Posted

Rules For Securing Your Own Email:

1. You can’t secure your email if you use a cloud email service except via the tools provided by the email service

2. Your router and your firewall are all you need to secure your own email server. This requires a simple understanding of how internet addressing works.

First, understand that a domain name has no real significance in addressing. All addressing boils down to an IP NUMBER and a PORT NUMBER. The ip number, v.w.x.y, is the equivalent of a building address. The port number, z, is the equivalent of an apartment number. The two are expressed together as v.w.x.y :z.

With respect to email, the port numbers 25 and 587 are used to send email. The port numbers 143 and 993 are used to retrieve email in an IMAP fashion as opposed to 110 and 995 in a POP fashion.

So how do I block out unwanted hackers or spammers. First, my ROUTER must block out all unused ports, ie, empty apartment numbers. But it has to let through all traffic to the ports in use, ie, ports 25 and 587. This is accomplished via PORT FORWARDING, which is a function in your router to direct traffic addressing a port to its ultimate computer program, ie, destination.

Secondly, I have to use the firewall to block out the ip numbers (addresses) of unwanted visitors trying to hack my computer. These are found by inspecting the email server log. The hackers become quite obvious in the log.

Oh, wondering about my ip address? It is the ip assigned to me by my internet service provider. The isp forwards all internet traffic calling out this ip address to my router which begins sorting out what ports go to what computers I have on my local network.

What is my local network? That’s everything I have wifi-ed or physically attached to my router. And how do ports get connected to programs? Once the router directs a specific port to a specific computer, the programs (apps) have to be told what ports to “LISTEN” to.

So what has domain naming got to do with anything? First, we have to know that a domain is a fancy word to identify the digital hardware and software resources belonging to a specific owner. So I have two main domains that are identified as trcooper.com and aaarrrg.com. These names get resolved (translated) into the ip addresses where they reside(hosted) by an INTERNET DOMAIN NAME SERVER (DNS) which is nothing more than a lookup service, like a phone book or 411.

So, getting back to the actual residency of my domains, the trcooper.com main domain is on the GoDaddy computers, whereas aaarrrg.com is on my home computer. These are where my websites reside.

But what about my email server? Where does it reside? This is where SUB-DOMAIN naming comes in. My email server resides on my home computer which is identified as a sub-domain of trcooper.com and identified as mail.trcooper.com. The dns server will direct all traffic calling out mail.trcooper.com to my home computer and not the GoDaddy computer. So it’s all like a company that has multiple addresses.

The only thing I have not covered is encryption which provides the ultimate security in digital communication. Another word that goes flying around is the word “protocol”. I find this word being so widely abused that it has almost lost its meaning. Basically, it is a predefined way in which two communicants can verify they are speaking to the right person. One of the first protocols was the “ack”- “nak” , acknowledge- no acknowledge. Different strokes for different folks. Ground control to major Tom. At the current time, it appears as though a protocol called TLS (transport layer security) is replacing SSL (secured socket layer) in two-way digital communications.

Author
Categories TECH

Posted

A. LINUX VS WINDOWS:

Linux and Windows have a great deal in common, except for the way they each address storage devices and their partitions. One must remember that a single storage device can have multiple partitions.
Windows uses a single drive letter to reference a device and a single specific partition within the device. The C: drive is really the main system partition, (not the hard drive itself), on the resident hard drive as most everyone knows. A perceived problem is what happens when you run out of letters. But then that is probably an unwarranted fear. It is highly unlikely to see a single Windows system with more than 26 partitions.
Linux, on the other hand, makes a distinction between device type, device letter, and partition number. So a specific device is identified by the combination of device type, such as “sd” for a removable flash drive, and a letter for the device.

Example: sda the “a” meaning flash drive 1 or mcd the “d” meaning media card 4. But it does not end there because any one of these devices could have multiple partitions. Therefore, a partition number is appended to the device.

Example: sda2 or mcd1. So we can see that Linux is not concerned with running out of drive letter like Windows. But who really cares?
It would not be fair to under-estimate Microsoft’s effort in providing program support for a wide variety of devices. No matter, it would seem Linux is all caught up in that regard.
In my view there are a couple of really big differences between the two. First, Linux can host multiple Windows systems very easily. I don’t know this to be true of Windows. Secondly, a full system backup is extremely important for the health and safety of any digital device.
For those who don’t know what a full system backup is, it is a recording on a separate storage area or device of everything on the digital device including operating system and user data. Google’s Android Cell Phone “FACTORY RESET” and Chromebook “POWER WASH” are examples of full system backups taken before any user system changes or data is introduced. The unfortunate thing about these factory backups is they do not include any changes a user may have made to the system after using the device or his user data. But Google does attempt to offer help in that regard by offering cloud services to dynamically backup any changes made by the user. No matter, this can all be done if the user has a pc which he can use to do his own backing up.
Getting back to our comparison, Linux has a very simple and efficient full system backup program called RESCUEZILLA that resides on a bootable flash drive. It can backup Windows as well as Linux in a very friendly user manner. It is the ease in which a full system backup is taken that makes Linux my favorite. Windows 10 relies upon Windows 7 System Backup which is integrated into the Windows system and far more cumbersome to use.
Aside from these differences, both Linux and Windows have a Line Command program, aka, a keyboard only textual user interface, and a Desktop Command program, aka, a mouse and keyboard graphical user interface. And both have a software libraries full of useful application programs, aka, “apps”.
The most confusing thing about Linux are the number of different “distributions” out there. Because Linux was developed freely by the open source community, a wide number of Linux “types” exist, all having different names like Ubuntu, Debian, Red Hat, Mint, etc . But regardless, they are all “FREE” and well maintained.
So obviously my preference is Linux over Windows. Here are a couple of facts about Linux you might find interesting.
1. It was derived from a Univac mainframe operating system called UNIX and adapted to micro computers.
2. Google’s Android & Chromebook systems are Linux based.
B. WHAT IS A “PORT”?

At this point it seems appropriate to say what a “port” is. Specifically, it is the means by which a router connects to & invokes a specific program on a specific computer. The router is connected to a single line in accessing the internet. That one line has to be broken up into multiple “ports” in order to allow the connection to multiple programs. The ports are numerically assigned and each having a specific target program on a specific target computer.

Ports 80 & 443 are reserved for accessing a website using a browser. Why two ports if one port alone is enough to handle two way traffic? Port 80 is for local (non-internet) unsecured access & port 443 is for remote (internet) secured internet access.

Ports 25 (for local unsecured access) & 587 (for remote secured access) are reserved for accessing a MTA (defined later) email server program.

