Devil’s Diabolism

December 13, 2025

Devil’s Diabolism

Padmini Arhant

The despots and dictators in politics have maneuvered their power in wiping formidable opposition by diabolic means, the trait qualifying them as the devil in disguise.

It is not surprising to witness their obsession with their opposition’s life and all things personal and exclusively individual to them.

The devious strategy is to eliminate their fixated opposition through direct meddling and occupation of their opposition’s life, controlling their personal health, finance and to the details minutiae.

The examples in the world are one too many where the viable opposition were criminally and diabolically removed leaving the despotic regimes intact in power.

The names in the late past to present century range from the former Palestinian leader and PLO Chairman, Yasser Arafat,  Venezuela’s former populist President Hugo Chavez, Russia’s opposition leader Alexi Navalny, investigative journalist – Anna Politkovskaya.

“Anna Stepanovna Politkovskaya was a Russian investigative journalist who reported on political and social events in Russia, in particular, the Second Chechen War. She was found murdered in the elevator of her apartment block in Moscow on 7 October 2006, Vladimir Putin’s birthday.”

In Indian polity, the names like former Indian External Affairs Minister, Sushna Swaraj, a viable female leader, orator and potential challenger within Indian political party BJP is one of other examples in the party found inconvenient by the despot politics reining control in the regime circle.

In other pursuits, the late Princess Diana regarded burdensome for the secretive deceitful monarchy removed through paparazzi on the target’s tail.

The economic sector – the Apple Inc.’s co-founder and innovative icon Steve Jobs not necessarily liked by those unable to match or meet with Apple’s Apple of the eye – Steve Jobs’ ingenuity.

Similarly, the entertainment with film and music industry have names risen to sky high stardom subject to mysterious and devious death trap.

The contemporary trend, the devils’ deployment of wannabe and opportunist women in dime a dozen from media, entertainment and politics paraded and regularly featured to maintain despotic chorus in the overwhelming steal and seize the opportunity maintained forever.

The reason behind paranoia is the devils’ details realized unsuitable for the position they occupy and yet unwilling to relent to reality.

Ultimately, the hook or by crook demeanor lead these ever undeserving and unqualified power, fame and fortune hungry mob to desperate status in the persistent peril seeking disappearance of those found unparalleled to them.

The tail waggers and crony contingents are vigorously promoted and superimposed in the ongoing spectacle among the recruits of the Illuminati aka Doominati tribe.

Mirror, Mirror on the wall,

Who is the wickedest of all?

The Mirror responded 😏 –

You are looking at it!

Padmini Arhant

Cyber Terrorism – MITM

October 12, 2025

Cyber Terrorism

MITM

Padmini Arhant

MITMMan-in-the-Middle attack is a serious threat against data security and invasion of privacy.

The less to hardly known cybercrime is surreptitious, sneaky and pervasive. MITM is carried out in disguise unknown to and unaware by victims of such attacks and deployment in cyberspace.

From desperate predators seeking personal to sensitive data, and those deployed by abusive forces in obsession of destructive agenda are primary intruders endangering cyber security and individual rights. 

Notwithstanding, the prevalent commercial trend on data mining selling customers and users private data for revenue among tech giants and others in the economic sector provide fodder for MITM’s carefree indulgence. 

MITM – Man-in-the-Middle attacker engage in diverse formats exploiting opportunity and vulnerability wherever and however possible.

The MITM intervention range from Mobile apps to websites, unprotected networks and servers near and far, not barring devices with data transmission flowing across via WiFi and / or other connections allowing MITM interception.

The MITM prevention and containment is a requirement to prohibit cyber crime.

The data breach reported by major corporations, the credit bureaus and government apparatus alike, the violations compromising personal information and critical data of millions of users is by far the existential danger in cyber terrorism.

The MITM – Man-in-the-Middle attacks crawling into devices, networks and myriad sources do not spare telephone conversations, online and offline chats, emails, including bank accounts, credit cards,  personal IDs, health records and,

Last but not the least the Air tags on luggages are tagged effortlessly proliferating in cyber criminality.

Accordingly, the MITM suspension leading to elimination calls for collective responsibility beginning with manufacturers of all things related to technology and cyber products, mobile apps developers, software companies  and combined security across the spectrum in private and public sector to implement solid measures that guarantee secure communication with end to end encryption at all times especially during exchange of vital and personal information disabling any security lapse.

Cyber crime is the most challenging and contentious security problem confronting users and consumers in the information era.

The data privacy and security requires stealth robust protection with impenetrable systems and interface alongside security features in mobile apps and software designed against any form of data leaks and loophole. 

Padmini Arhant

PadminiArhant.com