so bored i realy should stop being lazy

first of all the news the PS3 has been completely cracked wide open this is good news for many people

For those that are still in the dark the lv0 keys were leaked by a group who have called themselves “the three musketeers“. The Bluedisk CFW team which is suspected to also be the same people behind the True Blue dongle were going to charge for this key or the use of the key. So seeing that their work may be profited by someone “the three musketeers” decided it was time to leak their work so that Bluedisk couldn’t rake in profits from someone else’s work. This is a pastie with the message from the “the three muskateers”.

So what does all this lv0 stuff mean? How does it benefit the scene, its developers and users. Well two well know ps3 developers took the time to explain the significance of this breakthrough that was leaked. One of the first developers who gave an explanation was Marcan (Fail0verflow), followed by Wololo on his website wololo.net where he broke down Marcan’s words into simple Q&A for all to understand the true significance in all this.

Marcan from Team Fail0verflow:

Marcan comments

“The first-stage bootloader is in ROM and has a per-console key which is effectively in tamper-resistant silicon. The second-stage bootloader (bootldr) is encrypted with the per-console key, but is not upgradable and is the same for all consoles (other than the encryption wrapper around it). This second-stage bootloader verifies lv0. Sony signed lv0 using the same broken process that they used for everything else, which leaks their private key. This means that the lv0 private key was doomed from the start, ever since we demonstrated the screwup at the Chaos Communication Congress two years ago.However, because lv0 is also encrypted, including its signature block, we need that decryption key (which is part of bootldr) before we can decrypt the signature and apply the algorithm to derive the private key. We did this for several later-stage loaders by using an exploit to dump them, and Geohot did it for metldr (the “second root” in the PS3′s bizarre boot process) using a different exploit (we replicated this, although our exploit might be different). At the time, this was enough to break the security of all released firmware to date, since everything that mattered was rooted in metldr (which is bootldr’s brother and is also decrypted by the per-console key). However, Sony took a last ditch effort after that hack and wrapped everything after metldr into lv0, effectively using the only security they had left (bootldr and lv0) to attempt to re-secure their platform.Bootldr suffers from the same exploit as metldr, so it was also doomed. However, because bootldr is designed to run from a cold boot, it cannot be loaded into a “sandboxed” SPU like metldr can from the comfort of OS-mode code execution (which we had via the USB lv2 exploit), so the exploit is harder to pull off because you don’t have control over the rest of the software. For the exploit that we knew about, it would’ve required hardware assistance to repeatedly reboot the PS3 and some kind of flash emulator to set up the exploit with varying parameters each boot, and it probably would’ve taken several hours or days of automated attempts to hit the right combination (basically the exploit would work by executing random garbage as code, and hoping that it jumps to somewhere within a segment that we control – the probabilities are high enough that it would work out within a reasonable timeframe). We never bothered to do this after the whole lawsuit episode. Presumably, 18 months later, some other group has finally figured this out and either used our exploit and the hardware assistance, or some other equivalent trick/exploit, to dump bootldr. Once the lv0 decryption key is known, the signing private key can be computed (thanks to Sony’s epic failure).The effect of this is essentially the same that the metldr key release had: all existing and future firmwares can be decrypted, except Sony no longer has the lv0 trick up their sleeve. What this means is that there is no way for Sony to wrap future firmware to hide it from anyone, because old PS3s must be able to use all future firmware (assuming Sony doesn’t just decide to brick them all…), and those old PS3s now have no remaining seeds of security that aren’t known. This means that all future firmwares and all future games are decryptable, and this time around they really can’t do anything about it. By extension, this means that given the usual cat-and-mouse game of analyzing and patching firmware, every current user of vulnerable or hacked firmware should be able to maintain that state through all future updates, as all future firmwares can be decrypted and patched and resigned for old PS3s. From the homebrew side, it means that it should be possible to have hombrew/linux and current games at the same time. From the piracy side, it means that all future games can be pirated. Note that this doesn’t mean that these things will be easy (Sony can obfuscate things to annoy people as much as their want), but from the fundamental security standpoint, Sony doesn’t have any security leg to stand on now. It does not mean that current firmwares are exploitable. Firmware upgrades are still signed, so you need an exploit in your current firmware to downgrade. Also, newer PS3s presumably have fixed this (probably by using newer bootldr/metldrs as trust roots, and proper signing all along).”They are indeed the bootldr keys (I was able to decrypt an lv0 with them). Consider this confirmation that the story is not fake.Can this be used to sign binaries to run homebrew on OFW PS3s (ala the PSP key leak)? Are those private keys sufficient to sign homebrew software such that they will run in unmodified firmware?No. The keys are used for two purposes: chain of trust and chain of secrecy. The compromise of the keys fully compromises the secrecy of the PS3 platform permanently, as you can just follow the links down the chain (off-line, on a PC) and decrypt any past, current, or future firmware version. Current consoles must be able to use any future firmware update, and we now have access to 100% of the common key material of current PS3s, so it follows that any future firmware decryptable by current PS3s is also decryptable by anyone on a PC.However, the chain of trust can be re-established at any point along the line that can be updated. The chain of trust is safely rooted in hardware that is near impossible to modify (i.e. the CPU’s ROM and eFuse key). The next link down the chain has been compromised (bootldr), and this link cannot be updated as it is specific to each console, so the chain of trust now has a permanent weak second link. However, the third link, lv0, can be updated as it is located in flash memory and signed using public key crypto. This allows Sony to secure the entire chain from there onwards. Unless you find a vulnerability in these updated links, you will not be able to attack them directly (applications, e.g. homebrew software, are verified much further down the chain). The only guaranteed way to break the chain is to attack the weak link directly, which means using a flash writer to overwrite lv0. Once you do so, the entire chain collapses (well, you still need to do some work to modify every subsequent link to turn off security, but that is easy). If you have old firmware, you have at least some other weak links that, when compromised, allow you direct access to break the bootldr link (replacing lv0), but if you run up to date firmware you’re out of luck unless you can find a weakness or you use hardware.Old PS3s are now in the same boat as an old Wii, and in fact we can draw a direct comparison of the boot process. On an old Wii, boot0 (the on-die ROM) securely loads boot1 from flash, which is securely checked against an eFuse hash, and boot1 loads boot2 but insecurely checks its signature. On an old PS3, the Cell boot ROM securely loads bootldr from flash, which is securely decrypted and checked using an eFuse key, and then bootldr loads lv0 but checks its signature against a hardcoded public key whose private counterpart is now known. In both cases, the system can be persistently compromised if you can write to flash, or if you already have code execution in system context (which lets you write to flash). However, in both cases, you need to use some kind of high-level exploit to break into the firmware initially, particularly if you have up-to-date firmware. It just happens that this is trivial on the Wii because there is no game patch system and Nintendo seems to have stopped caring, while this is significantly harder on the PS3 because the system software has more security layers and there is a game patch system.

