Category Archives: COOL VIDEOS in Sports, Recreation,Technology, Art, Comedy &Inspirational

Royal Friesian Horses

“Friesian Horses”
I was unaware of this breed. Their manes and tails are the longest that I have seen, and I noticed that when performing on grass, their hoofs do not kick up a divot (they land flat footed).
Beautiful creatures such as these are what makes this world so special. Another wonder to God’s creation! These horses are native to the Netherlands …. It should make your day..

911 The Video Key: AMAZING from an indigo-Proof that the 911 planes were video composites


In the last video (rare new video find 2013) below, you will see that the plane’s wing, as it approaches the building, goes “behind” the building in the background…confirming that the video is graphically manipulated.

If this gets scrubbed from Youtube email us for a private link
An additional tantalizing bit of information is that the infamous Carlyle Group, which invests primarily in defense contractors, owns a company called Foundry, based in Britain. Foundry produces systems like AVID that are even more sophisticated in their applications http://www.thefoundry.co.uk/ About the Carlyle Group


Some people say they were at the site and saw the planes. Here is the explanation for that HOLOGRAM TECHNOLOGY
Watch carefully, especially the left wing.

All I have done is slow down this video, zoom in, and freeze some frames — I have not modified this footage in any other way.

Scientists who are experts in the holographic projection field and have viewed this footage say that there is no way that this could possibly be a real plane, but it is definitely a holographic projection, and that the mysterious disappearance of the left wing of the supposed “plane” was caused by part of the smoke plume getting in the way of the satellite-mounted holographic projector.

Bush administration officials have come up with a few lame excuses.

However, none of their excuses explain why the left wing clearly disappears before impact, while the right wing remains visible until it supposedly enters the building.

Take careful note that there is an explosion to the left of the supposed “fuselage” that occurs where the left wing would have been, but there is no left wing entering the building at all because there was no plane — it was a US military missile, poorly disguised using holographic technology.

Time to change you world view video

Chinese Kuan Yin Dance performance: Beautiful and brilliant

Thousand Hand Guan Yin was a dance created by Chinese choreographer Zhang Jigang. This dance was performed by 63 deaf dancers of China Disabled People’s Performing Art Troupe. Because they could not hear the music, there were 6 directors in white cloths helping them synchronizing with the music. This dance described the legend that Bodhisattva Guan Yin has one thousand hands. Bodhisattva is a Proto-Buddha. She can not become a Buddha because she is still attached to this world. Her vow: If there is still a single drop of tear in this world, I will not become a Buddha

SILENT CIRCLE: new encryption app set to revolutionize privacy and… freak out the Feds.

For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all.Until now, sending encrypted documents has been frustratingly difficult for anyone who isn’t a sophisticated technology user, requiring knowledge of how to use and install various kinds of specialist software. What Silent Circle has done is to remove these hurdles, essentially democratizing encryption. It’s a game-changer that will almost certainly make life easier and safer for journalists, dissidents, diplomats, and companies trying to evade state surveillance or corporate espionage. Governments pushing for more snooping powers, however, will not be pleased.  Read more…

COMMENT FROM VIEWER:  Had a brief look, this is nothing new.  This kind of encryption has been available for decades and silent circle just repackages it also giving them the opportunity to add in backdoors. In my experience, you will want to only use 100% open-source privacy and encryption tools.  all commercial products for which you do not own source-code can be compromised.   This is what i recommend and it’s a protocol not a product (understand the difference): http://wiki.xmpp.org/web/OTR

Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie–Hellman key exchange, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides perfect forward secrecy and malleable encryption.

The most advanced encrypted network that i have seen is called WASTE:

http://en.wikipedia.org/wiki/WASTE  There’s a reason you’ve probably never heard of it.  i think we need to make it more commonly used