IP4 TRUTH: The IPocalypse is a LIE
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 122 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/40639 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
DEF CON 197 / 122
3
5
10
11
12
22
23
24
30
31
32
38
43
46
47
49
51
54
56
59
60
62
71
73
76
84
85
88
92
93
96
97
98
104
106
109
112
113
115
119
00:00
Natural numberSelf-organizationSemantics (computer science)Level (video gaming)Forcing (mathematics)Power (physics)MereologyTheoryResultantGodGoodness of fitKey (cryptography)Right angleIdentity managementMathematical analysisLie groupExtension (kinesiology)TheoryPhysicalismResultantExistenceGradientStudent's t-testMessage passingDenial-of-service attackLecture/ConferenceMeeting/Interview
02:34
Medical imagingPie chartLie groupSoftwareSession Initiation ProtocolCommunications systemProduct (business)Alphabet (computer science)Software testingFlow separationComputer configurationDecision theoryCausalityProcedural programmingBitUniqueness quantificationLine (geometry)Ideal (ethics)Extension (kinesiology)MereologyPhysical systemSlide ruleNumberScaling (geometry)Configuration spaceMachine visionGoodness of fitReal numberInternetworkingArtificial neural networkParameter (computer programming)CASE <Informatik>System administratorDistribution (mathematics)AdditionSocial classNational Institute of Standards and TechnologyIP addressPeer-to-peerCommunications protocolAcoustic shadowStudent's t-testElectronic mailing listTraffic reportingAddress spaceInformation privacyClient (computing)Disk read-and-write headNeuroinformatikBlock (periodic table)Multiplication signMessage passingCase moddingSpacetimeService (economics)Interface (computing)Value-added network1 (number)SoftwareTelecommunicationProduct (business)SupersymmetryDivision (mathematics)Uniqueness quantificationExtension (kinesiology)MereologyMultiplicationQuantum stateResultantLocal ringScaling (geometry)Link (knot theory)Arrow of timeInternetworkingSystem administratorSocial classCommunications protocolResource allocationAddress spaceInformation privacyScalable Coherent InterfaceTrailDynamic Host Configuration ProtocolDisk read-and-write headNeuroinformatikBlock (periodic table)IdentifiabilityFreewareUniform resource locatorTesselationSpacetimeInterface (computing)Game controllerLecture/Conference
11:19
Form (programming)BitDeterminismNumberQuicksortAreaRevision control12 (number)Numbering schemeHash functionPredictionElement (mathematics)Multiplication signWritingTablet computerMathematical analysisMereologyCivil engineeringLattice (order)Tablet computer
14:13
Mathematical analysisFormal languageLie groupBitLine (geometry)Goodness of fitInternetworkingTranslation (relic)DemonWordDisk read-and-write headMultiplication signDigital photographyWeb 2.0ARPANETFormal languageGame theoryProgrammable read-only memoryExecution unitInternetworkingStandard Generalized Markup LanguageDemonInternet service providerStrutMultiplication sign
18:13
MathematicsCubeProof theoryMereologyGodRootSquare numberCircleCubic graphImaginary numberWebsiteSingle-precision floating-point formatRotationMathematicsRational numberCubeProof theorySquare numberCircleCubic graphMultiplication signRotationComputer animation
19:14
Mathematical analysisSequenceInformationLie groupNatural numberPrime numberSelf-organizationTelecommunicationFlow separationPrisoner's dilemmaBitSeries (mathematics)Connected spaceNumeral (linguistics)Coordinate systemTheoryPrime idealCore dumpLocal ringNumberAreaRevision controlNichtlineares GleichungssystemPlanningOperator (mathematics)Software bugInformation securityPersonal digital assistantGradientArithmetic progressionObservational studyInsertion lossStudent's t-testLattice (order)Key (cryptography)Different (Kate Ryan album)TouchscreenMultiplication signUniform resource locatorPerfect numberMathematical analysisTheory of relativityType theoryPrisoner's dilemmaConnected spaceNumeral (linguistics)Prime idealNumberEmailRevision controlOperator (mathematics)RoutingNewton's law of universal gravitationGradientInvertible matrixLatent heatResource allocationLattice (order)IPSign (mathematics)First-order logicGame controller
24:28
Berners-Lee, TimRobotSelf-organizationCloningConfidence intervalBitLine (geometry)Group actionTwin primeEmailFamilyInternetworkingOperator (mathematics)Process (computing)Normal (geometry)Strategy gameInformation securityRankingInheritance (object-oriented programming)Lattice (order)Internet forumPoint cloudDisk read-and-write headMultiplication signPublic key certificateWeb 2.0Computer-assisted translationBoom (sailing)RobotSimulationCloningGroup actionTwin primeInternetworkingRoboticsInheritance (object-oriented programming)Address spacePoint cloudLacePublic key certificateLecture/Conference
29:42
ImplementationWave packetVideoconferencingPhysical lawMultilaterationGoodness of fitThread (computing)FingerprintImplementationWave packetDynamic random-access memoryMultiplicationGame controllerComputer animation
31:10
BitGoodness of fitData miningMultiplication sign
31:43
Prime numberTelecommunicationRevision controlGoodness of fitMyspaceTelecommunicationSpacetimeGame controller
