top of page
petertje.png
einstein_funny.PNG

CONTROL

xBORDER_mascotte_logo_Block_chain_API_Te

Ask MEGA-MAN

RF 007 -- ONLINE SPY SHOP:  --- WIFI, ETH, GSM, GPG, PGP -- MILITARY GRADE & QUALITY SPY TOOLS  -- TRACK -- LISTEN -- CATCH & COPY - SPOOF  & MORE.

LATEST NEWS & TECHNOLOGY: ARDUINO, RASPI, LINUX, WINDOWS, MAC-OS -- DEBIAN -- KALI -- PARROT -- REDHAT -- INFO & COURSES -- BOOKS & SOFTWARE

GMS, BLUETOOTH, BLE , INFRARED & RADIO -- SWARMING, TRACKING, LOCATING > COPY , IMITATE THAN PENETRATE:  BLE, IR, WIFI, GMS, THE MHZ CATCHERS 

QUESTIONS ? COMMENTS ? OFFERS ? 

CALL, CHAT, OR EMAIL: WE MAKE IT PERSONAL: WE OFFER 24.7 ONLINE ASSISTANCE. DONT UNDERSTAND A WORD? CLICK IT! ITS A LINK.. WE OFFER PERSONAL, HIGHEND SERVICE & KNOW-HOW ON MULTIPLE SUBJECTS. OUR TEAM TRAVELS ALL OVER THE WORLD. 

 

ORGANIZING EVENTS  & WORKSHOPS , DISCUSSIONS & LECTURES, ONLINE & IN REAL LIVE: MEET US !  

 

ONLINE:  HELP US DEVELOP AND GET CRYPTO-SHARES OF THE NEMESIS. JOIN HUNDREDS OF PROFESSIONALS WITH THE SAME TASK..

BUILDING AN BLOCKCHAIN POWERED ,  INTELLIGENT, E-COMMERCE  NETWORK: A PLATFORM ENTITY  LEARNS, COMPARES, DEPLOYS, CALCULATES, CRAWLS& SNIFFS THE INTERNET IN THE SEARCH FOR KNOWLEAGE. IN THE BEGIN THAT WILL BE E0--COMMERCE, PRICES, OFFERS ETC.

 

DO YOU BELIEVE?   THE DECENTRALIZATION AND CYPTO-CODING AKA BLOCK-CHAINING, FINALLY   MICROPROCESSORS BECOMING REAL ' MICRO" INTELLIGENT  -ALL-IN-ONE-CPU-GPU-MEMORY, INDUCED BY QUANTUM TECHNOLOGY, WILL START WHEN OUR COAL, GASOLINE, WINDMILLS WILL BE REPLACED BY HYDROGEN.  HYDROGEN WILL BE FOR ELECTRICITY WHAT ELECTRICITY WAS TO STEAM, IT SPARKED THE INDUSTRIAL REVOLUTION.

 

RO - POWERED BY  WILL BE NANO-PROCESSORS POWERED BY QUANTUM TECHNOLOGY.   UPGRADE LEADS TO THE API-MATRIX INTELLIGENCE THAT WILL CHANGE ONLINE BUSINESS, CURRENCY AND SHAREHOLDING WILL REPRESENT VALUE, AND NOT BASED ON TRUST,

 

TBECAUSE KNOW-HOW IS POWER, WILL SHOW IN RISING VALUE OF XBO-CRYPTO-SHARES,  BUT THAT IS NOT HER GOAL NOR HER FINAL PURPOSE, DO YOU BELIEVE? ELON DOES..

 

CHINA -  DE - SUA - JPN - RUSSIA - [ USA, UK, AU, NL, FR  ]  - THE POWER OF TECHNOLOGY AND THE PLAYERS , E-BOOK 

 

.




RF 007 -- SPY SHOP:  --- WIFI, ETH, GSM, GPG, PGP -- MILITARY GRADE & QUALITY SPY TOOLS  -- TRACK -- LISTEN -- CATCH & COPY - SPOOF  & MORE.
LATEST NEWS & TECHNOLOGY: ARDUINO, RASPI, LINUX, WINDOWS, MAC-OS -- DEBIAN -- KALI -- PARROT -- REDHAT -- INFO & COURSES -- BOOKS & SOFTWARE
GMS, BLUETOOTH, BLE , INFRARED & RADIO -- SWARMING, TRACKING, LOCATING > COPY , IMITATE THAN PENETRATE:  BLE, IR, WIFI, GMS, THE MHZ CATCHERS 

KNOW-HOW 
THE STRONGEST TRANSPORTER OF DATA? DSL? 6G? SUPER-WIFI? NOPE.. VOLT.. THATS RIGHT: WHEN YOU PLUG YOUR HIGH-END PGP PHONE INTO THE POWERLINE TO CHARGE..  ALTHO THIS TECHNOLOGY IS DIFFICULT AND NEW: THIS IS HOW JEFF BESOZ GOT HACKED. YOU KNOW BLUETOOTH IS ACCESSIBLE OVER VOLT? I CAN HOP FROM DEVICE TO DEVICE. I CAN MIMIK YOUR BLEUTOOTH MAC-NUMBER, AND ID, SO THAT AN CORRUPTED DEVICE WILL SYNC WITH YOUR DEVICES, AND ACCESSIBLE TO ALL DEVICES  THAT YOU CONNECTED TO POWERLINES: FROM THERE I CAN ACCESS YOUR UNIQUE MAC & SNIN NUMBERS, SPOOF THEM, AND YOU WILL CARRY A 'HOST' WITH YOU ALL THE TIMES, WHEREEVER YOU GO.  PASSWORDS? LOCKS? DOESNT MATTER BECAUSE YOUR PHONE OR COMPUTER DOESNT RECONISE THE TREATH.  I CAN HOP FROM YOUR BLUETOOTH, WIFI OR GMS -RF TO ALL DEVICES THAT BROADCAST RF-SIGNALS: CAMERAS, PHONES, TV'S, COMPUTERS,   YOUR MOTORBIKE, YOUR ELECTRIC CAR,SCARY: I CAN GO INSIDE YOUR HEAD WHEN  YOU WEAR HEARING DEVICES.. 

I CAN MANIPULATE YOUR PHONE APPLICATIONS, ALTER MUSIC OR JUST TAKE IT EASY: CHANGE  NAME-SERVERS & ALL YOUR UPLOAD & DOWNLOAD DATA WILL BE TRANSPORTED TO MY PERSONAL COMPUTER 'A SO CALLED MIM-ATTACK' . 

I DID RESEARCH ON DATA OVER VOLT FOR THE PAST 3 YEARS, I GOT THE ATTENTION OF VARIOUS AGENCIES: CHINA, THE UK, AND MY FELLOW COUNTRY MEN , THE DUTCH, ARE 24/7 PRESENT.  I TRIED TO LAUNCH WEBSITES BEFORE THIS ONE ON THIS SUBJECT: IMPOSSIBLE: WEB-SITES WHERE REMOVED, DOMAIN NAMES GONE,  SOFTWARE PATENTS BLOCKED. WHEN I TOLD MY SISTER, SHE DID NOT BELIEVE ME.  I REPORTED MORE THAN 8 TIMES AT THE POLICE STATION, I WROTE LETTERS TO THE MINISTER OF JUSTICE AND THE MINISTER OF TECHNOLOGY: SHE WROTE ME BACK: SOMETHING LIKE: FUCK OFF. THE POLICE TOLD ME I HAD MENTAL PROBLEMS, AND THAT I 'HAD TO LET THIS SUBJECT GO.. 

NOW 3 YEARS LATER, WHEN THIS KNOW-HOW IS GETTING OUT TO THE PUBLIC, THE DUTCH GOVERNMENT WAS FALLEN , SOME OF THEM HAVE TO GO TO COURT: 30.000 MAN, WOMAN & CHILDREN WHERE CUT ON WELL-FARE FOR MORE THAN 10 TO 15 YEARS, LOANS STOPT, LOSING THEIR HOUSING,   MARKED AS CRIMINALS,   BECAUSE OF WHAT THEY REFER AS 'HUMAN ERRORS', BLAMING EACH OTHER, SHOWING UP TO LATE AT HEARING COMMISSIONS, TAKE-ING NO RESPONSIBILITY, BLAMING EACH OTHER, NOT EVEN ONE SPOKE THE TRUTH, OR THEY JUST DONT FUCKING CARE !    SLAMMER OF THE MOINTH:  THE JUSTICE AND COMPUTER DEPARTMENT: PREACHING AND TELLING THE PEOPLE OF THE NETHERLANDS THEY CANNOT GO  OUTSIDE AFTER 9 WITH MORE THAN 3 PEOPLE:  THE MINISTER OF JUSTICE WAS CAUGHT THAT WEEKEND AT A PARTY AFTER 9 WITH MORE THAN 3 PEOPLE. IRONIC ISN'T IT ? THE MINISTER OF TECHNOLOGY: A WOMEN WHO DOESNT KNOW THAT 'LINUX' IS, GAVE US A NEW LAW: DE SLEEPWET, THIS LAW MAKES MASSIVE SURVAILLANCE LEGAL. FUNNY THING: THEY WANTED IT TO LOOK DEMOCRATIC: AND TOLD US WE HAVE THE DEMOCRATIC RIGHT IN A 'REFERENDUM' TO VOTE AGAINST OR PRO THIS LAW: THE LAW WAS DENIED BY THE PEOPLE OF THE NETHERLANDS: 2 MONTHS LATER IT WAS  AN ACTIVE LAW, AND MAKES THE NETHERLANDS NO.1  ON SURVEILLANCE IN EUROPE.  LUCKY FOR ME: MY LOGS SHOWED IP'S, I COULDN'T FIGURE IT OUT, HOW THEY WHERE ABLE TO HACK MY FIREWALLS, VPN'S, PASSWORDS EVEN VIRTUAL MACHINES:: DATA OVER VOLT. SELLING THIS TECHNOLOGY TO ARAB COUNTRIES,PROMOVATING TO ONE OF  THE 5-EYES . USA-UK-CANADA-AU-NL -- : GOOGLE, APPLE THEY KNOW:  GOOGLE, APPLE, DHL AND MANY MORE ARE BUILDING DATA-CENTERS IN NL WORTH BILLIONS AND BILLIONS OF DOLLARS. WHY?  REMEMBER GOOGLE WAS FINED 4 BILLION EURO BY EUROPE?
THEY NEVER PAYED. THE DUTCH STRUCK A DEAL:GOOGLE BUILDS DATA CENTRES WORTH BILLIONS , GOOGLE DOESNT PAY A FINE, BUT BUILD DATA-CENTRES, PAYING NO TAX HERE WAS ALSO SOLVED BY THE DUTCH: IN THE NETHERLANDS WHEN YOU HAVE TAX-DECLERANCE ABOVE 100MILLION USD, YOU HAVE A SPECIAL TEAM VISITING YOU: MAKING A TAX-DEAL: ITS ARE FACTS HUH: MY GOVERNMENT MAKE ANOTHER DEAL:  SOFTWARE, DATA BACKDOOR THAT GIVES THE DUTCH ONLY IN THE REAREST OCCASION PRIVILEGE TO USE THAT BACKDOORS: THE TRUTH IS THAT ITS USED IN THE POLICE ACADEMY, AND STUDENTS BRAG TO EACH OTHER , OVER MANIPULATING AND PLAYIN' TRICKS ON CILIVIALS. THE PROGRAM STOPPED IN ACADEMY: THEY FOUND OUT THAT DATA REALLY MEANS POWER.. ALSO, I WANT TO PRAISE THE HONEST DUTCH GOVERMNENT WORKERS AND THE POLICE.  MAY THE FORCE BE WITH YOU. PETER OLDENBURGER, AMSTERDAM, DUTCH-LAND.
 
 


FACTS


FFAC

HACKING MILITARY GRADE

Peter Oldenburger,  Amsterdam, NL 2021. 

