<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 3. Internet Privacy and Personal Access at Risk</title>
	<atom:link href="http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/</link>
	<description>Media Democracy In Action</description>
	<lastBuildDate>Sat, 09 Feb 2013 23:21:00 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
	<item>
		<title>By: SemiotiX &#124; The Future of Wikileaks</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-14560</link>
		<dc:creator>SemiotiX &#124; The Future of Wikileaks</dc:creator>
		<pubDate>Wed, 28 Mar 2012 11:15:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-14560</guid>
		<description>[...] http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/ [...]</description>
		<content:encoded><![CDATA[<p>[...] <a href="http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/" rel="nofollow">http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/</a> [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: 6. Google Spying? &#124; Greediocracy</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-13451</link>
		<dc:creator>6. Google Spying? &#124; Greediocracy</dc:creator>
		<pubDate>Fri, 30 Sep 2011 12:24:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-13451</guid>
		<description>[...] 3. Internet Privacy and Personal Access at Risk [...]</description>
		<content:encoded><![CDATA[<p>[...] 3. Internet Privacy and Personal Access at Risk [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: My Links Explained &#171; UAlbany Journalism 100</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-13414</link>
		<dc:creator>My Links Explained &#171; UAlbany Journalism 100</dc:creator>
		<pubDate>Sun, 18 Sep 2011 00:46:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-13414</guid>
		<description>[...] second link I placed on my blog is an article about internet privacy from the website, Project Censored. I particularly found this article interesting because it shed [...]</description>
		<content:encoded><![CDATA[<p>[...] second link I placed on my blog is an article about internet privacy from the website, Project Censored. I particularly found this article interesting because it shed [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Internet access at risk? — Simple Wyrdings</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-13196</link>
		<dc:creator>Internet access at risk? — Simple Wyrdings</dc:creator>
		<pubDate>Wed, 29 Jun 2011 18:30:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-13196</guid>
		<description>[...] is a story on the Project Censored site about the government taking over access to the internet. Share and [...]</description>
		<content:encoded><![CDATA[<p>[...] is a story on the Project Censored site about the government taking over access to the internet. Share and [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kirk Cobain</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-13195</link>
		<dc:creator>Kirk Cobain</dc:creator>
		<pubDate>Wed, 29 Jun 2011 00:32:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-13195</guid>
		<description>Hate to change the subject but FYI:

The Hacker BS Brainwash.

People might as well realize that the entire digital world has back doors designed into it which can be called across frameworks, splash screens, protocols and even kernel level and machine level compilation to create undetectable threading, from literally hundreds of millions of lines of compilation and scripts.

So the &quot;hackers&quot; you see are BS in many cases, merely running commands and multi-routines, timed and automated depending on the purpose with even access well beyond the public port or firewall illusion straight into the operating apps of some of the biggest software publishers, and others developed in their languages, frameworks and distributions.

A pre-decided, designed and funded intelligence hoax job like Google, Twitter, Youtube and Facebook are total convenient intelligence for free handy suckers bait we all use, based on a glamorized story for us gullible as easy to believe as super stardom of an actor or rock band. 

It&#039;s all a given from those with the bucks, the knowledge, the network, and the time to push it like a formula on someone else&#039;s talent like the Gates stooge, on a too needed to fail intelligence slush fund which sets up these dweebs like independent astronauts who flew to the moon by themselves AND built the rocket.

Then as more promotionals,  they make more fictional, contrived movies and shows with plenty of drama, soft pron and xtc with their picked sole developers geeking talking head for the talk show circuit as if this was budding Microsoft, Gates, &quot;borrowed&quot; and authored code in those days of 1980. 

It&#039;s not, Google, and Even a Facebook requires huge architectures of hardware, sitting in &quot;clouds&quot; and many developers way beyond the scope of one dummy portrayed as a billionaire and freak geek of nature to sucker in more of the gullible, for more commerce but especially free intelligence and profiling usage. 

Freak-geeks like Assange are other paid multiplicity moles, doing stuff that any Japanese student, with interest and Flair pen and a napkin could pseudo code in multiplicity in 3 days, and also build an over-night success, in an already determined intelligence niche, with 40 developers, and a million a month hardware and free development budget above and beyond the brain fuel, as directed by the guy with the black cigar. The days of the rocket science innovation are over, the days of an army of internet e-aerospace engineers is where it is at today, these are not one man jobs, but one or two, three man concepts, turned into Google&#039;s by NWO intelligence funding and planning.