32:35
Data structureGroup actionMereologyCellular automatonData structureSoftwareNon-standard analysisGroup actionMereologyCellular automatonInformation securityInformation overloadComputer animation
33:45
SoftwareProfil (magazine)Forcing (mathematics)Power (physics)MereologyQuicksortInformation privacyTrailAuditory maskingService (economics)SoftwareNon-standard analysisForcing (mathematics)AdditionAddress spaceInformation privacyTrail
34:26
Data structureSelf-organizationGroup actionCellular automatonLattice (order)FacebookData structureSoftwareGroup actionCellular automatonLecture/Conference
35:16
Line (geometry)Cellular automatonData structureCellular automatonComputer animation
35:55
Lie groupMathematicsSoftwareState of matterAxiom of choiceProof theoryFunctional (mathematics)NumberProcess (computing)Information securityVector potentialSocial classCuboidGradientCommunications protocolCasting (performing arts)WebsiteMultiplication signValue-added network1 (number)Computer animation
Transcript: English(auto-generated)
00:00
So I did a sensitive nature of this content we've had to present in disguise or assumed identities. I'm Sterling Archer. I am Professor Freaksworth. Or at least that's the identity we'll be assuming. We don't actually believe we are these people. All right, you want to go over the agenda, Professor? Yeah, so the agenda is we'll go over IPv6 is awesome.
00:22
What the hell is it? Did you do this? Oh crap, not again. All right. This keeps happening. There are some powerful forces here. Okay, all right, all right, all right. Thanks. All right, first we're going to go over what makes this theory plausible. We got to have a good foundation of this conspiracy.
00:45
We're going to go over the lies, the technical truth. We had a part, but somebody in our organization sold us out. So we had to redact part of it. It was kind of shocking, anyway. We'll go over some of our research results we can cover, the full truth behind IPv6, the resistance and how you can help,
01:05
and then we'll do questions and probably more likely flee. So what makes this theory plausible? The need for IPv6 is agreed on by way too many people. Even Congress agrees on the need for IPv6, which makes it completely suspicious in our minds.
01:21
People in power generally are out to get you. And we have a shadowy enemy with a hard-to-prove existence, which is key for any conspiracy theory. We've also conducted extensive international research, you know, put in long, long hours traveling around.
01:40
So another thing that we've done is research to provide some evidence that, just personally what I've been working on, collects a lot of data about some thermal messaging that's been hidden... Wait, wait, wait, wait. You mean subliminal messaging? Well, they're basically the same thing. No, they're not. Subdermal means below the skin.
02:02
Okay, well, maybe. You know, we shouldn't be arguing about semantics up here on stage. Semantics? They're completely different. God damn it, you're illiteracy has screwed us again. Maybe we should skip the next few slides today. All right, well, moving on.
02:21
We've got something else that's key for any good conspiracy theory. Blurry pictures of people. In this case, the Queen of England. For the record, I don't think this is the Queen of England. I think it could be anyone. I assure you, it is. Something the professor collected, and he's a little crazy. So, the lies. There are a lot of lies. I think Tivor addresses oxygen as ridiculous. We're going to prove that's completely false.
02:42
The idea that NAT will not work as a solution has been proposed by NIST. Again, a lie. A lot of people think IPv5 never existed. We're going to reveal the truth about that. And finally, the biggest lie is that IPv6 is here to help us. So, the myth of IPv4 address exhaustion.
03:00
There's only 4.3 billion addresses. You know, some firms are buying up these address spaces to hoard them. We'll discuss that in great detail. As well as the artificial scarcity they're creating. And I made a little pie chart here of our estimated IPv4 usage. What's actually in use and what we suspect of being hoarded. Most of it.
03:22
We've also run into the argument that NAT won't work. That NAT isn't good enough. It wasn't designed for production systems and the internet and how much traffic there is. Well, it wasn't designed to close pictures of your cat either. But you're still going to do that. Or your mom. There's no true peer-to-peer communications.
03:42
There's no dynamic configuration. So what? The real reason? NAT is private. Keeps people, you know, keeps activities private. You know, they're less able to track you across different networks. You know, IPv5 never existed. You know, these claims were completely false. It provided a secure, private, anonymous communication system.
04:01
You know, it was awesome. Of course, all the known designers are missing. Researchers we had looking into reproducing this protocol have been injured, severely. Tragically. And we also have IPv6 is here to help with privacy. You know, privacy addresses. The IPv4 devices would use DHCP for moving from network to network.
04:24
That keeps, you know, you get a new address every time. You know, that seems ideal. Why wouldn't you want that? IPv6 devices have an interface identifier, you know, based on the MAC address of your device. You know, the alleged solution is the privacy extensions that are for stateless addresses
04:41
and automatic configuration IPv6. Of course, you know, this is only if a bunch of other devices have IPv6 on that network. If you have very small networks, they're going to track you across them. And that's exactly what they want. The real concern, you know, these small networks allow that. Administrators want to track you in case you do something bad,
05:02
like give a talk on how they're trying to take over the world. And now we're going to go on to the technical truth. So, you know, IPv4 has 4 plus billion addresses. That should be plenty. You know, the address blocks are handed out inefficiently. You know, we should let the free markets decide. Hoarders should be punished.
05:20
You know, and we have a sliding scale for this. You know, and not every punishment is appropriate. So, there are 4 billion, 294 million, 967 thousand, 296 addresses out there. Efficient distribution would result in plenty of space. Millions and millions of addresses could be freed up that are technically exhausted.
05:42
And we're going to go over how that is. There are addresses, you know, they're given out inefficiently. So, there's class A, class B, class C. You know, 3 options is not market efficient. What's even more ridiculous is that there are 26 letters in the alphabet. Why the IETF could not use all 26 is ridiculous.
06:02
When did you put that in there? No, there are 26 letters in the alphabet, right? Alright. Alright, so I made up this nice bar graph, or line chart, which is, you know, helps add legitimacy to our client here of what we believe the hoarding scale looks like. And at this rate, even if we added IPv6, companies would continue to hoard until it plateaued again.
06:26
And then we'd be stuck in the same boat. Yeah, the idea of peak IP is ridiculous as peak oil. It's just a big scam. Microsoft spent $7.5 million on IPv4 addresses. And it's been all over the press. IPv4 addresses will be hoarded for a black market.
06:44
So, one of the things we promised is that hoarders would be named today, and we will. One of the biggest that really makes us angry is Canada. Aaron has assigned over 80 million IP addresses to Canada. There's only less than 35 million people in the whole country.
07:01
And, you know, to be honest, most of them don't even have running water, let alone a computer. So, what in the world do we need that many IP addresses for? Here's another list. At the very top, you see the US Department of Defense with over 280 million IP addresses. Now, that's just the ones we know about. This is from public records, from the regional registrars.
07:25
AT&T has 102 million. Now, granted, they're a big ISP and everything, but still, 100 million IP addresses. Others, Hewlett-Packard has 38 million, the Bluth company has 28 million. Ford Motor has 26 million. This is ridiculous. General Electric, it's a vision of the Sheckhart-Witt company, they have 17 million.
07:43
Now, one of the things that we found very suspicious in our research was the DOD has 280 million IP addresses. It's very close to the number of people in the United States. These are all true facts. So, we started wondering why. And the most logical conclusion we could come to is they're being used to track people.
08:03
Each person in the US, or at least most people, have an implant with an unique IP address. And as the population grows, the Department of Defense is going to need more IP addresses. So, we enlisted one of the professor's graduate students and took some imaging of their skulls. At first it looked pretty normal, but if you notice the lower right quadrant, there's a bit of a shadow.
08:27
We inspected it, we managed to extract a device from the patient that was a small little chip that had been embedded into their head. Unfortunately, the person died and we weren't able to figure out what exactly it was for.
08:40
We think it probably released some poison or something, and that's why the person died. We're pretty positive we figured it out and can remove it safely. So, if you'd like to be checked, I have a van out in the parking lot providing that service and many other medical procedures. I strongly recommend that you do not go out there. He has no qualifications at all to do this. That van is basically a rolling probable cause. I would not get even without 100 yards of that.
09:04
So, we also did an IP address audit. We wanted to see where things were distributed. In addition to the hoarders, we wanted to see where everything was allocated. If you add up all of the IP addresses from the registrar's, ARIN, RIPE, etc., you come up with about 3.5 billion IP addresses.
09:21
Almost 600 million are for various reserve networks defined in RFC 3735, private address space, local, local host, so on. But if you add these up, you're missing over 200 million IP addresses. Where are they? Now, some people in the IP for Truth community think that, as part of the conspiracy, they're being hoarded.
09:43
Now, to be honest, I have to blame this on RIPE, because I've seen a lot of network penetration test reports from RIPE. For IP address space, it's clearly in Europe, but they don't know a thing about it. So, I think that if the Europeans got their act together and started recording IP addresses correctly, we wouldn't have that problem. So, how are we going to stop people from hoarding?
10:03
Public shaming isn't enough. Some people think that, you know, you just throw somebody up in stocks, and they're going to be embarrassed, and they're going to stop doing it. Being pelted with tomatoes is not going to stop this problem. We need to do something more severe. Now, depending on how many IP addresses you're hoarding, if it's a class C, I say, douse them in honey and feathers. It's embarrassing, but it washes off easily.
10:22
It's no big problem. Class B, you're talking about 65,000 IP addresses. There, you've got to go with pitch or with super glue or something, because you're going to have to scrub really hard to get it off. But, for the class A, it's over 16 million IP addresses. You've got to do boiling tar and feathers. Drive the message home. However, another option is torch and pitchfork, pitchfork mods.
10:48
We were talking just the other day about how they're very unfairly portrayed in movies as being irrational and of no use. But, really, they serve a very useful purpose in preventing unethical behavior and research. We have a very rich historical tradition that we should not be abandoning.
11:03
If a thousand people with torches and pitchforks showed up in front of Hewlett-Packard, you better believe they're going to relinquish those 38 million IP addresses. I take a fourth shot. All right, well, here we have part four, which has been redacted. So I just replaced this slide with a nice picture everyone can enjoy. Moving on, the full truth. Who's not to blame?
11:23
Highlighted ancient texts we'll go over, numerological analysis, we'll discuss the secret meetings, where they've been meeting, what they've been talking about, intercepted communiques, the actors, and, of course, the nefarious cabal. So, the first thing we want to make clear is the Irish are not to blame for this conspiracy.
11:44
There's a fringe element of the IP for truth movement that blames the Irish, and that's not fair. To be blunt, those people are racist. We're not racist. They think that it's some sort of scheme to get revenge for the potato famines. It's not the truth. The caricatures of the so-called Simeon Irish that were popular in the 19th century
12:02
became very inappropriate long ago. It's a shame that some people in the IP for truth movement are trying to resurrect them. And really, we shouldn't be judged on the fringe. Every movement, every truth has some sort of fringe element that is crazy. We're not crazy. Please don't judge us by the racists.
12:21
So, there's a number of prophecies throughout history that have foretold the damage that IPv6 would do to our world, and how IPv4 is really good. We're going to talk about the Tatar tablets, which are some of the earliest forms of human writing from 5300 BC. We're going to go over Mayan texts from 250 AD, which is the very end of their civilization,
12:44
probably not a coincidence. There's a Mongolian prophecy from the 12th century AD. And then finally, we're going to talk about a Portuguese prophecy that's a little complicated. You'll see in a little bit. So, this is the Tatar tablet. You can go look it up on the internet, some of the earliest form of human writing that's known.
13:03
And it's been analyzed by archaeologists for a long time. It's a little hard to see in this. It's 7,000 years old. So, this is a black and white version that's a little easier to read. Now, archaeologists have been able to analyze this compared to other cultures in the same area and whatnot. It's from what is now Turkey.
13:23
In the lower left-hand quadrant, they've identified these symbols, these pictographs, as corresponding to a time of plenty, where the crops were good and hunting was good and whatnot. The lower right-hand corner is a time of death where there was fires and starvation. To be honest, I don't understand how that works, but I'll trust the archaeologists.
13:45
One thing they've always been puzzled about, though, is that the top, on the left, associated with the good times, was four hash marks. And on the right, associated with the bad times, was six hash marks. Now, this is not conclusive evidence. I'll be the first to admit that.
14:05
It could mean a lot of things, but it kind of makes you stop and wonder. It was our doom foretold 7,000 years ago. Something that's a little bit more obvious comes from the Mayans, much more recently, a little over 2,000 years ago. Like I said, almost 2,000 years ago, at the end of their civilization, there's a photograph of it.
14:27
The translation is, in the time when great talking spreads across the land, the false prophets of six will try to lead the people astray. They will make great promises to seduce the followers of the four.
14:41
But beware, the six is a demon that will bring only great darkness. When it arises, the demon will desolate the land and only the false prophets will prosper. I think it's pretty obvious that... That does not sound promising. No, not in the least bit. So, there's also a Mongolian prophecy. This is from 1134 AD.
15:02
Now, this is fragmented. As you can see, this is a photograph of one of the... I think it's a parchment or something along those lines. There's damage, so there's pieces missing, but you can still get a pretty good picture of it. Some of the highlights are that it correctly identifies the invention of the internet and the World Wide Web.
15:22
Now, the Mongolian 17-year calendar has animals associated with it, and they correctly line up with the actual dates when the internet was invented and whatnot. It refers to the fourth in the six languages. I mean, obviously, 800 years ago there wasn't, or 900 years ago, they didn't have a word protocol,
15:43
so you have to realize that they're struggling. These seers were struggling with their limited language to describe modern technology. So, it's a little long. I'm not going to be able to go over all of it, but for example, the beginning of it is in the year of the fox, which matches up to the year the internet was invented, was the year of the fox. The army, DARPA presumably, of the great nation of the west,
16:06
something maybe builds relays across the world, and the great nation will become greater. And the merchants of the world will see the relays, so the great nation will share the relays with all the merchants. Now, obviously, DARPA eventually started sharing the internet with merchants.
