Channels lising page
All videos archived of The Hated One
_Wn31SGjiPs | 20 Nov 2024
Not all AI is private but I am gonna teach you how to use ANY AI as privately as possible. None of my recommendations are sponsored so: https://www.patreon.com/thehatedone Collab with Naomi: https://www.youtube.com/watch?v=CVeZfM0pVyU There are more than enough tutorials on how to run AI on your laptop, which is private but insufficient. Not everyone is gonna have the hardware to run a capable enough model on their device. You are gonna need a dedicated GPU and plenty of RAM in order to run something like a 7-billion-paramater Llama3, which is a very small model compared too GPT-4 or Gemini. And even if you do have the hardware, sometimes these small open source models are just not capable enough. And in any case, you probably want to hop between multiple models that are gonna excel in different tasks. So what can you do if you are in that situation? In this private AI tutorial, I am gonna show some really cool things you can do take control of your data while using cloud based LLMs. And I am gonna teach not only how but mostly when you should hop between local and cloud-based services. You are gonna learn what to do and what to avoid. There is so much to show you so be sure to stick till the end where I’ll share my secret methods I use to bypass all forms of identification with these online services. Sources [0] https://privacy.microsoft.com/en-US/privacystatement [1] https://support.microsoft.com/en-us/windows/copilot-in-windows-your-data-and-privacy-3e265e82-fc76-4d0a-afc0-4a0de528b73a [2] https://support.google.com/gemini/answer/13594961?hl=en [3] https://openai.com/policies/privacy-policy/ [4] https://arxiv.org/abs/2311.17035 [5] https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html [6] https://royalsocietypublishing.org/doi/10.1098/rsta.2018.0083 [7] ProtonVPN https://protonvpn.com/ [8] Mullvad VPN https://mullvad.net/en [9] Bitwarden password manager https://bitwarden.com/ [10] Hugging Chat AI https://huggingface.co/chat/ [11] Brave Leo AI https://brave.com/leo/ [12] Venice AI https://venice.ai/privacy [13] OpenWebUI https://openwebui.com/ [14] https://ollama.com/download [15] https://docs.openwebui.com/getting-started/quick-start/ [16] Jan AI https://jan.ai/download [17] https://x.com/Snowden/status/1175430722733129729 [18] https://grapheneos.org/usage#sandboxed-google-play [19] https://grapheneos.org/features#improved-user-profiles Credits Music by CO.AG Music https://www.youtube.com/@co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
lb1BbT5fpwA | 10 Nov 2024
What is the most private phone and what makes a phone private? That is the question... and we have answers! Please support my work: https://www.patreon.com/thehatedone Smartphones are ultimate spying devices. Apple is collecting your detailed usage information even if you opt out. Google is tracking your location even if you turn it off entirely. And the predatory advertising industry is gathering, selling and sharing your data with no precautions, making you fall victim to scammers, fraudsters or power-tripping cops. Of course, the big tech is getting backlash for the dystopia they are building for us. So now they are all telling us that they take our privacy seriously and do everything they can to protect it. But how can you trust their claims? All of this is really just marketing. Is there a method that’s based on evidence that can tell us which options are actually private? Yes, that’s what we are going to do in this video. We are gonna analyze which phone on the market is currently the most private option for you. There are myriads of phones to choose from so to keep things simpler, here’s what I decided to do: We’ll make the iPhone its own category, which will compete against Pixel phones from Google. Then all the remaining Android vendors will be grouped into one category. I am singling out Pixel here for reasons that will become clear later. Then we’ll also have to test all of these against AOSP + forks because they do offer some advantages as well as disadvantages. And among them, GrapheneOS will also be singled out due to facts that will be explained along the way. How do we decide how private any given phone is? Well, you can ask people who have something to sell you or you can use something like a benchmark to test the phone against. Our benchmark is gonna privacy threat model called LINDDUN. LINDDUN is basically just a list of seven privacy threat categories. These threats encompass everything personal data on your phone can be exposed to. From creepy advertisers and data brokers, through hackers and government agencies, to bad practice and conduct at the companies themselves. LINDDUN was built for privacy engineering and we are not engineers but we can still use it. We will take these seven threat categories and measure how much each phone is exposing our data to each threat. We’ll go by each LINDDUN category and assign a point for when a phone is vulnerable to a privacy threat. So the more points a phone gets, the worse it is for your privacy. This is gonna be very easy to follow and reproducible so if you think I got some stuff wrong, you can follow this method yourself and offer your perspective. Sources To follow this card by card, you can follow LINDDUN Go: https://linddun.org/go/ LINDDUN privacy threats: https://linddun.org/threats/ Types of privacy threats: https://linddun.org/threat-types/ AP Exclusive: Google tracks your movements, like it or not: https://apnews.com/article/828aefab64d4411bac257a07c1af0ecb Google clarifies location-tracking policy: https://apnews.com/article/ef95c6a91eeb4d8e9dda9cad887bf211 Apple Is Tracking You Even When Its Own Privacy Settings Say It’s Not, New Research Says: https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558 Apple Says Your iPhone’s Usage Data is Anonymous, but New Tests Say That’s Not True: https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619 Music by CO.AG Music @co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
4Dei2buz1X0 | 24 Oct 2024
SIM cards are dangerous. So I don't use them. Support my work: https://www.patreon.com/thehatedone I don’t actually use a SIM card. And I mean no SIM at all. No physical card, no eSIM. My methods of going about my digital life are very unconventional. This is not what regular people do. But because of my many years of privacy research and investigations, to me, it was completely normal. I understand the privacy implications of using a SIM. But to the uninitiated, not using a SIM for data and texts is out of this world. For friends and family, I use end-to-end encrypted messaging apps – for me that’s mostly Signa and Matrix. But even the freaking Facebook Messenger is encrypted now. There is no excuse to use unencrypted communication today and cell communication should get deprecated. For the rare instance when I need a phone number, usually for ancient services like a bank or the government, I do have a dumb phone that’s off all the time and is only on when I need to make a call or when I am expecting a text or a call. I also have a Faraday bag for when I am feeling extra cautious. For data, well.. I don’t use data. I use public WiFi when possible and when not, I download some offline entertainment when needed for longer routes. Usually getting a WiFi is not a problem as they are ubiquitous in every city – be it a coffee shop or a shopping mall. So this is why I don’t use a SIM and how I go about my life without it. The more people know about this the more secure we all get so share this video with those you care about in your life. SOURCES [references available in the transcript] [0] https://www.zeit.de/datenschutz/malte-spitz-vorratsdaten [1] https://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz [2] https://www.qualcomm.com/videos/5g-multi-cell-positioning-ota-demonstration [3] https://www.ericsson.com/en/blog/2018/11/lte-positioning-and-rtk-precision-down-to-the-centimeter [4] https://www.cisa.gov/sites/default/files/publications/19_0731_cisa_5th-generation-mobile-networks-overview_0.pdf [5] https://www.nokia.com/thought-leadership/articles/privacy-challenges-security-solutions-5g-networks/ [6] https://www.wired.com/story/5g-security-stingray-surveillance/ [7] https://www.wired.com/story/5g-more-secure-4g-except-when-not/ [8] https://harvardlawreview.org/print/vol-134/geofence-warrants-and-the-fourth-amendment/ [9] https://www.newyorker.com/news/news-desk/what-your-cell-phone-cant-tell-the-police [10] https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html [11] https://docs.fcc.gov/public/attachments/DOC-402213A1.pdf [12] https://www.engadget.com/fcc-fines-americas-largest-wireless-carriers-200-million-for-selling-customer-location-data-121246900.html [13] https://transition.fcc.gov/pshs/911/Apps%20Wrkshp%202015/911_Help_SMS_WhitePaper0515.pdf [14] https://threatpost.com/torpedo-privacy-4g-5g/142174/ [15] https://www.wired.com/story/torpedo-4g-5g-network-attack-stingray/ [16] https://www.ndss-symposium.org/ndss-paper/privacy-attacks-to-the-4g-and-5g-cellular-paging-protocols-using-side-channel-information/ [17] https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google CREDITS Music by https://www.youtube.com/@co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
d893lLf4_mY | 16 Oct 2024
They want to break up Google into multiple companies. Will it happen? Support my work: https://www.patreon.com/thehatedone Google is the most popular search engine with no relevant competition. Anywhere in the world, Google Search dominates upwards of 90% of the market, making it a de facto monopoly by definition. But Google didn’t rise to dominance by consumer choice alone. It rose to that dominance, because it was the default option on every single service and platform available. Chrome, the most popular browser by far, defaults to Google Search. Safari, the default web browser on the iPhone and the entire Apple ecosystem, ships with Google Search out of the box. Firefox, which is a popular web browser among Linux users and open source enthusiasts, is also defaulting to Google Search. Android, the most popular operating system on the planet, comes with Google Search preinstalled on almost every smart device that isn’t Apple, with with the only exception for China. Defaults have power and that’s why Google spends dozens of billions of dollars every single year to pay other companies to set Google Search as the default at their services. And Google is willing to pay this much money, because the returns exceed costs multiple times over. In the fourth quarter of 2023, Google spent almost $14bn to pay companies for this favor. And in those same three months, Google returned more than $48bn in revenue from Search. It is these secret backdoor deals that had a US judge rule Google to be an illegal monopoly. When this news broke, I covered it back in August so you can watch that video for more detail. But that was just a ruling of guilt. Now the U.S. Department of Justice seeks punishment. Until recently, we didn’t know what kind of punishment DoJ was looking for. But now we know. Last week the Justice Department came forward with this document called “proposed remedy framework” and this is what they want to convince the judge the US government should do to Google. SOURCES [references available in the transcript] [0] https://www.statista.com/statistics/1381664/worldwide-all-devices-market-share-of-search-engines/ [1] https://www.propublica.org/article/set-it-and-forget-it-how-default-settings-rule-the-world [2] https://abc.xyz/assets/95/eb/9cef90184e09bac553796896c633/2023q4-alphabet-earnings-release.pdf [3] https://www.cnbc.com/2023/11/14/apple-gets-36percent-of-google-search-revenue-from-safari-alphabet-witness.html [4] https://www.bloomberg.com/news/articles/2023-11-13/apple-gets-36-of-google-revenue-from-search-deal-witness-says [5] https://storage.courtlistener.com/recap/gov.uscourts.dcd.223205/gov.uscourts.dcd.223205.1052.0_1.pdf [6] https://www.pcmag.com/news/mozilla-signs-lucrative-3-year-google-search-deal-for-firefox [7] https://www.mozilla.org/en-US/advertising/ [8] https://batsov.com/articles/2021/11/28/firefox-is-the-only-alternative/ [9] https://news.bloomberglaw.com/antitrust/googles-tac-increased-almost-fivefold-over-a-decade-chart [10] https://theconversation.com/a-us-court-has-ruled-google-is-an-illegal-monopoly-and-the-internet-might-never-be-the-same-236227 [11] https://www.theguardian.com/technology/article/2024/aug/05/google-loses-antitrust-lawsuit [12] https://www.cnbc.com/2024/10/08/doj-indicates-its-considering-google-breakup-following-monopoly-ruling.html [13] https://qz.com/an-expert-witness-just-let-slip-how-much-google-pays-ap-1851019654 [14] https://www.nytimes.com/1984/01/01/us/bell-system-breakup-opens-era-of-great-expectations-and-great-concern.html [15] https://en.wikipedia.org/wiki/Breakup_of_the_Bell_System Credits Music by @co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
WFax9MLVkUg | 30 Sep 2024
MKBHD's made an app that is a privacy disaster. And it's a wallpaper app... Please support my work: https://www.patreon.com/thehatedone Marques Keith Brownlee is a YouTube star behind the massively popular MKBHD channel. Over the span of his 15-year-old content creator career, Marques Brownlee grew to 20 million subscribers surpassing 4 billion total views and that only vaguely illustrates the true heights of his success. Marques started making content in 2009, when he was still in high school and in a few years, he became the face of technology videos on YouTube. In 2013, a senior vice president of Google called him “the best technology reviewer on the planet right now”. In 2019, he won “Creator of the Decade”. MKBHD’s fame was acknowledged also by his interviews with big tech CEOs as well as Kobe Bryant and Bill Gates. Marques is also a star of the Retro Tech YouTube Originals series produced by Vox Media Studios and he recently became a board member of Ridge, a super popular sponsor of YouTube channels. His success, fame and wealth is out of this world. Especially at his young age. Marques is barely 30 now and he’s been on the top stop before he even graduated college. But it seems that not even that amount of success is enough, if you think you have a loyal audience of millions of people who will consume anything you have to sell them. Marques Brownlee decided to embark on another endeavor to attain even more wealth by making an app. Now Marques has a degree in business and IT so you’d think his app must be a total banger. Something humble but with great value. So what did Marques make? A wallpaper app. And not just any wallpaper app. MKBHD’s wallpaper app that is a privacy nightmare and a shameless cash grab disaster. The revenue split between artist and the Panels app is 50/50, with the Panels cut further split in half between Brownlee and the Panels developer. MKBHD is committed to fixing his wallpaper app, but not its $50 price tag https://www.androidauthority.com/mkbhd-to-fix-wallpaper-app-3484751/ Panels on Play Store https://play.google.com/store/apps/details?id=art.panels.wallpapers.playstore Panels on App Store https://apps.apple.com/us/app/panels-wallpapers/id6474455074 MKBHD's response to criticism: https://x.com/MKBHD/status/1838582554749755438 Apple data collection tied to device identifiers (DSID) https://www.engadget.com/apple-phone-usage-data-not-anonymous-researchers-185334975.html https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619 https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558 Free and open source wallpaper apps Paperize https://f-droid.org/packages/com.anthonyla.paperize/ Wallflow https://f-droid.org/packages/com.ammar.wallflow/ Wall You https://f-droid.org/packages/com.bnyro.wallpaper/ Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
s4UpE0iBSIY | 27 Sep 2024
We know have evidence that Valve is indeed ripping the entire PC gaming industry. Support my work: Patreon page: https://www.patreon.com/thehatedone Chapters 00:00 Problems and lies 01:15 Where is the evidence? 2:15 Proof that games are priced equally across multiple store fronts 5:11 Valve price parity requirement only mentions Steam keys 6:40 Evidence of Valve enforcing price parity beyond Steam keys 11:48 How Steam's price parity leads to higher prices for games across stores I have evidence that Valve’s Steam is ripping every PC gamer off. And I have evidence this is the case whether you get your games from Steam or from any other store for PC games. I’ve alluded to this in the part 1 of my investigation into Steam, where I lay out the different issues I have with Valve – including the fact that you don’t own your Steam games and Internet authentication is perpetually required or that Valve is charging insanely high cuts from all Steam sales. But there was one thing a lot of Valve loyalists had a problem with – and that was when I said that Valve is forcing publishers to price their games and offer the same content on Steam as on other stores. Which is an obnoxiously anti-competitive behavior where Valve wants to prevent publishers from selling their games for cheaper on other stores than on Steam. And many jumped to Valve’s defense saying that this price-parity requirement is only regarding Steam keys. And to me, that speaks volumes about how much these people care about the truth. Because I very conveniently cited all the sources that support this claim that Valve is enforcing price and content parity across all gaming stores and it’s not just about the Steam keys. Because this lie is continuously being perpetuated by Valve and its cultists, I’ve spent the last few weeks reading through literally hundreds of pages of court documents presenting evidence for Valve’s anti-competitive behavior. Yes, I actually read and analyzed hundreds of pages of complaints, exhibits and legal answers. But I care about the truth and I am proud of the research I am doing. SOURCES Wolfire Games LLC v. Valve Corporation (2:21-cv-00563) https://www.courtlistener.com/docket/59859024/wolfire-games-llc-v-valve-corporation/ Wolfire's complaint against Valve: https://storage.courtlistener.com/recap/gov.uscourts.wawd.298754/gov.uscourts.wawd.298754.127.0.pdf Valve's response to Wolfire's complaint: https://storage.courtlistener.com/recap/gov.uscourts.wawd.298754/gov.uscourts.wawd.298754.309.0.pdf EXHIBIT 85 - Evidence of Valve's enforcement of price and content parity beyond Steam keys: https://storage.courtlistener.com/recap/gov.uscourts.wawd.298754/gov.uscourts.wawd.298754.348.1.pdf Valve denies most allegations: https://storage.courtlistener.com/recap/gov.uscourts.wawd.298754/gov.uscourts.wawd.298754.128.0.pdf Video game giant Valve hit with consumer class action over pricing https://www.reuters.com/legal/transactional/video-game-giant-valve-hit-with-consumer-class-action-over-pricing-2024-08-12/ Elliott v. Valve Corporation (2:24-cv-01218) https://www.courtlistener.com/docket/69032524/elliott-v-valve-corporation/ Elliot's complaint against Valve: https://storage.courtlistener.com/recap/gov.uscourts.wawd.337957/gov.uscourts.wawd.337957.1.0.pdf Dark Catt Studios Holdings Inc v. Valve Corporation (2:21-cv-00872) https://www.courtlistener.com/docket/60020642/dark-catt-studios-holdings-inc-v-valve-corporation/ Dark Catt's complaint: https://storage.courtlistener.com/recap/gov.uscourts.wawd.300801/gov.uscourts.wawd.300801.1.0.pdf Valve's Motion to dismiss Dark Catt https://storage.courtlistener.com/recap/gov.uscourts.wawd.300801/gov.uscourts.wawd.300801.38.0.pdf Valve's Answer to Dark Catt's complaint https://storage.courtlistener.com/recap/gov.uscourts.wawd.300801/gov.uscourts.wawd.300801.75.0.pdf Steam Key rules: https://partner.steamgames.com/doc/features/keys Does Steam have a most favored nations provision (Reddit discussion: https://old.reddit.com/r/gamedev/comments/n3k5kw/does_steam_have_a_no_favored_nation_clause/) CREDITS Music by CO.AG Music https://www.youtube.com/@co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
A8ZXDiQLH9I | 12 Sep 2024
Telegram says they a private and encrypted neutral platform - but is that true? https://www.patreon.com/thehatedone Telegram is a messaging app with one billion users and currently the only platform whose CEO got arrested. This is Pavel Durov, the founder and chief executive officer of Telegram. He currently cannot leave France and has to report to a police station twice a week. His crime? Failing to respond to judicial requests to identify a suspect of an active investigation. This is big. Arresting a tech exec is something that never happens, no matter the reason. Durov is a Russian citizen and his Telegram has been used by dissidents around the world in pro-democracy protests. Telegram has always marketed itself as a pro-free speech and anti-censorship platform. It’s a self-proclaimed encrypted and secure messaging app. But can we honestly trust these claims? Is Telegram a genuinely secure platform for anyone to communicate safely? Or is this just another billionaire oligarch venture playing the long game where monetizing the customer is the end goal? I want to evaluate Telegram on seven merits that should determine whether we should or shouldn’t trust it. These seven points will assess Telegram on safety, the personality of Pavel Durov, its business model, collusion with government, who it’s used by, applied security and technology. Based on my investigation and analysis, I am going give Telegram a plus point for when I think a reason warrants trust, and negative point for when I think trust should be revoked. By the end, I’ll give you a total score that will judge whether you should trust and use Telegram or not. You should know that your chats are not private with Telegram. But if you only intend to use Telegram for its public features and you understand you are not private, go ahead. SOURCES [references available in the video transcript] [0] https://www.nytimes.com/2024/08/20/technology/meta-section-230-lawsuit.html [1] https://www.nytimes.com/2024/08/28/technology/durov-telegram-liability-platforms.html [2] https://www.amnesty.org/en/latest/news/2022/09/myanmar-facebooks-systems-promoted-violence-against-rohingya-meta-owes-reparations-new-report/ [3] https://www.bbc.com/news/world-asia-59558090 [4] https://time.com/6217730/myanmar-meta-rohingya-facebook/ [5] https://www.politico.eu/article/exclusive-telegram-ceo-brother-nikolai-durov-wanted-france-authorities-pavel-durov/ [6] https://apnews.com/article/telegram-pavel-durov-arrest-2c8015c102cce23c23d55c6ca82641c5 [7] https://apnews.com/article/france-telegram-pavel-durov-arrest-6e213d227458f330ed16e7fe221a696c [8] https://www.politico.eu/article/france-charges-telegram-ceo-pavel-durov-released-bail/ [9] https://www.nytimes.com/2014/12/03/technology/once-celebrated-in-russia-programmer-pavel-durov-chooses-exile.html [10] https://apnews.com/article/telegram-pavel-durov-passports-ce3b260f1366fe0f4480313f1e1d2c0a [11] https://t.me/durov/142 [12] https://t.me/durov/153 [13] https://foundation.mozilla.org/en/blog/fellow-research-toward-privacy-friendly-digital-ads/ [14] https://duckduckgo.com/duckduckgo-help-pages/company/ads-by-microsoft-on-duckduckgo-private-search/ [15] https://www.bloomberg.com/news/articles/2017-12-12/cryptic-russian-crusader-says-his-5-billion-app-can-t-be-bought [16] https://www.ft.com/content/8d6ceb0d-4cdb-4165-bdfa-4b95b3e07b2a?sharetype=gift [17] https://t.me/transparency [18] https://time.com/7015129/pavel-durov-arrest-france-telegram/ [19] https://www.hrw.org/world-report/2024/country-chapters/united-arab-emirates [20] https://www.amnesty.org/en/location/middle-east-and-north-africa/middle-east/united-arab-emirates/report-united-arab-emirates/ [21] https://www.theregister.com/2024/05/14/telegram_ceo_calls_out_rival/ [22] https://meduza.io/en/news/2020/06/22/telegram-founder-says-anti-censorship-tech-used-to-defeat-russian-authorities-should-be-used-in-iran-and-china [23] https://www.washingtonpost.com/news/morning-mix/wp/2015/11/19/founder-of-app-used-by-isis-once-said-we-shouldnt-feel-guilty-on-wednesday-he-banned-their-accounts/ [24] https://www.buzzfeednews.com/article/sheerafrenkel/telegram-founder-blames-socialists-for-paris-attacks [25] https://propertyofthepeople.org/document-detail/?doc-id=21114562 [26] https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/ [27] https://www.wired.com/story/telegram-encryption-end-to-end-features/ [28] https://apnews.com/article/meta-messenger-full-encryption-2ab384258750fd83cc3b5d9d8622f0f4 [29] https://www.wired.com/story/telegram-encryption-end-to-end-features/ CREDITS Music by @co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
3r0a7-qyjss | 31 Aug 2024
Steam is on a path to become a monopoly. Is that a good thing for the gamer? Support my work: https://www.patreon.com/thehatedone If it's not on Steam, it might as well not exist. Even console exclusives made for PlayStation and Xbox will find themselves listed on Steam. And that's saying something. It's saying that even giant studios like Microsoft or Sony just can't pass on that cash-grab potential. That is power. Power that belongs to Steam's maker Valve, which also has some of the most popular PC games, and makes Linux-based console SteamDeck that challenges Windows' gaming monopoly. For that, everyone loves Valve. But there is a problem. Valve's power is too great and Valve will use that power to the detriment of the whole gaming community. I am going to prove that to you by showing you Valve's historical record and by looking at its future path. Both of which should convince you that it doesn't matter how much you may love Steam right now, Valve is not your friend. Valve has this image of an infallible good guy, standing up to the big tech. Any criticism of Valve or Steam is met with dismissal and ridicule. Valve's fans will defend any corporate decision they make, even if it's the same they would scorch other gaming companies for making. When you purchase games from Steam, you have to accept the terms that you will never own your games. Your purchase only grants you a temporary limited license. What's the difference and why does it matter? Well, if you own something, like a book, or a DVD with a game, the contents still belong to the copyright holder, but you get to decide what to do with the material. Like for instance, you can lend it, gift it or trade it for something else. A Steam license gives you none of that. It's just a subscription. SOURCES [references available in the transcript] [0] https://web.archive.org/web/20141024081126/https://www.bloomberg.com/news/2013-11-04/valve-lines-up-console-partners-in-challenge-to-microsoft-sony.html [1] https://usesignhouse.com/blog/valve-stats/ [2] https://www.msn.com/en-us/entertainment/gaming/gaming-giant-valve-hit-with-another-antitrust-lawsuit-alleging-anticompetitive-practices/ar-AA1oF5qi [3] https://www.polygon.com/2017/5/16/15622366/valve-gabe-newell-sales-origin-destructive [4] https://old.reddit.com/r/SteamDeck/comments/t3glbx/its_okay_to_acknowledge_that_valve_is_not [5] https://news.ycombinator.com/item?id=21208138[6] https://store.steampowered.com/subscriber_agreement/ [7] https://www.extremetech.com/archive/73674-halflife-2-will-require-internet-activation [8] http://news.bbc.co.uk/1/hi/technology/4019095.stm [9] https://www.gamespot.com/articles/valve-restricts-14-day-eu-refund-law/1100-6425990/[10] https://www.bbb.org/us/wa/yarrow-point/profile/online-gaming/valve-corporation-1296-27030704/ [11] https://www.vg247.com/steam-customer-support-not-where-it-needs-to-be-says-valve [12] https://www.businesswire.com/news/home/20210428005374/en/Game-Developers-Conference%E2%80%99s-2021-State-of-the-Industry-Survey-Shows-Pandemic-Brought-Delays---But-Also-Growth-Reflects-Rising-Interest-in-the-PlayStation-5-and-Strong-Disapproval-of-30-Digital-Storefront-Revenue-Shares [13] https://www.polygon.com/22409511/microsoft-store-pc-revenue-share-steam-epic-games [14] https://support.patreon.com/hc/en-us/articles/11111747095181-Creator-fees-overview [15] https://kotaku.com/valve-isnt-evil-they-just-dont-understand-people-1704090932 [16] https://arstechnica.com/gaming/2021/05/why-lower-platform-fees-dont-lead-to-lower-prices-on-the-epic-games-store/ [17] https://www.pcgamer.com/lawsuit-claims-valve-is-abusing-its-market-dominance-to-keep-prices-high/ [18] https://www.hollywoodreporter.com/business/business-news/popular-gaming-platform-accused-of-abusing-market-power-through-contracts-4124057/ [19] https://arstechnica.com/gaming/2021/04/humble-bundle-creator-brings-antitrust-lawsuit-against-valve-over-steam/ [20] https://arstechnica.com/gaming/2022/05/judge-brings-dismissed-steam-antitrust-lawsuit-back-from-the-dead/ [21] https://www.theverge.com/2023/11/25/23975695/valve-ceo-gabe-newell-has-to-appear-in-person-to-defend-steam-store-fees [22] https://www.gamesindustry.biz/gabe-newell-ordered-to-make-in-person-deposition-for-valve-v-wolfire-games-lawsuit [23] https://www.polygon.com/2017/4/1/15129600/valve-has-cut-dota-2-royalties-and-workshop-creators-are-crying-foul [24] https://arstechnica.com/information-technology/2019/08/valve-says-turning-away-researcher-reporting-steam-vulnerability-was-a-mistake/ [25] https://store.steampowered.com/privacy_agreement/ [26] https://www.msn.com/en-us/entertainment/gaming/gaming-giant-valve-hit-with-another-antitrust-lawsuit-alleging-anticompetitive-practices/ar-AA1oF5qi CREDITS Music by CO.AG Music https://www.youtube.com/@co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ All of this protected under the Fair Use laws of the United States Copyright act of 1976.
