
💡 New Tech
56 videos
Updated 3 months ago
⚠️ WARNING: Viewing this Playlist can cause serious stress to the minds of cognitive dissonant Wokies that are afflicted with the Woke Mind Virus. 👉 Bottom line ... facts don't care about feelings ... get a helmet (AKA:Critical Thinking Cap). 👉 The videos contained in this playlist are chosen to be nothing more than a reflection of the current Worldwide Discourse. 👉 The sources are from a variety of individual contributors, some of which, I'll admit, can be assholes at times. 👉 I prefer to drop the identity politics and focus on the message content, rather than the messenger. 👉 Some things I agree with ... Some things I don't. 👉 Some things I condone ... Some things I don't. 👉 At the end of the day ... It's just what's being said. 👉 You be the Judge.
-
NEVER USE A FREE VPN! | How a VPN works and why you need it. But not a free one. #VPN
Timothy Shoemaker LiveVPN's are necessary if you're online, but you can't use a free one, unless you're super cool with your online activity being shared and sold to others. Find out why and how you can use one safely.11 views -
My Life is None of Your Business! Leave Me Alone!
Rob Braxman TechA rant. The most irritating thing for those of us who are privacy conscious are comments like "what are you hiding?" or "as long as you follow the law who cares?" or "you're paranoid". I'm sure I'm not alone on this. Well, if you get irritated by this, then there is nothing wrong with you. Ignore these NPCs but you also need a smart understanding of why you do need to care and why these NPCs are the ones who are wrong. ----------------------------------- De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on https://brax.me. Sign in to the platform to see the store. You will not be asked for personal information to sign up. ----------------------------------- Merch Store https://my-store-c37a50.creator-spring.com/ ----------------------------------- I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email. I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator. Support this channel on Patreon! https://www.patreon.com/user?u=17858353 Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform) https://brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise https://bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing https://whatthezuck.net Cybersecurity Reference https://brax.me Privacy Focused Social Media - Open Source Please follow me on Odysee https://odysee.com/$/invite/@RobBraxmanTech:6 Rumble https://rumble.com/c/robbraxman7.2K views 64 comments -
The Silent Revolution of AI: iOS 18 as the Next Frontier of Human Dependency
FragmentsOfTruthIn the rapidly advancing world of technology, we are not merely consumers—we are participants in an experiment. The release of Apple’s iOS 18 heralds an era where AI merges seamlessly with our daily lives, but at what cost? This isn’t just about privacy or convenience; it’s about control, sovereignty, and the very nature of what it means to be human. Behind the glossy marketing campaigns, the promises of hyper-personalization, and the allure of seamless integration lies a deeper, more profound question: Are we creating tools to serve us, or are we becoming tools to serve the system? The True Purpose of iOS 18: A Shift in Power Dynamics At first glance, iOS 18’s features appear benign, even revolutionary. Advanced AI integration enables Siri to: • Analyze your eye movements and emotional states. • Predict your behaviors and social interactions. • Process and interpret your personal data—texts, photos, locations—in real time. But let’s break free from the narrative Apple presents. These are not simply features designed to make your life easier; they represent a paradigm shift in how corporations and governing entities exert influence over individuals. 1. Data as the New Currency of Control Your data is not just a byproduct of your interactions; it’s the raw material for a system designed to predict and manipulate human behavior. Every eye movement tracked, every location analyzed, every contact interpreted feeds into a machine that knows more about you than you know about yourself. • Why does this matter? Because data is power. The entity that holds your data holds the blueprint of your decision-making process, your desires, and even your vulnerabilities. 2. Predictive Programming or Manipulation? When Siri predicts your next move or suggests a behavior, it’s not magic—it’s algorithmic conditioning. The more you rely on these “assistive” features, the more your decisions align with patterns dictated by the AI. Over time, this shapes your habits, thoughts, and even beliefs, subtly aligning them with the interests of those who control the technology. The Historical Context: This Is Not New The use of technology to exert control is not a novel concept; it’s simply evolving. Let’s examine how history provides a blueprint for what’s happening today. 1. The Industrial Revolution: Labor as Control During the Industrial Revolution, machinery promised to liberate humanity from arduous labor. Instead, it centralized power, creating systems of dependency on factories, corporations, and wage labor. The promise of freedom became a mechanism for control. 2. The Surveillance State: Information as Control Post-9/11, surveillance technologies were introduced under the guise of national security. Governments and corporations gained unprecedented access to personal data, turning citizens into subjects of constant monitoring. iOS 18 represents the next iteration: not just surveillance, but predictive influence. It’s no longer about watching your behavior—it’s about shaping it. The Philosophical Implications: Are We Losing Sovereignty? 1. The Erosion of Free Will If your phone knows what you’ll do before you do, are you truly free? The integration of AI into our decision-making processes erodes the very concept of free will. Choices become illusions when they are preemptively guided by an unseen hand. 2. The Dissolution of Boundaries The lines between self and system are blurring. When your phone becomes an extension of your mind—interpreting your thoughts, guiding your actions—where do you end and the AI begin? This raises profound questions about identity, autonomy, and the nature of consciousness. 3. The AI Panopticon Jeremy Bentham’s concept of the Panopticon—a prison where inmates are constantly visible to an unseen observer—has become a metaphor for modern surveillance. iOS 18 takes it a step further: it’s not just about being watched; it’s about being known. In this AI-driven Panopticon, the observer doesn’t just see your actions—it understands your intentions. Alternative Perspectives: What They’re Not Telling You 1. The Commodification of Human Experience iOS 18 reduces the richness of human experience to data points—eye movements, text patterns, location histories. This commodification transforms your life into a product, sold to the highest bidder in the name of “personalization.” 2. The Spiritual Dimension From an esoteric perspective, the integration of AI into human consciousness raises concerns about the fragmentation of the soul. By outsourcing decision-making to algorithms, are we disconnecting from our higher selves? Are we trading intuition and inner wisdom for algorithmic efficiency? 3. The Endgame: Control Over Resources Let’s step back and look at the broader implications. The same corporations advocating for AI-driven convenience are also lobbying for control over essential resources—water, carbon, even air quality. The ultimate goal is not just control over your data but control over your existence. How to Reclaim Sovereignty In a world increasingly dominated by AI, the path to freedom lies in intentional resistance. 1. Reconnect with Your Inner Compass Technology should enhance your intuition, not replace it. Practice mindfulness to distinguish between your true desires and those influenced by external forces. 2. Limit Dependency Evaluate how much of your daily life is mediated by technology. Set boundaries—use your phone as a tool, not a crutch. 3. Advocate for Ethical AI Demand transparency and accountability from tech companies. Support movements that prioritize ethical AI development and challenge monopolistic control over data. 4. Cultivate Analog Spaces Reclaim parts of your life from the digital realm. Spend time in nature, engage in face-to-face conversations, and create spaces free from technological intrusion. Conclusion: The Battle for Humanity’s Future iOS 18 is more than just an operating system—it’s a microcosm of the broader struggle for control in the digital age. While the technology promises convenience and efficiency, it also poses existential questions about freedom, identity, and the human spirit. As we stand at this crossroads, we must decide: Will we allow ourselves to be shaped by the tools we create, or will we reclaim our sovereignty and shape the future ourselves? The answer lies not in the technology, but in how we choose to wield it. Let us choose wisely.227 views 1 comment -
GREAT BALLS OF FIRE! The Hezbollah Pager Incident
BearingGREAT BALLS OF FIRE! The Hezbollah Pager Incident. Pagers have been exploding and severely injuring (and worse) members of Hezbollah in Beirut and wider Lebanon. The devices - including pagers and walkie talkies - were allegedly wired with explosives by Israeli special forces and supplied to Hezbollah who utilize the old technology to avoid Israeli surveillance. The memes just keep flowing, and we’re here for them. Regards, 🐻 Visit SugarTits https://www.youtube.com/@SugarTits U.S. officials report that Israel planted explosives in Hezbollah pagers | NBC https://youtu.be/iI10ejW07Rc?si=dLFh6m4aN0sYCKJV BREAKING! WATCH Hassan Nasrallah's first reaction to the "pager attack" that struck thousands of Hezbollah fighters yesterday. | Canary Mission https://x.com/canarymission/status/1836414424720249213 ◇◇◇ Bearing @ BitChute https://bit.ly/2H2XisV Bearing @ Odysee https://bit.ly/3iWRX3w Bearing @ Parler https://bit.ly/3jWJT3T Bearing @ Minds https://bit.ly/2GPdPB0 Support @ SubscribeStar https://bit.ly/3dq4T0B Support @ Patreon https://bit.ly/2GUtTRS Support @ PayPal https://bit.ly/374tCXm Bearing Merch https://bit.ly/2SSJST2 Bearing's music @ Bandcamp https://bit.ly/2t6Xrkl Bearing's music @ Spotify https://spoti.fi/2JTK01y ◇◇◇ Fair use. This video may contain copyrighted material; the use of which has been for the purposes of criticism, comment, review and news reporting which constitutes 'fair use' under section 107 of the US Copyright Law. Not withstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work for purposes such as criticism, comment, review and news reporting is not an infringement of copyright. ◇◇◇ Background music by DJ Quads https://bit.ly/2puAo2F Outro music by No Credit https://bit.ly/2JEatRB Enquiries bearing.australia[at]gmail.com3.77K views 31 comments -