MINE. FACTS.

 
 
DATA  TOOLS TO PROTECT YOUR DATA , OVER VOLT.    







QUESTIONS ? COMMENTS ? OFFERS ? 
CALL, CHAT, OR EMAIL: WE MAKE IT PERSONAL: WE OFFER 24.7 ONLINE ASSISTANCE. DONT UNDERSTAND A WORD? CLICK IT! ITS A LINK.. WE OFFER PERSONAL, HIGHEND SERVICE & KNOW-HOW ON MULTIPLE SUBJECTS. OUR TEAM TRAVELS ALL OVER THE WORLD. 
 

ORGANIZING EVENTS  & WORKSHOPS , DISCUSSIONS & LECTURES, ONLINE & IN REAL LIVE: MEET US !  
 
ONLINE:  HELP US DEVELOP AND GET CRYPTO-SHARES OF THE NEMESIS. JOIN HUNDREDS OF PROFESSIONALS WITH THE SAME TASK..
BUILDING AN BLOCKCHAIN POWERED ,  INTELLIGENT, E-COMMERCE  NETWORK: A PLATFORM ENTITY  LEARNS, COMPARES, DEPLOYS, CALCULATES, CRAWLS& SNIFFS THE INTERNET IN THE SEARCH FOR KNOWLEAGE. IN THE BEGIN THAT WILL BE E0--COMMERCE, PRICES, OFFERS ETC.
 
DO YOU BELIEVE?   THE DECENTRALIZATION AND CYPTO-CODING AKA BLOCK-CHAINING, FINALLY   MICROPROCESSORS BECOMING REAL ' MICRO" INTELLIGENT  -ALL-IN-ONE-CPU-GPU-MEMORY, INDUCED BY QUANTUM TECHNOLOGY, WILL START WHEN OUR COAL, GASOLINE, WINDMILLS WILL BE REPLACED BY HYDROGEN.  HYDROGEN WILL BE FOR ELECTRICITY WHAT ELECTRICITY WAS TO STEAM, IT SPARKED THE INDUSTRIAL REVOLUTION.
 
RO - POWERED BY  WILL BE NANO-PROCESSORS POWERED BY QUANTUM TECHNOLOGY.   UPGRADE LEADS TO THE API-MATRIX INTELLIGENCE THAT WILL CHANGE ONLINE BUSINESS, CURRENCY AND SHAREHOLDING WILL REPRESENT VALUE, AND NOT BASED ON TRUST,
 
TBECAUSE KNOW-HOW IS POWER, WILL SHOW IN RISING VALUE OF XBO-CRYPTO-SHARES,  BUT THAT IS NOT HER GOAL NOR HER FINAL PURPOSE,
DO YOU BELIEVE? ELON DOES..


 
CHINA -  DE - SUA - JPN - RUSSIA - [ USA, UK, AU, NL, FR  ]  - THE POWER OF TECHNOLOGY AND THE PLAYERS , E-BOOK 
 
.

index

API-x INTEL

Events, Meets & Greets

Index

CLOUD-x

Events, Tech & Develop

Sitemap

CYBER SECURITY, PENETRATION TESTING, - HACKING & DEBUGGING  --  PERSONAL ADVISE, BUSINESS ADVIS,  CORPORATE UPGRADING, PRIVATE &GOVERNMENT.

WE OFFER  HIGH-END & MILITARY GRADE KNOW-HOW, TOOLS, CORDINATING , SOFTWARE & INFORMATION, 100% LEGAL, OPEN & TRANSPARENT, LICENCED.

PROJECTS INCLUDE: PEN-TESTING, CRYPTO-CURRENCY, CRYPTO-PROGRAMMING & BLOCKCHAIN DEVELOPMENT:

 WE BRING YOU WORLD FIRST DECENTRAL  E-COMMERCE NETWORK -- THE BORDER PLATFORM ~  5 API-AUTOMATED E-COMMERCE SHOPS  ON AN ONLINE PLATFORM, EASY TO CONFIGURE & CONTROLLED.. WE ARE PROUIUD TO PRESENT: XBO = WORLD FIRST CRYPTO-SHARE, THE FIRST CRYPTO-CURRENCY THAT REPRESENTS VALUE ! WITH 5 PATENTS @ THE United States USPTO & INTEREST FROM TECH-COMPANIES & GOVERMNENTS AS CHINA & THAILAND..

. READ MORE: HOW THE FIRST CRYPTO_CROWDFUND WILL SPARK DECENTRAL E-COMMERCE PLATFORMS:  THIS WILL BE THE FUTURE OF API-INTEL E-COMMERCE.  

RF 007 -- ONLINE SPY SHOP:  --- WIFI, ETH, GSM, GPG, PGP -- MILITARY GRADE & QUALITY SPY TOOLS  -- TRACK -- LISTEN -- CATCH & COPY - SPOOF  & MORE.

LATEST NEWS & TECHNOLOGY: ARDUINO, RASPI, LINUX, WINDOWS, MAC-OS -- DEBIAN -- KALI -- PARROT -- REDHAT -- INFO & COURSES -- BOOKS & SOFTWARE

GMS, BLUETOOTH, BLE , INFRARED & RADIO -- SWARMING, TRACKING, LOCATING > COPY , IMITATE THAN PENETRATE:  BLE, IR, WIFI, GMS, THE MHZ CATCHERS 

QUESTIONS ? COMMENTS ? OFFERS ? 

CALL, CHAT, OR EMAIL: WE MAKE IT PERSONAL: WE OFFER 24.7 ONLINE ASSISTANCE. DONT UNDERSTAND A WORD? CLICK IT! ITS A LINK.. WE OFFER PERSONAL, HIGHEND SERVICE & KNOW-HOW ON MULTIPLE SUBJECTS. OUR TEAM TRAVELS ALL OVER THE WORLD. 

 

ORGANIZING EVENTS  & WORKSHOPS , DISCUSSIONS & LECTURES, ONLINE & IN REAL LIVE: MEET US !  

 

ONLINE:  HELP US DEVELOP AND GET CRYPTO-SHARES OF THE NEMESIS. JOIN HUNDREDS OF PROFESSIONALS WITH THE SAME TASK..

BUILDING AN BLOCKCHAIN POWERED ,  INTELLIGENT, E-COMMERCE  NETWORK: A PLATFORM ENTITY  LEARNS, COMPARES, DEPLOYS, CALCULATES, CRAWLS& SNIFFS THE INTERNET IN THE SEARCH FOR KNOWLEAGE. IN THE BEGIN THAT WILL BE E0--COMMERCE, PRICES, OFFERS ETC.

 

DO YOU BELIEVE?   THE DECENTRALIZATION AND CYPTO-CODING AKA BLOCK-CHAINING, FINALLY   MICROPROCESSORS BECOMING REAL ' MICRO" INTELLIGENT  -ALL-IN-ONE-CPU-GPU-MEMORY, INDUCED BY QUANTUM TECHNOLOGY, WILL START WHEN OUR COAL, GASOLINE, WINDMILLS WILL BE REPLACED BY HYDROGEN.  HYDROGEN WILL BE FOR ELECTRICITY WHAT ELECTRICITY WAS TO STEAM, IT SPARKED THE INDUSTRIAL REVOLUTION.

 

RO - POWERED BY  WILL BE NANO-PROCESSORS POWERED BY QUANTUM TECHNOLOGY.   UPGRADE LEADS TO THE API-MATRIX INTELLIGENCE THAT WILL CHANGE ONLINE BUSINESS, CURRENCY AND SHAREHOLDING WILL REPRESENT VALUE, AND NOT BASED ON TRUST,

 

TBECAUSE KNOW-HOW IS POWER, WILL SHOW IN RISING VALUE OF XBO-CRYPTO-SHARES,  BUT THAT IS NOT HER GOAL NOR HER FINAL PURPOSE, DO YOU BELIEVE? ELON DOES..

 

CHINA -  DE - SUA - JPN - RUSSIA - [ USA, UK, AU, NL, FR  ]  - THE POWER OF TECHNOLOGY AND THE PLAYERS , E-BOOK 

 

.

BLOCKCHAIN CH-x

Free Workshops

ECOMMERCE

xBORDER_mascotte_logo_Block_chain_API_Te

mission control

Ξ

xborder_block-chain-api-cloud_edited.png

SOFTWARE ENGINEERING PROJECTS: PEN-TESTING FOR CORPORATIONS, CRYPTO-CURRENCY, CRYPTO-PROGRAMMING & BLOCKCHAIN DEVELOPMENT:

 WE BRING YOU WORLD FIRST DECENTRAL  E-COMMERCE NETWORK -- THE BORDER PLATFORM ~  5 API-AUTOMATED E-COMMERCE SHOPS  ON AN ONLINE PLATFORM, EASY TO CONFIGURE & CONTROLLED.. WE ARE PROUIUD TO PRESENT: XBO = WORLD FIRST CRYPTO-SHARE, THE FIRST CRYPTO-CURRENCY THAT REPRESENTS VALUE ! WITH 5 PATENTS @ THE United States USPTO & INTEREST FROM TECH-COMPANIES & GOVERMNENTS AS CHINA & THAILAND..

. READ MORE: HOW THE FIRST CRYPTO_CROWDFUND WILL SPARK DECENTRAL E-COMMERCE PLATFORMS:  THIS WILL BE THE FUTURE OF API-INTEL E-COMMERCE.  

RF 007 -- ONLINE SPY SHOP:  --- WIFI, ETH, GSM, GPG, PGP -- MILITARY GRADE & QUALITY SPY TOOLS  -- TRACK -- LISTEN -- CATCH & COPY - SPOOF  & MORE.

LATEST NEWS & TECHNOLOGY: ARDUINO, RASPI, LINUX, WINDOWS, MAC-OS -- DEBIAN -- KALI -- PARROT -- REDHAT -- INFO & COURSES -- BOOKS & SOFTWARE

GMS, BLUETOOTH, BLE , INFRARED & RADIO -- SWARMING, TRACKING, LOCATING > COPY , IMITATE THAN PENETRATE:  BLE, IR, WIFI, GMS, THE MHZ CATCHERS 

QUESTIONS ? COMMENTS ? OFFERS ? 

CALL, CHAT, OR EMAIL: WE MAKE IT PERSONAL: WE OFFER 24.7 ONLINE ASSISTANCE. DONT UNDERSTAND A WORD? CLICK IT! ITS A LINK.. WE OFFER PERSONAL, HIGHEND SERVICE & KNOW-HOW ON MULTIPLE SUBJECTS. OUR TEAM TRAVELS ALL OVER THE WORLD. 

 

ORGANIZING EVENTS  & WORKSHOPS , DISCUSSIONS & LECTURES, ONLINE & IN REAL LIVE: MEET US !  

 

ONLINE:  HELP US DEVELOP AND GET CRYPTO-SHARES OF THE NEMESIS. JOIN HUNDREDS OF PROFESSIONALS WITH THE SAME TASK..

BUILDING AN BLOCKCHAIN POWERED ,  INTELLIGENT, E-COMMERCE  NETWORK: A PLATFORM ENTITY  LEARNS, COMPARES, DEPLOYS, CALCULATES, CRAWLS& SNIFFS THE INTERNET IN THE SEARCH FOR KNOWLEAGE. IN THE BEGIN THAT WILL BE E0--COMMERCE, PRICES, OFFERS ETC.

 

DO YOU BELIEVE?   THE DECENTRALIZATION AND CYPTO-CODING AKA BLOCK-CHAINING, FINALLY   MICROPROCESSORS BECOMING REAL ' MICRO" INTELLIGENT  -ALL-IN-ONE-CPU-GPU-MEMORY, INDUCED BY QUANTUM TECHNOLOGY, WILL START WHEN OUR COAL, GASOLINE, WINDMILLS WILL BE REPLACED BY HYDROGEN.  HYDROGEN WILL BE FOR ELECTRICITY WHAT ELECTRICITY WAS TO STEAM, IT SPARKED THE INDUSTRIAL REVOLUTION.