Source: Slashdot.org forums

Wololo on his website wololo.net

Wololo comments

Breaking it down into simple and easy to understand wordsSince Marcan’s answers can be a bit difficult to digest, I’ve broken them up into the form of questions and answers with the special help of ViRGE on this. This will clear alot of it up for those less technical.Q: What exactly has been recovered?
A: The keys used by bootldr to decrypt/verify lv0, and by reversing the process the private keys used by Sony to sign lv0. If we consult our handy 3.60+ chain of trust diagram, we can see that bootldr is at the very root of the chain of trust, with lv0 being the first module it loads.

Q: So what can we do with the lv0 signing key?
A: In short, we can use it to decrypt lv0, modify it to patch out any lv0 security checks, and resign it with a legitimate key that bootldr will accept. With the chain of trust broken and lv0 no longer enforcing the security of the modules that it controls, we can then start modifying lv1ldr, lv2ldr, appldr, isoldr, etc to patch out their security checks and add CFW functionality.

Q: Can Sony “fix” this like they did for the 3.55 exploit?
A: No. With 3.55 the keys metldr used to verify its dependent modules were recovered. So Sony simply stopped using the now-insecure metldr and started using bootldr (which was still secure) to load.. Sony doesn’t have any more secure modules like bootldr left so like I said in my original post they have no options and cant fix anything; without getting too technical, we now have the keys to every “common” hardware module that is able to decrypt Sony-signed modules. The only thing left are the modules that use per-console keys, which are useless for booting common firmware (which must be decryptable by every PS3)


Q: So bootldr is fixed in hardware?

A: Correct. Like metldr, bootldr cannot be software updated by Sony. It’s hard-coded in hardware. As a reminder, bootldr/metldr themselves can’t be exploited, but because of the keys we have recovered we can make them load anything we want, nullifying whatever security they provide.

Q: What about future firmwares?
A: Good news! We can decrypt those too. Sony can use various coding tricks to make the process more difficult (this is called obfuscation), but they can’t stop us by using keys. We will always be able to decrypt lv0, and as long as we can figure out how to navigate lv0 we can figure out how to decrypt and modify its dependent modules. For those of you that follow Sony hardware this is much like how the earlier PSPs were hacked. So we can always decrypt the firmware and will be able to create newer CFWs as long as we can get past any obfuscation by Sony


Q: So the PS3 is utterly and completely broken?

A: To an extant yes, debatable but unlike the 3.55 hack we have mostly everything needed. Sony will never be able to re-secure existing consoles.

Q: What about consoles running firmware newer than 3.55?
A: Because all “old” consoles use the same keys to verify modules like lv0, at a minimum we can decrypt, patch, and resign the firmware. The problem is that we need a way to convince the PS3 to flash our modified firmware. With 3.55 and below that was easy enough to do because of the keys recovered, but 3.56 and later change that so that flashing is more complex than just using the recovered keys. This isn’t an insurmountable problem – hardware flashers will always work – but for easy software flashing we need to find new exploits in the PS3 software stack to convince OFW consoles to flash CFW

Q: What about newer consoles?
A: So there’s the real problem. Remember how we said bootldr and metldr are fixed in hardware? Sony can create new hardware, and update those modules in the process. By using new hardware in conjunction with new firmware for that hardware, Sony could completely change the keys used to secure the system. Without getting too technical, all of this progress comes from the fact that Sony was sloppy and did a poor job of implementing their security on earlier consoles, which is what lead to the first keys being leaked. Sony could always issue new hardware with new keys and a fixed security system at which point we’d be completely locked out of that new hardware. It’s entirely possible they’ll do this (if they haven’t done so already), so much like the PSP we’re going to end up with a limited number of consoles that have hardware-based flaws that can be exploited. Of course we then found new ways of exploiting the PSP anyhow, and ultimately were able to exploit every PSP made in one way or another.

If you are on anything higher than 3.55 it doesn’t mean you are out, there are ways to downgrade if your model is one thats able, otherwise you are just not able to do anything right now until more dev work is done. So sit tight and hold on. Again stay tuned, more info and news will be definitely coming.

Source: Wololo.net

UPDATE

KaKaRoTo Interview via PlayStationLifeStyles.net

KaKaRoTo Interview

On today’s Daily Reaction, we have a very special guest, Youness ‘KaKaRoTo’ Alaoui, developer of the first “Modified Firmware” for the PlayStation 3, to help us discuss the news that the PS3 has once again been hacked. Should the hackers have worked on finding the keys as it’s their device, or should they have expected the leak? And what does the hack really mean for Sony? Seb, Dan and Youness discuss.Disclaimer: KaKaRoTo was not involved in the current hack or CFW.

