White House Ways of Securing Phones

3 days ago
5

White House has "super-secure phones". Bittium Tough Mobile 2C (hardened OS and dedicated encryption chip), the Purism Librem 5, separate tower in front of the Internet, etc. All of them compared to the one used in the LIVE E2E Encryption of paragraph exchanged.

Since the second half of 2024, we actually publish BOTH the Original text and its Encryption just before the Clickable Links on every video, so you can Copy/Paste it and play with it. Here it is for this video:

Message:

All of the commercial smartphones available today are designed around monetizing information about their users, even the phones with NIAP certifications. It is not only applications like Facebook that collect user data. The operating systems in commercial smartphones send user data, location, call and SMS information back to servers at Google, Apple, the [other] Phone Manufacturer - and even 3rd party advertising affiliates.

SENDING TO Trump's Archive:

I ,J ,C ,O ,X ,S ,k ,R ,T ,E ,j ,O ,T ,T, $, -, -, h, 3, 4, U, :, 2, 5, L, 8, /, >, 8, L, >, 9, ), ', 4, g, :, -, D, 6, V, <, *, 9, ,, $, Y, D, $, >, 0, ?, :, ., F, ?, <, D, X, =, (, !, a, E, ), <, E, M, F, D, :, H, >, 4, 6, L, W, *, Z, :, [, 5, J, D, @, =, 3, 4, J, Q, C, +, D, N, \, 2, M, M, 8, 7, T, 7, 9, ?, ?, ?, I, 6, *, T, >, J, M, A, <, ', L, :, d, ?, @, ., 4, 1, u, j, E, 8, 6, V, Z, 4, 5, 9, Y, ., G, P, <, 7, =, D, ?, 0, J, >, W, M, ;, !, 0, E, ', /, R, G, <, &, +, &, *, B, (, :, 7, <, i, h, <, ?, D, /, =, Z, 4, ;, 9, Q, ?, 4, ?, 7, I, ., F, 7, Q, /, C, 1, ;, L, 4, ., >, F, Q, 7, ), 5, G, ;, G, 5, <, 5, 1, F, S, G, D, 3, E, 7, C, 6, 8, 8, 0, ;, 2, D, k, 3, >, 9, D, f, ;, , E, ", ^, I, I, *, F, [, 5, 1, $, S, *, J, <, 0, 8, H, 8, >, W, 8, J, /, :, Q, ,, <, I, (, 5, >, @, :, 1, J, 6, !, ?, I, J, /, F, >, \, :, <, /, >, 8, 6, [, 4, 7, -, 8, l, G, 3, %, S, X, ,, *, 2, 5, u, k, B, C, ,, 0, G, ', 5, E, R, D, 5, 8, L, 9, C, 0, 2, 3, [, Z, 4, :, S, :, ., ., 3, @, D, !, I, <, R, 5, E, &, C, $, 9, Z, =, C, W, Y, (, W, 8, ,, 0, ;, V, %, I, i, L, E, >, I, 0, -, r, R, 0, F, 7, -, <, x, k, 5, G, 0, T, , J, >, +, C, , V, :, H, 7, =, I, E, 2, *, 8, 9, =, *, +, 9, I, G, (, C, E, ^, C, F, T, ), T, %, G, M, B, Q, J, 9, 6, g, 5, G, ;, >, [, I, *, F, 7, $, R, S, J, 3, N, <, :, F, /, H, 1, <, B, =, , T, $, F, e

Clickable Links from the video:

1. 'How can you stop the NSA spying on 100% of Americans?', Napolitano
asked RFK Junior

https://rumble.com/v358kt2-judge-napolitano-effectively-asked-how-can-you-stop-nsa-spying-on-100-of-am.html

2. Signal "NOT appropriate to protect Data"
https://rumble.com/v6ratdk-signal-not-appropriate-to-protect-the-data..html

3. Commercial Phones send all user data:
https://cissecure.com/what-makes-a-secure-phone/

4. All the E2E Encrypted LIVE videos:

https://rumble.com/c/c-2353010

#WhiteHouse #Security #Internet #E2EE #Government #international #encryption #BFRI #Cyber #Confidential

Loading comments...