and there are quite a few dots that need joining).

Best regards.

- Cobalt

Anonymous said...



As they say "Cobalt"

"it gets better folks"

The very best to you SIR

HETT

more more more, this is priceless.

Anonymous said...

After reading much here one thing that seems to dawn on me is where do we all stand?

The Georgia stones seems to cut the mustard although it makes my skin curl they have got it right.

"Not that i agree".

its the simplicity of 10 key points set up in stone clearly laying out your intentions or thoughts.

we need our own 10 key points ?

I'm not really sure where to start but maybe:-

1/ Predictable family unit is first. ?

2/ love your fellow man.?

3/ love your planet. ?

4/ Die knowing you did your genuine best for all loved good worldly folk.

for 5 - 10+ your help please

HETT

for a better 2013 bless you all

The good do'ers only.

Toad Hall said...

If someone wants to track your online activity, I'm affraid it isn't really very hard. For a start all your info goes through your ISP regardlesss of what software you use on your PC/Mac.

There is TOR which can encrypt your data, my understanding is that this is the safest most anonymous way of surfing the web.

However, bare in mind this was originally developed by the US navy and has since been adopted/adapted by the open source community.

So unless you're a real IT genius you'll never really know whether there are any back doors in the software.

I don't really feel I have anything to hide, I'm exercising my right to freedom of information and speech. Until such day I am informed that laws have changed to restrict these rights I feel I am entitled to read what I like. Provided of course it is within the confines of the law. Which I still adhere to and honour.

Anonymous said...



'Snooper's charter' web spying Bill announced
The Queen has formally announced plans to greatly increase surveillance of the internet by intelligence agencies and the police, in plans that are being labelled a “snooper’s charter” by civil liberties groups.

http://www.telegraph.co.uk/technology/news/9254589/Snoopers-charter-web-spying-Bill-announced.html

UK's Web monitoring draft bill revealed: What you need to know

Summary: The draft "Communications Data Bill" will expand the U.K. government's Web, email, and call monitoring powers. Here's everything you need to know -- and more.

http://www.zdnet.com/blog/london/uks-web-monitoring-draft-bill-revealed-what-you-need-to-know/5183


Death Of The Internet: Unprecedented Censorship Bill Passes in UK.

“Wash-up” process used to rush through draconian legislation as a pitiful handful of MPs attend debate

http://www.prisonplanet.com/death-of-the-internet-unprecedented-censorship-bill-passes-in-uk.html

have fun folks

HETT

Anonymous said...

@ Toad Hall re: Tor

"However, bare in mind this was originally developed by the US navy and has since been adopted/adapted by the open source community.

So unless you're a real IT genius you'll never really know whether there are any back doors in the software."

https://www.torproject.org/docs/faq.html.en#Backdoor

Is there a backdoor in Tor?

There is absolutely no backdoor in Tor. Nobody has asked us to put one in, and we know some smart lawyers who say that it's unlikely that anybody will try to make us add one in our jurisdiction (U.S.). If they do ask us, we will fight them, and (the lawyers say) probably win.

We think that putting a backdoor in Tor would be tremendously irresponsible to our users, and a bad precedent for security software in general. If we ever put a deliberate backdoor in our security software, it would ruin our professional reputations. Nobody would trust our software ever again — for excellent reason!

But that said, there are still plenty of subtle attacks people might try. Somebody might impersonate us, or break into our computers, or something like that. Tor is open source, and you should always check the source (or at least the diffs since the last release) for suspicious things. If we (or the distributors) don't give you source, that's a sure sign something funny might be going on. You should also check the PGP signatures on the releases, to make sure nobody messed with the distribution sites.

Also, there might be accidental bugs in Tor that could affect your anonymity. We periodically find and fix anonymity-related bugs, so make sure you keep your Tor versions up-to-date.


Yes, "they would say that, wouldn't they", but as the quote says it's open source meaning that it can be looked at, so if there was a backdoor a) they are lying when they say there isn't one = epic credibility FAIL and b) it's extremely well hidden because no one has found it yet. Whilst not Tor-related, for a comparison as to how open source audits itself look at this article into the suspected backdoor inside OpenBSD - code audited, no backdoor:

http://arstechnica.com/information-technology/2010/12/openbsd-code-audit-uncovers-bugs-but-no-evidence-of-backdoor/

The greater issue with the Tor network is the relays, particularly the exit nodes, which are more likely to be compromised than the software itself is. It's a fair bet that hundreds of exit nodes are run by the US military and/or the alphabet agencies, or are compromised in other ways.

This why the HTTPS Everywhere plugin is included within the browser bundle, which forces HTTPS connections on a host of sites so it doesn't matter if the exit node is a bad one or not or, if the plugin is used just with "regular" Firefox or Chrome, whether the ISP is spying or not - i.e. they may see who you're talking to, but not what you're saying. Many sites are moving to secure connections as a default anyway.

https://www.eff.org/https-everywhere
https://www.eff.org/deeplinks/2012/03/https-and-tor-working-together-protect-your-privacy-and-security-online

Throw the odd VPN into your mix as well as the Tor Browser, and it becomes more troublesome for them to find out who you are and what you're saying. (Of course, the VPN needs to be a good one, i.e. not US/UK/EU based, in a jurisdiction that requires no logging, etc.)

With Tor, they are more likely to chase you if you actually run an exit node yourself - see this story:

http://www.zdnet.com/austrian-man-raided-for-operating-tor-exit-node-7000008133/

Anonymous said...

@ Hett

The snooping bill was shot down last month. However, this does not mean it's going anywhere as the committee in charge of looking at it said words to the effect that "there is a case for legislation". All that means is it will come back again, possibly in the next few months because Theresa May wants it on the statute book before the next General Election, so that we will all be completely safe from terrorists and paedophiles and other Very Bad People. (LOL)

You should read the committee reports for some illuminating information about how useless the measure will be:

http://www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/news/full-publication-of-report/

"One of the significant risks of the third party provision is that it may actually lead to an increase in the number of services that use encryption" (para 96)

"There are some instances of services that not only encrypt but have specific software to ensure no communications data is kept about their users, and no websites can identify their users when they visit. For example, we took evidence from the Tor Project, a not-for-profit organisation which encrypts and redirects its users' communications to ensure they cannot be traced. The Tor Project is used by people trying to circumvent national censorship schemes, by victims of crime, by military personnel working undercover, by journalists wishing to protect their sources and by whistleblowers." (para 99)

There's lots more in the report, it's worth looking at, as are the depositions from the ICO head Christopher Graham and from the Tor Project itself. These were available online but they have now been collated into a single volume PDF available on this page ("Oral Evidence Volume"):

http://www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/publications/

E.g., some of Graham's statement included these:

"I do not think I am saying anything that is wildly controversial when I point out that if you are the international terrorist or the organised criminal who this system is designed for, you will presumably have the wit not to go with one of the big six. You will find a small provider, and you might even be able to afford the £5 a month to buy a virtual private network registered overseas. All your traffic will then be encrypted and you are home free. I think the really scary people will have worked that out for themselves, so basically this is a system that, on the face of it, is looking for the incompetent criminal and the accidental anarchist." (page 272)

and

"Encryption, which of course is something that, while wearing another hat, I very strongly advise would frustrate the purpose of this Bill to track the communications from someone who is of interest to the police with somebody else. It is not difficult to see that encryption is a good idea for security reasons. If only that memory stick that the Greater Manchester Police detective had stolen from his house had been encrypted we would not have the problem that we have. So the Information Commissioner spends most of his time going around urging everyone to encrypt everything, and of course good businesses do that. Individuals can do it too for £5 a month so, surprise surprise, they will. That then frustrates the whole purpose of this Bill." (pages 276-7)

(He is primarily speaking about traffic encryption, but inserts a bit about file/disk encryption in the middle.)

and

"All I am saying is that there is a lot of encryption going on, and there will be more encryption. It is a fact of life." (page 277)

Toad Hall said...

@anon, very interesting post, thanks.