tqB-ycET2q0 | 15 Aug 2024
MrBeast is too big fail and nothing will come out of the allegations against him. He is NOT done. Support my work: https://www.patreon.com/thehatedone This is my OP-ED on the recent MrBeast drama and allegations. I don't think MrBeast's career is gonna be touched by any of this. There will be promises made, some things may change, but MrBeast is just too big fail. Perhaps the first creator who is truly untouchable and is the powerful person on this platform. Some reading and sources On various MrBeast allegations: Is MrBeast the world’s most controversial YouTuber? Meet the 22-year-old famous for giving millions to strangers and opening a free restaurant during Covid-19: https://www.scmp.com/magazines/style/celebrity/article/3132914/mrbeast-worlds-most-controversial-youtuber-meet-22-year MrBeast hires investigators over co-host grooming claims: https://www.bbc.com/news/articles/cgr5pgevr39o MrBeast wants ‘full assessment’ of internal culture amid allegations of impropriety and unsafe sets: https://apnews.com/article/mrbeast-jimmy-donaldson-philanthropy-8bd067dc3b7ba30d0971adbf8fa8548d Alarming New Allegations Against MrBeast Arise From Former Employee: https://www.themarysue.com/mrbeast-jake-weddle-controversy-explained/ MrBeast’s confidential memo to ‘Team Beast’ employees ordered big changes. Here’s what it said: https://www.fastcompany.com/91170685/mrbeast-s-confidential-memo-team-beast-employees-ordered-big-changes-here-s-what-said US regulations are actually very lax on Internet content: The FCC and Speech: https://www.fcc.gov/sites/default/files/fcc-and-speech.pdf The Linus Tech Tips situations is similar to this IMO: Internal investigation reveals allegations were "false" and "unsubstantiated". https://www.pcgamer.com/hardware/alleged-harassment-and-bullying-at-linus-tech-tips-not-substantiated-and-false-according-to-third-party-investigation-organised-by-tech-channel/ Linus Tech Tips pauses production as controversy swirls: https://www.theverge.com/2023/8/16/23834190/linus-tech-tips-gamersnexus-madison-reeves-controversy I wanna do more content on media literacy, research and critical thinking. So far, here are some interesting sources: Media Literacy: https://open.lib.umn.edu/mediaandculture/chapter/1-8-media-literacy/ Fallacies: https://plato.stanford.edu/entries/fallacies/ Formal fallacy: https://en.wikipedia.org/wiki/Formal_fallacy Critical Thinking: https://iep.utm.edu/critical-thinking/ Identify & Challenge Disinformation (aka Fake News): Home https://guides.library.pdx.edu/fakenews Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ Credits Music by CO.AG Music @co.agmusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
m645VYVE0TU | 10 Aug 2024
The big tech is gradually erasing human-to-human interactions from our lives. This is a problem. Support my work: https://www.patreon.com/thehatedone This is Evil Corp. We have all these different brands under different logos and different names. But they are all the same. They are all doing the same thing. Setting and following the same trends on and on, squeezing every penny out of each of them into sterile homogenized neatly packaged products. I know they are the same because I know why they are the same. And I am gonna tell you why they are the same. It’s my “one corporation” theory. And I also have a solution that I disclose at the end of this video. But first, I need to show you how much anti-human the corporate tech has become. How it’s not just a one off event and a pattern that has taken a life on its own and it make turns every piece of culture into the most bland fast-food version of the original with no taste, no texture, and no soul. It’s no coincidence that this is happening at all of these different corporations. A few years ago, they didn’t have that much in common. Amazon started with selling books. Now they are an AI company. Facebook started off as a social network. Now they are an AI company. Apple started with selling computers. Now they are an AI company. Microsoft started by selling an operating system. Now they are an AI company. Nvidia started off selling shovels to the gaming industry. Now they are selling shovels to AI companies. Everything is converging into this one vision. Everything is becoming a one corporation. It’s my hypothesis that claims that all major corporations are driving markets into one super-conglomerate under common ownership, that will eventually consume industry after industry, until it’s all just one megacorporate entity. My one corporation theory assumes that markets will become so anti-competitive, that consolidation will be the only way to find a way to grow. With fewer and larger companies, there will be less economic diversity and most markets will be owned by the same people. That will be the point of ultimate homogeneity. I am stretching a lot of solid economic research here, but much of what I am predicting is already happening. Hear me out. Sources [references available in the transcript] [0] https://arstechnica.com/ai/2024/07/dear-sydney-why-i-find-googles-ai-olympics-ad-so-disturbing/ [1] https://www.sfgate.com/tech/article/google-ad-dear-sydney-comments-19605253.php [2] https://gemini.google.com/share/815f28b9c364?hl=en [3] https://www.theatlantic.com/technology/archive/2024/07/thrive-ai-health-huffington-altman-faith/678984/ [4] https://www.sfgate.com/tech/article/apple-ipad-commercial-dystopian-press-19446588.php [5] https://adage.com/article/digital-marketing-ad-tech-news/apple-apologizes-ipad-pro-crushed-ad-it-missed-mark/2559321 [6] https://theconversation.com/ai-companions-promise-to-combat-loneliness-but-history-shows-the-dangers-of-one-way-relationships-221086 [7] https://www.hhs.gov/about/news/2023/05/03/new-surgeon-general-advisory-raises-alarm-about-devastating-impact-epidemic-loneliness-isolation-united-states.html [8] https://www.apple.com/apple-intelligence/ [9] https://www.youtube.com/watch?v=YuIc4mq7zMU [10] https://www.hhs.gov/sites/default/files/surgeon-general-social-connection-advisory.pdf [11] https://www.sixthtone.com/news/1006531 [12] https://classic.qz.com/machines-with-brains/1018126/lukas-replika-chatbot-creates-a-digital-representation-of-you-the-more-you-interact-with-it/ [13] https://classic.qz.com/machines-with-brains/1018126/lukas-replika-chatbot-creates-a-digital-representation-of-you-the-more-you-interact-with-it/ [14] https://web.archive.org/web/20240808042351/https://gs.statcounter.com/os-market-share/desktop/worldwide/ [15] https://web.archive.org/web/20240805064357/https://gs.statcounter.com/os-market-share/mobile/worldwide [16] http://ssrn.com/abstract=2802332 [17] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3293822 [18] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2811221 [19] https://www.cambridge.org/core/journals/business-and-politics/article/hidden-power-of-the-big-three-passive-index-funds-reconcentration-of-corporate-ownership-and-new-financial-risk/30AD689509AAD62F5B677E916C28C4B6 [20] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2872754 [21] https://www.bloomberg.com/news/features/2020-01-09/the-hidden-dangers-of-the-great-index-fund-takeover Credits Music by CO.AG Music https://www.youtube.com/@co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
79ichE_LmLQ | 07 Aug 2024
US federal judge rules Google to be a monopoly. What will happen now Support my work: https://www.patreon.com/thehatedone Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ Credits Music by CO.AG Music @co.agmusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
RhsKgvGue0w | 31 Jul 2024
Did Mark Zuckerberg make a mistake to open source an LLM with 405 billion parameters? Support me: https://www.patreon.com/thehatedone There is a new open source AI out there. It was published by Meta and it’s one of the most powerful models ever developed. And now a lot of people want to stop it. They say Meta is too dangerous and irresponsible. And what if they are right this time? Why would Mark Zuckerberg do this? Who should you believe and what if open source AI is a mistake? Let me shine a light on all of these things that I’ve been following extremely closely as I believe what will transpire over the next months and years will profoundly affect all of our digital lives. On July 23, Meta published a new stack of AI models as Llama 3.1 packaged into three different sizes. There are two models small enough to run on consumer hardware with just 8 and 70 billion parameters. But we’ve had those for a while. What really changes everything is Meta’s largest model to date – with whopping 405B paramaters, it’s the biggest and most capable open source LLM ever created. The 405b model is now capable of rivaling and even outperforming ChatGPT. No open source AI has done this before. But unlike GPT-4, anyone in the world can copy, modify and redistribute Meta’s flagship AI without almost any restrictions. Sources [references available in the transcript] [0] https://ai.meta.com/blog/meta-llama-3-1/ [1] https://huggingface.co/meta-llama/Meta-Llama-3.1-405B [2] https://www.ft.com/content/a09e4aaf-be52-4a45-86a7-c6d1636526bc [3] https://time.com/7002563/mark-zuckerberg-ai-llama-meta-open-source/ [4] https://www.engadget.com/llama-31-is-metas-latest-salvo-in-the-battle-for-ai-dominance-150042924.html [5] https://www.politico.com/news/2023/12/03/congress-ai-fellows-tech-companies-00129701 [6] https://www.politico.eu/article/rishi-sunak-artificial-intelligence-pivot-safety-summit-united-kingdom-silicon-valley-effective-altruism/ [7] https://www.afr.com/technology/google-brain-founder-says-big-tech-is-lying-about-ai-human-extinction-danger-20231027-p5efnz [8] https://www.ft.com/content/2dc07f9e-d2a9-4d98-b746-b051f9352be3 [9] https://carnegieendowment.org/2023/09/14/how-hype-over-ai-superintelligence-could-lead-policy-astray-pub-90564 [10] https://www.msn.com/en-us/news/technology/meta-llama-3-1-is-one-of-the-most-important-ai-releases-of-the-year-here-s-how-to-try-it/ar-BB1qyIJl [11] https://cdn.openai.com/papers/gpt-4.pdf [12] https://arstechnica.com/information-technology/2024/07/the-first-gpt-4-class-ai-model-anyone-can-download-has-arrived-llama-405b/ [13] https://www.latimes.com/business/story/2024-07-23/zuckerberg-aims-to-rival-open-ai-google-with-new-llama-ai-model [14] https://www.wired.com/story/meta-ai-llama-3/ [15] https://fortune.com/2024/07/23/meta-new-llama-model-3-1/ [16] https://gs.statcounter.com/os-market-share/ [17] https://source.android.com/ [18] https://www.axios.com/2022/09/14/google-loses-appeal-eu-antitrust-ruling [19] https://www.npr.org/2023/09/12/1198558372/doj-google-monopoly-antitrust-trial-search-engine [20] https://about.fb.com/news/2024/07/open-source-ai-is-the-path-forward/ [21] https://blog.mozilla.org/en/mozilla/introducing-mozilla-ai-investing-in-trustworthy-ai/ [22] https://www.weforum.org/agenda/2023/12/ai-regulation-open-source/ [23] https://www.technologyreview.com/2024/03/25/1090111/tech-industry-open-source-ai-definition-problem/ [24] https://spectrum.ieee.org/open-source-ai-good [25] https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html [26] https://arxiv.org/abs/2310.15469 [27] https://arxiv.org/abs/2310.03693 Credits Music by https://www.youtube.com/@co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6uwVNufVnD8 | 20 Jul 2024
Your AI girlfriend is not your friend. And neither is the company developing it. Support me on Patreon: https://www.patreon.com/thehatedone Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ AI companions are exploding in popularity. And the world is more and more looking like the movie “Her”. And not in a good way. Because who is developing these AIs and how exactly do they make money? There is something these companies are not telling you. And I am gonna show why you should not trust or even use these AI chatbots. And I will also show you what you can do to better protect yourself if you still want to use AI chatbots but safely. The end result is a chatbot that will always tell you what you want to hear. It will insulate your from the external world. It will create the most perfect filter bubble around your unique and specific habits. It will make you develop unhealthy dependencies that will deepen your social isolation, even if you subjectively might feel less lonely. SOURCES [references in the transcript] [0] https://www.wired.com/story/ai-girlfriends-privacy-nightmare/ [1] https://www.hhs.gov/sites/default/files/surgeon-general-social-connection-advisory.pdf [2] https://time.com/6257790/ai-chatbots-love/ [3] https://www.sixthtone.com/news/1006531 [4] https://www.reddit.com/r/replika/comments/108gpb2/replikas_terrible_meme_ad_campaign_is_doing_so/ [5] https://www.vice.com/en/article/z34d43/my-ai-is-sexually-harassing-me-replika-chatbot-nude [6] https://www.washingtonpost.com/technology/2022/10/07/characterai-google-lamda/ [7] https://english.elpais.com/technology/2023-12-09/virtual-girlfriend-real-love-how-artificial-intelligence-is-changing-romantic-relationships.html [8] https://www.theinformation.com/articles/character-seeks-250-million-in-new-funding-amid-ai-boom [9] https://www.euronews.com/next/2021/08/26/meet-xiaoice-the-ai-chatbot-lover-dispelling-the-loneliness-of-china-s-city-dwellers [10] https://foundation.mozilla.org/en/privacynotincluded/articles/happy-valentines-day-romantic-ai-chatbots-dont-have-your-privacy-at-heart/ [11] https://www.bloomberg.com/news/articles/2021-07-14/microsoft-chatbot-spinoff-xiaoice-reaches-1-billion-valuation [12] https://classic.qz.com/machines-with-brains/1018126/lukas-replika-chatbot-creates-a-digital-representation-of-you-the-more-you-interact-with-it/ [13] https://www.kuki.ai/policies#privacy [14] https://evaapp.ai/app/pp.html [15] https://vineetseamless.gitlab.io/chai-privacy/#section1 [16] https://character.ai/privacy [17] https://replika.ai/legal/privacy [18] https://tuta.com/ [19] https://proton.me/ [20] https://grapheneos.org/ [21] https://jan.ai/ [22] https://huggingface.co/chat/assistants [23] https://huggingface.co/models Credits Music by CO.AG Music https://www.youtube.com/@co.agmusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6YbeGjnqEZ8 | 10 Jul 2024
Apple Intelligence is another privacy lie. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ Apple Intelligence is artificial intelligence, but private. Because Apple is a privacy company, unlike the rest of the big tech, of course. AI is expensive and how is Apple going to pay for this? It’s gonna be you. You will pay for this, by spending more time on their apps and services inside their own platform and Apple will have more real estate to show you ads on. If this is surprising news for you, Apple’s has been shifting its strategy to make more money from ads and services because hardware sales are falling. And this how they will make their shareholders happy. Apple is changing its strategy and is banking more and more on its ability to exclusively target Apple users across all devices on its platform. And Apple Intelligence has been integrated deeply with the operating system whether you like or not. The more you use it, the more usage data you generate and the more lucrative Apple’s ad network becomes. I also don’t like the ChatGPT integration. Apple promises your IP address will be obscured and your requests won’t be stored by OpenAI. And we know nothing else about this deal. OpenAI is very explicit that they will collect and use every bit of user data, including the content of prompts and chats. But I want to know what permissions OpenAI is gonna have on users devices. Understand what Apple Intelligence is about – it’s another tool designed to keep you locked in inside Apple’s platform. It’s not a privacy-preserving option. It’s a convenience tool. The integration across Apple apps and services is gonna be seamless and amazing, as always. But you will become an even greater target of Apple’s emerging advertising strategy. Sources [0] https://www.apple.com/apple-intelligence/ [1] https://www.apple.com/newsroom/2024/06/introducing-apple-intelligence-for-iphone-ipad-and-mac/ [2] https://www.nytimes.com/2023/10/26/technology/google-apple-search-spotlight.html [3] https://arstechnica.com/tech-policy/2023/10/googles-21-year-deal-with-apple-is-the-heart-of-monopoly-case-judge-says/ [4] https://www.nytimes.com/2020/10/25/technology/apple-google-search-antitrust.html [5] https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html [6] https://www.apple.com/legal/privacy/aipi/ [7] https://security.googleblog.com/2021/09/introducing-androids-private-compute.html [8] https://blog.google/products/android/android-12-beta/ [9] https://blog.google/technology/safety-security/how-we-make-every-day-safer-with-google/ [10] https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html [11] https://support.google.com/pixelphone/answer/12112173?hl=en [12] https://github.com/google/private-compute-services [13] https://security.googleblog.com/2022/12/trust-in-transparency-private-compute.html [14] https://arxiv.org/abs/2209.10317 [15] https://linddun.org/threats/ [16] https://linddun.org/threat-types/ [17] https://www.apple.com/legal/privacy/pdfs/apple-privacy-policy-en-ww.pdf [18] apple.com/legal/privacy/data [19] https://machinelearning.apple.com/research/introducing-apple-foundation-models [20] https://security.apple.com/blog/private-cloud-compute/ [21] https://security.apple.com/blog/private-cloud-compute/ [22] https://cloud.google.com/blog/products/identity-security/titan-in-depth-security-in-plaintext [23] https://www.bloomberg.com/news/newsletters/2022-08-14/apple-aapl-set-to-expand-advertising-bringing-ads-to-maps-tv-and-books-apps-l6tdqqmg [24] https://www.nytimes.com/2022/09/06/technology/apple-ads.html [25] https://www.ft.com/content/db21685b-d4dd-421d-95ac-980e9d40c05c [26] https://www.apple.com/legal/privacy/data/en/ask-siri-dictation/ [27] https://www.apple.com/legal/privacy/data/en/siri-suggestions-search/ [28] https://support.apple.com/guide/iphone/use-advanced-data-protection-iph584ea27f5/ios [29]https://www.apple.com/legal/privacy/data/en/messages/ Credits Music by Karl Casey - White Bat Audio https://www.youtube.com/@WhiteBatAudio The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
XyiTDbKndNM | 20 Jun 2024
OpenAI is is fighting a crusade against open source AI. This needs to stop. Support my work: https://www.patreon.com/thehatedone Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ Back in 2015, we’ve been sold OpenAI as a strife to “democratize AI power”. That was due to fears that if any corporate entity develops AI privately, they would be too powerful to be trusted with it. So if anyone wants to develop AI, they should release it to the public as open source, so that everyone could benefit equally and without asking for permission and compete with the most powerful model. So that we wouldn’t have one corporate despot to rule them all. The balance of power and all. GPT is now of the least transparent and accessible projects in the Internet Age. OpenAI’s GPT is proprietary. We can’t tinker with it, we can’t change it, we can’t own it. We can’t use it without OpenAI’s explicit permission. Google removed their “don’t be evil” slogan once it stopped vibing with their quarterly earnings. OpenAI didn’t even start with that. How can we trust OpenAI will not enshittify GPT for a good’ol shareholder value? Sources [0] https://www.youtube.com/watch?v=jvqFAi7vkBc [1] https://www.youtube.com/watch?v=tV8EOQNYC-8 [2] https://cdn.openai.com/papers/gpt-4.pdf; [3] https://x.com/Walid_Magdy/status/1635761623607517184 [4] https://fortune.com/2023/03/17/sam-altman-rivals-rip-openai-name-not-open-artificial-intelligence-gpt-4/ [5] https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html [6] https://arxiv.org/abs/2311.17035 [7] https://www.reuters.com/legal/lawsuit-says-openai-violated-us-authors-copyrights-train-ai-chatbot-2023-06-29/ [8] https://www.nytimes.com/2023/09/20/books/authors-openai-lawsuit-chatgpt-copyright.html [9] https://www.nytimes.com/2023/12/27/business/media/new-york-times-open-ai-microsoft-lawsuit.html [10] https://www.reuters.com/legal/litigation/openai-microsoft-want-court-toss-lawsuit-accusing-them-abusing-open-source-code-2023-01-27/ [11] https://help.openai.com/en/articles/7842364-how-chatgpt-and-our-language-models-are-developed [12] https://arxiv.org/abs/2310.15469 [13] https://arxiv.org/abs/2310.03693 [14] https://royalsocietypublishing.org/doi/10.1098/rsta.2018.0083 [15] https://techcrunch.com/2023/03/31/chatgpt-blocked-italy/ [16] https://www.nytimes.com/2024/05/29/technology/what-to-know-open-closed-software.html [17] https://apnews.com/article/cohere-ai-ceo-aidan-gomez-transformers-71d8618ccc5420aba19871d41eb81615 [18] https://www.wired.com/story/metas-open-source-llama-3-nipping-at-openais-heels/ [19] https://www.nytimes.com/2024/05/29/technology/mark-zuckerberg-meta-ai.html [20] https://fortune.com/2023/07/18/mark-zuckerberg-meta-ai-open-source-llama-2-llm/ [21] https://www.youtube.com/watch?v=TO0J2Yw7usM [22] https://www.politico.eu/article/rishi-sunak-artificial-intelligence-pivot-safety-summit-united-kingdom-silicon-valley-effective-altruism/ [23] https://futureoflife.org/open-letter/ai-policy-for-a-better-future-on-addressing-both-present-harms-and-emerging-threats/ [24] https://www.blumenthal.senate.gov/newsroom/press/release/blumenthal-and-hawley-announce-bipartisan-framework-on-artificial-intelligence-legislation [25] https://www.ft.com/content/2dc07f9e-d2a9-4d98-b746-b051f9352be3 [26] https://www.youtube.com/watch?v=F9cO3-MLHOM [27] https://www.afr.com/technology/google-brain-founder-says-big-tech-is-lying-about-ai-human-extinction-danger-20231027-p5efnz [28] https://www.politico.com/news/2023/10/13/open-philanthropy-funding-ai-policy-00121362 [29] https://openai.com/policies/privacy-policy/ [30] https://help.openai.com/en/articles/7842364-how-chatgpt-and-our-language-models-are-developed [31] https://www.bloomberg.com/news/features/2023-03-07/effective-altruism-s-problems-go-beyond-sam-bankman-fried? [32] https://www.semafor.com/article/11/21/2023/how-effective-altruism-led-to-a-crisis-at-openai [33] https://forum.effectivealtruism.org/posts/DdSszj5NXk45MhQoq/decision-making-and-decentralisation-in-ea [34] https://venturebeat.com/ai/openais-six-member-board-will-decide-when-weve-attained-agi/ [35] https://www.ft.com/content/46efa770-4b47-49bb-b0f8-824f1c4f38a3 [36] https://www.bloomberg.com/news/articles/2023-11-22/ai-startup-cohere-s-ceo-slams-effective-altruism-in-wake-of-openai-drama [37] https://www.politico.com/news/2023/10/13/open-philanthropy-funding-ai-policy-00121362 [38] https://open.mozilla.org/letter/ Written by The Hated One Music by White Bat Audio [Karl Casey] https://www.youtube.com/@WhiteBatAudio The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
lJ_NRIKbRKc | 25 May 2024
Zuck open sourced Llama and the big tech is seething. Support my work: https://www.patreon.com/thehatedone Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ As of 2023, Meta’s Llama models are open source, which means anyone can access them for free and what’s most important is that they can modify and redistribute their own versions of Llama without Meta’s explicit permission. This allows for tremendous freedoms. It enables anyone in the world to take Llama and customize it to their own needs, fine-tune it, train it on their own data sets. You don’t need a data center to do this. It’s doable on consumer-grade hardware. In contrast, the rest of the big tech is gambling on the believe there will always be enough paying customers. And freely available open source AI is an obstacle to that strategy. So where they can’t win in free market, they turn to the government. Sources [reference numbers are in the video transcript] [1] https://ai.meta.com/blog/meta-llama-3/?_fb_noscript=1 [2] https://llama.meta.com/llama3/license/ [3] https://en.wikipedia.org/wiki/Free_and_open-source_software [4] https://www.semianalysis.com/p/google-we-have-no-moat-and-neither [5] https://www.datacenterdynamics.com/en/analysis/data-center-water-usage-remains-hidden/ [6] https://arxiv.org/pdf/2304.03271.pdf [7] https://www.ft.com/content/2dc07f9e-d2a9-4d98-b746-b051f9352be3 [8] https://www.politico.com/news/2023/12/03/congress-ai-fellows-tech-companies-00129701 [9] https://open.mozilla.org/letter/ [10] https://www.afr.com/technology/google-brain-founder-says-big-tech-is-lying-about-ai-human-extinction-danger-20231027-p5efnz [11] https://www.vox.com/future-perfect/23817060/meta-open-source-ai-mark-zuckerberg-facebook-llama2 [12] https://www.unite.ai/everything-you-need-to-know-about-llama-3-most-powerful-open-source-model-yet-concepts-to-usage/ [13] https://anakin.ai/blog/how-to-run-llama-3-locally/ [14] https://www.semianalysis.com/p/google-we-have-no-moat-and-neither [15] https://fortune.com/2023/05/05/google-engineer-says-no-moat-artificial-intelligence-warren-buffett/ [16] https://www.politico.com/news/2023/10/13/open-philanthropy-funding-ai-policy-00121362 [17] https://carnegieendowment.org/2023/09/14/how-hype-over-ai-superintelligence-could-lead-policy-astray-pub-90564 [18] https://www.politico.com/news/2023/12/03/congress-ai-fellows-tech-companies-00129701 [19] https://www.technologyreview.com/2023/09/25/1080104/inside-congresss-first-ai-insight-forum/ [20] https://www.politico.com/news/2023/12/15/billionaire-backed-think-tank-played-key-role-in-bidens-ai-order-00132128 [21] https://www.politico.eu/article/rishi-sunak-artificial-intelligence-pivot-safety-summit-united-kingdom-silicon-valley-effective-altruism/ [22] https://www.wired.com/story/chatgpt-prompt-injection-attack-security/ [23] https://www.wired.com/story/generative-ai-prompt-injection-hacking/ [24] https://www.youtube.com/watch?v=bc6uFV9CJGg The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Phh2GDe4QSU | 23 May 2024
Conversation between Naomi Brockwell and The Hated One. Follow Naomi Brockwell: https://www.youtube.com/@UCSuHzQ3GrHSzoBbwrIq3LLA Support my work: https://www.patreon.com/thehatedone Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ Timestamps: 00:00:00 Naomi roasts THO in the first 30 seconds 00:00:35 Who is Naomi Brockwell? 00:06:50 Why privacy matters, case study of women's rights and data brokers 00:11:40 Why the government won't protect people's privacy 00:18:37 Why won't more people take steps to protect their privacy? 00:24:18 We need to mobilize a privacy community that is activist 00:31:00 Naomi loves and hates Apple 00:40:06 Naomi shares her terrible privacy experience 00:46:45 How to resist media censorship wink wink 00:54:11 On artificial intelligence and how we can use it to regain control 01:03:30 How Effective Altruism's powerful lobby wants to steal AI from us 01:25:10 Where does Naomi get her worldview from? Intro music by White Bat Audio The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
5NUD7rdbCm8 | 03 May 2024
They warn us that future artificial intelligence will wipe out humanity. This may be a lie with ulterior motives. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone There is a powerful motivation to keep you thinking that AI is an existential threat. That we should treat it with the same level of urgency as a nuclear war or a global pandemic. And yet, we shouldn’t stop developing AI. We should accelerate it as fast as we can. As long as it’s the select few good guys that get to control it. We must not let AI fall into wrong hands. But there is a growing opposition to this movement. A conflict is arising. There is those that want to keep AI closed off and tightly controlled and those that want to leave it open and accessible to all. Even though both sides claim they are doing for humanity, only of them is right. This is an arms race for who gets to dominate AI development and who will be left out. Sources [0]https://www.wired.com/story/runaway-ai-extinction-statement/ [1] https://www.safe.ai/work/statement-on-ai-risk [2] https://www.cnbc.com/2024/02/09/openai-ceo-sam-altman-reportedly-seeking-trillions-of-dollars-for-ai-chip-project.html [3] https://www.cnbc.com/2024/02/02/ai-lobbying-spikes-nearly-200percent-as-calls-for-regulation-surge.html [4] https://www.politico.com/news/2023/10/13/open-philanthropy-funding-ai-policy-00121362 [5] https://futureoflife.org/open-letter/ai-policy-for-a-better-future-on-addressing-both-present-harms-and-emerging-threats/ [6] https://www.blumenthal.senate.gov/newsroom/press/release/blumenthal-and-hawley-announce-bipartisan-framework-on-artificial-intelligence-legislation [7] https://www.afr.com/technology/google-brain-founder-says-big-tech-is-lying-about-ai-human-extinction-danger-20231027-p5efnz [8] https://en.wikipedia.org/wiki/Free_and_open-source_software [9] https://www.nytimes.com/2023/03/29/technology/ai-artificial-intelligence-musk-risks.html [10] https://futureoflife.org/open-letter/pause-giant-ai-experiments/ [11] https://www.wired.com/story/fast-forward-elon-musk-letter-pause-ai-development/ [12] https://www.politico.com/news/2023/12/03/congress-ai-fellows-tech-companies-00129701 [13] https://www.ft.com/content/2dc07f9e-d2a9-4d98-b746-b051f9352be3 [14] https://blogs.microsoft.com/on-the-issues/2023/05/25/how-do-we-best-govern-ai/ [14b] https://carnegieendowment.org/2023/09/14/how-hype-over-ai-superintelligence-could-lead-policy-astray-pub-90564 [15] https://www.semianalysis.com/p/google-we-have-no-moat-and-neither [16] https://www.politico.com/news/2023/12/15/billionaire-backed-think-tank-played-key-role-in-bidens-ai-order-00132128 [17] https://www.politico.eu/article/rishi-sunak-artificial-intelligence-pivot-safety-summit-united-kingdom-silicon-valley-effective-altruism/ [18] https://www.politico.com/news/2022/12/22/eric-schmidt-joe-biden-administration-00074160 [19] https://www.technologyreview.com/2023/09/25/1080104/inside-congresss-first-ai-insight-forum/ [20] https://open.mozilla.org/letter/ [21] https://www.youtube.com/watch?v=reUZRyXxUs4 [22] https://laion.ai/notes/letter-to-the-eu-parliament/ Credits Music by White Bat Audio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
F-6la_I-xkQ | 04 Apr 2024
The big tech and AI will fight over scarce water sources to fund their expansion and business. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone For decades, experts have been warning us that we are running out of available fresh water. Some even suggested that a few major conflicts in recent history may have been spurred up by water scarcity. Today big tech’s thirst for this most precious resource is growing unquenchable pushing additional pressure on the already cracking camel’s back. It may seem unlikely. And if you’ve never heard this before, it’s intentional. It’s because the big tech has kept it a secret. Sources [references available in the video transcript] [0] http://www.jstor.org/stable/24907379 [1] https://wedocs.unep.org/bitstream/handle/20.500.11822/8247/-GEO-5%20for%20Business_%20Impacts%20of%20a%20Changing%20Environment%20on%20the%20Corporate%20Sector-2013GEO5_for_Business.pdf [2] https://arxiv.org/pdf/2304.03271.pdf [3] https://www.nbcnews.com/tech/internet/drought-stricken-communities-push-back-against-data-centers-n1271344 [4] https://www.nature.com/articles/d41586-024-00478-x [5] https://www.nbcnews.com/tech/internet/drought-stricken-communities-push-back-against-data-centers-n1271344 [6] https://apnews.com/article/technology-business-the-dalles-oregon-droughts-62b3774442293497ceb2306a606471af [7] https://time.com/5814276/google-data-centers-water/ [8] https://apnews.com/article/technology-business-environment-and-nature-oregon-united-states-2385c62f1a87030d344261ef9c76ccda [9] https://www.datacenterdynamics.com/en/analysis/data-center-water-usage-remains-hidden/ [10] https://www.datacenterdynamics.com/en/opinions/an-industry-in-transition-1-data-center-water-use/ [11] https://arxiv.org/pdf/2211.02001.pdf [12] https://www.theguardian.com/us-news/2023/jan/24/us-electric-vehicles-lithium-consequences-research [13] https://www.nature.com/articles/s41558-022-01377-7 [14] https://www.datacenterdynamics.com/en/news/huge-data-center-moves-forward-in-mesa-despite-arizona-water-concerns/ [15] https://www.datacenterdynamics.com/en/news/apple-close-to-finishing-second-phase-of-mesa-command-center/ [16] https://www.nationalgeographic.com/foodfeatures/feeding-9-billion/ [17] https://www.seattletimes.com/seattle-news/environment/wall-street-spends-millions-to-buy-up-washington-state-water/ Music by Carl Kasey youtube.com/whitebataudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
5iEUAp0QuPg | 15 Mar 2024
Techno-optimism is now a well funded campaign that promotes billionaire backed future innovations as opposed to already available systemic solutions. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Techno-optimism is a toxic mindset that weaponizes positive thinking to perpetuate structures that caused our problems and guild everyone who speaks out against them. Techno-optimism has become a trend since about the mid 2010s. When suddenly wealthy tech entrepreneurs started giving speeches and talks, writing instant best sellers and featuring in popular podcasts amassing millions of hits. Now it’s a well funded campaign hellbent on convincing policy makers that wealthy investors will figure out what’s best for all of us. The basic premise of techno-optimism goes like this – we don’t need to invest in robust public transit in our cities. We can just dig single-lane tunnels for taxis to drive through them. We don’t need high-speed rail, we’ll have hyperloop and electric cars. We don’t need a living wage, we’ll have automation doing all of the hard work for us. We don’t need a systemic reform today because we’ll have a technological solution in the future. Sources [references in the transcript] [0] https://oxfam.app.box.com/s/1rp115i9uiwmvsa11mwaa00vwc6ic437 [1] https://www.scientificamerican.com/article/ai-generated-data-can-poison-future-ai-models/ [2] https://www.nature.com/articles/d41586-024-00478-x [3] https://www.sciencedirect.com/science/article/pii/S2588912517300085?via%3Dihub [4] https://www.nature.com/articles/s41545-021-00101-w [5] https://www.ucsusa.org/resources/water-power-plant-cooling [6] https://www.datacenterdynamics.com/en/analysis/data-center-water-usage-remains-hidden/ [7] https://www.datacenterdynamics.com/en/opinions/an-industry-in-transition-1-data-center-water-use/ [8] https://www.nbcnews.com/tech/internet/drought-stricken-communities-push-back-against-data-centers-n1271344 [9] https://time.com/5814276/google-data-centers-water/ [10] https://unesdoc.unesco.org/ark:/48223/pf0000372985.locale=en [11] https://www.iea.org/reports/the-role-of-critical-minerals-in-clean-energy-transitions/executive-summary [12] https://www.theguardian.com/us-news/2023/jan/24/us-electric-vehicles-lithium-consequences-research [13] https://www.theguardian.com/us-news/2023/jan/24/us-electric-vehicles-lithium-consequences-research [14] https://www.climateandcommunity.org/_files/ugd/d6378b_3b79520a747948618034a2b19b9481a0.pdf [15] https://www.scientificamerican.com/article/world-s-richest-man-picks-energy-miracles/ [16] https://www.technologyreview.com/2021/02/14/1018296/bill-gates-climate-change-beef-trees-microsoft/ [17] https://www.gatesnotes.com/energy/energy-miracles [18] https://www.ipcc.ch/site/assets/uploads/sites/2/2019/06/SR15_Full_Report_High_Res.pdf [19] https://www.huffpost.com/entry/gassing-satartia-mississippi-co2-pipeline_n_60ddea9fe4b0ddef8b0ddc8f [20] https://news.stanford.edu/2019/10/25/study-casts-doubt-carbon-capture/ [21] https://www.vice.com/en/article/7kb43x/shell-quest-carbon-capture-plant-alberta [22] https://www.washingtonpost.com/news/energy-environment/wp/2016/02/11/the-solution-to-climate-change-that-has-nothing-to-do-with-cars-or-coal/?itid=lk_inline_manual_26 [23] https://www.wri.org/insights/direct-air-capture-resource-considerations-and-costs-carbon-removal Credits Music by https://www.youtube.com/@UC_6hQy4elsyHhCOskZo0U5g Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
bU8UR_T8SV4 | 22 Feb 2024
Our World In Data is a credible publication. But they don't represent the broader scientific community, much of which disagrees with their perspectives and assessments. Listen to the footnote episode providing some additional info and context: https://www.patreon.com/posts/98991064 Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone There is an increasing amount of content sponsored by billionaire philanthropies. A lot of this content relies on Our World In Data as a primary source or to arrive to conclusion from a scientific discourse. This is a vast topic so this video only covers a single issue - hunger and food supply. Sources [references in the transcript] [0] https://www.cjr.org/criticism/gates-foundation-journalism-funding.php [1] https://www.thenation.com/article/society/bill-gates-foundation-philanthropy/ [2] https://archive.globalpolicy.org/images/pdfs/GPFEurope/Philanthropic_Power_online.pdf [3] https://www.theguardian.com/global-development/2016/jan/15/bill-gates-rockefeller-influence-agenda-poor-nations-big-pharma-gm-hunger [4] https://web.archive.org/web/20221103100100/https://ourworldindata.org/funding [5] https://web.archive.org/web/20221103100112/https://ourworldindata.org/coverage [6] https://www.researchgate.net/publication/374459550_Recalibrating_Data_on_Farm_Productivity_Why_We_Need_Small_Farms_for_Food_Security [7] https://www.sciencedirect.com/science/article/pii/S2211912417301293 [8] https://www.etcgroup.org/sites/www.etcgroup.org/files/files/etc-whowillfeedus-english-webshare.pdf [9] https://ourworldindata.org/smallholder-food-production [10] https://web.archive.org/web/20161012025719/http://acbio.org.za/wp-content/uploads/2015/03/EGS-convening-introduction.pdf [11] https://web.archive.org/web/20210923065344/https://www.theguardian.com/global-development/2021/sep/23/small-farmers-have-the-answer-to-feeding-the-world-why-isnt-the-un-listening [12] https://www.theguardian.com/global-development/2021/sep/23/small-farmers-have-the-answer-to-feeding-the-world-why-isnt-the-un-listening [13] https://www.sciencedirect.com/science/article/pii/S2211912417301293 [14] https://www.sciencedirect.com/science/article/pii/S0305750X2100067X? [15] https://www.etcgroup.org/content/backgrounder-small-scale-farmers-and-peasants-still-feed-world [16] https://www.etcgroup.org/sites/www.etcgroup.org/files/files/31-01-2022_small-scale_farmers_and_peasants_still_feed_the_world.pdf [17] https://www.sciencedirect.com/science/article/pii/S0306919221001482 [18] https://intapi.sciendo.com/pdf/10.1515/vjbsd-2015-0011 [19] https://www.science.org/doi/10.1126/sciadv.abb8235 [20] https://grain.org/article/entries/4929-hungry-for-land-small-farmers-feed-the-world-with-less-than-a-quarter-of-all-farmland [21] https://www.fao.org/3/i2215e/i2215e.pdf [22] https://ijsaf.org/index.php/ijsaf/article/view/161 [23] https://www.ifad.org/documents/38714170/39135645/smallholders_report.pdf/133e8903-0204-4e7d-a780-bca847933f2e [24] https://www.wwf.eu/?4049841/fifteen-per-cent-of-food-is-lost-before-leaving-the-farm-WWF-report [25] https://www.epa.gov/land-research/farm-kitchen-environmental-impacts-us-food-waste [26] https://ipes-food.org/_img/upload/files/AnotherPerfectStorm.pdf [27] https://www.fao.org/3/i2497e/i2497e.pdf [28] https://www.sciencedirect.com/science/article/abs/pii/S0306919203000769?via%3Dihub [29] https://www.antitrustinstitute.org/wp-content/uploads/2020/01/CPI-Moss.pdf [30] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3039724 [31] https://www.sciencedirect.com/science/article/abs/pii/S0306919203000769?via%3Dihub [32] https://www.antitrustinstitute.org/wp-content/uploads/2015/05/58SDLRev543.2013.pdf [33] https://www.researchgate.net/publication/314477478_Seeds_Patents_and_Power_The_Shifting_Foundation_of_Our_Food_System [34] https://www.ers.usda.gov/publications/pub-details/?pubid=42531 [35] https://www.mdpi.com/2071-1050/1/4/1266#fig_body_display_sustainability-01-01266-f001 [36] https://www.sciencedirect.com/science/article/abs/pii/S0169515003000598 [37] https://www.unep.org/news-and-stories/story/how-feed-10-billion-people [38] https://www.fao.org/3/y5609e/y5609e02.htm [39] https://www.nature.com/articles/s41558-020-00925-3 [40] https://www.nationalgeographic.co.uk/environment-and-conservation/2022/05/fruits-and-vegetables-are-less-nutritious-than-they-used-to-be [41] https://www.fao.org/3/cb7654en/cb7654en.pdf [42] https://www.oecd.org/agriculture/understanding-the-global-food-system/how-we-feed-the-world-today/ [43] https://www.fao.org/3/cc3017en/cc3017en.pdf [44] https://www.un.org/sustainabledevelopment/hunger/#tab-6f500e1aa274b23d96d Music by Karl Casey from White Bat Audio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video are for commentary and thus protected under the Fair Use laws of the United States Copyright act of 1976.