Seb:I’d like to think that I’ve been pretty open minded about hacking in previous interviews I’ve held, but you have to wonder what ‘The Three Musketeers’ were thinking when they shared the keys with other people. You can’t trust anyone on the internet, and it was sadly naive to believe that one of the people they gave it to wouldn’t try to sell it. Now, they’re probably worrying whether Sony is looking for them, preparing to sue them.I’m all for being able to do what you want with your own technology, you bought it, do what you want with it. But, just like when I buy a pen I shouldn’t pour the ink all over my face, individuals need to be responsible for what they do with the tech. Hack it, crack it, turn it into a toaster, whatever – but if letting people know what you did and how you did it could lead to piracy, then don’t release it, don’t share it.Youness:There is no denying that there is a part of responsibility in what is being done by the hackers, but to be honest, you can’t really predict what will happen in the future, and you can’t be responsible for what others do. Don’t forget that this release of the lv0 keys doesn’t add such a huge advantage to the hacking community, but the keys were never meant to be released, because it was still somehow opening up potential piracy which is something the true hackers are absolutely against. The secret of the keys was well guarded, but somehow it got leaked (after many many months), and the reason for the release was to prevent some greedy company (dongle manufacturer) from profiting from the piracy it could have enabled. In the end, it happened, it’s unfortunate, but I wouldn’t sweat (or rejoice) too much over it. The release wasn’t about the fame or the “being first”, it was about countering an immoral act.Dan:Even though there is much debate about what rights consumers have regarding what they are able to do with the products they purchase, the ability to do something does not always give a free pass to the action. As such with the release of the keys, the ability to break into a device you own is, in my opinion, very much your right, but the knowledge and ramifications of the information become that person’s liability. As it would be for someone who owns a car and decides to modify it, if it became unsafe to be around, the responsibility would fall on its owner.With all that said, the problems that fell on Sony in the wake of the eventual hacks are something that will be remembered forever. The cost to Sony, and their consumers, is not something that will likely ever be measured. So is there a point where the ability to do something does not outweigh the potential ramifications?Youness:Well, of course, the ability to do something does not give you a free pass to do it. However doesn’t that go both ways? The ability to remove Linux from the PS3 does not give Sony the right to do it, and in the end, when you look at the facts, that’s what initiated the whole thing. There is always a need for a moral compass. Sometimes it’s about whether or not the benefits outweigh the negatives, but sometimes there are some undeniable rights that cannot be tossed out the window. As an example, you can’t remove freedom of expression of the press if you think it might cause a civil war… Yes, the benefits (freedom of expression) do not outweigh the negatives (potential death of a population), but it doesn’t mean you can suddenly silence everyone and use that as an excuse. The car example that Dan gave is a good one, and sure, you can mod your car all you want, as long as you don’t take it on the road from the moment it doesn’t pass regulations.What I am mostly angry about is when I see people playing the “devil’s advocate” thinking about the loss to Sony, loss from piracy, and loss from emulators and homebrew. I do want to see them complaining about all those things, as long as I see them also complain about the loss to the consumer. Loss of Linux support (which comes with loss of your data), loss of the right to class action sue, loss of hundreds of games legally bought online because “your account was banned”, loss of your game collection when your PS3 goes for repair and suddenly gets replaced by an inferior model that doesn’t have backward compatibility, loss of money after being forced to buy the same game multiple times. Why isn’t anyone complaining about those issues just as hard as they complain about piracy and homebrew. Both, in my eyes should be defended equally, don’t you agree?Seb:Look, I’m all against Sony having removed Linux, and if we did DR back then we could have had you on and joined in on your complaints. But what’s done is done, it’s bad, but two wrongs do not make a right. Just because Sony was a dick, doesn’t mean we should all be dicks back. Previous PS3 hacks allowed people who had a PS3 that had Linux to revert back to older FW, they had the opportunity. This hack serves little purpose than to open the floodgates to more piracy.Again, loss of an account or paying double for a game sucks, but it’s very rare. You talk about weighing up the positives and negatives, but that’s an example of where a small amount of people will benefit from having their accounts back, but a huge amount of developers and publishers will suffer, and then, ultimately, gamers who end up getting less games.I do complain about those issues, and perhaps I should more, but taking matters into your own hand, no matter the collateral, isn’t the right way. In the end, nobody wins.Youness: Well, some are trying to get back at Sony for what they did, and usually they don’t get very far because when hate or corruption or whatever is your drive, then you simply won’t succeed. But I agree with you, two wrongs don’t make a right. Sometimes though I wonder, when you get 10 wrongs and you still don’t do anything about it, how likely will there be a 11th wrong? I know you don’t like it when that bad stuff happens and that’s why I like PSLS, you do defend both sides. But I’d like to correct one misconception you seem to have.. no, this new hack won’t open any floodgates. It serves absolutely no purpose for anyone who wasn’t already on a custom firmware, so it won’t add any new users into the ‘piracy world’. As for your comment about “no matter the collateral”, don’t worry, I can reassure you that that’s not the case! This release is just one of many things that could be released, it happened to be leaked, but there are other hacks, information, exploits that could lead to piracy that simply get buried because of this collateral. Even these lv0 keys, as I said will have a very minimal impact (if any) on the piracy, but they were not released for the simple case of “maybe, just maybe, it could help piracy, even though I can’t think of any way for it to”, so the hackers behind it prefered to stay on the safe side rather than be sorry later. Don’t always assume that the hackers are always trying to hack everything for their own selfish reasons. Being a true hacker means you have skills, and skill comes with experience, and with experience comes the moral compass that we spoke about. As far as I know, all the piracy enabling hacks were dirty little hacks made by young and irresponsible teenagers who were looking for their 15 minutes of fame. It is unfortunate though that they used the legitimate work of others as a stepping stone.How long has it been since there was any significant development in the PS3 hacking scene? Almost 2 years now! It’s not because it became impossible, it’s simply because we have access to homebrew and Linux, so there is no need to hack it further (or release new hacks). It’s not a fight about “who will win”, it’s a simple matter of “are we happy about it”. Another huge reason why the hacking scene has dried up is because of the piracy, not all hacking scenes are like this (think of the iPhone or Android hacking), but the PS3 (and generally Sony followers) scene is one of the worst in terms of self-entitled kids and piracy, and most of the hackers felt that it does not deserve their attention anymore. Tired of the drama and the whining and the piracy, most of us have decided to retire.Dan: While none of this is to simply place the blame on anyone, or any single group. It is more the discussion about how to stand up for the things you believe, “irregardless” of what other might think. Although, as an online community that connects the world together in a way that generations could not have imagined. We must at some point realize. much like the ancient proverb from Uncle Ben goes: “With great power, comes great responsibility.” So regardless of what side of this gray line you fall, the simple fact that at the end of the day – the consumer will always be hit the hardest. So when a corporation, or developer wrongs its user base, what lengths we go to defend our rights should always keep in mind the just how far your reach can really go in this modern era.Where do you stand on the matter, should you be allowed to do what you want with your PS3, or should you be more ‘socially responsible’? Let us know in the comments below, follow Seb, Dan and Youness on Twitter, call us evil hackers on our email (dailyreaction@playstationlifestyle.net), and feel free to watch ‘KaKaRoTo’’s speech on the benefits of open source tech this Friday at Encuentro Linux in Chile.Thanks to Youness Alaoui for taking part in this Daily Reaction special.

