Callisto House Business Plan

Hits: 46

Here is the Business Plan document, of Callisto House.

In the scope of research through my non-profits, Positive Vibrations Ministries and The Homeless Council, there is an identified coupling between the economic, social and political aspects of our communities' relationships and interactions. Understanding this pressure helps to resolve it. Politics is dependent upon the social context, who gives them their authority. The social context is built around the economic context. In order to positively affect the political, the social needs to change from a change in the economic context. The objective is to introduce a new market to kick off these transformations. 

The introduction of an electronic component to phones, which measures and reports oneโ€™s esteem to currently co-located or previously encountered folks, allows each of us to send esteem tickets or treats t each other, even if this is with someone from an hour ago. Judicial proceedings would result in a judicial ticket. This esteem level, for the individual, is matched by organizational esteem, including racial categorization such that the Black, the Mexican and the American Native, for example, would receive organizational esteem, given past offenses to that community, and all members of that community would benefit. In this way, organizational esteem would measure the worth of businesses and schools. The activity of an esteem market would look much like an ant colony that emits pheromones to find food, though here we would be sending bullets of love, between and among us.

A predictive innovative investment market will be established at the macro level, so we have explained our intentions in the economic sphere, at the micro and macro levels. In the social context, at the micro level, veteran owned and operated shelters will be established, while the macro level will see an international non-profit association of Localities to influence this sphere. In the political realm, a city council of 9, one from each clan, will be pursued, while the macro level will see increasing court cases questioning constitutionality as well as efforts to pass several amendments.

the seventh plague

Hits: 141

It's coming. ๐‚๐Ž๐•๐ˆ๐ƒ๐Ÿ๐Ÿ— Here are some words about it, with a caution. Pardon but I must inform.

๐‘ซ๐‘ถ๐‘ต'๐‘ป ๐‘ป๐‘จ๐‘ณ๐‘ฒ!!! STOP TALKING TO PEOPLE OR BEING AROUND PEOPLE WHO TALK.
๐‘ท๐‘ผ๐‘ป ๐‘ซ๐‘ถ๐‘พ๐‘ต ๐’€๐‘ถ๐‘ผ๐‘น ๐‘บ๐‘พ๐‘ถ๐‘น๐‘ซ...people die by the sword.

๐„๐ณ๐ž๐ค๐ข๐ž๐ฅ ๐Ÿ‘๐Ÿ“:7-9 7 Thus will I make mount Seir most desolate, and ๐’„๐’–๐’• ๐’๐’‡๐’‡ ๐’‡๐’“๐’๐’Ž ๐’Š๐’• ๐’‰๐’Š๐’Ž ๐’•๐’‰๐’‚๐’• ๐’‘๐’‚๐’”๐’”๐’†๐’•๐’‰ ๐’๐’–๐’• ๐’‚๐’๐’… ๐’‰๐’Š๐’Ž ๐’•๐’‰๐’‚๐’• ๐’“๐’†๐’•๐’–๐’“๐’๐’†๐’•๐’‰ [๐’’๐’–๐’‚๐’“๐’‚๐’๐’•๐’Š๐’๐’†].

8 And I will fill his mountains with his slain men: in thy hills, and in thy valleys, and in all thy rivers, shall they fall ๐ญ๐ก๐š๐ญ ๐š๐ซ๐ž ๐ฌ๐ฅ๐š๐ข๐ง ๐ฐ๐ข๐ญ๐ก ๐ญ๐ก๐ž ๐ฌ๐ฐ๐จ๐ซ๐.

9 I will make thee perpetual desolations, and thy cities shall not return: and ๐ฒ๐ž ๐ฌ๐ก๐š๐ฅ๐ฅ ๐ค๐ง๐จ๐ฐ ๐ญ๐ก๐š๐ญ ๐ˆ ๐š๐ฆ ๐ญ๐ก๐ž ๐‹๐จ๐ซ๐.

Ezekiel 34

Hits: 30

Do you see the power of the Almighty? As the seventh angel poured out the seventh plague. Totally apocalyptic!
– 666

https://www.biblegateway.com/audio/mclean/niv/Ezek.34

๐‘ป๐’‰๐’† ๐‘ณ๐’๐’“๐’… ๐‘พ๐’Š๐’๐’ ๐‘ฉ๐’† ๐‘ฐ๐’”๐’“๐’‚๐’†๐’โ€™๐’” ๐‘บ๐’‰๐’†๐’‘๐’‰๐’†๐’“๐’…

๐‘ฌ๐’›๐’†๐’Œ๐’Š๐’†๐’ 34 The word of the Lord came to me: 2 โ€œSon of man, prophesy against the shepherds of Israel; prophesy and say to them: โ€˜This is what the Sovereign Lord says: Woe to you shepherds of Israel who only take care of yourselves! Should not shepherds take care of the flock? 3 You eat the curds, clothe yourselves with the wool and slaughter the choice animals, but you do not take care of the flock. 4 You have not strengthened the weak or healed the sick or bound up the injured. You have not brought back the strays or searched for the lost. You have ruled them harshly and brutally. 5 So they were scattered because there was no shepherd, and when they were scattered they became food for all the wild animals. 6 My sheep wandered over all the mountains and on every high hill. They were scattered over the whole earth, and no one searched or looked for them.

