http://www.iahushua.com/WOI/us_nazis.htm
On the eve of World War II, IG Farben, the German chemical conglomerate, was the largest manufacturing enterprise in the world and exercised extraordinary economic and political clout in Nazi Germany. In 1936, it was the principal source for Zyklon B, the poison used in German concentration camps. From 1942-1945, the company used slave labor from Nazi concentration camps. After 1945, three members of the board of governors of American IG were tried and convicted as German war criminals. In 1952, IG Farben was split into BASF, Bayer, and Hoechst again.
In 1951, IG Farben was split into its four largest original constituent companies, which remain some of the world's largest chemical
and pharmaceutical companies. The current main successor companies are AGFA, BASF, Bayer and Sanofi.
http://digitalcommons.ilr.cornell.edu/c ... ontext=lrr
http://scholarship.law.upenn.edu/cgi/vi ... law_review
We have been silent witnesses of evil deeds; we have been drenched by many storms; we have learnt the arts of equivocation and pretence; experience has made us suspicious of others and kept us from being truthful and open; intolerable conflicts have worn us down and even made us cynical. Are we still of any use? What we shall need is not geniuses, or cynics, or misanthropes, or clever tacticians, but plain, honest, and straightforward men. Will our inward power of resistance be strong enough, and our honesty with ourselves remorseless enough, for us to find our way back to simplicity and straightforwardness?”
Dietrich Bonhoeffer, Letters and Papers from Prison
The silent weapons of the silent war are still here. Pity them. If we saved one life it was enough since it was your son or daughter.
https://www.youtube.com/watch?v=HUMh8GQnDW8
We are workers of every age, sex, and race who have joined together in an effort to uphold and improve our standard of living and achieve dignity and a voice on the job. We commit ourselves to helping unorganized workers to organize themselves. This brings them the benefits of unionization and improves our own conditions as well by increasing our bargaining power. Union organization is the best hope workers have to deal with a global economy driven by the pursuit of profit. The insecurities of temporary, casual, and contract work, employer manipulation programs, and limited opportunity jobs can be addressed through worker unity in the workplace and world community. We stand united in opposition to injustice, discrimination, oppression, ignorance, and inherent abuses of corporate power. We are committed to solidarity and collective action, social and economic justice for all working people. We join with others of like spirit to work for social justice, health and safety, a clean environment, human rights, and solidarity of all workers as we oppose exploitation around the world. We believe it is by raising our standards that we raise the standards of all workers, and it is by helping them raise their standards that we raise our own. We seek to form coalitions and build a political movement that represents the interests of working people everywhere. T
The way I did this was to export a branch of the registry, usually HKCU, the used the FC.EXE file found in Windows. Make sure you use the /N and /U switches. I also found a comment section of The Register some modifications to the HOSTS file which you can use to block tracking. That Register article is how I linked here. Below is my work so far. I saved it as a text file, disable Windows Defender and any antivirus, run a powershell as an administrator, rename the file to a .cmd extension, and then run this script. The batch file is below.
REM This should be run with command prompt as an adminstrator.
REM Disable the antivirus and Windows Defender.
REM After disabling those, rename the file extension from .txt to .cmd
REM Then run this script.
REM This does not fix all privacy issues, you will still need to turn off some.
REM First, block Windows from sending data about you to their servers.
echo ## BEGIN Windows 10 privacy settings ##>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 vortex.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 vortex-win.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telecommand.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 oca.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 oca.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 sqm.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 redir.metaservices.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 choice.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 choice.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 reports.wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 services.wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 sqm.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.ppe.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.appex.bing.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.urs.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.appex.bing.net:443>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 settings-sandbox.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 vortex-sandbox.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 survey.watson.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.live.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 statsfe2.ws.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 compatexchange.cloudapp.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 cs1.wpc.v0cdn.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 a-0001.a-msedge.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 statsfe2.update.microsoft.com.akadns.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 diagnostics.support.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 corp.sts.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 statsfe1.ws.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 pre.footprintpredict.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 i1.services.social.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 i1.services.social.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 bingads.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 www.bingads.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo ## END Windows 10 privacy settings ##>>%windir%\system32\drivers\etc\hosts
REM First, opt-out of some, but not all, of the privacy settings.
REM Not all anti-privacy settings have been found.
REM settings -> privacy -> general -> let apps use my ID …
reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Enabled /t REG_DWORD /d 0 /f
reg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Id /f
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Enabled /t REG_DWORD /d 0 /f
REM settings -> privacy -> general -> let websites provide locally …
reg add “HKCU\Control Panel\International\User Profile\ /v HttpAcceptLanguageOptOut” /t REG_DWORD /d 1 /f
REM settings -> privacy -> general -> speech, inking, & typing
reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\ /v RestrictImplicitTextCollection /t REG_DWORD /d 1 /f
reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\ /v RestrictImplicitInkCollection /t REG_DWORD /d 1 /f
reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore\ /v HarvestContacts /t REG_DWORD /d 0 /f
reg add HKCU\SOFTWARE\Microsoft\Personalization\Settings\ /v AcceptedPrivacyPolicy /t REG_DWORD /d 0 /f
REM Disables web search in the search box
reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\ /v BingSearchEnabled /t REG_DWORD /d 0 /f
REM Block telemetry.
powershell.exe -command “”
powershell.exe -command “”
reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection\ /v AllowTelemetry /t REG_DWORD /d 0 /f
REM Finished.