now preorders and random game order links

Monster Hunter 4

Ryu ga Gotoku 5: Yume, Kanaeshi Mono

Assassin’s Creed III: Liberation

Assassin’s Creed III (Join or Die Edition)

Medal of Honor: Warfighter (Limited Edition)

Max Payne 3

Lollipop Chainsaw

Trinity Universe

Ratchet & Clank Collection

Disgaea 4: A Promise Unforgotten

Zone of the Enders HD Collection

Dark Souls with Artorias of the Abyss Edition [Limited Pack]

Jak and Daxter Collection

Skylanders Giants (Portal Owner’s Pack)

Advertisements

WHAT THE FUCK IS THIS SHIT!

tgs-guro-ramen-001.jpg

The appearance of Dream C Club themed “soy milk curry ramen” at the Tokyo Game Show has shocked many, though largely thanks to its unreasonably grotesque appearance than any culinary value…

tgs-guro-ramen-002.jpg
tgs-guro-ramen-003.jpg
tgs-guro-ramen-004.jpg
tgs-guro-ramen-005.jpg

Lessons learned from Fukushima = none

It’s amazing how much the nucle-heads get away with in Japan. And don’t kid yourself — it’s no different here.

Meanwhile, the cooling systems at the Fuku 4 spent fuel pool are shut down. But hey, no worries, everything’s fine. were all going to DIEEEE

economic collapse or iminant threat of mass extinction

© End the Lie. Please Distribute Freely.

It’s been two weeks since I wrote my first piece for End the Lie about Fukushima being a possible mass extinction event, and still no progress to report.

Although, there was a somewhat promising appeal made on April 30, when seventy-two Japanese Non-Governmental Organizations sent an urgent request to the United Nations and Japanese government urging immediate action to stabilize the Fukushima Daiichi Nuclear Power Plant Unit 4 spent nuclear fuel. The letter was also endorsed by numerous nuclear experts.

The letter warned the UN and Japanese government that if an earthquake or other event were to cause this pool to drain, a catastrophic radiological fire could ensue.

The letter urged the United Nations to organize a Nuclear Security Summit to take up the crucial problem.

The letter stated that the United Nations should establish an independent assessment team, and coordinate international assistance to stabilize reactor 4′s spent fuel pool in order to prevent a radiological release with potentially catastrophic consequences.

Letters were sent to both UN Secretary General Ban Ki-moon and Prime Minister Yoshihiko Noda, the latter asking that Japan ask immediately for the UN’s help.

So that’s good news.

Now, we just have to wait for the UN to have a meeting about it, form some committees, investigate, send a team to Japan, schedule another meeting, go over the committee results, then maybe form some more committees, go over more results, then send a response, and then finally implement a plan of action, if that is what they even decide to do in the end.

And of course all that is dependent on if the spent fuel pool hasn’t fractured, fallen, caught fire, or exploded by then.

For a “downwinder” of a spent fuel pool fire or explosion and large scale radiological release (or in the case of Fukushima, a “northern hemisphere resident”) you will need anywhere from 2 weeks to a 2 year supply of food, water, toiletries, medications, diapers, pet food, and a designated area for pets to go to the bathroom inside your shelter, among many other things.

The amount of time spent sheltering in will vary greatly on a wide array of variables, such as, how long it takes to put the nuclear fuel fire out, or burn itself out.

That being said, nuclear fuel is essentially “a fire that never stops burning.”

Don’t worry about stockpiling gas, you won’t be going anywhere. That is of course if you lack the financial resources to leave everything behind and bug out to the southern hemisphere.

It may be advisable to have weapons in case your neighbors run out of supplies, and want yours.

So essentially, you will need all the same things you would for a collapse of the economy, it’s just that you won’t be able to go outside.

As a downwinder, one of the only differences in your “shelter” will be the further down you go into the ground, the better off you will be due to gamma rays.

And speaking of gamma rays, in Arnie Gundersen’s recent interview with KGO Radio, he said in regards to spent fuel pool 4:

Gamma rays inside reactor 2

“Let’s assume that it didn’t fall, but went dry a hundred feet in the air, it would be a beacon, but instead of a beacon of light, it would be a beacon of radiation, and bathe the site in high levels of radiation. That’s not something that you want because it would make work on other units darn near impossible…The gamma rays, forget the particles that get caught in your lungs, but the gamma rays would go up and bounce off air molecules and come down as a shine of radiation over the site, and it would go right through those suits and the guys would be exposed from the ‘sky shine’ …”

So let’s talk about that for a minute.

When I wrote my first piece for End the Lie “Fukushima is falling apart: are you ready?” I withheld some important information. Sort of like Tepco always does. They feed you little bits of information here and there, because they knew you couldn’t take it all at once.

The real danger with this precarious spent fuel pool situation is not just the spent fuel pool in reactor 4. It’s all the reactors, and all the spent fuel pools, including the granddaddy common spent fuel pool which is only about 50 meters from reactor 4.

If the spent fuel pool goes up, the radiation release would be so high that the workers would have to abandon the site, which means no one is holding the hoses watering down everything and keeping it from going up in one giant fire or explosion or radioactive cloud of death.