The point is all these &quot;hacking&quot; pre-feeds and mental pepperings of premonition to the public and all the pre-arranged gullibility and convenient lack of knowledge, is to further goals of but more pretext for various wars and sorties, at the most for a literal war, but in the meantime to surveill, extort, borrow, study and profile corporations globally, groups and individuals, and everything in between and around, for free! and often &quot;volunteered&quot; information!, from a manual of command operations as easily run and automated as running a search query in Google, not relentless hacking, straight in and out, or whatever.

The &quot;hacker&quot; groups and &quot;cracker&quot; stories are another pure BS lie. Yes of course there are some independents, but these big hacks are controlled digital rapes and demolitions leading to something much bigger and widespread later, and it was pre-designed for this purpose with more options for accessible backdoor exploitation than these rat and deceiver handlers will need, the rest of the teams are just compartmentalized software ready and knowledgeable digital soldiers, on prepared sorties and routines, not some masterminds into something with a million holes anyways, when you know where they are before you get there.

And they don&#039;t even need a hard connection into your system, or your Microwave oven or automobile&#039;s system either, it can be wireless, and even invasive wireless, but that&#039;s another article. It&#039;ll go satellite in due time, the other guys satellites, if you know what I mean, or his farmed spaces in space places.

Onward with open eyes! LOL</description>
		<content:encoded><![CDATA[<p>Hate to change the subject but FYI:</p>
<p>The Hacker BS Brainwash.</p>
<p>People might as well realize that the entire digital world has back doors designed into it which can be called across frameworks, splash screens, protocols and even kernel level and machine level compilation to create undetectable threading, from literally hundreds of millions of lines of compilation and scripts.</p>
<p>So the &#8220;hackers&#8221; you see are BS in many cases, merely running commands and multi-routines, timed and automated depending on the purpose with even access well beyond the public port or firewall illusion straight into the operating apps of some of the biggest software publishers, and others developed in their languages, frameworks and distributions.</p>
<p>A pre-decided, designed and funded intelligence hoax job like Google, Twitter, Youtube and Facebook are total convenient intelligence for free handy suckers bait we all use, based on a glamorized story for us gullible as easy to believe as super stardom of an actor or rock band. </p>
<p>It&#8217;s all a given from those with the bucks, the knowledge, the network, and the time to push it like a formula on someone else&#8217;s talent like the Gates stooge, on a too needed to fail intelligence slush fund which sets up these dweebs like independent astronauts who flew to the moon by themselves AND built the rocket.</p>
<p>Then as more promotionals,  they make more fictional, contrived movies and shows with plenty of drama, soft pron and xtc with their picked sole developers geeking talking head for the talk show circuit as if this was budding Microsoft, Gates, &#8220;borrowed&#8221; and authored code in those days of 1980. </p>
<p>It&#8217;s not, Google, and Even a Facebook requires huge architectures of hardware, sitting in &#8220;clouds&#8221; and many developers way beyond the scope of one dummy portrayed as a billionaire and freak geek of nature to sucker in more of the gullible, for more commerce but especially free intelligence and profiling usage. </p>
<p>Freak-geeks like Assange are other paid multiplicity moles, doing stuff that any Japanese student, with interest and Flair pen and a napkin could pseudo code in multiplicity in 3 days, and also build an over-night success, in an already determined intelligence niche, with 40 developers, and a million a month hardware and free development budget above and beyond the brain fuel, as directed by the guy with the black cigar. The days of the rocket science innovation are over, the days of an army of internet e-aerospace engineers is where it is at today, these are not one man jobs, but one or two, three man concepts, turned into Google&#8217;s by NWO intelligence funding and planning.</p>
<p>The point is all these &#8220;hacking&#8221; pre-feeds and mental pepperings of premonition to the public and all the pre-arranged gullibility and convenient lack of knowledge, is to further goals of but more pretext for various wars and sorties, at the most for a literal war, but in the meantime to surveill, extort, borrow, study and profile corporations globally, groups and individuals, and everything in between and around, for free! and often &#8220;volunteered&#8221; information!, from a manual of command operations as easily run and automated as running a search query in Google, not relentless hacking, straight in and out, or whatever.</p>
