9 Comments
User's avatar
Frank's avatar

Woohoo! Hello there Mr Jax! Oh and you too Ms Rachel😁 thank you both for another informative show. I never had a doubt President Putin wouldn't fall for their Bull Shit cease fire plan. 😂🤣😂

Expand full comment
Scott Huereña's avatar

Love to see Jax 👏🏽

Expand full comment
gusman's avatar

heis in a postionof strengh

Expand full comment
cor97's avatar

How can I actually get the read outs from the russian ministries? What are suitable VPN's for accessing russian websites.

Expand full comment
gusman's avatar

tor

Expand full comment
gusman's avatar

tor. i have this its acuuly a us navy setupi f the nuclsubsare hacked. itbounces off diferentsrvers all over the world. 'un hackable??

Expand full comment
BhodiLi's avatar

There is no such thing as unhackable.

In fact, the more you attempt to obfuscate your online presence and utilize “secure” methods of communicating, the bigger the spotlight you put on yourself. So unless you have the support of a government, are an elite level hacker/phreaker/nere-do-well, or an honest human rights campaigner or the very rare honest journalist… don't bother.

Best to just use common sense and don't say or transmit anything that can be used against you. If you want a form of mostly secure communication, speak in person or write a letter.

If you are really into the paranoid life, you can try to go for a few months without using any online identities connected to your real identity, this is really hard for most people born after 1980, which I was not. Perhaps make a bunch of truly anonymous accounts and use task isolation. If you can manage that, try to use a phone without a SIM, maybe buy a standalone portable WiFi hotspot device for a de-googled phone or laptop that you have purchased with cash or cryptocurrency, never with a credit card. Make sure the hotspot itself has a cellular modem but is dumber, less traceable and OS backdoored, than a cell phone.. or just use coffee shop WiFi over VPN (old school) or some other obfuscation technology for more advanced folks.

Just as the exit nodes of Tor were compromised and like so many other things in life, there is no such thing as perfect security, and usability, or something being unhackable. Not even if you are a state actor.

Where there is a will and sufficient resources, compute power and armies of offensive security personnel, there is a way to break most encryption that normal people can employ.

BTW, most government dragnet their populations on a regular basis, collection and analysis of myriad data traffic for flagged searches or interactions, so if you start making too many of the wrong type of inquiries, specifically around hacking and hiding, you again will only bring attention onto yourself.

Expand full comment
Benoit Cloquet's avatar

Quite interesting. Small detail though: Minsk I & II were peace agreements, something very different than a cease fire plan.

Still, in both cases, it's of course fundamental both sides can make their demands. You don't get any cease fire or peace agreement if you try to only impose your own demands...

(of course, the better your position is, ...)

Expand full comment
gusman's avatar

whywould he giveupnow? he has themon thebackfoot

Expand full comment