This guide describes an indirect way to mine Bitcoins at home. You’ll need to understand how to edit a batch file and run it in the folder with a program you’ll also download.
It’s become unrealistic to discover Bitcoins before specialized ASIC miners find them, so to get around this problem you can mine Litecoin-derived coins and automatically exchange them for Bitcoins. You’ll need a newish gaming computer in order to use this method. A cheap Walmart laptop will not suffice, nor will a low-end office or home desktop. You’ll need an OpenCL or CUDA capable video card (GPU).
First (Read more…)
I signed up for KickStarter and didn’t even end up using it. Because I was lazy/human, I used a password I’d used on some other websites when creating my account there.
Kickstart hacked, personal info obtained.
So now I’ve had to go to a bunch of other websites and change the password I used on KickStarter to something else, in case the account thieves manage to brute-force solve the encrypted passwords they got from KickStarter.
Was I smart and used a unique password for each of the sites potentially affected? I’m human.
Someone recently asked me (okay, multiple people did) where to start to learn about getting Bitcoins? You can start here at my blog, now. A better place to look will be at one of the links below in my 15 minute introduction. Don’t put off learning, it’s the Napster of the financial world, it will change how we do banking, like Napster changed how we get and share music.
You could download the bitcoin.org client first. It’s an easy install, it’s where I began, but stalled out… 2 years ago. What’s easier I think is getting a wallet at (Read more…)
How can you tell a spy is lying to Parliament? Their lips are moving. Or at least I’d assume they were moving while he was telling us that they didn’t conduct mass spying on Canadians, while also defending illegal mass “meta-data” spying on us.
MT @CBCAlerts "#CSIS says they don't have authority to engage in 'mass surveillance' of Canadians" — That's what makes it a crime. #Snowden— John Klein (@JohnKleinRegina) February 03, 2014
UPDATED: PM adviser defends metadata collection by spy agency. Watch live + follow our blog fw.to/woiZpwC #cdnpoli #hw #csec #csis— CBC Politics (Read more…)
I spent Saturday opening up an Acer Travelmate 7730 and got the logicboard out to confirm the power jack is pushed in. The pin at the back is clearly curved and it probably should be straight down. Without removing the heatsink, it appears not possible to clamp it back into a more appropriate position so the centre pin provides power from the adapter plugging in.
Sunday, I fixed/worked-around a G60 HP wireless problem where the orange light stays on, but either/both removing the power/battery and holding the power button for a minute. I didn’t put the battery back in, and (Read more…)
A recent article on Gizmodo shows off some previously unseen (or perhaps just forgotten) footage of a young Steve Jobs unveiling the Macintosh computer, back on January 30, 1984. Thirty years ago, this week. Seems like forever ago. But I remember it, and reasonably well. I remember where I was living then, what I was […]
Saskatoon is a beautiful city, so don’t let these photos fool you. Every city has a few shiners here and there. “There”, in this case, is downtown. This is the Holiday Inn Supermax Prison. Don’t worry, it only looks like a prison from the outside. You can leave, unlike the more picturesque Hotel California.
Here’s one of the more beautiful parkades with a cell phone tower behind it.
It’s January, and the snow has retreated into puddles due to the unseasonal temperatures, but the gang activity hasn’t retreated.
The people of Saskatoon are friendly, and will accommodate you whether you’re (Read more…)
I am a sincere devotee of Evernote. I use it constantly, every day. So when it crashed on me and the local copy of the database was corrupted, my life really sucked. Evernote can detect a damaged database. And it duly offered me a shot at recovering it. But every time it tried, the application crashed.
Suspended Senator Pamela Wallin should soon be in more hot water, along with the corrupt Conservative Party for which she was apparently fundraising for while traveling on the taxpayer’s dime.
More problems for Pam Wallin? RCMP computer forensics find new daily calendar. bit.ly/K5XEfr #skpoli #cdnpoli— Murray Mandryk (@MMandryk) January 16, 2014
She’s under investigation for fraud and breach of trust.
The November document noted Deloitte had looked at three versions of Wallin’s electronic Microsoft Outlook calendar from January 2009 to September 2012 and observed more than 500 changes.
