Did a Russian autopsy confirm that COVID-19 is not a virus, but a poison that can be cured by existing medicines?
Take a look at this new viral message, and find out what the FACTS really are!
Russian Autopsy Confirmed That COVID-19 Is Not A Virus?
This new WhatsApp message claims that a Russian autopsy has finally proven that COVID-19 is not a virus, but a poison that can be cured by existing medicines.
* Good news to the world … *
* Russia has done a post-mortem autopsy of the Covid-19 patient, a big revelation has occurred. *
Russia became the first country in the world to perform an autopsy (= post mortem) on a corpse of Covid-19 and, after a thorough investigation, discovered that * Covid-19 does not exist as a virus *.
It’s a worldwide scam: * people are dying from “amplified 5G electromagnetic radiation (= poison)”. *
Doctors in Russia have violated the World Health Organization (WHO) law, which does not allow post-mortem autopsies on the bodies of people who have died from Covid-19 to be discovered after a certain time. These doctors made scientific discovery: * we can not assume that it is a virus, but a bacterium that causes death, which causes blood clots to form in the veins and nerves, Cause the death of the patient because of this bacteria. *
Russia has defeated the virus, claiming that “there is nothing but phelia-intravascular coagulation (thrombosis) * and the way to treat it is to cure it”:
1) * Antibiotic pills *
2) * Anti-inflammatory * and
3) * take anticoagulants (= aspirin). *
* This indicates that a cure for the disease is possible *, this sensational news for the world was prepared by Russian doctors by post-mortem autopsy (corpses) of the Covid-19 virus.
According to other Russian scientists, ventilators and the intensive care unit (ICU) were never needed.
Protocols to this effect have already been published in Russia.
* CHINA already knew this, but never released its report. *
Share this information with all your family, neighbors, acquaintances, friends,
your colleagues so that they can come out of the fear of Covid-19 and understand that * it is not a virus, but simply a bacteria exposed to 5G radiation. *
* The cause is to harm people with very low immunity. *
This radiation also causes inflammation and hypoxia. Those who are victims should take Asprin-100mg and Apronix or Paracetamol 650mg.
Because it has been shown that * covid-19 causes the blood to clot, which causes thrombosis in the person and due to which the blood clots in the veins and because of this the brain, heart and lungs cannot obtain oxygen, which makes the person’s breathing difficult and the person quickly dies due to lack of respiratory energy. *
Doctors in Russia disobeyed the transmission protocol and performed autopsies on dead bodies from covid-19.
The doctors opened their arms, legs, and other body parts and after examining them properly, * noticed that the blood vessels were dilated and the veins were full of thrombi, which prevented the flow of blood and also reduced the flow of oxygen. in the body, resulting in the death of the patient *.
After learning about this research, * the Russian Ministry of Health immediately changed the treatment protocol for Covid-19 * and gave aspirin to its positive patients: 100 mg and Empromax.
As a result, the patients began to recover and their health began to improve. * The Russian Ministry of Health unloaded more than 14,000 patients in a single day and sent them home *.
Source: Russian Ministry of Health
Conclusion identical to that of the 2 Italian doctors
Fact #2 : There Is No WHO Law Forbidding Autopsies
There is no such thing as a WHO law that forbids autopsies of any person who died from COVID-19, or any other disease.
The World Health Organisation is an international advisory body. It has no power over individual countries, and therefore, cannot ban post-mortem autopsies in any country.
In fact, the WHO actually published guidelines on how to perform autopsies and manage the bodies of dead COVID-19 patients.
Fact #3 : COVID-19 Is Caused By SARS-CoV-2
COVID-19 is technically not a virus.
COVID-19 is the disease caused by a novel coronavirus, which was initially called 2019-nCoV, before being officially named as SARS-CoV-2.
Fact #4 : SARS-CoV-2 Is A Real Virus
We know that the SARS-CoV-2 is a real virus, because Chinese scientists isolated it and with the help of the University of Sydney in Australia, released a draft sequence of its genome on 10 January 2020.
The complete genome of approximately 30 kilobytes in length was published on 3 February 2020.
You can look at the entire SARS-CoV-2 viral genome that was released by Chinese scientists here.
SARS-CoV-2 genome diagram. Credit : Rohan Bir Singh, MD
Fact #5 : A Virus Is Not A Bacterium
Any half-decent student of biology can tell you that a virus is not a bacterium. They are completely different.
A virus, for example, is not even a living organism. It is just RNA or DNA encapsulated within a protein or lipid shell, and can only replicate within a host cell.