7 โ€œโ€˜Therefore, you shepherds, hear the word of the Lord: 8 As surely as I live, declares the Sovereign Lord, because my flock lacks a shepherd and so has been plundered and has become food for all the wild animals, and because my shepherds did not search for my flock but cared for themselves rather than for my flock, 9 therefore, you shepherds, hear the word of the Lord: 10 This is what the Sovereign Lord says: I am against the shepherds and will hold them accountable for my flock. I will remove them from tending the flock so that the shepherds can no longer feed themselves. I will rescue my flock from their mouths, and it will no longer be food for them.

11 โ€œโ€˜For this is what the Sovereign Lord says: I myself will search for my sheep and look after them. 12 As a shepherd looks after his scattered flock when he is with them, so will I look after my sheep. I will rescue them from all the places where they were scattered on a day of clouds and darkness. 13 I will bring them out from the nations and gather them from the countries, and I will bring them into their own land. I will pasture them on the mountains of Israel, in the ravines and in all the settlements in the land. 14 I will tend them in a good pasture, and the mountain heights of Israel will be their grazing land. There they will lie down in good grazing land, and there they will feed in a rich pasture on the mountains of Israel. 15 I myself will tend my sheep and have them lie down, declares the Sovereign Lord. 16 I will search for the lost and bring back the strays. I will bind up the injured and strengthen the weak, but the sleek and the strong I will destroy. I will shepherd the flock with justice.

17 โ€œโ€˜As for you, my flock, this is what the Sovereign Lord says: I will judge between one sheep and another, and between rams and goats. 18 Is it not enough for you to feed on the good pasture? Must you also trample the rest of your pasture with your feet? Is it not enough for you to drink clear water? Must you also muddy the rest with your feet? 19 Must my flock feed on what you have trampled and drink what you have muddied with your feet?

20 โ€œโ€˜Therefore this is what the Sovereign Lord says to them: See, I myself will judge between the fat sheep and the lean sheep. 21 Because you shove with flank and shoulder, butting all the weak sheep with your horns until you have driven them away, 22 I will save my flock, and they will no longer be plundered. I will judge between one sheep and another. 23 I will place over them one shepherd, my servant David, and he will tend them; he will tend them and be their shepherd. 24 I the Lord will be their God, and my servant David will be prince among them. I the Lord have spoken.

25 โ€œโ€˜I will make a covenant of peace with them and rid the land of savage beasts so that they may live in the wilderness and sleep in the forests in safety. 26 I will make them and the places surrounding my hill a blessing.[a] I will send down showers in season; there will be showers of blessing. 27 The trees will yield their fruit and the ground will yield its crops; the people will be secure in their land. They will know that I am the Lord, when I break the bars of their yoke and rescue them from the hands of those who enslaved them. 28 They will no longer be plundered by the nations, nor will wild animals devour them. They will live in safety, and no one will make them afraid. 29 I will provide for them a land renowned for its crops, and they will no longer be victims of famine in the land or bear the scorn of the nations. 30 Then they will know that I, the Lord their God, am with them and that they, the Israelites, are my people, declares the Sovereign Lord. 31 You are my sheep, the sheep of my pasture, and I am your God, declares the Sovereign Lord.โ€™โ€

https://www.newsobserver.com/news/local/article241055751.html

NSA Advisory (TLSI)

Hits: 139

Now this release of a NSA Advisory on TLS encrypted channels, with inspection enabled, has some interesting information.

[TLSI (aka TLS break and inspect) is the process through which enterprises can inspect encrypted traffic with the help of a dedicated product such as a proxy device, a firewall, intrusion detection or prevention systems (IDS/IPS) ๐™ฉ๐™๐™–๐™ฉ ๐™˜๐™–๐™ฃ ๐™™๐™š๐™˜๐™ง๐™ฎ๐™ฅ๐™ฉ ๐™–๐™ฃ๐™™ ๐™ง๐™š-๐™š๐™ฃ๐™˜๐™ง๐™ฎ๐™ฅ๐™ฉ ๐™ฉ๐™ง๐™–๐™›๐™›๐™ž๐™˜ ๐™š๐™ฃ๐™˜๐™ง๐™ฎ๐™ฅ๐™ฉ๐™š๐™™ ๐™ฌ๐™ž๐™ฉ๐™ ๐™๐™‡๐™Ž.]

DOH! They can already monitor traffic, with compromised certificates.

[While some enterprises use this technique for monitoring potential threats such as data exfiltration, active command and control (C2) communication channels, or malware delivery via encrypted traffic, this will also introduce risks.]

C2 malware delivered over encrypted channels? YIKES!

https://www.bleepingcomputer.com/news/security/nsa-publishes-advisory-addressing-encrypted-traffic-inspection-risks/#.XdSmulZOing.facebook

China has started ranking citizens…just like Callisto House’s plans

Hits: 100

Well now, if you have read my About page [1], you will see that my proposal is practically identical to China’s social scoring system they are testing. Here are my old business plans [2][3], I call their Social Score, building Esteem or Reputation. Awesome! The adjustments are my trick or treats, blessings or curses. We have fundamentally different ways of tricking or treating, anarchy is my solution the most spread, decentralized networks, every individual can give blessings and curses to each other!

Every individual has sovereignty over their conduct. Go Hong Kong!

[1] About – http://callistohouse.club/index.php/about/
[2] CallistoHouse Biz Plan – https://www.dropbox.com/s/vs1wsz6v8qqtdvf/CallistoHouse%20Business%20Plan%20v9.pdf?dl=0
[3] Homeless Council Biz Plan – https://www.dropbox.com/s/b1zjj4k12u5tlpv/RabbitPhone%2BBusiness%2BPlan.pdf?dl=0

https://www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4

Thoughts of the great internet/DOJ war over the right to privacy during data-in-motion encryption

Hits: 65

With the coming ability, in ParrotTalk, to detect initiation of encrypted connection negotiations, among many different protocols, along with the introduction of a redirect message, allows for implementation of a superb encrypted negotiation traffic analyzer. With connection control at the locally scoped naming services, the host domain of internal networks can be searched, managed & monitored.

a) No weakening encryption for the purposes of personal security.

We do not accept either the addition of back-doors or ghost protocols requiring group encryption negotiation, in order to eavesdrop in data-in-motion encryption, as it would result in the weakening of the encryption.

b) public security is limited to network traffffic analysis

We do allow that such a negotiation traffic analyzer, mentioned above, and monitoring of who is communicating with whom is of some value and acceptable state monitoring, by those authorized to monitor the local domain context.

It is the network authority‘s right to information to search & monitor this activity.

PAPAS – Redesigning ParrotTalk as an Automated Protocol Analyzer & Selector…

Hits: 861

Through the AgentMap (config), a list of supported protocolNames are specified. In construction of the SessionProtocolSelector, a ProtocolSelectorRegistration with the SessionOperationโ€™s subclass for that protocolName is installed into the Selector. A call and answer ProtocolState is installed into the Selectorโ€™s compiled stateMap, within the expectCall and expectAnswer states. As well, the protocol is installed as a selectable protocol through protocolOffered & protocolAccepted messages for explicit ParrotTalk protocol negotiation. The result is installation of the selected protocol sessionOperations into the subjectStack accomplished through either negotiation or the initial sending of initial call/answer message headers.

The last is possible due to ASN1 structure definitions which construct the appropriate header class from the DER encoding. So the appropriate header will be distinguishable between different protocol versions. As such, within the version history of ParrotTalk headers, due to the frame specification of ParrotTalk, each protocol can be determined & will setup the stack with that protocolโ€™s sessionOperations, starting in the correct initial state to reprocess the frame that resulted in that protocolโ€™s installation, so the rendezvous will proceed, for that version of the protocol.

Thought has been given to the other area of discrimination, which is the FrameBuffer. That includes an assumption about frame specification and is currently only supporting ParrotTalk frames. With full implementations of SSL (TLS v1.2) [1] and SSH [2], with its required Telnet [3] package, initially ported onto ParrotTalk’s [4] framework, in Squeakโ€™s Cryptography project, a FrameAnalyzer may be able to be defined to automatically detect frame specifications for a given incoming frame and choose non-ParrotTalk frames and the associated SessionOperations.

