Caveat re Ledger Nano S

in #ledgernanos7 years ago

DavidLetterman-C1.gif

The most problematic issue with my Ledger Nano S wallet is will the Google Chrome Bitcoin application open. The connecting of the hardware to my computer initiates a hoped-for connection which, as with marriage, may not actually transpire. The Chrome Ledger wallet for Bitcoin may not feel to open. Perhaps its mood has not been optimally tweaked. On the days that it feels positive, I am enabled to send or receive. However, it then may disconnect from the hardware, and subsequent efforts to reconnect it meet with chilly "not now." Any bitcoin to be received I learn from the sender is "pending."

While it is true that I may have an imperfect download of wallet or, indeed, Chrome, there is also the real possibility that this is another manifestation of government interference by means of its stalking agents. I use to think of stalkers as real people perhaps suffering from inexplicable mental derangements. After all, to devote oneself to trivial "dirty tricks" almost requires some form of derangement. I believe that entities with "deeper pockets" can afford to pay for stalking gangs to pursue a target for an array of perceived wrongs. Hence, such targeting may be more detailed and sophisticated than merely chasing after David Letterman or other celebrity.

Naturally, the federal government in the United States has the greatest resources to pursue targets. I do believe that these endeavors are sufficiently great to suggest to powerful, interested parties that these gang-stalking missions be departmentalized among the Department of Defense, the F.B.I., DHS, C.I.A. et al. Of course, redundancy of mission does occur with stalking gangs of the F.B.I., for example, becoming entangled with a stalking gang working from a DHS sub-branch such as the ATFE. With excessive policing it is always possible for "jump-out" feds to nab "deep-cover" feds. It's a small world after all.

As we live in an age of multi-jurisdictional policing, state and local undercover cops may get unexpectedly drawn into fedcop madness. Since many have taken advantage of invitations to enjoy the hospitality of Israelis anxious to schmooze with American police chiefs and sheriffs, they have often been captured by Israeli intelligence techniques and impressive gadgets into "best friends" relationships. Videos of indiscretions committed by American lawmen while "letting their hair down" in Tel-Aviv allowed Israelis to exercise leverage over American cops who had chosen to enjoy the more adult entertainments made easily available to them.

Indeed, with U.S. fedcops opening branches in metropolitan location all over the world, one might well postulate that the formation of global police networks under increasingly interconnected missions and commands has been in the works for some time. Powerful leaders want to protect the world community from the dangerous gangs which they, themselves, have created by means of their intelligence agencies and cooperating police departments. Herein, stage meets battleground; actors meet desperados. Places! Lights! Cameras!

Therefore, with such mighty events underfoot, the mighty men of government must plan in comprehensive ways. Nothing must be overlooked.

Such work at mundane levels requires "armies of the night" to play a variety of roles. Indeed, the night has a thousand eyes! Stalkers, black ops, jump-outs and techno-hoods must mingle in a complex maneuver whose chief purpose is the creation of a Kafkaesque New Dark Age.

Complementing and providing vast intelligence to the powerful government leaders and their gendarmes are the computers and robots, which make oppressive, global "dirty tricks" a modern phenomenon. It is likely that the C.I.A. and N.S.A. could isolate and stalk any computerized device in the world. The C.I.A. is known to have the ability to create "false flag" cyber attacks. DARPA has perfected the "big brother" computer that can monitor and talk to any brain that has been captured electromagnetically and whose thinking vocabulary has been filed away on the computer or on some larger archival "big daddy" computer. With the help of Google and Facebook a global archive of recognizable faces, eyes, voices and fingerprints are rapidly accruing on cyber-files for future use.

Perhaps the Achilles heel of the mighty men of government is the debt-money system they have constructed to provide them power over the mass of indebted people. Money is the life-blood of any political economy. An interconnected world economy must have an agreed-upon form of money for social exchange, business and taxes. The money men of the 20th & 21st Centuries largely settled on debt, inflation and deflation to keep the machinery operating and the masses in debt. Why should they change?

Now comes cryptocurrency, led by Bitcoin, to threaten their world order. Well, now, they can't allow a community of Romantic cyber-rogues to agitate such nonsense as "every man his own banker!" The global establishment is not a bunch of nice people; they are killers. War is one of their favorite games. When push-comes-to-shove, the troubadours of cryptocurrency will be faced with survival of the fittest and may find themselves wanting in the kidney department.

For the general reasons offered above, I suspect that the mighty men controlling government have assigned some of their key assets to interfere with the smooth operation of the computers used by and essential to the cryptocurrency community. Most people of this community are aware of the Parity wallet embarrassment. To have and have not! Painful. Yet I suspect such events will be more rather than less common. My inability to enter my Ledger
Nano S wallet may be a sort of "lock-out" not caused by a red button but by a new program instigated by government to interfere with the essential "talking points" by which computers and software embrace and make whoopee. Such interfering programs might be operated from a vast computer "war room," or from a portable(s) device used by stalking gangs to jam or queer the required communications between software and computer, used by a target.

For me the problem seems to be operational inconsistency. Yet, if relatively permanent, it might as well be a red button.