Thursday, March 26, 2020

Fertilized Eggs and Our Expanding Universe--Same Swirling Pattern

Take a look at the this mind-blowing image of a newly fertilized egg kicking out spiraling patterns of proteins as it prepares to undergo its first cell division. 

Fertilized egg manifests spiraling patterns prior to first division.
MIT researchers were surprised to discover that the swirling patterns precisely mirror other systems, from atmospheric hurricanes to ocean circulation hydrodynamics to quantum fluids. 

As you can see, the swirling patterns emanate from a central interior position and spread over the surface of the egg. You can also see the depression on the far side of the egg begin to appear as it prepares to sink inward toward the middle, where it will eventually form the hollow tube of the organism's gut.

In 2018 I wrote an article called "A Simple Explanation of an Embryo's Development--It's a Torus!"  Here's an image from that article, which demonstrates the next stages in the zygote's life. I urge you to read that article for a description of the developing toroidal embryo.

These images track a mouse embryo from gastrulation through organogenesis.
K. McDole Cell/2018
 VOLUME 175, ISSUE 3P859-876.E33, OCTOBER 18, 2018
"each wave emerged in a spiral pattern, and that multiple spirals whirled across an egg’s surface at a time. Some spirals spontaneously appeared and swirled away in opposite directions, while others collided head-on and immediately disappeared.
"The behavior of these swirling waves, the researchers realized, is similar to the waves generated in other, seemingly unrelated systems, such as the vortices in quantum fluids, the circulations in the atmosphere and oceans, and the electrical signals that propagate through the heart and brain.
“Not much was known about the dynamics of these surface waves in eggs, and after we started analyzing and modeling these waves, we found these same patterns show up in all these other systems,” says physicist Nikta Fakhri, the Thomas D. and Virginia W. Cabot Assistant Professor at MIT. “It’s a manifestation of this very universal wave pattern.”
The research further states, 
"From their videos, the team observed that waves seemed to oscillate outward as tiny, hurricane-like spirals. The researchers traced the origin of each wave to the core of each spiral, which they refer to as a “topological defect.” Out of curiosity, they tracked the movement of these defects themselves. They did some statistical analysis to determine how fast certain defects moved across an egg’s surface, and how often, and in what configurations the spirals popped up, collided, and disappeared.
"In a surprising twist, they found that their statistical results, and the behavior of waves in an egg’s surface, were the same as the behavior of waves in other larger and seemingly unrelated systems.
“When you look at the statistics of these defects, it’s essentially the same as vortices in a fluid, or waves in the brain, or systems on a larger scale,” Dunkel says. “It’s the same universal phenomenon, just scaled down to the level of a cell.”
At some point in human research efforts, the inevitability of the principle called "as above, so below" emerges clear as day. It's wonderful to see an MIT study acknowledge this.  Putting this new finding together with my previous article on the toroidal nature of embryo development, we can see further proof of the Simple Explanation's overarching torus theory.
Moving on, today I ran across another study by Kanazawa University researcher Nobyoshi Komatsu on "Horizon Thermodynamics in holographic cosmological models."  The title of this study made me think about the outer horizon of our universe and the patterns found there. Putting two and two together makes me wonder if the patterns of early galactic swirls aren't the same phenomena as the patterns of swirling proteins. I'm guessing they are.  If this proves to be true, then it will point to a torus as the shape of the Big Bang and our universal topology--the cosmic egg. Another Simple Explanation prediction waiting to be proven by science...
NASA news
Galaxies of Stephan's Quintet in the constellation of Pegasus, observed by the NASA/ESA Hubble Space Telescope. Image credit: NASA, ESA, and the Hubble SM4 ERO Team.

Friday, March 20, 2020

Tomato Quasar and Red Pepper Black Hole

My Spanish blog friend, Jesus, sent these pictures of a tomato looking like a quasar. A remarkable similarity:

Below we have a red bell pepper showing off its beauty, and a nifty black hole at the center of its torus:

Wednesday, March 18, 2020

A Simple Explanation of Covid-19 -- What is a virus?

Virusworld : West Nile virus
West Nile virus

Core Concepts - Human Papillomavirus Infection - Pathogen ...
Human Papillomavirus
Zika virus scientific illustrations
Zika virus

Polio virus
Madeira still Covid - 19 free - Madeira Island News Blog
Covid-19 cross-section reveals the coiled instructions. 
Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2),formerly a novel coronavirus named    2019-nCoV, is a single-stranded RNA virus, with strong genetic similarity to bat coronaviruses.
Do you realize that viruses are not alive? Viruses are aggregations of atoms that form distinctive molecules. A virus is nothing more than a molecule, the same way that iron or titanium or any other element made of particles and atoms is a molecule. In other words, a molecule of Covid-19 is as dumb as a molecule of sand. 

Did you know you cannot kill a virus, because it is not alive? A virus cannot mate with another of its kind and make babies. A virus does not consume food. Viruses do not have cellular mechanisms or organs of any kind. All they are is a collection of atoms formed into molecular patterns. 

Inside the outer layer of virus atoms lies the virus cargo. The cargo is a set of instructions made of RNA or DNA. The cargo of the virus is nothing more than information, in the same way that a thumb drive or CD carries information. And, as a thumb drive needs to be inserted into a device for the information to be useful, so too a virus needs to be inserted into a living cell or organism in order to be read.

Once inside a living cell or organism, the virus cracks open and dumps its information into the mechanism of the cell, where it quickly hijacks the cell's own RNA or DNA and forces it to make copies of the viral code rather than the organism's own code. The virus, in other words, is disinformation delivered to the cell that turns the cell into a viral replicator. The cell is then forced to produce copies of the virus that burst out of the cell and go in search of fresh cells to highjack or "infect." These newly minted viruses are called "viroids." 

The hijacked cells within the organism's body, your body for example, stop doing their jobs upholding the organism's life, and do nothing but churn out defective code that goes on to infect as many cells as possible. Some of those viroids escape the host organism in the form of sneezes, coughs, sweat, blood, and feces. These viroids then roam about seeking new host organisms to infect.

If the organism's immune response kicks in, it disables the viroids and stops the spread of the invasion. In the case of a new virus like Covid-19, the organism's immune system races against time to study and learn how to defeat the never-before-encountered virus. Once it figures it out, it is then able to defeat the invader. If the organism, your body for example, cannot figure out how to defeat the invader, viroids spread throughout the body and to others outside the body until the host organism can no longer do its job of sustaining life. When the virus hijacks so many cells that the host organism can no longer effectively function, it dies.

In the "As above, so below" method of interpreting events, a viral infection is like a zombie invasion, or a vampire attack. The zombie master or vampire is not a living being. It preys upon living creatures by attacking and injecting malicious code into the victim. It sucks the life force from its victims and enlists them against their will in its ongoing campaign to survive and spread.

Going one step further, we can liken the invading virus to a zombie master who rapes and impregnates its victim and forces it to produce zombie offspring.

Here we have a group of spring-break party-goers spreading Covid-19.
The Simple Explanation would say that viruses do not level up to form new governing units of consciousness. A virus is not an aggregation of consciousness in the normal sense. A virus is, in fact, disinformation as opposed to information. A virus does does not contain a zero-point torus that links into the universal unit of consciousness. A virus does not operate according to the Simple Explanation's Golden Rule of cooperation for the greater good. 

Units of consciousness are "mud up, spirit down." A virus is only "mud." There is no animating spirit. It is not part of the life force of the universal unit of consciousness. It is a kind of anti-life force.

A virus is selfish; it only wants what is best for itself. It only wants to replicate itself; it cannot contribute to the greater good of the organism or society. A virus does not fit into the hierarchical scheme; rather, it is a physical manifestation of entropy, or destruction. For without the ability to build cooperatively with others of its kind, a virus cannot add to more complex constructions, only to destruction. If the viruses were to infect every living thing and were not overcome by living forces, the end result would be the destruction of all life in the cosmos. The only remaining forces would be atomic and molecular.

Thursday, February 13, 2020

Another Mercola Reprint on Google's Dystopian Dangers

Here's another repost from about the insidious nature of Google. Say hello to our dystopian future!

·    China started rolling out a social credit system in 2018, which awards and subtracts points for certain types of behavior
·    Google is the largest monopoly the world has ever seen, and its data-siphoning tentacles reach deep into our everyday lives, collecting data on every move you make and conversation you have, whether online or in the real world
·    By the end of 2021, approximately 1 billion cameras will be watching public movements across the globe. Cities are also inviting residents and businesses to plug their private surveillance cameras into their police network, which expands the surveillance system even further
·    To make sense of all this footage, video analytic software and artificial intelligence are used. Video analytic capabilities include fight and fall detection, loitering and motion recognition, dog walking, jaywalking, toll fare evasion and lie detection
·    There are now proposals suggesting all of this data, in combination with AI-enabled analytics systems, could be used for “predictive policing” as illustrated in the 2002 movie “Minority Report,” where suspected perpetrators are arrested before actually committing the crime
You may have heard about China's social credit system — a dystopian monitoring scheme focused on the moral dimension of human life and behavior — which was conceived in 2014 and rolled out in in earnest in 2018. As reported by Business Insider in October that year:1
"Like private credit scores, a person's social score can move up and down depending on their behavior. The exact methodology is a secret — but examples of infractions include bad driving, smoking in non-smoking zones, buying too many video games and posting fake news online.
China has already started punishing people by restricting their travel. Nine million people with low scores have been blocked from buying tickets for domestic flights …
They can also clamp down on luxury options — three million people are barred from getting business-class train tickets. The eventual system will punish bad passengers specifically. Potential misdeeds include trying to ride with no ticket, loitering in front of boarding gates, or smoking in no-smoking areas."
Aside from impeding your ability to travel, an individual's punishment for "bad behavior" per the social credit system can also result in slower internet speed, being banned from attending certain schools or getting a higher education, being barred from certain types of employment, confiscation of pets and, of course, public shaming.2
Google Makes Orwellian Surveillance Easy
"Social credit scores award or remove points based on behavior. It's Big Data meets Big Brother. This will be a world with no more personal experiences, only transactions for the social credit system.
This [the system] knows every person, every bike, every car, every bus. That's because it essentially turns every public interaction into a transaction where points can be earned or lost."
Google, of course, is a perfect fit for this kind of Orwellian surveillance scheme. It is, by far, the largest monopoly the world has ever seen, and its data-siphoning tentacles reach deep into our everyday lives, collecting data on every move you make and conversation you have, whether online or in the real world.
Google actually tracks your movements online, even when you don't think you are using their products. Most websites you visit use the 'free' Google Analytics program to track everything you do on a website.   Google purchased Urchin Software back in 2005, and by giving it away were able to integrate this important surveillance tool into most of the internet.
Google Analytics integrates with Google's ad network monopoly, as well as the largest email service Gmail.  These systems are not free, they are a tightly integrated package of surveillance tools - selling your data, selling ads served to you, and manipulating content to direct your behavior.  
These tools collect data along with other Google products like the Android 'smart' phones, the Nest home security system, and even Google's Home Assistant.  You can expect these surveillance products to become free over time as the absolute goal is to exploit every bit of data they can collect from you. 
A 2015 Wired article3 revealed some of the details of how Google's online empire is built, noting "One of the company's cluster switches provides about 40 terabits per second of bandwidth — the equivalent of 40 million home internet connections," and "Google now sends more information between its data centers than it trades with the internet as a whole."
As highlighted in a January 27, 2020, article4 by The Intercept, smart camera networks equipped with facial recognition and video analytic software will advance global surveillance even further, and should be banned to prevent an inevitable slide into invisible yet all-encompassing authoritarianism.
"The rise of all-seeing smart camera networks is an alarming development that threatens civil rights and liberties throughout the world.
Law enforcement agencies have a long history of using surveillance against marginalized communities, and studies show surveillance chills freedom of expression — ill effects that could spread as camera networks grow larger and more sophisticated," The Intercept notes.5

Silicon Valley Is Building America's Social Credit System
According to Fast Company,6 China's social credit system is not entirely unique. "A parallel system is developing in the United States, in part as the result of Silicon Valley and technology-industry user policies, and in part by surveillance of social media activity by private companies," Fast Company writes.7
For example, life insurance companies can now use content shared in social media posts to determine your premium. "That Instagram pic showing you teasing a grizzly bear at Yellowstone with a martini in one hand, a bucket of cheese fries in the other, and a cigarette in your mouth, could cost you," Fast Company notes.8
PatronScan is another example. These devices are used by restaurants to identify fake IDs and undesirable customers — people previously removed from an establishment for causing a fight, committing sexual assault, stealing or doing drugs.
The list is shared among PatronScan customers, so getting banned in one bar or restaurant effectively bans you from all bars and restaurants in the U.S., Canada and U.K. for up to one year. For additional examples, see the original Fast Company article.9
The Expansion of Public Video Surveillance
Many TV's now have a camera and can be used to record your emotions while watching presidential debates or the evening news.  The Intercept article10 cited earlier goes on to detail the rise and expansion of video surveillance, starting with Axis Communications' internet-enabled surveillance camera, launched in the late '90s, to more modern video management systems that organize all this visual data into databases.
By the end of 2021, the marketing firm IHS Markit predicts 1 billion cameras will be watching public movements across the globe. As if that's not enough, cities are also inviting residents and businesses to plug their private surveillance cameras into their police network, which expands the system even further.
According to The Intercept, Detroit, Chicago, New Orleans, New York City and Atlanta have all deployed these types of "plug-in surveillance networks," and many others are considering it as well. To actually make sense of all this footage, video analytic software and artificial intelligence (AI) are used.
Video analytic capabilities include "fight detection, motion recognition, fall detection, loitering, dog walking, jaywalking, toll fare evasion and even lie detection," The Intercept reports.11
Object recognition and "anomalous or unusual behavior detection" are also used to flag particular incidents that are then reviewed by human eyes. The Intercept recounts how this information can be used by law enforcement to identify potential crime situations:
"In Connecticut, police have used video analytics to identify or monitor known or suspected drug dealers.
Sergeant Johnmichael O'Hare, former Director of the Hartford Real-Time Crime Center, recently demonstrated how BriefCam helped Hartford police reveal 'where people go the most' in the space of 24 hours by viewing footage condensed and summarized in just nine minutes.
Using a feature called 'pathways,' he discovered hundreds of people visiting just two houses on the street and secured a search warrant to verify that they were drug houses."
Is a 'Pre-Crime' Department Next?
Companies are also working on searchable databases that can access and make sense of visual data from a range of different platforms, which will "supercharge the ability to search and surveil public spaces," The Intercept says.12
What's more, there are now proposals suggesting all of this data, in combination with AI-enabled analytics systems, could be used for "predictive policing" as illustrated in the 2002 movie "Minority Report," where suspected perpetrators are arrested before actually committing the crime.
Sound too crazy to be true? The Intercept cites a 2018 document13 by the data storage firm Western Digital and the consulting company Accenture, "Value of Data: Seeing What Matters — A New Paradigm for Public Safety Powered by Responsible AI," which predicts smart surveillance networks may be deployed "across three tiers of maturity."
The first tier is where we're at now, where law enforcement use CCTV networks to investigate crimes after they've already occurred.
At the second tier level, predicted to be in place by 2025, municipalities will be transformed into fully connected "smart cities," where the cameras of businesses and public institutions are all plugged into a government-run AI-enabled analytics system. The third tier, predicted by 2035, will have predictive capabilities. As reported by The Intercept:14
"A 'public safety ecosystem' will centralize data 'pulled from disparate databases such as social media, driver's licenses, police databases, and dark data.' An AI-enabled analytics unit will let police assess 'anomalies in real time and interrupt a crime before it is committed.' That is to say, to catch pre-crime."
Google's Ad Network Monopoly
Google's monopoly goes well beyond web search. It also has a potentially dangerous monopoly on online advertising. In 2007, Google bought DoubleClick, which already dominated the digital advertising market. As reported by InfoWorld:15
"Here's the danger: Google already knows a tremendous amount about the traffic it sends to individual Web sites — where it comes from, what people are looking for, even some basic demographics.
With DoubleClick in the fold, they will also know what ads are being served on any given page. That gives Google unprecedented insight into publishers' business. And remember, those publishers may be partners, but they are also competitors, often trying to woo the same advertisers as Google. 
Web sites live and die based upon ad revenue and on charging advertisers a certain rate based upon the number of pages served and the quality of their readership/user base. I could imagine a not-entirely-paranoid fantasy in which Google can run the numbers, turn around, and offer better rates to advertisers for a similar audience."
To learn more of Google's surveillance of you and those you love, please view my comprehensive interview with Robert Epstein below. Epstein, former editor-in-chief at Psychology Today, is now a senior research psychologist for the American Institute of Behavioral Research and Technology, where for the last decade he has helped expose Google's manipulative and deceptive practices.
Google Goes After Your Health Data
More recently, it's also become apparent Google is going after everyone's health data. Fitbit, which was recently purchased by Google, will provide them with all your physiological information and activity levels, in addition to everything else that Google already has on you.
As discussed in "How Google Is Stealing Your Personal Health Data," Google, Amazon and Microsoft also collect data entered into health and diagnostic sites, which is then shared with hundreds of third parties — and this data is not anonymized, meaning it's tied specifically to you, without your knowledge or consent.
In other words, DoubleClick, Google's ad service, will know which prescriptions you've searched for on, for example, thus providing you with personalized drug ads. "There is a whole system that will seek to take advantage of you because you're in a compromised state," Tim Libert, a computer scientist at Carnegie Mellon University told Financial Times.16
Google and various tech startups have even been investigating the possibility of assessing mental health problems using a combination of electronic medical records and tracking your internet and social media use.
Undisclosed data mining is also occurring in hospitals. A whistleblower recently revealed Google amassed health data from millions of Americans in 21 states through its Project Nightingale, and patients have not been informed of this data mining.17,18 As reported by The Guardian:19
"The secret scheme … involves the transfer to Google of healthcare data held by Ascension, the second-largest healthcare provider in the U.S. The data is being transferred with full personal details including name and medical history and can be accessed by Google staff. Unlike other similar efforts it has not been made anonymous though a process of removing personal information known as de-identification …"
According to Google and Ascension, the data being shared will be used to build a search tool with machine-learning algorithms that will spit out diagnostic recommendations and suggestions for medications that health professionals can then use to guide them in their treatment.
Google claims only a limited number of individuals will have access to the data, but just how trustworthy is Google these days? Since the data includes full personal details, sooner or later, they're likely to find a way to use it.
Google and Mastercard Track Your Purchasing Habits
Your credit card data, which at first glance would appear completely separate from Google, is also being used by the internet giant to customize ads. As reported by Bloomberg20 August 31, 2018, four unnamed insiders, three of whom claim to have been directly involved in the negotiations, claim Google and Mastercard brokered a business alliance that gives Google access to Mastercard users' retail spending.
The two companies never made the agreement public, though. Christine Bannan, counsel with the advocacy group Electronic Privacy Information Center (EPIC) told Bloomberg:21
"People don't expect what they buy physically in a store to be linked to what they are buying online. There's just far too much burden that companies place on consumers and not enough responsibility being taken by companies to inform users what they're doing and what rights they have."
According to Google, Mastercard users can opt out of ad tracking using Google's online Web & App Activity console.22 The question is, how would users know to do that when they were never told such tracking was occurring in the first place?
Google's Store Sales Measurement service also suggests it's not just Mastercard users that are being tracked. As noted by Bloomberg, when Google announced the new sales measurement service in 2017, it claimed it had access to about 70% of U.S. credit and debit card sales.
Goodbye Google
To have any chance of protecting your privacy, you simply must avoid Google products, as they account for the greatest personal data leaks in your life. To that end, is now Google-free. We do not use Google Analytics, Google ads or Google search for internal searches. To boycott Google, be sure to ditch or replace:
Gmail, as every email you write is permanently stored. It becomes part of your profile and is used to build digital models of you, which allows them to make predictions about your line of thinking and every want and desire.
Many other older email systems such as AOL and Yahoo are also being used as surveillance platforms in the same way as Gmail., which uses end-to-end encryption, is a great alternative and the basic account is free.
Google's Chrome browser, as everything you do on there is surveilled, including keystrokes and every webpage you've ever visited. Brave is a great alternative that takes privacy seriously.
Brave is also faster than Chrome, and suppresses ads. It's based on Chromium, the same software code that Chrome is based on, so you can easily transfer your extensions, favorites and bookmarks.
Google search engine, or any extension of Google, such as Bing or Yahoo, both of which draw search results from Google. The same goes for the iPhone's personal assistant Siri, which draws all of its answers from Google.
Alternative search engines include SwissCows and Qwant. Avoid StartPage, as it was recently bought by an aggressive online marketing company, which, like Google, depends on surveillance.
Android cellphones, which run on a Google-owned operating system, can track you even when you're not connected to the internet, whether you have geo tracking enabled or not. Blackberry is more secure than Android phones or the iPhone. Blackberry's upcoming model, the Key3, may be one of the most secure cellphones in the world.
Google Home devices, as they record everything that occurs in your home or office, both speech and sounds such as brushing your teeth and boiling water, even when they appear to be inactive, and send that information back to Google. Android phones are also always listening and recording, as are Google's home thermostat Nest, and Amazon's Alexa.
Additional Privacy Tips
In my recent interview (above) with Epstein, he also offered the following guidance for those seeking to protect their online privacy:
Use a virtual private network (VPN) such as Nord, which is only about $3 per month and can be used on up to six devices. In my view, this is a must if you seek to preserve your privacy. Epstein explains:
"When you use your mobile phone, laptop or desktop in the usual way, your identity is very easy for Google and other companies to see. They can see it via your IP address, but more and more, there are much more sophisticated ways now that they know it's you. One is called browser fingerprinting.
This is something that is so disturbing. Basically, the kind of browser you have and the way you use your browser is like a fingerprint. You use your browser in a unique way, and just by the way you type, these companies now can instantly identify you.
Brave has some protection against a browser fingerprinting, but you really need to be using a VPN. What a VPN does is it routes whatever you're doing through some other computer somewhere else. It can be anywhere in the world, and there are hundreds of companies offering VPN services. The one I like the best right now is called Nord VPN.
You download the software, install it, just like you install any software. It's incredibly easy to use. You do not have to be a techie to use Nord, and it shows you a map of the world and you basically just click on a country.
The VPN basically makes it appear as though your computer is not your computer. It basically creates a kind of fake identity for you, and that's a good thing. Now, very often I will go through Nord's computers in the United States. Sometimes you have to do that, or you can't get certain things done. PayPal doesn't like you to be in a foreign country for example."
Nord, when used on your cellphone, will also mask your identity when using apps like Google Maps.
Clear your cache and cookies — As Epstein explains in his article:23
"Companies and hackers of all sorts are constantly installing invasive computer code on your computers and mobile devices, mainly to keep an eye on you but sometimes for more nefarious purposes.
On a mobile device, you can clear out most of this garbage by going to the settings menu of your browser, selecting the 'privacy and security' option and then clicking on the icon that clears your cache and cookies.
With most laptop and desktop browsers, holding down three keys simultaneously — CTRL, SHIFT and DEL — takes you directly to the relevant menu; I use this technique multiple times a day without even thinking about it. You can also configure the Brave and Firefox browsers to erase your cache and cookies automatically every time you close your browser."
Don't use Fitbit, as it was recently purchased by Google and will provide them with all your physiological information and activity levels, in addition to everything else that Google already has on you.