2 years agoUse of De-googled Phones is based on Paranoia from Self-Importance? Rant TimeRob Braxman TechVerified
2 months agoTiktok a Threat to National Security? Let's Follow the Science. "Data Science".Rob Braxman TechVerified
1 year agoFULL SHOW Lisbon Bilderberg Dark Enlightenment, Ukraine horrors; Khmelnytsky Radiation cloud coverupTonyGosling
2 months agoHow Know-Your-Customer (KYC) Requirements are Used for SurveillanceRob Braxman TechVerified
1 year agoDEEPLY FLAWED Public Key Infrastructure (PKI) is Supposed to Secure the Internet + QARob Braxman TechVerified
19 days agoCan Phone Production Be in the USA? An Inside Look at the Phone Industry and the Effects of TariffsRob Braxman TechVerified
1 year agoAre you Still using Microsoft Office? Time to Move On. An Alternative.Rob Braxman TechVerified
1 year agoWhy Use Virtual Machines for Privacy and Security? Not Obvious! Top 6 List!Rob Braxman TechVerified
5 months agoRed Hat Enterprise Linux 9.5 overview | security functionality and performance for IT environmentsribalinux
4 months agoYour New AI Companion (on Copilot, Iphone 16) Will Be Your Personal PsyOp and Surveillance BotRob Braxman TechVerified
3 months agoAI Assistants or Companions (Agents) are Bad! Well, Maybe Not All...Rob Braxman TechVerified
6 months agoYour Data Will Leak from Online Sites If You Don't Understand THISRob Braxman TechVerified