If the wind blows south to the Daini Plant, they would have to abandon that site. If blows north to Onagawa, they would have to abandon that site, and so on and so on.

Need some verification of this?

Japan’s former Ambassador to Switzerland, Mr. Mitsuhei Murata, was invited to speak at the Public Hearing of the Budgetary Committee of the House of Councilors on March 22, 2012, on the Fukushima nuclear power plants accident.

Before the Committee, Ambassador Murata strongly stated that if the crippled building of reactor unit 4 – with 1,535 fuel rods in the spent fuel pool 100 feet (30 meters) above the ground – collapses, not only will it cause a shutdown of all six reactors but will also affect the common spent fuel pool containing 6,375 fuel rods, located some 50 meters from reactor 4.

In both cases the radioactive rods are not protected by a containment vessel. Indeed, they are open to the air, which is quite dangerous.

This would certainly cause a global catastrophe like we have never before experienced.

He stressed that the responsibility of Japan to the rest of the world is immeasurable. Such a catastrophe would affect us all for centuries.

Ambassador Murata informed us that the total number of the spent fuel rods at the Fukushima Daiichi site excluding the rods in the pressure vessel is 11,421 (396+615+566+1,535+994+940+6375).

As the eminent German physicist Dr. Hans-Peter Durr said ten months ago, if the spent fuel pool spills, we will be in a situation where science never imagined we could be.

And Former U.N. adviser Akio Matsumura – whose praises have been sung by Mikhail Gorbachev, was told that if the fuel pool at unit 4 collapses or the water spills out, so much radiation will spew out for 50 years that no one will be able to approach Fukushima.

It gets, if you can believe it, just a little worse. Because you see, if no one in the path of this plume can leave their houses, or go to school, or go to work and of course some of us work – you guessed it – at nuclear plants in the United States and in Canada and in Europe.

Well, I’m sure you can see where that is heading.

The other option is, that our wonderful sources of nuclear power could all be shut down in advance, which means you’d be smart to add all the items you could possibly need for 2 weeks to 2 years without electricity to your supply list.

Or, make a reservation at your friendly neighborhood FEMA camp instead. This is the reality of our choice to let nuclear power into our lives. And you thought we were FUBAR just from the one little spent fuel pool?

Albert Einstein said that nuclear power would eventually kill its users. It appears Einstein was right again.

Whatever sense of urgency you had about this situation in the past few weeks, multiply that by 104 or so, if not more.

Call, post, email, protest, and do whatever it takes to get someone to listen.

In the meantime mitigate for radiation exposure, and keep sending pictures of mutated flowers, trees, fruit, and vegetables.

Economic collapse would be a walk in the park in comparison to what humanity is facing with Fukushima. At least, you could have one there if you wanted to. Just don’t pick the mutated dandelions.

Please send mutation images to christinax4@yahoo.com. Shoot at the highest resolution possible, and include your name, location, and date the mutation was found, for proper credit if the images are published. If it is from store-bought produce, include the location where it was grown and purchased. The more information you provide, the better you will be helping the rest of us.

Please help Christina purchase a spectrometer in order to get the most accurate radiation readings and thus get you the most precise information possible by shopping through her Amazon link or donate directly via PayPal tofukushimafacts@gmail.com. Keep in mind, this is expensive equipment and it is the only way that specific isotope readings can be obtained from food items.

Minor editing by Madison Ruppert

Christina Consolo is a former clinical researcher supervisor with NIH credentialing; a former Member-at-Large for the Board of Directors, Ophthalmic Photographers’ Society; A peer reviewer for the Journal of Ophthalmic Photography; She has written, published, and contributed to numerous scientific research in retinal imaging and ophthalmogy for the past 24 years; She is also an award-winning biomedical photographer and maintains several websites to teach people about radiation, mitigation, and other nuclear issues. She is also the host of “Nuked Radio” Tuesdays & Thursdays from 12-1:00 pm EST on the Orion Talk Radio Network.

Special to CollapseNet

View the original article here