THE NPC vs Big Tech, the State, the Spy, and the Puppetmasters

January 3rd, 2023 An NPC is a gaming term which means non-playable character. It means a character that is run by the machine with no control by the user. This is what the average person has really become. We have been enslaved by a surveillance technology controlled by Big Tech, the 3-Letter agencies, the clandestineContinue reading “THE NPC vs Big Tech, the State, the Spy, and the Puppetmasters”

Google Home speakers allowed hackers to snoop on conversations

By  Bill Toulas A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it remotely and to turn it into a snooping device by accessing the microphone feed. Researcher Matt Kunze discovered the issue and received $107,500 for responsibly reporting it to Google last year. Earlier thisContinue reading “Google Home speakers allowed hackers to snoop on conversations”

Is there a Backdoor on our Phones? An Analysis of the Supply Chain

8 nov 2022 The supply chain for phones is fraught with risk. However the typical person has no understanding of where the threats might come from. It is easy to attribute backdoor activity to certain countries for example. Where is the real threat and is it really a significant one? A viewer commented that heContinue reading “Is there a Backdoor on our Phones? An Analysis of the Supply Chain”

Millions of Americans Were Assigned ‘COVID-19 Violation’ Scores Based on Cellphone Data Collected During Lockdowns

10/26/22 A voter analytics firm harvested data from millions of Americans’ cellphones during the 2020 COVID-19 lockdowns and used the data to assign phone users a “COVID-19 decree violation” score and a “COVID-19 concern” score, according to a whitepaper released by PredictWise, the firm that harvested the data. By  Michael Nevradakis, Ph.D. Miss a day,Continue reading “Millions of Americans Were Assigned ‘COVID-19 Violation’ Scores Based on Cellphone Data Collected During Lockdowns”

How you can REALLY hide your web searches from Google snoopers: Tech experts reveal using a VPN, a Navy-developed browser or encryption key can shield internet history – as lawsuit claims ‘incognito mode’ is ‘not truly private’

By ALEX OLIVEIRA FOR DAILYMAIL.COM PUBLISHED: 23:34 EDT, 18 October 2022 | UPDATED: 02:22 EDT, 19 October 2022 View comments Many assume using Google’s ‘incognito mode’ means all their internet searches will be safe from prying eyes. But newly-emerged emails from the tech giant appear to reveal engineers have access to them – and joke about some of the content. Now,Continue reading “How you can REALLY hide your web searches from Google snoopers: Tech experts reveal using a VPN, a Navy-developed browser or encryption key can shield internet history – as lawsuit claims ‘incognito mode’ is ‘not truly private’”

The CCP Is Using TikTok to Manipulate Americans and Gather Data for AI Weapons

20 oct 2022 AMERICAN THOUGHT LEADERS JAN JEKIELEK TikTok is one of the Chinese regime’s most powerful weapons of mass manipulation and misinformation, argues Nicolas Chaillan, former chief software officer of the U.S. Air Force and Space Force. TikTok was the most downloaded app globally and in the United States in 2021. The Chinese regimeContinue reading “The CCP Is Using TikTok to Manipulate Americans and Gather Data for AI Weapons”

Law enforcement is spying on America via “smart” utility systems that surreptitiously share data without your consent

Monday, October 10, 2022 by: Ethan Huff This article may contain statements that reflect the opinion of the author Bypass censorship by sharing this link: Copy URL 11KVIEWS (Natural News) The Sacramento Municipal Utility District (SMUD) in California is capturing people’s private utility data and handing it over to local law enforcement without a warrant orContinue reading “Law enforcement is spying on America via “smart” utility systems that surreptitiously share data without your consent”

Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data

The “Augury” platform includes highly sensitive network data that Team Cymru, a private company, is selling to the military. “It’s everything. There’s nothing else to capture except the smell of electricity,” one cybersecurity expert said. By Joseph Cox September 21, 2022, Hacking. Disinformation. Surveillance. CYBER is Motherboard’s podcast and reporting on the dark underbelly of theContinue reading “Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data”

Your phone is spying on you!

25 sept 2022 Trying to be more private and secure on your phone. ABOVE PHONE: BRAX PHONE: Anonymous eSIM Get global mobile 4G/5G Internet access and burner phone numbers instantly and privately on any modern eSIM-compatible smartphone. pay with bitcoin or lightning https://silent.link/#generic_price_table Your Mobile is Leaking Location! A-GPS, SUPL, NLP to Google (and Apple) – Cybersecurity VOLTAContinue reading “Your phone is spying on you!”

How to avoid big tech (privacy)?

9 june 2022 (updated 28 jan 2023) Apple, Microsoft, Amazon, Meta and Google are known to be systems that spy on people, keep all the information and even sell it for profit without their users’ knowledge. In addition, many are talking about the implementation of a social credit system that these people will use toContinue reading “How to avoid big tech (privacy)?”

A useful reminder of China’s true nature

Parliamentary authorities urgently need to explain how a Chinese spy infiltrated Westminster Telegraph View 13 January 2022 Before yesterday, it was hard to imagine Westminster gripped by any topic bar the fate of the Prime Minister. Then came the revelation that Parliament had been infiltrated by a Chinese spy, Christine Lee, who has channelled hundredsContinue reading “A useful reminder of China’s true nature”

The New York Times uncovered that Apple is involved in large-scale surveillance and censorship at the behest of China

May 17, 2021 It is sad, but not surprising: big tech companies often choose profits over freedoms. Apple is very efficient at pursuing their business model, which is based on selling overpriced, obsolete hardware to customers locked in their ecosystem. Every time I have to use an iPhone to test our iOS app I feelContinue reading “The New York Times uncovered that Apple is involved in large-scale surveillance and censorship at the behest of China”