Port 993 is for remote secured access to an email MDA/MUA imap (defined later) program. Port 21 is used for accessing an FTP File Transfer Program.

No doubt you have heard the phrase “port forwarding”. This is how a router designates which port goes to which computer that is connected to the router & listening to the specific port on the computer end. The computer is usually connected to the router via wifi or ethernet cable & identified by the router with a local network ip address . Each computer connected to the router has a unique ip address beginning with 192.168.?.?. In port forwarding, the router is told which ports to assign to which network ip addresses by a human called the “network administrator”.
C. THE COMPLEX OF PROGRAMS TO PROCESS EMAILS:

It should be noted that the sending and receiving of email requires a complex of three different program types:
MTA = Mail Transfer Agent = sending and receiving of email.
MDA = Mail Delivery Agent = intermediate access of received emails.
MUA = Mail User Agent = end user presentation of received email messages.
This is only because there are so many different programs out there serving the same purpose that they need to be categorized. I will be focused upon only the ones I have determined to be best.
D. THE MTA POSTFIX EMAIL HYBRID SERVER:

POSTFIX is an email HYBRID server composed of two parts called “daemons”. One part is the smtp “client” daemon. The second part is the smtpd “server daemon”. A “daemon” is a computer program meant to run all the time. And for clarity, “smtp” means “simple mail transfer protocol”. It should be noted that the two terms, “client” and “server”, pertain strictly to the relationship between non-human programs, not human users.

That POSTFIX is a hybrid server can cause confusion. To distinguish between human users, we might say the email sender is the “initiator” & the email receiver is the “recipient”. But for the non-human program relationship, sender/client emails are initiated by a smtp “client” daemon &destined to be received by a recipient’s smtpd “server” daemon which should not be confused with the recipient’s smtp “client” daemon.

To simply recap:
The human email “initiator” sends email using smtp “client”.
The human email “recipient” receives email using the smtpd “server”.
E. THE MTD COURIER-IMAP “INTERMEDIARY” PROGRAM:

This is one of many “intermediary” programs called upon by an MUA to access an email server mailbox remotely and present it in “imap” format, as opposed to” pop” format. DOVECOT is another prominent such MDA program.
F. THE MUA THUNDERBIRD “CLIENT” PROGRAM:

This program is used to transfer received emails from the COURIER-IMAP program to the user’s deviice & format them for human readability.
G. THE PHP SCRIPTING PROGRAM:

This program provides the ability to create text scripts which allows the combining of multiple operating system text line commands into one executable file. It might be said that all client & server programs require the use of PHP.
H. THE APACHE2 WEBSITE HOSTER/”SERVER” PROGRAM:

This program allows the definition of websites and ability to run them in response to a remote browser.
I. MYSQL DATABASE “SERVER”:

This program allows the permanent storage of multiple data-bases, each database serving a specific interest. A mysql data-base is a file of files.
J1. WORDPRESS BLOGGER “SERVER” PROGRAM:

This program implements the ability of a website to do blogging, ie, make posts to display online. Among other things, It provides a dashboard that enables the user to:
1) Configure the website info in SETTINGS/GENERAL
2) Select and edit various template in APPEARANCE/THEMES
3) Present and install various PLUGINS
4) Upload various pictures, videos & other media into a MEDIA LIBRARY.
5) DETAIL OF WORDPRESS SETUP
WORDPRESS 6.7.2 RELEASED FEB 2025.
A. PREMINARY SETUP
Run the WP-RESET plug-in to make sure all defaults are active.
To do so, you must have the WP-RESet plug-in installed & active.
Bring up the dashboard & Cleanup the dashboard header crap
by clicking on SCREEN OPTIONS on the right in the top line
of the dashboard. Just uncheck all the garbage selctions.
GO TO SETTINGS/GENERAL TO ESTABLISH TOP WHITE LINE TO APPEAR ON EACH POST.
Run the TOOLS / IMPORT / WORDPRESS-Run Importer
to bring in all your old posts from your .xml backup.
SUBSEQUENT FINDINGS: THE SWEDIST MODERN ART THEME WAS NOT RESTORES.
Impliment the TWENTY-TWENTY theme, WELLCOME TO THE MUSEUM OF SWEEDISH MODERN ART.
a. Go to APPEARANCE- & SELLECT THEMES.
Press the ADD button & search for “TWENTY TWENTY” theme.
Ignore all the other crap themes.
Click on the TWENTY-TWENTY thrme,
then scroll to the bottom & ACTIVATE it.
CLEANUP sticky post.
a. Go to ALL POSTS & click on STICKY to edit it.
Remove “UNDER CONSTRUCTION” if its there.
Uncheck any categories.
In body of post, correct links to categories.
Scroll down again & CUSTOMIZE THE THEME.
Cick on CUSTOMIZE box that appears at bottom of theme image
A selection box will open.
1) Begin with SITE-IDENTITY:
a) The first thing to do is upload and select a SITE-ID LOGO image
which is the pirate parrot. Go ahead an crop the image.
b) Next is the SITE-TITLE which ONLY SHOWS IN THE BROWSER ADDRESS BAR,
NOT ON THE POSTS.
c) 3rd is the TAG-LINE which could be used to show the SITE-TITLE.
d) 4th is the SITE-ICON which is another image like the SITE-LOGO
& appears ONLY SHOWS IN THE BROWSER ADDRESS BAR, NOT ON THE POSTS.
2) Skip “COLORS”.
3) SELECT “theme OPTIONS”.
a) Uncheck “SEARCH IN HEADER” & “SUMMARY” .
4) Skip “COVER TEMPLATE”.
5) Skip “BACKGROUND IMAGE”.
6) SELECT “MENUS”.
a) SELECT “CREATE A NEW MENU” to get a new mini screen that shows two sections:
1) IN THE TOP SECTION.
Give the menu a name and press ENTER which adds an ‘ADD-ITEMS” button
to the top section.
DO NOT USE MOUSE TO JUMP DOWN TO THE BOTTOM SECTION.
You MUST PRESS ENTER to get the “ADD-ITEMS’ button.
[a TO CREATE A NAV-LABLE CALLED “HOME” WITH A URL LINK:
Press the ” ADD ITEMS” button to open a mini screen extension
called “CUSTOM LINKS”.
In the mini-screen extension, SELECT “PAGES”.
CHECK MARK the nav lable called home “HOME” by clicking on it to activate it.
[1 In doing this, a new entry box is added to section 1, now showing:
[a] The menu REFERENCE NAME that you previously entered.
The NAV LABLE “HOME”, awaiting the entry of the link url.
[b] At this point DO NOT PRESS THE “ADD ITEMS” button again,
because it just toggles the mini-screen extension of and on again.
INSTEAD CLICK THE WORDS “CUSTOM LINK” in the NAV LABLE “HOME” to
get a drop-downn menu where you can enter the url to be transferred
to when the NAV-LABLE is pressed by the reader.
For “HOME”, make the url = https://aaarrrg.com/wordpress/#site-header
[b TO CREATE ANOTHER NAV-LABLE WITH A DIFFERENT URL:
Press the “ADD ITEMS” button.
CLICK the ” ADD ITEMS” button to open a mini screen extension
called “CUSTOM LINKS”.
ONLY THIS TIME SELECT “CUSTOM” INSTEAD OF PAGES.
2) In the BOTTOM SECTION;
CHECK-MARK “DESKTOP HORIZONTAL MENU” & “MOBILE MENU”.
BUT FOR STACKED MULTIPLE LINKS VERTICALLY,
CHECK MARK “DESKTOP EXPANDEDINSTEAD OF “DESKTOP HORIZONTAL”.
b) TO DELETE A MENU,
click on its entry in the 1st mini-screen,
Scroll down to very bottom & press “DELETE”.
DO NOT BOTHER TRYING TO DELETE INDIVIDUAL ENTRYS WITHIN A MENU.
JUST DELETE THE WHOLE MENU AND START OVER.
c) MENU CONCLUSIONS:
The above works, BUT FOR MULTIPLE LINKS VERTICALLY,
THERE ARE TWO MENU NAMES.
POSTS vs PAGES.
I am inclined to think a PAGE can contain a POST,
but not the other way around.
That said, page reside in fixxed locations,
where posts get put on a page.
Pages are good for sticking SITE-ID post in the front.
MAJOR WORDPRESS BUG
In ADMIN, viewing a post does not present the same as NON-ADMIN.

