@blackjack21
Trump, his republican allies and his supporters
ARE the establishment. You
CAN'T be the anti-establishment candidate or representatives if you
ARE AND HAVE ALWAYS BEEN the establishment. They want to keep
AND NOT SHARE power because they saw others who were not part of the establishment like Obama getting a little bit of power so Trump was the backlash FROM the establishment. Trump was NOT anti-establishment but FROM the establishment that has always been long entrenched in Washington. Trump,his supporters and the republicans ARE the establishment. They are NOT the anti-establishment.
@Drlee
I think Trump will try to establish himself as dictator in order to preserve the excessive, over the top wealth and privilege that rich white people have always enjoyed since the founding of our republic. Whether he succeeds at installing himself as dictator of the U.S. remains to be seen. Nobody really knows what will happen. He could federalize the National Guard but he might face some legal constraints in using the National Guard plus face possible legal challenges.
But he could also drag out the court process too. But I do think without question Trump wants to destroy the republic and establish a dictatorship with him having absolute power over everybody and everyone where his word is total and absolute and there are no checks or balances on his power. Trump, his republican enablers and his supporters don't seem to care one bit about the will of the people and preserving the republic.
They just want their way no matter what and if that means destroying freedom and establishing dictatorship and tyranny, then so be it. They don't like freedom, they just like power and privilege. Because if they liked freedom they wouldn't be supporting Trump's attempts at destroying our republic and installing himself as emperor and dictator.
Drlee wrote:Clearly identities are not carefully protected from a government actor. It is probably not even possible to do it.
Most cyber-criminals get away with their crimes. There
ARE ways to make it hard for governments to trace and eavesdrop in on your internet communications. However, the government has the NSA and a lot of high tech resources at it's disposal and it's own expert hackers and very brilliant people working for them. You have to know what you are doing though and it seems most people don't have that knowledge. You would also have to know how to spoof your MAC address so that it would be hard for the government to tie a given MAC address to your actual wireless or wired network interface card. But you really got to dot all your i's and t's when making it difficult for the government to trace your IP address and your MAC address. But it can be done.
That, and the government has a lot of brilliant computer professionals working for them too that they can utilize plus digital forensic experts who are very good. There are anti-forensic tools that can be used but they are not a guarantee. But I do think you can make it very difficult for governments trace and eavesdrop on your communications but you would have to be very careful. This is one of the reasons why the FBI and the Department of Justice hates encryption, especially solid encryption from open source software whose code can be examined by anybody with coding knowledge for any backdoors.
The government could easily trace me currently on this forum because I haven't really attempted to make my IP address difficult to trace or to make my communications difficult for anybody but intended recipients to read, but I can do it if I want. But nobody is uncatchable either. But you can make it hard to be caught if you know what you are doing. Most people don't know how to do that though.
It can turn into a high stakes cat and mouse game in cyber-space when dealing with skilled digital forensic experts, highly skilled hackers on both sides good at covering their tracks and keeping themselves difficult to detect, system administrators and security administrators who are good at detecting and preventing breaches. Sometimes they will also set traps for hackers like setting up fake networks that appear to be real and have valuable data to lure hackers in. They do this to learn current techniques hackers are using and then develop counter-measures to those techniques. So, such traps rely heavily on deceiving hackers and getting them to take the bait.
"I need ammunition, not a ride!" -Volodymyr Zelenskyy