A bacterium, on the other hand, is a single-celled microorganism that can multiply by itself. It is also much more complex, with intracellular organelles and even extracellular appendages.
SARS-CoV-2 – the COVID-19 coronavirus – is a virus, not a bacterium.
Fact #6 : There Is No Cure For COVID-19 (Right Now)
As of 23 April 2021, there is no cure for COVID-19, only vaccines that can help prevent it.
Antibiotics, anti-inflammatory, or anti-coagulant medication cannot cure COVID-19.
Fact #7 : 5G Does Not Cause COVID-19
There is simply no plausible way for 5G technology to create a new coronavirus out of thin air. Simply put – 5G does not cause COVID-19.
Consider the fact that there are COVID-19 cases in every country around the world, but 5G coverage is extremely sparse.
Take a look at this comparison of worldwide 5G coverage (provided by Ookla) and COVID-19 cases globally.
Can you see the complete lack of correlation?
Fact #8 : COVID-19 Can Cause Blood Clotting
COVID-19 can cause a hypercoagulable state, in which a severe inflammatory response triggers localised blood clotting which can become generalised.
It is especially common in severe COVID-19 disease, and has nothing to do with a bacterium, or 5G radiation.
When a COVID-19 patient presents with blood clots, they are treated with blood thinners like aspirin and heparin.
Fact #9 : Empromax Is An Antibiotic
Empromax is one of the brand names of the antibiotic, Cefpodoxime proxetil. It cannot work against a virus like SARS-CoV-2.
There is no evidence that the Russian Ministry of Health (Minzdrav) is using Empromax to treat COVID-19 patients.
They have temporarily approved certain drugs as COVID-19 treatments, but not Empromax :
Favipiravir – antiviral drug that can shorten recovery time
Levilimab – to treat cytokine storm
Fact #10 : Russian Ministry Of Health Relying On Vaccines
The Russian Ministry of Health is relying not on medications, because none actually exist to cure COVID-19.
Instead, they are relying on the two COVID-19 vaccines they developed :
Did the USS Al Gore Global Warming Research Vessel get frozen in ice?
Take a look at the pictures, and find out what the facts really are!
USS Al Gore Global Warming Research Vessel Frozen In Ice?
People keep sharing pictures of the USS Al Gore Global Warming Research Vessel frozen in ice, some as a joke, some as evidence that global warming does not actually exist.
You will find these being shared on Facebook, Twitter, WhatsApp, Reddit, and even some websites.
Note : We intentionally placed the FALSE overlay to prevent them from being further abused.
Because these have been debunked previously on our sister website, someone started sharing a new picture instead. This time, of a much larger ship.
USS Al Gore : The Facts
As you can surmise by now, those pictures are NOT of the USS Al Gore Global Warming Research Vessel.
Climate change is real, and sharing pictures of frozen boats is not going to change the fact that the world is getting warmer.
Here are the reasons why these are all FAKE PICTURES being shared by climate change deniers.
Fact #1 : There Is No USS Al Gore
The USS Al Gore does not exist. The USS (United States Ship) designation is reserved for active commissioned ships of the US Navy. There has never been a ship named for former US Vice-President Al Gore.
Well, a FICTIONAL submersible aircraft carrier – the CVJ-01 USS Al Gore – was named after him, but I don’t suppose that counts… because it’s a SUBMARINE! 😀
Fact #2 : Al Gore Has A Houseboat Called Bio-Solar One
Al Gore has a 100-foot houseboat that is powered by bio-diesel and solar panels, called Bio-Solar One. It was launched sometime in September 2008.
Here, you can see it at the Hurricane Marina in Silver Point, Tennessee. Completely different design and size, and NEVER FROZEN in ice.
Photo Credit : The Tennessean
Fact #3 : The Frozen Boat Was In Switzerland
The original fake picture of USS Al Gore was of a boat moored off Versoix, on the shores of Lake Geneva, Switzerland.
It was hit by an ice storm in 2005 – the freezing rain froze into a thick glaze of ice that covered not only this boat, but also vehicles, buildings and the streets.
Kaspersky Lab discovered than more than 22% of the World Cup 2018 WiFi hotspots lack encryption, making them quite unsafe for use by football fans. They share some useful tips on how to stay safe while using these World Cup 2018 WiFi hotspots!
Many World Cup 2018 WiFi Hotspots Are Unsafe!
According to Kaspersky Lab research, 7,176 of approximately 32,000 public Wi-Fi networks in FIFA World Cup 2018 host cities do not use traffic encryption. This makes them potentially unsafe for use by football fans visiting the cities. The results suggest that fans should take care of their personal data, especially while using open Wi-Fi connections around the FIFA World Cup games.
Global events always result in a concentration of people connecting to networks to upload posts, stay in touch with loved ones, and share the fun with others. However, at the same time, these networks can be used to transfer financial and other valuable information across the Internet. And it’s this information that third parties – not necessarily criminals – can intercept and use for their own purposes.
Kaspersky Lab’s findings are based on an analysis of public Wi-Fi spots in 11 FIFA World Cup 2018 host cities, including Saransk, Samara, Nizhny Novgorod, Kazan, Volgograd, Moscow, Ekaterinburg, Sochi, Rostov, Kaliningrad, and Saint Petersburg. The results show that so far not all wireless access points have encryption and authentication algorithms – aspects that are essential for Wi-Fi networks to remain secure. This means that hackers only need to be located near an access point to intercept network traffic and get confidential information from unwitting or unprepared users.
The three cities with the highest percentage of unreliable Wi-Fi networks are :
Saint Petersburg (37%),
Kaliningrad (35%), and
In contrast, the safest places were relatively small towns – including :
Saransk (only 10% of Wi-Fi spots are open), and
Samara (17% of Wi-Fi spots are open).
Almost two-thirds of all public Wi-Fi networks in these locations use the Wi-Fi Protected Access (WPA/WPA2) protocol family for traffic Still, it should be noted that even reliable WPA/WPA2 networks can allow brute-force and dictionary attacks, as well as key reinstallation attacks, meaning they are not absolutely secure.
How To Use World Cup 2018 WiFi Hotspots Safely!
If you are going to visit FIFA World Cup 2018 host cities, remember to follow several simple rules to help protect your personal data if you plan to use these World Cup 2018 WiFi hotspots :
Whenever possible, connect via a Virtual Private Network (VPN). With a VPN, encrypted traffic is transmitted over a protected tunnel, meaning criminals won’t be able to read your data, even if they gain access to it.
Do not trust networks that are not password-protected, or have easy-to-guess or easy-to-find passwords.
Even if a network requests a strong password, you should remain vigilant. Fraudsters can find out the network password at a coffee shop, for example, and then create a fake connection with the same password. This allows them to easily steal personal user data. You should only trust network names and passwords given to you by employees of the establishment.
To maximize your protection, turn off your Wi-Fi connection whenever you are not using it. This will also save your battery life. We also recommend disabling automatic connections to existing Wi-Fi networks.
If you are not 100% sure the wireless network you are using is secure, but you still need to connect to the Internet, try to limit yourself to basic user actions such as searching for information. You should refrain from entering your login details for social networks or mail services, and definitely do not perform any online banking operations or enter your bank card details anywhere. This will avoid situations where your sensitive data or passwords are intercepted and then used for malicious purposes later on.
To avoid being a target for cybercriminals, you should enable the “always use a secure connection” (HTTPS) option in your device settings. Enabling this option is recommended when visiting any website you think may lack the necessary protection.
In a move to allay fears of collusion with Russian authorities, Kaspersky Lab announced on 15 May 2018 that they will be moving a number of their core Russian operations to Switzerland. This would include their customer data storage and processing for most regions, as well as software assembly and threat detection updates.
To ensure full transparency and integrity, they are also arranging for this activity to be supervised by an independent third party, also based in Switzerland. Here are the full details!
Customer Data Storage & Processing
Kaspersky Lab will establish a data center in Zurich by the end of 2019. This facility will store and process all information for users in Europe, North America, Singapore, Australia, Japan and South Korea, with more countries to follow.
This information is stored and processed at this facility will be voluntarily shared by users of the Kaspersky Security Network (KSN) – a cloud-based system that automatically processes cyberthreat-related data.
Relocation of software assembly
Kaspersky Lab will relocate to Zurich its ‘software build conveyer’ — a set of programming tools used to assemble ready to use software out of source code.
Before the end of 2018, Kaspersky Lab products and threat detection rule databases (AV databases) will start to be assembled and signed with a digital signature in Switzerland, before being distributed to the endpoints of customers worldwide.
The relocation will ensure that all newly assembled software can be verified by an independent organization and show that software builds and updates received by customers match the source code provided for audit.
