Sunday, February 26, 2017

Controversial belief


A Two hundred year life

Mind expanding humerous survey of immortality ideas

If any moron finds doubts in linking document, there is no sense in being abused. Just lay off and we are happy being ships that pass each other on dark night. This presents belief that I have and trot out to be attacked on. It does not show weakness of belief but certainly of arguments for and lack of strong arguments against.

What the hell can non-MD know? Lot, compare to top quality TED MD!

Trick is careful empirical+nogo-theorem analysis.
  1. I think that all organisms age equally and uniformly at individual rates of course, but within a factor of 3, much faster some times but never slower than the best. This is strongly supportive of telomere-like hypothesis, which is a part of DNA, hence universal across animals and shortening on cell division hence age limiting. Once the telomerEs become too small, the organism dies. Cancer is simply telomeres that refuse to shorten, hence causing boil like harm to shortening telomere  tissue. However attractive be this theology, the empirical fact is there are birds where it does not dwindle etc. Scientists are not yet sure. But they have been able to use telomerase in the lab to keep human cells dividing far beyond their normal limit, and the cells do not become cancerous.
    If we used telomerase to "immortalize" human cells, we may be able to mass produce cells for transplantation, including insulin-producing cells to cure diabetes, muscle cells for treating muscular dystrophy, cartilage cells for certain kinds of arthritis, and skin cells for healing severe burns and wounds. An unlimited supply of normal human cells grown in the laboratory would also help efforts to test new drugs and gene therapies
  2. Alternate, NOT NECESSARILY EXCUSIVE,  hypothesis is that growth factors are absolutely needed till adulthood but turn around and cause disease past adult hood species-wide. It has support in humans when insulin needed by muscles becomes a major direct killer for diabetics through strokes and diabetes B and Alzheimer effect on brain in survivors. Top three killers, when one considers why, reduce to telomere shortening (cancer) and insulin. Just control of these 2 give up 120 year life! ECP gives blood flow. Inexpensive diabetes medicines are in use and well understood. Telomere needs to be researched. ECP, exercise and good diet (calories are killed by ECP and exercise, insulin levels aggressively controlled). A recipe most doctors will not object too
  3. Hibernation is one promising avenue. A lot is possible with small animals, However, once bear complexity is reached, temperature drops of 85 from 95 fahrenheit happens. That is different from sci fi, a tech fi (i.e. mine) limit of modest increase is best believed and plenty of competent people are already doing so! Like tech fi in general, science advances can only shorten the time-line! I only posit 80 year gain over next century, based on extrapolation, not faith, hibernation is not the only shot. 
  4. So the Dr. Path pronouncement after my impressive (for then 1998) power point presentation – won't help you but can't hurt – on statins/. Now consider above – ECP, exercise, aggressive insulin control, vitamin stuffing, anti-oxidants with Glutathione bio-availability, cheerful stoic disposition, I deserve another “won't help you but can't hurt”. Telomeres are different – likely need new biotechnology and stem cells. I believe if controlled in 30 years, we are talking high quality of life 110-120. We need another 80 years. But the 60 years from now likely will solve that gap.
  5. There is a particular reason for my cheer, with electronics/computer background. The progress functions are exponential, tremendous success happens in final few years, gain of 80 years life in 60+40 is not that weird! Capital for electronic-brain interface is there as it is greatly needed in rehabilitation of limb losers and stroke patients! I complimented my EEG technician 3 years ago and BBC introduced think-change-channels only 2 years ago and all the jeddi toys 1 year old.. Next very big advance happens when avatars can feel and report back on felt as sensations. Then new meaning to "almost there" starts. You can be spaceship, car racer or driver, NBA player, movie-star, professor any one? Briefly my tech-fi elysium!
  6. So summary of immortality my tech fi way is 60 years by ECP & anti-oxidants with glycation minimization; 80 years by hibernation and unlimited by cyborgification. True sci fi can only make it faster!
  7. Another different exciting way is the deGrey method.

------------------ disussion ropund about

This is a very good talk for the devotees of allopathic medicine. (me). I agree 100% .

The answer to drawbacks of allopathic medicine is NOT to revisit the lesser effective medicines of past! Trick is distinguish acute and chronic, limit allopathic medicine to acute and trust medical grads more for chronic. One thing I say CLEARLY, also found here, contrary to most allopathic medicine, is the belief that the root causes of chronic diseases unify to very few - glycation (sugars), telomeres (cancers) and anti-oxidants. Do just these, and 200 year life yours (28 years for Kurtweil, 150 for me) to singularity.