B. BEGIN CUSTOMIZATION CUSTOMIZE THE HEADER LINE. a. SELECT PAGES, and establish the LINE 1 white bar header. In first opening PAGES, you see FOUR DRAFTS, meaning they are not active. So dont worry about them. You want to create a new published page. So click ADD NEW PAGE. Whatever you type in a PAGE is suppose to show in very top line of all posts. This top line is WHITE and called the SITE-ID or HEADER line. Whatever you tpye will appear on the right & in red and in front of the SEARCH icon which is where my MENU used to be on the far right. The search icon can be removed in the next step. OTHER THAN A “.” IN THE TITLE to prevent a stupid error message from showing in red, THERE IS REALLY NO REASON TO ENTER ANY TEXT IN THE BODY OF THE PAGE. 4b. Whatever you type in a POST goes in the TITLE and BODY of the post & goes no further. Check the STICKY SITE ID POST by clicking on STICKY SITE-ID POST CATALOG SELECTION CHECK. Found that my previous solution to vertically stacking catagory selections (rather than having them spread horizontally across the header line) was not finding the categories. 1st FAILED ATTEMPT: In the STICKY SITE-ID POST, my self designed vertical category selection was screwed up. Tried to correct by going into CATEGORIES and reassigning CAT NUMBER in sequence sstarting with BREAKING… assigned to 50. Then went into sticky site-id post and html edited all the links assigning the same CAT-NUMBERS to the links. THIS FAILED. 2nd ATTEMPT SUCCEEDED: Discovered that reassigning CAT-NUMBERS meant nothing, becaause I found the system had effectively reassigned the CAT-NUMBERS in alphabetical sequence starting with “3”. THE BELOW DIAGRAM SHOWS THE PROGRESSION i WENT THROUGH TO FINALLY SOLVE THE PROBLEM. NOTE THAT I FFOUND 3 NEW CATEGORIES TO ADD TO THE CATEGORY SELECTION LIST IN THE SITE-ID POST: COMMON-SENSE CONSPIRACY & TECH. MY __________SYSTEM ASSIGNED CAT # OLD NEW | CATEGORY CAT CAT V
  1. #
    BREAKING CONST = 1 50 3
    CALL FOR ACTN 20 51 4
    CHEATING 10 52 5
    COMMON SENSE 6
    CONSPIRACY 7
    CORRUPTION 5 55 8
    ECON 15 9
    HAPPY 12 10
    HISTORY 8
    HYPOCRISY 14
    INJUSTICE 6
    NEGLIGENCE 7
    PERSECUTION 3
    PROPAGANDA 18
    SCIENCE 19
    SOLUTIONS 11
    STUPIDITY 4 66
    TECH
    TRUTH 68
    TREASON 16 69
    VIOLENCE 2 70
    6) Create new & view existing blogging POSTS.
    To use any of these, you must begin by signing in with a user-id and password.
    6) CREATING POSTS:
    To start a new post, go to the top of the dash board and press the + button & select “post”. This will invoke the GUTENBERG VISUAL or CLASSIC EDITOR, which ever you choose to use. Prefer the GUTENBERG VISUAL EDITOR.
    DEALING WITH LINE WRAP.
    Line wrap is not a problem using the editor. just continue your typing and the line will go to the nest line without problem.
    The editor will ask you to give a title to the post, done easily enough.
    And now we get to the body of the post, in which I normally break it up into section headings, within which I itemize details & indent the details.The body can:
    a) be just straight in line text like this with no indenting
    xxxxxxxxxxxxxxxxxl ine 1 xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    yyyyyyyyyyyyyyyyyy line 2 yyyyyyyyyyyyyyyyyyyyyyyyyyyy
    or
    b) contain unindented major sections called “paragraphs”, the 1st line of which is the “heading” line, with the subsequent itemized detail lines being numbered or bulleted & indented or not called “lists”, looking like this:
    xxxxxxxxxxx line 1 SECTION HEADING xxxxxxxxxxx
    yyyyyyyyyyy line 2 DETAIL LIST yyyyyyyyyyyyyy
    or number instead of dot depending on list type.
    It should be noted that further indentation within a list is possible using the indent button to create nested lists.This is explained here:

https://themeskills.com/create-nested-lists-wordpress/#google_vignette

At issue during this writing was finding the INDENT BUTTON. The CLASSIC EDITOR clearly shows all the tools in one fixed tool bar, BUT DOES NOT SHOW THE SAVE BUTTON UNLESS you go to the very bottom where is is called the UPDATE BUTTON. On the other hand the VISUAL EDITOR has all the stuff of the CLASSIC EDITOR, but presents the buttons only where they are needed. Of the two editors, the GUTENBERG editor has been proven to work as desired. The trick was in finding how to first create a MAJOR heading by 1st pressing the ever present + button & selecting “paragragh” followed by creating a “header”.
To make a MAJOR SECTION HEADING click the + in the POP-UP BLUE LINE (that appears when the cursor is hovering over a spaced line between text lines) & select “paragraph”. This will give a line to type-in the major heading.
Knowing the keyboard operation is key to understanding the operation required in creating indentation.
Keyboard actions impact list detail, not paragraphs or header:
Enter-Shift = single line advance
with no new list bullet.
Is continuation line within the current list.
Enter = creates a list bullet double double line advanced.
INDENT BUTTONS APPEAR.
Line can be indented or out-dented.
BkSp Delete = creeps into previous list bullet.
As an alternative to create FURTHER INDENTATIONS to a detail paragraph, go into the HTML EDITOR by clicking on the far right 3 dots in the FLOATING MENU & selecting ‘html editor”. This allows you enter html commands like
&   to provide further line feed/spacing & indenting. You can toggle back & forth between the visual & html editors.
This post you are reading is of the type expressed in b).
The paragraph “header” line in this paragraph of this post is
a major section headed called
J1. WORDPRESS BLOGGER “SERVER” PROGRAM:
Detail lines within this paragraph begin with an indented dot
& are identified as “lists”.

J2. HOW TO PRIVATIZE OR PASSWORD PROTECT A POST:
Using Visual Editor, before saving click SETTINGS ICON then click STATUS to get drop down selection window where you can choose private or publish/password protect.

J3. STICKY POST GOES TO THE TOP:
Only one post can be sticky. That one sticky post can include links to other posts within the system that may or may not be password protected. However if the linked to post is private, the post will not show.

Author
Categories TECH

Posted

CONCLUSIONS:
Since 1950 the government appears to obfuscate the census counts, failing to differentiate between citizen and non-citizen populations, thereby distorting each states allotted House representative count & elector count.

IT IS CLEAR THAT THE NUMBER OF REPRESENTATIVES FOR EACH SANCTUARY STATE IS BASED, NOT UPON THE COUNT OF CITIZENS AS REQUIRED BY THE CONSTITUTION, BUT A COUNT OF ALL RESIDENTS, NON CITIZEN AND CITIZEN ALIKE. AS A RESULT EACH STATES NUMBER OF ELECTORS & HOUSE OF REPRESENTATIVES IS ALSO OVER STATED

Author
Categories ELECTIONS

Posted

By now you have heard it said over and over again from Democrats.
“Trump and the right wing conservatives are the biggest threat to our democracy”.
BALONEY!
The Democratic Party has proven itself to be “the biggest threat to our democracy”.

In this article, we look at what the thinking has been behind our constitution & political development.
We look at census facts and electorate disruptions, followed by offering an online election system solution. And then we discuss what has evolved to become the biggest destruction of western values, all perpetrated by a political cult willing to do anything in order to maintain power.

A. SOVEREIGNTY.

WHAT IS SOVEREIGNTY?
As a very basic definition, “sovereignty” is the right to rule. The question then becomes, “The right to rule what?”. The most obvious answer is “the right to rule over the land and those people within it”. Sovereignty deals with a physical area and those within it . It is the partitioning of a fixed area. It is implemented in the global realm by dividing the world up into nations with further division occurring based upon area. As a result, we see sovereignty being broken down into states, then counties, then houses, then rooms, then individual people.

So we can see that sovereignty is the recognition of physical divisions and who is designated to be in control of those divisions. And it becomes even more complicated when sub-divisions are nested within overall divisions. When it comes to a specific sub-division within a division, we have to ask who has ultimate authority with regard to specific matters? Are there limits to a division’s ability to rule over its sub-divisions? Are there ways for a sub-division to control its overseeing division?
To answer these and other questions, we acknowledge the following premises.

PREMISE 1: That sovereignty is a “right” implies that there must be at least two people involved, a ruler and the ruled, called citizens. Sovereignty is granted from the citizens to the ruler based upon the ruler’s ability to protect the citizens. Hence, it becomes the ruler’s duty to protect the citizens. This gives rise to the ideas of “democracy” & “elections’.

PREMISE 2:
PHYSICAL BORDERS ARE NECESSARY FOR SOVEREIGNTY TO EXIST.
Borders define the extent of the ruler’s powers.
Without borders, sovereignty cannot be defined.
Borders include things like nations, states, counties, cities, homes, rooms, a person’s body.

PREMISE 3:
THE MORE GEOGRAPHICALLY INCLUSIVE THE GOVERNMENT, THE LESS POWER IT SHOULD HAVE.
The larger the sovereign domain, the more difficult it is to effectively rule over it, even if the alleged ruling body is more than one person. The more remote a controlling body is from a situation, the less informed it is and the less likely proper handling of the situation will occur. This makes it a necessity to delegate ruling powers to smaller sub-divisions which are more local to & better informed of the day-to-day occurrences within a specific area. This fact alone negates any idea of a global government being able to micro-manage every aspect of human life world-wide. It does not, however, negate the need for nations to act as one in controlling the spread of nuclear weapons.

In addition, the larger a government is, the more probable it is to fail in its duties to protect its subjects. In this event it becomes the duty of the lower sub-divisions to provide the protection.

PREMISE 4:
THE LAND HAS A VOTE IN THAT IT REPRESENTS A TEAM OF CITIZENS:
It is obvious that the more populated a geographic area, the greater the people’s power to influence their immediate geographic government. But to what extent should it have the power to influence a higher level of government that includes geography beyond its bounds & occupies a different culture? This is one reason for the Electoral College and why popular vote alone is unacceptable for high office. It assures diversity of both lands and cultures. National football winners are not chosen by which team acquired the highest cumulative score. Rather they are determined by how many other teams they beat.

B. FACTS:

1. ARTICLE 14 of the US CONSTITUTION:

SECTION 1 defines a “citizen” as one either born in the USA or naturalized.
Given today’s invasion by illegal migrants, this definition of “citizen” needs improvement.

SECTION 2 defines “state apportionment” as being based upon
the “numbers” of people in the state, excluding
“indians”. From this we can infer that only citizens
be counted in determining each state’s
representative count.

Several Amendments after Amendment 14 make it clear that only “citizens” may vote. But the question remains, what defines the citizenship of a newly born child, especially when the parents are of different nationalities and the child is born in a nation other than one of its parents? It would seem the logical answer would be that the child acquire the citizenship of its primary parent, ie, the parent who is in most contact with the child. Normally, it would be the mother. But there situations where the mother is not available.