 

RO - POWERED BY  WILL BE NANO-PROCESSORS POWERED BY QUANTUM TECHNOLOGY.   UPGRADE LEADS TO THE API-MATRIX INTELLIGENCE THAT WILL CHANGE ONLINE BUSINESS, CURRENCY AND SHAREHOLDING WILL REPRESENT VALUE, AND NOT BASED ON TRUST,

 

TBECAUSE KNOW-HOW IS POWER, WILL SHOW IN RISING VALUE OF XBO-CRYPTO-SHARES,  BUT THAT IS NOT HER GOAL NOR HER FINAL PURPOSE, DO YOU BELIEVE? ELON DOES..

 

CHINA -  DE - SUA - JPN - RUSSIA - [ USA, UK, AU, NL, FR  ]  - THE POWER OF TECHNOLOGY AND THE PLAYERS , E-BOOK 

 

.

Interactive Forum Sys

xborder_block-chain-api-cloud.png

The Timeline

BLOCKCHAIN powered API INTELligent cloud NETWORK

BLOCKCHAIN powered API INTELligent cloud NETWORK

XBORDER Ξ  ECOMMERCE

multi-layer BLOCKCHAIN  & API-X ™ INTELLIGENT 

network - CLOUD-x CRYPTO-platform

 

 XBORDER ECOMMERCE - BLOCK-CHAIN CH-X INTELLIGENT API-X CRYPTO CLOUD-X NETWORK

Ξ xBORDER ecommerce  platform  Ξ

 Ξ ∞ VOC-x  { automated learning

 Ξ API-x  { Analytic Intelligent 

 Ξ snb-x { sandbx development

 Ξ ∞ bLc-x { Multi-layer BlockChain 

affiliate

xborder ecommerce platform

e-commerce decentralized, powered by block-chains & connected & full automated by api code intergrations codecs. xx worlds first 'crypto-currency' with real & instant value, the ultimate crypto-future.

xbo, worlds first 'crypto-currency' with real & instant value, the ultimate crypto-future.

API-X

AUTOMATED INTELLIGENT E-COMMERCE platform

blockchAIN-X

multi-layerd block-chain controller nodes

cloud-X

real-time block-chain powered sync & back

bo-X.io

crowdfunding startup 

UNITED FEDERATION OF NERDS

UNITED FEDERATION OF NERDS

NEWS & UPDATES @ xBORDER NET

BE FIRST 2 KNOW

Thanks for submitting!


WELCOME TO THE FUTURE,
HUMANITY @ 2020
 
THE UNITED FEDERATION OF NERDS,
EARTH GALACTIC L/L = 42DG39MIN32.4SEC_43DG08MIN19.2SEC @ 01/01/2214


xBORDER ∞ PROJECT8 ∞  THE E-COMMERCE REVOLUTION  ∞  THE RISE OF DECENTRALIZATION


ABOUT DECENTRALIZATION
DECENTRALIZED MEANS APPLYING CONTRACTING DIRECTLY BETWEEN 0 & 1
THE HISTORICAL WAY OF CONTRACTING WAS TROUGH A MIDDLE MAN, THIS HAPPEND FOR A  REASON,
THE MIDDLE MAN, OR MIDDLE CONTRACT SUPPLIED ' THE TRUST OF VALUE '  FOR THAT TRANSACTION.
 
BLOCK-CHAIN AND CRYPTO-CHAIN TECHNOLOGY ARE FORMS OF APPLYING DIRECT CONTRACTING .



BLOCKCHAIN AS A MONETAIR CURRECY ? WELL, TO BE HONEST, ZUCKENBERG, THIS IS NOT POSSIBLE.
DDUE TO THE HIGH AMOUNTHS OF ENERGIE IT TAKES TO PRODUCE YOUR LIBRA, I WAS CONFUSED WHEN I WAS READING THE WHITEPAPER, IT DOESNT APPLY NEW TECHNOLOGIE BUT BUILDS ON OLDER BITCOIN / ETHERIUM  BITS & VALUE.
BITCOIN IS SLOW & CONSUMES WAY TO MUCH ENERGY TO BE APPLIED IN REAL-TIME SYNC OR LIFE. 

THATS SO 1990 CHECK IT HERE YOU KNOW THERE IS ONLY A KEYNES VALUE
 
API-X GIVES  LEGAL OWNERSHIP OF xBORDER E-COMMERCE PLATFORM
 



xBORDER NETWORK    ∞  HTTPS://www.APi-X .APP 

POWERED & SECURED BY xBORDERS MULTI-LAYERED BLOCK-CHAIN TECHNOLOGY    ∞ HTTPS://BLOCKCH-x.ORG 
 
ACCESS & CONFIG OF API-X & XBO IN REAL-TIME SYNC AT xBORDERS CLOUD NETWORK   ∞  HTTPS://CLOUD-x .APP 
 
TRADE, INVEST OR EXPAND API-x E-COMMERCE PLATFORMS, JOIN THE TRADERS GILD   ∞  HTTPS://VOC-x.ORG


CLOUD-X
BLOCKCHAIN-X

xborder_block_chain_api_network
Play Video
xborder_block_chain_api_network
Play Video

INTELLIGENT API-X E-COMMERCE BLOCK-CHAIN NETWORK VIDEO 

 CENTRAL DECENTRALIZED FORUM

 - START WORKING TOGETHER ! !