16:23
It goes on to talk about how corrupted men of the world will want to destroy the signals, that they realize that the evil men invent a sixth language for the signal relays, but they were ignored because the army and the merchants realized that the language was good.
16:44
So, this is the last... And with great fear, the evil men will see that the people are gaining wisdoms. They will redouble their efforts to destroy, like, the evil men will spread a great lie across something web,
17:00
something fourth language is simple and only for the stupid. And the army and the merchants will be fooled by the evil men, and will begin to speak the sixth language. The evil men will rejoice for their domination of the world, and the destruction of something is nigh. And we don't know what that something is. It could be the internet, it could be the world.
17:20
I think we can agree that it's something we shouldn't find out. So, we have the Portuguese prophecy. This is a little complicated because we can't actually show it to you. Now, we're risking our lives to bring this to you. I mean, we obviously were in disguise, but there's still a lot of risk associated with it, but there's some things that are worse than death. The Portuguese prophecy, the text of it,
17:40
is in the possession of the Church of Practicology, which is that cult that was started by Stan Lee. Well, I don't want to offend them. It's the alien king that lives inside Stan Lee's head. Yeah, okay, whatever. Anyway, they have a copyright on it. We can't show it. It's very unfortunate, but we have seen it, and we've been able to perform a lot of analysis of it,
18:02
provide some clues about decoding the RFCs of IPv6, and most importantly, it reveals how ball members that are controlling IPv6 can be identified. So, we also want to talk a little about TimeCube, because TimeCube, while it's not directly related to IPv6,
18:20
there is a lot of truth that Gene Ray has put on his website. So, for example, if you're not familiar with HIV, this is from their website this morning. TimeCube math is absolute proof you are retarded. You can't comprehend fact that Cube 4 simultaneous 24 hour day, it goes on, timecube.com. So, also, there's some more excerpts. Full rotated square will create 16 corners, 96 hours,
18:43
4 simultaneous 24 hour day circles within the single imaginary cube root rotation. This is the important part. 4 rotations in a 24 hour day are good. Obviously, IPv4. 6 rotations is educated stupid evil. IPv6. 1 corner day equals evil.
19:00
4 corners equals 4 corner days. Evil one day, God claims, corrupts all academia. 96 hour cubic day debunks one day as witchcraft. Clearly, Gene Ray is a modern day seer. Math does not lie. No, yeah, exactly, math does not lie. So we did analysis of 6 as well. Brand 6 was a Nazi official in charge of directing police operations in Germany.
19:25
They successfully invaded the United Kingdom. Coffins are buried 6 feet underground. Coincidence? Maybe. MI6, also referred to by the nickname 6, the secret intelligence gathering organization. 6 in Roman numerals is VI, so we think there may be some anti-anax connections as well to this.
19:49
We also did some further studies. Area 51, 5 plus 1 equals 6. The Mayan prophecies, prophecies again. The world is supposed to end on 12, 21. 1 plus 2 plus 2 plus 1, 6.
20:02
6, 6, 6. Obviously. 360. Again, another number in nature. Divided by 6 equals 60. Divided by 6 equals 10. Divided by 2 equals 5. That makes no sense. Oh, sorry. 6 plus 6, 12 sides of the satanic zodiac. The prisoner was number 6. Are you ready to pick up again?
20:21
I pick up again. Okay. Okay, as a perfect number, 6 is related to the mezzanine prime 3, since 2 times 2 squared minus 1 equals 6. The next perfect number is 28. It speaks for itself. This is you again. Okay, why are all public versions of IP composite numbers?
20:43
Obviously, not a hatred of even numbers since there wasn't, you know, a 2 wasn't used either. But we have IPv4 to IPv6, you know. What's wrong with prime numbers? I have a theory that because prime numbers are used for encryption, they think that it's secure or something. I don't know. That's just a theory.
21:00
Makes me think. So we mentioned the RFC numerological analysis. Now there's five primary RFCs associated with IP version 6. There's a lot of peripheral ones, but these are the core five. So if you take the numbers of those RFCs and then look at the differences between the numbers, while they're incremented, you come up with four. Now, clearly, 2635 is a little bit of an anomaly,
21:21
and we haven't think about this one for a long time, but if you drop the two off and reorder them, it makes a lot more sense. So we're able to extrapolate this out into an equation. It was a little complicated, and from that equation, we were able to obtain the whole sequence. Now, this is just the one we can put on the screen. Obviously, it'll go on to edit an item.
21:42
Once you take these numbers and put them into or extract the characters from RFC 1883, the original IPv6 specification, you come up with the text. When you parse it out a bit, some plans become clear. We will control all, and then a series of what are obviously longitude and latitude coordinates,
22:04
and a year. We map these out, several number of cities. Now, the weird one is the fourth one, because the 2002, there's just six numbers, or, excuse me, seven numbers, and we're not exactly sure why there's seven numbers instead of longitude and latitude coordinates.
22:22
There's some fringe people. Well, what's your idea, professor? I'm a fringe person, yeah. Yeah, he thinks that it's a stargate coordinates. I think that's crazy, but we do have some evidence in a minute here. So what are these meetings? We gathered information from using mostly disposable teaching assistants.
22:43
Prague, 1991, initial meeting to push IPv6, then 10 years old. Determined fear must be used. What better place than Prague? I believe they're going to reopen the torture of capsules. In fact, we may still have some students there. We should go check. London, 1996, second meeting to push IPv6, then 15 years old.
23:01
Capital is needed to acquire resources and create an artificial scarcity. Misinformation campaign begins. The queen joins the cabal. Boston, 1999, discussion on learning from the Millennium Bug propaganda. Just lies, nothing but lies. What happened? Nothing. Fear tactics of people losing access to pets.com or short-lived.
23:27
Secret meetings, unknown location, 2002. Key players of the cabal meet. Pictures smuggled out of location at great cost. Communications with grad student loss before location disclosed. Possible they just got drunk with friendly locals who were also great hosts.
23:41
If anyone knows this location, please contact us. It's critical. Outside Vienna, 2004, emergency meeting. Researchers and unknown government agencies suspect foul play. Evidence of a resistance is discussed. Our lives are put in danger for the first time.
24:01
Live blocking of subjects like friends, foul movements... Sorry. We're moving on. Miami? Want to talk about Miami? Okay. I think I can. Progress meeting in Miami, 2010.
24:21
Police actively providing security for the cabal. Our last gullible TA is discovered and we really have no idea why. The actors. Who is behind this? We discussed the cabal, but it may be the nanobots. XKCT tried to warn us.
24:42
Devices needed to address and communicate with nanobot cloud consisting of more than 4 billion bots. Consumption of all matter, earth matter, is now imminent if IPv6 goes ahead. They may be controlling the minds of the other players, including the cabal. If you go to the XKCT website, look at the cartoon, go to the forum... This is not something that most people in the IPv4 truth community believe.
25:06
The professor is very impressionable. Every time he goes to XKCT, he just thinks it's the truth. This is really garbage. So, what do we know about the cabal? We've been able to gather a fair amount of intelligence from analyzing the prophecies, from the agents that we've snuck into their secret meetings.
25:22
We know they wear funny hats. They're evil. They were originally composed as a pentaverant. The Vatican, the Queen, the Gettys, the Rothschilds, and Colonel Sanders. Yeah, before he went tits up.
25:41
So, who's in the cabal? We know that Vint Cerf is. This is a very funny hat that he's wearing here. He looks ridiculous. He invented most of the internet. It sounds like a made-up name. It's Vint Cerf. I mean, you might as well go by something like Ulysses Q. Albuquerque. It makes no sense. Where was he really born, though?
26:02
We have tried to find his birth certificate. He will not tell us. He won't give it to us. It makes us very suspicious. Supposedly, he was born in the United States, but with a name like that, I don't know. It's a mystery. Tim Berners-Lee. Also wearing a funny hat and a weird robe. He invented the World Wide Web.
26:20
He was made Knight Commander of the British Empire. There was a lot of suspicion at the time, the I Truth For Truth community, that this was done to buy his silence, to make him happy. Perhaps he was just disgruntled with the cabal. Since then, he's fled from England. He now lives in Cambridge, Massachusetts. We have some evidence of the theory that we're going to be revealing in a little bit. Sub-Commander Marcos, also known as Mark Mueller.
26:42
He was adopted in Brazil. His biological parents are unknown. We know he's of German ancestry, and there's some evidence that he may be a clone. And finally, the Supreme Commander of the Cabal. We don't know his name. He wears no hat, but he has larger lace cuffs,
27:01
which presumably is significant of his rank. He's probably a vampire based on how he looks. And also, we think he might be Strom Thurmond's secret twin brother. So we've intercepted some communiques, as I said. This is from something I gathered from a honeypot operation down in Miami.
27:22
This is originally an email from Sub-Commander Marcos to Queen Elizabeth. It says, Elizabeth, Berners Lee is getting restless. This is from 2001. And unhappy with our strategy. He hasn't threatened to leave yet, but I'm afraid that he will. That will be next. He can be a valuable asset, so I'd rather not kill him. Perhaps if you give him some kind of honor, he'll at least keep his mouth shut.
