BUSINESS HAS BECOME WAR
SECURITY MATTERS
Scarcity minded groups formerly with the army see business as war, not as creation. With a system to lead people from behind their backs based on access to personal information from the backbone of the internet, these confidence tricksters have killed millions. Their polluted minds can only think about how to steal, not how to build something beautiful. To that end, a sophisticated system of theft to penetrate corporate and family security is being implemented around the world.
These groups of technologically advanced white collar terrorists, use access to communication & payment infrastructures to commit thefts, large and small. They are using fake invoices, back-entries to mainstream infrastructure, and even lookalikes to steal identities. You will be jeopardizing your venture by not securing your data flows.
Even when procuring marketing consulting, it's better to walk the extra mile when communicating with Alek. From his personal experience, it's best to use the internet with the utmost caution. SWIFT transfers have been stolen. AVR's acquaintances have lost transfers ranging from $500 to $25 million. Crypto wallets were detached from the underlying blockchain. Entire savings accounts have disappeared without a trace. Videos and images on Alek's websites have been edited. VPNs have been hosted on breached servers ending careers and lives.
Here's what professional internet workers should do:
Given the back-entries it's difficult to be 100% secure. However, even if your communication is being monitored by criminal groups, by protecting yourself, you will create additional barriers to crime that may not be surmounted.
While you create, criminals destroy. Just keep on building power safely. They will get tired and hungry.
Sources of power:
- Learning to say NO to preserve integrity and identity
- Products one can create
- Useful knowledge one can implement
- Logistics & access to resources
- Networks of people with mind power
- Financial resources
- Self-defense weapons
- Cyber security
These groups of technologically advanced white collar terrorists, use access to communication & payment infrastructures to commit thefts, large and small. They are using fake invoices, back-entries to mainstream infrastructure, and even lookalikes to steal identities. You will be jeopardizing your venture by not securing your data flows.
Even when procuring marketing consulting, it's better to walk the extra mile when communicating with Alek. From his personal experience, it's best to use the internet with the utmost caution. SWIFT transfers have been stolen. AVR's acquaintances have lost transfers ranging from $500 to $25 million. Crypto wallets were detached from the underlying blockchain. Entire savings accounts have disappeared without a trace. Videos and images on Alek's websites have been edited. VPNs have been hosted on breached servers ending careers and lives.
Here's what professional internet workers should do:
- Use independent VPNs (best to use Eastern servers in Singapore, Russia, or Hong Kong)
- Examples: ZenMate, PrivateAccess, Vypr, and CyberGhost
- Alek uses NordVPN and is very satisfied with the value. Yet, NordVPN lacks Eastern servers.
- Subscribe to paid encrypted emails (Proton, Tutanota)
- Encrypt your router and change its settings once a year
- Disable auto-connect on your laptops, mobile, and tablet devices
- Arrange passwords of emails with frequent recipients (change quarterly)
- Use privacy-friendly browsers to access the internet (Alek uses Brave just for the chance of any army VC-backed company having integrity)
- Start adjusting to a decentralized economy and decentralized finance (DeFi protocols such as Bitcoin, ETH, USDT)
- Most VC-supported companies outsource their tech work to the former Army, so you shouldn't join the circus:
- The former US Army and its proxies are the sole culprit behind major thefts around the world
- The Department of Defense was responsible for most inter-continental internet cables & satellites
- European internet service providers are in the hands of military proxies choosing their equipment
- Only approved modems and other internet equipment can be exported out of China
Given the back-entries it's difficult to be 100% secure. However, even if your communication is being monitored by criminal groups, by protecting yourself, you will create additional barriers to crime that may not be surmounted.
While you create, criminals destroy. Just keep on building power safely. They will get tired and hungry.
Sources of power:
- Learning to say NO to preserve integrity and identity
- Products one can create
- Useful knowledge one can implement
- Logistics & access to resources
- Networks of people with mind power
- Financial resources
- Self-defense weapons
- Cyber security
How to make sure you speak to the right AVR?
AVR's encrypted emails
avrwise@pm.me (protonmail.com)
avr@mzeo.org (tutanota.de)
FIle types clients should protect:
- Plans
- Meeting bookings
- Prototypes
- Contracts & contracts discussions
- Travels & planned routes
Download AVR's public encryption key if needed.
- Ask for IDs
- Look for the MacBook unique ID live on a call: C02VG23UG8WN
- Arrange a password for emails live or on the video call
AVR's encrypted emails
avrwise@pm.me (protonmail.com)
avr@mzeo.org (tutanota.de)
FIle types clients should protect:
- Plans
- Meeting bookings
- Prototypes
- Contracts & contracts discussions
- Travels & planned routes
Download AVR's public encryption key if needed.