Bruce Schneier

Agent Schneier
https://www.schneier.com is a CIA misdirection operation. Huge swabs of information is spawned to direct attention from the fact that all computers are chip level borked. The hacking textbooks are written by the CIA so that as the counter measures, locking down all ports,snort and wireshark etc. are implemented, it signals to the pc a high value target.

Agent Schneier concocted a story about how the CIA intercepts pcs through the postal service and then desolders the chips. There is no need to do this, since every chip is already spiked at the chip foundary.

The more high value targets implement the counter measures proposed by Schneier, the more it signals to the win10,bsd, Linux and chipset a successful penetration. With a synchronized clock and code signal, wireshark, snort, wifi and fiber routers will suspend any logging, while exfiltrating such targets data. (When you switch off your laptop, check the battery level the next day, that would indicate data extraction via the wifi router you left on the whole night).

dd
Bill Schneier got a "reward" from Apple in a ceremony for his work on encryption: he has not said a stitch about I2P and advocates Tor, knowing just like Snowden and Wikileaks that Tor doesn't work because he is an NSA agent channeling the narrative. Most of the comments on his blog are AI chat bots and NSA agents themselves creating both a narrative echo chamber and honeypot. He shifts the attention away from how the cpu itself runs minix and that any encryption attempt is borked by CIA secret quantum mechanics knowledge, about how consciousness influences perceived entropy(we know what randomness isn't, we don't know what it is) by focusing on the algorithms. Any algorithm devoid of entropy is useless.

His story about how the CIA intercepts computers through the postal system is yet again misdirection: with the CIA's minix operating system installed on the cpu itself, no desoldering of chips is needed. Snort and wireshark are subverted because minix knows that these programs are being run. China doesn't allow SshMesh encryption because this would give the US intelligence, military, industrial complex a competitive edge.

The Russian KGB seems to be heavily involved with i2p, probably why the EFF foundation directs attention to Tor, a CIA project.

links
Encryption