From the package comment for ParrotTalk-rww.31 :::

I ported initial attempts to subclass an important stateMachine, from
each of SSL and SSH, to be rooted at ParrotTalk’s SessionOperations.
More work is needed, including defining active frameSpecifications that can detect appropriate frames for these new Protocols, in a new
FrameAnalyzer, to be used by the new SessionProtocolSelector. I
renamed the ParrotTalk SessionOperations. The current hierarchy of
SessionOperations as follows:

SessionOperations…
– ParrotTalkSessionOperations_v3_8
– ParrotTalkSessionOperations_v3_7
– ParrotTalkSessionOperations_v3_6
– SSLHandshakeStateMachine
– SSHTransportHandshakeStateMachine

and hence distinguish Protocol SessionOperations subclasses :::

  • ParrotTalkSessionOperations_v3_8
  • ParrotTalkSessionOperations_v3_7
  • ParrotTalkSessionOperations_v3_6
  • SSL_TLS_1_2
  • SSL_TLS_v1_3
  • SSH
  • Signal

That would be a powerful capability.

In thinking further about the current state of affairs, it would be a powerful addition to define a SignalSessionOperations and detect&read Signal [5] frames/messages.

For Squeak/Pharo…

[1] SSL – http://www.squeaksource.com/Cryptography/SSL-rww.20.mcz
[2] SSH – http://www.squeaksource.com/Cryptography/SSH-rww.13.mcz
[3] Telnet – http://www.squeaksource.com/Cryptography/Telnet-rww.105.mcz
[4] ParrotTalk – http://www.squeaksource.com/Cryptography/ParrotTalk-rww.31.mcz
[5] libsignal-protocol-java – https://github.com/signalapp/libsignal-protocol-java

Browse Oceanside or Cryptography, for latest developments.

The logic behind ParrotTalk

Hits: 142

Problem Space

Per the recent C4ISR Conference (https://c4isrconf.com/) the problem is how to link thousands of connections in a military communications network, that needs reliable, simple encryption? [1][2][3][4][5] Foremost in mind is the requirement that this be integrated and operational in Combined Arms, Joint and Coalition contexts. When the concept of identity is baked into the protocol, we loose an ability to evolve solutions. So part of the problem is adaptability and a design that supports experimentation. We need a layered solution that can be modified in Cyber time-frames.

To meet these needs a standard & extensible framework for encrypted communications is absolutely necessary. I would introduce ParrotTalk as an inviting solution.


ParrotTalk as a solution

ParrotTalk is a minimal protocol for establishing a secured link between two computers. It allows for user-defined cipher and encoder. It exchanges Diffie-Hellman parameters with 2048-bit primes/generator to determine the shared key. It uses 2048-bit RSA Public/Private keys only for the purpose of signing the message traffic for Authentication, avoiding issues with RSA Certificate encryption which has been shown to be vulnerable. There are no Certificates, so there is no Certificate Management. It meets the minimal, capable requirements to establish an encrypted connection. Small in scope, wide in applicability.

We deferred the issue of identity verification to a software management layer above the secure connections. This provides a pathway to evolution and experimentation in identity management. The result of this decision implies various things about the encryption layer. It should be the simplest, most-minimal protocol negotiation that can be achieved. It should have the flexibility to specify cipher and encoding.

It must have the ability to encrypt end-to-end, between users (automated or actual). This implies the requirement to have double encryption: a capability to encrypt between computers and also encrypt a layer above over a route of links of computer connections. So we can manage routing, as well as deal with NATs and firewalls protecting internal networks. That would require a naming service and a coordinated bridging service, to bridge links. So we need a doubly layered encryption mechanism. With naming we need an identity solution.

However, the capability to negotiate a second higher layer encryption is missing in ParrotTalk, though the pieces to do so are there. As ParrotTalk was designed carefully to offer building blocks of a componentized, composable, reconfigurable manufacturing design nature, such a second layer of encryption can be realized with this framework. The existence of a naming service and a bridging service are absent. The identity is not present.

View 3 message specification for ParrotTalk-v3.7 Protocol.
Browse the Java code for ParrotTalk.
Browse the Squeak/Pharo code for ParrotTalk.

Given the shortcomings, more development is needed to meet all the objectives in the Problem Space. However, what exists is a simply designed, highly adjustable protocol that could fill the need to have an encryption standard across countries, branches and units. It is flexible enough to sustain evolutionary requirements. It may be able to support TLS-v1.2 and SSH. With such a capability it is an obvious framework for doing automated encrypted traffic analysis.

[1] If the Army doesnโ€™t get the network right, is everything else a wasted effort?

[2] The Army wants a singular focus, not one-off solutions

[3] Can the Army innovate on a traditional budget?

[4] The Navy and the need for interoperability in the fleet

[5] Army cannot rely on the cloud at the end of the spectrum