The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: September 2014
Donald Trump to headline 1st Amendment event in NH
Posted: September 1, 2014 at 3:48 am
Donald Trump is coming to New Hampshire this fall to help honor the First Amendment.
The Nackey S. Loeb School of Communications Inc., announced this weekend that Trump will be the featured speaker at the school's 12th annual First Amendment Awards event. The program is at the Radisson Hotel in downtown Manchester on the evening of Wednesday, Nov. 12.
The event honors First Amendment freedoms and those from New Hamphire who go above and beyond to uphold them.
Honorees have included outspoken school board members and private citizens, newspapers and editors, and a former state attorney general.The outspoken Trump, know to many simply as "The Donald,'' is a successful real estate developer, reality TV host, author and political commentator.
His visits to the First Primary state regularly spark speculation about his own presidential ideas. He has said he is keeping his options open for 2016.Meanwhile, his appearances draw crowds. His speech at a "Politics and Eggs'' business forum at St. Anselm College last winter drew a packed house.
Tickets to the Loeb School event go on sale Sept. 12 at http://www.loebschool.org.
Trump joins a distinguished list of national figures who have donated their time to help the school with its major annual fundraising event.
First Amendment speakers have included the late Tim Russert of NBC, Fox's Bill O'Reilly, Vice President Joe Biden, U.S. Sen. John McCain, commentators Patrick Buchanan and George Will and ABC's George Stephanopoulos.
The school was founded in 1999 by Nackey S. Loeb, the late president and publisher of the New Hampshire Union Leader and Sunday News.
Its mission is to promote understanding and appreciation of the First Amendment and "to foster interest, integrity and excellence in journalism and communication.''
The rest is here:
Donald Trump to headline 1st Amendment event in NH
Posted in First Amendment
Comments Off on Donald Trump to headline 1st Amendment event in NH
NCAA hints at O'Bannon case appeal strategy
Posted: at 3:48 am
The NCAA suggested its main arguments to appeal the Ed O'Bannon ruling allowing college athletes to be paid will focus on amateurism and First Amendment rights on live broadcasts.
In a filing Thursday night with the U.S. Circuit Court of Appeals, the NCAA's lawyers responded to a mandatory mediation questionnaire that asks to briefly describe the issues on appeal. The NCAA wrote, The issues on appeal include but are not limited to whether amateurism is presumptively procompetitive for an amateur sports league and whether plaintiffs' claims based on a property right in the use of their (names, images and likenesses) in live broadcasts of sporting events are foreclosed by the First Amendment. USA Today Sports first reported the filing.
U.S. District Judge Claudia Wilken ruled Aug. 8 that the NCAA's restrictions on what Football Bowl Subdivision players and Division I men's basketball players can receive unreasonably restrain trade and violates antitrust law. Wilken's injunction will allow football and men's basketball players to receive scholarships covering their full cost of attendance and deferred payments for the schools' use of their names, images and likenesses (NILs).
For decades, the NCAA's legal defense to avoid paying players has relied upon a landmark 1984 Supreme Court ruling that stripped the NCAA of TV rights and allowed conferences to sell their games. The NCAA has clung to a line from that decision: In order to preserve the character and quality of the (NCAA's) 'product,' athletes must not be paid, must be required to attend class, and the like.
In her October 2013 summary judgment ruling, Wilken wrote the Supreme Court opinion does not stand for the sweeping proposition that student-athletes must be barred, both during their college years and forever thereafter, from receiving any monetary compensation for the commercial use of their names, images and likenesses. In her August judgment after a three-week trial, Wilken noted that the O'Bannon plaintiffs provided enough evidence to show the college sports industry has changed substantially in 30 years.
Wilken also wrote that the Supreme Court opinion stating athletes must not be paid differed from the NCAA's own lawyers in the case. The NCAA's lawyers in 1984 said during an oral argument that the NCAA was not relying on amateurism as a procompetitive justification and might be able to get more viewers and so on if it had semi-professional clubs rather than amateur clubs,' Wilken wrote. In addition, Wilken wrote that the NCAA has inconsistently applied its amateurism rules throughout the association's history and to this day.
Wilken's injunction allows the NCAA to create a cap on the deferred licensing money as long as the cap is not less than $5,000 per year. It's what's called a less-restrictive alternative to the antitrust violation found.
By appealing based on amateurism, the NCAA could find relief or perhaps an even more damaging ruling. Conceivably, the appeals court could determine that amateurism is so illegitimate that it's unreasonable for there to be any cap. That's the argument attorney Jeffrey Kessler makes in his class-action lawsuit against the NCAA and the five major conferences.
Another issue the NCAA suggested it will appeal in O'Bannon relates to the First Amendment and live TV broadcasts -- an area that generates billions of dollars for schools. The O'Bannon plaintiffs have sought to share that licensing revenue.
Earlier in the O'Bannon case, the NCAA claimed that the First Amendment and various state laws prevent college athletes from asserting any rights of publicity during game broadcasts. Wilken rejected that argument in April, writing that the First Amendment does not guarantee media organizations an unlimited right to broadcast entire college football games and questioned whether college athletes validly transfer their rights of publicity to another party.
View post:
NCAA hints at O'Bannon case appeal strategy
Posted in First Amendment
Comments Off on NCAA hints at O'Bannon case appeal strategy
Volokh Conspiracy: Thuggery wins, free speech rights lose
Posted: at 3:48 am
The free speech rights here were as in many free speech cases the rights of pretty rude speakers, certainly ones whose message and manners I do not endorse. But the First Amendment protects the rude as well as the polite, especially given how subjective government judgments of rudeness usually end up being.
Here are the facts, from the majority opinion in Bible Believers v. Wayne County (6th Cir. Aug. 27, 2014) (some paragraph breaks added throughout the block quotes below):
The City of Dearborn in Wayne County, Michigan, has hosted the Arab International Festival every summer from 1995 until 2012. A three-day event that was free and open to the public, the Festival welcomed roughly 250,000 attendees and featured carnival attractions, live entertainment, international food, and merchandise sales. [The panel later agreed that the festival was a "traditional public forum" at which public speech is fully constitutionally protected, rather than private property or even public property that was temporarily exclusively leased by a public organization. -EV]
[T]he Bible Believers came bearing strongly worded t-shirts and banners:
[Chavez] wore a t-shirt with the message, Fear God on the front and Trust Jesus, Repent and Believe in Jesus on the back. Fisher wore a t-shirt with the message, Trust Jesus on the front and Fear God and Give Him Glory on the back, and he carried a banner that said on one side, Only Jesus Christ Can Save You From Sin and Hell, and on the other side it said, Jesus Is the Judge, Therefore, Repent, Be Converted That Your Sins May Be Blotted Out. Other messages conveyed on t-shirts, signs, or banners displayed by the [other Bible Believers] included, among others, Fear God, Trust Jesus, Repent and Believe in Jesus, Prepare to Meet Thy God Amos 4:12, Obey God, Repent, Turn or Burn, Jesus Is the Way, the Truth and the Life. All Others Are Thieves and Robbers, and Islam Is A Religion of Blood and Murder.
One Bible Believer carried a severed pigs head on a stick, which Chavez explained protected the Bible Believers by repelling observers who feared it. Appellants soon began preaching using a megaphone, and a small crowd formed around them almost immediately. [The police eventually told the speakers that megaphone use was forbidden by ordinance, and the speakers stopped; that restriction is not challenged here. -EV] Chavez castigated the crowd for following a pedophile prophet and warned of Gods impending judgment. As this evangelizing continued, the crowd yelled back. At this point, a ribbon-cutting at the opposite end of the Festival occupied a majority of the [Wayne County Sheriff's Office] officers, but one officer watched from the outskirts of the crowd.
