Category Archives: squid-3.5

How accurate Statistics are? The SquidBlocker Way.

How accurate Statistics are?
The SquidBlocker Way.

SQUID 3.5.26 + 4.0.20 RELEASED

I have been working with psychologists and psychiatrists in the last ten plus years and an idea that emerged from all these sessions:

“Computer Assisted Analysis”

The basic idea was a bit raw and wasn’t mature enough to my taste. It was composed of a mathematical function that always results in the right answer\result whether the patient was mentally ill in the spectrums of Schizophrenia to Bipolar Disorder or “Normal”.

The idea could be very nice as a solution for a Mathematical Problem resolution but wasn’t enough to decide a human life fate. There is a need for a much more robust idea\concept then the non-mature one. One of the big issues with their basic concept was that I saw the mathematical equation that the MD’s were using to describe the concept and I saw how simple and unrealistic the it was. If the way to find out if a human is mentally ill is so simple then the human mind is much lower in it’s complexity compared to a flower or piece of grass or paper. As soon as I started proving the ridiculousness for the idea it was taken off the board. I was so happy at the time that so many lives were spared from a false positive match for a Schizophrenia and Bipolar Disorder.

But it’s just not enough to state “it’s not good” there is a need for an alternative! If you claim that something is missing couple things you must understand that some alternative should be offered, and if not a full mature alternative then a simple enough new direction should be the basic alternative.

The professional Therapists, Psychologists and Psychiatrists I was working with was thriving to get an idea which will help them analyze and treat these patients. And while it’s nice to use a brand new solution or formula that will assist them I believed that there are existing concepts and tools which can help us to grasp the patient state without re-inventing the wheel.

The basic idea is to find the right tool that will help us analyze the patient in a way that he will want to participate in the therapy process. The conflict which the therapist\psychiatrists  is standing in-front of is to choose the right “poison” that will help the specific patient. For example a Lithium consumer can be spotted in a second by a smart\experienced enough person. And the MD explained to me: “Do you see the color of his skin on the face? this is closer to white then to the red of flesh.”(this is one of the ways to see it)

I was amazed by what can the human body reflect to others. And then the decision became much more complex since we need to both protect the patient from revealing his “secret” of being a psychiatrist patient and also to try and find the right analysis let alone treat him. There are some “easy” cases which the basic concept of analysis will catch but most cases are much more complex to analyze find and treat. Also once you have analyzed the patient it’s pretty hard to change this “verdict”. In a sense it’s actually a matter of life and death when looking on how the verdict will affect the patient therapy, treatment and life.

At that stage the group of therapists revealed to me that they had failures while treating patients and for some reason there where patients which choose to take the path of “Another Life” by killing them self in some very artistic ways. A thing which the modern world accepts as a failure of treatment compared to the Japanese old tradition that defines such an act as an honorable and noble one.

I admit that while working some basic concept of analytical model I have seen in real life how a kid tries to take his life using a sharp razor blade, yes the one for the hairs in the legs or face. At the time I understood how much we need to be careful with blades!!!

In my culture there is a custom to not pass or use a blade on specific areas of the body what so ever. I was wondering for ages about at least one reason for why we were ordered to not use a blade on specific areas of the body. The answer was reflected to me from reality, from this kid that was trying to use the blade to take\end his life with this simple tool. This simple tool was in use in his house by his parent and was so “daily” that it was simple for the kid to think about using it for whatever he was thinking about.

This lecture taught me about the power of giving “Example” by our-self to others. We were given the gift of life and for a very long time I wanted to build a tool that will help others and specifically to these who are in distress, man’s or woman’s !

  • So what is the right thing to do?
  • What is the right tool to use?
  • What would help others in the most optimal way?

In order to get to the right answer I had to learn couple new sides of science in life since I was young and didn’t had enough experience compared to the MD’s I was working with on the project.

There is a known comparison between a CPU to a human thinking or mind which led me to a new kind of expression. We can use the Computer Science world and terms to express ideas the same way that a mathematical equation can express ideas and concepts.

Using this analogy\methodology of CS I tried to categorize CPU, DISK and RAM as a model of the components in the human mind and body.

As a therapist told me: We need to evaluate these three basic components and couple others like the above stack to try and understand the patient mind. Some CPU’s need a stress test while other’s DISK or RAM, depends on the patient. I decided to try and write a concept (in the form of a software) which will try to use the lowest level of resources in the process. Saying this would also mean for both my budget aspect of things and the expense which the client\patient needs to invest on it.

I will jump couple steps ahead since until now it’s kind of an “Assembly” level of things and will move forward to the actual result.

Thats one of my answers.

I took the time learning the “Squid” way of things while comparing it to Varnish, Nginx and many other web and web caching services. They all seems to have a special way of expressing what’s good should look like. Eventually I decided that I should not invent the wheel but learn from the best and based on them make a move with a tool on the public chess board for the favor of the disabled mind’s in our world.

First I must admit that a disabled mind can be a result of many things but for many patients a disabled mind is a temporary situation compared to these who have physical disability and which for them I and many others do not have any way of helping mentally. For these I cannot help I am devoting a minute every morning concentrating my body BTU and embedding it with pure good using some old “chants” that my ancestors left for me as a tool which worked for them when they wanted to help others but couldn’t do a thing for them because of the distance or the limitations of reality.

So for these which I can help I wrote a filtering DB which in it’s raw form has only three states of definition “white”, “black”, “other”. Using this DB we can categorize url’s on the Internet as “looks good” or “looks bad” or “unknown” which will mean there is no verdict about the content yet.

This DB is a very robust and delicate tool that was designed to eventually be a weight based rating DB(black=128, 0=white) but it takes time to accomplish this goal(I have funds but more are welcome) so first something to start with and later a more perfected product to come.

How SquidBocker is being used as a
“Therapy  Assistent Tool”?

Each user is assigned a unique SquidBlocker instance and an Internet Surfing session is being started with the patient. Depends on the domination of the patient on the Internet Surfing Art we start with either a basic guided session which will have a leading subject in mind. Then it will follow a non-guided surfing session. In the guided sessions we are teaching the patient how to categorize the site\url and these can be:

  • Text News
  • Acadedmic Articles
  • Music
  • YouTube Videos
  • And many more

Every session have a “summary” of what we had and what we know now and also what do we understand from now on based on the session. It’s a journey into the depth of the human\patient soul in an interactive way using the WWW. This is not the right place to add pornography to the picture since it’s one of the most ridicules forms of content in the Internet compared to many others but it’s good to know that some do not understand what pornography is good for and what it’s bad for. Using a SquidBlocker categorizing session we can achieve one of the most amazing achievements in a therapy process.

All The Bests,
Eliezer Croitoru


Encryption, how far will you go? – SQUID 3.5.25 + 4.0.19 RELEASED

Encryption, how far will you go?
SQUID 3.5.25 + 4.0.19 RELEASED

Choosing the right path with encryption is a crucial manner in the modern Computers World but I want to take you far behind this era into 2 or 3 hundred years ago.

Back in the 17 centaury there weren’t as many options to encrypt a message, if you wanted to implement a 512 bits based encryption you would first need to invest a lot of money on traveling and security of the first public key exchanging leaving aside the trust you need to have for the key exchange location.
Yes it was a complex and an expensive task that only some had the luxury to have, but today we hear “Let’s encrypt” on a daily basis.
So I took couple minutes to try and understand how would a single mind be affected if it would be required to encrypt a conversation.

It’s not a normal thing to glance at, two persons sitting in a room and talking in an encrypted language. But the only thing they want to say to each other is “This is not a secure place, we need to go elsewhere”.

For this single phrase they had a full 2 hours session!
The first time I have seen such a thing I was stunned but then I started to delve into the depth of “The Encryption Hell”. It’s a place that is reserved for these who would like to talk using encryption on anything.

You must first understand that there is a lot of noise surrounding the plain text so you would need to have some way to handle the noise and also to handle the encryption and only then handle the actual conversation. This is the place of uncertainty! In such a world you cannot have some rest for your mind. The brain is always working and thinking about the possibilities. “Does this word means that I need to leave the room this second?” it’s really a place that is reserved for these who live in a deception on every move they do.

Here comes in handy the arguments about using open-source or closed-source based encryption systems. When you have an open-souce system you can share with others the methods the concepts and the ideas. Then you may have a chance to get into a better place then to stay in a “Stand Alone Complex”. But the closed source has to offer a lot!!

It is possible to have a closed source and still have the benefits of the open-source world just by being connected to the right sponsor. The myth that the closed source world cannot offer alternatives or advantages was proven long ago to be a false positive. There is no need to present an argument because the world works this way, you can have both security and secrecy!

An example for that is one of the projects I helped long ago to handle as a starter proxy servers admin. I was asked to give help with intercepted traffic analysis. Indeed I could write the proxy but there was some hash embedded into each message that resulted in the team trying to crack it clueless to what behind it.
The target was to falsify a 128 bit transmission that is being sent over a tcp socket from the client to the passive server. The hacks were required to hack only 128 bits. The end result was that after about couple days they said that the encryption is impenetrable!

What was the blocker, the lack of CPU? it was a team of more then the most talented hackers.
Was it the money? They got a lot of money only for the trial.
Was it RAM? they had a full fledged servers flat available only for their use.
So what was missing?
Two keys: The main private and the Diffie Helman one.
This technique has been in use in the world for hundreds of years but not many used it. Not many knew how to use it and not many where able to operate such a cipher system. This is one thing that took empires up and down: Encryption.

For us this “function” was off-loaded from the human mind into assisting disposable devices such as a SmartPhone while many do not even know or understand what’s under the hood. We can walk with an encryption device in our pocket without using any of our brain “CPU” and without touching our pocket.

So 128 bits aren’t that much but if you use them right they would be sufficient and you won’t be required to recalculate every second the escape route from you current position to a safe state or place.

One of the most used concepts is blending into big crowd to loose tracers. It’s not the most efficient way to do so but if you begin a session in a very noisy place there is a chance you would be able to exchange keys without anyone knowing. So today we have the option to get some level of secrecy without paying too much like in the old days.

Indeed for a money transfer you would need a big and well shielded truck but with a group of assassins or a well trained ex-army experts you would need couple tiny cars , lot’s of cash\gold\goods and a route. It is possible to secure a transfer without using the “Heavy Gear” but with the “Right Team”!

It’s a known way to run security and my way of things is to help others with it.

I asked myself couple times in the past: Should I start an encrypted session? And then I noticed that it’s not required to invent keys, I already have them. My ancestors left me with many keys and many ways to encrypt even in the harshest conditions.

I have a library which I use as a delta and reference daily to analyse and decrypt the most hardened and complex minds in the world. I can say that I have secrets but I daily lock them and throw the key. After each time I am throwing the key I am chanting a secret spell that was passed in my family for ages and I remeber that we are all in the same boat and in the moment I will try to dig a hole in our unified boat we will all sink together.

So how far will you go deep into hell to throw your keys? will you use your Cerberus to defend this ship? will you throw your given keys to hell ie the most secured place in the entire universe?

Diffie Helman is one of the most proven method for forward secrecy of encryption and I am using it daily long before it was introduced to the public SSL world. I took couple trips to hell because of it but eventually even the most notorious psychiatrists and therapists declared that I am a proof of a truely hardened human.

In my line of work as a Linux SysAdmin you must be Hardened!