1. How does Encryption Break work - BREAKING Encryption-Breaking

    How does Encryption Break work - BREAKING Encryption-Breaking

    48
    1
  2. The NSA Secret Police monitors every keystroke of yours - 100%. How would you stop that?

    The NSA Secret Police monitors every keystroke of yours - 100%. How would you stop that?

    109
  3. you dunno what you've been experiencing all your life, you silly head

    you dunno what you've been experiencing all your life, you silly head

    91
  4. Controling Social Media (Backwards-Filter-Streaming)

    Controling Social Media (Backwards-Filter-Streaming)

    87
  5. E2E Encryption Comparison: Digits Container vs. Strings Container

    E2E Encryption Comparison: Digits Container vs. Strings Container

    70
  6. Random-Strings-Container E2E Encryption proven to be unbroken - for the 1st time

    Random-Strings-Container E2E Encryption proven to be unbroken - for the 1st time

    129
  7. Internet's Primary Problem - it's probably not what you think it is

    Internet's Primary Problem - it's probably not what you think it is

    76
  8. JFK Peace Speech 2 - CONTROLLING Social Media DIRECTLY

    JFK Peace Speech 2 - CONTROLLING Social Media DIRECTLY

    144
  9. BRICS Blockchain Approach vs. BITcoin Scalability Catastrophe

    BRICS Blockchain Approach vs. BITcoin Scalability Catastrophe

    81
  10. Internet Last Amendment vs. Constitution First Amendment

    Internet Last Amendment vs. Constitution First Amendment

    67
  11. RFK Jr. independent? (or like Howard Dean 20 years earlier)

    RFK Jr. independent? (or like Howard Dean 20 years earlier)

    181
  12. Secure Social Media Part 2 - via Memory Pools of Amazon, COSTCO, etc.

    Secure Social Media Part 2 - via Memory Pools of Amazon, COSTCO, etc.

    35
  13. Kissinger: What is more important - Ukraine vs. Russia OR Israel vs. Gaza

    Kissinger: What is more important - Ukraine vs. Russia OR Israel vs. Gaza

    49