3 days agoHow Know-Your-Customer (KYC) Requirements are Used for SurveillanceRob Braxman TechVerified
17 days agoTiktok a Threat to National Security? Let's Follow the Science. "Data Science".Rob Braxman TechVerified
5 months agoDirected Energy Weapons And Pulverized Cloud Powder Vs Excess Rubble 9/11VeteransAgainstTreason
24 days agoAI Assistants or Companions (Agents) are Bad! Well, Maybe Not All...Rob Braxman TechVerified
2 months agoHere's a Practical Email Plan that has Nothing to Do With Email EncryptionRob Braxman TechVerified
3 months agoIf You're Not Red-pilled, You Don't Need a Privacy Phone (We'll Keep it to Ourselves)Rob Braxman TechVerified
2 months agoYour New AI Companion (on Copilot, Iphone 16) Will Be Your Personal PsyOp and Surveillance BotRob Braxman TechVerified
4 months agoNon-Caveman Alternatives to iPhones and Google Androids! Find Safe Phones that don't Track YouRob Braxman TechVerified
4 months agoYour Data Will Leak from Online Sites If You Don't Understand THISRob Braxman TechVerified
4 months agoWhich Device AI Spies on You the Most: Microsoft, Apple or Google? NOT Who You ThinkRob Braxman TechVerified
4 months agoFEMA Land Grab? Mineral Rights Theft, Weather Mod Project Popeye, NC LithiumWE ARE THE NEWS (WATN)Verified
10 months agoWhy Use Virtual Machines for Privacy and Security? Not Obvious! Top 6 List!Rob Braxman TechVerified