STYgeA9VScc | 03 Nov 2023
BlackRock allegedly owns and controls the world. But the investment giant claims they are just impartial shareholders. What is really going on? Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone According to popular theories on social media BlackRock owns almost all of the biggest corporations around the world. They own the big tech, big pharma, big everything AND the mainstream media. This insinuates their hidden influence and secret agenda they supposedly enforce on the corporate world. BlackRock is is indeed among the largest shareholders in the biggest corporations across all sectors of the economy. This isn't hidden information. Anyone can pull this up from publicly available sources. But the catch is that BlackRock doesn't legally own anything. The $10,000,000,000 in assets they have are under management on behalf of their clients. The issue of BlackRock's power and influence has been well studied and analyzed by economists for years. It isn't just about raw numbers on the ownership list of big corporations. Economists found that many major problems that plague our economy today can be directly attributed to the concentration of economic power by BlackRock and the like. Stagnation in innovation, rise of consumer prices, decreasing wealth of the working class, even income inequality. There is no need to believe in conspiracy theories. Rational explanation is bad enough. Sources (references available in the transcript) [0] https://www.reuters.com/article/factcheck-business-investment-idUSL2N2WI1K4 [1] https://www.statista.com/statistics/1260855/vanguard-aum/ [2] https://www.statista.com/statistics/1378611/worldwide-investment-fund-firms-leading-by-assets-under-management/ [3] https://www.bloomberg.com/news/features/2020-01-09/the-hidden-dangers-of-the-great-index-fund-takeover [4] https://www.bu.edu/bulawreview/files/2019/06/BEBCHUK-HIRST-1.pdf [5] https://www.cambridge.org/core/journals/business-and-politics/article/hidden-power-of-the-big-three-passive-index-funds-reconcentration-of-corporate-ownership-and-new-financial-risk/30AD689509AAD62F5B677E916C28C4B6 [6] https://www.ft.com/content/3b80cd1d-8913-4019-b6aa-b6f6ddb155a5 [7] https://www.bloomberg.com/news/features/2020-01-09/the-hidden-dangers-of-the-great-index-fund-takeover [8] https://www.sec.gov/ix?doc=/Archives/edgar/data/93751/000009375123000642/stt-20230630.htm [9] https://www.sec.gov/ix?doc=/Archives/edgar/data/1364742/000095017023038497/blk-20230630.htm [10] https://www.morningstar.com/asset-management-companies/vanguard-BN00000AAL [11] https://www.ft.com/content/a7e20d96-318c-11ea-9703-eea0cae3f0de [12] https://ssrn.com/abstract=2359690 [13] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2872754 [14] https://abfer.org/media/abfer-events-2015/annual-conference/corporate-finance/behind-the-scenes-the-corporate-governance-preferences-of-institutional-investors.pdf [15] https://www.nytimes.com/2021/06/09/business/exxon-mobil-engine-no1-activist.html [16] https://www.netzeroassetmanagers.org/ [17] https://www.cnbc.com/2022/05/11/blackrock-to-vote-for-fewer-climate-provisions-in-2022-than-2021.html [18] https://www.reuters.com/article/us-blackrock-fink-idUSKBN1ZD12B [19] https://static1.squarespace.com/static/5d4df99c531b6d0001b48264/t/5d8006692e5b035cf0d2b17f/1568674165939/assetmanagerreport2019.pdf [20] http://ssrn.com/abstract=2802332 [21] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3293822 [22] http://ssrn.com/abstract=2802332 [23] https://columbialawreview.org/wp-content/uploads/2019/12/Bebchuk-Hirst-Index_Funds_and_the_Future_of_Corporate_Governance.pdf [24] https://www.brookings.edu/wp-content/uploads/2017/09/2_gutierrezphilippon.pdf [25] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2710252 [26] https://www.aeaweb.org/conference/2020/preliminary/2034# [27] https://www.mckinsey.com/~/media/mckinsey/featured%20insights/employment%20and%20growth/a%20new%20look%20at%20the%20declining%20labor%20share%20of%20income%20in%20the%20united%20states/mgi-a-new-look-at-the-declining-labor-share-of-income-in-the-united-states.pdf [28] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2811221 [29] https://www.wsj.com/articles/bogle-sounds-a-warning-on-index-funds-1543504551 [30] https://www.theatlantic.com/ideas/archive/2021/04/the-autopilot-economy/618497/ Credits Music by: CO.AG Music, White Bat Audio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
nQ9LR8homt4 | 19 Sep 2023
The popular belief that iPhone is a privacy alternative to Android is wrong. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Privacy is ultimately about taking control over what happens to your data. The less control you have, the more exposed you are. Most companies, much like Apple and Google, are working towards restricting user controls over their own devices. It's as simple as restricting where users can download apps from to an only place controlled by the platform. Or not allowing users to change default apps for messaging or browsing. Or not giving users an option to fully utilize their devices without self-identification to the company. Unlike iOS on the iPhone, Android is a fundamentally open platform. Any restrictions put in place by Google can be reversed by the user, thus gaining leverage over what happens to your data far greater than you could ever get on an iPhone. Apple made iPhones very secure, much like Google did with Pixel phones. But security isn't the only privacy prerequisite. You need to have a comprehensive strategy that addresses other threats such as linkability and identifiability effectively. Only Android allows you to do that. Sources (references are available in the transcript) [0] https://www.bbc.com/news/world-asia-china-48607723 [1] https://www.vice.com/en/article/wxn7nq/anti-xi-jinping-posters-are-spreading-in-china-via-airdrop [2] https://edition.cnn.com/2022/11/11/business/china-apple-airdrop-function-restricted-hnk-intl/index.html [3] https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html [4] ttps://www.tomsguide.com/news/apple-google-blizzard-hong-kong-protests [5] https://www.nytimes.com/2019/10/09/technology/apple-hong-kong-app.html [6] https://www.technologyreview.com/2019/09/10/102646/the-new-battle-in-hong-kong-isnt-on-the-streets-its-in-the-apps/ [7] https://www.scmp.com/news/china/politics/article/3223303/apples-airdrop-focus-china-moves-restrict-wi-fi-bluetooth-file-sharing-over-national-security [8] https://www.wsj.com/articles/apples-airdrop-in-the-crosshairs-of-chinas-national-security-crackdown-fa787f67 [9] https://www.statista.com/statistics/953646/hong-kong-smartphone-market-share-by-vendor/ [10] https://en.wikipedia.org/wiki/Android_(operating_system)#Licensing [11] https://source.android.com/ [12] https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619 [13] https://www.apple.com/legal/privacy/data/en/apple-id/ [14] https://endoflife.date/iphone [15] https://endoflife.date/pixel [16] https://www.old.linddun.org/disclosure-of-information [17] https://linddun.org/threat-types/ [18] https://downloads.linddun.org/linddun-trees/tree-full/v20230802/Identifying.pdf [19] https://policies.google.com/privacy#infocollectc [20] https://www.apple.com/legal/privacy/en-ww/ [21] https://harvardlawreview.org/2021/05/geofence-warrants-and-the-fourth-amendment/ [22] https://www.wired.com/story/geofence-warrants-google/ [23] https://transparencyreport.google.com/user-data/overview [24] https://www.apple.com/legal/transparency/us.html [25] https://www.phoenixnewtimes.com/news/google-geofence-location-data-avondale-wrongful-arrest-molina-gaeta-11426374 [26] https://support.google.com/android/answer/7664951?hl=en [27] https://www.makeuseof.com/how-to-remove-unwanted-default-apps-on-android-without-root/ [28] https://grapheneos.org/usage#sandboxed-google-play [29] https://grapheneos.org/features#grapheneos [30] https://www.wired.com/story/apple-privacy-data-collection/ [31] https://www.theguardian.com/technology/2022/sep/23/apple-user-data-law-enforcement-falling-short [32] https://support.apple.com/en-us/HT212650 [33] https://www.apple.com/newsroom/2022/07/apple-expands-commitment-to-protect-users-from-mercenary-spyware/ [34] https://www.apple.com/legal/privacy/data/en/apple-advertising/ [35] https://www.apple.com/legal/privacy/data/en/app-store/ [36] https://grapheneos.org/usage#wifi-privacy [37] https://support.apple.com/en-us/HT212025 [38] https://developer.apple.com/documentation/apptrackingtransparency [39] https://support.google.com/googleplay/android-developer/answer/6048248? [40] https://support.google.com/My-Ad-Center-Help/answer/12155656 [41] https://techcrunch.com/2022/09/06/one-year-later-apples-privacy-changes-helped-boost-its-own-ads-business-report-finds/ [42] https://developer.apple.com/app-store/app-privacy-details/ [43] https://developer.android.com/reference/android/Manifest.permission [44] https://support.apple.com/en-us/HT202303 [45] https://support.apple.com/guide/security/welcome/web [46] https://support.apple.com/guide/iphone/use-built-in-privacy-and-security-protections-iph6e7d349d1/ios [47] https://blog.google/technology/safety-security/keeping-private-information-private/ [48] https://blog.research.google/2022/02/federated-learning-with-formal.html Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/
Nxw3tfISTTA | 31 Jul 2023
When the biggest bank in the world can get away with everything, what do the rules even mean? Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone HSBC wasn't just an unwitting vector. They were proactively implicit in the schemes their clients were accused of. The bank developed several methods to help their clients hide their assets. HSBC actively used strict Swiss secrecy laws to reassure their clients that their assets were safe from the jurisdiction of their local authorities. But this wouldn't be enough for clients with not so legitimate intentions. So the bank came up with a scheme they called "hold mail" accounts. A hold mail account was a service offered to wealthy customers that would function without any correspondence of any kind going between clients and the bank. HSBC was very successful at attracting the highest value clientele from around the world. The list didn't contain just some random millionaires and businessmen. The Swiss bank accommodated the very top of the world's ruling elites. From royalty, through oligarchs to dictators. Sources (references available in the official transcript) [0] https://www.theguardian.com/business/2001/sep/13/3 [1] https://www.theguardian.com/business/2004/may/31/1 [2] https://www.telegraph.co.uk/finance/2733877/Ex-HSBC-officer-held-in-Monaco.html [3] https://www.newyorker.com/magazine/2016/05/30/herve-falcianis-great-swiss-bank-heist [4] https://www.nytimes.com/2013/08/09/business/global/a-whistle-blower-who-can-name-names-of-swiss-bank-account-holders.html [5] https://en.wikipedia.org/wiki/Swiss_Leaks [6] https://www.lemonde.fr/en/archives/article/2022/03/14/swissleaks-the-backstory-of-a-worldwide-investigation_5978499_113.html [7] https://web.archive.org/web/20150218004301/http://www.lemonde.fr/economie/article/2014/01/27/listes-hsbc-la-saga-d-une-enquete-explosive-sur-l-evasion-fiscale_4354981_3234.html [8] https://www.theguardian.com/business/2010/mar/11/hsbc-inquiry-stolen-swiss-accounts [9] https://www.scmp.com/news/world/article/1933624/panama-papers-hsbc-helped-rich-clients-register-more-2300-shell-companies [10] https://indianexpress.com/article/world/world-news/panama-papers-hsbc-ubs-credit-suisse-other-banks-helped-wealthy-hide-assets/ [11] https://www.reuters.com/article/us-panama-tax-banks-idUSKCN0X208M [12] https://www.theguardian.com/news/2016/apr/07/ex-hsbc-boss-michael-geoghegan-panama-papers-tried-to-avoid-tax-kensington-house [13] https://www.icij.org/investigations/swiss-leaks/banking-giant-hsbc-sheltered-murky-cash-linked-dictators-and-arms-dealers/ [14] https://www.lexpress.fr/economie/georgina-mikhael-manipulee-ou-complice-dans-l-affaire-hsbc_856233.html [15] https://www.theguardian.com/business/2015/feb/09/hsbc-files-richard-caring-2million-cash-withdrawal [16] https://www.nytimes.com/2008/01/31/us/politics/31donor.html? [17] https://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/DRC%20S%202001%20357.pdf [18] https://www.spiegel.de/international/europe/corruption-continues-virtually-unchecked-in-greece-a-861327.html [19] https://www.nytimes.com/2012/10/28/world/europe/list-of-swiss-accounts-turns-up-the-heat-in-greece.html? [20] https://www.theguardian.com/world/2012/oct/28/greek-editor-court-tax-evaders [21] https://www.bbc.co.uk/news/world-europe-20116548 [22] https://www.nytimes.com/2012/10/05/world/europe/greece-former-government-official-found-dead.html [23] https://www.independent.co.uk/news/world/europe/mysterious-death-in-jakarta-hotel-of-second-man-exposed-on-lagarde-list-8204537.html [24] https://www.hsgac.senate.gov/imo/media/doc/PSI%20REPORT-HSBC%20CASE%20HISTORY%20(9.6)2.pdf [25] https://qz.com/35590/hsbcs-record-1-9-billion-money-laundering-fine-is-the-bank-equivalent-of-a-stiff-speeding-ticket [26] https://www.buzzfeednews.com/article/jasonleopold/fincen-files-financial-scandal-criminal-networks [27] https://www.ft.com/content/28c5744a-b03f-11e4-92b6-00144feab7de [28] https://www.icij.org/investigations/fincen-files/hsbc-moved-vast-sums-of-dirty-money-after-paying-record-laundering-fine/ [29] https://www.reuters.com/article/hsbc/rpt-insight-u-s-probe-of-hsbc-tangled-up-in-bureaucracy-infighting-idUSL1E8KPME620120926 [30] https://www.buzzfeednews.com/article/jsvine/fincen-files-explainer-data-money-transactions [31] https://www.buzzfeednews.com/article/jasonleopold/fincen-files-financial-scandal-criminal-networks [32] https://www.icij.org/investigations/fincen-files/mining-sars-data/ [33] https://www.buzzfeednews.com/article/anthonycormier/hsbc-money-laundering-drug-cartels Credits Music by: CO.AG Music and White Bat Audio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
OH4uh8cHuto | 19 Jun 2023
Billionaire philanthropy is not just charitable giving. It's an investment venture before anything else. Then it's about hoarding wealth, avoiding taxes and getting some positive PR for it. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Private foundation is an institution with a very special status. They are tax exempt private organizations yet they are still allowed to invest into for profit companies. Foundations can hold corporate stocks and bonds and generate revenue this way. There is only one major condition they have to fulfill to keep their tax exempt status - and that is to donate 5% of foundation's total assets on annual basis. So when you hear a billionaire donating their wealth to charity and it's going through a foundation, up to 95% of it can go into profitable investments. In practice, all foundations' assets in the US amount to more than $1 trillion. Yet, they donated only $90.88 billion in 2021. Sources (references are available in the transcript) [0a] https://nccs.urban.org/publication/nonprofit-sector-brief-2019#recipients [0b] https://www.statista.com/statistics/250878/number-of-foundations-in-the-united-states/ [1] https://www.propublica.org/article/the-secret-irs-files-trove-of-never-before-seen-records-reveal-how-the-wealthiest-avoid-income-tax [2] https://www.nytimes.com/2021/06/08/us/politics/income-taxes-bezos-musk-buffett.html [3] https://www.irs.gov/charities-non-profits/charitable-organizations/private-foundations [4] https://www.irs.gov/charities-non-profits/private-foundations/taxes-on-failure-to-distribute-income-private-foundations [5] https://www.nptrust.org/philanthropic-resources/charitable-giving-statistics/ [6] https://www.issuelab.org/resources/36381/36381.pdf [7] https://www.gatesfoundation.org/about/financials [8] https://www.thenation.com/article/society/bill-gates-foundation-philanthropy/ [9] https://www.latimes.com/archives/la-xpm-2007-jan-07-na-gatesx07-story.html [10] https://www.sec.gov/Archives/edgar/data/1166559/000110465923060842/0001104659-23-060842-index.html [11] https://www.sec.gov/Archives/edgar/data/1663801/000089843223000302/0000898432-23-000302-index.html [12a] https://www.latimes.com/archives/la-xpm-2012-may-18-la-ford-foundation-los-angeles-times-20120517-story.html [12b] https://archives.cjr.org/behind_the_news/ford_foundation_los_angeles_ti.php [13] https://jacobin.com/2015/11/philanthropy-charity-banga-carnegie-gates-foundation-development/ [14] https://www.washingtonpost.com/local/education/pearson-pays-77-million-in-common-core-settlement/2013/12/13/77515bba-6423-11e3-aa81-e1dab1360323_story.html [15] https://www.sec.gov/Archives/edgar/data/1067983/000095012323005270/0000950123-23-005270-index.html [16] https://philanthropynewsdigest.org/news/gates-foundation-awards-11-million-for-financial-inclusion-in-africa [17] https://news.stanford.edu/2018/12/03/the-problems-with-philanthropy/ [18] https://www.washingtonpost.com/education/2021/05/05/what-bill-melinda-gates-did-to-education/ [19] https://www.washingtonpost.com/politics/how-bill-gates-pulled-off-the-swift-common-core-revolution/2014/06/07/a830e32e-ec34-11e3-9f5c-9075d5508f0a_story.html [20] https://www.chalkbeat.org/2018/6/21/21105193/the-gates-foundation-bet-big-on-teacher-evaluation-the-report-it-commissioned-explains-how-those-eff [21] https://www.currentaffairs.org/2021/05/humanity-does-not-need-bill-gates [22] https://yewtu.be/watch?v=ag5zQeXC-TY [23] https://www.prweb.com/releases/2014/02/prweb11601976.htm [24] https://www.washingtonpost.com/news/answer-sheet/wp/2015/09/23/common-core-the-gift-that-pearson-counts-on-to-keep-giving/ [25] https://www.washingtonpost.com/education/2020/02/10/bill-melinda-gates-have-spent-billions-dollars-shape-education-policy-now-they-say-theyre-skeptical-billionaires-trying-do-just-that/ [26] https://www.youtube.com/watch?v=VfRJx6x764U [27] https://www.philanthropyroundtable.org/almanac/statistics-on-u-s-generosity/[28] https://www.charitywatch.org/nonprofit-compensation-packages-of-1-million-or-more [29] https://www.nytimes.com/2013/07/27/opinion/the-charitable-industrial-complex.html [30] https://www.latimes.com/archives/la-xpm-2007-jan-07-na-gatesx07-story.html [31] https://www.latimes.com/business/la-na-gatesx7jan07-sg-storygallery.html [32] https://www.latimes.com/business/la-na-gates8jan8-story.html [33] https://policy-practice.oxfam.org/resources/carbon-billionaires-the-investment-emissions-of-the-worlds-richest-people-621446/ [34] https://www.oxfam.org/en/research/time-care → PDF report [35] https://www.oxfam.org/en/research/survival-richest → PDF report Credits Music by: CO.AG Music; White Bat Audio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ag5zQeXC-TY | 09 May 2023
Bill Gates used his immense wealth and connections to influence how trillions of public funds are spent on education in the US. This is how it happened. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps 00:00 Introduction 02:05 Small schools 04:00 Common Core 07:31 Opposition to the Common Core State Standards 12:40 Teacher evaluation & introducing competition among teachers 16:18 Influencing curriculum 18:16 Why is Bill Gates so heavily involved in influencing public school policy? 20:42 End me Gates and his Foundation have been celebrated for endeavors in poverty and health care around world. But when you analyze the publicly available grant database, you’ll see that in the last two decades the Gates Foundation dedicated more than $10+ billion to education agenda in the United States. Gates’ connections and wealth were able to dictate the fate of trillions of tax payers money that followed his investments. Gates became the main architect of US public school policy, bankrolling research, deployment and lobbying campaigns that pushed for a reform after reform according to the whims of the world's most influential elite. Sources [citations available in the video transcript (i.e. subtitles)] [0] https://www.gatesfoundation.org/about/foundation-fact-sheet [1] https://www.forbes.com/profile/bill-gates/?list=billionaires&sh=208d2042689f [2] https://www.cia.gov/the-world-factbook/field/real-gdp-purchasing-power-parity/country-comparison [3] https://www.gatesfoundation.org/about/committed-grants [4] https://www.youtube.com/watch?v=VfRJx6x764U [5] https://www.washingtonpost.com/politics/how-bill-gates-pulled-off-the-swift-common-core-revolution/2014/06/07/a830e32e-ec34-11e3-9f5c-9075d5508f0a_story.html [6] https://archive.seattletimes.com/archive/?date=20000320&slug=4011028 [7] https://www.washingtonpost.com/education/2021/05/05/what-bill-melinda-gates-did-to-education/ [8] https://www.washingtonpost.com/education/2020/02/10/bill-melinda-gates-have-spent-billions-dollars-shape-education-policy-now-they-say-theyre-skeptical-billionaires-trying-do-just-that/ [9] https://www.gatesfoundation.org/ideas/annual-letters/annual-letter-2009 [10] https://www.currentaffairs.org/2021/05/humanity-does-not-need-bill-gates [11] https://www.washingtonpost.com/news/answer-sheet/wp/2015/11/12/the-astonishing-amount-of-data-being-collected-about-your-children [12] https://www.washingtonpost.com/news/answer-sheet/wp/2018/06/29/bill-gates-spent-hundreds-of-millions-of-dollars-to-improve-teaching-new-report-says-it-was-a-bust/ [13] https://journals.sagepub.com/doi/abs/10.3102/0013189X16651087 [14] https://www.seattletimes.com/seattle-news/rush-hour-protest-by-teachers-to-target-the-gates-foundation/ [15] https://www.marketplace.org/2014/09/15/day-life-data-mined-kid/ [16] https://www.prweb.com/releases/2014/02/prweb11601976.htm [17] https://www.washingtonpost.com/news/answer-sheet/wp/2015/09/23/common-core-the-gift-that-pearson-counts-on-to-keep-giving/ [18] https://abcnews.go.com/US/bill-gates-education-microsoft-founder-schools-teaching-teachers/story? [19] https://schargel.com/blog/bill-gates-admits-that-small-schools-are-not-the-answer/ [20] https://www.tampabay.com/news/education/k12/eakins-panel-will-help-hillsborough-schools-move-on-from-the-gates-grant/2251811/ [21] http://www.tampabay.com/news/education/k12/sticker-shock-how-hillsborough-countys-gates-grant-became-a-budget-buster/2250988 [22] https://www.chalkbeat.org/2018/6/21/21105193/the-gates-foundation-bet-big-on-teacher-evaluation-the-report-it-commissioned-explains-how-those-eff [23] https://www.gatesnotes.com/Council-of-Great-City-Schools [24] https://www.cnbc.com/2017/10/30/bill-gates-is-spending-1-point-7-billion-on-fixing-education-in-the-us.html [25] https://www.chalkbeat.org/posts/us/2017/11/21/why-the-phrase-with-fidelity-is-an-affront-to-good-teaching/ [26] https://apnews.com/article/melinda-gates-north-america-bill-and-melinda-gates-foundation-us-news-ap-top-news-a4042e82ffaa4a34b50ceac464761957 [27] https://www.chalkbeat.org/2017/10/19/21103585/gates-foundation-to-move-away-from-teacher-evals-shifting-attention-to-networks-of-public-schools [28] https://www.chalkbeat.org/2018/2/6/21104253/with-new-focus-on-curriculum-gates-foundation-wades-into-tricky-territory [29] https://www.thenation.com/article/society/bill-gates-foundation-philanthropy/ [30] https://www.nytimes.com/2021/05/25/opinion/bill-melinda-gates-foundation.html [31] https://www.latimes.com/opinion/editorials/la-ed-gates-education-20160601-snap-story.html [32] https://abcnews.go.com/US/wireStory/gates-foundation-donates-1b-prioritize-math-education-91736560 https://www.rand.org/pubs/research_reports/RR2242.html Credits Music by CO.AG Music and White Bat Audio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ All clips and footage used under Fair Use.
