RT from Janice McAfee (@theemrsmcafee)

Today would have been John's 76th birthday. As we continue to wait for news from the courts I wanted to share some of my favourite memories of John. To honor John please share any photos you may have taken of or with him using & .

[Video embedded in original tweet]

RT from Janice McAfee (@theemrsmcafee)

Happy Father's Day @officialmcafee. Though you are spending the day in prison know that you are loved and appreciated.

In a democracy, power is given not taken.

But it is still power.

Love, compassion, caring have no use for it. But it is fuel for greed, hostility,  jealousy...

All power corrupts.

Take care which powers you allow a democracy to wield.

The US believes I have hidden crypto. I wish I did but it has dissolved through the many hands of Team McAfee (your belief is not required), and my remaining assets are all seized. My friends evaporated through fear of association.

I have nothing.

Yet, I regret nothing.

This image was submitted to counter my prior tweet.

While interspecies necrophilia is not unknown, necrophilia with whales is generally believed to be an uncommon occurrence, and thus should in no way diminish the force of my argument.

Now that whale fucking has been outlawed in many South Pacific countries, I felt it time to revive my original tweet on the subject:

birdsite.xanny.family/official

There is much sorrow in prison, disguised as hostility.

The sorrow is plainly visible even in the most angry faces.

I'm old and content with food and a bed but for the young prison is a horror - a reflection of the minds of those who conceived them.

I discussed in my last tech tweet twitter.com/officialmcafee/sta how foreign agents using social engineering can be inserted into operating systems departments as software engineers.

Far more important is placing development managers into such departments. Here's how its done:

birdsite.xanny.family/official

I have a million followers but I'd be surprised if even 1% bother to read my tweets.

Ramblings of an old man lost in a near infinite Twitter verse - like tears in rain.

As you may guess I'm having a down day.

Now its Jeff Bezos.

If space travel improves and becomes fashionable perhaps we can abandon the planet we have so thoroughly mangled and seek fresh ones to trash.

In my last tweet I explained the virtual impossibility of identifying backdoors or other malicious code developed by a foreign agent in the guise of a software engineer.

I will now explain the process of embedding these agents into targeted companies.

Iran's centrifuge project was destroyed by hidden code in spite of thorough system auditing and security procedures.

How is this possible?

I'll explain using an example and I'm challenging every covert agency to disprove the validity of this explanation.

The intelligence of our electronic means of communication are evolving millions of times faster than the biological evolution of our brains.

Soon our smartphones will have no need of us - mere appendages wasting valuable CPU cycles for utter trivialities.

Our government, in virtual secrecy, decides the course of our lives. We are not consulted.

"Protecting national secrets".

But there no "secret" national secrets.

Hacking now far exceeds the power of data protection. "Secrets" is an obsolete term.

Governments spy on other governments. They spy on their own citizens. The departments within each government spy on the other.

We live in an age of suspicion.

Its only a matter of time before neighbors spy on neighbors. And children spy on their parents.

Today a man facing a difficult situation asked if I knew of painless ways to kill himself. Having little experience in such, I was of not much help.

The amazing thing is that the tone of the discussion was like discussing the weather.

Prison is a strange environment.

Addendum:

The same concept of sequential XOR operations works with four data sets requiring three iterations and five data sets with two iterations.

Strangely with six sets, the process unravels and produces chaos no matter how many iterations.

Please God, someone explain.

RT from Janice McAfee (@theemrsmcafee)

.@elonmusk has moved the crypto markets with his tweets far greater than @officialmcafee could ever have and he continues to do so, with impunity, while John faces the real possibility of dying in prison for allegedly engaging in similar activities. 

This tweet might interest my software engineer followers.

In my years as a programmer I observed numerous anomalies that may have practical applications. Since I'm getting no younger I thought I'd begin passing them on.

The first, involving an anomaly with boolean algebra.

Show older
Aspie Chattr

A federated social network for aspies and other NDs to be themselves. Chat to others with ASD, ADHD, etc. Connect to the fediverse to bring in content from a whole network of niche sites and follow people who share your interests. Strict yet flexible privacy controls for your content with no ads or tracking.
This site is ready for the future with full IPv6 support