2. ELECTORAL & CONGRESSIONAL APPORTIONMENT:

Each state automatically gets 2 electoral votes for its 2 senators plus its representative apportionment based on its percentage of the total population. This means there are 100 total electoral votes over and above the electoral votes based upon population, which makes it possible for a candidate to win the electoral votes while getting less than the popular vote.

Why is this so? The original Constitution was ratified by the states, each state being counted as a person. This continues to be recognized & serves as a protection for the lesser populated states from being dominated by the more populated states. Its only fair. Besides that, the states are the ones who can vote to amend or end the Constitution, since they are they original grantors.

As previously mentioned, each state should get additional electoral votes based upon its percentage of the total citizen population. And the number of representatives allotted to each state should equal its electoral vote. So the whole voting system is proportional and fair. .

Yet democrats are constantly heard complaining about the electoral college claiming it to be a “Threat to their democracy”. This is pure nonsense. They are GREEDY IDIOTS. First of all, our nation is not a “democracy”. It is a “republic”. Only more local areas like counties and cities can call themselves a “democracy”. States are “semi-democracies” because propositions are submitted directly to the electorate. But for that, states are also republics. Their idea of “democracy” is a primitive one that would utterly destroy the idea of a united states. If you are going to play identity politics correctly, then you better differentiate between citizens and non citizens and protect state sovereignty. Otherwise you don’t have a nation, you have a cesspool.

Citizens have a duty to protect each other from wrong, regardless of race, sex, color or creed. CITIZENSHIP IS THE ONLY THING THAT BRINGS US TOGETHER AS A NATION, NOT HUMANITY. Humanity will never bring the world together, because it is always mistreated one way or another. The humanity of today boils down to robbing from one to give to another. It is contrary to free voluntary gifting.

No matter, to democrats who are trying to dumb down US citizens by saying “Democracy is for all people where ever they are and regardless of citizenship”. So yes, citizenship is a threat to “their” primitive democracy. Why do you think the Biden DOJ/FBI seem to be harassing only US citizens and not illegals?

3. HISTORY OF US CENSUS SINCE 1950:

The last time the US census counted the number of US citizens was 1950 at which time there were 151 MILLION citizens of which 31% were children or roughly 51 MILLION children. In 1952, there were 66 MILLION voting citizens. Since 1950 the government appears to obfuscate the census counts, failing to differentiate between citizen and non-citizen populations, thereby distorting each states apportionment of House representative & elector count.

From 1960 onward. we have the following;
1960: 179 MILLION
1970: 203 MILLION
1980: 227 MILLION
1990: 249 MILLION
2000: 281 MILLION
2010: 308 MILLION

In order to determine the number of real citizens as distinct form the number of non-citizens without a distinct number being provided, the only way to approximate the number is via reverse computing. Given a) the total number of presumed citizen voters in a national election, b) the voter turnout, c) the total population, & d) the percentage that are children, it is possible to estimate the total number of citizens, x = a/b- 1/2(c*d) . But this is only a rough estimate & depends upon correctness of the numbers given by the government.

So, for the 2020 election we have:

Voted for Biden in 2020: 81 MILLION
Voted for Trump in 2020: 74 MILLION
a) Total number of adult citizen Votes: 155 MILLION

b) Voter turnout in 2020: 66.8%

Total number of adult citizen(?) voters:
155 / .668 = 232 MILLION ADULT CITIZENS

In 2020 the total 2020 population was:
c) & d) 331 MILLION of which 73 MILLION were minors.
Half of children estimated to be citizens: 36 MILLION

Total number of citizens including children in 2020:
232 + 36 = 268 MILLION CITIZENS

Total number of non citizens in 2020: 331 – 268 = 63 MILLION NON-CITIZENS

4. CONCLUSIONS:

Since 1950 the government appears to obfuscate the census counts, failing to differentiate between citizen and non-citizen populations, thereby distorting each states allotted House representative count & elector count. IT IS CLEAR THAT THE NUMBER OF REPRESENTATIVES FOR EACH SANCTUARY STATE IS BASED, NOT UPON THE COUNT OF CITIZENS AS REQUIRED BY THE CONSTITUTION, BUT A COUNT OF ALL RESIDENTS, NON CITIZEN AND CITIZEN ALIKE. AS A RESULT EACH STATES NUMBER OF ELECTORS & HOUSE OF REPRESENTATIVES IS ALSO OVER STATED

5. ABOUT THE BORDER

Over the years we have witness an increase in a mentality that is willing to blow itself up along with its perceived adversaries in an act of alleged justice. This makes it imperative that access to dangerous technology be highly guarded from falling into the wrong hands. This is the real problem facing humanity today. And we must not forget that fact.

Joe Biden appears to have forgotten that by allowing anybody and everybody into this country without proper vetting. In so doing, he has increased the probability of some nutjob acquiring access to dangerous technology.

Then there are those who say “Well, nuclear bomb technology has become so proliferated that it makes no difference what we do. So we might as well give up and let the nutjobs have their way.” WRONG. As long as there is one ounce of rationality left in the world, that glimmer of hope needs to be maintained.

One thing is for certain. To make “global warming” the central theme in global politics rather than protecting the world from nuclear proliferation is completely irresponsible. And what does DEI have to do with protecting the world? NOT ONE DAMN THING. DEI = Divisive Efforts and Injustice. It is interesting to note that DEI spelled backwards is IED, Improvised Explosive Device.

The RIGHT STRATEGY to defend against nuclear attacks from the air is Reagan’s STRATEGIC DEFENSE INITIATIVE. But to protect against nulear IED attacks, the border must be highly restricted with RBA, not open borders. And you cant have either protections if you persist in pursuing green energy, electric cars, and DEI to the exclusion of all else.

6. THE NATIONAL ELECTION SOLUTION:

7. THE NATIONAL DEBT

The national DEFICIT is the current year amount spent minus the current year taxes collected. If more money is taken in than spent it is a SURPLUS. The national DEBT is the accumulation on national deficits over the years. It can only be relieved by surpluses.

The national debt:

In 2000, it was $5.5 Trillion

GWB increased it by $4.4 Trillion to
$10 Trillion

Obama increased it by another $9.5 Trillion to $19.5 Trillion.

Trump increased it by another $8 Trillion to $27.5 Trillion

and Biden will increase it by at least
$10 Trillion to $ 37.5 Trillion.

Trump is the only one showing a diminished increase. He was not in for two terms. But neither will Biden be in two terms.