As the Bible Believers moved deeper into the Festival, the crowd a good portion of which appeared to be minors continued to gather and yell. Some people started throwing debris including rocks, plastic bottles, garbage, and a milk crate at the Bible Believers. Someone in the crowd also shoved one Bible Believer to the ground. Some WCSO officers detained debris-throwers while other officers hovered at the edges of the crowd. Eventually, after about thirty-five minutes, the Bible Believers temporarily stopped preaching and stood as the crowd harangued them and hurled objects. Several officers, including some mounted units, attempted to quell the crowd.
After about five minutes of standing quietly, the Bible Believers began to move and preach again. As they did so, the cascade of objects intensified. Deputy Chiefs Richardson and Jaafar approached them a few minutes later. Jaafar explained that they could leave and that their safety was in jeopardy because not enough officers were available to control the crowd.
The Bible Believers, however, continued to preach, followed by what had swelled into a large crowd. Richardson and Jaafar then took Chavez aside to speak with him. Richardson noted his concern that Chavez was bleeding from where a piece of debris had cut his face. Richardson explained that he was responsible for policing the entire Festival, that Chavezs conduct was inciting the crowd, and that he would escort the Bible Believers out of the Festival
As Richardson insisted that the Bible Believers leave lest someone a Bible Believer, a Festival goer, or an officer be injured, Chavez asked if they would be arrested if they refused; Richardson replied, Probably we will cite you. This conversation replayed several times, with Chavez pressing for an answer and Richardson replying that the Bible Believers were a danger to public safety. Chavez eventually snapped, I would assume a few hundred angry Muslim children throwing bottles would be more of a threat than a few guys with signs.
Here is the original post:
Volokh Conspiracy: Thuggery wins, free speech rights lose
Posted in First Amendment
Comments Off on Volokh Conspiracy: Thuggery wins, free speech rights lose
Jitsi (Mac) – Download – Softonic
Posted: at 3:47 am
Jitsi is a free messenger client for Mac, which supports most major protocols and even supports video and audio conversations.
Simply choose the IM protocol that you'd like to connect to including SIP, Google Talk, XMPP/Jabber, MSN or Windows Live Messenger, AIM, Bonjour, ICQ, Yahoo Messenger and Facebook chat. In the main window, you'll find all your personal contacts.
In the Jitsi chat window, you can exchange IM messages or initiate video or audio chats including group chats. There are a limited number of emoticons and the Jitsi keeps a history of your chats. Although the interface isn't quite as intuitive as Adium. However, the fact that you can initiate audio and video chats gives it a serious advantage.
Note that this download link takes you to the nightly build page because Jitsi is being updated so regularly, that you can choose the latest version more easily.
Jitsi might not be quite as slick as other IM clients but wide support of IM protocols plus audio and video chatting makes it a very interesting option.
Note that this download link takes you to the nightly build page because Jitsi is being updated so regularly, that you can choose the latest version more easily
Originally posted here:
Jitsi (Mac) - Download - Softonic
Posted in Jitsi
Comments Off on Jitsi (Mac) – Download – Softonic
Guide to using the Tor Browser Bundle for secure communication – Video
Posted: at 3:47 am
Guide to using the Tor Browser Bundle for secure communication
You can download the Tor Browser Bundle at: https://www.torproject.org/
By: Crypto Scriptorium
Continue reading here:
Guide to using the Tor Browser Bundle for secure communication - Video
Posted in Tor Browser
Comments Off on Guide to using the Tor Browser Bundle for secure communication – Video
Review: Tor Browser Bundle lets you browse in anonymity …
Posted: at 3:47 am
If you want to beef up and anonymize your Internet browsing experience as well, Tor Browser Bundle (free) is the way to go. The Tor network provides a way to browse anonymously.
The Tor Browser Bundle is a portable, self-extracting package which contains a special version of Firefox, along with an application for connecting to Tor. You extract the bundle, and double-click "Start Tor Browser." A connection window comes up and steps through an initialization sequence. You don't have to do anything; just wait a moment while the progress bar fills up. As soon as a secure connection with Tor is established, Firefox loads and you can start browsing.
