Monday, April 30, 2018

Shinedown - "THE HUMAN RADIO" (Official Video)

flight path point-and-click software download...suicide drones

This is Harpy, the "suicide drone" of the israeli! On his nose it has a PETN charge of 15 kilos ; its deployed inside enemy territory for activating the enemies radars. When he detects he send information to the base station, that lunches anti radiation missiles. Also equipped with radiation-seeker to sniff enemies radars, when it spots self destructs on the target. Because it only deploys the nose, it returns and its reusable.
welcome back to war! I have here a so called a FL2000 chip (selling on eBay, link on the comments) that...turn the radio FL2K-SDR working as a GSM base station (link on my blog) , illegal (  ) if you don't filter the frequency for lower than 125mgz, this means, if you can't acess open source for GPS maps offline, you can, have two men giving commands, on the target area
....warfare! welcome! another form to mislead their detection, (like I said, based on commercial broadcast stations) is to spread, over the range of our target...sorts of rocket engines. these are called , small RCS objects, meaning it mislead the radar cross section


Mostrar mais reações

...back to war! So what's their primary counter measure for UAV's detection? They detect the UAV's basically using commercial broadcast stations...not military ground base. To pass trough their passive radars , we need first to jam all commercial radios. What we need to establish is " users logged by HF Underground" "


welcome back to war! This is how Syria makes chemical attacks. While the US considers Iranian Ababil's UAV, made on workshops with very simple RF links super easy to jam ...the syrians give them shit to think about . One of the only alternative for us, is to pre program the GPS off line, drawing maps for the flight (where's the open source that acquared?) what you see on this drone (Ukrainian ) it has 8 bomblets of PETN. Until, this moment, to use radiological material, two questions remain...1) its not possible to be next to the UAV more than 35 minutes or we will be contaminate 2) on the other hand, to achieve dispersal...we need to know how to double the effect (I'll be there soon)
GostoMostrar mais reações

Sunday, April 29, 2018

welcome back to war! end of another weekend. So, talking about outage energy grid blackouts ...I can do it myself after all

:)

welcome back to war! Good morning...another day in paradise! Starting warfare with energy grid blackouts outage sabotage. As you see at the photo, the energy grid has stabilizers ( synchronizing torque) ...so I've been on the noise temperature for provoking the outage, but actually the wires are hard shed ...(yeah...kind of obvious...) so next big idea, is a powerful 500Kv permanent magnet synchronous generator...because this babe, will mix the polarity...for sale in China.

Mostrar mais reações

Saturday, April 28, 2018

this is so F' complex...why did I choose computing today? ok, started by markov chain time reversible...then...surf, surf, the solving of the equation...is just add a row, like Q1=0 , let me putted like this...you're confusing the confusion of lineal algebra  then...surf, surf, surf...calibration , forget oscillators..you have the decoder, so...use this
Manufacturer of Electromagnetic Vibrator Controllers - Digital Vibrator Controller DVC 05, Vibrator Controller VC 72/ L, Digital Frequency Controller DFC 05 and Vibrator Controller for Vibratory Feeders -VC1500/VC800 offered by Maitry Instruments & Control, Surat, Gujarat

welcome back to war! another day in paradise! ...boolean tribe, get a look at this code ...and particularly " The weights of their machines are different, as they are randomly initialized. If they could synchronize the weights of their machines (without transferring the actual weights, of course) they could then use those weights as a cryptographic key for the rest of their communication. The following algorithm is used to synchronize the weight matrices of Bob's and Alice's machines:.."

Neural Key Exchange using Tree Parity Machine in Python
Python
Latest commit d6ace8e on 24 Jan 2016

 README.md

neuralkey

Neural Key Exchange using Tree Parity Machine in Python
Hi! This is an implementaion of the Neural Key Exchange Protocol in python written with simplicity, understandability and code readability in mind. Suiltable for academic and researh purposes. The code is documented line by line, so lets get straight to theory.

Diffie–Hellman key exchange
If Alice and Bob wish to communicate with each other by exchanging encrypted messages, each of them should be able to decrypt the messages received from the other. And to do so, they have to exchange the keys with which the messages will be encrypted, and should be carefull not to let Eve get hold of the keys, or else she too would be able to decrypt the messages. So a secure protocol should be used for exchanging the keys, or else nosy Eve would be able to read all of Bob's and Alice's messages. Neural or not, the most used protocol for key exchange between two parties A and B is the Diffie-Hellman protocol. Diffie–Hellman Key Exchange establishes a shared secret between two parties that can be used for secret communication for exchanging data over a public network. The following conceptual diagram illustrates the general idea of the key exchange by using colors instead of very large numbers:
Diffe-Hellman

Neural Key Exchange Protocol
The Diffe-Hellman protocol can be implemented using a neural neural network with a single hidden layer (also called a tree parity machine). The number neurons in the hidden layer is denoted as K and the number of input neurons per hidden neuron is denoted as N. There is a weight matrix W between the input and hidden layers of dimensions KxN and the range of each weight is {-L, ..., -2, -1, 0, 1, 2, ..., +L} where L is a parameter of the tree.
tpm
Both Bob and Alice posses tree parity machines with same set of parameters (KN and L). The weights of their machines are different, as they are randomly initialized. If they could synchronize the weights of their machines (without transferring the actual weights, ofcourse) they could then use those weights as a cryptographic key for the rest of their communication. The following algorithm is used to synchronize the weight matrices of Bob's and Alice's machines:
algorith
For a given random input vector x (of dimensions [K,N]), the output (tau) of a tree parity machine is computed as follows:
eqn1
eqn2
eqn2
eqn3
eqn4
And if the outputs of both Alice's and Bob's machines are equal, their weights are update using any of the following rules:
  • Hebbian rule:
hebbian
  • Anti-hebbian rule:
anti-hebbian
  • Random-walk:
random-walk

The Code

The code is heavily documented. It consists of 4 files, machine.py, which defines a tree parity machine, update_rules.py, which contains functions for all the three update rules, run.py which simple creates 2 machines with default parameters and try to sync them and eve.py which is similar to run.py, except that nosy Eve will be trying to sync her machine with Alice's and Bob's. Will she get what she wants?
Installation
sudo git clone http://www.github.com/farizrahman4u/neuralkey.git
cd neuralkey/neuralkey
python run.py
python eve.py
Requirements
TODO
  • Simulate Eve and man in the middle attack
  • Improve visualization

#Bye!!