C. DEMOCRATS DESTRUCTION OF RATIONAL LIVING & ELECTIONS:

Illegal non-citizens are the perfect paradigm for the democrat global warming issue. After all, they walked here and did not drive. Do democrats really believe they are going to continue walking once they get here? Do democrats really believe that illegals are going to continue voting for them once illegals settle in?

What the democrats have done is to take the
BIGGEST POLITICAL GAMBIT IN HISTORY PUTTING IN JEOPARDY THE LARGEST GROUP OF PEACE LOVING CITIZENS EVER IMAGINED.

SPRINGFIELD, OH

Democrats are deliberately destroying our democracy by exacerbating election difficulties via allowing untold numbers of foreigners to trespass into our country. Probably one of the greatest difficulties in conducting an election is knowing who is eligible to vote and who is not.

Counties are are suppose to be the first resource to determine this, because they are the central hub for identifying property tax payers. But the property tax rolls only identify property owners, not renters or homeless people or resident non-citizens. Therefore, each county registrar is supposedly charged with the task of identifying citizen voters.

Instead, the states appear to have taken charge of that task. And in so doing have made the task more inaccurate by requiring the motor vehicle departments to register non-citizens for voting as if they are citizens. As a result, the US Constitution is being violated, not to mention the near impossibility of obtaining a drivers license.

It should now be clear to every US citizen that the Democratic Party has become a traitor to our democracy by obfuscating the election process and employing the inflow of illegal entrants in the hopes of maintaining power. They are not without help from some very stupid republicans, aka, RINOS. Those now working in government need to ask themselves how far they are willing to go for a worthless paycheck.

It is clear that democrats have not inspired trust in our election system by maintaining open borders. That fact, coupled with the wide flung use of electronic election systems leaves the US citizen with very little confidence that elections are not rigged. It can be said that no matter which party is in control of the election process, without the electorate being able to validate their own counted ballot and see the accumulation of actual ballots counted for a particular candidate after the fact, there can be no confidence in the electronic tabulated election results.

D. DEMOCRATS PROPENSITY FOR LAWLESSNESS & VIOLENCE:

ANTIFA & BLM are two violent groups that democrats seem to love. Where they certainly have a right to speak, they do not have a right to attack and loot businesses, setting them on fire. Contrary to the idiot reporter who can be quoted as saying “This is a peaceful protest”, NO IT WAS NOT. And contrary to the phony democratic party J6 committee claiming J6 was an “insurrection”, NO IT WAS NOT. On J6 there were at least two murders by Capitol Police of which democrats are proud. SHAME ON THEM! To further their gas-lighting of the American citizen, they claim that “Domestic Terrorism” is on the rise while allowing in real terrorists. “Just look at all those lawless citizen vigilantes supporting Trump who is worse than Hitler”. Yata yata …. yata. How many times now have we heard the term “domestic terrorism” used by Biden’s corrupt DOJ coupled with the democrats slur, ‘Islamaphobia”. Such rhetoric only inflames a society that was evilly attacked by radical Islam on 911 & then told they were not a Christian nation by a deceitful president who used his power to persecute them further. If they had any intentions at all of promoting domestic tranquility, all they would have to do is to BAN SHARIA LAW which is not a religion. Sharia Law is a core part of Islamic ideology and stands completely incompatible with western values. 1948 India should have shown any intelligent person how dangerous Islam Sharia is to western democracy. I would dare say, if you wish to worship Allah instead of Christ, be my guest. But don’t try to push your bull poop laws down our throat.

E. MASTERS OF DECEIT. The Democratic Party Ukrainian Playbook.

Where fascism and communism have been traditionally seen as opposites, it would seem that the current Democratic Party, in conjunction with neo conservatives, has practiced a hybrid combination of these two opposites, sometimes appearing as communistic and other times appearing to be fascistic. No matter their ideology, there is one most evident characteristic, ie, their desire to stay in power no matter the cost. And the Ukrainian coup of a duly elected president in 2014 is their playbook.

Here is the truth about the Ukraine.
UKRAINE BURNING

Note that in 2011 the President of the Ukraine was democratically and legitimately elected. The events of 2013 and 2014 led to an unconstitutional overthrow of the government spawned by neo fascists. Today we are very close in this country to repeating that unlawfulness and violence.

This fascist coup of a democratically elected president that took place in the Ukraine in 2014 is the model for today’s Democratic Party strategy. When they are out of power or when their power position is threatened, they will stage violent demonstrations to make it look like the opposition party is at fault. Just look at how they have staged the Jan 6 “insurrection” which was not an insurrection. Compare that to the George Floyd “peaceful” demonstrations that preceeded Jan 6.

The key thing in understanding the Ukrainian 2014 coup is in identifying
WHO AUTHORIZED THE POLICE TO ATTACK THE PROTESTERS, knowing it would result in more violence.

Answer: He was known as YATS, the leader of one of the minority fascist parties.
YATS

In other words, he was instrumental in getting the opposition government to attack the very protesters he had encouraged to demonstrate at the capital. But he also alerted the protesters, because they were ready to deal with the police when they came. So it was a guaranteed violent clash. It was a perfect Alinsky setup to create a crisis.

Did we not see this same thing happen in the Jan 6 protests when it appears evident that the FBI had embedded operatives to incite violence among the crowd? If not, then please explain how some very obvious inciters of violence were not even touched by the justice system while other more innocent people were given the meanest treatment. This is why it is most important to understand the truth of the 2014 Ukraine coup.

F. DEMOCRAT PARTY DESTRUCTION OF ECONOMY:

This brings us to a discussion of taxation and government spending. How to disperse collective funds will always be an issue as long communism exists. Communism is not Commonism and visa versa. And printing more money is not the answer.

Dispersal of collective funds should only be based upon the common agreement of donors. Not by some dictator. Citizen taxes should only go to the protection of citizens, not non citizens. And the dispersal of funds for reparations of non existent damage is an abomination, as is the dispersal of funds to enemy nations. Dispersal of collective funds for health care should be limited to citizens only.

It might be reasonable to allow permanent resident non-citizens to participate in Social Security because it is a forced savings program not funded by citizen taxes. But certainly Social Security should not be extended to foreigners or adversaries.

At the current time, Congress is failing to observe these principles of funding in performing its duties. Republicans have been a big disappointment in countering the destructive Democratic Party that is doing everything it can to destroy this country while printing and spending money irresponsibly.

G. THE STUPIDITY OF DEI:

Most people understand the meaning of “diversity” and “inclusiveness”. But what is meant by “equity”?

“Equity” is most commonly used in real estate to identify ownership or title to a real property. It is primarily a way to identify how much of a real property is owned by a borrower as opposed to his lender(s), But we are now seeing the idea of ownership being wrongfully applied to our nation with broad and unjust consequences.

