Water is the very essence of life, and yet we so often take it for granted. Join three very diverse speakers, each with their own way of working with water, for a fascinating day as we explore and experience the Science, Consciousness and Healing Power of Water. Venue is Sedgwick Park House, a beautiful Grade II listed manor house near Horsham in West Sussex. Some sessions will be held in the ballroom and others in the extensive park-like gardens and grounds. The day will include a practical demonstration of tracking Geopathic Stress and using Earth Acupuncture to cure it; your chance to try your hand at dowsing; and at least one water ceremony, as well as plenty of time for discussion, questions and answers. Speakers for the day are international speaker and independent water researcher Matt Thornton; professional Geomancer Richard Creightmore and Jeremy Jones, Senior UK Consultant for Grander Water. Places are limited – book yours now by calling me on 07597 020 512 or emailing me at: firstname.lastname@example.org Tickets are £45. Light refreshments will be supplied, you are invited to bring your own lunch.
The latest newsletter, for March 2019, is now available – as usual, lots of events to choose from, including informal meet-ups; talks and workshops, and information about a wide range of topics from Mister Marmite’s IT Techie talk to our discussion group in February to helpful details on EMF stuff.
This is perhaps the first large corporation that has been directly involved in espionage on an epic scale. not only has there been a problem with their corporate technology 5G but also with there personal technology. Phones
With the internet of things becoming a reality then 5G is going to be something that will be happening. In fact i o t has been designed with 5G in mind.
I guess you do have to ask why we need a fridge connected to the internet?
Russian users of the Dark Web
Hackers (Bad Guys) are often looking for one item of data, from there it will be harvested and later when more data is available an evil plan hatched to use it.
It is quite rare for a whole set of data to be picked up from one machines or data breach.
Data spread across several sources is as valuable. Getting access to full data sets is hard, simply because information is held in several places, different parts of the same system.
Do you understand ‘relational databases’?
Access to nectar card information could indicate when you are at home or on holiday. Because of shopping patterns. Real time pricing or demand pricing is being trialled by Tesco.
Password security is important for control of your data.
If a bad guy can get access to one of your accounts, then making sure you have a proper password policy it will mean that they only get access to one and not all.
Not having the same password, is a fundamental.
Using long passwords – something you have, something you know. Is vitally important if you are to maintain a degree of online security. More to come on that.
What Are You Protecting?
You need to work out what you are trying to protect and what the downsides are of losing the keys to unlock that data. Would it be unfortunate to lose access or a disaster?
GMAIL/FACEBOOK/Outlook all allow a third party to have access in case of disaster, so does Lastpass, you can also share data within the lastpass package – great for giving access to family.
What is Lastpass and how how good is it?
Understand these terms
Encryption – the process of converting information or data into a code, especially to prevent unauthorized access. “I use encryption to protect sensitive information transmitted online”
Lock data – encrypt
Unlock data – unencrypt
Secure transfer – moving locked data around.
Explanation of how Https works – a series of locks and keys only using data and encryption tools.
There is a big problem for those that want to spend time and money trying to un-encrypt data and files.
They will never know that the data they end up with is correct.
Dependent on the algorithm used – the output could be wildly different.
Importantly, spoof containers can be used along with ‘gun to the head containers’ – some information but not all.
Simple Tips You Can All Use
Can install software inc viruses
Non admin user – needs permission
Always run as a non admin. First base covered.
I no longer run any Windows or Apple machines – just don’t trust them, plenty of alternatives like Linux – nearly all of the internet runs on Linux.
Bits of paper.
Don’t ignore the use of paper – physical things have to be picked up.
Man in the middle/ Phone/ Key Loggers – all are very much in existence still but they can’t read bits of an A5 pad in your lounge.
If you can see it on screen then a screen capture bot/logger can capture it.
On windows do a crtl-alt-del buttons to find out what software is running on your computer
Operating System On A Disc – Ubuntu or Slax
An operating system on a CD/DVD means nothing can be written to the CD/DVD therefore you’ll never been infected – low to nil risk of hacking. Online banking etc.
Will fit on a USB stick – boot from that and you’ll have a secure operating system to work with. Really very safe but a bit of fiddle to get started.
Download, install and use. Great for online banking as nothing is recorded locally – no write to disc option.
Secure internet browsing and https. How does that all work and why it’s so powerful?
Https – SSL secure browsing and secure messaging.
How does it work – with a secure browser and peer to peer technology (read computer to computer) your connection is not only secured but bounced around many hundreds of networks with each connection being encrypted – locked.
Freenet or I2P are other networks. Tor is about the biggest. All secure TOR sites end in .onion
Porn/Drugs/Sex offenders – some really bad stuff.