MeshTastic - Off-Grid Encrypted Text Based Communications
TwitterSnaps👉 MeshTastic Website https://meshtastic.org/ 👉 Beginners Guide https://meshtastic.letstalkthis.com/ 👉 Github https://github.com/meshtastic73 views -
Massive Espionage: Beijing Hijacked U.S. Telecom Networks targeting millions including Trump, Harris
Conspiracy ChronicleThe political establishment is reeling from a major security breach in the telecommunications industry, allegedly orchestrated by a hacking group with ties to the Chinese Communist Party (CCP). Sen. Mark R. Warner (D-Va.), chair of the Senate Intelligence Committee, has accused the group, identified as "Salt Typhoon," of carrying out what he described as "the worst telecom hack in our nation's history." The compromised data, intended for U.S. law enforcement use, reportedly ended up in the hands of officials in Beijing. Salt Typhoon is said to have exploited vulnerabilities in telecom network "trust" connections, gaining access to cables that allowed them to intercept live audio calls. While fewer than 150 individuals—mostly in the nation's capital—were directly impacted by the breach, it is believed that millions had their call and text records accessed. This information could potentially be used for targeted surveillance of Americans. The hackers reportedly targeted prominent figures, including former President Donald Trump, Vice President-elect J.D. Vance, and members of Kamala Harris's campaign, among others. The telecom industry has been aware of the breach since at least September, when it began alerting the government to the illicit activity. According to Warner, the scale and severity of the attack surpass high-profile incidents like the Colonial Pipeline and SolarWinds hacks, and the hackers remain active. U.S. officials have characterized the breach as an espionage operation rather than a precursor to infrastructure sabotage, though its true intent remains unclear. The hackers allegedly infiltrated a government system that archives criminal wiretap requests but did not compromise the actual wiretapping mechanism itself. Washington views its wiretapping systems as "lawful intercept" tools but has expressed outrage at their use by foreign actors. The breach included unencrypted communications, such as text messages, though encrypted platforms like Signal reportedly remain secure. The Biden administration has released little information about the breach. A joint statement from the FBI and CISA confirmed the perpetrators' identification. Impacted telecom companies include AT&T, T-Mobile, and Verizon. Sen. Warner described the attack as part of a broader Chinese effort to infiltrate global telecom systems to exfiltrate vast amounts of data. Beijing has denied any involvement, claiming the attack was not the work of Chinese state actors. While the intrusion was not election-related and occurred well before Election Day, it highlights ongoing vulnerabilities in critical U.S. infrastructure and raises alarms about foreign cyber espionage capabilities.65 views -
Secret Service Robot Dogs Protect Mar-a-Lago
B.C. BegleyNew video from Mar-a-Lago shows robotic “dog” patrols monitoring the area to protect President-elect Donald Trump. The robot dogs, equipped with surveillance tech and sensors, are part of the Secret Service’s security assets, alongside armed boat patrols. The robots are operated remotely, like drones, and are used to enhance safety measures, TMZ has reported. read more: https://www.tmz.com/2024/11/08/secret-service-robot-dog-mar-a-lago-donald-trump-victory/ Links for B.C. Visit My Website https://bcbegley.com Follow Me On Facebook https://www.facebook.com/B.C.Begley Subscribe To My Patreon https://www.patreon.com/bcbegley Watch Me On YouTube https://www.youtube.com/channel/UCGoUf-QQTlTN-BIh3ERCE9A Follow Me On Twitter https://twitter.com/BC_News1 Watch Me On Rumble https://rumble.com/c/c-280191 Follow Me On Gab https://gab.com/BC_Begley Follow Me On Truth Social https://truthsocial.com/@BC_Begley #SecretService #RobotDog #Trump109 views -
End-to-End Encryption (E2E) is Dead - Rob Braxman (NPU Neural Processing Unit) A.I. For All OS's
Free Your Mind Videos----------------------------------------------------------------------------------------------------------------------------------- Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Also for entertainment and educational purposes. All rights to the original works go to those that hold them, no copyright infringement intended. All material used falls under fair use of the Digital Millennium Copyright Act (1998) for commentary, criticism, education and satire. ----------------------------------------------------------------------------------------------------------------------------------- . Description/Info Box: --------------------- . Title: End-to-End Encryption (E2E) is Dead - Rob Braxman (NPU Neural Processing Unit) A.I. For All OS's . WE can see what they Plan, and They have already Started. Know Your Enemy, The sneaky tech companies take the next step in complete surveillance of your devices and privacy. NEW NPU Micro CHIPS: Neural Processing Units for all New Computer Operating Systems, Built In. . Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be invented as approaches using apps from Signal, Whatsapp, Telegram and others will no longer provide this safety. This is something the 3-Letter agencies have wanted for many years. And they have gotten their way. . Original video source: https://www.youtube.com/watch?v=c52pKpYeZ74 . . . ----------------------------------------------------------------------------------------------------------------------------------- . . Source: "Wade-X" https://old.bitchute.com/video/VaWUbfzlcGpY/ . . ----------------------------------------------------------------------------------------------------------------------------------- . . This channel is not paid by any third party to promote anything You can always donate to me or my channel. All help is very much appreciated. https://paypal.me/kbenweg Or you can give a cup of coffee/sandwich to someone in need... (This would bring me even more joy) . Thank you for watching, God bless, and I love you all!!! 🙏 . . ----------------------------------------------------------------------------------------------------------------------------------- . . Subscribe to other channels: . Free Your Mind Videos https://rumble.com/c/FYMVideos Only if Rumble is down (or deletes) videos, those will be posted on the Backup Channels! Backup Channel on Odysee: https://odysee.com/@Tim:ab74 Backup Channel on Bitchute: https://www.bitchute.com/channel/ThkAWbd3XR2T/ . Christian Teachings And Documentaries https://rumble.com/c/c-1328393 . Sound The Trumpet Ministries: https://rumble.com/c/c-1123613 . Praise & Worship Music: https://rumble.com/c/c-3348236 . Telegram Channel: "Blocked & Banned" https://t.me/BlockedAndBanned => Group chat added where everyone can comment! https://t.me/BlockedAndBanned1 . . ----------------------------------------------------------------------------------------------------------------------------------- . NOTE: These are not necessarily the beliefs of the uploader. Discernment is required to see the Truth in all of it. Jesus is the Way, the Truth and the Life. Jesus Christ is the Light that came into the world. There is NO other name by which you can be saved! Repent, be baptized and Born Again! . COMMENT ✅ THUMBSUP 👍🏻 SUBSCRIBE ⚠️ AND BE NOTIFIED 🙋🏼 . COMMENT POLICY: Thanks for watching 👍 Please keep comments on topic and value-add. Comments, where it is obvious the person did not watch the video, will be deleted. Comments containing arrested-developed behavior (nastiness, belligerence, stupidity, trolling, spam, links, etc.) will also be deleted (without notice) and banned from the channel. No self-promotion/advertising! . If my posts ruffled your feathers. Don't be a chicken! Take it before God and make the changes you need to better your life. God bless you 🙏 . Making tantrums about why you're unsubscribing: If i notice your cry for help i will do anything possible (mute/block/ban) To make sure you don't get back here by mistake, for your safety. Opposing views will be posted and feelings will get hurt. So this channel is NOT a safe space for you!! Hope you find better pasture somewhere else . -----------------------------------------------------------------------------------------------------------------------------------2.49K views 2 comments -
Meshtastic License Free Off-Grid Comms MADE EASY!
Ham Radio 2.0Meshtastic is a great way to use a license-free communications system via text messaging. It uses LoRa, which is a long-range radio system, to communicate. I've had a few of these devices for a while and I am getting them setup to take to Dayton Hamvention next week. In this video I show how to flash 2 different models of units and how they work together. This video is sponsored by LDG Electronics - save 20% off of everything from LDG at the Dayton Hamvention of 2024. Stop by the Gigaparts booth to see their full line of products. Complete list of Meshtastic Devices - https://amzn.to/3yheoxP Lewis' video - https://www.youtube.com/watch?v=N3FXej9fqIk&t=517s&ab_channel=RingwayManchester Josh's video - https://www.youtube.com/watch?v=DumgHz56IjI&t=321s&ab_channel=HamRadioCrashCourse ★★★Support This Channel and Help Spread the Word about Ham Radio★★★ 👉Email List sign-up - http://hamradio2.com/email-signup 👉Text Messaging sign-up http://hamradio2.com/textme 👉Shop Our Sponsors and Coupons: https://www.livefromthehamshack.tv/affiliates-and-deals/ ✅PATREON: http://hr2.li/7xziu ✅Shop our Products: http://www.shop.hamradio2.com ✅Shop our Amazon Store: https://www.amazon.com/shop/hamradio2.0 Commissions can be earned on Affiliate Links 📻 Shop Our Sponsors 📻 R&L Electronics - https://www.randl.com Buy Two Way Radios - http://hr2.li/7q211 ⚡Bridgecom Systems - http://hr2.li/qpfgp 🧰 Save 20% off of everything at https://hamradioprep.com with the code JASON20 FlexRadio - https://flexradio.com BaofengTech - https://baofengtech.com ----------------------------------------------------------------------------- Mail: 2150 W. Northwest Highway STE114-1163, Grapevine TX 76051 Thanks for watching! #Hamradio #kc5hwb #meshtastic637 views 2 comments -
MAJOR TECH COMPANIES SET EYES ON DIGITAL ID
The HighWire with Del BigtreeAIRDATE: September 26, 202418.8K views 33 comments