Wallin had told Deloitte she added some items to her (Read more…)
I recently reinstalled Windows XP SP2 on a Dell Vostro laptop, and Windows Update wouldn’t work. I knew malware wasn’t the cause, it’s a bug in Microsoft’s Windows Update and how it refuses to interact with older Internet Explorer 6 or 7, and if you try to update to IE8, it hangs if you let the install file check for updates before installing the browser.
In summary: I had to update to IE8 without checking for updates at time of install, then manually apply IE8-WindowsXP-KB2898785-x86-ENU.exe and reboot, then it finally began updating automatically.
This is a clean install of (Read more…)
Long story short, a French iPhone 4 with an Orange.fr SIM that was apparently locked did not work after an update from Jailbroken 4.1 to Apple iOS 7.0.4. To fix it I installed a Rogers SIM that wasnt active, then iTunes would activate the iPhone again so it could be used as an iPod Touch.
I cut the Rogers SIM down to be a micro SIM using a template found on the Internet.
The Orange SIM could be put back in the iPhone after that point. It wasn’t providing service in Canada before or after anyway.
German leader flat out states that Obama’s government is little better than the East German Stasi.
“In an angry exchange with Barack Obama, Angela Merkel has compared the snooping practices of the US with those of the Stasi, the ubiquitous and all-powerful secret police of the communist dictatorship in East Germany, where she grew up.
The German chancellor also told the US president that America’s National Security Agency cannot be trusted because of the volume of material it had allowed to leak to the whistleblower Edward Snowden, according to the New York Times.
Livid after learning from Der Spiegel magazine (Read more…)
Tragic fire from space.
Check out Mars in great detail.
More link dumping: -Teach your kid how to share.
An excellent list of free programs, and ones you cannot trust. Opt out of PRISM. Join your friends in a prism-break. -Send messages encrypted “OTR”.
-Journalism’s slide into working for the man.
-Why Peace is Possible. An actually amazing video about a new way to think of peace. Paul K Chappell is worth learning from.
Andrew Prescott got instructions from Jenni Byrne to avoid Elections Canada until she could consult a lawyer. Prescott’s work on the Guelph Conservative campaign in 2011 earned him notoriety for having a computer used also by Pierre Poutine. Some would conclude he’s at the very least met Poutine, but has managed to dodge being compelled to testify in court as to that. Poutine at the very least managed to pick the same robocall company Prescott used to make legitimate robocalls for the Conservative CPC campaign.
A list of some of the witnesses, one or two proved liars by Sona’s travel (Read more…)
On Friday I was invited to talk about blogging, on Regina’s community radio station CJTR. The show was Human Rights Radio by Jim and Gord, and we spent the hour going over what a blog is, why it’s useful to have one, and how it could be used to promote human rights. You can give a listen to it!
The second half of the show is on YouTube too, if you want to look at the ceiling for most of it:
Also, if you’re in Saskatchewan, check out the “Get Active with Amnesty” 2013 conference. I was a guest speaker (Read more…)
I noticed another person with a CIBC 2-factor authentication fob on their key chain last week. It displays a seemingly random number that actually only a special server knows, so if a password is stolen, so too must the fob containing the random number code that changes every minute. Without both the password, and the fob, a thief is unable to log into a stolen account.
Passwords make the Web work, so we can have ‘our’ stuff, and keep unwanted and very unwelcome people from viewing it and changing our own information. So a title like “Kill the Password: (Read more…)
With the Robocalls trial under way, some newer information is becoming public. That’s no thanks to the judge who has imposed a partial publication ban on investigative documents.
