Is the Time Preference Theory Compatible with Negative Interest Rates? by Arnaert Brecht and Werner Ende

Is the Time Preference Theory Compatible with Negative Interest Rates? by Arnaert Brecht and Werner Ende


Dr. Werner Ende’s review of Arnaert Brecht’s: „12 issues contradicting Ludwig von Mises Time Preference Theory (MTPT)“

Basic logic says if a theory postulates to be always true than just a single exception proofs the contrary.

Within your 12 items, there is more than one exception showing a situation, that a universal Time Theory fully based on Interest Rates (IR) does not apply to.

To avoid getting caught in this trap you have to qualify Mises’ statement. The TPT based on IE does only exist in a Free Market without Central Banks. Negative interest rates don’t exist there. In Human Action and Nationalökonomie Ludwig von Mises denies psychological arguments. They are not valid in economic theory.

I think in reality economy is driven by two forces: an irrational, psychopathic striving for power of a tiny group of mighty men contrary to freedom loving people.

The first group has proved that destroying the free market makes them very rich and mighty and the enormous rest, billions of men poorer and in the long run dead.

There is only a big fly in the ointment:

in the end, these psychopaths will be poor or dead too. Parasites always need a living organism and finally there will be none!

To shorten my conclusions:

Negative IR doesn’t apply to MTPT.

The arguments you cited reinforce to a greater or lesser degree your theory of a restricted validity of an IE based MTPT.

Werner Ende’s review of Aernaert Brecht’s Negative Interest Rates The Nemesis of Time Preference 

Basic Reasons Not To Vote by Werner Ende and Jim Davies


Basic Reasons Not To Vote by Werner Ende and Jim Davies

The most important reason not to vote supersedes all others.

It is known as The Golden Rule

In many religions and philosophies, e.g. in the  Bible (The Sermon of the Mount) and in the writings of Confucius you will find this rule

Never impose on others what you would not choose for yourself.“ — Confucius[14](c. 500 BC)

  • As a result of the Golden Rule the Non-Aggression Principle follows. That does mean, that you by no means are allowed to force an other man to do something he doesn’t want to do, e.g. being robbed, being forced to follow religious rules or laws he hasn’t consented.

If the majority votes for draft, even the minority has to go to the army. The drafted loose  their fundamental right to own their bodies. The law allows him to be killed when he leaves the army without permission, refuting an order by his superiors or during combat.

Wether he has produced or inherited his possession, the state, being democratically elected can take it away by taxes, thus violating the commandment, „Thou shalt not steal“.

The following article by Jim Davies appeared first in October 2004


Do the limits of Mathematics prove that the Globalists will fail?

Do the limits of Mathematics prove that the Globalists will fail? by Werner Ende

Kurt Gödel, one of the most important mathematicians of the 20th century proved with his two Incompleteness  Theorems of mathematical logic the inherent limitations of every formal axiomatic system containing basic arithmetic.
In „The Anti-Globalist Cookbook: Elite Strategies & Why They’ll Fail“ Chris Campbell claims the transferability of these theorems to the politics of the Power Elite.

He proved that the globalist aspirations of godhood would never be realized. There are limits to the knowledge of man, and limits to what he can control.This is not something globalists can ever accept, for if they did, every effort they have made for decades if not centuries would be pointless.

I do not think that logics, mathematics or proofs of their limitations can show that the Power Elites will never ever achieve world domination.

From the times of Plato until today the ups and downs of history showed the advancement and fall of empires and superstates. The mighty were never able to gain total global control.

Brandon Smith discusses both, the mathematical-philosophical and the historical aspects in  Globalism vs. “Populism”


Browsing the web, protect your anonymity with advanced TOR-Settings and VPN

Browsing the web, protect your anonymity with advanced TOR-Settings and VPN

During the last years there have been repeated reports of security issues with the „The Onion Router“ TOR.

Tor as a network-tool for anonymous web-surfing is one of the most popular apps to hide from detection by private and governmental spies.

The following article published on HONGKIAT is aimed at two main groups:

  1. The clueless:  There are still millions of naïve web-surfers browsing the Internet without any protection. They may go in commercial websites, giving voluntarily personal data away and feeding without being asked or informed Databases that are able to deliver perfect profiles, including behavior, wishes, desires of them regardless if they can be used for legal marketing or are falling into the hands of criminals.   Other surfers and they count in millions too, are visiting porn sites or are downloading videos and apps from illegal media distributors and are taking part in social blogs where they discuss the most confidential matters.
  2. The over-cautious  and fearful: The revelations of Edgar Snowden about NSA and GHCQ (the British „NSA“) had not only positive effects on the habits of web users. Recent statistic data show, that much less people are now  discussing in Internet Forums social and political topics.

In 11 Do’s and Don’ts of Tor Network HONGKIAT gives you the best advices to protect you against spying, misusing your data and helps to protect your privacy.

Finally I would like to add our own experiences with web-security and data-protection.

VPN (Virtual Private Network) is installed on our routers (Hardware-VPN) and gives us a good protection on all connections between us and our friends and clients. There are no extra costs when you install it on your router. But do not forget before to check your manual or ask your provider how VPN can be installed on your device.

The other way to use VPN is a software solution. The apps can be installed on most stationary and mobile devices.

There are a more than a score of VPN-providers offering free or commercial products. It is  easy to find them by browsing in the web, looking for reviews.                                          Remark: compare not only prices and the number of servers, but check and be sure, that the app does automatically reconnect. Not everyone provides this important feature.

My last recommendation for secure anonymous web browsing

If you want to run VPN and TOR together and thus make your protection even better, then look at this tutorial:
Using both Tor and a VPN, because the combo installation be tricky, and even dangerous if done improperly.
If you have this done well you are protected with a double security layer.

I wish you an enjoyable read

Werner Ende at in June 2016

Disclaimer: The author of this article is neither a hardware nor a 
            software engineer or technician. He is a simple 
            web- user and can not give any specific technical advice.
            Therefore, it's strongly recommended to ask an expert if 
            you find hard to keep up.

Der geplante Tod Deutscher Kriegsgefangener in den US-Rheinlagern 1945/1946

 Der geplante Tod Deutscher Kriegsgefangener in den US-Rheinlagern 1945/1946

1945 Deutsche Gefangene in US-Lagern

Deutsche Kriegsgefangene in den Rheinlagern

Versehentlich (?) vernichtete der CIA das einzige Exemplar eines Senatsberichts über Folterungen.

Der amerikanische Auslandsgeheimdienst von MItgliedern der US-Powereliten gegründet, heute weltweit aggressiv tätiges Instrument der US-Regierung im Auftrag der Mächtigen hat eine traurige „Erfolgsbilanz“ in dem Vertuschen von Nachrichten.

Heute möchte ich an die Massaker erinnern, die Eisenhower 1945 anordnete:                  In den Rheinlagern kamen unter grausamen Umständen nahezu eine Million deutsche Kriegsgefangene um.

Der Originallink, unter dem 2010 der ARTE-TV Bericht existiert nicht mehr!                  Zufall eher nicht. Weit eher kommt Google’s gute Zusammenarbeit mit CIA und NSA in Frage, die  „erfolgreich“ unsere Zeitheschichte „korrigieren“.

Das Internet und der Buchandel, insbesondere Amazon , bieten jedoch zunehmend krittisch revidierte Quellen, um gewollte Lücken zu füllen und Fälschungen zu entlarven:

  • General Eisenhower`s „Death Camps“: Der geplante Tod von 1 Mio. deutscher Soldaten (Videos)

    Der geplante Tod von deutschen Soldaten

    Unter der verharmlosenden Bezeichnung „Other Losses“ („Andere Verluste“) tarnten die US-Streitkräfte 1945/46 das Massensterben deutscher Kriegsgefangener in amerika-nischen Lagern auf deutschem Boden. Der kanadische Historiker James Bacque war tief erschüttert, als er das erste Mal Kenntnis von diesem Kriegsverbrechen erhielt.

    „Glaubt mir, ich habe die Deutschen für euch abgeschlachtet, die Goyim…“

    Der pathologische Deutschenhasser General Dwight David Eisenhower hatte diesen Massenmord gezielt betrieben und systematisch verschleiert. Erst Bacques Forschungen förderten das ganze Ausmaß – fast 1 Million in amerikanischer und französischer Gefangenschaft vernichtete deutsche Soldaten – zutage.

  • Rheinwiesenlager

  • Die von veröffentlichten Zahlen über verstorbene Gefangene in den Lagern sind geschönt, d.h. nach unten korrigiert. (s. Anhang)
    • James Baque ging dem Schicksal der nach Kriegsende verschwundenen deutschen Soldaten nach. Während die Sowjets lückenlos jeden Todefall unter den deutschen Kriegsgefangenen aufzeichneten fand er große Lücken bei Amerikanern und Franzosen. Die Diskrepanz betrug rund eine Million.               Die Zahl der in den Rheinlagern verstorbenen Gefangenen deckte sich fast damit.


