When an organization or individual gives up something or provides easy access to an object to an external entity to persuade that party to believe they have accessed everything stored and preserved by the party being investigated or searched. At the same time, the party holding what is desired seeks to continue protecting and concealing […]

Malicious lives are consumed in the web of a spider that crawled across the truth they tried to conceal. Showing evidence of the lives they executed actions to steal. As they wait for the opening of the Seventh Seal, my Lord’s Judgment, he will reveal. As I watch them slowly become this spider’s meal as […]

Intelligent people do not waste time pursuing the malicious or the ignorant that caused damage to their castle. Because the probability they can produce something better in the amount of time it would take to recover the original loss is greater. Life is not about proving anything to anybody. It’s about how you want to […]

During the years of the industrial age freedom of speech was a “right” protected by the founding documents of the republic. During the Information Age freedom of speech is a “service” provided in accordance with the terms of service and discretion of the entities that provide us connectivity (public utility), the platforms we distribute our […]

Digital Rights Management has been prevalent for over two decades as a way to control access to digital media by content providers. Content distributors provide access to various forms of media via Content Delivery Networks (CDN), which are globally distributed arrays of servers that house consolidated databases of media that they are licensed to distribute […]