• MAGA F*cked: Astra (ASTR) Elites Win, Retail Loses

    MAGA F*cked: Astra (ASTR) Elites Win, Retail Loses

    April 2025 statements by founder Chris Kemp only deepen my conviction that public shareholders were deliberately misled while insiders ultimately benefited from the company’s orchestrated failure and privatization.

    The buyout price of $0.50 per share represented a near-total loss for those who invested during or after the SPAC merger, when the company claimed a multi-billion dollar valuation. The timing is deeply suspicious: only after the company finalized its take-private transaction in the March-July 2024 timeframe, acquiring valuable assets built with public shareholder funds (including the profitable satellite engine business acquired via Apollo Fusion) for pennies on the dollar through what founder Chris Kemp cynically termed a “Founder Led Acquisition Company” (FLAC) – bullshit terminology for which I have video evidence – did they announce, in May 2024, winning a U.S. Space Force Space Systems Command contract for the ‘Ascent’ mission. This sequence strongly suggests that public investors were used and discarded once the valuable core of the business could be secured privately by the founders, conveniently timed with securing new government contracts.

    (more…)
  • Knauff Power: Tariffs + Trump Gold Card = America’s Double Whammy

    Knauff Power: Tariffs + Trump Gold Card = America’s Double Whammy

    Can the President act decisively on the Gold Card? The precedent set in Knauff v. Shaughnessy (1950) suggests yes. The Supreme Court recognized an “inherent executive power” over immigration matters tied to foreign affairs and national sovereignty. While Congress typically legislates in this area, Knauff indicates the President possesses authority, especially when national security – including economic security – is at stake. Attracting billions in investment for critical technologies certainly qualifies. This inherent authority provides a pathway to implement the Gold Card program swiftly, complementing the national security objectives of the tariffs.

    America needs more than just a nudge to reclaim its industrial dominance and secure its future. We need a powerful, two-fisted approach: the strategic pressure of tariffs combined with the magnetic pull of high-value investment. It’s time for the “Double Whammy” – leveraging both Section 232 tariffs AND President Trump’s proposed “Gold Card” program to bring jobs, capital, and cutting-edge innovation roaring back to American soil.

    (more…)
  • The Crypto Eradication and Corporate Fraud Retribution Act (Hypothetical)

    The Crypto Eradication and Corporate Fraud Retribution Act (Hypothetical)

    Preamble: To ensure the integrity of financial markets, discourage speculative and potentially illicit activities associated with certain digital assets, and hold accountable high-level corporate executives who defraud investors in smaller public companies, this Act establishes a stringent taxation regime for digital assets and dedicates the resulting revenue exclusively to the prosecution and incarceration of culpable C-suite executives.

    Section 1: Taxation of Digital Assets

    • (a) Capital Gains and Income: All realized capital gains and income (including staking rewards, mining income, airdrops, and interest) derived from digital assets shall be taxed at a rate of 90%.
    • (b) Capital Losses: No capital losses from digital asset transactions may be deducted against gains from digital assets or any other form of income.
    • (c) Annual Wealth Tax: An annual wealth tax of 10% shall be levied on the total market value of all digital assets held by a U.S. person (individual or entity) as of December 31st each year, regardless of whether the assets have been sold or generated income.
    • (d) Transaction Tax: A 5% excise tax shall be imposed on the fair market value of every digital asset transaction, including purchases, sales, exchanges (crypto-to-crypto, crypto-to-fiat, fiat-to-crypto), and payments for goods or services. This tax is payable by the U.S. person initiating the transaction.
    • (e) Reporting: Taxpayers must report all digital asset holdings and every transaction, regardless of value, on their annual tax return with detailed information including dates, values, counterparties (where identifiable), and transaction IDs. Brokers and exchanges must issue detailed 1099 forms for all customer activity.
    • (f) Penalties: Failure to comply fully with reporting requirements or tax payments under this section will result in penalties including, but not limited to, a fine equal to 100% of the unreported assets’ value or unpaid tax, plus potential criminal charges including tax evasion. Egregious non-compliance may result in asset forfeiture.
    (more…)
  • Before RussiaGate: Unanswered 9/11 Questions & the Figures Who Later Targeted Trump

    The official 9/11 story has always been shadowed by intense political maneuvering and questions about the integrity of the investigation. TDS figures involved Robert Mueller and Jeff Sessions then became central to later political firestorms, like the Trump-Russia probe, leading critics to question if patterns of bias or “sketchy” behavior were present from the start. Add the chaos of the post-9/11 Anthrax attacks targeting leaders like Sen. Tom Daschle, and you have an environment ripe for suspicion. Here are the really interesting, specific questions that remain, viewed through that critical lens:

    Questions About the Investigation’s Integrity & Key Players:

    1. The Mueller FBI’s Actions: Robert Mueller led the FBI during 9/11 and its immediate aftermath. Considering his later controversial role heading the Trump-Russia investigation (labeled the “Russia Hoax” by critics), specific questions about his FBI’s handling of 9/11 gain new scrutiny for some observers: Why did the Phoenix Memo warning die within his FBI? Why was the WTC steel evidence removed and disposed of so quickly under his FBI’s jurisdiction? What were the full findings and actions taken regarding the Saudi flights authorized post-9/11? How effectively was the Anthrax investigation (targeting Sen. Daschle) handled by his FBI, and were its ultimate conclusions fully verified?
    2. The Zelikow Conflict & Commission Bias: How could the 9/11 Commission claim independence when its director, Philip Zelikow, had such tight links to the Bush White House (Condoleezza Rice), as highlighted in 2004 reports (CNN)? Did this connection, slammed by critics at the time, effectively allow the White House to steer the investigation?
    3. Political Pressure & Information Control: Were findings, like the “28 pages” on potential Saudi links, kept secret for years due to political pressure (perhaps involving figures like Jeff Sessions in his Senate role then, whose later actions as AG raised questions for critics) rather than legitimate security concerns? Did the White House improperly limit the Commission’s access or scope, as alleged during the 2004 hearings (CNN)?
    (more…)
  • Signal’s Group Verification Blind Spot: An Analysis of Socio-Technical Vulnerability

    Signal’s Group Verification Blind Spot: An Analysis of Socio-Technical Vulnerability

    David’s Note: This article was substantially revised on October 10, 2025 to incorporate new research and provide a more comprehensive analysis.

    Section 1: Introduction: The Paradox of Signal’s Security

    Imagine a team of investigative journalists working to expose a corrupt regime. They communicate exclusively through Signal, trusting its “gold standard” reputation to protect their sources and their lives. One evening, the lead journalist adds a new contact—a supposed whistleblower—to their core group chat. The next morning, their primary source is arrested. The breach didn’t come from a government spy agency cracking Signal’s world-class encryption; it came from a simple, devastating mistake. The “whistleblower” was an imposter, and the journalist, lulled into a false sense of security by the app’s brand, never performed the crucial step of verifying their identity.

    This scenario, while hypothetical, highlights the real-world stakes of a profound paradox. How can the world’s most secure messaging app, the “gold standard for private, secure communications,” become the vector for a catastrophic security leak? 1 This is the paradox of Signal. The end-to-end encrypted messaging application, developed by the non-profit Signal Foundation, has cultivated an unparalleled reputation. It is built upon state-of-the-art, open-source cryptography lauded by security experts and figures like Edward Snowden.2

    The Signal Protocol is the app’s core cryptographic engine. It has become the industry standard, protecting billions of conversations daily across major platforms like WhatsApp and Google Messages.4 The organization is also committed to a privacy-focused mission. It refuses to collect user data or monetize through advertising. This cements its image as a trustworthy bastion against digital surveillance.5

    This celebrated cryptographic fortress, however, contrasts with an unsettling reality. That reality emerged with startling clarity in March 2025. A widely reported security lapse occurred when a journalist was mistakenly added to a private Signal group chat. This group included senior U.S. government officials, such as the Vice President and the Secretary of Defense. Inside this group, officials discussed sensitive operational details of impending military strikes.10 The breach was not a sophisticated cryptographic attack. It was a simple act of human error: a wrong number added to a group.6 This incident exposed a profound vulnerability, not in Signal’s code, but in its use within the complex social dynamics of group communication.

    This report argues that Signal’s group chat architecture has a critical blind spot. Despite its cryptographic strength, this vulnerability exists at the intersection of technology and human behavior. The app relies on a practically unusable identity verification model, which makes high-stakes security failures not just possible, but inevitable.

    The thesis is as follows: Signal’s protocol provides robust end-to-end encryption. However, its group chat design creates a socio-technical gap between cryptographic identity verification and practical user behavior. This gap stems from the usability challenges of manual, pairwise verification in groups. It creates a vulnerability to insider threats and human error that technology alone cannot mitigate. High-profile security lapses have vividly demonstrated this weakness.

    The very strength of Signal’s brand contributes to this vulnerability. The public and even technically sophisticated users develop a monolithic perception of the app’s security. They unconsciously transfer their trust from the one-to-one protocol to the group context. This fosters a belief that the same level of automatic protection applies everywhere. This overconfidence comes from a simplified mental model where “Signal equals secure.” It masks the critical procedural responsibilities that fall upon the user, namely identity verification. This responsibility is manageable in one-to-one chats. In group chats, it becomes practically impossible. Yet, the user’s perception of security remains unchanged. This disparity between perceived and actual security creates a dangerous environment where predictable human errors can lead to catastrophic breaches.