When you connect to Tor, all of your Internet traffic is encrypted and routed through a complex network of anonymous nodes until it reaches its final destination. It's not 100% secure, but then again, no security solution is. Tor has been around since 2002, and has been field-tested in rough situations in Egypt and other oppressive regimes that restrict Internet access. It works.
Since Tor routes your data through so many layers and random endpoints, it's not exactly blazing fast. Then again, most of us don't require Tor as a necessary part of our daily browsing routines. For occasional use, it's an elegant solution that simplifies a complex security system down to a double-click.
Note: The Download button on the Product Information page takes you to the vendor's site, where you can download the latest version of the software. This file is donationware; it is free to use, but the developer welcomes donations toward future development.
Continue reading here:
Review: Tor Browser Bundle lets you browse in anonymity ...
Posted in Tor Browser
Comments Off on Review: Tor Browser Bundle lets you browse in anonymity …
Softonic – Tor Browser – Download
Posted: at 3:47 am
Preserving your privacy on the net is no easy task nowadays with so many security risks and potential prowlers out there.
Tor Browser is a toolset that's designed for anyone who wants to improve their safety and security on the Internet. It can help you anonymize web browsing and publishing, instant messaging, and other applications that use the TCP protocol. For business users, it means that confidential exchanges of information can be kept from prying eyes and for more general users, it means that ISPs, keyloggers and other types of malware can't track your activities easily.
It works by bouncing traffic around a distributed network of servers which it calls "onion routers" (hence the logo). The Tor Browser interface allows you to easily toggle it on and off based on when you need to go online anonymously - there's no need to restart your computer when you've done so. If you want, you can also choose from various proxy tunnels based on a world map which displays exactly where each one is located.
To check it's working, you can use the online "Tor detector" to see if you're surfing anonymously or not. Connection can take some time depending on how many users are logged onto the network at any one time but usually its very quick. The Tor onion logo turns from yellow to green in your taskbar when a successful connection has been made.
Tor is simple, well organized and effective tool for anyone worried about security or invasions of privacy online.
Read the original here:
Softonic - Tor Browser - Download
Posted in Tor Browser
Comments Off on Softonic – Tor Browser – Download
Tor Browser for iOS – Free download and software reviews …
Posted: at 3:47 am
Editors' Note: You must be 17 years old to download this application. The download button opens the iTunes App Store, where you may continue the download process. You must have iTunes installed with an active iTunes account in order to download and install the software. This download may not be available in some countries.
by: Ben Markton on January 07, 2014
Tor Browser is designed to provide an added layer of security when browsing the Internet on your mobile device. Using proxy technology to keep your IP address and location secure, the app taps into the Tor browsing interface that many journalists, hackers, and academics use to protect their privacy online. From our tests, the proxies appear to work well, but the actual browser has issues of its own.
While the browsing experience with Tor did protect privacy and ensure an anonymous browsing experience, the actual Web surfing experience was hurt because of it. The setup time is long, requiring about 30 seconds or so to connect and ready itself for use. After this, the browser will often take a bit longer than other browsers to load Web pages, sometimes as much as twice the time needed by Safari. Combined with the often overseas IP addresses opening non-U.S. versions of sites, it can be a bit frustrating to get to your favorite sites and access content.
The core component of Tor Browser works as advertised and offers a secure, private browsing experience, but the browser built around that technology is not quite good enough to replace the other browsers on your device, at least not for quick reads of articles, e-mail checking, and other basic activities. It's an OK free app that could use some work on the usability side.
Read more from the original source:
Tor Browser for iOS - Free download and software reviews ...
Posted in Tor Browser
Comments Off on Tor Browser for iOS – Free download and software reviews …
Browse Anonymously, Browse Safely – The App Center
Posted: at 3:47 am
Tor Browser is based off of the Firefox project, and is very similar in most aspect to the regular Firefox browser. The big difference though, is that all traffic is routed through Tor. This means you can be sure that your time spent browsing online is anonymous and safe.