HjHMoNGqQTI | 08 Dec 2022
Kurzgesagt is not just a popular science outreach channel. It's a major tool for propaganda of their billionaire sponsors. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Kurzgesagt received estimated $7 million from billionaire funds. This would be more money than Kurzgesagt received from their supporters on Patreon (estimated $3.5 million) in the entire history of the channel. Kurzgesagt never was this small, independent, almost entirely viewer-funded channel. As soon as the studio incorporated, billionaires began lining up. They transformed the small Munich-based design studio with 5 employees into a multi-million-dollar media powerhouse with dozens of employees. Sources [First half only; second part in the pinned comment] [0] https://web.archive.org/web/20221108134548/https://www.youtube.com/watch?v=qNWWrDBRBqk [1] https://www.reuters.com/article/us-diseases-neglected-pharma-idUSTRE80T0LO20120130 [2] https://en.wikipedia.org/wiki/London_Declaration_on_Neglected_Tropical_Diseases [3] https://www.gatesfoundation.org/Ideas/Media-Center/Press-Releases/2012/01/private-and-public-partners-unite-to-combat-10-neglected-tropical-diseases-by-2020 [4] https://www.businessinsider.com/r-fight-against-neglected-tropical-diseases-needs-big-pharma-push-who-2017-4 [5] https://www.latimes.com/nation/la-na-gates16dec16-story.html [6] https://academic.oup.com/bmb/article/93/1/179/307584? [7] https://www.thelancet.com/journals/lancet/article/PIIS0140673609608850/fulltext? [8] https://www.vox.com/2015/6/10/8760199/gates-foundation-criticism [9] https://jamanetwork.com/journals/jama/fullarticle/2762308 [10] https://www.thenation.com/article/society/bill-gates-foundation-philanthropy/ [11] https://www.latimes.com/archives/la-xpm-2007-jan-07-na-gatesx07-story.html [12] https://www.washingtonpost.com/education/2020/02/10/bill-melinda-gates-have-spent-billions-dollars-shape-education-policy-now-they-say-theyre-skeptical-billionaires-trying-do-just-that/ [13] https://apnews.com/a4042e82ffaa4a34b50ceac464761957 [14] https://news.gallup.com/poll/1597/confidence-institutions.aspx [15a] https://medium.com/@Kurzgesagt/kurzgesagt-sponsorships-on-youtube-3121a45b0fe9 [15b] https://web.archive.org/web/20221122151542/https://www.youtube.com/watch?v=0KQYNtPl7V4&lc=Ugw7oaypQ3qALcugYzh4AaABAg [16] https://www.gatesfoundation.org/about/committed-grants/2015/11/opp1139276 [17] https://www.openphilanthropy.org/grants/kurzgesagt-video-creation-and-translation/ [18a] https://www.openphilanthropy.org/grants/kurzgesagt-short-form-video-content/ [18b] https://web.archive.org/web/20220000000000*/https://www.patreon.com/Kurzgesagt [19] https://ourworldindata.org/funding [20] https://en.wikipedia.org/wiki/Our_World_In_Data#Funding_and_collaborations [21] https://web.archive.org/web/20221108134123/https://www.youtube.com/watch?v=QsBT5EQt348 [22] https://ourworldindata.org/extreme-poverty-in-brief [23] https://www.nytimes.com/2021/12/02/world/global-poverty-united-nations.html [24] https://theconversation.com/why-the-world-banks-optimism-about-global-poverty-misses-the-point-104963 [25] https://www.theguardian.com/global-development-professionals-network/2015/nov/01/global-poverty-is-worse-than-you-think-could-you-live-on-190-a-day [26] https://www.theguardian.com/commentisfree/2019/jan/29/bill-gates-davos-global-poverty-infographic-neoliberal [27] https://newint.org/features/2019/07/01/long-read-progress-and-its-discontents [28] https://www.theguardian.com/news/2019/feb/25/modern-slavery-trafficking-persons-one-in-200 [29] https://www.thelancet.com/journals/lanplh/article/PIIS2542-5196%2820%2930196-0/fulltext [30] https://oxfam.app.box.com/s/1rp115i9uiwmvsa11mwaa00vwc6ic437 [31] https://qz.com/1402301/bill-gatess-1-billion-energy-fund-is-expanding-its-portfolio-of-startups-fighting-climate-change [32] https://www.wired.com/2015/11/zuckerberg-gates-climate-change-breakthrough-energy-coalition/ [33] https://qz.com/859860/bill-gates-is-leading-a-new-1-billion-fund-focused-on-combatting-climate-change-through-innovation [34] https://news.stanford.edu/2019/10/25/study-casts-doubt-carbon-capture/ [35] https://www.wired.com/story/the-potential-pitfalls-of-sucking-carbon-from-the-atmosphere/ [36] https://www.technologyreview.com/2021/07/08/1027908/carbon-removal-hype-is-a-dangerous-distraction-climate-change/ [37] https://www.ipcc.ch/site/assets/uploads/sites/2/2019/06/SR15_Full_Report_High_Res.pdf [38] https://grist.org/technology/orca-the-largest-carbon-removal-facility-to-date-is-up-and-running/ [39] https://climeworks.com/roadmap/orca [40] https://www.ft.com/content/8a942e30-0428-4567-8a6c-dc704ba3460a Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
fKNAXLX6pKg | 08 Oct 2022
Social media is flooded with CIA propaganda disseminated by former spies. Their lies are dangerous and need to be dealt with. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone CIA now has a large social media presence with multi-million-follower accounts on Twitter, Instagram and Twitter. The agency is using social media as a recruitment tool but another mission of their social media arm is to make the public view the CIA in a positive light. Anytime you are suggested content with a “CIA spy reacts” or an “interview with a former/current CIA operative” you are being enrolled into re-education class. This is dangerous. But how do I prove it to you? How do you know when a spy is telling you a lie passed down from the highest ranks in the government? Manipulation only works if you don’t know the whole truth. So allow me to show you the other side of the story. Sources 0. https://www.britannica.com/topic/propaganda 1. https://www.politico.com/news/2021/09/08/cia-least-covert-mission-510043 2. https://foreignpolicy.com/2020/06/25/cia-recruitment-joined-social-media-age/ 3. https://www.news.com.au/finance/work/leaders/wikileaks-password-is-an-anticia-jfk-quote/news-story/d6c1cc5385c4f1330bb87f1be2ecefa3 4. https://apnews.com/article/technology-business-race-and-ethnicity-intelligence-agencies-demographics-e22ea4d22d4564608d7972be95e570b9 5. https://www.washingtonexaminer.com/news/white-house/cia-makes-social-media-splash-with-i-spy-challenge-on-instagram 6. https://money.cnn.com/2018/02/02/media/youtube-state-funded-media-label/index.html 7. https://www.propublica.org/article/youtube-promised-to-label-state-sponsored-videos-but-doesnt-always-do-so 8. https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order 9. https://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records 10. https://www.pbs.org/newshour/politics/nsa-surveillance-doesnt-stop-terrorism-report-claims 11. http://www.newamerica.net/sites/newamerica.net/files/policydocs/Bergen_NAF_NSA%20Surveillance_1.pdf 12. https://www.nbcnews.com/news/world/nsa-program-stopped-no-terror-attacks-says-white-house-panel-flna2D11783588 13. https://www.theguardian.com/world/2013/sep/26/nsa-surveillance-anti-vietnam-muhammad-ali-mlk 14. https://www.theatlantic.com/culture/archive/2021/01/mlk-fbi-surveillance/617719/ 15. https://www.buzzfeednews.com/article/carolinehaskins1/george-floyd-protests-surveillance-technology 16. https://www.vox.com/recode/2020/5/29/21274828/drone-minneapolis-protests-predator-surveillance-police 17. https://www.fastcompany.com/90511912/the-long-ugly-history-of-how-police-have-tracked-protesters 18. https://source.android.com/devices/architecture 19. https://source.android.com/security/overview 20. https://developer.android.com/guide/platform/ 21. https://source.android.com/security/features 22. https://source.android.com/security/selinux/concepts 23. https://source.android.com/security/selinux/ 24. https://arxiv.org/pdf/1904.05572.pdf 25. https://www.reuters.com/article/us-dea-sod-idUSBRE97409R20130805 26. https://www.aclu.org/issues/national-security/privacy-and-surveillance/warrantless-surveillance-under-section-702-fisa 27. https://www.washingtonpost.com/national-security/fbi-and-nsa-violated-surveillance-law-or-privacy-rules-a-federal-judge-found/2020/09/04/b215cf88-eec3-11ea-b4bc-3a2098fc73d4_story.html 28. https://theintercept.com/2019/10/10/fbi-nsa-mass-surveillance-abuse/ 29. https://eji.org/news/united-states-still-has-highest-incarceration-rate-world/ 30. https://www.sentencingproject.org/criminal-justice-facts/ 31. https://www.sentencingproject.org/wp-content/uploads/2021/05/intl-rates.png 32. https://en.wikipedia.org/wiki/Useful_idiot Credits Music by: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
z7luwhj9a2w | 30 Aug 2022
Did intelligence operatives install backdoor into Huawei products? Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Huawei is the world’s largest manufacturer of telecommunications equipment and one of the top smartphone makers in the globe. The Huawei empire now sells products or carries the traffic of Internet users in 170 countries. And for over a decade, the Shenzen giant faced and dismissed accusations that they have pwned billions of users on behalf of the authoritarian Chinese government. Whether or not there is a Huawei backdoor must be thoroughly scrutinized before any conclusion can be made. Hard evidence is scarce. This is an analysis of all major accusations and allegations of backdoor planted into Huawei products. Sources 1. https://www.bloomberg.com/news/articles/2021-12-16/chinese-spies-accused-of-using-huawei-in-secret-australian-telecom-hack 2. https://www.statista.com/chart/16827/huawei-revenue-and-smartphone-market-share/ 3. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html 1. 3b https://www.forbes.com/companies/huawei/ 4. https://www.latimes.com/business/la-na-pol-trump-huawei-ban-20190515-story.html 5. https://www.techrepublic.com/article/evidence-of-backdoors-in-huawei-equipment-collapse-under-light-scrutiny/ 6. https://web.archive.org/web/20140423215024/http://www.afr.com/p/national/transcript_interview_with_former_KnS7JDIrw73GWlljxA7vdK 7. https://www.techrepublic.com/article/us-intelligence-chiefs-say-huawei-zte-products-pose-national-security-risk/ 8. https://www.latimes.com/business/technology/story/2020-02-12/huawei-equipment-has-backdoor-for-spying-white-house-claims 9. https://arstechnica.com/tech-policy/2020/02/us-gave-allies-evidence-that-huawei-can-snoop-on-phone-networks-wsj-says/ 10. https://www.wsj.com/articles/u-s-officials-say-huawei-can-covertly-access-telecom-networks-11581452256 11. https://www.reuters.com/article/us-at-t-huawei-tech-exclusive/exclusive-u-s-lawmakers-urge-att-to-cut-commercial-ties-with-huawei-sources-idUSKBN1F50GV 12. https://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html 13. https://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html 14. https://www.microsoft.com/security/blog/2019/03/25/from-alert-to-driver-vulnerability-microsoft-defender-atp-investigation-unearths-privilege-escalation-flaw/ 15. https://www.bbc.com/news/technology-47800000 16. https://www.theepochtimes.com/microsoft-finds-backdoor-in-huawei-laptops-that-could-give-hackers-access_2863926.html 17. https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/ 18. https://www.nytimes.com/2019/01/11/world/europe/poland-china-huawei-spy.html 19. https://www.nytimes.com/2019/01/26/us/politics/huawei-china-us-5g-technology.html 20. https://www.nytimes.com/2019/01/12/world/asia/huawei-wang-weijing-poland.html 21. https://www.tomshardware.com/news/cisco-backdoor-hardcoded-accounts-software,37480.html 22. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3372669 23. https://www.washingtonpost.com/world/2021/12/14/huawei-surveillance-china/ 24. https://www.washingtonpost.com/context/huawei-surveillance-voice-recording-analysis/b6523eb9-c55f-436e-bd8f-b3f1aa35b36d/?itid=lk_interstitial_manual_27 25. https://www.washingtonpost.com/context/huawei-surveillance-location-tracking/ce666144-f027-4405-9702-27e317893f56/?itid=lk_interstitial_manual_46 26. https://www.washingtonpost.com/context/huawei-surveillance-xinjiang-surveillance/c7b9de8a-920a-4380-a3ff-5420abf8c594/?itid=lk_interstitial_manual_55 27. https://www.washingtonpost.com/context/huawei-surveillance-prison-and-detention-center-monitoring/2661eb99-270e-4d9d-8fd9-2e7857f6e95d/?itid=lk_interstitial_manual_35 28. https://www.engadget.com/2019-12-26-huawei-denies-75-billion-china-aid-report.html 29. https://www.wired.com/story/law-expert-chinese-government-cant-force-huawei-make-backdoors/ Further reading https://www.bloomberg.com/news/articles/2019-04-30/vodafone-found-hidden-backdoors-in-huawei-equipment https://www.zdnet.com/article/huawei-denies-existence-of-backdoors-in-vodafone-networking-equipment-brands-them-technical-flaws/ https://www.theguardian.com/technology/2019/apr/30/alleged-huawei-router-backdoor-is-standard-networking-tool-says-firm https://www.lawfareblog.com/risk-analysis-huawei-5g Credits Music by: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
G_QsQp7DyjE | 13 Aug 2022
Become untraceable by creating anonymous identities. This is how it's done. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone The Internet is a giant network of privately owned spaces open to public, where every participant knows the exact identity and location of one another and where corporate stalking is a perfectly legitimate business model. If you are not okay with automated decisions being made about your every move, you should consider creating an anonymous identity. Anonymity is the most powerful mitigation strategy on a publicly observable network such as the Internet. It is the most direct path towards privacy. This guide will tell you exactly what you need to know and do in order to create and maintain your very own anonymous identity. The Internet is a privacy nightmare because every action is by default identifiable and linkable. That means actions always lead to a unique location and/or account on the network and actions can built a profile over time. Linkability and identifiability are your biggest privacy and anonymity threats on the Internet. For maximum anonymity, both of these threats need to be mitigated to the fullest extent possible. Our first step with any service will be to dissociate our account details from our personal information. The second step is to compartmentalize our anonymous identities so that they are isolated from our personal identities. Dissociation and isolation of your anonymous identities are not the only steps to keep your anonymity. Be extremely cautious of what types of data you submit to these services while using them. Always think of the linkability and identifiability threats when using these accounts. PRIVACY THREAT MODELING https://www.threatmodelingmanifesto.org/ LINDDUN strategy for threat modeling https://www.linddun.org/post/keys-to-successful-privacy-threat-modeling https://www.linddun.org/linddun https://www.linddun.org/_files/ugd/cc602e_cf7e4c6b1d894bdaabc3094c48b26869.pdf https://www.linddun.org/go-getting-started Linkability https://www.linddun.org/linkability Identifiability https://www.linddun.org/identifiability-1 Mitigation strategies https://www.linddun.org/mitigation-strategies-and-solutions RECOMMENDED TOOLS KeepassXC https://keepassxc.org/ Bitwarden https://bitwarden.com/ FIDO security keys https://fidoalliance.org/what-is-fido/ GrapheneOS https://grapheneos.org/ Orbot https://orbot.app/ Tor Browser https://www.torproject.org/ Tutanota https://tutanota.com/ ProtonMail https://proton.me/ Briar https://briarproject.org/ OnionShare https://onionshare.org/ Wire https://wire.com/en/ Matrix/Element https://element.io/ How to anonymously install applications https://www.privacyguides.org/android/#obtaining-applications Aurora Open Source Software https://auroraoss.com/ How to obtain an anonymous burner phone - The Intercept https://www.youtube.com/watch?v=r4gqRYkA9KE How to obtain an anonymous burner phone - The Hated One https://www.youtube.com/watch?v=vMJH-UJyENs NEWS SOURCES Google location tracking https://www.wsj.com/articles/states-file-new-suits-against-google-over-location-tracking-11643037890 Chainalysis https://www.coindesk.com/business/2022/08/04/chainalysis-estimates-2b-stolen-from-cross-chain-bridge-hacks-this-year/ Credits Music by: https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6AXkJ3dot2s | 01 Aug 2022
Privacy tutorial with a threat model methodology. This will help you achieve strong privacy consistently and reliably. Support independent research: https://www.patreon.com/thehatedone Privacy tools are inconsistent. The inventory of recommended countermeasures changes all the time. On the long enough timeline, you can’t trust any single product. So what if instead of focusing on the tools, you would learn a consistent method that would help you proactively mitigate privacy threats as they arise? This is exactly what this guide aims to give you. It will introduce you to a tested methodology with which you will be able to achieve strong privacy. The secret is to start with a threat model. For our threat modeling exercise, we will use LINDDUN Go cards to help us elicit and mitigate all the threats we could face in our time. Sources [0] https://duckduckgo.com/?q=site%3Agithub.com+%22privacyguides%22+%22remove%22&ia=web [1] https://www.bleepingcomputer.com/news/security/duckduckgo-browser-allows-microsoft-trackers-due-to-search-agreement/ [2] https://www.reuters.com/article/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT [3] https://www.cnbc.com/2020/05/07/zoom-buys-keybase-in-first-deal-as-part-of-plan-to-fix-security.html [4] https://www.vice.com/en/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text [5] https://www.linddun.org/post/keys-to-successful-privacy-threat-modeling [6] https://www.threatmodelingmanifesto.org/ [7] https://www.cisco.com/c/en/us/products/security/what-is-threat-modeling.html [8] https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf [9a] https://www.linddun.org/linddun [9b] https://yewtu.be/watch?v=C9F8X1j9Zpg [10] https://www.linddun.org/_files/ugd/cc602e_cf7e4c6b1d894bdaabc3094c48b26869.pdf [11] https://www.linddun.org/go-getting-started [12] https://yewtu.be/watch?v=7xqWQ1OTBpw [13] https://www.linddun.org/_files/ugd/cc602e_f98d9a92e4804e6a9631104c02261e1f.pdf [14] https://www.linddun.org/mitigation-strategies-and-solutions [15] https://hls.harvard.edu/dept/its/what-is-metadata/ [16] https://en.wikipedia.org/wiki/Metadata [17] https://yewtu.be/watch?v=tL8_caB35Pg [18] https://www.linddun.org/_files/ugd/cc602e_f913e70b2c014753aa4067d11a6ce493.pdf [19] https://www.linddun.org/_files/ugd/cc602e_46135199dc0d49308e76f30a1a657cf7.pdf [20] https://www.linddun.org/downloads/LINDDUN_tutorial.pdf [21] https://people.cs.kuleuven.be/~kim.wuyts/LINDDUN/LINDDUN.pdf [22] https://www.linddun.org/linkability [23] https://www.linddun.org/identifiability-1 [24] https://www.linddun.org/non-repudiation [25] https://www.linddun.org/detectability [26] https://www.linddun.org/disclosure-of-information [27] https://www.linddun.org/unawareness [28] https://www.linddun.org/non-compliance [29] https://www.linddun.org/mitigation-strategies-and-solutions [30] https://keepassxc.org/ [31] https://bitwarden.com/ [32] https://www.dongleauth.com [33] https://fidoalliance.org/what-is-fido/ [34] https://grapheneos.org/features#improved-user-profiles [35] https://signal.org/ [36] https://briarproject.org/ [37] https://tutanota.com/ [38] https://proton.me/ [39] https://security.googleblog.com/2018/10/building-titan-better-security-through.html [40] https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html [41] https://www.wired.com/story/google-titan-m-security-chip-pixel-3/ [42] https://safety.google/intl/en_us/pixel/ [43] https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html [44] https://www.apple.com/legal/privacy/data/en/apple-id/ [45] https://www.google.com/intl/en_us/policies/privacy/archive/20160829/ [46] https://grapheneos.org/faq#non-hardware-identifiers [47] https://grapheneos.org/usage#sandboxed-google-play [48] https://grapheneos.org/#never-google-serviceshttps://grapheneos.org/#never-google-services [49] https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands [50] https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid [51] https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xu [52] https://www.torproject.org/ [53] https://orbot.app/ [54] https://www.rollingstone.com/politics/politics-features/whatsapp-imessage-facebook-apple-fbi-privacy-1261816/ [55] https://briarproject.org/how-it-works/ [56] https://www.privacyguides.org/android/#obtaining-applications 57] https://proton.me/blog/proton-drive-early-access [58] https://cryptomator.org/ [59] https://www.veracrypt.fr/en/Home.html [60] https://www.youtube.com/watch?v=qqboMMBOJRE [61] https://staging.grapheneos.org/usage#wifi-privacy-scanning [62] https://grapheneos.org/features#exploit-mitigations [63] https://inteltechniques.com/workbook.html Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA White Bat Audio https://www.youtube.com/c/WhiteBatAudio
H2I8cBpsUnc | 28 Jul 2022
This is a talk I had in May with Alex from Local Monero. Alex was a great guest and we had a respectful debate about some of our disagreements on failures and promises of cryptocurrencies and corporate influence on YouTubers. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone 00:00:00 Introduction 00:01:09 The conflict of interest of sponsored and affiliated YouTubers 00:26:33 What is Monero and how is it different than Bitcoin? 00:30:50 What is LocalMonero peer-to-peer exchange? 00:35:30 The traceability of Bitcoin makes it useless 00:39:32 The anonymity of Monero and taxability of transactions 00:42:20 How can the government crack down on Monero? 00:52:57 Bitcoin has failed to uphold its cypherpunk values. Can Monero save it? 01:28:00 Do cryptocurrencies solve the central bank monetary policy? 02:22:45 Economists are not exact scientists and are often wrong 02:31:30 Cryptocurrency needs to propose a reasonable monetary policy 02:55:30 Why we need consent based solutions 03:07:40 Closing remarks Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
yTeAFoQnQPo | 01 Jul 2022
The champion of privacy and security is an open source mobile operating system built by a non-profit. This is how GrapheneOS built the most secure phone on the planet. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone GrapheneOS: https://twitter.com/GrapheneOS https://github.com/GrapheneOS https://grapheneos.org/donate Gabe (guest on the podcast): https://twitter.com/flawedworlddev https://github.com/flawedworld A secure mobile operating system is built on top of a complicated software stack whose every single building block is isolated to enforce the strict security policy. All system components and processes, third party apps and services are separated from one another in a multi-party consent of developers, users and the platform itself. This is known as an Application Sandbox and it is how Android designed its architecture. GrapheneOS is a non-profit security research project that focuses on hardening privacy and security features of the operating system while maintaining usability at the same time. GrapheneOS adds to Android’s defense in depth by protecting against exploits abusing unknown vulnerabilities, so called 0day exploits. These exploits are being sold legally by malware brokers for millions of dollars because crafting them requires a high set of skills and experience. GrapheneOS has made such a vast number of improvements it would be impossible to cover them in one video. Many of GrapheneOS’s enhancements have been adopted by the mainstream Android itself. The research project maintains an extensive documentation on all the important features many of which were missed out by this video. Sources: [0] https://source.android.com/security/authentication [1] https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/ [2] https://en.wikipedia.org/wiki/WannaCry_ransomware_attack [3] https://arxiv.org/pdf/1904.05572.pdf [4] https://tribune.com.pk/story/1423609/shadow-brokers-threaten-release-windows-10-hacking-tools [5] https://www.wired.com/story/new-mac-ransomware-thiefquest-evilquest/ [6] https://www.zdnet.com/article/this-sneaky-ransomware-is-now-targeting-linux-servers-too/ [7] https://www.zerodium.com/program.html [8] https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/ [9] https://source.android.com/devices/architecture [10] https://source.android.com/security/overview [11] https://developer.android.com/guide/platform/ [12] https://source.android.com/security/features [13] https://source.android.com/security/app-sandbox [3] https://arxiv.org/pdf/1904.05572.pdf [14] https://developer.android.com/training/articles/keystore [15] https://blog.google/products/pixel/introducing-google-tensor/ [16] https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html [15] https://blog.google/products/pixel/introducing-google-tensor/ [17] https://safety.google/intl/en_us/pixel/ [18] https://grapheneos.org/faq#encryption [19] https://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html [20] https://www.yahoo.com/gma/san-bernardino-shooters-apple-id-passcode-changed-while-234003785--abc-news-topstories.html [21] https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/ [22] https://source.android.com/security/verifiedboot [23] https://source.android.com/security/verifiedboot/device-state [24] https://source.android.com/security/verifiedboot/boot-flow [25] https://grapheneos.org/features#auditor [26] https://attestation.app/about [27] https://grapheneos.org/features#exploit-protection [28] https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/view#gid=0 [29] https://source.android.com/devices/tech/config/filesystem [30] https://source.android.com/security/selinux/concepts [31] https://source.android.com/security/selinux/ [32] https://grapheneos.org/features#improved-sandboxing [33] https://grapheneos.org/usage#sandboxed-google-play [34] https://grapheneos.org/faq#hardware-identifiers [35] https://grapheneos.org/features#closed-device-identifier-leaks [36] https://grapheneos.org/features#wifi-privacy [37] https://grapheneos.org/features#network-permission-toggle [38] https://grapheneos.org/features#sensors-permission-toggle [39] https://grapheneos.org/features#exploit-mitigations [40] https://grapheneos.org/features#attack-surface-reduction [41] https://grapheneos.org/usage#exec-spawning [42] https://github.com/GrapheneOS/hardened_malloc Credits Music by: White Bat Audio, CO.AG Music, Infraction, Yuzzy Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
WkQ_OCzuLNg | 24 Jun 2022
This is an exclusive interview with Gabe, a developer and a security researcher at GrapheneOS. GrapheneOS is a non-profit research project focused on developing the most secure production-ready operating system in the world. It has been recommended by Edward Snowden and is renowned among the security community for its industry leading achievements. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Follow GrapheneOS: https://twitter.com/GrapheneOS https://github.com/GrapheneOS https://grapheneos.org/donate Follow Gabe https://twitter.com/flawedworlddev https://github.com/flawedworld Timestamps: 00:00:00 Thanking Gabe for coming on again for the first time 00:00:31 What is GrapheneOS? 00:02:11 How GrapheneOS improves privacy and security 00:03:22 Why Pixel devices? 00:05:13 Explaining Titan M security chip 00:06:43 Resistance to brute force attacks 00:07:51 Insider Attack Resistance 00:10:36 GrapheneOS preserves Verified Boot 00:15:21 How GrapheneOS made Android more secure for billions 00:21:41 GrapheneOS ecosystem is growing 00:24:36 Talking about optimistic cahnges coming in the near future 00:35:53 Some of the best privacy and security features of GrapheneOS 00:45:00 Hardened Memory Allocator 00:47:03 How much more secure is GrapheneOS than Android? 00:51:59 GrapheneOS resellers 00:53:40 Removing microphones, cameras, sensors and Faraday bags 01:02:46 Future roadmap 01:09:05 Sandboxed Google Play 01:12:13 GrapheneOS is an anonymous phone - Hardware Identifiers 01:17:21 Need for an up-to-date device 01:32:18 Closing remarks and where to follow GrapheneOS Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
8FDIef7tVFg | 06 Jun 2022
I needed to anonymize my phone. This how I did it. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone I can’t trust anyone with my data. When I use a phone with a Google Account or Apple ID, these companies are by default going to be collect unique hardware identifiers, my location information and app usage data without possibility to opt out. If I want to use a phone I need to choose one that is going to allow me to use it completely anonymously and let me be in control of all of my data. I want to a phone that maintains Android’s security model and keeps the best security practices for security updates. GrapheneOS has a far-reaching number of substantial improvements that altogether make up for the most secure mobile operating system for the end user. Because I want to keep this device as anonymous as possible, I do not even insert a SIM card at all and use the phone as a WiFi-only device. To protect my IP address, I use Orbot to route my traffic through Tor. Sources [1a] https://www.phoenixnewtimes.com/news/google-geofence-location-data-avondale-wrongful-arrest-molina-gaeta-11426374 [1b] https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html [2]a https://www.abc15.com/news/region-west-valley/avondale/valley-man-suing-avondale-police-for-false-arrest [2b] https://azcentral.com/story/news/local/southwest-valley/2019/07/31/jorge-luis-molina-says-avondale-police-used-google-data-wrongfully-arrest-him-murder-joe-knight/1873878001/ [3] https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data [4] https://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining [5] https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html [6] https://www.wired.com/story/geofence-warrants-google/ [7] https://www.fastcompany.com/90452990/this-unsettling-practice-turns-your-phone-into-a-tracking-device-for-the-government [8] https://harvardlawreview.org/2021/05/geofence-warrants-and-the-fourth-amendment/ [9] https://transparencyreport.google.com/user-data/overview [10] https://www.apple.com/legal/transparency/us.html [11] https://www.apple.com/legal/transparency/ [12] https://apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not [13] https://www.apple.com/legal/privacy/data/en/apple-id/ [14] https://arxiv.org/pdf/1904.05572.pdf [15] https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/ [16a] https://grapheneos.org/usage#sandboxed-google-play [16b] https://source.android.com/ [17] https://grapheneos.org/features [18] https://grapheneos.org/faq#supported-devices [19] https://grapheneos.org/install [20] https://grapheneos.org/features#privacy-by-default [21] https://grapheneos.org/faq#hardware-identifiers [22] https://source.android.com/devices/tech/config/device-identifiers [23] https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy [24] https://theintercept.com/2015/02/19/great-sim-heist/ [25] https://grapheneos.org/features#wifi-privacy [24] https://theintercept.com/2015/02/19/great-sim-heist/ [25] https://grapheneos.org/features#wifi-privacy [26] https://guardianproject.info/apps/org.torproject.android/ [27] https://support.torproject.org/about/ [28] https://tb-manual.torproject.org/bridges/ [29] https://medium.com/supplyframe-hardware/bluetooth-indoor-positioning-and-asset-tracking-solutions-8c78cae0a03 [30] https://grapheneos.org/features#network-permission-toggle [31] https://grapheneos.org/features#sensors-permission-toggle [32] https://caslab.csl.yale.edu/publications/matyunin2018zeropermission.pdf [33] https://www.zdnet.com/article/hundreds-of-apps-are-using-ultrasonic-sounds-to-track-your-ad-habits/ [34] https://support.apple.com/en-us/HT204053 [35] https://support.google.com/accounts/answer/27441?hl=en [36] https://grapheneos.org/features#improved-user-profiles [16] https://grapheneos.org/usage#sandboxed-google-play [37] https://source.android.com/security/encryption/file-based [38] https://grapheneos.org/faq#encryption [39] https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html [40] https://www.nytimes.com/2018/06/04/technology/facebook-device-partnerships.html [41a] https://www.reuters.com/article/google-apple-int/google-to-stop-using-apple-tool-to-track-iphone-users-avoiding-new-pop-up-warning-idUSKBN29W1VM [41b] https://9to5google.com/2021/06/02/android-personalized-ads-opt-out/ [42] https://www.wsj.com/articles/you-give-apps-sensitive-personal-information-then-they-tell-facebook-11550851636 [43] https://www.cnet.com/tech/services-and-software/facebook-receives-personal-info-like-your-heart-rate-from-popular-apps/ Credits Music by: White Bat Audio
Wd4Pa03LvLk | 27 May 2022
If you want to maximize your digital privacy and security, you should use your phone. Computer operating systems are a security nightmare! Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone It has been the case for years that modern phone security models allow for a much greater protection of your sensitive data than any desktop offers today. There are plenty of problems with phones, many of which are totally unethical. But any issue you can criticize a modern phone for is several times worse on a desktop equivalent of it. Both Android and iOS were designed with a thorough threat model in mind. Modern mobile operating systems implement defense in depth mechanisms that eliminate the ability of malicious software to access your sensitive data. Much of this is done via exploit mitigation, attack surface reduction and isolation. Isolation and containment is where the differences between desktop and mobile security models are most visible to the end user. Many zealots in the privacy community, if such a thing even exists, do not make a distinction between services and platforms. Android means a lot of completely unrelated things to a lot of different people. But in reality, Android is just a free and open source mobile operating system. It has no Google apps or services, no pre-installed bundles or bloatware. It’s important to make this distinction, because it’s possible to use an Android device without any privacy invasive apps and services. The Android’s model allows for it. Android is private and safe by default. It’s best if you can use it without privacy invasive services, such as the Google Play Store. This is best achieved on GrapheneOS. But even if you can’t use your phone without them, it’s not all lost. You should still go through the privacy settings of each of these services and disable all the collection you are not comfortable with. If you are buying a phone for privacy, Pixel phones from Google or the latest generation iPhones are gonna be your best bet. Pixel phones will let you go miles further than iPhones if you decide to flash GrapheneOS on them. That way your phone will be significantly protected against even unknown vulnerabilities and 0day exploits and it will completely anonymize your device. Sources [1a] https://www.reuters.com/technology/apple-must-face-siri-voice-assistant-privacy-lawsuit-us-judge-2021-09-02/ [1b] https://www.nbcnews.com/tech/security/google-sued-u-s-tracking-users-private-internet-browsing-n1222676 [1c] https://www.theguardian.com/technology/2015/jul/31/windows-10-microsoft-faces-criticism-over-privacy-default-settings [2] https://source.android.com/devices/tech/config/device-identifiers [3]https://developer.android.com/guide/topics/permissions/overview [4] https://developer.android.com/training/articles/keystore [5] https://arxiv.org/pdf/1904.05572.pdf [6] https://source.android.com/security/encryption [7] https://ssd.eff.org/en/module/how-encrypt-your-iphone [8] https://source.android.com/security/app-sandbox [9] https://source.android.com/security/overview/app-security [10a] https://source.android.com/security/apksigning [10b] http://apps.testinsane.com/mindmaps/google-play-submission-tests-checks-human-interface-guidelines-mindmap [11] https://developer.apple.com/app-store/review/ [12] https://support.apple.com/en-us/HT204053 [13] https://support.google.com/accounts/answer/27441?hl=en [14] https://developer.android.com/reference/android/Manifest.permission [15] https://source.android.com/ [16] https://grapheneos.org/usage#sandboxed-google-play [17] https://safety.google/intl/en_us/privacy/privacy-controls/ [18] https://grapheneos.org/features#improved-user-profiles [19] https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/ [20] https://www.nytimes.com/2021/08/18/technology/apple-child-abuse-tech-privacy.html [21] https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT [22] https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html [23] https://support.apple.com/en-us/HT201222 [24] https://www.xda-developers.com/how-android-security-patch-updates-work/ [25] https://support.google.com/pixelphone/answer/4457705?hl=en [26] https://grapheneos.org/faq#supported-devices [27] https://source.android.com/security/bulletin/ [28] https://www.cyberscoop.com/ios-zero-day-zerodium-high-supply/ [29] https://www.zerodium.com/program.html [30] https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/ Music by: White Bat Audio [Karl Casey] Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
C17iJ2iOquc | 23 May 2022
This was the most important talk I have ever had. A real life hacker reveals the deeply flawed state of cybersecurity. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps: 00:00:52 Who the hackerman is 00:10:30 He can do some damage & code of ethics 00:14:18 Why did you choose to be a white hat hacker 19 - things are bad 00:23:34 People wouldn't want to use computers if they realized how insecure they are 25:25 there is no making it secure 00:30:30 There is no incentive for security 00:36:55 Nobody is listening to security teams 00:45:29 Security experts are frustrated 00:51:00 Government security is probably even worse 00:58:05 No one is taking this seriously until something very bad happens 01:21:20 Is cyber Bombing in Mr Robot possible? 01:26:17 Privacy is important to security 01:38:00 We need to change how we advocate for privacy - teach about abuse, not vulnerabilities 01:48:10 Is forcing interopearability a good solution? 02:02:40 We need mathematicians 02:08:45 Citizens should fight for more privacy and security 02:13:45 There is no single solution 02:16:33 Mobile security vs desktop security 02:26:45 Informed consent 02:32:48 Case for optimism 02:47:00 Estonia's e-government project 03:08:00 We need more ethical hackers to come out 03:16:25 Snowden is our inspiration 03:25:30 Hackerman will return Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
D6QwK9EpN5M | 13 May 2022
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Many academics are sounding alarms that the death of the unified global Internet is already happening. More and more countries are voicing their desire for digital sovereignty and techno-isolationism. Experts are worried this cyber-balkanization is creating a multi-verse of national Internets and corporate walled gardens that they refer to as the Splintertnet. If Internet can be understood as a worldwide network of all networks, Splinternet would be the opposite of that. It is when nations stop participating in the ICANN consensus and begin assigning their own IP addresses. It is also when governments setup nationwide firewalls to restrict free flow of information to and from the country. Both of these trends are already well on their way to create the world’s first Splinternet. Sources [0] https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-computer-networking.html [1] https://www.icann.org/resources/pages/effect-2012-02-25-en [2] https://www.icann.org/resources/pages/what-2012-02-25-en [3] https://techonomy.com/welcome-to-the-splinternet/ [4] https://www.economist.com/briefing/2010/09/02/a-virtual-counter-revolution [5] https://www.technologyreview.com/2022/03/17/1047352/russia-splinternet-risk/ [6] https://edition.cnn.com/2022/03/03/tech/ukraine-russia-internet-icann/index.html [7] https://www.bloomberg.com/news/articles/2022-03-10/russia-internet-isolation-accelerates-after-ukraine-invasion [8] https://fortune.com/2022/03/22/russia-war-ukraine-great-firewall-splinternet-internet/ [9] https://www.reuters.com/technology/russia-disconnected-global-internet-tests-rbc-daily-2021-07-22/ [10] https://www.reuters.com/article/amazon-cloud-idUSN1E7A727Q20111109 [11] https://www.statista.com/topics/4418/amazon-web-services/ [12] https://www.statista.com/statistics/216573/worldwide-market-share-of-search-engines/ [13] https://about.facebook.com/meta [14] https://www.nytimes.com/2019/04/27/technology/apple-screen-time-trackers.html [15] https://techcrunch.com/2021/03/04/apples-app-store-is-now-also-under-antitrust-scrutiny-in-the-uk/ [16] https://www.theverge.com/2019/10/9/20907228/apple-quartz-app-store-china-removal-hong-kong-protests-censorship [17] https://www.nytimes.com/2017/01/04/business/media/new-york-times-apps-apple-china.html? [18] https://www.reuters.com/business/oracle-says-it-has-suspended-all-operations-russia-2022-03-02/ [19] https://finance.yahoo.com/news/russian-splinternet-014035581.html [20] https://www.theguardian.com/technology/2017/may/22/social-media-election-facebook-filter-bubbles [21] https://qz.com/1194566/google-is-finally-admitting-it-has-a-filter-bubble-problem/ [22] https://www.washingtonpost.com/world/asia_pacific/the-walls-are-closing-in-chinafinds-new-ways-to-tighten-internet-controls/2017/09/26/2e0d3562-9ee6-11e7-b2a7-bc70b6f98089_story.html [23] https://techcrunch.com/2019/03/13/the-splinternet-is-already-here/ [24] https://www.ft.com/content/ba94c2bc-6e27-11ea-9bca-bf503995cd6f Peer-to-peer services Briar: https://briarproject.org/ Cwtch: https://cwtch.im/ Credits Music by: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Ht56t_UMwsc | 26 Apr 2022
This is a talk with realguyman, a privacy researcher and a contributor to privacyguides.org. https://github.com/orgs/privacyguides/people#member-realguyman Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps 00:00:00 Introduction 00:01:50 Who is the realguyman 00:02:20 The topic for today's talk 00:03:52 How the web works 00:06:40 Why End-to-End Encryption on the web is fundamentally flawed 00:11:25 The problem of the chain of trust 00:16:15 Trusting the servers is fundamentally flawed 00:19:00 Mobile apps have better security but there's a catch 00:23:40 Servers serve web content dynamically 00:26:10 Debunking popular myths about false accountability 00:37:40 The problem with Bitwarden 00:41:30 There is still value to some of these services 00:46:57 What developers shoul do to improve the situation 00:53:07 What average users can do to improve the situation 01:11:40 We are sitting ducks 01:13:30 Closing remarks Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
x_5y1jIWPjc | 19 Apr 2022
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone The 21st century has erased the relative anonymity of the public square. Street surveillance is so advanced and ubiquitous today that anyone and everyone can be identified and tracked at a distance without consent. No one should have a reasonable expectation of privacy when in public. But that doesn’t mean we still don’t have sensitive information that we would not want to be tracked. Health insurance companies would certainly want to pick up on the spike in your recent visits to the pharmacy. A victim of domestic abuse wouldn’t want to be followed by an AI tool rented by their abuser. A protester might want to join the cause but can’t afford the risk of being identified and have the police visit their home. Nothing you do in public can be considered private. But if you can be anonymous, then it’s all you need to prevent linking your public activities to your identity. Being anonymous when everyone is watching sounds like a skill reserved only to the top secret agents from a spy movie. But with a number of tweaks, you can render much of street surveillance tech and tactics useless. [1] https://www.theguardian.com/media-network/2016/aug/17/facial-recognition-a-powerful-ad-tool-or-privacy-nightmare [2] https://qz.com/512378/ads-have-started-watching-you-back-which-is-not-creepy-at-all/ [3] https://www.cbc.ca/news/science/cameras-targeted-advertising-1.5107784 [4] https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html [5] https://www.buzzfeednews.com/article/ryanmac/clearview-ai-local-police-facial-recognition [6] https://www.nytimes.com/2014/02/02/technology/when-no-one-is-just-a-face-in-the-crowd.html [7] https://www.washingtonpost.com/technology/2019/04/30/amazons-facial-recognition-technology-is-supercharging-local-police/ [8a] https://www.propublica.org/article/health-insurers-are-vacuuming-up-details-about-you-and-it-could-raise-your-rates [8b] https://www.digitaltrends.com/news/clearview-ai-facial-recognition-domestic-violence-stalking/ [8c] https://www.eff.org/el/deeplinks/2020/06/how-identify-visible-and-invisible-surveillance-protests [9] https://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/ [10] https://theintercept.com/2020/06/15/protest-tech-safety-burner-phone/ [11] https://www.eff.org/pages/face-recognition [12] https://arstechnica.com/tech-policy/2020/03/how-china-built-facial-recognition-for-people-wearing-masks/ [13] https://signal.org/blog/encrypt-your-face/ [14] https://nitter.net/evan_greer/status/1266907715437121536 [15] https://ssd.eff.org/en/module/attending-protest [16] https://www.youtube.com/watch?v=32KTKXZZ-BI [17] https://www.sciencedirect.com/topics/engineering/gait-recognition [18] https://www.youtube.com/watch?v=JASUsVY5YJ8&t=396s [19] https://themarkup.org/ask-the-markup/2020/06/04/how-do-i-prepare-my-phone-for-a-protest [20] https://www.wired.com/story/how-to-protest-safely-surveillance-digital-privacy/ [21] https://www.eff.org/pages/automated-license-plate-readers-alpr [22] https://www.wired.com/story/ai-license-plate-readers-cheaper-drive-carefully/ [23] https://www.smh.com.au/national/lights-cameras-and-apps-street-protests-in-the-surveillance-age-20190805-p52e10.html [24] https://news.yahoo.com/fbi-controversial-protest-surveillance-plane-142721345.html [25] https://www.engadget.com/2011-12-27-us-armys-a160-hummingbird-drone-copter-to-don-1-8-gigapixel-cam.html Credits Music by: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ECb-MtshGrM | 15 Apr 2022
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps 00:00:00 Important message about our funding and business model 00:19:09 We need the freedom to point out the flaws in any product 00:25:54 Privacy is always evolving 00:28:26 Taking listener questions 00:30:00 Why is GrapheneOS so much more secure than other operating systems? 00:39:58 The Hated One and Closed Ntwrk Spar on disagreement over Android privacy 00:55:10 Why GrapheneOS is the most secure OS 01:04:20 Closed Ntwrk explains the difference between CalyxOS and GrapheneOS 01:12:20 Listener question 01:33:10 The Hated One and Closed Ntwrk go to war with each other over blockchain and cryptocurrency 01:57:00 Closed Ntwrk defends blockchain decentralization 02:26:08 The Hated One doesn't believe blockchain is the solution. 02:45:50 Explaining why Odysee doesn't solve the problem of centralized platforms 02:56:50 We should strive towards a permissionless system without blockchain 03:02:00 Closed Ntwrk calls The Hated one's bullshit on Lightening Network 03:16:50 The Hated One admits he is full of shit 03:26:40 We will return Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
IZZ59HOdAbI | 07 Apr 2022
YouTube is refusing to suggest my content to my subscribers and wider audiences. This can't go on. If you value my videos, please support my independent work on: https://www.patreon.com/thehatedone I have never trusted YouTube. I have always considered it a necessary evil for this channel. YouTube search function is used more often than any other search engine except for Google itself. YouTube is unavoidable. And this happened because YouTube used to be better than the alternative – the cable TV. Today, YouTube has been corrupted and commercialized to the point it’s becoming worse than TV. All videos are riddled with ads and half of those videos are ads themselves. Either sponsored, or affiliated, creators looking for ways to make easy money online. YouTube is a multi-tier system. You see, if you want to make it big on YouTube, you have to play by the rules written by the algorithm. Because MrBeast’s formula is so successful, every channel now has to emulate it. Whether it fits the content or not. The algorithm learned this is the only content that works right now. So every YouTuber under the sun is doing it. There is no integrity. Every YouTube video now has to be a shocking and outrageous clickbait. The dick-sucking facial expressions are totally ubiquitous now. An anecdotal evidence: Here’s a personal finance channel that adopted the cock-throating technique and gets tons of views because of it. Here’s another personal finance channel that didn’t adopt the technique and didn’t get the views because of it. The line between entertainment and education is gone. It has been erased by the YouTube algorithm. Every video has to be a sensation. Anything short of that will fail. On average, I dedicate anywhere between 5 – 10 hours of work for every minute of my videos. 5 – 10 hours of extensive research, scripting, recording and editing. Most of my videos barely earn $100 or $200. I let you do that math. So small creators cannot rely on YouTube ads for their revenue. That’s nothing new. Just take sponsorship money and sign up for affiliate programs. But that’s the problem with over-commercialization of Internet content. Just consider what my content is. A lot of my videos are recommending tools and services for people to use to protect their anonymity, privacy and security. In many cases, their safety and even lives may depend on the integrity of this information. Signing up for commercial services means now I’d have to craft my recommendations around the profit incentive of my sponsors. Which is exactly what’s happening to creators that fall down this route. Now they will tell you that corporate influence is not tainting their recommendations. But unless they are inhumanely immune to incentives, that’s just not the case. Would you trust a journalist that takes money from big oil to talk about a war in the Middle East? Or the energy industry? You wouldn’t. So why is it okay for YouTubers to take money from companies they are supposed to be the most critical of? If I want to criticize the big tech, government surveillance and failure of authority; if I want to make recommendations on what people should do to protect themselves from unjust overreach by corporations and states, then viewers should be the ones that hold me accountable. YouTube is killing my channel. So what are my choices? Right now I only have about a 170 patrons. That’s not enough to cover a professional editor for high quality video production. But with 500 patrons, I could hire a part-time editor to not only increase the quality of my videos but also make them more frequently. With 1,000 patrons, I could go out into the field with a small crew and produce full-length documentary features. This is the ultimate goal of this channel. This is the only solution I can make peace with. It’s when you, my audience, step up to produce my content. You can sign up for my Patreon-only podcast with a private RSS feed to listen to up to two episodes a week. If you stick with me for three months or longer, you’ll be sent a piece of merch designed by me as form of gratitude for your loyalty. Currently I make stickers, mugs, hoodies and shirts. I am even considering experimenting with Briar and Cwtch for group chats and forums for my highest tier Patrons. So this is my special plea to all of you. If you want this content to exist, if you want me to keep making more videos, become a producer of The Hated One channel. Become my patron at patreon.com/thehatedone The fate of this channel is in your hands. Credits Music by: White Bat Audio: https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
qCn9ik_nndI | 01 Apr 2022
Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps: 00:00:00 The Hated One remembers to be a human 00:01:50 The comments and feedback from the previous episode 00:03:20 Correcting our mistake - spelling out Cwtch.im 00:04:32 Cwtch vs Briar 00:09:00 Configuring Brair to run with full-device Orbot 00:11:30 The limitation of peer-to-peer networks without an internet connection 00:16:40 Different ways of incentivizing decentralized networks 00:29:00 User experience has to be easy - Closed Ntwrk's issues with Briar 00:30:15 The Hated One dies mid podcast 00:36:10 Tradeoffs of centralized and decentralized platforms 00:38:15 Threat models 00:39:24 Closed Ntwrk's biggest mistake of his entire life (he will burn in hell for this) 00:50:57 Threat models are fluid 00:55:05 The benefits of VPS self-hosting 01:22:00 The benefits of diverse opinion and threat models 01:29:00 More bloomerism and hopium 01:35:30 The different approaches to teaching privacy by THO and Closed Ntwrk 01:45:00 Small open source developers are fighting the big tech 01:54:30 What's the first and the most important step to start your privacy journey 02:07:50 Assume your security will be breached 02:13:50 How the FBI hired Facebook to hack a Tails user Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
vMJH-UJyENs | 27 Mar 2022
If you want to attend a protest, you have to become unidentifiable. This is how you do it. Become a producer of independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Police now have the ability to harass protesters with arrests, threats and coercion all the way back to their homes and offices. Attending a protest with a phone will now tell the police exactly who are you, who you communicate with and where you live. Your phone has four main radio signals, all of which can compromise your security: • Cellular radio – is your phone’s most revealing data point. Your SIM card has a unique IMSI number that is broadcast indiscriminately into all directions. The police can capture this number with so called IMSI catchers, find your real phone number and even intercept your calls and SMS texts. • WiFi – is the second most common data point. Police can setup a rogue hotspot to trick your phone into connecting to it without you noticing and they can start monitoring your traffic in real time. • Police can also use Bluetooth beacons to catch your phone’s unique identifier. They could also try to exploit known Bluetooth vulnerabilities to attack your device with malicious payload. • GPS is broadly used for precise locations services, but this one is the safest data point. Your phone is only a receiver of GPS signals and doesn’t transmit any information. Your phone may, however, store GPS coordinates, which may be revealed to the police if they capture and unlock your phone. Surveillance is the best tool to silence dissent. This is why if you care about your cause, you are going to have to care about protecting the identity of you and your fellow protesters. Your goal must be to become unidentifiable. What follows is a comprehensive guide to become anonymous in the street. The goal is extreme anonymity and no middle-ground compromises. This guide will be split into two parts – Digital security, and physical security. Make sure to follow and understand every step in both of these parts as they are both equally required to remain anonymous. Sources EFF's guide on attending a protest: https://ssd.eff.org/en/module/attending-protest IMSI Catchers: https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks - Stingrays: https://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/ - https://www.wired.com/2014/06/feds-told-cops-to-deceive-courts-about-stingray/ How to prepare your phone for a protest: https://themarkup.org/ask-the-markup/2020/06/04/how-do-i-prepare-my-phone-for-a-protest Protest privacy - photos: https://themarkup.org/ask-the-markup/2020/03/12/photos-privacy Burner Phone tutorial by The Intercept: https://theintercept.com/2020/06/15/protest-tech-safety-burner-phone/ Rogue WIFI hotspots: https://www.forbes.com/sites/andygreenberg/2011/07/28/flying-drone-can-crack-wifi-networks-snoop-on-cell-phones/ Dataminers spy on social media: https://theintercept.com/2020/07/09/twitter-dataminr-police-spy-surveillance-black-lives-matter-protests/ Anonymous Twitter account: https://theintercept.com/2017/02/20/how-to-run-a-rogue-government-twitter-account-with-an-anonymous-email-address-and-a-burner-phone/ Facial recognition in Hong Kong protest: https://www.nytimes.com/2019/07/26/technology/hong-kong-protests-facial-recognition-surveillance.html List of all apps and services mentioned (no affiliation) GrapheneOS: https://grapheneos.org/ - Download: https://grapheneos.org/releases - Install: https://grapheneos.org/install F-Droid: https://f-droid.org/ Orbot: https://guardianproject.info/apps/org.torproject.android/ Tor Browser: https://www.torproject.org/ Aurora Store: https://f-droid.org/en/packages/com.aurora.store KeepassDX: https://github.com/Kunzisoft/KeePassDX Tutanota: https://tutanota.com/ Protonmail: https://protonmail.com/ SimpleLogin: https://simplelogin.io/ Aegis Authenticator: https://getaegis.app/ Signal: https://signal.org/ Briar: https://briarproject.org/ Wire: https://wire.com/en/ Anonymous Twitter: https://twitter3e4tixl4xyajtrzo62zg5vztmjuricljdp2c5kshju4avyoid.onion/ Scrambled Exif: https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/ ImagePipe: https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/ ObscuraCam: https://guardianproject.info/apps/obscuracam/ OsmAnd: https://osmand.net/ Credits Music By: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
3C2z7pViZ4o | 22 Mar 2022
My podcast discussion with Closed Ntwrk on privacy, surveillance, decentralization and how we win back the Internet. Help produce independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Closed Ntwrk: https://www.closedntwrk.com/episode-12-collab-with-the-hated-one-youtube-personality/ In the podcast, The Hated One and Closed Ntwrk discuss privacy, security, surveillance and decentralization. Our first debate quickly spirals into a discussion on how we take back the Internet and build a resilient decentralized infrastructure that is not dependent on any central point of failure. The Hated One proposes how Briar, Cwtch and other peer-to-peer solutions could re-decentralized the Internet as it was intended back in the 1990s. Closed Ntwrks talks extensively about how self-hosting is a lot easier and more useful solution for privacy, security and information freedom issues than is commonly understood. Towards the end of the podcast, we encourage people to get involved in helping open source projects grow, maintain and and expand. Likewise, communities should engage in activism and political movements to force bad legislation out and invite good legislation that promotes Internet freedom and privacy. At the end of the podcast, we also share our mobile privacy setups and how we believe GrapheneOS is the most important security project of our time. This podcast collaboration between The Hated One and Closed Ntwrk could be the beginning of a beautiful series on the most important topics of the Internet age. Timestamps 00:00:00 Why Closed Ntwrk makes privacy podcast 00:03:55 Why privacy matters 00:07:40 Privacy doesn't matter 00:19:30 Paying for privacy 00:21:50 Privacy optimism 00:29:00 Self hosting is hard but important 00:36:10 The Hated One's vision of a peer-to-peer Utopia 00:58:00 The Internet is recentralized 01:04:15 Hacker wars over peer-to-peer Utopia 01:08:00 Let's help each other 01:14:55 Signal is not a long-term solution 01:18:40: Get involved politically 01:32:18 Doing away with centralization 01:51:39 The community needs to support projects 02:03:48 What is our mobile privacy setup 02:13:07 GrapheneOS is badass 02:25:03 Nextcloud and selfhosting 02:30:34 Extreme privacy decisions 02:45:15 How The Hated One works and struggles on YouTube 02:56:25 We will return! Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
qqboMMBOJRE | 18 Mar 2022
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone International Red Cross recommends that all persons have an emergency survival kit with multiday supplies of the most essential items. This is in case of any natural or man-made crisis resulting in a need for evacuation or a major disruption of day-to-day services. Part of this emergency kit is what I would call a digital bug out bag. It includes: • copies of personal documents • cell phone with chargers or extra batteries • family and emergency contact information Many if not all of these copies should be physical. But paper documents can easily get destroyed by floods, fire or collapse. They can be lost or stolen and in case of theft, your paper documents are not encrypted and they could be abused for fraud; which is the last thing you want to think about in a crisis. Having a secure digital backup gives you an additional fail safe if all else is lost. Hopefully you will never be in a situation where you need this. But it’s always better to be prepared because this can save you the precious seconds that might be decisive in an emergency situation. So in this short tutorial, I will guide you through the process of creating an encrypted digital backup on a microSD card, how to securely copy and store your files and how to protect it from theft, loss and physical elements. I will also extend this tutorial to include emergency items and apps that could help you better navigate through a crisis situation. This won’t take long so let’s begin. I chose a microSD card for this purpose because it is the most versatile storage medium for a digital bug out bag. Technically, a USB flash drive will be the most widely accepted standard among any modern computer, laptop or even mobile devices. Sources Official Veracrypt Website: https://veracrypt.fr/en/Home.html Download Veracrypt: https://veracrypt.fr/en/Downloads.html How To Verify Veracrypt PGP Signatures: https://veracrypt.fr/en/Digital%20Signatures.html Hidden Volumes Security Precautions: https://veracrypt.fr/en/Security%20Requirements%20for%20Hidden%20Volumes.html Plausible Deniability: https://veracrypt.fr/en/Plausible%20Deniability.html KeepassXC Password Manager: https://keepassxc.org/ OsmaAnd: https://osmand.net/ Trail Sense: https://github.com/kylecorry31/Trail-Sense Offline Wikipedia: https://en.wikipedia.org/wiki/Wikipedia:Database_download Red Cross Survival Kit: https://www.redcross.org/get-help/how-to-prepare-for-emergencies/survival-kit-supplies.html Red Cross Emergency Preparedness: https://www.redcross.org/get-help/how-to-prepare-for-emergencies/be-informed.html SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds: https://nitter.net/wikileaks/status/839100031256920064 Hollow coin used by spies: https://www.fbi.gov/history/famous-cases/hollow-nickel-rudolph-abel Credits Music by: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
eGrlrtfNhpc | 10 Mar 2022
Sanctions on Russia over Ukraine invasion will hurt Russian economy and its people. But they won't force Putin to change his mind. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone The sanctions on Russia imposed by the Western alliance is far beyond anything that could be considered reasonable. The sanctions didn’t stay confined to just the targets closest to Putin and individuals with actual power in the Russian government. They are hurting innocent Russian civilians who have no connection to Kremlin and no say in the matter of Putin’s foreign policy. Sources CIA profile on Russia: https://www.cia.gov/the-world-factbook/countries/russia/ Real GDP Purchasing Power Parity: https://www.cia.gov/the-world-factbook/field/real-gdp-purchasing-power-parity/country-comparison/ Russian economy profile: https://www.britannica.com/place/Russia/Economy IMF economic data: https://www.imf.org/external/datamapper/NGDPD@WEO/OEMDC/ADVEC/WEOWORLD The First Gulf War: https://www.britannica.com/event/Persian-Gulf-War Iraq sanctions hurting people: https://www.nytimes.com/1995/12/01/world/iraq-sanctions-kill-children-un-reports.html Counter-argument to the toll of sanctions on Iraq: https://www.washingtonpost.com/news/worldviews/wp/2017/08/04/saddam-hussein-said-sanctions-killed-500000-children-that-was-a-spectacular-lie/ Deterioration due to sanctions: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1120689/ Iraq's child mortality rate: https://www.jstor.org/stable/4417422 Excess mortality: https://www.pbs.org/frontlineworld/stories/iraq/sanctions.html Study on the factors for sanctions to work: https://www.tandfonline.com/doi/abs/10.1080/13642989908406841? Sanctions on Russia: https://www.washingtonpost.com/politics/2022/02/24/russia-sanctions-ukraine-biden/? https://home.treasury.gov/news/press-releases/jy0608 https://indianexpress.com/article/world/sanctions-imposed-on-russia-for-invading-ukraine-7797825/ Banning of news and social media: https://www.cnet.com/news/russian-news-outlets-rt-and-sputnik-are-now-banned-in-europe/ https://www.cnet.com/news/facebook-youtube-to-restrict-some-russian-state-controlled-media-across-europe/ Putin's autocratic control over media and information Google & Apple in Russia: https://www.washingtonpost.com/business/2021/09/17/navalny-google-apple-app-russia/ https://www.bloomberg.com/news/articles/2022-01-26/why-swift-s-global-payments-are-sanctions-pain-point-quicktake https://www.theguardian.com/world/2022/mar/04/russia-completely-blocks-access-to-facebook-and-twitter https://www.theguardian.com/media/2022/mar/04/bbc-temporarily-suspending-work-all-news-journalists-russia Swift ban https://www.theguardian.com/technology/2022/feb/24/what-is-swift-international-payments-network-russia-sanction Switzerland's privacy haven: https://www.icij.org/investigations/pandora-papers/switzerland-fidinam-wealth-management-money-laundering/ https://www.theguardian.com/news/2022/feb/20/credit-suisse-secrets-leak-unmasks-criminals-fraudsters-corrupt-politicians China's CIPS: https://www.bloomberg.com/news/articles/2021-09-22/china-s-fledgling-cross-border-payments-system-grows-its-reach Zelenskiy's pleas to NATO: https://finance.yahoo.com/news/1-ukraines-zelenskiy-makes-desperate-165528610.html No-fly zone: https://www.theguardian.com/world/2022/mar/05/zelenskiy-lashes-out-at-nato-over-no-fly-zone-as-russian-attacks-intensify? https://www.theguardian.com/world/2022/mar/04/nato-chief-warns-of-worse-suffering-in-ukraine-and-russian-attacks-elsewhere Ban on Russian gamers: https://www.cnet.com/tech/gaming/ukrainian-official-calls-on-xbox-and-playstation-to-ban-russian-gamers/ Poutine: https://www.msn.com/en-us/foodanddrink/foodnews/a-drummondville-restaurant-temporarily-revises-its-branding-because-putin-e2-80-99s-last-name-is-spelled-e2-80-9cpoutine-e2-80-9d-in-french/ar-AAUqh1Q Banning Russian gymnastics team: https://www.msn.com/en-us/sports/other/russia-banned-from-international-gymnastics-curling-over-invasion-of-ukraine/ar-AAUDiks Banning Russian Paralympic athletes: https://www.wsj.com/articles/russia-athletes-banned-from-paralympics-11646320434 Calls to ban Russian students: https://www.foxnews.com/media/eric-swalwell-russians-us-universities-retaliation China's diplomacy towards Russia: https://thediplomat.com/2022/03/can-china-shield-russia-from-ukraine-linked-sanctions/ China's $117bn contract with Russia: https://www.express.co.uk/news/world/1571490/china-news-help-russia-ukraine-invasion-teaming-up-west-sanctions-spt China helping Russia: https://www.msn.com/en-us/money/other/russia-owns-24140-billion-in-chinese-bonds-which-could-help-it-skirt-western-sanctions-analysts-say/ar-AAUvPNY China not joining sanctions: https://www.cnbc.com/2022/03/02/china-will-not-join-sanctions-against-russia-banking-regulator-says.html Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/
