2 years agoUse of De-googled Phones is based on Paranoia from Self-Importance? Rant TimeRob Braxman TechVerified
3 months agoTiktok a Threat to National Security? Let's Follow the Science. "Data Science".Rob Braxman TechVerified
1 year agoFULL SHOW Lisbon Bilderberg Dark Enlightenment, Ukraine horrors; Khmelnytsky Radiation cloud coverupTonyGosling
10 hours agoCan You Trust Wikipedia? The Now De-Facto Source of Online IntelligenceRob Braxman TechVerified
5 months agoRed Hat Enterprise Linux 9.5 overview | security functionality and performance for IT environmentsribalinux
7 months agoDirected Energy Weapons And Pulverized Cloud Powder Vs Excess Rubble 9/11VeteransAgainstTreason
14 days agoCorporate Surveillance Players That Sell Your Data to Police and Private PartiesRob Braxman TechVerified
2 months agoHow Know-Your-Customer (KYC) Requirements are Used for SurveillanceRob Braxman TechVerified
1 month agoCan Phone Production Be in the USA? An Inside Look at the Phone Industry and the Effects of TariffsRob Braxman TechVerified
1 year agoDEEPLY FLAWED Public Key Infrastructure (PKI) is Supposed to Secure the Internet + QARob Braxman TechVerified
4 months agoHere's a Practical Email Plan that has Nothing to Do With Email EncryptionRob Braxman TechVerified
2 years agoBraX2 Privacy Phone Q&A - Please ask all your questions about this phoneRob Braxman TechVerified
5 months agoYour New AI Companion (on Copilot, Iphone 16) Will Be Your Personal PsyOp and Surveillance BotRob Braxman TechVerified
3 months agoAI Assistants or Companions (Agents) are Bad! Well, Maybe Not All...Rob Braxman TechVerified
1 year agoWhy Use Virtual Machines for Privacy and Security? Not Obvious! Top 6 List!Rob Braxman TechVerified