One person with a legitimate account to make robocalls at RackNine, was Andrew Prescott. On Thursday he wrote me to bring to my attention a new detail other than Rogers’ IP mistake brought up in court. Apparently Matt Meier of RackNine made an error initially in linking Prescott’s RackNine robocall account to a proxy server in Saskatchewan. The same proxy server was used by Pierre Poutine to order illegal robocalls for Guelph’s (Read more…)
Last night I fixed a Vista laptop (It wouldn’t finish booting into Windows normally because I’d installed another hard drive, and ran ClamAV which possibly changed a file it was depending on after I removed the other hard drive. I ran startup repair, and then the system restore option, and that fixed it, easily.) This evening I noticed an old barcode scanner that Dad got in some online deal, and it never worked. It had DRM built into it, and wouldn’t read barcodes as plain text as they should be. Instead it encrypted the text and relied upon decryption (Read more…)
I was thinking of getting a BLE sticker for my bike to be able to track it remotely if it was stolen, but Tile might work much better. It’ll create a lost&found spy network to make theft of property much more challenging for idiots who still try stealing tracking devices like iPhones these days.
Thoughts on #TileApp? Genius in its simplicity. Frightening in its stalkability. thetileapp.com— Marc with a C (@p0stmarc) August 20, 2013
@packetwire @JohnKleinRegina @BikeRegina Just checked…very cool and very useful for just about everything in my life!— Regina Police (@reginapolice) August 21, 2013
MPs should quickly pass legislation to encourage the widespread adoption of self-driving cars, because an increasing number of MPs can not drive themselves properly. They are Drivers From Hill.
“Conservative minister Maxime Bernier was arrested Sunday in the county [sic], while driving the vehicle of his wife without holding a valid license, which forced the immediate towing.” Maxime Bernier, PC, MP is a Canadian politician currently serving as the Minister of State for Small Business and Tourism in the cabinet of Prime Minister Stephen Harper.
Years ago, this was written about Bernier:
But for those seeking a revolution in (Read more…)
Strong congressional oversight means asking direct questions & getting straight answers. 1.usa.gov/1a0EIY3— Ron Wyden (@RonWyden) June 11, 2013
Encrypt your shit:
Spooky reading after #Snowden: Julian #Assange's call to take up arms against the surveillance state | Cypherpunks cryptome.org/2012/12/assang…— WikiLeaks (@wikileaks) June 11, 2013
The world is not sliding, but galloping into a new transnational dystopia. This development has not been properly recognized outside of national security circles. It has been hidden by secrecy, complexity and scale. The internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator (Read more…)
Technology and civil liberty experts knew PRISM was a very real possibility. I knew, and wrote about it last August. The National Security Agency (NSA) (star bad guy org. in the Will Smith movie Enemy of the State) has been collecting domestic Americans’ phone and Internet records since at least 2007. This activity is a clear violation of the American Constitution, and was overseen by Bush II, Obama, Al Franken, and other high level leaders who’ve betrayed the trust of Americans and broken the law.
A WARNING: The U.S. is undergoing a "calamitous collapse in the rule of (Read more…)
The Verizon phone taps, to Yahoo, Google, Skype, and more all owned by the US Government. These were things suspected by many (thanks to WikiLeaks), and now confirmed by the intentional whistle-blowing leak from the NSA. The man who told on his criminally misbehaving government? A 29 year old who didn’t want to live in such a fake society that says it’s all about protection of civil liberty, while violating that trust as a fact of daily business.
«Good Guy Edward Snowden» seems to be already a meme. He’s a hero. #istandwithedwardsnowden http://t.co/MIMLHF32LC— Frederic Jacobs (@FredericJacobs) June 09, (Read more…)
Mayrand has come out to say finally that the Conservatives are not cooperating with the investigation into the robocall election fraud of 2011. I do not find this surprising, and if you’ve been reading my blog the past year, you’d know that’s because the evidence points to the Conservative Party as being involved in the election fraud, as Elections Canada suspected even prior to the May 2, 2011 vote.
The most damning evidence implicating the Conservatives, is that their secure, access controlled, database CIMS was most likely the system used to create the illegal robocall phone lists.
Some (Read more…)
Stephen Taylor was confused this morning. If he read my blog instead of dismissing me as a bother, he wouldn’t be so confused. He thought the Federal Court Robocalls judgement was saying that no Conservative could have been involved, because the judge had said he’d seen no evidence suggesting that. I can’t factually explain why the judge couldn’t make the logical inference that a secure database controlled tightly by the CPC, could only be used by authorized and known individuals. The judge ruled CIMS was the database used for election fraud in 2011. It is not a leap to conclude (Read more…)