KIX.ONE WHITEPAPER 2021

Chapters

The History
xBORDER As A State Transition System
Mining in Generic
Merkle Trees
Alternative Blockchain Applications
Scripting xBORDER
BLOCKCNX
Philosophy
xBORDER Accounts
Messages and Transactions
Messages
xBORDER State Transition Function
Code Execution
xBORDER and Mining
Applications
Token Systems
Financial derivatives and Stable-Value Currencies
Identity and Reputation Systems
Decentralized File Storage
Decentralized Autonomous Organizations
Further Applications
Miscellanea And Concerns
Modified GHOST Implementation
Fees
Computation And Turing-Completeness
Currency And Issuance
Mining Centralization
Scalability
Conclusion
Notes and Further Reading
Notes
Further Reading
Introduction to Bitcoin and Existing Concepts


The concept of decentralized digital currency, as well as alternative applications like property registries, has been around for decades. The anonymous e-cash protocols of the 1980s and the 1990s, mostly reliant on a cryptographic primitive known as Chaumian blinding, provided a currency with a high degree of privacy, but the protocols largely failed to gain traction because of their reliance on a centralized intermediary. In 1998, Wei Dai's b-money became the first proposal to introduce the idea of creating money through solving computational puzzles as well as decentralized consensus, but the proposal was scant on details as to how decentralized consensus could actually be implemented. In 2005, Hal Finney introduced a concept of reusable proofs of work, a system which uses ideas from b-money together with Adam Back's computationally difficult Hashcash puzzles to create a concept for a cryptocurrency, but once again fell short of the ideal by relying on trusted computing as a backend. In 2009, a decentralized currency was for the first time implemented in practice by Satoshi Nakamoto, combining established primitives for managing ownership through public key cryptography with a consensus algorithm for keeping track of who owns coins, known as "proof of work".

xBORDER mechanism behind proof of work was a breakthrough in the space because it simultaneously solved two problems. First, it provided a simple and moderately effective consensus algorithm, allowing nodes in the network to collectively agree on a set of canonical updates to the state of the Crypto-ledger. Second, it provided a mechanism for allowing free entry into the consensus process, solving the political problem of deciding who gets to influence the consensus, while simultaneously preventing sybil attacks. It does this by substituting a formal barrier to participation, such as the requirement to be registered as a unique entity on a particular list, with an economic barrier - the weight of a single node in the consensus voting process is directly proportional to the computing power that the node brings. Since then, an alternative approach has been proposed called proof of stake, calculating the weight of a node as being proportional to its currency holdings and not computational resources; the discussion of the relative merits of the two approaches is beyond the scope of this paper but it should be noted that both approaches can be used to serve as the backbone of a cryptocurrency.

Peter Oldenburger, the founder of xBORDER wrote this Blog Post:

the Crypto As A State Transition System 
The ledger of a cryptocurrency such as the Crypto can be thought of as a state transition system, where there is a "state" consisting of the ownership status of all existing the Cryptos and a "state transition function" that takes a state and a transaction and outputs a new state which is the result. In a standard banking system, for example, the state is a balance sheet, a transaction is a request to move $X from A to B, and the state transition function reduces the value in A's account by $X and increases the value in B's account by $X. If A's account has less than $X in the first place, the state transition function returns an error. Hence, one can formally define:

APPLY(S,TX) -> S' or ERROR
APPLY({ Alice: $50, Bob: $50 },"send $20 from Alice to Bob") = { Alice: $30, Bob: $70 }
APPLY({ Alice: $50, Bob: $50 },"send $70 from Alice to Bob") = ERROR
The "state" in the Crypto is the collection of all coins (technically, "unspent transaction outputs" or UTXO) that have been mined and not yet spent, with each UTXO having a denomination and an owner (defined by a 20-byte address which is essentially a cryptographic public keyfn. 1). A transaction contains one or more inputs, with each input containing a reference to an existing UTXO and a cryptographic signature produced by the private key associated with the owner's address, and one or more outputs, with each output containing a new UTXO to be added to the state.

The state transition function APPLY(S,TX) -> S' can be defined roughly as follows:

For each input in TX:

If the referenced UTXO is not in S, return an error.
If the provided signature does not match the owner of the UTXO, return an error.
If the sum of the denominations of all input UTXO is less than the sum of the denominations of all output UTXO, return an error.

Return S' with all input UTXO removed and all output UTXO added.

The first half of the first step prevents transaction senders from spending coins that do not exist, the second half of the first step prevents transaction senders from spending other people's coins, and the second step enforces conservation of value. In order to use this for payment, the protocol is as follows. Suppose Alice wants to send 11.7 BTC to Bob. First, Alice will look for a set of available UTXO that she owns that totals up to at least 11.7 BTC. Realistically, Alice will not be able to get exactly 11.7 BTC; say that the smallest she can get is 6+4+2=12. She then creates a transaction with those three inputs and two outputs. The first output will be 11.7 BTC with Bob's address as its owner, and the second output will be the remaining 0.3 BTC "change", with the owner being Alice herself.

Mining
block_picture.jpg

If we had access to a trustworthy centralized service, this system would be trivial to implement; it could simply be coded exactly as described, using a centralized server's hard drive to keep track of the state. However, with the Crypto we are trying to build a decentralized currency system, so we will need to combine the state transition system with a consensus system in order to ensure that everyone agrees on the order of transactions. the Crypto's decentralized consensus process requires nodes in the network to continuously attempt to produce packages of transactions called "blocks". The network is intended to produce roughly one block every ten minutes, with each block containing a timestamp, a nonce, a reference to (ie. hash of) the previous block and a list of all of the transactions that have taken place since the previous block. Over time, this creates a persistent, ever-growing, "blockchain" that constantly updates to represent the latest state of the the Crypto ledger.

The algorithm for checking if a block is valid, expressed in this paradigm, is as follows:

Check if the previous block referenced by the block exists and is valid.
Check that the timestamp of the block is greater than that of the previous blockfn. 2 and less than 2 hours into the future
Check that the proof of work on the block is valid.
Let S[0] be the state at the end of the previous block.
Suppose TX is the block's transaction list with n transactions. For all i in 0...n-1, set S[i+1] = APPLY(S[i],TX[i]) If any application returns an error, exit and return false.
Return true, and register S[n] as the state at the end of this block.
Essentially, each transaction in the block must provide a valid state transition from what was the canonical state before the transaction was executed to some new state. Note that the state is not encoded in the block in any way; it is purely an abstraction to be remembered by the validating node and can only be (securely) computed for any block by starting from the genesis state and sequentially applying every transaction in every block. Additionally, note that the order in which the miner includes transactions into the block matters; if there are two transactions A and B in a block such that B spends a UTXO created by A, then the block will be valid if A comes before B but not otherwise.

The one validity condition present in the above list that is not found in other systems is the requirement for "proof of work". The precise condition is that the double-SHA256 hash of every block, treated as a 256-bit number, must be less than a dynamically adjusted target, which as of the time of this writing is approximately 2187. The purpose of this is to make block creation computationally "hard", thereby preventing sybil attackers from remaking the entire blockchain in their favor. Because SHA256 is designed to be a completely unpredictable pseudorandom function, the only way to create a valid block is simply trial and error, repeatedly incrementing the nonce and seeing if the new hash matches.

At the current target of ~2187, the network must make an average of ~269 tries before a valid block is found; in general, the target is recalibrated by the network every 2016 blocks so that on average a new block is produced by some node in the network every ten minutes. In order to compensate miners for this computational work, the miner of every block is entitled to include a transaction giving themselves 12.5 BTC out of nowhere. Additionally, if any transaction has a higher total denomination in its inputs than in its outputs, the difference also goes to the miner as a "transaction fee". Incidentally, this is also the only mechanism by which BTC are issued; the genesis state contained no coins at all.

In order to better understand the purpose of mining, let us examine what happens in the event of a malicious attacker. Since the Crypto's underlying cryptography is known to be secure, the attacker will target the one part of the Bitcoin system that is not protected by cryptography directly: the order of transactions. The attacker's strategy is simple:

Send 100 BTC to a merchant in exchange for some product (preferably a rapid-delivery digital good)
Wait for the delivery of the product
Produce another transaction sending the same 100 BTC to himself
Try to convince the network that his transaction to himself was the one that came first.
Once step (1) has taken place, after a few minutes some miner will include the transaction in a block, say block number 270. After about one hour, five more blocks will have been added to the chain after that block, with each of those blocks indirectly pointing to the transaction and thus "confirming" it. At this point, the merchant will accept the payment as finalized and deliver the product; since we are assuming this is a digital good, delivery is instant. Now, the attacker creates another transaction sending the 100 BTC to himself. If the attacker simply releases it into the wild, the transaction will not be processed; miners will attempt to run APPLY(S,TX) and notice that TX consumes a UTXO which is no longer in the state. So instead, the attacker creates a "fork" of the blockchain, starting by mining another version of block 270 pointing to the same block 269 as a parent but with the new transaction in place of the old one. Because the block data is different, this requires redoing the proof of work. Furthermore, the attacker's new version of block 270 has a different hash, so the original blocks 271 to 275 do not "point" to it; thus, the original chain and the attacker's new chain are completely separate. The rule is that in a fork the longest blockchain is taken to be the truth, and so legitimate miners will work on the 275 chain while the attacker alone is working on the 270 chain. In order for the attacker to make his blockchain the longest, he would need to have more computational power than the rest of the network combined in order to catch up (hence, "51% attack").

Merkle Trees
SPV in the Crypto

Left: it suffices to present only a small number of nodes in a Merkle tree to give a proof of the validity of a branch.

Right: any attempt to change any part of the Merkle tree will eventually lead to an inconsistency somewhere up the chain.

An important scalability feature of the Crypto is that the block is stored in a multi-level data structure. The "hash" of a block is actually only the hash of the block header, a roughly 200-byte piece of data that contains the timestamp, nonce, previous block hash and the root hash of a data structure called the Merkle tree storing all transactions in the block. A Merkle tree is a type of binary tree, composed of a set of nodes with a large number of leaf nodes at the bottom of the tree containing the underlying data, a set of intermediate nodes where each node is the hash of its two children, and finally a single root node, also formed from the hash of its two children, representing the "top" of the tree. The purpose of the Merkle tree is to allow the data in a block to be delivered piecemeal: a node can download only the header of a block from one source, the small part of the tree relevant to them from another source, and still be assured that all of the data is correct. The reason why this works is that hashes propagate upward: if a malicious user attempts to swap in a fake transaction into the bottom of a Merkle tree, this change will cause a change in the node above, and then a change in the node above that, finally changing the root of the tree and therefore the hash of the block, causing the protocol to register it as a completely different block (almost certainly with an invalid proof of work).

The Merkle tree protocol is arguably essential to long-term sustainability. A "full node" in the the Crypto network, one that stores and processes the entirety of every block, takes up about 15 GB of disk space in the Bitcoin network as of April 2014, and is growing by over a gigabyte per month. Currently, this is viable for some desktop computers and not phones, and later on in the future only businesses and hobbyists will be able to participate. A protocol known as "simplified payment verification" (SPV) allows for another class of nodes to exist, called "light nodes", which download the block headers, verify the proof of work on the block headers, and then download only the "branches" associated with transactions that are relevant to them. This allows light nodes to determine with a strong guarantee of security what the status of any Bitcoin transaction, and their current balance, is while downloading only a very small portion of the entire blockchain.

Alternative Blockchain Applications
The idea of taking the underlying blockchain idea and applying it to other concepts also has a long history. In 1998, Nick Szabo came out with the concept of secure property titles with owner authority, a document describing how "new advances in replicated database technology" will allow for a blockchain-based system for storing a registry of who owns what land, creating an elaborate framework including concepts such as homesteading, adverse possession and Georgian land tax. However, there was unfortunately no effective replicated database system available at the time, and so the protocol was never implemented in practice. After 2009, however, once Bitcoin's decentralized consensus was developed a number of alternative applications rapidly began to emerge.

Namecoin - created in 2010, Namecoin is best described as a decentralized name registration database. In decentralized protocols like Tor, Bitcoin and BitMessage, there needs to be some way of identifying accounts so that other people can interact with them, but in all existing solutions the only kind of identifier available is a pseudorandom hash like 1LW79wp5ZBqaHW1jL5TCiBCrhQYtHagUWy. Ideally, one would like to be able to have an account with a name like "george". However, the problem is that if one person can create an account named "george" then someone else can use the same process to register "george" for themselves as well and impersonate them. The only solution is a first-to-file paradigm, where the first registerer succeeds and the second fails - a problem perfectly suited for the Bitcoin consensus protocol. Namecoin is the oldest, and most successful, implementation of a name registration system using such an idea.
Colored coins - the purpose of colored coins is to serve as a protocol to allow people to create their own digital currencies - or, in the important trivial case of a currency with one unit, digital tokens, on the Bitcoin blockchain. In the colored coins protocol, one "issues" a new currency by publicly assigning a color to a specific Bitcoin UTXO, and the protocol recursively defines the color of other UTXO to be the same as the color of the inputs that the transaction creating them spent (some special rules apply in the case of mixed-color inputs). This allows users to maintain wallets containing only UTXO of a specific color and send them around much like regular bitcoins, backtracking through the blockchain to determine the color of any UTXO that they receive.
Metacoins - the idea behind a metacoin is to have a protocol that lives on top of Bitcoin, using Bitcoin transactions to store metacoin transactions but having a different state transition function, APPLY'. Because the metacoin protocol cannot prevent invalid metacoin transactions from appearing in the Bitcoin blockchain, a rule is added that if APPLY'(S,TX) returns an error, the protocol defaults to APPLY'(S,TX) = S. This provides an easy mechanism for creating an arbitrary cryptocurrency protocol, potentially with advanced features that cannot be implemented inside of Bitcoin itself, but with a very low development cost since the complexities of mining and networking are already handled by the Bitcoin protocol. Metacoins have been used to implement some classes of financial contracts, name registration and decentralized exchange.
Thus, in general, there are two approaches toward building a consensus protocol: building an independent network, and building a protocol on top of Bitcoin. The former approach, while reasonably successful in the case of applications like Namecoin, is difficult to implement; each individual implementation needs to bootstrap an independent blockchain, as well as building and testing all of the necessary state transition and networking code. Additionally, we predict that the set of applications for decentralized consensus technology will follow a power law distribution where the vast majority of applications would be too small to warrant their own blockchain, and we note that there exist large classes of decentralized applications, particularly decentralized autonomous organizations, that need to interact with each other.

The Bitcoin-based approach, on the other hand, has the flaw that it does not inherit the simplified payment verification features of Bitcoin. SPV works for Bitcoin because it can use blockchain depth as a proxy for validity; at some point, once the ancestors of a transaction go far enough back, it is safe to say that they were legitimately part of the state. Blockchain-based meta-protocols, on the other hand, cannot force the blockchain not to include transactions that are not valid within the context of their own protocols. Hence, a fully secure SPV meta-protocol implementation would need to backward scan all the way to the beginning of the Bitcoin blockchain to determine whether or not certain transactions are valid. Currently, all "light" implementations of Bitcoin-based meta-protocols rely on a trusted server to provide the data, arguably a highly suboptimal result especially when one of the primary purposes of a cryptocurrency is to eliminate the need for trust.
 

00:00 / 01:04

NAME: XBO-GOBA1

P. Oldenburger Amsterdam Netherlands.

API-OATH HACK, ZERO DAY VULNERABILITY FOUND IN GOOGLE !

BUG FOUND IN  in GOOGLE OATH API April 4, 2020, Amsterdam Netherlands,

** THIS IS A MAJOR BUG WITH MAJOR IMPACT **

BUG NAME=

XBO-GOBA1 -  Google API OATH Authorization Bug, found on 4 April 2020.

 

6 April 2020,  Amsterdam Netherlands.

 

xBORDER NERD BO-X.iO BUG Analysts, # xBORDER Research team found a mayor authorization Bug in the Google Admin Application Softwaremrun on 13.4 OSX, Reset Password DIsabled Full Administrator Access to all underlying Nodes, Domains, and Admins.

 

This Bug can have a serious impact -- it can have major complications when Administrator Access / Super Admins are disabled to DomainReg, "DNS, MX, NAMES, A, AA"  Access. This can be resolved by rewriting the OATH access API in that Application.     See pictures for details. 

 

 

This is a config Error that can be used as a gate to full access of ALL google applications.

Restore of Original Values are virtually impossible due to WHOIS restrictions on google.domains, CNAME updates are virtually impossible due to non-access. this is a RE-LOOP Bu and could have a major impact.

Peter Oldenburger & Friends.

# NERD BO-X.iO @ xBORDER

 ! ANODE {  xBORDER  }  - VOC-X "VALUE:  +10 } , VOC-X Crawlers deployed on this Oath bug can leech massive amounts of user data, company data. Google Cases ref: 2-6991000030256 Senior Google Specialists.

BUG II:
Google API OATH Authorization PART II, GOOGLE DOMAINS BUG.
Mayor Bug found on 4 April 2020.
 
6 April 2020,  Amsterdam Netherlands.
 
Our Research team found a mayor Access & Authorization Bug @ Google, 
Gmail & Domain.google syn are non-compatible. G-mail, Gsuit re-access need CNAME implements, however Google.Domains is not acc. by login, This has mayor impact on Googlists that use the Gsuit & Google domain service. Access is imposible to recover. 

 
This Bug can have a serious impact because it can have major complications when Administrator Access / Super Admins are disabled to DomainReg, "DNS, MX, NAMES, A, AA"  Access. This can be resolved by rewriting the OATH access API in that Application oorn Seperating access control in Gsuite/Gmail and Domains.     See pictures for details. 

P.Oldenburger 2020
Amsterdam Netherlands.


! ANODE {  xBORDER  }  - VOC-X "VALUE:  +7 } , VOC-X Crawlers deployed on this Oath bug can Open Backdoor into Domain access.

GOOGLE AUTORIZATION 2 MAJOR FAIL BUG FOUND IN GOOGLE OATH AUTHORIZATION API

2 BUGS FOUNDS WITH MAJOR IMPACT, TOTAL ACCESS IS DISABLED. THIS WOULD BE DISASTEROUS FOR HOSPITALS, DOCTORS ETC !
 

bottom of page