DISCLAIMER: PLEASE USE IN GOOD FAITH AND AT YOUR OWN RISK! ELDRITCHDATA cannot warranty the expressions and suggestions of the contents, as well as its accuracy. In addition, to the extent permitted by the law, ELDRITCHDATA shall not be responsible for any losses and/or damages due to the usage of the information on our website. By using ELDRITCHDATA.NEOCITIES.ORG, you hereby consent to our disclaimer and agree to its terms. The links contained on ELDRITCHDATA.NEOCITIES.ORG may lead to external sites, which are provided for convenience only. Any information or statements that appeared in these sites are not sponsored, endorsed, or otherwise approved by ELDRITCHDATA. For these external sites, ELDRITCHDATA cannot be held liable for the availability of, or the content located on or through it. Plus, any losses or damages occurred from using these contents or the internet generally
       _,met$$$$$gg.         PC:Thinkpad X240
    ,g$$$$$$$$$$$$$$$P.      DE: GNOME
  ,g$$P"     """Y$$.".       WM: MUTTER
 ,$$P'              `$$$.    WM THEME: Adwaita
',$$P       ,ggs.     `$$b:  THEME: Adwaita-dark [GTK2/3]
`d$$'     ,$P"'   .    $$$   ICONS: Adwaita [GTK2/3]
 $$P      d$'     ,    $$P   TERMINAL: GNOME-TERMINAL
 $$:      $$.   -    ,d$$'   BROWSER: GNU-ICECAT / TOR-BROWSER
 $$;      Y$b._   _,d$P'     TE: GEANY
 Y$$.    `.`"Y$$$$P"'        
 `$$b      "-.__             
  `Y$$                       
   `Y$$.                     
     `$$b.                   
       `Y$$b.                
          `"Y$b._            
              `"""           
 
         
EMAIL: ELDRITCHDATA@TUTA.IO GPG 61A5 4814 A1B0 38FA 2CF1 3039 A3A1 E6E0 F6D0 8834  
XMPP: ELDA@YAX.IM | 40B2A542 328533DA 26BB98AF 603D6B24 6EA2BDA6 2944A5D9 C483CFA7 C3B54A4C | 13A8EA5F AC926F76 7AB38F8D 82CD486C 08771BE3 9327F2AA C3B51043 5C200410 
COLOR TEMPLATE:
        Solarized Dark  
PERSONALITY TESTS:
        INTJ-A 
        SimilarMinds  
POLITIC TESTS:
        6 Triangles 
        8 Values 
        Left Values 
        Political Compass 
        PolitiScales 
        Right Values 
        Sapply Values 
        Statecraft Compass 
         
PRONOUNS: Elohe / Elohim 
RELIGION:
        EatenFirst  
 
PUBLISHED | UPDATED | TITLE 
2019-01-01 | 2023-01-13 | JOURNAL  
 
COMPLETE GUIDE FOR THE PARANOID USER 
2022-02-02 | 2022-02-03 | Additional Linux Hardening  
2019-12-21 | 2022-02-03 | An Introduction To BIOS And BIOS Security  
2019-11-15 | 2022-02-03 | An Introduction To Doxing Methodology  
2020-04-26 | 2022-02-03 | An Introduction To GNU/Linux  
2022-02-25 | 2022-02-25 | An Introduction To Ham Radio  
2020-01-20 | 2022-02-03 | An Introduction To OSINT  
2021-01-08 | 2022-02-03 | An Introduction To PGP  
2020-12-16 | 2022-02-03 | An Introduction To The Internet  
2019-11-15 | 2022-02-03 | Common Utility Keys  
2019-11-15 | 2022-03-04 | EDC  
2019-12-21 | 2022-02-03 | Hardware Security  
2020-12-16 | 2022-02-03 | Home Phone And Landline Security  
2020-12-16 | 2022-02-03 | Home Security  
2019-11-15 | 2022-02-03 | How To Disappear  
2021-07-19 | 2022-02-03 | Living Off Grid  
2019-12-21 | 2022-02-03 | OPSEC And Personal Security  
2021-01-14 | 2022-02-03 | Path To Pentester  
2020-01-20 | 2022-02-03 | Persistent USB  
2019-11-15 | 2022-02-03 | Remove Your Fingerprints  
2019-12-21 | 2022-02-03 | Risk Management And The Attack Kill Chain  
2019-11-15 | 2022-02-03 | Self Defense  
2020-12-16 | 2022-02-03 | Stylometry  
2021-11-26 | 2022-02-03 | Tor Threat Modeling  
 
COMPARISON OF SERVICES 
2022-01-07 | 2022-02-17 | Comparison Of Emails  
2022-01-21 | 2022-02-17 | Comparison Of Web Browsers  
 
DO IT YOURSELF 
2021-10-01 | 2022-02-17 | Black Powder  
2021-10-03 | 2022-02-17 | Chloroform  
2021-12-08 | 2022-02-17 | Make A Smokehouse  
2021-07-15 | 2022-02-17 | Making A Budget  
2021-10-18 | 2022-02-17 | Making A Still  
2021-08-09 | 2022-02-17 | Plarn  
2021-09-27 | 2022-02-17 | Soap  
2022-12-08 | 2022-12-08 | Terracotta Heater  
2021-10-04 | 2022-02-17 | Wine  
 
GNU 
2020-01-20 | 2022-02-17 | Arguments Against Ricing  
2021-01-14 | 2022-02-17 | Debian Repository  
2019-11-15 | 2022-02-17 | Defense Of RMS  
2019-11-15 | 2022-02-17 | Distro List  
2021-01-14 | 2022-02-17 | GNU Games  
2022-01-19 | 2022-02-17 | KDE And Advertisements  
2020-01-20 | 2022-02-17 | RE:Freetardism  
 
LIST 
2020-01-20 | 2022-02-17 | Anime List  
2021-06-08 | 2022-02-17 | Book List  
2021-07-27 | 2022-02-17 | Dell Timeline  
2019-11-15 | 2022-02-17 | Grocery List  
2020-01-20 | 2022-02-17 | Movie List  
2020-01-20 | 2022-02-17 | Music List  
2019-11-15 | 2022-02-17 | Thinkpad Timeline  
 
MISC 
2020-01-20 | 2022-02-17 | Anarchism Schools Of Thought  
2021-06-09 | 2022-02-17 | A Primer To Green Anarchism  
2019-11-15 | 2022-02-17 | Digest Of Deduction  
2021-08-23 | 2022-02-17 | Enuma Elish  
2021-10-26 | 2022-02-17 | Happy Birthday Patriot Act  
2021-06-29 | 2022-02-17 | NSA ANT  
2020-01-20 | 2022-02-17 | OCPD  
2020-01-20 | 2022-02-17 | Political Party Problem  
2022-01-22 | 2022-02-17 | Positive Nihilism  
2020-03-10 | 2022-02-17 | Projekt Melody  
2021-08-23 | 2022-02-17 | The Eridu Genesis  
2021-08-27 | 2022-02-17 | The Tale Of Spyware Chat  
2022-02-04 | 2022-02-17 | Vaporwave - A Different Kind Of Cyberpunk  
2019-11-15 | 2022-02-17 | Workout Routine  
 
MTG 
2022-06-28 | 2023-01-13 | M-SqueakyJiki  
2022-09-15 | 2023-01-13 | M-TronBuddies  
2022-06-28 | 2022-10-17 | P-Elves  
2022-10-29 | 2022-10-29 | P-Tron  
 