Secure drop for sharing files – a simple word document, dropped securely is a good communication tool.
Also secure sites that use encrypted content are plentiful.
Most contain information that most of us wouldn’t want to see.
You may have seen something like this.
This kind of login is at the server level, no files on this machine are readable without a password, there may also be ‘user level’ folders once inside. Simple to do, keeps out most of the bad guys.
Any web data may also be fully encrypted and locked down on a web server.
It’s about the DNS – Domain Name Server – Protecting Your Movements.
This is how your computer/phone/tablet connects to the net.
Internet connection – always uses a DNS – it’s translates www.bbc.co.uk to 188.8.131.52
By using a different DNS you can be sent to pre checked sites – preventing malware and virus from infecting your computer, cross site hacking is also prevented – automatic safety and of course free.
Most machines will use a Google DNS server, some Apple etc etc
If you use A. N. Other you can block sites using your online account and control what is seen on your machines – it won’t stop your internet service provider from seeing your requests – court order required for release of data, some shared automatically.
Open DNS – Computer/Router
Quad 9 – Computer and Router
Google and ISP’s may set your DNS settings automatically. Which means your data and search records are available to them.
It’s not definite that Open DNS and Quad 9 are sharing data.
Easy to use, safe, but you need to know where you are headed. Or use a search engine like
.tor browsing is safe and secure – darn hard to trace and each user protects the other.
Effectively a tunnel through the internet, you can’t be seen. It’s the same as a secure certificate – but for you alone. You can get these from a number of dedicated sources, search for VPN.
Beauty is you can protect yourself by releasing as little information about you, including location, IP (internet protocol) address – a sure way of I.D’ing you online.
Imagine browsing inside one of those long tunnels in the seaquarium – you can see the fish, the fish can see you – but can’t touch – that’s a VPN – also with a VPN your details are hidden – others know you are there but don’t know anything else. Harry Potter invisibility cloak (ish).
Also make sure your router is up to date – much of the data sniffing is done through routers now. Change password, router name.
Two Factor Authorisation
Should use for all logins, via SMS or the Google Authenticator App.
Secure email and encryption, the options, software, problems.
I love PGP – Pretty Good Privacy.
PGP Banned for use inside the USA, still not sure if it is or not.
Can be used for files/email/images.
Shortly after its release, PGP encryption found its way outside the United States, and in February 1993 Zimmermann became the formal target of a criminal investigation by the US Government for “munitions export without a license”. Cryptosystems using keys larger than 40 bits were then considered munitions within the definition of the US export regulations; PGP has never used keys smaller than 128 bits, so it qualified at that time. Penalties for violation, if found guilty, were substantial. After several years, the investigation of Zimmerman was closed without filing criminal charges against him or anyone else.
PGP America has banned this under Military Weapon rules – not so strong now since Zimmerman released the source code as book, which every one used – cut it up and scanned it into some free software and compiled it.
PGP released as a book were not banned under the American constitution.
Now owned by Symantec.
To use, create a private and public key, submit your public key.
It was taken down for a reason. It is a very good package for home/small business use.
It’s still available and is very effective, so much so the U.S Gov was going to force a release of it’s “source code” instead the guys that owned it decided to pull the plug on it. The last known copy is here. It’s very effective for securing data – probably overkill for personal use. More importantly is not hard to use which is why I like it.
In terms of its use, when a container is created ‘variable data is use’ which makes it very, very hard to break. Entropy
Entropy – a lack of any order
Some downsides, it may not be supported in the future.
Public Keys/Private Keys
An easy way to secure and secure emails.
In cryptography, a public key is a large numerical value that is used to encrypt data. The key can be generated by a software program, but more often, it is provided by a trusted, designated authority and made available to everyone through a publicly accessible repository or directory.
Your public key is used to send information to you.
You will send information to a third party with their public key.
With the private key you can view the encrypted data.In cryptography, a public key is a large numerical value that is used to encrypt data. The key can be generated by a software program, but more often, it is provided by a trusted, designated authority and made available to everyone through a publicly accessible repository or directory.
Digital Signature – like signing with a pen only safer the above digital certificate can be used to sign documents/files/emails – verifying the owner/sender.
Types of Encryption
AES. The Advanced Encryption Standard, AES, is a symmetric encryption algorithm and one of the most secure. …
3DES. Triple Data Encryption Standard, or 3DES, is a current standard, and it is a block cipher. …
Twofish. Twofish is a symmetric block cipher based on an earlier block cipher – Blowfish. …
Alternatives for secure messaging.
Use a Word Document and Strong Password/Libre or Open Office – same result. Use a large password.
In Office 2007 (Word, Excel and PowerPoint), protection was significantly enhanced since a modern protection algorithm named Advanced Encryption Standard was used. At present there is no software that can break this encryption. With the help of the SHA-1 hash function, the password is stretched into a 128-bit key 50,000 times before opening the document; as a result, the time required to crack it is vastly increased.
Later versions of Office use even better encryption – a simple password on a Word Document means – very few people will ever see it.
Also applies to Libreoffice.
You can share documents and messages via an email account – simply set up a free account. Log in, create a message, save it in drafts, send the account login in details to the third party, they can read the message and create a draft in reply.
No one knows you are there – Al Qaeda/ISIS trick.
Whatsapp/Telegram – banned in Russia – all are becoming a problem. Apple secure messaging is an issue, all have been asked by Governments to release information.
For very secure file sharing
Running a computer within a computer – bit more than required for today but a useful addition to the armoury if you really are paranoid about your data an online privacy.
Shift Alt Delete Keys to determine what software is running on your machine – Windows only, useful for keylogging software.
Never use a name or dictionary word or a name/brand – dictionary attacks are the commonest form of attack.
Simple steps to secure your data, usb sticks, hard drives, and fixed medium options. CD’s and DVD’S etc. Truecrypt. Many modern drives come with security built in.
Password and password security. Securing home and office computers/tablets/phones
What to do with digital data?
USB memory tends to be ‘cheap’ and should not be relied on.
External hard drives/ssd drives/dvd or cd writers some downsides with DVD’s and CD in that they may not be readable in the future.
Flickr/LiveDrive/Google Drive/ Amazon S3 for the more technical. None are 100% safe, ideally local copy, stored on CD/DVD/Network Drive – online.
What is it worth? If it’s really valuable, put it on a CD/DVD/Hard Drive (that’s at least two copies) and one online – for £100 per year you’ll get great
Carbonite – £60 per year – literally. Once installed, tell it what to backup and never worry again.
What’s in an SSL
Modulus (2048 bits): – would take 1.5 million years to crack using a normal computer.
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
Public Exponent (24 bits): 01 00 01
Lastpass is the only password manager recommended by Steve Gibson –
Security Now Podcast.
None of your data is stored on their servers is not unencrypted. They don’t see your data in the wild. If you want your data, you can drop it on your local machine, unencrypt it – knowing that it no longer exists in the wild.
ENCRYPTION – WHAT IS IT?
Encryption turns data into a series of unreadable characters, that aren’t of a fixed length. The key difference between encryption and hashing is that encrypted strings can be reversed back into their original decrypted form if you have the right key.
There are two primary types of encryption, symmetric key encryption and public key encryption. In symmetric key encryption, the key to both encrypt and decrypt is exactly the same. This is what most people think of when they think of encryption.
Public key encryption by comparison has two different keys, one used to encrypt the string (the public key) and one used to decrypt it (the private key). The public key is is made available for anyone to use to encrypt messages, however only the intended recipient has access to the private key, and therefore the ability to decrypt messages
A hash function takes a string of any length as input and produces a fixed length string which acts as a kind of “signature” for the data provided. In this way, a person knowing the “hash value” is unable to know the original message, but only the person who knows the original message can prove the “hash value” is created from that message.
Zimmermann challenged these regulations in an imaginative way. He published the entire source code of PGP in a hardback book, via MIT Press, which was distributed and sold widely. Anybody wishing to build their own copy of PGP could cut off the covers, separate the pages, and scan them using an OCR program (or conceivably enter it as a type-in program if OCR software was not available), creating a set of source code text files. One could then build the application using the freely available GNU Compiler Collection. PGP would thus be available anywhere in the world. The claimed principle was simple: export of munitions—guns, bombs, planes, and software—was (and remains) restricted; but the export of books is protected by the First Amendment. The question was never tested in court with respect to PGP. In cases addressing other encryption software, however, two federal appeals courts have established the rule that cryptographic software source code is speech protected by the First Amendment (the Ninth Circuit Court of Appeals in the Bernstein case and the Sixth Circuit Court of Appeals in the Junger case).
US export regulations regarding cryptography remain in force, but were liberalized substantially throughout the late 1990s. Since 2000, compliance with the regulations is also much easier. PGP encryption no longer meets the definition of a non-exportable weapon, and can be exported internationally except to seven specific countries and a list of named groups and individuals (with whom substantially all US trade is prohibited under various US export controls).
A workshop of theory and hands-on practical experience so you can learn more about the technology of Plasma and how it can help you and the wider environment.
Led by Malcolm Bosher and Oliver Perceval, the workshop will cover the following:
Introduction to Plasma and the technology generally including background
An opportunity to personally experience GANS energy in three main forms:-
as a field direct with GANS material (those attending are invited to bring dowsing tools)
as a discrete field in a cocoon arrangement
as a field in a Quantum Loop arrangement.
Discussion and responses
Break for lunch
Background to the technology
Its relationship with All That Is
How to make GANS
How to use GANS
The latest developments
Questions and Answers
There will be new GANS specially developed for Electrosensitives, available to try.
VENUE: Forest Row Community Centre, Hartfield Road, Forest Row, East Sussex RH18 5DZ
TIME: 10am – 3pm (light refreshments will be provided; bring your own lunch)
INFO & BOOKING: Judy Sharp 07597 020 512
The subject of water is looming large on my radar at the moment – and not just mine, it seems. There seems to be much talk among people far wiser than me about the importance of water in this coming year – watch for floods, tsunamis and droughts. Keep an eye on corporations moving in to control water supplies, and on what is in the water we are drinking.
Shaman Tony Samara said to me some 25 years ago that the next world war would not be about oil, or land or even precious metals – it would be about water.
It is for that reason that there is to be a Water Day at Sedgwick Park House on Sunday 14th April – more about that in the next newsletter. One of the people I wanted to include in the Water Day was Malcolm Bosher: sadly he is not available then – but he is in this country now, and so I have grabbed him!
Malcolm is the man behind “Magic Water 1” which regulars will have heard me talk about at a discussion group last year. The principles are those developed by Dr Keshe (www.keshefoundation.org) that make use of the ability of water to hold memory and transmit specific qualities that have been “programmed” into it.
Malcolm produces what he calls GANS and GANS water (GANS stands for Gas to Nano State, ie the 4th state of water). Last year in the discussion group I invited Indigos to taste water “programmed” with Shungite, which is good for clearing and, sure enough, the feedback I had was that there was indeed a lot of clearing at physical and emotional levels.
Malcolm and his partner Catrina will be with us for the Discussion Group on FRIDAY 18th JANUARY and they will also lead a workshop on SUNDAY 20th JANUARY so that people can try and experience both GANS water and a Quantum Loop for themselves.
Malcolm tells me that he has been developing two new GANS, Pine and Amber, both of which work well with EMF sensitive people. He is asking for some Electrosensitives to put these GANS to the test – volunteers please, both for the Friday and for the Sunday!
On FRIDAY 18th JANUARY He will talk about
** GANS and its use in promoting quantum experiences
** information on some possible methods of frequency hormonisation to mitigate EMF effects
** Quantum Loop – energetically-charged material that can be charged into geometric shapes. The best example is a circle and they have been using it for all sorts of useful purposes connected with healing – pets love it as much as humans!
private room at the Harvester at Beech Hurst Gardens, Butler’s Green Road, Haywards Heath RH16 4BB 10am – 12 noon £2 to cover costs
Please let me know if you plan to join us so I can arrange seating accordingly.
On SUNDAY 20th JANUARY there will be time and space to learn more and try for yourself.
A Cocoon is like a small pop-up tent made of fine mesh. The mesh is sprayed with GANS-programmed water, and then a person sits or lays inside the cocoon for up to 30 minutes or so in a nice relaxed state – meditation if you will. This is a very interesting experience and one that I can personally recommend!
After an introduction, there will be time to experience GANS water, the cocoon and the Quantum Loop for yourself, followed by lots of time for questions and answers.
Forest Row Community Centre, Hartfield Road, Forest Row RH18 5DZ 10am – 3pm
Light refreshments provided, bring your own lunch. £30 payable in advance
Malcolm tells me he has an EMF harmonisation programme which can be switched off and on as required.
He asks me to make clear he is coming with information he has spent considerable time gathering and not with a guaranteed “cure” at all.
It is suggested that, if you are Electrosensitive, you may like to come along to the Friday event as an introduction, and you may then choose to come to the Sunday event as well.
I would encourage anyone with an interest in innovative healing methods or in the use of water or in possible avenues to help in the fight against Microwave Radiation to come along on the Friday and / or the Sunday. But please do let me know so I can arrange the rooms accordingly.
If you, or someone you know, would like to know more about the Indigo tribe, feel free to come along to one of our informal meet-ups or just get in touch.
Brekkies are on the first Tuesday of the month (except January 2019 when it’s Tuesday 8th and not New Year’s Day) and Discussion Group is 3rd Friday of the month. Both are held in the private room at the Harvester at Beech Hurst Gardens in Haywards Heath, 10am – 12 noon.
My contact numbers are 01444 459 433 or 07597 020 512.