STALKERS – I’m proud to be “stuck up “, if it means I’m not like you.

Stalkers come in all ages, any gender and any race.

“Stalking is unwanted and/or repeated surveillance by an individual or group toward another person.[1] Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. The term stalking is used[1] with some differing definitions in psychiatry and psychology, as well as in some legal jurisdictions as a term for a criminal offense.[2][3]

Wikipedia

I’m sure alot of people can relate to this post.

Walking down the street and some crass, filthy stalking creeps, both female and male, young and old, say “how you doing love” or even just “Hi”. You dont know them and you don’t want to know them, they’re strangers to you even though they think they know you or act like they know you. So you ignore them, you keep walking, keep minding your own business, you’re not hurting anyone, or invading anyone else’s privacy and definitely not harassing anyone.

And because you don’t want to talk to these people who stalk, watch and try to set traps for you, they start calling you a “stuck up bitch”, “think you’re too good for us” or for others it’s probably something like “rich bitch” or “faggot” or some other filthy term.

“Here’s the thing, these people get offended if I or you don’t talk to them or acknowledge them.
Proud to be me - black and white
I don’t get offended if they don’t talk to me, as I don’t want them in my life, it’s that simple.

People only get offended if it matters to them.”

Another common thing they do, but more sinister, is if someone has offered them money to harass and stalk you, often by people, organizations, or networks, who they don’t even know or care what those unscrupulous people actually do.

They have been given your phone number by these unscrupulous people. They get close to you in public, and call your number or SMS you, if you reply or they can see you checking your phone, then you have just confirmed your identity and they have verified their target.

It should be noted that most people today don’t immediately answer calls from unknown numbers, but people should also know that “spoof” calls and SMS are very easy for people do.

Spoof calls are when they can send a phantom call/message from someone else’s number that is in your phones contact list or someone you have messaged or called. It displays as their number, BUT it’s not them. This can’t be detected at your end, but it can be detected at the source verification stage.

Then there’s those that stalk you in their cars, they are contacted by someone, informing them that you are on the move, they then hop in their car and drive around watching and stalking you. They think you haven’t noticed, and many people wouldn’t, so they keep doing it and patterns emerge.

But this is nothing new to me. These stalkers think you are naive, one of them, even says it to you as a snide remark ( most of these types of people can’t control themselves, and have to say something to try an elevate themselves above you)
” you’re not very observant are you”,
( says someone who still uses Hotmail and tries to act like an upstanding citizen) , they’ve just confirmed what you already knew.

Just because you don’t constantly attack others or react how others would, doesn’t mean you are naive. You might just know alot more than they want you to, or think you do.

Their office ( so called office cabin) is located a few meters away from you and they watch you leave and then call (which can be traced legally by certain entities) their brainless idiot friends. Fortunately, the person they’ve been stalking has been on satélite, imagery, so this movement was recorded, and satélite imagery is VERY GOOD, it can zoom in and get not only thermal images, but individual features of people, number plates, and can reverse track that person from which that ping on that stalked person’s satélite connected adapted phone , detected.

The tables have been turned. The stalkers are now the watched and monitored people, purely because they picked the wrong person to stalk.

Its these brainless idiot puppets and malicious people that force the creation of these advanced systems, and yes they should only be used by ethical people with checks and balances in place.

Another method stalkers use, is to send SMS messages with links, and when you click on them, it triggers a tracker or downloads something to your phone. Also, your phone and message app have trackers built into them and while they may be OK, a virus/malware installed by these bad SMS messages can take control of the app itself.

Now for the extreme intentions of some. Phones can be remotely or intentionally used via clicking an unknown link or sending an SMS from a burner phone to a target, which in turn can be used to activate other sinister things like bombs etc. Since the recipients phone network has recorded it, initial investigations will lead to that person, who is more than likely now deceased, and only through advanced methods by specialized people can that link be traced to the original source of activation.

Verifying sources

Verifying sources in today’s world is extremely important, along with End to End Encryption and blockchain ( the process of blockchain, not necessarily cryptocurrencies) . These methods stop and detect attempts to break that secure link or tamper with things such as:
▫️sms,
▫️emails
▫️phone calls,
▫️comments on sites,
▫️transfer of files, images and downloads,
▫️transfer of money (traditional or crypto).

End to End Encryption

End to End Encryption is intended to prevent data being read or secretly modified, other than by the true sender and recipient(s).

“End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages.
In principle, it prevents potential eavesdroppers –
including :
▫️telecom providers,
▫️Internet providers,
▫️and even the provider of the communication service
– from being able to access the cryptographic keys needed to decrypt the conversation.”

Wikipedia

Below inset is a blog post about End-to-End Encryption by ProtonMail, with email as a currently operating example.

What is end-to-end encryption and how does it work?

The process in diagram form of End-to-End Encryption
Read more ProtonMail Blog

I support prevention over detection, first and foremost.

As for law enforcement not liking that they can’t access information with End to End Encryption. Putting the vast majority of innocent peoples data and privacy at risk in order to make their paid job of preventing crime easier, is not something I support. They have other methods that don’t involve exposing innocent people to an ever increasing problem, when there are methods to prevent it happening in the first place.

Blockchain

Blockchain is a growing list of records, called blocks, that are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data.

By design, a blockchain is resistant to modification of the data. ” – Wikipedia

Below inset is an Easy to read Blockchain Overview which incorporates private vs public blockchain.

Enter The Blockchain 2.0

“The complex structure of the Blockchain technology provides one of the most innovative tools to protect our data as we head into the Fourth Technical Revolution.

Blockchain introduces a level of trust that could be leveraged as a core technology for highly regulated industries including
▫️Space Travel;
▫️Health Care;
▫️Financial Markets;
▫️Supply Chains;
▫️Presidential Voting and
▫️The Internet of Things (IoT) networks to name a few.”

Read more: cyberessentialsdotblog. by Tracy Anne Manning

Video below – Blockchain: Way More Than Just Cryptocurrency | Answers With Joehaha animated text gif

He’s quirky, entertaining but definitely not an idiot. Just between you and me, I’ve watched quite a few of his videos, but don’t tell him that ‼️‼️‼️

If you enjoy the Hmmstudio Blog.

Feel free to share or forward this blog post to someone you think would enjoy it along with this link:
FOLLOW HMMSTUDIO BLOG via email


Comments are closed.

Powered by WordPress.com.

Up ↑