OUT 
2022-02-28 | 2022-03-04 | Basic Survival Shelters  
2021-07-15 | 2022-02-17 | Firearms Buyers Guide  
2022-02-28 | 2022-02-28 | Gunsmith  
2021-12-08 | 2022-02-17 | Hardtack  
2022-02-25 | 2022-02-25 | Homemade MRE  
2022-02-25 | 2022-02-25 | Medicinal Plants  
2022-05-06 | 2022-05-06 | My Basic Camping Gear  
2019-11-15 | 2022-02-17 | Poisonous Plants  
2022-02-27 | 2022-02-27 | Rainwater Collection System  
2022-02-28 | 2022-02-28 | Reloading  
2021-12-07 | 2022-02-17 | Self Feeding Fire  
2021-08-28 | 2022-02-17 | The Old Ones Tobacco  
2021-08-31 | 2022-02-17 | Tobacco Pipes I Own  
2022-02-25 | 2022-02-25 | Types Of Campfire  
 
STORY 
2019-11-15 | 2022-02-17 | Offline  
2019-11-15 | 2022-02-17 | Serial Cult  
2019-11-15 | 2022-02-17 | Session 1  
2019-11-15 | 2022-02-17 | Techno Paganism  
 
COMPUTER SECURITY 
 AForensicExaminationOfWebBrowserPrivacyModes.pdf  
 Anonymity.pdf  
 AnonymousSecurityHandbook.pdf  
 BebopToTheBooleanBoogie.pdf  
 CompSecIncidentHandling.pdf  
 COPInfoSecManagement.pdf  
 Crypto101.pdf  
 CyberThreatsToMobilePhones.pdf  
 CryptoParty.pdf  
 HackingTheFuture.pdf  
 HashCrackPasswordCrackingManual.pdf  
 HugoCornwallTheHackersHandbook.pdf  
 ISOIEC270012013.pdf  
 KaliLinux.pdf  
 KaliLinuxForAdvancedPenetrationTesting.pdf  
 KaliLinuxWirelessPenetrationTestingBeginnersGuide2015.pdf  
 OReillyNetworkWarrior.pdf  
 PrivacyForIdentities.pdf  
 RE4B.pdf  
 RedTeamFieldManual.pdf  
 SecAndCounterSurveillance.pdf  
 SecManagmentSystemsReq.pdf  
 SecuringOnlinePersonas.pdf  
 TheHackerPlaybook.pdf  
 TheHackerPlaybook2.pdf  
 TheHitchhikersGuideToOnlineAnonymity.pdf  
 TheSecretOfSafePrivacy2016.pdf  
 TorAndTheDarkArtOfAnonymity.pdf  
 WebBrowserPrivacyWhatDoBrowsersSayWhenTheyPhoneHome.pdf  
 
LOCK PICKING 
 BnE.pdf  
 BurglarAlarms.pdf  
 CIALockPicking.pdf  
 CompleteGuideToLockpicking.pdf  
 Handcuffs.pdf  
 KeyBlanks.pdf  
 Keys.pdf  
 LSIGuide.pdf  
 MakingLockTools.pdf  
 OptDecode.pdf  
 Padlocks.pdf  
 PracticalLockpicking.pdf  
 SafecrackingComputerScientist.pdf  
 SecretsOfLockPicking.pdf  
 TechniquesOfSafecracking.pdf  
 ThisKeyIsYourKey.pdf  
 UsingALockPickGun.pdf  
 
SOCIAL ENGINEERING 
 ColdReading.pdf  
 GovernmentAttic.pdf  
 HowToReadAPersonLikeABook.pdf  
 TLBBS.pdf  
 