27:43
And then she replies, done. I'll make him a KBE. I love people calling him Sir Tim. Elizabeth Regina. Yeah, they have a confidentiality note to bond to, which is kind of weird. Also, there's a lot of ties between the cabal and the information security industry because basically they're afraid that we're going to find out the truth,
28:01
like the professor and I did. So they try to keep people in line. This is an email that was discovered, one of many emails discovered, from the cabal to the head of a large research organization in the information security industry.
28:20
The Supreme Commander says, Nick, you've been doing a great job in suppressing IPv6 research. You'll be richly rewarded. I'll be sending you some more agents soon. And the guy replies, thank you, sir. There are some troublemakers that may need to be addressed. We'll dispose of the bodies as normal. We're hoping this isn't us, but it's one of the many reasons why we're protecting our identities today.
28:41
So what else has the ball done? One thing that we know for sure, because of interrogations of a captured agent, they killed Paul McCartney. This was leaked out by the Beatles. I've covered it. I think everyone knows that. Paul's not wearing shoes there to show he was killed. We know that they killed him, but we're not sure why.
29:02
One thing that's been tossed around that hasn't had a lot of evidence is that because there were four Beatles, they felt somehow that was the support of IPv4. They're kind of crazy. We don't really know why. What other nefarious actions have they done? They rewarded Al Gore with inventing the internet. Then they punished Al Gore for not supporting IPv6 once he joined the resistance.
29:21
And now he's doomed to live out the rest of his days in the Capilla fish jar. Other actions? Wait, what the hell? That was told to you in confidence. We have to get the truth out. They also killed this cat Schrodinger. I'm also gathering a lot of evidence that the TSA, I think we know who controls the TSA, stole one of my socks on the way here.
29:43
So what other initiatives is the Cabal undertaking? Well, this is something that has Cabal fingerprints all over it. This is an article from the Telegraph in 2007. Scientists develop remote-controlled pigeon. Why would they want to do this? Well, that's what the professor and I were wondering when we first saw this. And basically what we've decided is that the experiments on birds are multi-purpose.
30:03
One, this is tied to some brain monitoring, controlling efforts that we'll be discussing in more detail later. And it's also tied to advanced implementation of RC 1149. Obviously there's some serious ethical considerations with experimenting on animals. Ignoring the serious ethical considerations, we have the obvious violation of international bird law.
30:22
They're using a land-based bird, which is illegal, which we then decided to use a seabird, which is totally illegal. It's our legal tender in many countries. So the professor and I pondered what to do about this, and we came up with a solution. Pigeons are very hard to catch. This is some documentation from one of our early experiments.
30:41
It was very promising. We trained a pelican to deal with a pigeon thread. Starting to turn around for the resistance, thinking for looking good. We were very optimistic that this was going to be an end to the Cabal's pigeon research.
31:04
Unfortunately, one of our agents was involved, took a video at a Cabal training facility, and smuggled this out to us. This was just heartbreaking. This is one of the pelicans that was trained by the professor.
31:22
So you can see Sadorca, killer whale, eating it. And they just ripped it to pieces. That pelican was a good friend of mine. All that was left was just flooding bits and chunks by them, and they weren't done. We don't know what to do. Every time we seem to make it in advance, they come up with something to stop us.
31:45
Other Cabal initiatives, they're tied to MySpace. Well, they can't all be winners. That's good news, because it shows they can be defeated. They have funded research of the brain monitoring technology, implanted electrodes, FMRI, etc. So what's in the future for the Cabal?
32:02
Well, monitoring all community-based communications is pretty clear. I mean, if they control the protocol, they can monitor whatever they want. They can also plant thought-monitoring chips into every human. That was one of the main purposes of the pigeon experiments. We have strong evidence that, unfortunately, we're not ready to reveal yet, that IP version 7, or version 8, depending on what they go with,
32:22
it's not really clear how... Depending on your prime number of conspiracies. Right, exactly. Yeah, they're just going to support thought-control tips, which is just horrifying. So, the question that we have next is, is this just the tip of the iceberg?
32:42
What else are they going to be doing? It's terrible. CIA NSA roundups. The need for anonymity. Avoiding social networks. Sorry, face plus. Distributed cell structures. First, the CIA NSA roundups.
33:01
You know, there's a suspicious absence of anti-IPv6 groups, of all the protest groups out there. Why not any anti-IPv6 ones? Why is it just us? Doesn't make any sense. They have not yet denied, you know, internment camps for IPv6 resistance. We haven't really asked them just to be on the safe side. Yeah, we don't want to... Seems needless, okay.
33:21
We, you know, would redress like this if it wasn't required. Yeah, our corporate role is not fit to build. We had to buy these disguises ourselves, because they're probably part of the conspiracy. Also, I took this hotel from my hotel room. There are black helicopters flying around Las Vegas, and I called down to the front desk, and they insisted that it was just tourists,
33:40
but I think that's good to baloney. I mean, clearly, they're monitoring me. The need for anonymity. We're going to use a Guy Fawkes mask here, but that's sort of been ruined. Oh, sorry. IPv6 forces implementing this technology in no small part to track you.
34:01
We've covered the privacy concerns, but additional steps need to be taken. You know, TOR may be comprised of powerful NSA networks. It will be, yeah. Avoiding social networking. Voluntary tracking of social activity seems harmless enough, but, you know, tying social network profiles to IPv6 addresses, which are tracked from network to network,
34:22
eventually, no anonymity. It doesn't matter which Face Plus service you use. So, avoid social networking. Most of the groups and clubs you see on Facebook about opposing IPv6 are just traps. I mean, to be honest, only a moron would join something publicly. We did not start that. No, this is probably run by the cabal or some agency they control. Anyone that joins it's going to be monitored
34:41
and eventually rounded up for an internment camp. The most damning evidence, Face Plus didn't invite us to their speaker party. Clearly, they're afraid of the truth. You can't explain that. So, one of the things that we suggest for, you know, keeping the resistance strong is to use a distributed cell structure. Really gets a bad rap
35:01
because of its use by other less honorable organizations. Make sure that cell members aren't federal agents. That's really important. Or cabal agents, even more important. Don't trust anyone. Probably the safest cell structure is just a cell of one. I did some research on distributed cell structures, and it's really kind of confusing.
35:21
I don't really understand what these are supposed to be. That doesn't make any sense at all. Well, I know. I agree. So, like, I pulled these off of Wikipedia, and I don't understand how it works, but probably being in a distributed cell is the best way to avoid being killed. So, why did we do this? The truth must be told.
35:40
You know, the cabal must be stopped. They're evil. Also, only animals wait in line for two hours for badges. Okay, any questions? All right, we are leaving it.
36:00
Oh, yeah, question, yes. Yeah, I opened the box. I did. I destroyed the state, the wave state. Anyone else?
36:23
You never tried to throw us off. You must be with the cabal. That sounds awfully suspicious. They are not fake. This is the truth. You're just trying to cast doubts in this. Did you see the math we used?
36:42
Yeah. The numerological analysis, I mean, we spent a lot of time on this. You can't make that up. Yes. Well, the professor did that, and at three...
37:01
That sounds like a cabal lie. Yeah, I agree. I have to say that that's very unlikely to me. Anyone else? Yes. That is also a violation of protocol. Yeah, it is. Clearly, and it's evil, too.
37:21
Yes. Oh, damn, I didn't think of that. Thank you. You want to be a grad student? Speaking the truth is obviously a coincidence.
37:49
Yes. So, what's that? Not from us, but you'll be doing a good deed. The question is if you get a T-shirt for spotting the cabal.
38:02
Just take them back in the alley and beat them. Yes. They should, but it's pretty clear that the cabal has completely infiltrated Congress. I mean, they act like a bunch of morons. That's the only explanation.
38:21
Yes. Sorry, say that again. What? Gibberish. Probably brain-controlled malfunction. Yes. Sorry, what's that? You'd be surprised.
38:41
That's the professor's van. I don't drive a panel van because I don't need to do things in that. Yes. Sorry, what? No, there's enough of us here where there's strength in numbers. They cannot kill us all. Well, they could, but... We have to take the risk.
39:01
It's worth it. We have to take the risk. Yes, you're the ugly one in the front. Uh, yeah, again, that's gibberish. We've got more brain-plane functions. We believe there's a paperwork mistake. Lies. A lot of lies.
39:20
Yes. Goddamn. No. We should have had better security here. Anyone else?
39:42
Anyone? You can get them at any hardware store. Pitchforks. Torches are harder to find than pitchforks, but you look up on the internet, I'm sure there's a website that'll show you how to make torches.
40:01
Anything else? Uh, no, that's just proof they're after us. Yeah. I believe that's a threat. That's like leaving a dead horse in somebody's bed. Or a mannequin tent. Yeah.
40:21
Uh, that is true. There are some three-pronged pitchforks, too, but yeah, the fourth ones are clearly what we'd need for a torch and pitchfork job. Sounds like a crazy question to me. I don't think so. Well, nobody asked what you had to say. Yes. How much was your black turtleneck? Uh, well, this was, uh, okay, it's hard to say.
40:40
This is a tactical black turtleneck. This is one of the extra dark ones. It was, uh, $700 and well worth it. I, I mean, I'm not, I didn't invent the turtleneck and I don't claim that, but I wasn't the first to recognize its tactical potential. No.
41:01
No. He's just a tool. Yes. Apple has a Class A, uh, network segment. They really do. Why are you using Apple? It's not my choice. Okay, anyone else?
41:22
Alright, thank you very much. Be careful.