<p>The &#8220;hacker&#8221; groups and &#8220;cracker&#8221; stories are another pure BS lie. Yes of course there are some independents, but these big hacks are controlled digital rapes and demolitions leading to something much bigger and widespread later, and it was pre-designed for this purpose with more options for accessible backdoor exploitation than these rat and deceiver handlers will need, the rest of the teams are just compartmentalized software ready and knowledgeable digital soldiers, on prepared sorties and routines, not some masterminds into something with a million holes anyways, when you know where they are before you get there.</p>
<p>And they don&#8217;t even need a hard connection into your system, or your Microwave oven or automobile&#8217;s system either, it can be wireless, and even invasive wireless, but that&#8217;s another article. It&#8217;ll go satellite in due time, the other guys satellites, if you know what I mean, or his farmed spaces in space places.</p>
<p>Onward with open eyes! LOL</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Fukushima: World&#8217;s Worst Industrial Disaster Reveals How Nation States Are Powerless to Protect Us from Advanced Technology &#171; Aotearoa: a wider perspective</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-13193</link>
		<dc:creator>Fukushima: World&#8217;s Worst Industrial Disaster Reveals How Nation States Are Powerless to Protect Us from Advanced Technology &#171; Aotearoa: a wider perspective</dc:creator>
		<pubDate>Tue, 28 Jun 2011 03:25:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-13193</guid>
		<description>[...] 3. Internet Privacy and Personal Access at Risk [...]</description>
		<content:encoded><![CDATA[<p>[...] 3. Internet Privacy and Personal Access at Risk [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Caryn Arreaga</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-12695</link>
		<dc:creator>Caryn Arreaga</dc:creator>
		<pubDate>Fri, 29 Apr 2011 11:36:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-12695</guid>
		<description>Beautifully published article. I enjoy how the article crystal-clear and understandable for everyone.</description>
		<content:encoded><![CDATA[<p>Beautifully published article. I enjoy how the article crystal-clear and understandable for everyone.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Research Paper at Melissa&#039;s Blog</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-12664</link>
		<dc:creator>Research Paper at Melissa&#039;s Blog</dc:creator>
		<pubDate>Fri, 22 Apr 2011 14:10:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-12664</guid>
		<description>[...] http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/ [...]</description>
		<content:encoded><![CDATA[<p>[...] <a href="http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/" rel="nofollow">http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/</a> [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: The Unofficial But Kind of Official US Pawliticks Thread - Poker Forums</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-12624</link>
		<dc:creator>The Unofficial But Kind of Official US Pawliticks Thread - Poker Forums</dc:creator>
		<pubDate>Sun, 17 Apr 2011 16:03:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-12624</guid>
		<description>[...] House   Join Date: Dec 2009 Location: TROLOLOLOLOL  Posts: 801         3. Internet Privacy and Personal Access at Risk &#124; Project Censored  For those of you who haven&#039;t heard of project censored I highly recommend checking it [...]</description>
		<content:encoded><![CDATA[<p>[...] House   Join Date: Dec 2009 Location: TROLOLOLOLOL  Posts: 801         3. Internet Privacy and Personal Access at Risk | Project Censored  For those of you who haven&#039;t heard of project censored I highly recommend checking it [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Joel Evans-Fudem</title>
		<link>http://www.projectcensored.org/top-stories/articles/3-internet-privacy-and-personal-access-at-risk/comment-page-1/#comment-12616</link>
		<dc:creator>Joel Evans-Fudem</dc:creator>
		<pubDate>Fri, 15 Apr 2011 19:26:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.projectcensored.org/?p=1448#comment-12616</guid>
		<description>Oh yea, and the secret ACTA Pact has been dead for a couple years.  COICO is the new one that they are working on which will basically do the same thing.  Get it straight, not ACTA, COICA.</description>
		<content:encoded><![CDATA[<p>Oh yea, and the secret ACTA Pact has been dead for a couple years.  COICO is the new one that they are working on which will basically do the same thing.  Get it straight, not ACTA, COICA.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using disk: enhanced
Database Caching 7/24 queries in 0.015 seconds using disk: basic

Served from: www.projectcensored.org @ 2013-02-11 23:58:21 --