THE RAINBOW SERIES 
 5200-28-STD-Orange.txt  
 CSC-STD-002-85-Green.txt  
 CSC-STD-003-85-LightYellow.txt  
 CSC-STD-004-85-Yellow.txt  
 NCSC-TG-001-Tan.txt  
 NCSC-TG-002-BrightBlue.txt  
 NCSC-TG-003-NeonOrange.txt  
 NCSC-TG-004-TealGreen.txt  
 NCSC-TG-005-Red.txt  
 NCSC-TG-006-Amber.txt  
 NCSC-TG-007-Burgundy.pdf  
 NCSC-TG-008-DarkLavender.txt  
 NCSC-TG-009-VeniceBlue.pdf  
 NCSC-TG-010-Aqua.pdf  
 NCSC-TG-011-Red.html  
 NCSC-TG-013-Pink.pdf  
 NCSC-TG-013-V2-Pink.pdf  
 NCSC-TG-014-Purple.txt  
 NCSC-TG-015-Brown.txt  
 NCSC-TG-016-YellowGreen.html  
 NCSC-TG-017-LightBlue.html  
 NCSC-TG-018-LightBlue.html  
 NCSC-TG-019-Blue.txt  
 NCSC-TG-020-A-GreySilver.html  
 NCSC-TG-020-Silver.pdf  
 NCSC-TG-021-Purple.html  
 NCSC-TG-022-Yellow.html  
 NCSC-TG-023-BrightOrange.pdf  
 NCSC-TG-024-V1-Purple.pdf  
 NCSC-TG-024-V2-Purple.pdf  
 NCSC-TG-024-V3-Purple.pdf  
 NCSC-TG-025-ForrestGreen.html  
 NCSC-TG-026-HotPeach.pdf  
 NCSC-TG-027-Turquoise.html  
 NCSC-TG-028-Violet.pdf  
 NCSC-TG-029-Blue.pdf  
 NCSC-TG-029-LightPink.html  
 
UNSORTED 
 100WaysToDissappear.pdf  
 AndroidPrivacyReport.pdf  
 ArrestProofYourself.pdf  
 ASimpleApproximationToTheEloChessRatingsFormula.pdf  
 BeatingTheFBI.pdf  
 CathedralBazaar.pdf  
 GOV-USCOURTS-NYSD-564903-152-01.pdf  
 GuideToBuildingACopperCoilAlcoholHeater.pdf  
 HowToFixAbsolutelyAnythingAHomeownersGuide.pdf  
 HowToSpotASpook.pdf  
 ImprovisedMunitionsHandbook.pdf  
 MichaelBazzellExtremePrivacy2020.pdf  
 IndustrialSocietyAndItsFuture.pdf  
 NoveltyOfAnOverloadedTransformer.pdf  
 PatriotAct.pdf  
 PracticalGunsmithing.pdf  
 SICP-TheWizardBook.pdf  
 SSN.pdf  
 TheAnarchistCookbook.pdf  
 TheCompleteManualOfPirateRadio.pdf  
 TheCompleteVisualGuideToBuildingAHouse.pdf  
 TheDiaboliconMichaelAquino.pdf  
 TheEncyclopediaOfAncientAndForbiddenKnowledge.pdf  
 TheEncyclopediaOfWitchesWitchcraftAndWicca.pdf  
 TheLostWays.pdf  
 ThePreparatoryManualOfExplosives.pdf  
 ThePrepperSurvivalBible.pdf  
 TheSurvivalDoctorsCompleteHandbookWhatToDoWhenHelpIsNotOnTheWay.pdf  
 UncleFesterSecretsOfMethamphetamineManufacture8thED.pdf  
 WithoutATrace.pdf  
 