    To substantiate this thesis, this report will proceed through a systematic analysis:

    • First, it will deconstruct the cryptographic fortress of Signal’s one-to-one protocol to establish a baseline of its technical excellence.
    • Second, it will dissect the architectural compromises and design trade-offs made to enable group chat functionality, identifying the precise location of the verification blind spot.
    • Third, it will conduct an in-depth analysis of the 2025 leak as the primary case study demonstrating the real-world impact of this vulnerability.
    • Fourth, it will anticipate and dismantle key counterarguments to fortify the thesis.
    • Finally, it will look toward the future, examining emerging protocols like Messaging Layer Security (MLS) and the broader imperative for designing security systems that are not only cryptographically sound but also resilient to the realities of human use.
    (more…)
  • The MADC ‘Defense Pact’: A Playbook for Evading Accountability

    Universities, nudged by faculty groups and unions primarily within the Big Ten, are floating a plan for a “Mutual Academic Defense Compact” (MADC). The idea is to create an alliance where member schools pool resources to defend each other against what they term “political attacks.” While presented as a shield for academic freedom and institutional autonomy, the MADC looks more like a coordinated strategy to sidestep accountability to elected governments, taxpayers, and the public, particularly regarding controversial programs and policies.

    Breaking Down the Goals: A Pattern of Evasion

    Examining the stated aims reveals a consistent thread of trying to avoid oversight and consequences:

    1. “Collective Defense”: This isn’t about protection in the usual sense. It’s about creating a shared war chest—funded by tuition, endowments, or potentially taxpayer money—to fight back against governmental investigations, audits, or legislative actions. It’s a mechanism designed explicitly to resist accountability measures imposed by elected bodies.
    2. “Resisting Political Interference”: This frequently serves as code for resisting laws, regulations, and oversight that university administrations or faculty dislike. It suggests an attempt to operate outside the normal democratic process where institutions are subject to political (i.e., governmental) direction, especially public universities. Shielding specific research agendas or programs, like contested DEI initiatives, from scrutiny under the guise of fighting “interference” is a direct dodge of public and governmental accountability.
    3. “Protect Academic Freedom”: While crucial, this principle can be misused. In the context of the MADC, there’s a risk it becomes a justification for insulating specific, often left-leaning, ideological viewpoints or controversial scholarship from legitimate criticism and external review, thereby evading intellectual and public accountability.
    4. “Support Vulnerable Communities / Uphold DEI”: The push to use pact resources to defend DEI programs is particularly telling. These programs face significant legal challenges and public criticism as discriminatory, promoting division, and chilling speech. The MADC aims to provide a financial and legal shield to prevent these programs from facing accountability through courts or legislatures, essentially using collective power to protect contested initiatives from consequences.
    5. “Mitigate Financial Pressure”: This goal is perhaps the most blatant attempt to avoid accountability. If a university faces funding cuts due to legislative decisions, declining enrollment, or public disapproval of its policies, the MADC seeks to use funds from other (potentially out-of-state) universities to cushion the blow. This undermines the basic principle that institutions should be accountable for the consequences of their actions and policies, including financial ones.
    (more…)
  • A Question of Trust: An Analysis of Ethereum Classic’s Foundational Security and Its Place on Premier Exchanges

    A Question of Trust: An Analysis of Ethereum Classic’s Foundational Security and Its Place on Premier Exchanges

    David’s Note: This article was substantially revised on October 10, 2025 to incorporate new research and provide a more comprehensive analysis.

    Introduction: The Chasm Between Perceived Legitimacy and Proven Fragility

    A “51% attack” occurs when a single entity seizes control of a blockchain’s computational power. This is not a distant, theoretical risk. Between 2019 and 2020 alone, researchers at the MIT Digital Currency Initiative documented over 40 such attacks on various cryptocurrencies.1 These events represent a recurring and tangible danger to the integrity of many networks.

    When a digital asset is listed on a prominent, regulated exchange like Coinbase, Kraken, or Gemini, it sends a powerful signal to the market.2 This listing acts as an implicit endorsement. It suggests the asset has passed a rigorous vetting process and meets a baseline standard for technical soundness.3 This report contends that in the case of Ethereum Classic (ETC), this perception of security is dangerously misaligned with its documented history of catastrophic, fundamental breaches.

    This analysis will demonstrate a critical flaw in ETC’s security narrative. While protocol changes were implemented after these failures, a key defense mechanism was later deliberately rolled back. This action signals a return to a security posture that has already proven inadequate.

    The core of this investigation is not a philosophical debate over blockchain immutability. Instead, it is a critical risk assessment grounded in empirical evidence. The central thesis is this: a profound dissonance exists between the implied security of a premier exchange listing and the proven fragility of the underlying asset. This gap represents a significant, underappreciated risk to market participants.

    The case of Ethereum Classic in August 2020 stands as a glaring example of this vulnerability. The network suffered three successful 51% attacks in a single month.4 This report will proceed in a structured manner to build a comprehensive case:

    • First, it will establish the foundational principles of Proof-of-Work (PoW) security, focusing on the direct relationship between computational power (hash rate) and network integrity.
    • Second, it will present a detailed forensic analysis of the 2020 attacks.
    • Third, it will scrutinize the primary response from exchanges—imposing extreme transaction confirmation times—and argue this is a localized tactic, not a fundamental solution.
    • Fourth, it will systematically deconstruct and refute the common counterarguments defending ETC’s security.
    • Finally, the conclusion will synthesize these findings, offer a forward-looking analysis, and provide specific recommendations for exchanges, regulators, and investors.
    (more…)