The Tor Project is an open source project that was created to help people browse the Internet safely. This has been used in a wide variety of aplications, ranging from helping bypass firewalls in countries like China to ensuring safe communications between diplomats. But with the increasing pressure on everyone to keep basic online browsing private from markters, governments, and other snoops, it is starting to be more commonly used in everyday life for many people.
Tor works by channeling your traffic through a multi-step encryption across a globally-distributed servers. This means that not only your identity is completely hidden from the website/onlien service you are trying to connect to, it is close to impossible for anyone to intercept and read the communication en route.
With Tor browser, you can now get all of the powerful security in Tor, but with the ease of a common web browser. If you are interested in learning more about the Tor network and how it works, we highly recommend reading through their explanation.
Visit link:
Browse Anonymously, Browse Safely - The App Center
Posted in Tor Browser
Comments Off on Browse Anonymously, Browse Safely – The App Center
Federal Cybersecurity Director Found Guilty on Child Porn Charges
Posted: at 3:47 am
As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images.
But DeFoggiconvicted today in Nebraska on three child porn charges including conspiracy to solicit and distribute child pornmust have believed his use of the Tor anonymizing network shielded him from federal investigators.
Hes the sixth suspect to make this mistake in Operation Torpedo, an FBI operation that targeted three Tor-based child porn sites and that used controversial methods to unmask anonymized users.
But DeFoggis conviction is perhaps more surprising than others owing to the fact that he worked at one time as the acting cybersecurity director of the U.S. Department of Health and Human Services. DeFoggi worked for the department from 2008 until January this year. A department official told Business Insider that DeFoggi worked in the office of the assistant secretary for administration as lead IT specialist but a government budget document for the department from this year (.pdf) identifies a Tim DeFoggi as head of OS IT security operations, reporting to the departments chief information security officer.
The porn sites hes accused of usingincluding one called PedoBookwere hosted on servers in Nebraska and run by Aaron McGrath, who has already been convicted for his role in the sites. The sites operated as Tor hidden servicessites that have special .onion URLs and that cannot normally be traced to the physical location where they are hosted.
Although anyone could use the sites, registered users like DeFoggiwho was known online under the user names fuckchrist and PTasseatercould set up profile pages with an avatar, often child porn images, and personal information and upload files. The site archived more than 100 videos and more than 17,000 child porn and child erotica images, many of them depicting infants and toddlers being sexually abused by adults.
The FBI seized the sites in late 2012, after McGrath failed to secure his administrative account with a password. Agents were able to log in and uncover the IP address of the Nebraska server where he was hosting two of them. McGrath worked at the server farm, and hosted the third site from his home. The FBI monitored him for a year and after arresting him in November 2012 continued to operate his child porn sites secretly from a federal facility in Omaha for several weeks before shutting them down. During this time, they monitored the private communications of DeFoggi and others and engaged in various investigative techniquesto defeat the anonymous browsing technology afford by the Tor network and identify the real IP addresses of users.
These techniques successfully revealed the true IP addresses of approximately 25 domestic users who accessed the sites (a small handful of domestic suspects were identified through other means, and numerous foreign-based suspect IPs were also identified), prosecutors wrote in a court document. In March 2013, twenty suspects were indicted in Nebraska; followed by two others who were indicted the following August.
One of these techniques involved drive-by downloads that infected the computers of anyone who visited McGraths web sites. The FBI has been using malicious downloads in this way since 2002, but focused on targeting users of Tor-based sites only in the last two years.
Tor is free software that lets users surf the web anonymously. Using the Tor browser, the traffic of users is encrypted and bounced through a network of computers hosted by volunteers around the world before it arrives at its destination, thus masking the IP address from which the visitor originates.
Read the original:
Federal Cybersecurity Director Found Guilty on Child Porn Charges
Posted in Tor Browser
Comments Off on Federal Cybersecurity Director Found Guilty on Child Porn Charges