UNSORTED HTML 
 xplunder.html  
 
INFOGRAPHICS 
BLUF.png CartridgeTrap.jpg CupricThermiteFirebomb.jpg DIYThermite.jpg HomemadeAntipersonel.jpg HomemadeMolotovCocktails.png HomeSuppressor.jpg MorseCodeVisualGuide.jpg PartOfIED.jpg PhoneticAlphabet.jpg SanPedroMescaline.jpg SmokeGrenade.jpg TacHandSigns.png TrenchBunk.jpg WaterBleachRatio.jpg  
Awesome 
Awesome Open Source Awesome Hacking Awesome Info-Sec Awesome Web Security Awesome Social Engineering Awesome Cellular Hacking  
Wordlist Collections 
1337z/wordlists abdilahrf/FavHash c4b3rw0lf/wordlist-collection chanmratekoko/Awesome-Myanmar-Wordlists-Dictionary-Collection ChongPang19419/wordlists-for-something kennyn510/wpa2-wordlists kkrypt0nn/Wordlists ohmybahgosh/RockYou2021.txt Weakpass  
OTHER SITES: Interesting Reads and Sources 
2FA Directory Archive Heemeyer Tapes Army Field Manuals cheatsheetseries.owasp.org Covert Instruments Ctrl+Pew Defcad Firearms Distro Watch Firefox Profile Maker No Systemd Scambaiting Tools Snopyta  
Anti-National Copypasta 
动态网自由门 天安門 天安门 法輪功 李洪志 Free Tibet 六四天安門事件 The Tiananmen Square protests of 1989 天安門大屠殺 The Tiananmen Square Massacre 反右派鬥爭 The Anti-Rightist Struggle 大躍進政策 The Great Leap Forward 文化大革命 The Great Proletarian Cultural Revolution 人權 Human Rights 民運 Democratization 自由 Freedom 獨立 Independence 多黨制 Multi-party system 台灣 臺灣 Taiwan Formosa 中華民國 Republic of China 西藏 土伯特 唐古特 Tibet 達賴喇嘛 Dalai Lama 法輪功 Falun Dafa 新疆維吾爾自治區 The Xinjiang Uyghur Autonomous Region 諾貝爾和平獎 Nobel Peace Prize 劉暁波 Liu Xiaobo 民主 言論 思想 反共 反革命 抗議 運動 騷亂 暴亂 騷擾 擾亂 抗暴 平反 維權 示威游行 李洪志 法輪大法 大法弟子 強制斷種 強制堕胎 民族淨化 人體實驗 肅清 胡耀邦 趙紫陽 魏京生 王丹 還政於民 和平演變 激流中國 北京之春 大紀元時報 九評論共産黨 獨裁 專制 壓制 統一 監視 鎮壓 迫害 侵略 掠奪 破壞 拷問 屠殺 活摘器官 誘拐 買賣人口 遊進 走私 毒品 賣淫 春畫 賭博 六合彩 天安門 天安门 法輪功 李洪志 Winnie the Pooh 劉曉波动态网自由门
War on Terror Patriot Act PRISM Edward Snowden Guantanamo Bay CIA black sites Human Rights NSA mass surveillance Warrantless Wiretapping 4th Amendment violations Julian Assange whistle-blower manhunt Ecuadorian embassy refuge Corporate interests worker's rights healthcare rights free education Police militarization incarceration rate fake weapons of mass destruction Petrodollar warfare Israel "special" relationship ban on boycott Free Palestine USS Liberty attack Mossad cover up false anti-semitism accusations depleted uranium mutinions war crime ignoring the Geneva Convention Agent Orange My Lai Massacre Contras 1973 Chile coup CIA backing puppet dictators Illegal Occupation 1954 Guatemalan coup d'état United Fruit Company Cuban Missile Crisis Bay of Pigs Operation Northwoods Area51 Saudi lobby American Cover-Up of Trials of Unit 731 Abu Ghraib torture and prisoner abuse MKUltra Tuskegee syphilis experiment Suspension of Habeas Corpus Sedition Acts civil rights Martin Luther King murder Cointelpro Bombing of Libya Bombing of Yemen Bombing of Syria Intervention in Yugoslavia Philippine Genocide of 1900 Choctaw Trail of Tears Andrew Jackson illegal Overthrow of the Kingdom of Hawaii haole invasion Okinawa rapes Jarhead rapists migrant caravan ICE children in cages Russian puppet president
Free Palestine שחררו את פלסטין US-Israeli Collusion קנוניה אמריקאית-ישראלית Julian Assange ג'וליאן אסאנג ' The Five Eyes חמש עיניים Moazzam Begg מועם בג Iran Air Flight 655 איראן טיסה אווירית 655 NSA Spying Scandal שערורייה Johnny Garrett ג'וני גארט PRISM פריזמה Idefinite Detention מעצר בלתי מוגבל Shaker Aamer שאכר Guantanamo Bay מפרץ גואנטנמו Shooting of Philando Castile ירי של פילנדו קסטיליה Safiq Rasool שליח עליז Tuskegee syphilis experiment ניסוי טוסקגיי עגבת Child Hormone Replacement Therapy With Penectomy טיפול הורמונלי של הילד עם טיפול בכריתת רחם Edward Snowdenל בכריתת רחם Edward Snowden
不名誉なプログラムシステムディー Delete Any Files CVE-2012-1174 コンピューターが破壊された 0-Day ゼロデイ Root Exploit CVE-2017-1000082 コンピュータを好きなように実行させます systemd-resolvd Remote Code Execution CVE-2017-15908 サービス拒否 Denial of Service CVE-2017-9217 バッファオーバーフロー Buffer Overflow CVE-2015-7510 CVE-2018-15688 Arbitrary State Insertion 状態注入 Root Privilege Elevation CVE-2018-15686 10.0 ルートアカウントの不適切なアクセス Root Privilege Elevation Again 特権の昇格 CVE-2020-13776 カーネルパニック Kernel Panic CVE-2019-6454 Arbitrary Code Execution 任意のコードの実行 CVE-2020-1712
フラットモニターが悪いOLED motion blur彼らはあなたに嘘をついています1ms GtG means 20ms現代のモニターは吸うDP2070SB 300cd2詐欺を監視するSample and hold menace企業の嘘RDF225WG AdobeRGB CRTモーションブラー2160p CRTs表面伝導型電子放出素子ディスプレイSurface-conduction electron-emitter displayネイティブシャープネスでの任意の解像度Any resolution at native sharpnessリフレッシュレートはうそですVMP454 420hz CRT液晶ディスプレイは吸うDLSS a solution to a problem CRTs did not have背の高いアスペクト比の方が優れていますGDM-FW900 16:10私は液晶ディスプレイが嫌いですMonitors don't whineモニターは泣き言を言わないSelf-emissive放出性IPS hazeヘイズLCDs still look worse than Trinitronsトリニトロンベスト$3000 Eizo IPS glow無限のコントラストCRT infinite contrastサンプリングして保持する360hz LCD looks worse than 60hz CRT視野角Viewing anglesななひら大好き
 
