Did Russia “hack” Burisma Holdings?

Russians Hacked Ukrainian Gas Company at Center of Impeachment

https://www.nytimes.com/2020/01/13/us/politics/russian-hackers-burisma-ukraine.html

Hunter Biden sat on the board from 2013 to 2019. The company’s website, http://burisma-group.com/, is registered under a privacy protection service in Ukraine, and asks visitors to complete a reCAPTCHA just to view the home page. According to Reuters,

Burisma does not disclose it financial results, …

… Burisma’s web-site quoted Hunter Biden as saying on May 12, 2014.

“As a new member of the board, I believe that my assistance in consulting the company on matters of transparency, corporate governance and responsibility, international expansion and other priorities will contribute to the economy and benefit the people of Ukraine.”

https://www.reuters.com/article/us-usa-trump-whistleblower-burisma-factb/factbox-burisma-the-obscure-ukrainian-gas-company-at-the-heart-of-us-political-row-idUSKBN1W91UG

A comprehensive search on the SEC database returns no results on the term “Burisma.” In fact, the entire EDGAR database appears to have been purged of any and all mention of the names “Biden” or “Burisma.”

No documents matched your query.

https://www.sec.gov/cgi-bin/srch-edgar?text=Burisma&first=1994&last=2020
https://www.sec.gov/cgi-bin/srch-edgar?text=Biden&first=1994&last=2020

Nevertheless, there are some corporate filings online at a website called OpenCorporates for Burisma Holdings as well as its alleged owner, the shell corporation Brociti Investments, which apparently had something to do with the Clinton Foundation at one time or another.

The owner of Brociti Investments, Mykola Zlochevsky, was minister of natural resources during the administration of President Viktor Yanukovych, according to the Wikipedia article. His ownership of Burisma, through foreign shell corporations, would present a serious conflict of interest with his government post, especially if not disclosed, characteristic of the term “oligarch.”

And for his part, how did Hunter Biden “advise” on all this and find nothing wrong with it?

EDIT 2020-01-14: Now that I think about, this blog appears to be hosted in Cyprus as well.

PayPal is broken

PayPal has confirmed that a researcher found a high-severity security vulnerability that could expose user passwords to an attacker. The researcher, Alex Birsan, earned a bug bounty of $15,300 (£11,700) for reporting the problem, … public disclosure of the vulnerability, “the login form.”

PayPal confirmed that, “sensitive, unique tokens were being leaked in a JS file used by the recaptcha implementation.”

https://www.forbes.com/sites/daveywinder/2020/01/10/paypal-confirms-high-severity-password-security-vulnerability/#7e67d4251b50

They pay “bounty” money to some outside hacker, because they don’t have the in-house human resources to fix their own website, and secure their customers’ money from online thieves, and it just gets worse and worse from there.

PayPal form to “link” bank account

We use Yodlee to confirm your bank details and to check your balance and transactions as needed, which can help your PayPal payments go through. For more information, see our Privacy Statement. You can turn off our use of Yodlee by removing permissions for this bank in your Profile.

PayPal form to “link” bank account.

Now I have never heard of Yodlee before, and I wouldn’t have though they needed or would actually have the gall to actually “ask for” the customer’s online bank password for some nebulous data aggregation purposes.

Financial Innovation and Insights
Happen at the intersection of data + intelligence with Envestnet | Yodlee, a leader in data aggregation.

Envestnet | Yodlee, the leading data aggregation and data analytics platform, … never sells data that identifies individuals.

https://www.yodlee.com/

Now where do these people get their funding from, and such ultimate trust to handle third-party online bank logins?

Iran claims responsibility for shooting down Ukrainian passenger plane

Iranian officials blame heightened tensions with the U.S. for what they say was the unintentional shooting down of a Ukrainian jetliner.

https://www.npr.org/2020/01/11/795599878/iran-admits-to-shooting-down-ukraine-plane-by-mistake

At least the Iranian leaders did admit some degree of culpability, but that’s quite a stretch of sarcasm to call it a “mistake” to shoot down a plane with 176 non-combatants aboard.

A sad day. Preliminary conclusions of internal investigation by Armed Forces:

Human error at time of crisis caused by US adventurism led to disaster

Our profound regrets, apologies and condolences to our people, to the families of all victims, and to other affected nations.

https://twitter.com/JZarif/status/1215847283381755914

And just how does this Javad Zarif fellow stay on Twitter’s social(ist) media platform when Twitter’s executives are hard at work slamming the ban hammer on conservative Jews such as Laura Loomer?

Protocols of Zion

The Protocols of the Meetings of the Learned Elders of Zion

Could far-right conspiracy theorists just hate Soros? Sure. But to borrow from their rhetoric, that’s what they want you to think. The Soros mythology has so much in common with anti-Semitic classics like The Protocols of the Elders of Zion—a pamphlet cooked up in 1903 during Russia’s Jewish pogroms. It gained a second life in Nazi Germany. In today’s anti-Soros invocations, you can’t miss the signaling

At the crux of The Protocols, a threatening cabal of cosmopolitan elites want to destroy the virtuous (white) nation state. That same formulation crops up in the contemporary alt-right’s outcry against “globalism”

https://www.wired.com/2017/03/internet-protocols-elders-zion/

That’s George Soros, buddy to Tom Steyer and Michael Bloomberg, notorious elitists, all of them, all but violently opposed to Donald Trump’s presidency. Some kerfuffle over deleted tweets on Twitter

That lot is in fact extremely wealthy, self-professed political Jews who adamantly demand leftist gun control policies, extended background checks, and a multitude of other measures to make the elite feel safer from the poorer classes of street ladies and men who lead rough lives. Their policies maintain and enforce vast and comprehensive lists of banned individuals and personæ non gratæ on NICS and other databases, indistinguishable in principle from Adolf Hitler’s policies in Nazi Germany in the 1930s.

That ultra-wealthy trio is politically liberal, on the side of Hezbollah, Palestine and Iran in their continual wars and intifadas against Israelis and other political conservatives. Are they really Jews or friends of Jews? I trow not.

The actual Protocols, if one wishes to read or refer to that work, is widely available online.

Basically, the work is a satire of a Machivellian plan for total world domination, after the works of Maurice Joly, perhaps more characteristic of Benito Mussolini’s fascist holocaust “plans” than those of the Jews themselves.

The circumstances of its original publication are bizarre, but it certainly does not deserve the strident screams of anti-Semitism and demands for pre-emptive censorship it has gotten from the mainstream media. If any “learned elders” have such “plans” nowadays, it is the leaders of the Christian Democrat Union of Germany, the Christian Social Union of Bavaria, and similar European political parties in cahoots with George Soros, Tom Steyer, and Michael Bloomberg in the United States

I remain “adjudicated as a mental defective” under their vicious, humiliating, and life-destroying Nazi policies. Those political “Jews” have absolutely no right to accuse me of anti-Semitism.

Persecution and harassment of “Targeted Individuals”

There is a truth-or-consequences moment whenever the subject of “targeted individuals” is brought up. There is a great deal of effort to discredit us and everything we say.

“Perps” or perpetrators, as they have sometimes been known, play it as a cat-and-mouse game. They hire on as security or local police somewhere, and they revel in establishing a certain psychological superiority over the individuals they target or single out for harassment or lifelong intrusive government investigation.

It is a sad and undeniable fact that some people harass, tease and pick on other people, and that they usurp positions of authority and use high technology to continue childish playground bullying on into adulthood without letup.

Some people are very disturbed by “gangstalking” and related information posted on the internet, and they insist that “targeted individuals” are delusional. If people are claiming to be the victims of “mind control,” then they certainly are not denying that they are in some respects “delusional.”

It occurs to me that there are gangs (“street” or not) that deal hallucinogenic drugs including Marijuana, and they do victimize their consumers, as much as possible to foster dependency and addiction. An entire industry of so-called “mental health” has grown up to cloak and enable drug dependency and addiction. The involuntary administration of mind-altering substances must be held suspect, whether it occurs under color of law via civil commitment, or by drug dealers with motives of human trafficking on the wrong side of the law.

A couple of peer-reviewed articles on gang-stalking have been published in academic journals, and they do allude to a breakdown in moral, ethical, and technological boundaries between criminal networks and law enforcement networks.

Dr. Desurmont has also published other articles critical of establishment psychiatry in the French language.

Bandy X. Lee and CDU/CSU psychiatry

Bandy X. Lee, a professor of psychiatry at the Yale University School of Medicine, founded the World Mental Health Coalition after convening a conference at Yale on the president’s mental health. She is the editor of the book “The Dangerous Case of Donald Trump: 27 Psychiatrists and Mental Health Experts Assess a President” and more recently was joined by psychiatrists at universities around the U.S. in calling for the House of Representatives to convene a panel of mental health experts to weigh in on the president’s impeachment proceedings.

https://www.salon.com/2020/01/04/yale-psychiatrist-urges-pelosi-request-72-hour-mental-health-hold-on-trump-after-iran-attack/

This is a mysterious woman who went on a strange tirade against the President of the United States. Lee has a prominent public presence online including numerous social media profiles.

A Chinese psychiatrist? I am reminded of foreign customs of ear-picking.

Do you hear voices in your head? No? Then you are in denial, and you need to lie down on the couch, and there is a nice lady to pick the earwax out of your ears, so that you may hear them ever so clearly.

Don’t get me wrong. I am not trying to be culturally insensitive or white supremacist. After all, The 19th-century (white) Victorian customs of Sigmund Freud in pre-WWI Austria were every bit as strange. In either case, there’s a lady on the couch, and some bizarre and probably unnecessary “services” are being offered.

This lady holds not only a Doctor of Medicine (Medicinæ Doctor, MD) degree, but a Master of Divinity (MDiv) which entails an advanced level of instruction and knowledge in the Christian religion. There is a strange phenomenon of Christian Bible-thumping on the political left, perhaps better exemplified by certain political parties which have gained an auspicious ascendancy in Europe.

Conspiracy theories of Christian Nazis? Almighty Vice Lord Nation?

Asian triads involved in professional psychiatry? No doubt.

Syntax highlighting for programs

I was looking around for a plugin to highlight syntax for various programming languages, and I hit upon “CodeMirror Blocks.” Here is a silly constified main() declaration for a C or C++ program. (This post is a test of the syntax highlighting plugin.)

int main(const int argc,
         const char *const *const argv,
         const char *const *const envp)
{
  // some code here ...
  return 0; // on success.
}

I don’t mean to propose the actual code here as a serious example, but I do believe that thinking about this sort of thing in an abstract sense may help expose shoddy or careless or inconsistent programming practices, in the hopes of ameliorating such issues of possible bizarreness.

Lebanon’s “travel ban” on Carlos Ghosn

This is not a hostile action by Lebanon against Nissan executive Carlos Ghosn. There’s an international arrest warrant out for the guy, and Lebanon is still harboring him.

Ghosn issued a statement — his second this week — seeking to distance his Lebanese wife and family from any role in his escape.

https://www.pbs.org/newshour/economy/lebanon-issues-travel-ban-for-former-nissan-chief-ghosn

Nevertheless, Japan has issued an arrest warrant for Ghosn’s wife.

Carlos calls it a “coup” to take him down.

But that’s all relative to one’s moral point of view, and to what extent Nissan or the auto makers and auto unions collectively are considered a state or a government unto themselves.

Middle class America is deep in hock to drive a brand new car to a low-paying job that really cannot support that mandatory minimum “high California” standard of living dictated by the Democratic Party in the United States, for those who are wealthy enough to live and support their families without public assistance.

Serious organized crime is the major cause of the great class discrepancy that has opened up especially in highly populated areas of California among other major metropolitan areas.

Broken SHA hashes and cryptocurrency

The SHA hash used in Bitcoin is iterated, or re-applied to its output.

H=\mathrm{SHA256}(\mathrm{SHA256}(I))

When a hash function is iterated for a second time in this manner, the size of its range is reduced by an approximate factor of 1-1/e by random collisions.

The iterated hash function itself can also be iterated, and we may estimate the range reduction asymptotically.

\left|\mathrm{SHA256}^{2^k}(R_0)\right|\approx\left(1-\frac 1 e\right)^k|R_0|,

where R_0 is the range of the original SHA256 (or other hash) function. Or let N=2^k for the number of times the original hash function is iterated.

\left|\mathrm{SHA256}^{N}(R_0)\right|\approx\left(1-\frac 1 e\right)^{\log_2 N}|R_0|

I am attempting here to estimate the reduction in strength of a hash function that occurs when it is iterated, as a reduction in size of its range, by purely information-theoretical arguments.

Fake Army draft?

Text messages were reportedly sent out to notify young men that were being drafted into the U.S. military.

Some of the messages warned of prison sentences up to 6 years for failure to report for military duty. The Army warns it’s a scam, but there are still laws on the books, that not only impose actual prison sentences, but definitely make men ineligible for employment in other respects if they are not properly registered for the draft.

A lot of guys are going to prison just for being guys. That cannot be denied as a “scam.”

The political concern here is not prison population gender ratio or fairness, but horror on the part of Democratic Party authorities that a woman might actually be imprisoned for any reason at all, which would violate strict law enforcement codes of Omertà and respect for the ladies under the participatory justice system in the United States.