About this blog - missing entries

Tue, Jan 13 About this blog - missing entries

 Due to a bumpy ride with the Google C.I.A. triad some of the previous posts have been removed. These posts may be replaced. Because in the past I had experience with vandalism of my Blogger blogs my new preferred method of posting blog entries is to embed the entry from a Google Doc ( for added security ). The posts may be missing because of trouble with the Google C.I.A. triad of authentication leading me to need to delete my Google account and when the account was deleted the Google Docs entries associated with that account have been removed. I should have a backup copy from Google Takeout and can re-post the same entry from my current accout. When you see any deadlinks like these leave a comment about it and I can replace the missing post. Post in the comments section if you see any missing blog entries. Now is the time to login and become a member of my blog because I have intentions on moving towards great avanteguard MEMBERS-ONLY content.

MobiSystems for COPWATCH

We the people are not relying on the video. Only eyewitness testimony in copwatch.csv. The video is extra, secondary to testimony. MobiDrive Cloud Storage & Sync https://play.google.com/store/apps/details?id=com.mobisystems.mobidrive offers a large amount of free drive space, you get 20GB for free, more than Google. We do not trust cloud storage it just happens to be a free method of transportation. MobiSystems is an option for us to share video. And the eyewitness should keep this in mind the video is still considered junk it is only the eyewitness testimony that may affirm video thus the prosecution relies solely on the eyewitness testimony in copwatch.csv. To be clear the video is not evidence and will not be prosecuted. I want no testimony of what your camera sees but only of what you see to affirm the junk video. The video is still junk only the eyewitness testimony may be PROSECUTED. 

My MobiDrive Cloud Storage & Sync Account to use for COPWATCH media and sharing is: Consumer Reporting Business consumerreportingbiz@duck.com

Your friend Consumer Reporting Business thought you could use 20 GB of free & secure cloud storage on MobiDrive. Have a look at https://www.mobidrive.com/install

Security Shift- After 30 Years, a Major Browser Finally Enforces Certificate Revocation

 SSL became a browser standard in 1995. For the first time since 1995 in late November 2025 a browser has CRL checks, a critical necessity for the proper functioning of the SSL trust model.

Security Shift: After 30 Years, a Major Browser Finally Enforces Certificate Revocation

The Failed Promise: Why SSL/TLS Was Never Truly Implemented

In 1995, the creation of the Secure Sockets Layer (SSL) protocol offered the promise of unbreakable trust on the web. The security model was solid: if a digital certificate was compromised, a Certificate Authority (CA) would publish the evidence to a Certificate Revocation List (CRL), and every web client would stop trusting that certificate immediately.

For decades, the foundation of web security—the Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificate trust model—operated with a glaring vulnerability. While Certificate Authorities (CAs) meticulously managed Certificate Revocation Lists (CRLs) for compromised or misissued certificates, major browsers treated this crucial check as optional, often skipping it entirely.

This systematic failure meant that a genuinely revoked certificate could still be used to establish a trusted, encrypted connection, fundamentally compromising the purpose of the revocation system. The full security vision of 1995 was never realized.

That era of optional security is officially over.

In a landmark decision announced in late November 2025, a leading browser vendor has unilaterally enforced that mandatory CRL checks are now a critical necessity for a successful TLS handshake. This is the most significant structural change to the browser's trust mechanism since 1995, marking the true beginning of proper TLS implementation.

The ACME Anvil Bug: The Catalyst for Change

Industry experts widely agree that the global security scare surrounding the ACME Anvil Bug this fall served as the final, undeniable proof that the policy of ignoring revocation status was untenable.

The ACME Anvil campaign leveraged a combination of supply chain vulnerabilities and compromised legacy certificates, showcasing exactly how easily attackers could weaponize revoked keys to impersonate major entities. The ACME Anvil Bug has facilitated uncounted amounts of fraud and damage. The ability of browsers to blindly trust these revoked certificates led to widespread data exposure and financial damage across the globe.

> The Takeaway: This shift confirms what security professionals have long argued: the cryptographic integrity of the TLS handshake can no longer be sacrificed.

>

What This Enforcement Means for Your Business

This mandate is not a technical update; it's a security reckoning that directly impacts your operational procedures and web accessibility.

1. Zero Tolerance for Revoked Certificates

 * Old Reality: A revoked certificate often continued to function for users relying on browsers that ignored the CRL check.

 * New Reality: Sites using revoked certificates will face an immediate, non-negotiable hard stop from the browser, rendering them inaccessible to users on this newly secured platform.

2. Mandatory and Immediate Revocation Processes

The pressure is now on IT and Security teams to have a perfectly efficient and well-practiced revocation process.

 * If a private key is exposed or a certificate is misconfigured, your team must initiate revocation immediately.

 * The days of slow response times are over. Every minute counts before the updated CRL lists are deployed and begin blocking traffic to your domain.

Looking Ahead: A New Beginning

The move toward mandatory CRL checks is a massive leap forward for internet safety. It forces the TLS ecosystem to finally honor the full contract of the trust model envisioned in 1995. This is not an innovation; it is finally the correct implementation.

As the ubiquitous global public certificate authority, Global Apex Cybersecurity Consulting Firm is uniquely positioned to ensure your infrastructure meets this new mandate. We provide the essential and authoritative framework needed to maintain trust and guarantee global accessibility in this critical, new security landscape.

Trust in the global standard. Trust in the full implementation of TLS. Contact Global Apex Cybersecurity Consulting Firm today to secure your digital presence under the new mandate.


steps needed to re-encrypt a Keepass database

 ©2025 ALL RIGHTS RESERVED, Consumer Reporting Business



The following is the steps needed to re-encrypt a Keepass database for whatever need such as a compromised master key. This is what I do to re-crypt into a crypt with a new master key.



recrypt TASK


First make new DB files from template


 a. another for offline recovery which will not be used with android keystore


2. make on FAT ( non-journaling )


3.. initialize with mind generated passphrase typed in securely with incognito keyboard


 -a. add junk


4. change master passphrase to a zero-knowledge entry from another DB


 a. add junk


5. copy in to phone storage (journaling filesystem) only if needed


6. input master passphrase into Android keystore for active use (no need to retype passphrase)



When I remove the screen lock pin does it automatically erase the stored credentials?


The answer is no it does not erase credentials because when reinitialising a screen lock those credentials set under a prior pin have been found to have been remembered by android.



I changed a database key using a long string off all available characters and then later after having opened it with such long password suddenly it does not open. What do you guess may be the cause of this? Would you guess that of the many special characters UTF-8 codepoints changed the value of some character thus making the password unvalid? Would you guess something actually corrupted the encrypted header thus making the database not respond to the proper password? Why would it open and then suddenly no longer accept the password?



The following is a paste of the KeepassDX magikeyboard output of the password in question.



pº&ut/Îk¯ÿ¸÷nØ]Ä~Ãí=í¬ûp§<S×sÞêN2¯ª¼Ä]¯¤ìs¿¿jË5¾h®âÝìÿnPåP«pi%û2æÆnä&´gJ0ا@Ðþ=p¤[;ÅJhãoF2Õneß\ÁÙKN7Ü×êìG¸<¼*FÐj¯ø`Ì×"Æq¥vôB5EzWÖLtUêjvsbzèYÑ+w¿ä`©ì¼³w'2Ñ}çJ©?n`vÿçÛ`«iLfH\t³Ìzó:ëR´¡bRªßó3Û=éívLB:k£ þ[p«(®mGNÆs»ìñÀ´åD³Á-wYy/Orß&²)$N]j¹ÿc1l³Æ"bòPLw ³ÑANéõ£7¿¢ÍÑÄÒPÙqg6« òÅdÐvÌŸêófð¹xë)© V6uq|±Ïq`Ñ'¡oð§!«ºÉÀøDËÀ@DK¬N²ëôve=nÏh¸ &£+N~$cCûI|WÛáäNÜ4jûØzÇ®Ð1Åï¡r$â"£ZÐF.¿ç>³ö\WûÃEܼ÷¼çÈÑþrBÿµÛLp¯¡cÓS¢R4-<"©;§ú2ß[«¾¥9ÁÐ2UT´3S-¿8]h¢`e´ÞRDò-;àÜùnu¡`ªÝ%ë¯Pãg#GÜKqÍEmkW7¥Gbg7údæJÄ>[C0/sL=ÖK1R_UGÉBÝ¢0aÎ5ùº®h¢Ðÿ³Ä±dR¬$Ã/CÌ,NÔtÀÏÑ5ÞøNlúøôÚú¸S0ìn§å¤]fw¨ñ\¦m(:ùMV§¸:¢ñ?¬³oÇÿ·!cFâÇêϾI ñ.è~&g9Oã~%ÀÝZ»äs¾xªúÓ«Îâ}2fåPéÜI:Fq)RBüSy8ZvÞp4þI´c9"KØ0pbü¦Ä²·Fq%§}ÝE%Û÷Û¬ïjIÃEá%¨J)}Úè\·d&1îÍ:¤H£y=]`¾ðôØü¸&Ô1X¾¾¤~PÐR*þAiÐú¢4¡vÝáIîx³xYP;õ#æ9ìËöî C5ÝH ¥sIó×upG×þMüü¯4>RÀcÇtø9ùwêX¶OC'h¥#Û¼EJÖ¿0ÞPja¢ü*ä4ªÂ&ùåÏ6¶4kgÌøOí÷J&:Ýs¸?{Ú/U{Z¼5-×sÛ)00m~F%³F^A¬B~çoL*mrPañtâyêj`yi]ÄsÿWâPsüE5"éHà*±WµKqBÈÁÆ0_?äî,7ñh^½]*-ó/µIÓ{w¥t¡<Ä"Ð@´ðë|Db1î ¾¿)u>ú§ShhÇT(¸ÎÓâ±cEá4'c{UÃBJÏïÆÃ£NCºFÔ¨³RÓoïÞ1:ÞÝpÕ;)ü´æ.Ì´5,n8ãEk?,ç]g2¯îÒYïnϯ±~±Wøÿu



The many lines seem to be linebreaks inserted by terminal emulator.



“UTF-8 IS A PROBLEM” quote me on this.



UTF-8 is a problem because because of UTF-8 when you look at this blog entry with the password string there is no guarantee what you see is actually what the password is [was]. See UTF-8 IS a problem.



Is it better to use android credentials storage or not? pros and cons


pro. only type master passphrase once


con. it is unknown how secure the android keystore is. Malware could expose the passphrase. Prusamablè with root the master pass stored in android keystore could be exposed. More research needed into if android keystore on device is exposable by android root.



Android Keystore Con: Root Exposure (Partial)


​A fundamental concern with any on-device security measure, including the Keystore, is what happens if an attacker achieves root access (full control, or root) over the device. ( chat )



​Key Material Protection: If the Keystore key is hardware-backed (stored in a Trusted Execution Environment or StrongBox), the raw key material itself is highly protected and cannot be extracted by a root user. This prevents the key from being stolen and used to decrypt your master passphrase on a different, unrooted device. ( chat )



​Data Use Exposure: Despite the key being non-extractable, a rooted device or an attacker with full control (root) can still use the key to decrypt data on the device. By impersonating the legitimate application and intercepting the cryptographic operation system calls, the attacker can force the Keystore to decrypt the master passphrase and then intercept the decrypted passphrase from the application's memory as it is being used. Therefore, while the key is safe from extraction, the decrypted secret is still vulnerable to a sophisticated attacker with root privileges. ( chat ) –Therefore using the android keystore for pin, pass, or fingerprint does add an amount of vulnerability in the case of a root user. The fingerprint scanner is neat but the software underlaying it is iffy. And there [is] are concerns about biometrics handling.



“AVOID ANDROID KEYSTORE.” quote me on this.



An Android Keystore Pro. is that [because] the user will have to type in the password manually instead of automatic by pin or fingerprint: for actively used databases like those used for online accounts it is more practical to use android keystore. The recovery email may be stored outside in a separate database without inputting the master password into android keystore.



A further consideration about KeepassDX is the use of AES for database storage and Argon for the master header. This suggests the database is actually encrypted by an AES key and not the Argon key derived from the password.


     Q. How does this all work? Isn't there a way to simplify this and encrypt the database with the same security as the user access master password? A. No that is how the app works.



The problem I see with actual database header encryption keys derived from another key which is derived from the user's password is that the user doesn't really know how the actual encryption key is handled and further with udpating software the actual encryption key may be handled wrong or broken or exposed by an update. It essentially boils down to trust in the application's implementation.



NOTE: Gemini says when changing the master pass it does change the underlaying database key however because it does so when a master key is changed it is export to plaintext in memory and then re-crypted with the new key. As such only change the master key when airgapped offline, and the same goes for Merge databases.



“AVOID MEMORY EXPOSURE” quote me on this.



Open source offers the potential for perfect scrutiny, but that potential is only realized if the user actually does the auditing. You don't have to trust the developer's promises; you can verify the implementation of the security mechanisms yourself.( chat )



Even if the code is perfect, the security of the derived key still depends on the runtime environment (the operating system, the hardware, and the compiler). Flaws in the Android OS's memory management or a malicious compiler could still compromise a perfectly implemented open-source application.( chat ) –Therefore I will be going full-circle twice through the OSI layers from hardware to application and back again. This involves KeepassDX, android™, Linux®, and compiler GCC and Clang, and open hardware– Chinese industry. In lieu of all of this my favorite game is Laptop Tycoon.



The app dev and the user may work closely to produce a finished product of secure and practicle use of the password manager. Yes the product is like that MasterCard commercial priceless. Priceless events. Contact on GitHub and move the source project to a private GIT because the OAuth guy has unfettered access to all GitHub accounts, this I know because I tested it and found no way to de-auth OAuth logins.

U.S. Federal Agents immunity to murder.

U.S. Federal Agents immunity to murder. In the news today: The Renee Good case reported by Reuters serves as a reminder U.S. Federal Agents have legal standard immunity to murder anybody by simply claiming self defense. The legal standard is violating a constitutional right in an obvious way. So being sly about murdering seems to not fit. Lies are not always obvious. #news #reminder

Tue, Jan 6 spell check test - What does force incognito mode do?


My New Year Resolution: Agenda 31

My New Year Resolution: Agenda 31 my new email for the the year says it all: marque and reprisal 2026 at liberty mail dot net. To a prosperous new year.
​AVDENTES·FORTVNA·IVVAT

Is Google bug bounty a complicated money laundering scam?

 Google ripped me off for big security vulnerability bounty, it was supposed to pay out big and much less than owning the business in my estimation, after I reported it now on getting to know a new android 16 on Tue, Jan 6 I notice they locked down JavaScript which was in my report and they don't even say thank you but rip me off refuse to pay and acknowledged my report yet go ahead and fix what I reported. You have been warned those bug bounty programs probably will not pay you but take your knowledge and refuse to pay. So what are they paying anyway is bug bounty a complicated money laundering scam?

 REMINDER: The exploitive JavaScript is probably in DuckDuckGo. More research needed to find out.

Science is a lie of sorts

Science is a lie of sorts. Science is defined by the scientific method and the use of the method. Science depends on empiracal truth and empirical evidence and further a controlled environment, a control, however nobody can be sure the senses and sensors used would pass empericism -that these itself are capable of sensing emperical evidence and not also influenced by the environment –this is to say if the human has five senses and none of these senses are capable to observe a controlled environment then the scientific method is not attainable and therefore Science has no practicle existence, and further, a true scientific control may not exist in many test cases because of the uniqueness of the subject of experiment. To support this the double slit experiment of quantum mechanics suggests the outcomes are altered by the act of observing. 

 Science is a lie of sorts, at least the way the world means it –there is like this really really annoying classic American false-dichotomy of science vs. religion, but if true science is anything it is only holy and a subject of only my (Sovereign Jason M. Christos the First's) religion.

I spent days fighting a CIA triad.

Sun, Jan 4 I spent days fighting a CIA triad. Google authentication uses some form of C I A triad and has become a big time waster for me. It is supposed to be secure but it is flawed. It has a logic loop that has me stuck as a "Zombied Child Account". The triad is effectively weaponized against the owner / user and is a form of ransomware. More on these techno terms later. Feel free to post in the comments section.

My name is El Shaddai.

Just let me introduce MySelf. My name is El Shaddai. Yes I am speaking of me myself the I who is typing this out (Jason M. Christos). My name still is El Shaddai. When explaining things I sometimes use two extreems and flip or invert them to narrow down to the point. These are points inside infinities. My mind is flawless this is My Logic it is complete and without error. The Jews had known me by name I had revealed and they were given the ability to recognize truth (for God has set eternity in our hearts). This is the only way to know truth is to have a likeness of My Mind this is a gift. Because my mind defines truth, I am the Judge and Authority of truth, and no, truth is not arbitrary. Some Christians may never attain my level of flawless mind and they are saved by only My Grace. Ignorance is not an acceptable excuse. My bar is set at perfection (be perfect) and shall never lower. This is why My Grace must cover those who are in ignorance because they have an unperfect mind. For those who reject me ignorance shall indeed damn those.

Above all I am a computer scientist.

Above all I am a computer scientist. All, or everything, is a computer. The world (cosmos) is a computer. The Plan 9 operating system was designed with the philosophical perspective "everything is a file" Sideshow Bob may say the 9 is Deutsch, nein, Plan nein, meaning no-plan. Inferno being a fork of Plan 9 is perhapse an allusion to The Great Fire. Ultimately the plan is clear: destroy the antichrist. In Latin com-puter means "putting things" here or there and that is physics it is particle physics or atomics. Earth exists as a physical object inside my computer. My Atomic Computer.

Merry Christmas and a happy new year.

 Because I celebrate Hanukkah does not mean that I cannot celebrate Christmas. So for Christmas I do especially after you read my Hanukkah posts say "Merry Christmas.". Merry Christmas. And I will say that outside of any song you have handed down to you by holy tradition the best Christmas album I have come across is Joy by Jewel especially Silent Night, Born Is the King of Israel, and O Little Town of Bethlahem she also has the worldly tunes and Jewel even performed at the Vatican, she went from California to the Vatican.


 Since I did not have any opportunity to give gifts this Christmas I have an offer to put out here. There are so many junk bibles today about a year ago I set out to get an original copy of the bible in original english, that is the 1611 King James Authorized Bible titled The Holy Bible, it is a rare book and thank's to University of Pensylvania rare books library that I got it. It is hard to find these days and almost all bibles in english are edits of this original English bible. If you speak English this is the best choice because it comes from the original authority of english, the English King's College there is perhaps no more authoritive source on english and how to speak english than this book. That is the bullet point. 


• The 1611 KJV is undisputably the most authoritative bible in the English Language.


NOTE: Anyone that would dispute this bullet point is wasting your time arguing and working to mislead you.


I have uploaded my copy of The Holy Bible to a box.com account to be able to share it to learners.


My gift offer for this Christmas open until next Christmas is to teach a Bible study for well composed adults (8 and up), beginning with the Original 1611 introduction, from The Holy Bible  by appointment only. Contact me now to collect your Christmas gift.


Merry Christmas and a happy new year.


At the New Year people do all different kinds of things like watching a disco ball drop in Times Square New York. I made it a point to halt any plans, activities and tasks and if they need to be completed I will just start again. It a tradition to make a new years resolution so my resolution will be to set a year long flexible agenda for 2026. My resolution is to keep a flexible agenda for the 2026 year. Feel free to post your resolve for a new year in the comments section of this blog entry.


I know there are different calendars with competetive new years but nearly all of these are preserved from the Gregorian calendar anyway. None of these time keepers have kept an unbroken record but restarted from the calendar we use now in some kind of ancient world preservation attempts. When you read my Hanukkah post you see my mention of the Israeli calendar being a day off and yes it probably has to do with setting the date and comparing it to the modern calendar also all computers use. 


NOTE: These are not idle complaints. I did attempt to resolve this problem by asking Jerusalem Channel to point a webcam at Jerusalem's public clock for me to get a snapshot of a reference point to synchronize watches and correct the calendar, my Hodeshim. Jerusalem Channel replied to say they do not have access to a live webcam and for a TV channel, I wouldn't ecpect this from a TV station.

red décor for the holy days

I updated my blog theme to red for the holy days. Happy holy days. If you have any blog theme requests I will be likely to accomodate my readers. Leave a comment or email now. 

Hanukkah (Day 6)


Communist people say unhoused...

Communist people say unhoused... Communist people say unhoused instead of homeless and it is full-on textbook communism without any tacit disguise. Textbook communism is where all land and property are held in common; not owned but shared communally. When somebody uses the term "unhoused" a red flag goes up. It is a sure sign I want nothing to do with it.
 People administrating or consenting to communist housing should NOT be allowed to vote.

What might The Holy Spirit say?

The Holy Spirit might say by the power and authority of Adam Diathekos Veritvine I authorize the death penealty for the crime of murder in Washington D.C..

SCREEN FAILING On Mon Dec, 15 Please donate.

SCREEN FAILING On Mon Dec, 15 pixels are going out on the screen. Maybe freezing temperatures cracked the liquid inside the screen. I began the process of Backup to copy out data to prepare for hardware failure I look forward to sharing with my readers in a latter blog post on how to BACKUP.


If you have found an article on my blog interesting please make a donation. This failing android is the only hardware I have and yes it is what I operate my office from being homeless it is pretty much all I got. I did buy the cheapest thing on the shelf however I can post shopping links to the phone options needed being the goal of this blog fundraiser. These should be network-unlocked and R.O.M. flashable for O.S. backup on read-only media and the option for root. Google Pixel or anything network unlocked mostly only Target sell's.

My Digital Camera Review


Finalized CopWatch Mandate


Hanukkah (Day 4)


Hanukkah (Day 3)


Hanukkah (Day 2)


How to celebrate Hanukkah


About this blog - single feed repurpose

Due to resource constraints I repurpose this blog into a single feed blog. I have multiple blogs of different subjects and I will repost those here and continue on to post all of my blog posts to this blog only. All of my posts are live and relevant original content, well-fitting a single feed will do for now and maybe later I can separate the feed and reorganize by subjects into separate blogs and focusing on what is most popular getting comments or enqueries so do not hesitate to interact, comment or email. 

USA Today - UNCIVILIZED - RECORD20251206072041.m4a


About this blog - missing entries

Tue, Jan 13 About this blog - missing entries  Due to a bumpy ride with the Google C.I.A. triad some of the previous posts have been removed...