THE SACRED CHANT 
What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called "Linux", and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called "Linux" distributions are really distributions of GNU/Linux. - Richard Stallman
 
I AM MAD AS HELL 
I don’t have to tell you things are bad. Everybody knows things are bad. It’s a depression. Everybody’s out of work or scared of losing their job. The dollar buys a nickel’s worth. Banks are going bust. Shopkeepers keep a gun under the counter. Punks are running wild in the street and there’s nobody anywhere who seems to know what to do, and there’s no end to it. We know the air is unfit to breathe and our food is unfit to eat, and we sit watching our TVs while some local newscaster tells us that today we had fifteen homicides and sixty-three violent crimes, as if that’s the way it’s supposed to be.
We know things are bad – worse than bad. They’re crazy. It’s like everything everywhere is going crazy, so we don’t go out anymore. We sit in the house, and slowly the world we are living in is getting smaller, and all we say is: ‘Please, at least leave us alone in our living rooms. Let me have my toaster and my TV and my steel-belted radials and I won’t say anything. Just leave us alone.’
Well, I’m not gonna leave you alone. I want you to get MAD! I don’t want you to protest. I don’t want you to riot – I don’t want you to write to your congressman, because I wouldn’t know what to tell you to write. I don’t know what to do about the depression and the inflation and the Russians and the crime in the street. All I know is that first you’ve got to get mad. (shouting) You’ve got to say: ‘I’m a human being, god-dammit! My life has value!’
So, I want you to get up now. I want all of you to get up out of your chairs. I want you to get up right now and go to the window. Open it, and stick your head out, and yell: ‘I’m as mad as hell, and I’m not gonna take this anymore!’
I want you to get up right now. Sit up. Go to your windows. Open them and stick your head out and yell – ‘I’m as mad as hell and I’m not gonna take this anymore!’ Things have got to change. But first, you’ve gotta get mad!… You’ve got to say, ‘I’m as mad as hell, and I’m not gonna take this anymore!’ Then we’ll figure out what to do about the depression and the inflation and the oil crisis. But first, get up out of your chairs, open the window, stick your head out, and yell, and say it: ‘I’m as mad as hell, and I’m not gonna take this anymore!’ - Howard Beale, Network
 