First Kaspersky Lab Transparency Center
Kaspersky Lab first announced their Global Transparency Initiative in October 2017. One of their initiatives include the creation of three Kaspersky Transparency Centers – one each in Asia, Europe and the US.
The first Transparency Center will be in Switzerland, and is expected to open this year. It will allow organisations and governments to inspect and review the source code of Kaspersky Lab products and software updates in a secure facility.
Independent supervision and review
Kaspersky Lab is arranging for the data storage and processing, software assembly, and source code to be independently supervised by a third party qualified to conduct technical software reviews. They are also calling for the creation of a new, non-profit organization to take on this responsibility.
Kaspersky Lab just issued an update on their internal investigation into the alleged downloading of NSA hacking tools by Russian hackers, and their own team. Their update provides new insights into the hack, including their new findings on the Mokes backdoor used to gain access to the infected computer.
What’s Going On With Kaspersky Lab?
Kaspersky Lab can’t seem to get ahead of the bad publicity over the alleged downloading of NSA hacking tools from an NSA employee’s home computer. After the incident was first reported in the Wall Street Journal, Kaspersky Lab launched an internal investigation.
They have also recently announced their Global Transparency Initiative to combat the perception that they are helping the Russian government attack Western interests.
Kaspersky Labs published these initial findings on 25 October :
On September 11, 2014, a Kaspersky Lab product installed on the computer of a U.S.-based user reported an infection of what appeared to be variants of malware used by the Equation APT group– a sophisticated cyber threat actor whose activity had already been under active investigation since March 2014.
Sometime after this, the user seems to have downloaded and installed pirated software on their machine, specifically a Microsoft Office ISO file and an illegal Microsoft Office 2013 activation tool (aka “keygen”).
To install the pirate copy of Office 2013, the user appears to have disabled the Kaspersky Lab product on their computer, because executing the illegal activator tool would not have been possible with the antivirus enabled.
The illegal activation tool contained within the Office ISO was infected with malware. The user was infected with this malware for an unspecified period while the Kaspersky Lab product was inactive. The malware consisted of a full-blown backdoor which could have allowed other third-parties to access the user’s machine.
When re-enabled, the Kaspersky Lab product detected the malware with the verdict Backdoor.Win32.Mokes.hvl and blocked this malware from calling out to a known command and control server. The first detection of the malicious setup program was on October 4, 2014.
In addition, the antivirus product also detected new and previously known variants of Equation APT malware.
One of the files detected by the product as new variants of Equation APT malware was a 7zip archive which was sent back, in accordance to the end-user and KSN license agreements, to the Kaspersky Virus Lab for further analysis.
Upon analysis, it was discovered that the archive contained a multitude of files, including known and unknown tools of Equation group, source code, as well as classified documents. The analyst reported the incident to the CEO. Following a request from the CEO, the archive itself, source code, and any apparently classified data were deleted within days from the company’s systems. However, files that are legitimate malware binaries currently remain in Kaspersky Lab storage. The archive was not shared with any third-parties.
The reason Kaspersky Lab deleted those files and will delete similar ones in the future is two-fold: first, it needs only malware binaries to improve protection and, secondly, it has concerns regarding the handling of potentially classified material.
Because of this incident, a new policy was created for all malware analysts: they are now required to delete any potentially classified material that has been accidentally collected during anti-malware research.
The investigation did not reveal any other similar incidents in 2015, 2016 or 2017.
To date, no other third-party intrusion aside from Duqu 2.0 has been detected in Kaspersky Lab’s networks.
The Mokes Backdoor & Other New Findings
Kaspersky Lab continued their investigation, issuing a new report that confirmed their initial findings above. It also provided additional insight into the analysis of the telemetry of suspicious activities registered on that NSA employee’s computer that was sent to their servers.
One of the major discoveries was the detection of the Mokes backdoor in that NSA employee’s computer. The Mokes backdoor is a malware that allows the hacker to remotely access the computer.
Curious Mokes backdoor background
It is publicly known that the Mokes backdoor (also known as “Smoke Bot” or “Smoke Loader”) appeared on Russian underground forums as it was made available for purchase in 2014. Kaspersky Lab research shows that, during the period of September to November 2014, the command and control servers of this malware were registered to presumably a Chinese entity going by the name “Zhou Lou”.
Moreover, deeper analysis of Kaspersky Lab telemetry showed that the Mokes backdoor may not have been the only malware infecting the PC in question at the time of the incident as other illegal activation tools and keygens were detected on the same machine.
More non-Equation malware
Over a period of two months, the product reported alarms on 121 items of non-Equation malware: backdoors, exploits, Trojans and AdWare. All of these alerts, combined with the limited amount of available telemetry, means that while Kaspersky Lab can confirm that their product spotted the threats, it is impossible to determine if they were executing during the period the product was disabled.
Kaspersky Lab’s Conclusions
Their current investigations conclude thus far that :
The Kaspersky Lab software performed as expected and notified our analysts of alerts on signatures written to detect Equation APT group malware that was already under investigation for six months. All of this in accordance with the description of the declared product functionality, scenarios, and legal documents which the user agreed to prior to the installation of the software.
What is believed to be potentially classified information was pulled back because it was contained within an archive that fired on an Equation-specific APT malware signature.
Beside malware, the archive also contained what appeared to be source code for Equation APT malware and four Word documents bearing classification markings. Kaspersky Lab doesn’t possess information on the content of the documents as they were deleted within days.
Kaspersky Lab cannot assess whether the data was “handled appropriately” (according to U.S. Government norms) since our analysts have not been trained on handling U.S. classified information, nor are they under any legal obligation to do so. The information was not shared with any third party.
Contrary to multiple media publications, no evidence has been found that Kaspersky Lab researchers have ever tried to issue “silent” signatures aimed at searching for documents with words like “top secret” and “classified” and other similar words.
The Mokes backdoor infection and potential infections of other non-Equation malware point to the possibility that user data could have been leaked to an unknown number of third-parties as a result of remote access to the computer.
Kaspersky Lab can’t seem to get rid of the stigma of being a Russian company. Even after Eugene Kaspersky publicly declared that Russian President Vladimir Putin is not his friend, and offered to show his source codes to the US government, he can’t shake off the perception that he’s helping the Russian government attack Western interests.
It did not help that Israeli government hackers provided the US National Security Agency (NSA) with evidence that Russian hackers used Kaspersky Lab software to scan for American classified programs. They also found NSA hacking tools in the Kaspersky Lab network, the same tools that the NSA later confirmed were in Russian intelligence hands.
That was what led to the US General Services Administration directive to remove Kaspersky Lab from its list of approved vendors, and the US Senate to call for a government-wide ban.
There is no evidence that Kaspersky Lab itself was complicit in helping Russian intelligence scan for American classified programs, or obtain the NSA hacking tools. It is entirely possible that the Russian intelligence hackers merely exploited the same flaws in Kaspersky Lab software that the Israelis used to gain access to their network and software.
However, all these controversies have greatly undermined Kaspersky Lab’s credibility and sales worldwide.
The Kaspersky Lab Global Transparency Initiative
The Kaspersky Lab Global Transparency Initiative attempts to prove and assure their customers (and potential customers) that there are no backdoors in their software. Under this initiative, Kaspersky Lab will make their source codes, including software updates and threat detection rules, available for independent review and evaluation.
Their Global Transparency Initiative will kick off with these actions :
Kaspersky Lab will offer their source codes for an independent review by Q1 2018, with similar independent reviews of their software updates and threat detection rules to follow.
An independent assessment of the Kaspersky Lab development lifecycle processes, and its software and supply chain risk mitigation strategies, will begin by Q1 2018.
Additional controls to govern Kaspersky Lab data processing practices, with verification by an independent party, will be developed by Q1 2018.
Three Transparency Centers will be established in Asia, Europe and the US to address security issues with Kaspersky Lab partners, customers and government stakeholders. They will also serve as a facility for “trusted partners to access reviews on the company’s code, software updates and threat detection rules“. The first Transparency Center will open by 2018, with the rest by 2020.
Kaspersky Lab will increase their bug bounty awards up to $100,000 for the most severe vulnerabilities found under their Coordinated Vulnerability Disclosure program by the end of 2017.
Kaspersky Lab will later announce the next phase of the Global Transparency Initiative, after engaging with their stakeholders and the cybersecurity community.
What This Does Not Address
The initial phase of the Kaspersky Lab Global Transparency Initiative will help verify, and assure their customers, that there are no backdoors in their software. However, it does not address a major concern for the US government – the fact that their data is routed through Russian Internet service providers that are subject to the Russian intelligence surveillance system called SORM (System of Operative-Investigative Measures).
Kaspersky Lab has said that customer data sent to their Russian servers are encrypted, and they do not decrypt it for the Russian government. But it would be impossible for them to prove it. Perhaps they will address this concern in the next phase of their Global Transparency Initiative.