Digital Domain

"Fighting for the USER"
Digital Parsing


Whenever I saw an

 "injustice"

I would create

"unique things"

 to 

"Balance the Equation

with 

Research, Analysis, and Developments

Happy, Happy, Joy, Joy

 :)


www.nefariousways.com

Lamentably...

As with most of my POC's, heutagogical R&D, TOADDs, or Tech,

 once I would see a calamitous or foreseeable (potential) abuse

in "real world" entanglement(s)...,

they were all abruptly

terminated

and

buried 

within the

"Ark of the Covenant" ...



(2015-2016)

Nefarious Ways  
was an algorithmic set of protocols
 on onion servers to specifically 
"brake the encryption chain..."
 which allowed her executables
 to find criminals and predatory pedophiles,
who cowardly hid behind the veil
 of encrypted apps and programs.

Unfortunately, 
our current set of
 "antiquated laws"
actually
 protect predatory pedophiles
 and criminals from persecution,
 NOT their victims 
or the innocent children.
:/


"NefariousWays
was just another one of my R&D projects,
which I did as a knee jerk reaction
 "to protect the innocent.'

But because of her inherent automated function(s)
and our current "antiquated laws,"
she was regrettably terminated
and now lives next to the 


 DDoS Attack

for

"Embedded Journalists

(2005-2013)


For over seven years

 I gave Journalists the ability to

 report and send Text and Images

 during civil unrest, from within blocked, restricted,

 or Geo-restricted areas or countries like:

 the Gaza Strip

Homs Syria

China,

 Turkey

etc.

all by simply using

"Frequency Jumping"-not reliant on WiFi/Cell

 and segmental modified LOIC & JS LOIC hack/techniques...


Noʻu ka hauʻoli   "

World! :)


Government(s), Military & Business
(1997-2016)

Custom Cipher(s)
Passive & Defensive Algorithms
Inter-disciplinary Algorithms
Rapid Biological Agent detection
Developmental Weapons design
Social Engineering & Reverses Hacking
Malware Frankenstein machine code
TLS and SSL encryption & Cracking


"Web Armory"

(circa 2010-2012)


       

   It was in initially a "POC" - proof-of-concept that combined software and hardware (portable encrypted USB) to enforce "Secure Transfer Protocols" on a computer's network, connected servers, and to evade MITM over the internet (which was severely lacking in browsing between 2000-2014) and later employed testing fingerprinting protocols to validate websites and secure privacy while transferring digital data over the internet (2008-2014).


   After a few years, I made a "Tijuana water-downed" version which I loaded onto a Military grade Secure Key FIPS 140-2 Level 3 Validated 256-bit Encryption USB, that also contained a simple UI (User Interface), and placed it on Kickstarter as

"Web Armory 2.0"

(circa 2013-2014)


" Noʻu ka hauʻoli "

World! :)


Cinema & Commercial Art  
(1994-2016)
Handmade/Prototype Servo Controllers
Custom/Prototype PCB
Pixel Pushing
3D Scripting and Modeling 
Runtimes files and modifications  
Dynamic Models, Texture, Meshes & OBJ 
Maya & Blender applications
Python scripting
Pre-Animatics scripting, development, collaboration
Subsurface Illumination & Scatter Algorithm(s)

I used existing technology
to make future concepts into reality, now. :)

Handmade/Prototype PCBs boards (2013)
eOS Raspberry Pi or mobile USB (2012-2016) 
 Frankenstein machine code (2000-2014)
Software, and apps (2002-2015)

Science & Industry
(1997-2016)

Algorithmic Source Coding
Global marketplace optimization
Source database scripting 
SEO coding and programming
Identity Theft, Discovery, Tracking & Recovery 
Forensic Computer Data Analysis
Internet Security Service & Hack Proofing
Reverse Engineering to source IP:
   Virus, Trojans, Worms, Phishing, DDos,
 E-mails,  Malware, Hacks, scams, etc., 
Global marking research data tracking programs
Binary Hacks Bit programs


Non-stop Developing & Programming
Dissecting Spiders &
 automated hidden software
(2011-2014)
  To optimize client end potential or maximize vulnerability, as to expose character traits/flaws to code, fix or render harmless.... 
for freedom from exploitation
or digital manipulation.

Old School PDF Internet 
Help Files
( circa 2000-2012 )


Free Internet
(1997-2016)

Encrypted USBs
.
.
for Embedded Journalists
.
Encrypted WiFi's
(licensed)
.
BlackHole eOS - Private
.
- Arm Yourself -



"The Pirate Bay song..."
Was and still is
Funny!
lol :)

Share by: