From faabd6333a3fd3a6112fdc882c20df3dec355523 Mon Sep 17 00:00:00 2001 From: Riccardo Giuntoli Date: Tue, 29 Oct 2019 12:47:44 +0100 Subject: [PATCH] Add files via upload --- Chapter eleven - brainwashing.md | 2 +- Chapter seven - goods.md | 6 ++++-- Chapter three - blockchain.md | 2 +- 3 files changed, 6 insertions(+), 4 deletions(-) diff --git a/Chapter eleven - brainwashing.md b/Chapter eleven - brainwashing.md index aeac231a..e1c28a17 100644 --- a/Chapter eleven - brainwashing.md +++ b/Chapter eleven - brainwashing.md @@ -6,7 +6,7 @@ Yes. And mass media and television owners believe more than you. Do you know **T Who are the beautiful girls of this '90 photo shoot? **Gianni Boncompagni** [[2]](https://en.wikipedia.org/wiki/Gianni_Boncompagni) productions "**Non รจ la rai**" [[3]](https://it.wikipedia.org/wiki/Non_%C3%A8_la_Rai). - +In this world, the B-side, people use four meanings for every words. People that don't know rules of this fascinating other side of life, like me, got some difficult to easy understand rapidly what is the real meaning but with some experience and a good music to concentrate us we can understand the real meaning of format (disambiguation) as usual only using wikipedia and # External links diff --git a/Chapter seven - goods.md b/Chapter seven - goods.md index eeedfda8..2a0c45c7 100644 --- a/Chapter seven - goods.md +++ b/Chapter seven - goods.md @@ -35,9 +35,9 @@ With remote neural monitoring what happen to business man: - **Unfair competition** [[11]](https://en.wikipedia.org/wiki/Unfair_competition) - **Misappropriation** [[12]](https://en.wikipedia.org/wiki/Misappropriation) -- Break of **Competition law** [[13]](https://en.wikipedia.org/wiki/Competition_law) +- Break of **competition law** [[13]](https://en.wikipedia.org/wiki/Competition_law) -So another kind of victim of the network are young inexpert businessman, like i was, that are inserted violently in this system. They theft all his possession and fall in the gang stalking game, normally for a couple of years or more depending on his capacities. +So another kind of victim of the network are young inexpert businessman, like i was, that are inserted violently in this system. They theft all his possession and fall in the gang stalking game, normally for a couple of years or more depending on his capacities and **synonym** [[14]](https://en.wikipedia.org/wiki/Synonym). @@ -69,4 +69,6 @@ So another kind of victim of the network are young inexpert businessman, like i 13. https://en.wikipedia.org/wiki/Competition_law +14. https://en.wikipedia.org/wiki/Synonym + \ No newline at end of file diff --git a/Chapter three - blockchain.md b/Chapter three - blockchain.md index b3163b4c..692dad48 100644 --- a/Chapter three - blockchain.md +++ b/Chapter three - blockchain.md @@ -54,7 +54,7 @@ This is only a little window over this terrorist and criminal network. We'll go A blockchain model applied to networking **ISO/OSI** [[11]](https://en.wikipedia.org/wiki/OSI_model) stack. It replace the last fourth pile of the Internet model. Packets are replaced with data chunks mixed in various different locations without a fixed one, a central server. It's like the old style **p2p** [[12]](https://en.wikipedia.org/wiki/Peer-to-peer) but with new encryptions models that guarantee **privacy** [[13]](https://en.wikipedia.org/wiki/Privacy), **cryptography** [[14]](https://en.wikipedia.org/wiki/Cryptography), confidentiality, integrity, and availability. -### External Links +# External Links 1. https://www.getmonero.org/ 2. https://en.wikipedia.org/wiki/Blockchain