What the Zuck! Why is Twitter now blocking VPNs???? This is totally unacceptable! So now we cannot use Twitter in a privacy respecting manner?
@elonmusk
Be a Subversive with Linux! We are under Attack!
Our basic expectation of private conversations using End-to-End Encryption is under attack. The UK just passed the Online Safety Bill and the intent is to zuck us by bypassing encryption via client side scanning. But we can fight
Best and Worst Encrypted Messaging Apps (7 Apps Ranked)
In this video we outline the characteristics that are found in encrypted messaging apps that we need to care about. Then we apply these to 7 apps which I rank from worst to best. Are the most popular encrypted messaging
How to Evade Digital Surveillance - Two Techniques that Work!
In the recent videos, I discussed the various ways the State and hackers can surveil you or implement mass surveillance. In this video, I explain how to beat that.
I will focus only on two areas due to the wide
Web Encryption is now FICTION. But there's LetsEncrypt...
Web encryption is now completely broken. Recent changes announced in the EU will now ensure that a man-in-the-middle will be common place and we will be made to think that encryption still exists.
I will explain this
A Proposal to Google: My Solution to Fix the Screwed Up Internet Encryption
Web Encryption (HTTPS/TLS) no longer guarantees us any security or privacy because of the abuse by various stakeholders of the Public Key Infrastructure.
Anyone currently can call themselves a Root
He knows when you've been sleeping. He knows when you're awake. He knows if you've been bad or good -- so get a de-Googled phone for goodness sake! You better watch out...😆
Incredible Dangers in Browsers (Affects all of them)
Most people do not realize the privacy risks in browsers and spend their time thinking about which browser is better. It's time for you to understand the flaws in every single browser and this has a significant effect on your
How to Get Rid of the Microsoft Account in Windows 11
Windows 11 Home does not allow you to set up a user for the first time without using a Microsoft Account. I will teach you how to eliminate this Microsoft Account after the fact.
Sweeping Google Searches to Find Suspects?
You may not know it but you could have been digitally searched already to see if you are a suspect in some crime.
Lots of these privacy invading dragnets are going on and this really is a way around the USA Constitution's 4th
How Some Governments Eliminate HTTPS/TLS Encryption!
Our ability to communicate privately is under siege from multiple fronts. While the Five Eye countries seek to bypass end-to-end encryption, some countries already eliminate even STANDARD WEB encryption. So depending on who
Let me restate this so it is clearer. The Intelligence Community (IC) pays Big Tech for access to control the populace, including US Citizens. In other words it is a disinformation and surveillance actor.
@snowden
already revealed this. But it persists.
Snowden - What a Waste!
10 years ago Edward Snowden shocked the world with information proving that a 3-letter agency was collecting data about US Citizens, something that was beyond the mission of these intelligence agencies. Now in 2023, we can evaluate, 10 years later if
Mass Surveillance Methods: Cybersecurity Primer
We examine typical approaches to mass surveillance as I imagine they would be implemented by any country. This is broken out in 3 separate areas of surveillance: Web traffic, Email, and Notifications. This will teach you some
Now think about this clearly. If this is happening to Twitter, do you not think it is being done to Google/Youtube, Facebook, and Apple? Give that some serious thought since I've been harping on this for a long time. It is happening.
Misconceptions about IMEI and IMSI. Are these Phone Identifiers Destroying Our Privacy?
Your mobile phone emits identifiers, and this is done over the airwaves (radio frequency). The identifiers are unique and thus can point directly to a specific person. These identifiers are
Cybersecurity is when it is practically impossible to decrypt an encrypted message. Privacy is when no one knows who sent the message or who the recipient is, even if the message is readable.
When Law Enforcement does a dragnet search of activity in an area using Geofencing and using it to find suspects, with no warrant, affecting possibly thousands of innocents, that does not involve
#FISA
but yet it occurs often. Get a de-Googled phone and decline to participate.
Do you understand the difference between Privacy and Cybersecurity?
For example, your employer cares about cybersecurity a lot. But do not care about your privacy whatsoever.
Can you tell if a tech tip relates to cybersecurity instead of privacy?
@elonmusk
@ggreenwald
@mtaibbi
The new significance of this is that Twitter may be the only place without explicit control of 3 letter agencies! Fantastic!
How I Would Do a Device Content Scan on Your Favorite OS -- Rob Braxman MITM Approach
The intent to scan content to counter end-to-end encryption is no longer theoretical with the passing of the UK Online Safety Bill. How would the OS makers then build in client-side scanning?
How Does GPS Actually Work on Your Phone?
Questions like "Can you disable the GPS chip?", "Can I stop it from transmitting my location to the satellite?" show a misunderstanding of the technology.
Here I explain the actual technology and point to where the actual privacy risk
What is this BraX2 Privacy phone that is invisible to Big Tech?
Explained in this Live Stream. This is the only way to evade the evils of a normie phone.
@elonmusk
@IFNY2775
@micsolana
Legit question here. Does the Tesla send real time location information to Tesla HQ? I would like a straight and honest answer on this. This is important.
I was just explaining the dangers of this in a recent video and lo and behold, the legislation passed in the UK. So we are all zucked. Here comes the end of End-to-End encryption for the normies!