Zum Thema Wahrheitsfindung finden Sie abschließend Kommentare aus der staatstreuen Lügenpresse wie sie von alternativen Journalisten bezeichnet wird.:

Wem James Baques Buch und og. Videos unglaubhaft erscheinen, der sei an Hitler und Stalin erinnert, deren ungeheure Massenmorde und Genozide während des II. Weltkrieges vom Leserpublikum großer amerikanischer Zeitungen ungläubig als Schauermärchen oder Horrorstories abgetan wurden.














Aus diesem Grund möchte ich Ihnen Arnaert Brecht ’s  Essay „Glaubensunwilligkeit“ nicht vorenthalten:


Quellen- Nachweis für „Der geplante Tod Deutscher Kriegsgefangener 2

TTIP & 9/11 vollständig veröffentlichen?


TTIP & 9/11 vollständig veröffentlichen?

Die Antwort hierauf ist ein Zitat von Josef Pulitzer 

Es gibt kein Verbrechen, keinen Kniff, keinen Trick, keinen Schwindel, kein Laster, das nicht von Geheimhaltung lebt. Bringt diese Heimlichkeiten ans Tageslicht, beschreibt sie, macht sie vor aller Augen lächerlich, und früher oder später wird die öffentliche Meinung sie hinwegfegen. Bekanntmachung allein genügt vielleicht nicht; aber es ist das einzige Mittel, ohne daß alle anderen versagen.

Alexis de Tocqueville formulierte es positiv

Dans un pays libre, les finances publiques sont transparentes et les finances privées sont opaques

deutsch: In einem freien Land öffentliche Finanzen transparenz und private Finanzen nicht offen zu sein

Politiker und Beamte, die das TTIP (engl.:Transatlantic Trade and Investment Partnership hinter verschlossenen Türen verhandeln,  müssen sich fragen lassen was sie uns vorenthalten.

Diese Frage muß sich genauso die US-Regierung gefallen lassen, die Teile der 9/11 Dokumentation (vom amtlichen Untersuchungsausschuß zum Attentat vom 11. September 2001 erstellt) unter Verschluß hält.


What if Thanksgiving Exposes the Government? By Judge Napolitano

What if Thanksgiving Exposes the Government? By Judge Napolitano

What if another Thanksgiving Day is upon us and because of the government we have less to be thankful for than we did at the last one? What if at every Thanksgiving liberty is weakened and the government is strengthened?

Read full article
Does It Expose the Government? By Judge Napolitano

Tor- browser easy to crack by NSA. Der Tor-Browser kann von der NSA leicht geknackt werden

As „Heise online“ just told us, the users of the anonymous tor-service can not be be sure at all, that they can realy hide their identy.

Aaron Johnson, Chris Wacek, Micah Sherr and Paul Syverson found in their analysis, that tor-user will be detected in 80 up to 95% in 6 or even allready in 3 month.
Laut „Heise online“ sind Tor-Benutzer keineswegs ehr sicher vor Enttarnungsanigriffen der NSA.
Eine Analyse von Aaron Johnson, Chris Wacek, Micah Sherr und Paul Syverson stellt fest:

„Rund 80% aller Tor-Nutzer ließen sich schon nach 6 Monaten Betrieb eines mittleren Tor-Relays deanonymsieren. Wenn ein Angreifer den kompletten Verkehr eines Teilbereichs des Internet – etwa in Form eines Autonomous Systems (AS) oder eines Internet Exchange Points (IXP) – kontrolliert, müssen Tor-Nutzer mit einer 95-prozentigen Gefahr rechnen, dass ihre Identität innerhalb von drei Monaten aufgedeckt wird. Mehr Ressourcen unter Kontrolle des Überwachers beschleunigen den Vorgang.“

Protect yourself from NSA: a guide to stay secure

just some minutes ago I got an article from „Heise Online“ about a statement Bruce Schneier, a internationally renowned IT-security expert, gave to „The Guardian“.

Bruce Schneier:

„Now that we have enough details about how the NSA eavesdrops on the internet, including today’s disclosures of the NSA’s deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.“

The basics advices Bruce Schneier gives to protect yourself from nsa:

1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections – and it may have explicit exploits against these protocols – you’re much better protected than if you communicate in the clear.

3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn’t. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it’s pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It’s prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it’s harder for the NSA to backdoor TLS than BitLocker, because any vendor’s TLS has to be compatible with every other vendor’s TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it’s far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

Read more:

Für unsere deutschsprachigen Leser: