Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be invented as approaches using apps from Signal, Whatsapp, Telegram and others will no longer provide this safety. This is something t
CSS, also known as IMSI catchers, are among law enforcement's most closely-guarded secret surveillance tools. They act like real cell phone towers, "tricking" mobile devices into connecting to them, designed to intercept the information that ph
Did you know that you can actually use phones without SIM cards? In some cases you don't even need an actual phone to make calls. You don't need to completely disconnect from the phone network but yet you can wipe yourself from the grid while still k
• https://www.activistpost.com, By Joel R. McConvey
A major report in the Washington Post has found that law enforcement officers in U.S. several cities where facial recognition tech is banned for police have asked neighboring forces to search face databases for them.
I will explain what differentiates a standard or what I call a Normie phone from these specialized phones called De-Googled phones. By their name, you can see that Google is removed. But that is not about removing a few apps. Neither can you de-Googl
Some people want to disappear mostly because of fear for their safety. But as you will find out, disappearing requires planning. And the irony is that in order to successfully disappear, you must have a plan that you contrive beforehand, well ahead o
The Biden Administration needs to acquire control of an additional 400 million acres to reach their 30×30 target to protect 30 percent of our land by 2030.
The last piece in the infrastructure that allows the operation of Skynet is now in place just announced a week ago. With this piece the advent of wireless peer to peer command and control of devices and robotics now become possible in full, with a ra
Some new phones like the iPhone comes only with an eSIM option. No physical SIM cards. Does this matter? Isn't it more convenient when a SIM card does not have to be inserted? This may be a direction we are going into that may prove to be a dangerous
The too big to fail banks are using everyone's stocks and bonds as collateral on their derivatives trades and the 1994 Section 8 of the Uniform Commercial Code legalized this fraud. David Webb testifies before Tennessee Legislature.
Some may already know that there are cybersecurity benefits to using a virtual machine. But less known are the privacy benefits. There are threats that can't be solved unless you use a virtual machine for example, it may be the only solution against
Derrick Broze catches up with Hakeem Anwar (formerly Ramiro Romani), CEO of Above Phone and founder of Take Back Our Tech. Hakeem shares the latest privacy products and services being offered by Above Phone, including the Above Book and the Above Pri
How does the phone network work? Who can see your data? Who can listen to your calls or read your SMS? Who can examine who you call or who calls you? What meta data is collected? What about your internet actions? How much of that can be seen by third
Phone numbers are your new ID card. If are are haphazard with making your phone numbers known on Internet sites, and people then you put your number at risk. But do you have a strategy for distributing phone numbers? This video is the strategy video
One enterprising member of The Corbett Report community has taken it upon himself to set up a Corbett Report mirror on Qortal. Joining us today to discuss this development and what it means is previous Corbett Report guest Mike Swatek.
The biggest threat that remains hard to resolve is the phone number threat. Each day it becomes even more important to protect because every platform now uses this as an identity card. Let me remind you in this video of all the threats and problems w
In order to be pseudo-anonymous on the Internet, we have to make sure that we are aware that we are being tracked. There are 10 important identifiers that we will work on to prevent someone from recognizing us as we surf the interwebs. If we hide or
TL;DR:
Google unveils a game-changing AI upgrade for Android called Bard.
Bard will read and analyze private messages, aiming to enhance the messaging experience.
Ashton Addison speaks with Andrew Milich, CEO and Co-Founder of Skiff, on their decentralized email network, why Email and blockchain work perfectly together, the difference between centralized private emails and decentralized email, and how to get s
A U.S. privacy case in state court that accuses a Chinese surveillance camera maker of "corporate voyeurism" has been narrowed to the benefit of the defendant. More generally, the defendant is accused of making false product claims.
Watch Streaming Broadcast Live:
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: