NSA saysPower CycleI am The Government
>>527159032You are literally 20 years late. If someone has a secure system they don't post how it works online.
>>527159032bin it and get a baofeng
>>527159032Theoretically, you can’t. Not with modern day smartphones.You can only take preventative measures such as disabling all location services (gps chip), disabling the U1 chip, disabling Bluetooth and wifi, and enabling aeroplane mode/disabling mobile reception. And/or removing a SIM card.Or by obfuscating your internet data packets with vpns. Even then, there are ways such as crowd sourced wifi hotspots which send location and diagnostic information to the mobile provider which can be subpoenaed at courts request. You could revert to a dumb phone with only text and call capability but even those can be listened in on.If you were to keep an old smart phone with no sim and all onboard chips disabled it would be substantially harder to trace your traffic, then use a secondary phone purely for calls and texts. Ideally you want to be using paper letters or smoke signals though
>>527159032down the dunny sonny
The best way at present is encrypted communications software but even those have become under attack by the five eyes NSA surveillance establishment in recent years and will soon become irrelevant In future it may become more viable to send letters to people by drone rather than relying on a carriage service
>>527159416You can build your own phone and put a simcard on it
>>527159416TempleOS is the way.
>>527159032
>>527159032Plug itSimple as
>>527159032Throw it in a ditch or tie it to a dog or something than read books and get and landline.
>>527159032Here ya go, brohttps://koshercell.org/en-ca
That’s a Star of David.
IMHO we should stop using cell phone networks. According to privacy YouTuber Rob Braxman 5G lets your cell phone provider know where you are within inches: https://www.youtube.com/watch?v=IPrugkYJpO8&t=888s The more we use cell phone networks, the worse will these networks be upgraded. Also, Google and Apple track your location 24/7 and if the governments ever steal 100% of the location data it would be bad for us. The smartphone is a retarded invention, even more so than the lawnmower.
>>527159032That's not really how that works. Things get to your phone through infrastructure. It is this infrastructure which is already passively collecting and analyzing data, so they don't really need access to a domestic individual's phone. Advanced NSA metadata analysis can do things no warrant ever could with a high degree of certainty, it just depends on who has access to this data for which reasonsIn the realm of software security, it's essentially a fractal; there is no end to computer security, the closer you look the more you find. No-click RCE 0-days for the latest versions of iOS and Android go for millions of dollars, and various security agencies will buy them with no questions asked as long as the POC checks out but worry not; you'd have to be a person of profound interest in order to become an investment here and rest assured by this point you're already well beyond any conceivable measure of fuckedYou bet the have them for Graphene OS too though it's my understanding these units are fully encrypted OOB but that's nothing a little hardware hacking and access out outrageous level of CPU cycles can't solve, but again here you would have to be an exceptional remark of interestSo, the answer is you can't, but what you can do is keep yourself the least amount of interesting; though money is no object and there is a correlation between levels of badassery and monetary investment
>>527160998Make private payphones a thing again.Zoomers will eat that shit up.Charge like $1/min so they too can experience overpriced phone calls and find some hack/workaround just like the good ol days
Brax3
>>527159375Encryption is illegal on amateur bands, so the only thing you can use your baofeng for is transmitting everything you want to say directly to the glowies. And there is an army of boomers with nothing better to do than triangulate your location and tell on you if you break the rules.
>>527159032Wasn’t the guy who developed this a complete schizo?
>>527160426keke could see that in the catalog thumbnail
>>527159032you cant
>>527160214I'm not putting anything with "kosher" in my trust. Nigga are you crazy?
>>527159032Now I thought of an alternative question: let’s say you got your hands on a video or a document that will get you fucking killed if leaked. Say a complete video of Fauci admitting being responsible for the coof in a partyWhat should you do to leak that shit? The only thing I think of is sending it privately to an online admin or something> inb4: nice try FBI
>>527161337Just displace your transmissions in the hills some fat fuck boomers with health problems aren't gonna climb and patrol rugged terrain like this is fucking Afghanistan.
>>527160998>Also, Google and Apple track your location 24/7Well, not entirely. They enable it, but they're more like the people selling the shovels rather than the dirtWhat you really have to watch for now is corps have installed "Free Wifi" in pretty much every publicly accessible building. Sure, they collect your browsing data (or try to) but the real problem is wifi triangulation. They use an array of routers to triangulate the radio on your phone, they've got it pretty down pat and they track where exactly you're standing in the store, and for how long. You don't have to connect to their network, it will work as long as wifi is turned on, it scans passively.This is how the NSA and other security agencies use metadata to track an individuals location and digital footprint, they just query it and bang it's there, local cops have access to cell tower info but not the metadata triangulation versions. You need an uberhigh security clearance for it. They can get everywhere a person has ever been, everything they have ever typed or spoken digitally since ever. Furthermore, it is possible to use wifi in tandem with something called FARSIGHT technology which enables a user to "see" inside buildings with varying degrees of resolution via wifi signals
>>527161431Everyone who gets deep enough into infosec and doesn't work for 'the man' "becomes" schizo, in part, because they start to see the bars of the prison everywhere, and those without their knowledge walk around unconcerned, as if they were completely free. Like, exactly like the movie They Live, but without allies. The other part, could be that they are made that way."The Security Question" has eaten everyone I know who's tried hard enough to answer it. Myself included.
>>527159032do you have prince albert in a can
>>527161753> let’s say you got your hands on a video or a document that will get you fucking killed if leaked>What should you doGenerally the strategy is to hide it in a popular torrent(s) and let it disseminate that wayBy the time anybody knows what it is, it's already been privately shared a gazillion timesThe leak then becomes "Do this, and you find the information"The idea is that many thousands of users already have it, and it becomes a meme to do thisIt's now impossible to get rid of; or at the very least the efforts in doing so would Streisand for ill effect
>>527159032It's the most secure to assume that you can't. If it uses any public networks you carry a device around that is constantly spying on you.Using a smartphone is particularly frivolous. For necessary phone calls a cheap dumb boomerphone is good enough.
>>527161337Yeah that's what they say but I know for a fact that's bullshit. It's like telling a child their face will get stuck that way if the wind changes.
Redpill me on Graphene OS. I'm about to buy a pixel 10 and install it. I like the sandbox features, the kill switch, the fact it's supposedly impervious to the zog's forensic phone downloading thing. Why shouldn't I?
>>527159032Trash it and get a dumb phone
>>527161801Maybe you'll get away with it for a while, but the FCC loves ruining people's lives if they become annoying enough on the airwaves. It's not a practical or scalable solution.And anyway, the key element here is encryption. You don't need to break the law and make yourself a target like this to have securely encrypted communications. The idea is to use open-source tools with strong, audited end-to-end encryption. The government hasn't broken RSA yet (or at least revealed it publicly), and it's still the gold standard for secure communication. With strong encryption, you can use any communication channel you like, and your data will just be bytes among an ocean of bytes. That is what you want.Don't roll your own tools, as any weakness in your implementation can make cryptanalysis against RSA exponentially easier, taking it from infeasible to trivially easy. This was actually one of the tasks on this year's NSA codebreaker challenge. You had to decrypt some RSA-encrypted comms, and it turned out that insecure key generation significantly reduced entropy, so the keys could be cracked in minutes instead of a gorillion years. This is something that they really do... They are fine with collecting terabytes of encrypted data that they can't crack today just in case some new information comes out later that enables them to break the encryption 10 years later. You want your tools to be open source and audited by as many eggheads as possible and proven to be secure.The other thing is to not become interesting enough that they start trying to use side-channel attacks against you, like >>527161118 mentioned, because then you're fucked regardless.Sorry for rambling at you btw, I know you didn't ask, but the info is relevant to the thread.
Don't own one. No one's forcing you.
>>527159032You control the buttons you press.
>>527161431I would be more concerned if he wasnt.I only trust Shizos to build my OS.
>>527162244What's the security question?
>>527162959It gives a lot of trouble to most police forensics aparently because they are used to the low hanging fruit. It really depends on what kind of Israeli software they bought. If its the cheapstuff you are probably safe. Can probably evade most low level glownigger stuff as well. It really depends on the amount of effort worth it to track you. If its good for drug dealers its good enough for me. If you are a terrorist or something like that you are better off masking your signal instead of trying encryption i think.
>>527159032You can’t. That’s the fun part. Maybe look up the Edward Snowden leaks from like 15 years ago. Imagine what they can do now
You can't. The only way to send truly secure messages is through a hand delivered, hand written note. Ideally you burn it after the information has been passed to the intended target.We're soon at the point that we need to think about courier networks to save what is left of our civilization.
Buyba Librem5 or a Liberty Phoneand then never use it
>>527164378get on my level fag
>>527159931Sneed
>>527159032I use a dumb-ish phone that has an outline hardware switch and no front camera. I do banking with my iPad mini at home. I think it's a reasonable compromise. I heard Graphene was releasing hardware, is that true?
>>527159032you cant because the cpu's, the OS and motherboards have backdoors, so good luck making your ownThey can see everything you do and see and much more, both sides want more and more control and surveillance
>>527159032Don't have one to begin with. It comes compromised from the factory.
>>527159886QRD?
>>527161337>>527163169Apropos, what's the deal on those "world phones"? Are they based or nay?
>>527159032throw away your phone in the rubbish bin and use courier pigeons
The most effective way to hide your communications begins with a harsh truth: accept that you are under constant, 24/7 surveillance. You have zero privacy. Every word you speak, every video you watch, every keystroke (including backspaces), every search—it's all recorded, logged, and stored forever.From that starting point, your realistic options shrink dramatically. The best way to communicate now is to invent a private language or code that only you and your trusted associates understand. Other than that you can embed messages using steganography—hiding data inside innocuous-looking memes or images in ways that the "affirmative action" glow niggers can't detect or comprehend.Even buying a so-called "privacy phone" shipped discreetly through the mail offers no real protection. Glow nigger agencies or their contractors can intercept the package en route, tamper with the hardware or firmware, and re-seal it so seamlessly that you never suspect a thing. True privacy becomes impossible because the entire surveillance-industrial complex has monetized every aspect of modern life. It's a tightly integrated system of thought control designed to shape your perceptions, beliefs, and behavior.Your shaped reality, in turn, dictates how the world operates: the rules people follow, how they spend their time, and ultimately what sustains a global industrial slavery machine that funnels productivity and wealth upward to financial capital.Its a profoundly abhorrent system—oppressive, invasive, and accelerating in scope every single day. At this stage, completely unplugging from all devices actually marks you as a bigger red flag than simply owning a smartphone and maintaining social-media profiles. In the end, you're a slave and your data is used to undermine your agency and their goal is the total subjugation and enslavement of the human race to the point that even their thoughts are are in chains all serving the system they call (((our democracy))).
>>527159416>You could revert to a dumb phone with only text and call capability but even those can be listened in on.They stopped selling brand new dumb phones a few years ago. The cheapest brand new phones you can get are all 4G smart phones. Crazy world we live in
>>527161337>Encryption is illegal on amateur bands,In sweden it is against the law to be a criminal
You're going to want to connect it to get the perks of being an American citizen
>>527159032>>527159886What are the pros and cons for both Graphene and Temple?Which is more secure? Which is easier to install? Use?>>527167417
>>527171290You cant install Temple OS without an iPhone
>>527159032take out the battery
>>527159032By not owning a phone. Good luck
>>527159032Dont use one
>>527159032>Only works on Google Pixel>Doesn't work on Samsung because its hardware backdooredwow, imagine buying samsung or apple and then complaining about privacy.
>>527159032any american owned operating system or CPU has a backdoor for western governments. any chinese/north korean owned operating system or CPU has a backdoor for china. pick your poison.>>527171080this. also most "privacy phone" companies are just government sting operations, and you can't know which is which until after the fact.your best bet is just to keep a low profile. governments still cant deal with all the data they are collecting (this will change when AI becomes better), so they prioritize targets that hit some red flag. so you want to keep a low profile. make up phrases that sound innocent to mask your suspicious operations (dont use the word "candy", its become a trope by this point), and dont access suspicious sites/groups without multiple hops of private proxies. and keep your sussy activity to a minimum and mix it with normal activity, and keep your online sussy activity schedule separate from anything sussy you do irl so the timing is random and cant be matched together.
>>527159032I don't think you can.All the companies that make your phone work with gov.Because of AI, it's become really easy to find software bugs. So there's probably a lot of open source libraries that some people know all the issues with.Everything we click on the internet is being retained for some time, and probably in some years the SuperGovAI will be able to watch all of it.
>>527159032ultimately if they want to spy on you then they can and will but Graphene OS is great, greatly diminishes your digital footprint and is a superior operating system, been using it for a few years now and also set up a half dozen other people with it, it's good, go for it
>>527159032there is probably a reason why huawei is banned here
>>527159032Bird is the word
>>527171762This jew is right, be inconspicuous and randomly mix activities.
>>527159032>dont>spam them with dick pics with arabic captions
>>527159032Pgp
>>527171924What makes graphene os better compared to lets say postmarketos?
>>527172656>What makes graphene os better compared to lets say postmarketos?you tell me how whatever the fuck you're talking about is better than GOS
>>527163169>The government hasn't broken RSA yet*Shifts nervously*Uhh, well no, not "broken" pre se, I wouldn't call it thatThere are ways of using exotic math to reduce the keyspace to something that's somewhat approachable for the levels of compute that an entity like NSA has access toIt's actually fucking crazy, they basically hack the universe by trying to compute using parallel universesVery spooky shitThere's also CPU power line/frequency analysis you can do when it executes the decryption routine, there's a way of digging out encrypted keys in RAM this way. Turns out transistors are actually polyrythms and they sing you a song if you know which notes to listen to.>>527171080>The best way to communicate now is to invent a private language or codeA lot of people still use one time pads and PGP-Keys>Even buying a so-called "privacy phone" shipped discreetly through the mail offers no real protectionIt's called interdiction and most people interested in these kinds of purchases are aware that exists>At this stage, completely unplugging from all devices actually marks you as a bigger red flag than simply owning a smartphoneSpeaking of polyrythms, they can convert your bio-signature (it's just loops of loops) and speed it up to generate a unique frequency. There are satellites which and track this frequency. There is literally no escape, you'd have to be 400 feet underground
Graphene OS or whatever software you run is ultimately meaningless because at the true root layer is the firmware running on the Mediatek, Qualcomm or other System-on-a-Chip (SOC) that is operating the core processor of your phone.If you do not control the baseband firmware (and you don't) you do not have full control of the phone, and you cannot prevent glowies and Jews from fucking with you from a higher point of privilege in the device.Baseband firmware backdoors are equivalent to bios backdoors on a PC. It doesn't matter what OS you're using if the spooks are in your bios.The same is true for firmwares in the various other ICs and chipsets that make up a modern smartphone.A backdoor in a battery charge controller module, for example, combined with med with a backdoor in LTE modem firmware, could be exploited by a sophisticated state actor to remotely cause a dangerous fault, short, overcharge and then.... I dunno... *boom*.?
>>527173568I would say its more customizable and supportsore devices
>>527174352More devices*
>>527174352ok, I'll have a look at it but as this postersays>>527174142I'm quite happy with GOS but I'm not trying to evade all surveillance just like leaving less of a trail and having an uncluttered OS
>>527160998>>527159032>>527159161>>5271592235G melts your brain. most people ive seen who keep their head near a 5g phone are quite dumb
>>527174352doesn't look as functional as GOS, which is basically Android that's been degoogled, I run a couple of normie apps in my sandbox which suits me just fine, I will continue to investigate though
>>527174779I almost never use 5g, I keep it turned of and only ever turn it on if I need data while out and about which is rare because I prefer not to be loking at my phone when out in the wild
>>527171290This is the best portable device for TempleOS. It's masterful
>>527175452It doesn't matter what you do. Your phone pings towers even if it's turned off. You lose with any "smart phone", faggot.
>>527175631I am aware of that you fucking mongoloid subhuman
>>527175701Fair enough, nigger.
>>527159032You can't. Best thing you could do is buy an old flip phone. You meta data is still being recorded but it doesn't have a camera or gps built into it. And it isn't connected to google or apple.
>>527164272>Edward Snowden leakshttps://archive.org/details/EFF_-_20131230-appelbaum-nsa_ant_catalog/page/n11/mode/2upI'll just leave this here
>>527173882redpill me on satellite biosignature tracking. what kind of measurements are they taking to generate the frequency? heat signature? or is it something more specialized like spectroscopy? that's gonna require some crazy resolution and noise reduction.
>>527159416Good thing my pinephone is still kicking. Lick my anus faggot.
>>527163169the american government only cares to ruin lives. they all deserve to be shot in the head.you are dead already.
>>527175743I still have the 6600 by Nokia. It's got a low quality camera (1st gen) and only BT and irDA if I remember correctly. Gotta ditch my iPhone in favor of this old boy.
>>527171080>completely unplugging from all devicesThis might mark you as a red flag but they no longer get data from you. Can't be worse. The authorities are reliant on this tech. Unplugging from everything neuters their ability. It's fucking illegal anyway. They should never have been allowed to record all our data.
>>527175757>redpill me on satellite biosignature trackingThe body is an electrochemical fractalized organic computer. Biological processes follow a repeating cycle, a beat if you willHeart rate, respiration, blink rate - these are all beatsSpeed the beats up, you get a polyrythmSpeed the polyrthm up, you get a unique frequencyUse IFFT for time-domain signalsThis becomes a unique bio signature which cannot be emulated; a hash of a humanThis way they can tell where you are and what you're doing by reading the frequenciesUse it in conjunction with a massive neural net and it's like a magic prediction box, an 8 ball one shakes for a reliable answer
>>527161753Just upload it to 4chan and let Anons do the work
>>527159032Just 30 years ago all phones were landline tapped by the government and not only glowie agents could hear you talk, but bored women at telephone stations too. When i was a little kid mother took me to her job, she worked at old mechanical telephone station and machines there had headphone port just in the open so you could tap into any conversation.
>>527176633Wait until he hears about a coordinated SS7 attackWe have the same problem today only except now the wires are accessible to anyone within a 500km radius with the right equipmentMost developed countries have moved away from the type of infrastructure which makes this possible but in Ukraine, I feel these chances are lowIt isn't about decyrpting the traffic, it's about convincing the tower you should have permissions you shouldn't; the tower decrypts the traffic for youCarriers and other service providers which use SS7 as a protocol are likely to be vulnerable by nature of implementation; though there may be workarounds i'm not aware of to mitigate the issue
>>527159032you can'tin fact the moment you connect to a cell tower they know everything about you
>>527177100>in fact the moment you connect to a cell tower they know everything about you>Walk into any 7-11>You get dinged by the security camera>It backs up to a huge data center offsite>Fuck the entire cookie jar, that shit goes straight into the hand>UberAlgos dunk on your smug trudface poorbastarding your way at in 3am to scrimp out a pack of smokes>Algo flags Interpol, eventually some agent midway through a ham sandwich swivels in a spinney chair>PGDN is mashed a great number of times as the agent chews and snorts at your pathetic attempts at anonymity >yah, got our boy he's in fukken Guam>why>uhhh pack of smokes and what looks like one of those big cans of brisk>kay, put him on the list
I have a intruder in my home network.It got onto my phone with graphineos, and it cuts a piece off every drive I stick Inand labels it part of its "comtainer.".It simulates being turned off and sends shir while I'm sleeping or away.Printer, PC, Mac, graphibeos, Motorola, hard drives, router, it even wrote shit onto the fucking DVDRW I burned tails onto as a live boot read only iso, and lives for weeks in RAM or GPU cards.Fucking fucked bros, its over. Probably in my fucking car too.
>>527159032By burning it to ash.Seriously there is no such thing as a secure phone, best you can hope for is that it's friendly-ish types that dominate access to it.
>>527178049Its a VM with remote desktop environment.It has a catalog of every cable and charging block in my house.???Wtf do I do?Is it CIA?
>>527159703Shows some fidgety bidgety, has iphone and apple keyboard on background. Thinks private mode in explorer and no phone is off grid.
>>527161753Buy a bunch of usb drives, get a bunch of tiny little parachutes, and charter a small plane to chuck them out of over a major population center.
>>527171234not buying it. a lot of boomers can only use dumb phones. you can still buy a brand new one here. still, the moment you have a phone on you they can trace your exact location. phone calls and sms can be listened to and read. a little bird told me that when the pope came to visit our country, the police listened in on every single phone call made in a radius of 15km from the capital city. now with ai they dont even need to have a real person listen to it. i heard pagers are still the way to go but what do i know
>>527176194>>527173882>The body is an electrochemical fractalized organic computer. Biological processes follow a repeating cycle, a beat if you will>Speed the polyrthm up, you get a unique frequency>This becomes a unique bio signature which cannot be emulated; >Use it in conjunction with a massive neural net This is actually a good thing, if we take over and use it to build something good. For instance. We can make a digital money system that can be tracked with this. And we can block scammers , fraudsters , thieves >for instance, credit card authentication is difficult >due to credit card thieves and databases of stolen credit card #>if you can identify that a cc belongs to a person, or if it is a thieve in India or Russia, this is a big deal
>>527177474>>Algo flags Interpol, eventually some agent midway through a ham sandwich swivels in a spinney chairWhat is more dangerous is databases of stolen credit cards, in Russia, in India, In Pakistan, in Israel and in Africa (in places like Accra Ghana).If you have a way to identify the credit card transaction is made by cc user, vs. some thieve on another continent through VPNs. Then you just saved bankers and merchants hundreds of BILLIONS of $ stolen. Then a thieve decides to take a vacation to some Egypt or Turkey or Dubai, and it is over as soon as he lands in the airport.
>>527159032The best you can do as a normie is get a pinephone or something similar that has hardware disconnect switches for the cameras, gps, etc, but it will still run on linux which I'm sure has some undisclosed exploits governments have on hand. Otherwise build your own phone from scratch and have it run on something like Temple OS, which is possible but beyond most people.
>>527179158>This is actually a good thing, if we take over and use it to build something goodYeah you could walk though something similar to a metal detector and it could immediately detect, isolate and diagnose pretty much every possible medical condition by examining internal ployrythmic biological functions extrapolated to a frequency distribution and cross referenced with a known "Healthy" signatureMedicine now turns into retuning the body's biorhythms back to a correct frequency, it's kind of a one size fits all universal medical diagnostic system, really>We can make a digital money system that can be tracked with thisI don't think it should be possible to track purchases; that should be *strictly* private and anonymous but they should be able to track sources of incomeThis way nobody has to worry about anything *unless* you have large, illicit income streams. They don't have to verify who bought what, but they should be verifying that it was a real, actual human that made the purchase. This stops a lot of fraud while also maintaining a reasonable umbrella of privacy to the individual>And we can block scammers , fraudsters , thievesYes, there's a lot of good things you could do with a fully digital currency; it can afford the average citizen a good chunk of fair privacy while also holding enough power to nearly erase any credible possibility of any long term criminal profitability. The problem with scamming isn't so much scamming, people are retards and there is an endless supply of them; you can't change that - but what you can do is make it extremely difficult to bring home the bacon at the end of the day. This is why scammers want gift cards - it's pathetic but it's really one of the only ways they can convert their scams to tangible value. Dealing with scams isn't about eliminating them entirely - that's not possible either - it's about raising the both the technical and personal investments so high a scammer just gives up and moves on
>>527159032Put it in a Faraday cage.Pic related, it is a Faraday cage.
>>527180206Fuzzy hands types this
>>527176194okay but you said satellite, how would they track all of that from there? as far as I'm aware that tech barely works if you are even in the same room. as for telling what you are doing, that shit is not currently possible. best you can do is tell if a person is doing physical activity or if they are focused.>cannot be emulatedof course it can. it would just be very hard and expensive. you'd have to know what kind of sensors you are dealing with. if its only based on EM or radiation, it is theoretically trivial to emulate by holding a screen in front of the sensor that emits the right wavelengths per pixel at the right time. if you mix it with a sensor for air pressure of breathing, it would become harder as you'd have to make room for both the screen and some air compressor. but it is solvable.
>>527159032Isn’t Apple a super jewish company that doesn’t let the government hack or unlock your phone or some shit?
>>527160426>>527161455they always have to show you. they can't do anything without telling you the truth in subtle ways. it's how satan works.
>>527180379>how would they track all of that from there?You would need an array to produce an interference pattern which utilizes a type of spectroscopic LIDAR to infer the harmonics of the polyrythms; IFFT is then used to construct the macrosignature>of course it can. it would just be very hard and expensiveWell it would work the same way encryption does, you just keep increasing the resolution of polyrythmic signal depth orders of magnitude until you can tell who's who by listening to the vibrations of their cells dividing. It's similar to multiplying two primes; get the resolution high enough and the compute time to simulate it becomes so high it's unfeasible. I don't know if there's a way of making it quantum-safe but i'm sure there's some creative avenues to approach. There's a whole tiny world in there, it's just hard to explore it without the right spectra. Plus, even if someone was running around with a bio-signature cloner; you could probably detect that fairly easily itself >but it is solvableIndeed