HELL IS OTHER PEOPLE 
All those eyes intent on me. Devouring me. What? Only two of you? I thought there were more; many more. So this is hell. I’d never have believed it. You remember all we were told about the torture-chambers, the fire and brimstone, the “burning marl.” Old wives’ tales! There’s no need for red-hot pokers. HELL IS OTHER PEOPLE! - Joseph Garcin, No Exit
 
Terry Davis 
I live in kind of an old environment. I just...I go to dentists and doctors, my parents go to dentists and doctors. That's all we do. We watch TV, they go to the casino. I've been fighting...to bring it to fruition. But I'm in some kind of prison or something. So basically now I just kinda kill time. But I'm God's High Priest, so there's nothing better to do with your time than kill time with Mr. God and enjoy divine intellect all day long.
I think teeth are the first reminder of mortality. I think that's where it begins to hit ya. Cus they don't come back and that's it.
What’s reality? I don’t know. When my bird was looking at my computer monitor I thought, ‘That bird has no idea what he’s looking at.’ And yet what does the bird do? Does he panic? No, he can’t really panic, he just does the best he can. Is he able to live in a world where he’s so ignorant? Well, he doesn’t really have a choice. The bird is okay even though he doesn’t understand the world. You’re that bird looking at the monitor, and you’re thinking to yourself, ‘I can figure this out.’ Maybe you have some bird ideas. Maybe that’s the best you can do.
The most powerful statement in the C language in the C language is the switch statement [...] The CIA wants you to think it's nothing more than IF-THEN-ELSE. The CIA wants you to think it's the same as IF-ELSE; it's not. The way a switch statement works is there's a lookup table in it. What it does is [that] it looks up in the table and then it jumps ahead to a segment of code, and then the code jumps to the bottom, to a common location, to continue.
The most important thing in programming is naming.
In TempleOS, my compiler will put together multiple characters in a character constant. We don't do Unicode. We do ASCII--8-bit ASCII, not 7-bit ASCII; 7-bit signed ASCII is retarded.
IRA is like the NRA, but for computers. The CIA wants all code in the cloud under their lock and key. They want to ban compilers and make people think HTML is computer programming.
Jesus said I will rebuild this temple in three days. I could make a compiler in 3 days.
If you guys have ideas for things to do, let me know. I probably will ignore them.
I report to God. You report to me.
Stallman, Linux could use an oracle program. Use a high speed timer as a stopwatch for nums to pick words or passages.
I wrote a fucken compiler. Linus has not finished his compiler yet and suffers humiliation from Stallman.
 
NRA SLOGANS 
Guns don’t kill people. It’s impossible to be killed by a gun. We are all invincible to bullets and it’s a miracle.
Guns don't kill people. We are all immortal souls living temporarily in shelters of earth and meat.
Guns don't kill people. People kill guns.
A list of things that can kill people:
Conceivably anything 
Not guns 
 
If you say guns kill people one more time, I will shoot you with a gun, and you will, coincidentally, die.
Guns don't kill people. Blood loss and organ damage do.
 
MISC QUOTES 
Be the eldritch deity you want to see in the world
Birth is a curse, and existence is a prison
In effect, we conjure the spirits of the computer with our spells
Minimize what you share; Minimize your attack surface; Minimize your identity
The internet is a cruel and horrible place
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.