Energetic Forum  
Facebook Twitter Google+ Pinterest LinkedIn Delicious Digg Reddit WordPress StumbleUpon Tumblr Translate Addthis Aaron Murakami YouTube 2018 ENERGY CONFERENCE - ALL SEATS SOLD OUT!

2018 Energy Science & Technology Conference
Sponsored by Teslacoin Foundation

Teslacoin Foundation

http://tesla-coin.com


Go Back   Energetic Forum > >
   

Renewable Energy Discussion on various alternative energy, renewable energy, & free energy technologies. Also any discussion about the environment, global warming, and other related topics are welcome here.

* NEW * BEDINI RPX BOOK & DVD SET: BEDINI RPX

Reply
 
Thread Tools
  #1  
Old 06-29-2011, 05:49 PM
Michael John Nunnerley's Avatar
Michael John Nunnerley Michael John Nunnerley is offline
Gold Member
 
Join Date: May 2008
Posts: 1,193
MIB are now monitoring skype

Well they have now made it public that they are monitoring skype, they have been doing it for years, but now public due to MS buying SKYPE.

Sorry but it is in Spanish but I am sure you will get the jist of it.

Mike

Microsoft grabará de forma legal las llamadas de voz y vídeo de Skype - ABC.es
__________________
 
Reply With Quote
Sponsored Links

Download SOLAR SECRETS by Peter Lindemann
Free - Get it now: Solar Secrets

  #2  
Old 06-29-2011, 06:01 PM
Armagdn03's Avatar
Armagdn03 Armagdn03 is offline
Silver Member
 
Join Date: Oct 2007
Posts: 913
Quote:
Originally Posted by Michael John Nunnerley View Post
Well they have now made it public that they are monitoring skype, they have been doing it for years, but now public due to MS buying SKYPE.

Sorry but it is in Spanish but I am sure you will get the jist of it.

Mike

Microsoft grabará de forma legal las llamadas de voz y vídeo de Skype - ABC.es
no surprise here, **** always getts fuzzy on the conference call when the topic gets interesting. lol.
__________________
 
Reply With Quote
  #3  
Old 06-29-2011, 06:12 PM
DrStiffler DrStiffler is offline
Silver Member
 
Join Date: Mar 2009
Posts: 948
Quote:
Originally Posted by Michael John Nunnerley View Post
Well they have now made it public that they are monitoring skype, they have been doing it for years, but now public due to MS buying SKYPE.

Sorry but it is in Spanish but I am sure you will get the jist of it.

Mike

Microsoft grabará de forma legal las llamadas de voz y vídeo de Skype - ABC.es
I think it might be more important to determine what they are not monitoring?

Not very damn much.

The government has a very sneaky way of disconnecting itself from what is really taking place. They contract with a company to do the dirty work for them and in some case so deep it could be hard if possible to expose. Yet any software that for example always maintains a connection to some server or ping that server on a routine basis, is very suspect. A good sniffer will root out what s going on, although the output will be in most case encrypted and difficult to make sense of, although is the dump consists of more than a few hundred bytes for each outgoing ping, then it is not good to allow it to remain.

Wonder how many software companies are in bed with the feds? I would guess 99% and 1% don't matter. I will not mention names,but, well most thinking people should know what is going on here.

Example, runs from your grocery discount card, you health insurance, your gas credit card and of course your major credit cards, your phone conversations, your emails, your tweets, your..............

Get the point? Anyway none of us have anything to hide, right??????
__________________
 
Reply With Quote
  #4  
Old 06-29-2011, 06:14 PM
Michael John Nunnerley's Avatar
Michael John Nunnerley Michael John Nunnerley is offline
Gold Member
 
Join Date: May 2008
Posts: 1,193
Quote:
Originally Posted by Armagdn03 View Post
no surprise here, **** always getts fuzzy on the conference call when the topic gets interesting. lol.
yes you are right. They have now patented they way they do it "is that to stop anyone else doing it" the world is full of surprises, now all controlled by MSMIB's

Mike
__________________
 
Reply With Quote
  #5  
Old 06-29-2011, 06:47 PM
SilverToGold's Avatar
SilverToGold SilverToGold is offline
Senior Member
 
Join Date: Jun 2010
Posts: 433
Everything you do is being monitored. The old saying is know your enemy and the people who run this world consider you their enemy. You are being tracked so they will be able to exterminate you. It's eugenics and why all this tracking is being done.

Even if you mail letters, they have machines that scan and read your letters while still in the envelopes.

Probably the only safe communications are carrier pigeons.

Earth signals are probably also relatively safe.

Line of sight laser communications are also a safe method. This is what the government made "UFO"'s use to communicate to each other.

If you carry your cell phone with you can turn it off, they also can turn on the mic and listen to you.
__________________
 
Reply With Quote
  #6  
Old 06-29-2011, 06:51 PM
SilverToGold's Avatar
SilverToGold SilverToGold is offline
Senior Member
 
Join Date: Jun 2010
Posts: 433
Quote:
Originally Posted by Armagdn03 View Post
no surprise here, **** always getts fuzzy on the conference call when the topic gets interesting. lol.
They have computers monitor ALL phone calls for EVERYONE. They do key word detections and if you say the "right" words, it gets connected to you in their database. They also have voice recognition software so even if you call from some "safe" phone, they will know it's you.

Anyone who doesn't see what's going on just has his head in the sand.
__________________
 
Reply With Quote
  #7  
Old 06-29-2011, 07:04 PM
Armagdn03's Avatar
Armagdn03 Armagdn03 is offline
Silver Member
 
Join Date: Oct 2007
Posts: 913
Quote:
Quote:
Originally Posted by Armagdn03 View Post
no surprise here, **** always getts fuzzy on the conference call when the topic gets interesting. lol.
They have computers monitor ALL phone calls for EVERYONE. They do key word detections and if you say the "right" words, it gets connected to you in their database. They also have voice recognition software so even if you call from some "safe" phone, they will know it's you.

Anyone who doesn't see what's going on just has his head in the sand.

Maybe this is true....

But it should not stop you from doing what you normally do. Worrying about this crap is pointless, only keeps you from your progression.
__________________
 
Reply With Quote
  #8  
Old 06-29-2011, 07:16 PM
StweenyA's Avatar
StweenyA StweenyA is offline
Senior Member
 
Join Date: Jun 2011
Location: Home is where the heart is
Posts: 169
Exclamation The Internet is like a black hole for data.

Quote:
Originally Posted by DrStiffler View Post
Yet any software that for example always maintains a connection to some server or ping that server on a routine basis, is very suspect.
How so? Sometimes the software simply needs a continuous connection for it to function correctly? Like in the case of IM's, and other streaming apps.
However if it's just some random app, or continuous "auto update" checks, then yeah I do agree.

Re the skype monitoring.
If you think the monitoring ends there, don't be deceived.
When browsing, Cookies can be shared across any websites, and if you have flash, these cookies can even be shared across browsers.
So just because you login with facebook or google on a separate browser (eg chrome), doesn't mean they're not going to know it was you from the other browser (eg firefox).
Even if you use different computers, but with the same internet connection, they would see you're coming from one IP, and that is a potential way of associating the data with you.

Google and facebook especially have ways of knowing that you are visiting other sites. Have you heard of google stats? Or seen any of the facebook feedback forms and "like" buttons popping up on most popular sites now? Yes, they can tell which sites you are visiting.

Did you know:
G-Mail keeps a copy of every email you send and receive, even if you delete it.
Facebook won't ever delete your account. If you want to leave (unregister), they will disable it for awhile, and if you don't login within a certain period, they will simply archive the data. (mark as deleted)
In fact I wouldn't be surprised if facebook never deleted stuff you choose to delete. (like photo's etc) It probably just sets it's status as deleted, thereby giving us the illusion that it is gone.

The internet is like a black hole for data. Whatever you do, is logged somewhere, and logs can be monitored. Old logs are hardly deleted for space reasons, as storage is upgraded because prices keep on plummeting.

Routing your data through an annonymous proxy might seem like a good idea, but even then, who knows what happens, and who you can trust. Maybe your session is just given a higher priority for monitoring, meaning you just made it easier for them to monitor you?

What I think what one could take out of this, is you shouldn't be naive to think that you aren't being monitored. You are.
__________________
 
Reply With Quote
  #9  
Old 06-29-2011, 07:19 PM
SilverToGold's Avatar
SilverToGold SilverToGold is offline
Senior Member
 
Join Date: Jun 2010
Posts: 433
I agree 100%.

They are going to try and get you anyways, so you have only one option and that is to resist and do what is right.

Quote:
Originally Posted by Armagdn03 View Post
Maybe this is true....

But it should not stop you from doing what you normally do. Worrying about this crap is pointless, only keeps you from your progression.
__________________
 
Reply With Quote
  #10  
Old 06-29-2011, 07:31 PM
Zooty Zooty is offline
Senior Member
 
Join Date: Feb 2009
Posts: 331
What if i was to whip up a crude Skype clone with 256bit AES encryption for the FE community? I would use 1024bit blowfish but it's illegal to use in the USA .. go figure.
__________________
 
Reply With Quote
  #11  
Old 06-29-2011, 07:59 PM
blackchisel97's Avatar
blackchisel97 blackchisel97 is offline
Gold Member
 
Join Date: Jun 2009
Location: NB, Canada
Posts: 1,700
Send a message via Skype™ to blackchisel97
Quote:
Originally Posted by Zooty View Post
What if i was to whip up a crude Skype clone with 256bit AES encryption for the FE community? I would use 1024bit blowfish but it's illegal to use in the USA .. go figure.
Barium magnets are banned in US too Server doesn't have to be hosted in the US.....

V
__________________
'Get it all on record now - get the films - get the witnesses -because somewhere down the road of history some bastard will get up and say that this never happened'

General D.Eisenhower


http://www.nvtronics.org
Reply With Quote
Sponsored Links
  #12  
Old 06-29-2011, 08:04 PM
StweenyA's Avatar
StweenyA StweenyA is offline
Senior Member
 
Join Date: Jun 2011
Location: Home is where the heart is
Posts: 169
Quote:
Originally Posted by Zooty View Post
What if i was to whip up a crude Skype clone with 256bit AES encryption for the FE community? I would use 1024bit blowfish but it's illegal to use in the USA .. go figure.
Exactly. Legal encryption is only secure from the average joe blob.

Any ways around this, to get real security?
__________________
 
Reply With Quote
  #13  
Old 06-29-2011, 08:10 PM
john_g john_g is offline
Silver Member
 
Join Date: Jul 2008
Posts: 518
Translation via google

Spanish - detected to English translation

Microsoft has patented "Legal Intercept", a technology that allows you to intercept and monitor a legal way voice and video calls to Skype, a service acquired in May by 8,500 million dollars.

Technology "Legal Intercept 'aims to expand the scope of criminal terrorists track online conversations

The technology is intended to expand the possibilities for monitoring and recording conversations online criminal terrorists.

As reported in PC World, Microsoft describes it as a tool similar to telecommunications companies that used to meet government requirements for safety.
Technology

Microsoft to legally record the voice and video calls to Skype
Skype goes this way to enter the CALEA-Communications Assistance for Law Enforcement Act, which makes business communication technologies can be controlled, provided for security and status.

Despite the order to "Legal Intercept" which explained the Redmond giant, the patent has generated concerns among Internet users regarding privacy, as seen in various blogs and forums, and Twitter, where numerous posts alarm.


Regards
John
__________________
 
Reply With Quote
  #14  
Old 06-29-2011, 08:19 PM
MonsieurM's Avatar
MonsieurM MonsieurM is offline
Platinum Member
 
Join Date: Feb 2011
Posts: 10,078
Send a message via MSN to MonsieurM
Hacking Fiber Optics (think of fiber optics transoceanic lines)

YouTube - ‪Hacking Fiber Optics‬‏

__________________
Signs and symbols rule the world, not words nor laws.” -Confucius.
Reply With Quote
  #15  
Old 06-29-2011, 09:49 PM
Zooty Zooty is offline
Senior Member
 
Join Date: Feb 2009
Posts: 331
Quote:
Originally Posted by MonsieurM View Post
Hacking Fiber Optics (think of fiber optics transoceanic lines)

YouTube - ‪Hacking Fiber Optics‬‏

I cant believe they send customers bank details unencrypted from the teller outlet to the servers. I'm pretty sure these guy's in the video have been misinformed or they are just plain stupid. I would like to see the guy at the end sniff data from a hole in the wall machine and make sense of it. Not a chance in hell. Media propaganda.
__________________
 
Reply With Quote
  #16  
Old 06-29-2011, 09:56 PM
StweenyA's Avatar
StweenyA StweenyA is offline
Senior Member
 
Join Date: Jun 2011
Location: Home is where the heart is
Posts: 169
It's been done before.

Well did you hear about the guy in UK who used a MP3 player to record information sent over the cable modem to the ATM? He stole alot of money.
__________________
 
Reply With Quote
  #17  
Old 06-29-2011, 10:02 PM
Savvypro Savvypro is offline
Senior Member
 
Join Date: May 2009
Posts: 409
Behold the 8 Fallacies of Computing:
  1. The network is reliable.
  2. Latency is zero.
  3. Bandwidth is infinite.
  4. The network is secure.
  5. Topology doesn't change.
  6. There is one administrator.
  7. Transport cost is zero.
  8. The network is homogeneous.

If you replace network with say: software, computer, device, processor etc. The list above then apply's to anything computer related. The import bit being that they all apply to everything.


That old chestnut along the lines of: if your not doing anything you shouldn't be doing, then you have nothing to worry about. Or the other one: only criminals use encryption.

Is complete and utter bull sh*t.

Try medical records, online transactions, accessing you bank account online, tax info etc. Do you really want all that info going across the wires in clear plain text...

No?

Lets move on...

The Money program (BBC finance documentary program, here in the UK) did an episode where senior intelligence officers/police officers as well as security erperts clearly stated that organised crime and terrorists don’t use the internet or phone networks or anything else that can be easily taped. They use messengers, actual real people who are trusted to deliver messages. That gem should be all you need to know about this spying bull sh*t.

Quote:
Originally Posted by StweenyA View Post
When browsing, Cookies can be shared across any websites, and if you have flash, these cookies can even be shared across browsers.
Cookies don't work like that, only the server that instructed the browser to create the cookie can request the information stored in that cookie from the browser.
The browser is the only thing that creates cookies, and it acts as gate keeper to the cookies. The amount of info that can be stored in a cookie is browser specific, but the amount is limited, very limited.

A good description of what cookies are used for is simply the equivalent of the re-entry stamp you get at say night clubs, theme parks etc. The privacy problems are with the data stored on servers which the info in the cookies point to.


Anyway if their monitoring us, then we can royally fu*k with them. How you ask?

By becoming part of the noise.

As the old saying goes: if you want to hide something, hide it in plain sight.

The key to this is randomness.
__________________
...

. . .
Regular service Signature:
Follow along on my Algae growing adventure, where I'm currently growing Spirulina and two mystery strains (one of which can also produce Biofuel). All is revealed in the Growing Algae thread...

Last edited by Savvypro; 06-29-2011 at 10:10 PM.
Reply With Quote
  #18  
Old 06-29-2011, 10:15 PM
MonsieurM's Avatar
MonsieurM MonsieurM is offline
Platinum Member
 
Join Date: Feb 2011
Posts: 10,078
Send a message via MSN to MonsieurM
Quote:
Originally Posted by Savvypro View Post


Anyway if their monitoring us, then we can royally fu*k with them. How you ask?

By becoming part of the noise.

As the old saying goes: if you want to hide something, hide it in plain sight.

The key to this is randomness.

__________________
Signs and symbols rule the world, not words nor laws.” -Confucius.
Reply With Quote
  #19  
Old 06-29-2011, 10:30 PM
Slider2732 Slider2732 is offline
Gold Member
 
Join Date: Mar 2011
Location: Muskogee, Oklahoma, USA
Posts: 1,006
And related to those thoughts are the ways I surf.

I surf without actually being ME that surfs, have done for years. It's random, it's not my surfing, my interests, who I am.
The MIB's are sure that I have a lot of knowledge about. oh for example - Womens handbag styles through the ages. endangered fish species, curtain offers in Oklahoma stores, good deals on used auto's, Lowe's BBQ's. None of those are of interest, but I seem to have spent a long time looking through related sites, so therefore i'm that person right ?

A classic, is to surf around YouTube, click a 10 minute video and turn the sound down and walk away. The MIB believe you viewed a video that might somehow be against their stupid wishes...but you didn't and THEY REALLY CANNOT KNOW !
Case in point, they probably believe i'm clued up and overly interested in 9/11 conspiracies.

On your next shopping trip, pick up an opposite type to your usual bread and a newspaper you never read..then give them to your next door neighbour.
If the MIB want info, give them wrong info.
__________________
 

Last edited by Slider2732; 06-29-2011 at 10:39 PM.
Reply With Quote
  #20  
Old 06-30-2011, 12:08 AM
SkyWatcher's Avatar
SkyWatcher SkyWatcher is offline
Gold Member
 
Join Date: Apr 2008
Posts: 2,245
Hi folks, allow me to offer a little wisdom, as nothing is new under the sun.
I would suggest saying whatever you want, wherever you want.
When one goes into fear, you give your power away instantly, trust me on this, I've experienced it first hand multiple times.
As Chevy Chase says from caddyshack, ""I'm going to give you a little advice. There's a force in the universe that makes things happen. And all you have to do is get in touch with it, stop thinking, let things happen, and be the ball.
"Remember Danny - Two wrongs don't make a right but three rights make a left."

And this force is based in pure unconditional love, it does not know fear, it only knows that anything is possible.
These so called mib's, send them your love, as they are in a box and have forgotten who and what they are, infinite consciousness.
peace love light
tyson

edit: oh here's the clip if anyone wants to watch hehe
YouTube - ‪Caddyshack - Be the Ball‬‏
__________________
 

Last edited by SkyWatcher; 06-30-2011 at 01:02 AM.
Reply With Quote
  #21  
Old 04-01-2013, 03:43 AM
desktopspy desktopspy is offline
Junior Member
 
Join Date: Apr 2013
Posts: 1
Reply

NOT just FBI but also you can monitor SKYPE with SKYPE monitorign software.
Voice Chat Spy Recorder software for Skype, Yahoo Messenger, MSN, QQ, etc.
Skype Voice Recorder
__________________
 
Reply With Quote
Sponsored Links
  #22  
Old 04-01-2013, 03:36 PM
Allcanadian's Avatar
Allcanadian Allcanadian is offline
Silver Member
 
Join Date: Sep 2008
Posts: 659
@Skywatcher
Quote:
Hi folks, allow me to offer a little wisdom, as nothing is new under the sun.
I would suggest saying whatever you want, wherever you want.
When one goes into fear, you give your power away instantly, trust me on this, I've experienced it first hand multiple times.
I would agree and the thing to remember here is that we are the good guys trying to make the world a better place and our intentions are honest and sincere.
In this respect intent matters, on the other hand their actions amount to little more than some pervert peeping in peoples windows. I find it amazing how the human mind can justify such things they know intuitively are morally wrong and yet they will do these things for money. Remember all these people are getting paid to do something they know is morally wrong.

To be honest I find all this comical that people who call themselves mature and responsible adults would be sifting through my mail or conversations. As well if my supervisor ever asked me to spy on other employees I would probably laugh in his face and tell him to grow up because at some point a man has to act like a man and not a child simply following others. I would be willing to bet not one person in these agencies has the integrity to stand up to their supervisors and say what we are doing is wrong and this is probably why it continues.

A man is not defined by his ability to blindly follow others like a child and do what he is told he is defined by his ability to act independently of others.

Regards
AC
__________________
 

Last edited by Allcanadian; 04-01-2013 at 04:20 PM.
Reply With Quote
  #23  
Old 04-01-2013, 07:09 PM
citfta's Avatar
citfta citfta is online now
Gold Member
 
Join Date: Jun 2008
Posts: 1,271
Off topic, but!

Hi Allcanadian,

This post will be off topic, but right in line with what you have posted. I have just finished a book called "When a Nation Forgets God, Seven Lessons We Must Learn from Nazi Germany" by Erwin W. Lutzer. It is an amazing look at how a whole nation of people can be convinced to give up all their moral values. If you promise people a good economy and plenty of food and a roof over their head they will ignore all evidence of wrong and follow any leader no matter how evil he is. Just look at what is going on in the U.S. right now. We murder millions of unborn children and pretend there is nothing wrong with it. We are following in exactly the same steps of Nazi Germany even though history has shown how wrong that was.

Respectfully,
Carroll
__________________
 
Reply With Quote
  #24  
Old 04-01-2013, 07:53 PM
PhysicsProf PhysicsProf is offline
Senior Member
 
Join Date: Nov 2011
Posts: 229
Some very astute points; I esp enjoyed Slider's!

Now, this warrantless search stuff is affecting our research, and I give a recent example, but without names.

XXX shipped his device for me to run some tests, in a wooden box that he custom-made for it. It cost about $130 to ship via Fedex. It was fully assembled (in a straight line, one piece). Working and ready to go.

But it came to me in a black-plastic container, with popcorn and shredded-cardboard packing (which he did not use), DISASSEMBLED, in two pieces (motor and unit). Further, the nuts holding the unit together were all loose or gone -- 3 nuts loose, 4 nuts GONE. I later found the four nuts on the bottom of the crate.


Sent the shipping number and photos to XXX via email, he emailed back:

Quote:
quote:
First thing the [phone] number you gave me is not working, 2nd thing I DID not ship that in that box and it was fully assembled when I shipped it!
What is going on here?
After I called him via phone, then my phone "starting working" again...

He said unit was SEALED (and I could see evidence of that, an orange silicone material), so they broke the seal.

But who?

He asked me to spin the shaft on unit, I did so. It made a grinding sound. Not good. plates are rubbing.

Later I took it apart with XXX watching via skype. The shims and disks inside were not even IN THE CORRECT order. Whoever put it back together botched the job; if they even cared.


Ruined as far as my testing it is concerned -- it has to go back to him for proper re-assembly and re-alignment, and perhaps new disks.
TEST ABORTED.

He formally complained to Fedex. Then called back -- they had "lost" his complaint... I called Fedex and complained also, finally transferred to a supervisor. He assured me that Fedex does NOT remove nuts from bolts on shipments. I said "who did it" -- he could not say. I asked, if I pushed this, could I find out WHO did it? "No, probably not" was the reply.

XXX and I decided to get back to research, stop trying to find out WHO, when we know WHO but of course no one will say...

It is troubling when this stuff hits home.

PS -- the research carries on. We may have to do more person-to-person exchanges where possible.
__________________
 

Last edited by PhysicsProf; 04-01-2013 at 08:45 PM.
Reply With Quote
  #25  
Old 04-01-2013, 08:58 PM
Farmhand Farmhand is offline
Platinum Member
 
Join Date: Jun 2010
Location: Australia
Posts: 3,389
Hi PhysicsProf, I'm not sure of the protocol but surely fedex parcels are
scanned for drugs, explosives and such things by dogs ect. if not it would be a
risk free transport option for drug couriers ect.. Maybe the item was flagged by a
dog or x-ray machine as being suspicious and was searched by officers of law enforcement
"not" fedex employees. Often these managers will not give over any info they
don't have to unless pressed or asked with specific language, eg. asking who
would have opened it is asking him for a persons name, maybe you should
have asked if it was possibly searched for contraband and the procedures
they use for the detection of such contraband and the actual department
government or otherwise responsible for searching.

I would recommend when resending, the box is sealed and the contents
shown prior to sealing by way of uncut video tape up to the point of fedex
taking possession, then videoing uncut the taking into possession on your
end, the opening and inspection of the package.

With that evidence they would likely need to give a reason and compensation.

If you let it go they'll do it again to others. All they need to open and search
a package is a flagging from a dog or a suspicion from an X-ray I think.

A dog could flag a package if a person who handled drugs also handles the
package, it could be anyone, not necessarily the sender.

Personally I would "sting" them but as described above I would video tape
sufficient evidence. Then see what happens. Obviously someone is lying.

Cheers

P.S. The searching of suspected parcels is of course necessary, but if a
mistake is made people should be compensated, which would indirectly make
them use more care when searching, no complaints, no compensation, no
problem, no care. Simple.

....
__________________
 

Last edited by Farmhand; 04-01-2013 at 09:05 PM.
Reply With Quote
  #26  
Old 04-01-2013, 09:57 PM
PhysicsProf PhysicsProf is offline
Senior Member
 
Join Date: Nov 2011
Posts: 229
I need to add that the device has already been sent back to XXX, using a different carrier. Hoping to avoid problems, I shipped it in two separate boxes, both about the same size.

The box with the motor and mount arrived first, "1 of 2 boxes", even though the shipment was supposed to go together. Not so unusual there except that UPS stated on the tracking record that

"The receiver requested a hold for a future delivery date. UPS will attempt delivery on date requested. / Delivery rescheduled. "

An email from XXX clarifies that he, the receiver, did not request a delay - he wrote,
Quote:

Why would I take the 1 box and not the other? What the hell is going on?
Thus, UPS lied.

The second box, which contained the device itself, did finally arrive a day later... XXX said he will take it apart and see what he can do...
__________________
 
Reply With Quote
Reply

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Please consider supporting Energetic Forum with a voluntary monthly subscription.

For One-Time Donations, use admin@ this domain > energeticforum.com

Choose your voluntary subscription

All times are GMT. The time now is 03:49 AM.


Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2018, vBulletin Solutions, Inc.
Search Engine Optimisation provided by DragonByte SEO v1.4.0 (Pro) - vBulletin Mods & Addons Copyright © 2018 DragonByte Technologies Ltd.
Shoutbox provided by vBShout v6.2.8 (Lite) - vBulletin Mods & Addons Copyright © 2018 DragonByte Technologies Ltd.
2007-2015 Copyright - Energetic Forum - All Rights Reserved

Bedini RPX Sideband Generator

Tesla Chargers