I have undergone many specialities, have come to sugars.Never had csancers but stem opposed telomeres are answers. Ant-ocidant for in-built ant-fraigility. Tough sugar control (exercise and diet & metmorphin+Teneligliptin) will do it (green tea, custartard apple,guvava etc for anti-oxidants, stoicism for true cheer) Above was lovely for me for here was a true MD agreeing with my conclusions!

Distinction between acute disease and chronic disease is not so clear cut. Many acute diseases have similar root causes as chronic diseases. For example, last week my daughter had strep throat three days after returning to US from India. We took her to our vaidya in the US, and she treated her without the antibiotics that an allopath would have surely prescribed. More interestingly, the vaidya examined her throat without any gloves or face masks. She said that she does not catch infection from her patients because her body (immune system, if you will) is healthy.

Failure to distinguish between chronic and acute diseases can be very hurtful as can differentiation between treatment-needed and transitory diseases can be on wallet and immunities.Clear applicable  language, like constitution, that can change but only with super majority of licensed stakeholders in treatment.for differentiation

Better word than false is less-effective.

The strep-throat episode I would place in transitory - allopaths are very good as diagnosing common colds as strep, common colds are way more common. I do not question your avoidance of antibiotics - develop resistance and BAD idea to use to be on safe side. I suspect homeopath would be as good as Vaidya! placebo WILL DO, AND colds can LOOK BAD. There is NO reasonable way using anecdotal data and any statistical will have sieve-like holes!

My own thinking is based on 1. proper allopath fix of acute problems 2. No ideas on effective prevention of similar recurrence but fine on exact, exotic diseases and my disbelief I could NOT have SO MANY bad genes given my father/mother free and upbringing ok. It follows then the chronic diseases sprang from one source – found insulin and telomere.

---------------------------

HqolLongevity research


Chemistryand Physics of Diseasse


Agingfoods



Tuesday, February 7, 2017

Points on mathematics of aaqgs-cryption




NSA surprised me with no reaction, even from a colleague in one of the NSA funded several places saying in effect “but sq-rt in what modular base + not all integers are squares”. The key insight I have is that man-in-the-middle is the real enemy, not the factorization of the semi-prime, best never disclosed and done well. Silence means Okay to commercialize a technology with security implications. Second insight is that IBE can be super to RSA like KEM-DEM. Once man-in-middle is killed, ordinary well-studied RSA can be used. Resulting can be argued to be excellent without decade long study since RSA and Cocks are being used.

1. A J-nearest is necessary to convert a number to logically unique square. Almost 1/2 the modular numbers are square, So the gap bigger than 1 is infrequent. It can be covered by computing the Jacobi every time, which means effort be rounded by c*log n most of the time. Precise calculations are outside my pay grade,
2. There is a trick to reduce computation to 2 in all but negligible cases. The family administrator computes in family-semi-prime, the [name//'gap' = n] [name//”semi-prime”= n] tuples . Now J-nearest is by few evaluated simple checked adds.
3. [s/”feature” = n] is currently implemented by concatenating s and feature with a string n and delimiters then SHA-3 sq-rt is given n and value of concatenating s and feature and delimiters SHA-3 sq-rt again, all in implied mod. Entire record of any node is protected by its sq-rt in implied embedding, can be found and checked.
4. The author is simply a series of numbers after an ASCII or Unicode name. Post character name are numbers, my-semi // user-semi // my-proof. My-proof is generated at family insertion time and is check-able in sq-rt in nation-wide my-permit-for-year, can be checked since my-permit-for-year for current year is fixed & published semi-prime and ensures payment to me. Note that my-* are published, also communicated every year or enroll-time in consumer public. Consumer and I talk in consumer public and my public.
5. A retraction can be undone by building a new member. The user can reuse name with higher edition suffix.
6. Retraction is done by publishing factors of my-semi. Henceforth any one can claim to be you. Every year, factors of my-* used that year are published. No previous messages become opened.
7. Only authorized names can be allowed. This is as per policy of the jurisdiction.
8. There is an easy way to prevent misspellings. A large number of functions to Boolean are allowed as f(index,name) Names considered misspellings  in some index return bad, others good. A name is looked up before switching. A consumer is allowed to select a number of indices. In effect, a name is good if good in at least one chosen index. Any number of people are allowed to buy any number of indices (16 ASCII-64 characters), at $10 each!

Monday, February 6, 2017

On Road to Richest human ever on earth


Displayed here is the plan. It revolves around modular sq-rt only I on earth can do even though the inverse is modular squaring and can be done effortlessly in hardware. That is math. How can you make money from it? How much? Answer should shock you. Don't think like Cocks! First time ever, the money part is done. After all, I am not M!

You can do before and after but not just this. What is more, if you could, then either you reinvented me or most military encryption will fail, hence very unlikely you can even if NSA. I need no research plaudits. Can or not. Easy to smoke out worst me! I return sq-rt, which you can trivially square and check. That I compute and not keep a hidden shared table is easy to prove – two unconnected sites give same square root.

Remember that this is NOT math paper and all numbers don't have sq-rt and J-nearest is implicitly assumed.

Beyond true nonsense

How much money? There is internet 2.0 now. Next is not 3.0 but Aaqgs-internet 1.0. Why strictly superior? Impossible for a link to lead you astray! The current nonsense about clicking only known reasonable goes – how can you only click only reliable ones? In Aaqgs-internet, every site is as now, but prefixed with sq-rt(digest(<author><as-before>),number(author))) <author> . IN hardware without communication can the sq-rt squared and compared to digest at hardware speeds. The sit6emaker fetches the sq-rt from me once, good for any number of users. A consumer can reject unless author in reliable table. In fact, some function of author name may be treated as reliable and a monitor required clearance to be in that function's characteristic set. That is Aaqgs-internet 2.0 which will implement like to “on government service only” with the added charm of rejecting nefarious adds!

Why the money? Other great IBE can do it, but any exponentiation on several thousand bits is unlikely to be done at blazing speeds.


Safety from criminals – Cryptography security from even one bit change and from arbitrary authors (like not criminal but as bad adsters) can be rejected. I am protected from copy cats because sq-rt is not disclosed, even though security is from cryptographic means and NO ONE has to trust me (square to check!)!

Safety from intelligences - Assume NSA has nobus policy and can protect - the square root algorithm is useless if public! I protect myself from NSA by making sqrt public on any demise! It is enormously beneficial to USA if I exercise my citizen love for the land!

Determining competence (helps me!) says the true importance of claims here is gauged only by competent!


Sunday, February 5, 2017

Aaqgs-confused

1. Aaqgs-bits





Fundamental to being uncatchable entrepreneur in software is the use of the product itself for debugging so that you have a series of progressively better software. To prevent the final product used against you in ways that make your hard work nothing, it is essential that nobus technique be applied as NSA does! Nobus is short for “no body but us”. A very general technique is to have known bugs in the final product, make a list of those, and give a different answer based on list from the one computed. Consumers are allowed to check for errors and raise wrong output complaints, handled by right output. This way, the debugging process of customers becomes visible and prompt reply reputation is strengthened.

Aaqs-bits are crypt-impossible to modify without detection. It is fundamental to avoid erroneous and criminal change in files – text, audio, video, software, multi-media. It is basic to aaqgs-internet – a link is to a sq-rt. It is cheap to test a link, generating check able links equally easy if the page-owner helps.

Every file is prefixed with sq-rt of the digest of file in the Jacobi-near of the prefix parse of the protected text.

<sanity> <NEWLINE><author> <NEWLINE><REST>
sanity = sq-rt(digest(author> <NEWLINE><REST>), Jacobi-near(<author>))
<NEWLINE> style is not mandatory.


Point is that right side can be computed for any page and sanity checked by square. No multi-media can be attacked. The aaqgs-internet is SUPERIOR to existing internet because NO links can lead you astray! For small cost, an author can make a can't-vitiate site even if the best intelligence s in the world conspired as one!


It is not hard to see that other IBE can be used so. Problem is efficiency, a consideration that prompted this disclosure. No matter how much hardware you use, some thousand bit discrete exponential will take time. That is NOT true with squaring I need! The links can be checked and followed in milli-seconds!

1 - Aaqgs-bits


Fundamental to being uncatchable entrepreneur in software is the use of the product itself for debugging so that you have a series of progressively better software. To prevent the final product used against you in ways that make your hard work nothing, it is essential that nobus technique be applied as NSA does! Nobus is short for “no body but us”. A very general technique is to have known bugs in the final product, make a list of those, and give a different answer based on list from the one computed. Consumers are allowed to check for errors and raise wrong output complaints, handled by right output. This way, the debugging process of customers becomes visible and prompt reply reputation is strengthened.
Aaqs-bits are crypt-impossible to modify without detection. It is fundamental to avoid erroneous and criminal change in files – text, audio, video, software, multi-media. It is basic to aaqgs-internet – a link is to a sq-rt. It is cheap to test a link, generating check able links equally easy if the page-owner helps.
Every file is prefixed with sq-rt of the digest of file in the Jacobi-near of the prefix parse of the protected text.
<sanity> <NEWLINE><author> <NEWLINE><REST>
sanity = sq-rt(digest(author> <NEWLINE><REST>), Jacobi-near(<author>))
<NEWLINE> style is not mandatory.

Point is that right side can be computed for any page and sanity checked by square. No multi-media can be attacked. The aaqgs-internet is SUPERIOR to existing internet because NO links can lead you astray! For small cost, an author can make a can't-vitiate site even if the best intelligence s in the world conspired as one!

Saturday, February 4, 2017

Aaqgs-prescription-effort


    When ready (end of year), now that Bugs have been overcome for long, sq-rt encryption will be partnered for free (ad) magic- checksum, one-year-long-safe-email, my-telephone-set-safe-call aaqgs-responsible-letter. Then my company will develop aaqgs-must-pay-producer and aaqgs-safe-banknote.

Claim is that all these benefit from and might not be doable safely without my sq-rt in discrete field and that a consumer can safely extract the sqrt without endangering my code. Matters not what you think of opaque basis (anti-gravity?), point is that all these wonderful inventions flow from a small basis itself very satisfying! And ingenious.

Safe extraction of sq-rt

  1. Random numbers have an interesting property – if two independent streams are xor, the resulting steam is no less random than the more random of two inputs. So one can safely construct a random number by coring the results of a large number of random generators, including those known ridiculous.
  2. Modular exponentiation is a non-negligibly a permutation for semi-primes. So doing an exponentiation modulo a semi-prime will improve a random.
  3. After a good random, nearest larger prime is easy to get.
  4. Multiplying two such primes gets a random semi-prime. No one knows its factors but you.
  5. Extraction is done by my computer on the net. You simply send modulus, square, your semi prime and permit (to get sq-rt, given by family administrator and good for year) encrypted by my computer. I get the answer after eligibility check, and return it encrypted in your semi prime
  6. Safety follows from RSA safety and uniqueness of permit, secret known only to you and family administrator.
  7. I can have any number of connected user sites of my computer, each doing the sq-rt privately. Knowing even trillion*trillion sq-rt tells you nothing about another number! Easy to see, you can generate own trillion-trillion by squaring till cows come home!

To make money

  1. Following are much smaller advances than sq-rt, nevertheless not disclosed since useful for other methods and hence valuable.
  2. First is safe retraction – how does a modulus become unusable without disclosing previous messages.
  3. Second is annual death - how does a modulus die every year but without disclosing previous messages.
  4. So here is how money is made – A family administrator keeps adding people to his family. There is an add charge. The members can write to each other, each message has a nominal charge to receiver like 1/100 cent. IoT process too. An author/producer per sale too like 10 cents. Per call too like 1/100 cent. My telephones can remember customer public. Each call requires nearest Jacobi of sender/+receiver/+clock/+date and is untappable due to sq-rt
  5. Or banknotes, image filters will be sold, that will reduce banknote images (any vision chi) to bits needed (my) and IO on cloud. Expected rate in ms. So even fast notes (stacks blown past counters can be checked per counting machine. Verification of notes, receipts etc can be put on cloud!

Hard work

Ahead is doing these from 4 magics not detailed
1 sq-rt
2 key retraction
3 auto undo ability at year end
4 Unique marking of objects

Not disclosing them is enough Failure to reverse engineer even one gives me a universe to exploit. Neither is easy or disclosed.

P:products

Can be disclosed in terms of opaque basis. To be worked are


  1. Uneditable bits – whether encrypted or not like text sound video and software.
  2. Encrypted aaqgs-private (without-nobus-NSA, with police-unsafe corruption-OK) IBE email
  3. Untappable When ready (end of year), now that Bugs have been overcome for long, sq-rt encryption will be partnered for free (ad) magic- checksum, one-year-long-safe-email, my-telephone-set-safe-call aaqgs-responsible-letter. Then my company will develop aaqgs-must-pay-producer and aaqgs-safe-banknote. Has to be an IBE.
  4. aaqgs-responsible-letter (aaqgs-private encrypted IBE multimedia) aaqgs-generated aaqgs-question.
  5. aaqgs-must-pay-producer
  6. aaqgs-safe-banknote
  7. aaqgs-internet
  8. aaqgs-IoT

Friday, February 3, 2017

Aaqgs-rise



1. There are expected to be three effects of this – greatly fanned enmity, true madness imprint and yawn. True friends are not just admirers but point to deficits – implied nonsense (self-contradictions)  and incompleteness , as well as pointers to unmarked references. My own response is humor for critics and friends. True friends are those who I listen and incorporate.
2. In terms of timing, I do believe that I have reached a plateau in thinking when prescriptions can be rolled out. Clearly, 1919 is the target. Unlike OIE morons, I do not have administrative experience. Unlike Sir Trump, I do not have vast business experience either. What I will have, by then, is the fastest financial exponential rise in history. And vast experience in technologies that will matter then – quantum processes, veracity through modular arithmetic safe against hacking, and business formation.
3. My square root form got a massive boost, for the NSA hurt itself massively by making my equally good competition untrustworthy! Poor NIST, IETF and UNO!
https://www.wikiwand.com/en/Dual_EC_DRBG
http://www.reuters.com/article/us-usa-security-nsa-rsa-id


IBE wiki
Has listed generic drawbacks of all known IBE, but not mine, except that 4.. Quantum computers are not-available doing Shor!
https://www.wikiwand.com/en/ID-based_encryption
1 If a Private Key Generator (PKG) is compromised, all messages protected over the entire lifetime of the public-private key pair used by that server are also compromised. This makes the PKG a high-value target to adversaries. Me: No center, even distributed. Can retract keys.
2 Because the Private Key Generator (PKG) generates private keys for users, it may decrypt and/or sign any message without authorization. This implies that IBE systems cannot be used for non-repudiation.  Untrue wiki! Me: No center, even distributed.

3 A secure channel between a user and the Private Key Generator (PKG) is required for transmitting the private key on joining the system. Can build personal RSA, keys never known. No implied escrow.

4 IBE solutions may rely on cryptographic techniques that are insecure against code breaking quantum computer attacks (see Shor's algorithm). Only irrelevant adiabatic QC on horizon without Shor capability!

Personal points

1 No one (terrorist) can abuse a nations communication system even with foreign help.
2 Provable safety against other nations.
3 Police with legitimate warrant can decrypt messages of any one only for warrant period, and no one else gets effected by a surveillance.

When ready (end of year), now that Bugs have been overcome for long, sq-rt encryption will be partnered for free (ad) magic- checksum, one-year-long-safe-email, my-telephone-set-safe-call aquas-responsible-letter. Then my company will develop aaqgs-must-pay-producer, PTO
-detrademarker, iot-process-safe-messaging  and  aaqgs-safe-banknote.

First Field Medal winner woman



Stanford's Maryam Mirzakhani wins Fields Medal. Bigger than nobel (four years).

http://news.stanford.edu/news/2014/august/fields-medal-mirzakhani-081214.html



I vainly tried to understand her work for two reasons – how the universe came to be, and top flight prime numbers and cryptography. I gave up – it makes some sense why string theory on 26 dimensions makes sense and all why zeta(1) = lim(natural n) Sum(n) = -1/12 as per rieman and ramanujan and even why this sounding absurdity is basis of 26 dimensions in quantum field theory!


Wednesday, February 1, 2017

2017 – Great Year at last



Disclaimer: Only words with aaqgs semantics are used and aaqgs is the sole responsible owner. aaqgs-Artificial-evolution is related to biological and memetic evolution and refers to the claim that ONLY advantage nature had over human quantum computations has been billions of years of natural selection evolution that can be modeled in years and computed in hours. You-tube and vimeo links, unless so marked, are considered free link.
This looks like ad, is, but summarized my statement well
https://www.youtube.com/watch?v=nKZlQhDJpPo
1. The point is 2017-2020 is when many companies fail, become laggers and marked for fail.
2. Not new, MANY large retail houses have died already.
3. OIE fuck you, inexperienced in digital world, all the experience before is irrelevant hot air.
4. The big shots have exactly my TBI madness – fucked if cautious and fucked differently if not.
5. I have exactly the unignored niceness shown to me as sick. It is possible to enter entire family line of enemies in computer and revenge by simple technique – ignoration boycott. Only need is great for me – be very successful. More successful, faster revenge. Allows me to be anywhere, pass on secrets, keep revenge alive to dooms day.
6. Three products jump at me from research, only I can do on earth – Quadratic factoring in a discrete field. No magic here – any moron can multiply in Field i.e. compute x*x. What is undo able except negligible integers is compute the square root.
7. Given any string s, I provide free digest(s). Given any numbers a and b, modulo any M, I provide free a*b%M
8. Now sq-rt is not practical. Hence if given, can be checked i.e. claim(x is sq-rt of y) checked bu x*x = y.
9. Cant change text s – prefix it with sq-rt(digest(s))
10. send MSG to some one – encrypt(MSG) with k and publish k*k. Only target can decode.
11. I solve 2 difficult problems – money making and reverse engineering.
12. money making is easy, M has life of rest of year. It dies henceforth but all previous uses remain secret!
13. Prevention of reverse engineering by abusing my code is easy – 95% of code can be safely published by FSF code, since the algorithms known. Only new thing is sq-rt knowing some magic of M. That computation only in protected centers and results communicated in net by rsa! Can use rsa since only one sender and one receiver!
14. First is never encrypted, but secure broadcast. By add of sq-rt.
15. Next use is secure email, free for rest of year.
16. Next is untappable secret phone call, free but have to use my phones.
17. Finally, paid responsible text, that allows sender to bury private secrets in sent mail and recipient to auto-check the secrets, both sides fully free of knowledge of cryptography. Makes 21 century sense for marriage sites, employment application, etc, even general mail, particularly to opposite sex! strictly better than paper certificates (easy forging), paper banknotes (easy color xerography), taping (easy rerecording), photo (easy remixing) and video (colorization and blue screens).

Aging foods



Disclaimer: because my advice is non-Ayurveda, positively non-homeopathic (criminal) not-like-friends, be warned. Only tolerated are modern medicine with belief that 80% mm are honest OIE cunts and require extensive internet research to believe. They are Widely abusively (to consumer) penetrated by evil adsters and subhuman incentivizaion that makes every story suspect if not

Cochrane | Trusted evidence. Informed decisions. Better health, only trustworthy advice on planet earth.


The most sensible ways to do well is high anti-oxidant bio-available foods. Using them, exercise, ecp; I believe can push my life to 95, past the sweet zone of cyborg transition.


The golden aaaqgs-rule for serious believability in any chemical is
  1. checked publication in high quality journal
  2. Highest concentration in healthy adults
  3. lower in healthy older
  4. level lower in sick elderly
  5. Lowest in hospitalized elderly
  6. Has well defined mechanism i.e. Anti-oxidant
  7. Passes the aaqgs-test of “why only now”
  8. Tested by others to escape new-subject syndrome
  9. Why not widely prescribed
  10. Cant-hurt attitude
  11. Reasonable bio-ability as food or no reaction direct injection

So far over 30 years, statins, Stevia and ECP have passed these tests. Independent of doctor belief, I practice them. Now a fourth Glutathione. Starting on it, making wife and parents follow it. One part is testable within a month – wife loves it! Glutathione interferes in melanin production ie people get fairer! Within a month! So she was photographed at start and again after a month – compare then objectively. She has eaten it a week now and every day looks at the mirror! Not that I can see – still three weeks!

Glutathione has been labeled master anti-oxidant.

Don't be carried away. Remember that Sir Pauling himself believed Macro-dosages of Vitamin-C (1000% daily needs) and had conspiracy-theory-explain of doctors! Nevertheless, Glutathione praises as anti-oxidant are common, first 5 points are from Lancet in UK. Warning – expensive as typical self-nutrition-joker-consumers have discovered it. You can even get soaps and creams – never mind how it works - most idiots respond to word Glutathione - love to emfubar an objecting adster subhuman!

It supplements guava, sharifa (custard apple) and mangos! With it, no Shortage of anti-oxidant. Incidently, if you see US returned gora (Sir white) as an entrant to 50th graduation anniversary celebration, don't be surprised!