Miguel, aka mickie. Code, Science, Politics, etc.

EN | ES_MX

blog: mugcake.gitlab.io/blog/ (ES/ desactualizado)

pleroma: migue@kawen.space (no existe mas)

mastodon: miguel@mstdn.mx

Mexico-Tenochtitlan

  • 11 Posts
  • 9 Comments
Joined 5 years ago
cake
Cake day: January 22nd, 2020

help-circle





  • By simple logic it is not feasible to have a POSITION in a place that is soon under water (the threat of blowing up the dam is real if the liberation forces are still there). Kherson/Kherson is the city, not the oblast. It’s one thing to regroup (fix to secure more advantageous positions) and another to retreat (surrender leaving critical positions and outposts).

    What I see here is a huge booby trap; a Pyrrhic victory (reconquer the CITY) having already decimated Ukrainian forces, without human (civilian) shields, the adequate distance from your artillery (the local soldiers left but the other rear positions are intact) without the restriction of containing yourself to avoid civilian casualties and the enormous problem of trying to advance across the Dnieper (the bridges are just bait). In fact, it is attached to the strategy described by a Cuban commander who follows and is studying the events of this conflict; weaken the ukronazi positions, not even destroy them in their entirety, just affect them in such a way that they cannot maintain the positions in the rest of the black sea river (with the icing on the cake called Odessa).

    The media even plays for Russia indirectly (they can’t beat the Dombass and now they think they’re going for Crimea lol). Since most of the decisions that are being made on the Ukrainian/NATO side are based more on media consensus than military consensus.







  • It is a double-edged sword: Where is the Apache Foundation registered and operating? In the United States. The company that found the exploit, Alibaba, is Chinese. Even the department that found it (security team) is located in the offices of Alibaba Cloud, in Singapore. In short, the Chinese government was very close to having a tool to seriously damage the Western technology infrastructure, without the other side ever knowing where exactly they were being hit from. And if it had been the other way around? if that information had reached the Singaporean authorities earlier? we must not forget that it is a very servile government to the United States. Or in the worst case scenario the report was intercepted at the Apache Foundation, remember PRISM? one of their goals is to find potential vulnerabilities and exploit them against “hostile forces” even forcing companies registered on US soil and several beyond their borders to leave “backdoors” in their products/systems without public knowledge.

    Fortunately or unfortunately it was reported and announced publicly, without prior knowledge of the respective governments, so neither side gained a considerable advantage in this new field of warfare that is the cyberspace.








  • Officials point to Twitter’s treatment of posts from the separatist leader Nnamdi Kanu, head of the outlawed Indigenous People of Biafra (IPOB) group. Based in the U.K., Kanu uses Facebook, Twitter, and internet radio streaming to broadcast his separatist messages to Nigerians in the country’s Southeast region. The Nigerian government has complained that IPOB’s “hate messages” have been flagged consistently, but Twitter has said the tweets do not violate Twitter rules.

    I think that promoting the separation of entire countries, specially those how are uncomfortable for western countries, are approve for these “social networks” (Think Tanks). The Nigerian government has a lot of contradictions, specially with the Muslim communities, but IPOB, included Boko Haram (With its active propaganda machine in Twitter/Facebook/Youtube of Africa) plan to create Modern Apartheid states worst than IsraHell. In this sense I agree with the Nigerian government to create a sovereign internet.