What is Google up to? Google is changing how 3rd party trackers work
Google wants to stop the ability to do Browser Fingerprinting because they can't control it. They've tried to come up with alternatives to appease the advertising community.
A couple of years ago we heard of
Why You Can't Remove Google from a Google Android
I got asked the question several times about what files can be removed on an Android so that Google spyware is disabled. The answer is that it is impossible to do that. But WHY is that? This video will explain the construction of
China 🇨🇳
The Chinese authorities have remotely switched these people’s Covid digital QR passport to yellow or red to stop them from leaving Guangzhou. They are now stuck in Guangzhou and unable to travel home.
Welcome to tech totalitarianism.
How to Stop Santa (Big Tech) from Putting You On the Naughty List
Do you want some big tech company to have the ability to put you in a naughty or nice list like they were Santa Claus? I will teach you how to zuck them up.
In light of the Twitter Files showing manipulation by Twitter employees, here's something that proves a similar manipulation at Google which I published last year. This video has been heavily suppressed.
How You Are Spied On (Surveillance Devices)
Around the world, regular tradeshows sell surveillance equipment to both corporate and government buyers. What are they selling? What tools are being used to spy on people? This is an unrestricted market and this tech can be bought by
Whoa! I used Biometric Login with Google???
Did I sell out? I actually started using a biometric login with Google. Intuitively for those who are privacy conscious this sounds like a big no-no. But let me explain how this move is actually to increase my privacy.
Easy. Consider mandating that those who fear getting an infection SHOULD WEAR A MASK. The rest of us should be LEFT ALONE. That is what LA County needs to mandate.
L.A. County is considering another indoor mask mandate.
The decision will be made by Dr. Barbara Ferrer, an unelected, non-medical doctor who previously banned outdoor dining without showing any data/science to support it, then ordered TVs be shut off at businesses on top of it.
Apple announced the new "Sensitive Content Warning" for nude images. In actuality this is just part of the implementation of AI used in surveillance, a raising of the stakes, to beat end-to-end encryption.
Hear the cries from governments about how automated content scanning is
Cybersecurity is when you send a message and it is end-to-end encrypted. Privacy is when you can't tell tell that a message was even sent. Do you get this difference?
What's Happening with Skynet? (A Follow Up on Mesh Networks)
This is a followup on Skynet technology which in the original video talked about mesh networks. Mesh networks are peer to peer networks requiring no centralized communications.
Assange & I were charged under a law designed to prevent fair trials—a law originally aimed at suppressing an old anti-war movement. Defendants are forbidden from mounting a public interest defense, juries prohibited from hearing it.
Whatever your politics, that's an injustice
“HELLO TWITTER CONTACTS”: The master-canine quality of the FBI’s relationship to Twitter comes through in this November 2022 email, in which “FBI San Francisco is notifying you” it wants action on four accounts:
How Hard is It to Hack a Phone? Well, there are Obstacles...
Let me explain the main obstacles to hacking a phone. These are the main protections built in to all mobile phones running iOS and Android. If you take certain precautions, it will be quite difficult to hack and
THIS IS HOW ZUCK IS ZUCKING YOU
And you want to go to Threads? Meta is truly a zucked up enterprise and is out there to eliminate your privacy.
This video shows you in Zuck's own words how they harvest data EVEN IF YOU ARE NOT A META USER.
@session_app
I will make a video supporting Session. Of the hardcore secure messengers, this hits me as the only app that actually understands the problem well.
The
#YubiKey
from
@Yubico
is the Swiss army knife of internet security. Without physical access to your YubiKey, hackers cannot access your accounts. Go to to learn more and use ROB10 to save $10 on a YubiKey 5 Series key!
#ad
#YubiSafe
Geofencing Warrants: How Big Tech abuses our location data. Governments doing questionable warrants that are violations of the 4th Amendment (unreasonable search and seizure)
While it is distressing to see congress approve
#FISA702
, are we missing the fact that digital warrantless surveillance happens without FISA? Things like geofencing for example that's been used in so many legal cases, including Jan 6.
Liars! Why can't we have UNTAINTED information everywhere? Instead everything you see is manipulated! Twitter is nothing compared to Google and Facebook.
Why RSA Cryptography is Important to Understand
This major technology is now being used for passwordless logins but people don't completely understand how it works. Believe it or not, this is the way biometric based logins are implemented.
My account is now unsuspended but it appears like I lost many followers from this. Reason given: account incorrectly classified by automated systems as a spam account.
24/7 Location tracking via Wifi scanning
Client Side scanning of content
Tracking even when the Phone is off (Airtag mode)
Guaranteed Identity with Apple ID
In the past, Verification included some privacy invading checks that I abhor so I abstained. Currently, you can have Twitter Blue only if you have iOS. I don't use iOS! Absent these rules, I'll do blue.
For those who are all about politics and saying that you should boycott
#tesla
because of
@elonmusk
, just understand that you are actually promoting Tesla to other side! LOL.
@elonmusk
@tesla
Please pay attention to this message. You must ensure that Teslas respect our privacy and not let it become part of the surveillance state. You of all people should understand the importance of this. And customers need to have this trust.