How did this come to be? In all likelihood liberal social justice freaks have confused the term “iniquity” which means “injustice” with the term “inequity” which means “unequal ownership”. To construe inequity as meaning iniquity is fundamentally wrong, lazy and possibly devious.

Author
Categories THE TRUTH

Posted

Our current day electronic mercantile system is possible only because of the banking credit card which enables trading of a government fiat currency for real good and services. But if that fiat currency fails, we ask whether or not there is another possible fool proof electronic trading system. And the answer seems to be “yes” if we consider a gold back crypto currency.

WHY GOVERNMENT CURRENCY INSTEAD OF GOLD:
Gold has always been considered globally to be a real currency. There was a time when there was enough gold available relative to earths population to be carried around in small quantities for trading purposes.
But then as populations grew, the availability of goods and services increased diminishing their value, while the value of gold increased making it too difficult to slice up gold into extremely small and unmeasurable quantities to be used in physical trading. So sovereign governments began issuing gold backed currencies to enable easier trading.

WHY GOLD BACK CURRENCY WAS ABANDON:
In 1931, gold backed currency began to unravel in the most powerful country in the world: England. When the Great Depression hit, the people in England panicked, and started trading in their paper money for gold. It got to the point where the Bank of England was in danger of running out of gold. Quite obviously, when England created its currency, it failed to slice and dice its gold supply into small enough quantities as to allow its currency accommodate the growing population. Had England made its currency to represent extremely small quantities of gold in the first place, it would have been able to better deal with the run on its currency. Nevertheless, it eventually gave up on the gold back currency, opting to allow its currency value to be determined by the gold backed US dollar market, making the US dollar the world’s reserve currency supported by a Federal Banking System. However, for fear of running into the same problem of not being able to sustain a run on its currency, 40 years later, the US government abandoned the gold back dollar. And so we now have pure fiat currency backed only by the faith and confidence in the US government.

THE CURRENT SITUATION:
Many of today’s economist argue that being off the gold standard helped to recover from the Great Depression. But what were the real causes of the Great Depression? For one thing, it was too easy to borrow money to be used in gambling on the stock market. So when the market went down, the loans of such money were called in forcing the borrowers to sell at lowered prices resulting in a market crash, a steep sell off. Currency became tight causing bank depositors to withdraw savings in a run on banks and companies to stop hiring. So economists reason that had the government the ability to print more money without basing it upon gold, there would not have been the Great Depression.

Analysis of the economists solution shows that what they really accomplished was a way of devaluating its currency in relation to increased gold value resulting from increased population. In other words, to fight a depression/recession they employ inflation. But what if there is too much inflation? Here they employ higher interest rates.

Now this would be all well and good assuming an honest government. But what we have learned more recently is that corrupt governments will manipulate the value of currency for selfish gain. Politicians will do what politicians do, lie and cheat. So we have to ask, is there a better way?

THE SCARCITY PRINCIPLE & THE NEED FOR
DYNAMIC CURRENCY DENOMINATION VALUATION:
Remember we said the value of the gold increases as the world population increases or as the amount of gold decreases. From this
the inverse is true, ie, the value of the gold decreases as the world population decreases or as the amount of gold increases.
What we want is to eliminate the need for human intervention in dynamically determining the total amount of a hypothetical currency denomination supply as a function/multiple of global population, as well as dynamically increasing or decreasing the value of that hypothetical currency denomination determined by dividing the global population by the total amount of gold available. By basing the total amount of a denomination supply upon global population, you can pretty much be assured you wont run out of gold in backing the denomination should there be a run on the currency.

This task is well suited to a computer. In essence, using a computer we can automatically compute how much gold should be represented by the denomination of a crypto currency, as well as how many denominations should be available world wide.

But the question remains as to who would be allowed to setup and administer such a system. Certainly it should be the owner of gold. It seems likely that the sovereign nation with the most gold would be the dominant provider of such a crypto. Currently it is said that the US has the most gold among sovereign nations.

Crypto Data Mining should be backed by gold.
Ultimately the price of goods should be subject to the scarcity of gold.
At least that seems to be the manner in which old bartering systems seemed to work.
Those who have the most gold would seem to devalue it more than those who have no gold. So they would be more inclined to trade it away for more functional goods and/or services.
Those not having gold would be more innovative in producing functional goods and services.
to be traded for gold.
Govrrnments should not be part of the value in determining market value.
But that is easier said than done.
Credibility among governments varies.
That fact provides some fodder in support of global government, which in turn opens the door to global tyranny.
So we seem to be stuck in a catch22 situation.
As it stands, it would appear tbat for free market sake, the non globalization of currency is the best we can do.
And the best currency is the one backed by gold.
For crypto currency to be viable, the data miners should be the owners of gold and their crypto currency should represent a partial ownership in their total holdings of gold, or a portion there of.
This assumes that gold has a universal fixed value.
Why would one gold owner trade away more gold in exchange for a lesser amount in gold?
So different cryptos may slice and dice their gold holdings in different increments. But the overall relative values stay the same.

The desired result is the ellimination of government balloney being construed as value.
The bottom line is that a legitimate crypto currency should be a denomination representing a quantity of gold ownership.
You in effect are buying gold and using it to purchase goods and services.
Trump has endorsed the idea og crypto. Lets just hope he gets it right.
Why should gold be the standard global currency?

1. It has been recognized world wide as having value.

2. It is hard to replicate. Anything else other than a precious raw metal is easy to be made to look good.

3. There is no substitute.
Once a large scale of gold creates a crypto backed by gold, there would be no need for smaller scale gold owners to create their own crypto, because they could sell their gold to the existing crypto owner.
BITCOIN is currently the most viable crypto. BUT IT IS NOT BACKED BY GOLD.
And worse yet, those who create bitcoins, the DATA MINERS, are unknowns employing God-Knows-What protocols to create bitcoins.
Anotner requirement for a crypto provider is that he must be subject to regular validation audits of his gold holdings.

======================================

THE IDEA BEHIND FIAT CURRENCY.

We begin with the idea of “value of currency” and the factors that
contribute to its inflation or deflation. But what is ‘inflation”?
Quite simply, “inflation” is
. . THE RISING COST OF GOODS AND SERVICES
. . DUE TO THE OVER ABUNDANCE OF MONEY.
And “deflation” is just the opposite.

A. THINGS THAT CONTIBUTE TO INFLATION:

1. INCREASED ACCESS TO MONEY.

. . a. PRINTING MORE MONEY.

. . . It should be noted that it is not necessary to physically print more
. . . money. All that needs happen is for the Federal Reserve to buy
. . . government ious and make a book-keeping entry crediting their
. . . own account with a phoney deposit & then debiting their account
. . . for the amount of the purchase of those government iuos.
. . . He who does the book-keeping controls the economy.

. . b. LOW INTEREST RATES.

. . c. LOW TAX RATES.

. . d. DECREASED
. . . POPULATION. MORE
. . . MONEY PER PERSON.

2. INCREASED COST OF
. . . PRODUCTION DUE TO
. . . SCARCITY OF RAW
. . . MATERIAL AND/OR
. . . LABOR. INCREASED
. . . WAGES OR INCREASED
. . . ENERGY COST.

3. EXCESSIVE SPENDING.
. . MONEY TOSSING.
. . TOO MUCH MONEY CHASING
. . GOODS AND SERVICES. ESPECIALLY PERTAINS
. . TO GOVERNMENT.

B. CURBS AGAINST. MONEY HOARDING

1. DECREASED ACCESS TO MONEY.

. . a. HIGH INTETEST RATES.

. . b. HIGH TAXES.

. . c.. INCREASE IN POPULATION.
. . . LESS MONEY PER PERSON.

2. OVER ABUNDANCE OF RAW MATERIAL
. . AND/OR LABOR.

3. OVER PRICING, HIGH COURT COSTS,
. . CHARGING MORE THAN THE MARKET WILL BARE.

This is why the gov is struggling to gain total control over crypto currency. It takes away their ability to control the market. But crypto does offer a way for the gov to control induviduals.

A FIAT currency is not based upon any commodity like gold. It is strickly a book keeping system maintained by the banking cartel. The world departed from a currency system bssed upon gold back with Nixon. It is probably better to have the value of gold determined by the free market rather than a government opinion. But the hazard of that is that it allows rogue nations to hoard it and possibly upset the existing fiat currencies in use. The same may even be possible with crypto currency since it is like an electronic commodity that has limited supply.

In the end, it would seem that any currency sysyem amounts to the old barttering system in the exchange of goods and services. The question is HOW MUCH DO YOU WANT A THIRD PARTY,
like the government, interfering in your exchanges. And if you really
want a third party interfering to the extent that it forgets its basic
function of securing the nation’s borders, then lots of luck with that,
because you wont even have a nation to live in or a government to
protect you from unfair trading.

In real estate, the driving priority is location, location, location.
In government, the driving priority must be
THE BORDER, THE BORDER, THE BORDER.

=============================================
THE IDEA BEHIND FIAT CURRENCY.

We begin with the idea of “value of currency” and the factors that
contribute to its inflation or deflation. But what is ‘inflation”?
Quite simply, “inflation” is
. . THE RISING COST OF GOODS AND SERVICES
. . DUE TO THE OVER ABUNDANCE OF MONEY.
And “deflation” is just the opposite.

A. THINGS THAT CONTIBUTE TO INFLATION:

1. INCREASED ACCESS TO MONEY.

. . a. PRINTING MORE MONEY.

. . . It should be noted that it is not necessary to physically print more
. . . money. All that needs happen is for the Federal Reserve to buy
. . . government ious and make a book-keeping entry crediting their
. . . own account with a phoney deposit & then debiting their account
. . . for the amount of the purchase of those government iuos.
. . . He who does the book-keeping controls the economy.

. . b. LOW INTEREST RATES.

. . c. LOW TAX RATES.

. . d. DECREASED
. . . POPULATION. MORE
. . . MONEY PER PERSON.

2. INCREASED COST OF
. . . PRODUCTION DUE TO
. . . SCARCITY OF RAW
. . . MATERIAL AND/OR
. . . LABOR. INCREASED
. . . WAGES OR INCREASED
. . . ENERGY COST.

3. EXCESSIVE SPENDING.
. . MONEY TOSSING.
. . TOO MUCH MONEY CHASING
. . GOODS AND SERVICES. ESPECIALLY PERTAINS
. . TO GOVERNMENT.

B. CURBS AGAINST. MONEY HOARDING

1. DECREASED ACCESS TO MONEY.

. . a. HIGH INTETEST RATES.

. . b. HIGH TAXES.

. . c.. INCREASE IN POPULATION.
. . . LESS MONEY PER PERSON.

2. OVER ABUNDANCE OF RAW MATERIAL
. . AND/OR LABOR.

3. OVER PRICING, HIGH COURT COSTS,
. . CHARGING MORE THAN THE MARKET WILL BARE.

This is why the gov is struggling to gain total control over crypto currency. It takes away their ability to control the market. But crypto does offer a way for the gov to control induviduals.

A FIAT currency is not based upon any commodity like gold. It is strickly a book keeping system maintained by the banking cartel. The world departed from a currency system bssed upon gold back with Nixon. It is probably better to have the value of gold determined by the free market rather than a government opinion. But the hazard of that is that it allows rogue nations to hoard it and possibly upset the existing fiat currencies in use. The same may even be possible with crypto currency since it is like an electronic commodity that has limited supply.

In the end, it would seem that any currency sysyem amounts to the old barttering system in the exchange of goods and services. The question is HOW MUCH DO YOU WANT A THIRD PARTY,
like the government, interfering in your exchanges. And if you really
want a third party interfering to the extent that it forgets its basic
function of securing the nation’s borders, then lots of luck with that,
because you wont even have a nation to live in or a government to
protect you from unfair trading.

In real estate, the driving priority is location, location, location.
In government, the driving priority must be
THE BORDER, THE BORDER, THE BORDER.

=================================================
Before the advent of electronic banking, the use of a paper iou in the form of a check with the payor’s checking account number and hand written signature was sufficient for the bank to diminish the funds in the payor’s checking account. The only danger to the owner of a checking account came from the possibility of another person being able to to perfectly copy the hand written owner’s signature, something very improbable and easy to protect against occurring.

Then came the computer with its ability to perfectly copy the signature of a person. With a picture of the signature of a checking account owner and knowledge of the account number, it became much easier for thieves to do electronic forgery. The question now is, how to minimize this threat. And the answer would appear to be simple.

First, we nust realiaze that in order for the computer to copy a signature it can only do so in graphic mode. So what we need is a non-displayable text mode signature. And with online banking, we already have that non-displayable text mode signature in the form of a password. Therefore, any electronic transaction authorizing a bank to diminsh the funds in a checking account should require the password of the checking account owner. Should a bank fail in providing this security, then it should be held laible for any losses due to its negligence.

Author
Categories ECONOMY