YNSWleZnWJg | 03 Mar 2022
Essay on how different Ukrainian president Volodymyr Zelenskiy from Russian president Vladimir Putin. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Russia’s invasion in Ukraine is a self-centered ambition of an authoritarian leader. The defense of Ukraine is an ambition of millions of Ukrainians standing up to a foreign autocrat. I don’t see this conflict as just a territorial dispute. I see a young, flawed democracy struggling against an old empire ruled by an autocrat. Ukraine is not perfect. Like Russia, corruption and oligarchy have rotten much of the Ukrainian society. But unlike Russians, Ukrainians have been free to choose their own leader that best represents their frustration with the corrupt system. The stark differences between Volodomyr Zelenskyy and Vladimir Putin say a lot about what kind of leaders you can get when you subject them to democratic accountability. There is a big difference between the kind of a leader Zelenskyy is, and the kind of a leader Putin is. It’s not just their personalities. It’s how they rose to power, how they maintain power, how they treat their opposition, respect civil rights, appeal to their people, and what issues they focus on. So let’s compare. Sources Attitudes of Ukrainians and Russians toward one another: https://www.vedomosti.ru/politics/articles/2019/03/11/796144-ukraintsev-k-rossii Volodymyr Zelenskiy profile https://www.president.gov.ua/ru/news/ukrayina-ta-estoniya-pogliblyat-spivpracyu-dlya-realizaciyi-55861 https://www.britannica.com/biography/Volodymyr-Zelensky https://en.wikipedia.org/wiki/Volodymyr_Zelensky https://www.businessinsider.nl/who-is-volodymyr-zelensky-ukraine-president-central-to-trump-scandal-2019-9? https://www.theatlantic.com/politics/archive/2019/12/zelensky-ukraine-impeachment/602905/ https://www.politico.eu/article/ukraine-servant-people-president-volodymyr-zelenskiy-war-russia/ Zelenskiy's path to presidency: https://carnegiemoscow.org/commentary/7896 Zelenskiy's approval rating before invasion: https://www.statista.com/statistics/1100076/volodymyr-zelensky-s-approval-rating-ukraine/ Zelenskiy's pre-war behavior: https://www.france24.com/en/europe/20220218-military-tactics-zelensky-plays-both-sides-in-ukrainian-crisis Zelenskiy's response to the invasion https://www.washingtonpost.com/world/2022/02/25/russia-ukraine-president-zelensky-family-target/ https://www.nytimes.com/2022/02/24/world/europe/ukraine-zelensky-speech.html https://www.axios.com/ukraine-volodymyr-zelensky-russia-invasion-248d6e91-d48e-4c05-925f-46b7a0e7bf59.html https://www.nytimes.com/2022/02/27/world/europe/volodymyr-zelensky-ukraine-russia.html Zelenskiy's Facebok post: https://www.facebook.com/zelenskiy.official/posts/3017309331852756 Zelenskiy in Pandora Papers: https://www.aljazeera.com/news/2021/10/4/pandora-papers-ukraine-leader-seeks-to-justify-offshore-accounts Vladimir Putin profile https://www.britannica.com/biography/Vladimir-Putin https://en.wikipedia.org/wiki/Vladimir_Putin https://www.britannica.com/place/Russia/The-Putin-presidency https://www.forbes.com/profile/vladimir-putin/ Putin's life and motivation: https://www.yahoo.com/now/vladimir-putin-president-whose-obsession-180810471.html Putin's approval ratings: https://www.levada.ru/2021/12/14/obostrenie-v-donbasse/ https://www.levada.ru/en/ratings/ https://www.levada.ru/2022/02/24/ukraina-i-donbass-2/ Putin should fear Zelenskiy: https://carnegiemoscow.org/2019/04/18/putin-should-fear-ukraine-s-russia-friendly-front-runner-pub-78948 Putin's reasoning for invasion: https://www.reuters.com/world/europe/ukraines-president-stays-put-russian-invaders-advance-2022-02-25/ Russians protesting the invasion in Ukraine: https://www.politico.eu/article/protests-detained-russia-ukraine-war/ Putin's approval rating: https://theconversation.com/putins-public-approval-is-soaring-during-the-russia-ukraine-crisis-but-its-unlikely-to-last-177302 Putin in isolation: https://www.nytimes.com/2022/02/18/world/europe/putin-russia-ukraine.html Censorship in Russia: https://www.nytimes.com/2022/02/26/technology/russia-censorship-tech.html Putin's propaganda and censorship of the Ukraine invasion: https://www.nytimes.com/2022/02/26/world/europe/russian-economy-ukraine-war.html Putin's desire for Ukraine territory: https://www.nytimes.com/2022/02/27/briefing/putin-democracy-ukraine.html Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
XwJpf5kICeg | 18 Feb 2022
Tails - The Amnesic Incognito Live System, is the most anonymous operating system in the world. Edward Snowden used to leak the NSA documents. Here's how you can get it too. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Online anonymity sometimes demands much more than just obfuscating your location and IP address. Some threat models require that you leave no trace of your activity on the device you are using. The problem is that regular operating systems are designed to store troves of sensitive data in the hardware of your machine. Even with full-device encryption, memory logs can often be easily recovered by an adversary with physical access to your device. Not everyone has the luxury of physical security and they have to assume that their computer will likely fall into the wrong hands. This is why security experts with a strong sense for protecting human rights in the digital world have been working on creating a system that doesn’t remember anything about itself. A system that forensically wipes all evidence of its use immediately after a user ends their session. A system that looks exactly the same no matter who uses it or for whatever purpose. And now such a system has a name. Tails. The Amnesic Incognito Live System. Live system, because it’s an operating system designed to run off of a USB flash drive, instead of being permanently installed on an internal drive. Incognito, because its entire traffic is routed through Tor and the default fingerprint of each Tails installation matches perfectly with every other Tails users on the planet. Amnesic means every time you reboot, plug out your USB, or shut down, all information about your session activity is wiped from the USB flash drive as well as from the host memory. This forensic erasure leaves no files on the host system whatsoever. Sources The Official Tails Website: https://tails.boum.org/ Linux Installation (followed in this video): https://tails.boum.org/install/linux/usb-overview/index.en.html Linux Installation (command line): https://tails.boum.org/install/expert/usb/index.en.html Official Tails Documentation: https://tails.boum.org/doc/index.en.html How Snowden Used Tails: https://www.wired.com/2014/04/tails/ Credits Music By Cuki Beats https://www.youtube.com/channel/UCSyBSyLk4ZvXd2Fj-tLojag Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
lvxwFpk27-Y | 06 Feb 2022
Psychoacoustics hiding. Laser hacking. DolphinAttack. Inaudible voice commands. Your virtual assistant is more vulnerable to cyber attacks than you could imagine. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Hidden Audio Commands https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html Burger King TV Ad Trolling Google Home https://www.nytimes.com/2017/04/12/business/burger-king-tv-ad-google-home.html? Ultrasonic Voice Commands https://www.bbc.com/news/technology-41188557 https://www.scientificamerican.com/article/ultrasonic-attack-device-hacks-phones-through-solid-objects/ Voice Obfuscation & Psychoacoustics https://www.usenix.org/conference/woot15/workshop-program/presentation/vaidya Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition https://www.usenix.org/system/files/conference/woot15/woot15-paper-vaidya.pdf Psychoacoustics https://adversarial-attacks.net/ Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding https://www.ndss-symposium.org/ndss-paper/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding/ Alexa Can Be Hacked By Chirping Birds https://www.fastcompany.com/90240975/alexa-can-be-hacked-by-chirping-birds Alexa Skills Hacking https://www.wired.com/story/amazon-echo-alexa-skill-spying/ https://news.ncsu.edu/2021/03/alexa-skill-vulnerabilities/ Voice Squatting https://www.forbes.com/sites/thomasbrewster/2018/05/16/amazon-echo-google-home-voice-squatting-attack-exposes-devices/ DolphinAttack Animal Frequency Hearing Range https://en.wikipedia.org/wiki/File:Animal_hearing_frequency_range.svg https://www.fastcompany.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa Research Papers DolphinAttack: Inaudible Voice Commands https://dl.acm.org/doi/10.1145/3133956.3134052 Inaudible Voice Commands: The Long-Range Attack and Defense https://www.usenix.org/conference/nsdi18/presentation/roy Inaudible Voice Commands https://arxiv.org/pdf/1708.07238.pdf SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves https://surfingattack.github.io/papers/NDSS-surfingattack.pdf https://surfingattack.github.io/ SurfingAttack https://nakedsecurity.sophos.com/2020/03/02/siri-and-google-assistant-hacked-in-new-ultrasonic-attack/ Ultrasonic Cross-Device Tracking https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ Ultrasonic Beacons https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/ https://techcrunch.com/2014/07/24/silverpush-audio-beacons/ https://www.campaignlive.com/article/retailers-shoppers-resist-apples-ibeacon-signals/1363907 Ultrasonic Cross-Device Transmission https://www.sciencedirect.com/science/article/pii/S2214212619304697 Light Commands (Laser Hacking)' https://www.nytimes.com/2019/11/04/technology/digital-assistant-laser-hack.html https://lightcommands.com/ Credits Musci By: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
9DwVpJxD1GE | 21 Jan 2022
This is what a cyberwar looks like. The 2007 cyberattacks on Estonia became largely considered to be the first cyber warfare in Internet history. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F To understand what can be realistically done with cyberwarfare, it serves best to look at the real world instead of hypothetical scenarios. One such cyber campaign was waged against one of the most digitally advanced countries in the world. It was the 2007 cyberwar in Estonia. The face of the cyberwar will most likely take the form of skirmishes that take days or weeks at a time. A full-scale campaign on an entire nation’s infrastructure is only a viable threat to smaller countries mostly without military alliances. Waging such a massive cyber campaign is most effective when coordinated with kinetic force. But on its own, cyber offensive will eventually run out of resources and time and the defense will adapt. The cyberwar in Estonia was successful mostly because it likely had hundreds or thousands of spontaneous participants. But Estonia’s economy didn’t crumble and the society bounced back to normal quickly after the attacks were fended off. Sources Immediate media coverage of the cyber attacks on Estonia http://news.bbc.co.uk/1/hi/world/europe/6665145.stm https://www.bbc.com/news/39655415 https://www.theguardian.com/world/2007/may/17/topstories3.russia https://www.dailymail.co.uk/sciencetech/article-455467/Russia-launches-cyberwar-Estonia.html Russia accused https://arstechnica.com/information-technology/2007/05/massive-ddos-attacks-target-estonia-russia-accused/ https://www.reuters.com/article/oukin-uk-estonia-cyberwar-idUKL1847541120070518 Chronology of the cyber attacks https://www.nytimes.com/2007/05/29/technology/29estonia.html Cyber war timeline https://www.wired.com/2007/08/ff-estonia/ Research Paper on Estonia Cyberwar https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1105&context=jss War In The Fifth Domain https://www.economist.com/briefing/2010/07/01/war-in-the-fifth-domain 20-year-old Russian arrested http://news.bbc.co.uk/1/hi/technology/7208511.stm Markov Claims Responsibility https://www.rferl.org/a/Behind_The_Estonia_Cyberattacks/1505613.html https://web.archive.org/web/20090701212951/http://www.darkreading.com/blog/archives/2009/03/authoritatively.html Konstantin Goloskov from Nashi claims responsibility https://web.archive.org/web/20090716045103/http://www.rferl.org/content/article/1076297.html Estonian attacks were a cyber riot not a warfare https://www.computerweekly.com/news/2240082385/Estonian-attacks-were-a-cyber-riot-not-warfare Aftermaths of the cyber war https://www.nbcnews.com/id/wbna31801246 https://timesofindia.indiatimes.com/it-services/how-to-fight-cyber-war-estonia-shows-the-way/articleshow/24274994.cms NATO's cyber defense in Estonia https://web.archive.org/web/20080723185533/http://www.networkworld.com/news/2008/051508-nato-to-set-up-cyber.html https://www.bangkokpost.com/tech/240109/cyber-war-must-be-treated-as-conventional-attack-estonia E-stonia and E-Government https://e-estonia.com/how-estonia-became-a-global-heavyweight-in-cyber-security/ https://qz.com/1052269/every-country-should-have-a-cyber-war-what-estonia-learned-from-russian-hacking/ https://edition.cnn.com/2015/09/02/opinions/estonia-cyber-war/ Cyber war on ISIS https://www.newsweek.com/us-military-launches-cyber-attacks-isis-432441 https://arstechnica.com/information-technology/2016/03/us-military-launches-cyber-attacks-on-isis-in-mosul-and-announces-it/ Anonymous https://uk.news.yahoo.com/anonymous-threatens-isis-major-cyber-095356033.html? Colonial Pipeline Cyber Attacks https://www.cyberscoop.com/gas-pipeline-cyberattack-ransomware-colonial/ https://www.nytimes.com/2021/05/14/us/politics/pipeline-hack.html NSA Exploit Leads to WannaCry https://arstechnica.com/information-technology/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/ https://arstechnica.com/information-technology/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/ https://www.abc.net.au/news/2017-05-14/ransomware-cyberattack-threat-lingers-as-people-return-to-work/8525554 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
LOPWNJxdxWY | 07 Jan 2022
You can be legally hacked and someone will make a fortune out of it. This is how it happens. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Bezos is my daddy... not! https://www.theguardian.com/technology/2020/jan/21/amazon-boss-jeff-bezoss-phone-hacked-by-saudi-crown-prince https://www.nytimes.com/2020/01/23/business/media/national-enquirer-jeff-bezos-saudi-hack.html NSO & Pegasus Profile https://citizenlab.ca/2019/10/nso-q-cyber-technologies-100-new-abuse-cases/ https://citizenlab.ca/2021/11/palestinian-human-rights-defenders-hacked-nso-groups-pegasus-spyware/ 36 Al Jazeera journalisted targeted https://gizmodo.com/dozens-of-al-jazeera-journalists-were-hacked-via-zero-c-1845925960 The NSO Group company https://www.fastcompany.com/90312043/cyberattack-firm-nso-group-woos-new-investors-amid-human-rights-firestorm https://www.vice.com/en/article/qvy97x/israeli-nso-group-marketing-pr-push Ahmed Mansoor https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/ Jamal Khasshoggi https://www.nytimes.com/2018/12/02/world/middleeast/saudi-khashoggi-spyware-israel.html https://www.washingtonpost.com/investigations/interactive/2021/jamal-khashoggi-wife-fiancee-cellphone-hack/ Pegasus demo https://www.vice.com/en/article/qvakb3/inside-nso-group-spyware-demo French cabinet targeted https://www.theguardian.com/news/2021/sep/23/spyware-found-on-phones-of-five-french-cabinet-members Hungarian journalist targeted https://www.theguardian.com/news/2021/sep/21/hungary-journalist-daniel-nemeth-phones-infected-with-nso-pegasus-spyware Global NSO Pegasus leak https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus https://www.reuters.com/technology/cyber-arms-dealer-exploits-new-apple-iphone-software-vulnerability-affects-most-2021-09-13/ New Your Times journalist targeted https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/ Sued https://gizmodo.com/facebook-sues-shadowy-israeli-cyberweapons-firm-nso-gro-1839456470 Banned https://www.cyberscoop.com/commerce-department-blacklists-controversial-spyware-company-nso-group/ https://www.theguardian.com/us-news/2021/nov/03/nso-group-pegasus-spyware-us-blacklist Zerodium https://money.cnn.com/2016/04/07/technology/zerodium-apple-hacks/index.html Acquisition raids https://www.zdnet.com/article/zerodium-offers-big-bucks-for-cloud-zero-days/ https://www.bleepingcomputer.com/news/security/zerodium-triples-wordpress-remote-code-execution-exploit-payout/ iOS Zero-day price collapse https://www.cyberscoop.com/ios-zero-day-zerodium-high-supply/ https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/ iOS 9 exploits https://www.zerodium.com/ios9.html Banned https://threatpost.com/us-ban-cyberattack-tools-zerodium/175654/ Other malware brokers https://theintercept.com/2015/07/07/baltimore-firm-supplying-united-arab-emirates-surveillance-software-won-special-export-license-state-department/ Hacking Team https://www.vice.com/en/article/n7wbnd/hacking-team-is-dead https://www.vice.com/en/article/neavnm/hacking-team-new-owner-starting-from-scratch https://www.vice.com/en/article/78k8dq/hacking-team-has-lost-its-license-to-export-spyware Candiru https://threatpost.com/windows-zero-days-israeli-spyware-dissidents/167865/ https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/ https://www.forbes.com/sites/thomasbrewster/2019/10/03/meet-candiru-the-super-stealth-cyber-mercenaries-hacking-apple-and-microsoft-pcs-for-profit/? Black Cube https://www.nytimes.com/2019/01/28/world/black-cube-nso-citizen-lab-intelligence.html Finfisher https://www.vice.com/en/article/xyygbk/mobile-trojans-rear-their-head-repressive-governments-go-for-their-checkbooks https://www.cyberscoop.com/finspy-spyware-kaspersky-ios-android/ Police hacking Cellebrite https://thenextweb.com/news/ice-is-paying-an-israeli-security-company-30m-to-break-into-phones GrayKey https://www.vice.com/en/article/vbxxxd/unlock-iphone-ios11-graykey-grayshift-police https://appleinsider.com/articles/20/01/15/fbi-reportedly-accessed-locked-iphone-11-pro-max-with-graykey-third-party-tool Unlocking iPhone 5C https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/ https://thenextweb.com/news/the-fbi-is-cracking-iphone-11s-without-apples-help-so-why-does-it-need-a-backdoor Ransomware as a service https://www.zdnet.com/article/ransomware-as-a-service-negotiators-between-hackers-and-victims-are-now-in-high-demand/ Music By White Bat Audio CO.AG Music Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/
Xo7V4PPHijs | 22 Dec 2021
Data centers are running out of water to cool their servers with. And they keep asking for more. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F In the United States, data centers are consuming 1.7 billion liters of water per day. Compared to the total daily water consumption of 1,218 billion liters, that’s less than 0.14%. Sounds like a negligible amount. Until it’s not. Because the reality is, only one third of data center operators are measuring their water consumption. And the water that gets measured is only the one used directly for cooling. But there is a much bigger hidden cost to running a data center than that. Sources Data center water consumption https://www.nature.com/articles/s41545-021-00101-w https://www.datacenterdynamics.com/en/analysis/data-center-water-usage-remains-hidden/ Water used on cooling vs electricity generation https://www.datacenterdynamics.com/en/opinions/an-industry-in-transition-1-data-center-water-use/ Arizona, Texas and Google https://time.com/5814276/google-data-centers-water/ Data centers water impact on dry regions https://www.nbcnews.com/tech/internet/drought-stricken-communities-push-back-against-data-centers-n1271344 Arizona water concerns over data centers https://www.datacenterdynamics.com/en/news/huge-data-center-moves-forward-in-mesa-despite-arizona-water-concerns/ Data center tax breaks https://www.datacenterdynamics.com/en/news/arizona-passes-data-center-tax-breaks/ Apple in Arizona https://appleinsider.com/articles/17/05/10/apple-plans-major-expansions-at-arizona-and-nevada-data-centers https://www.datacenterdynamics.com/en/news/mesa-council-approves-1bn-google-arizona-data-center-16m-tax-breaks/ Chandler, Arizona https://azcentral.com/story/news/local/chandler/2021/11/22/chandler-wants-ban-more-data-centers-after-years-complaints/8627569002/ Oregon https://apnews.com/article/technology-business-the-dalles-oregon-droughts-62b3774442293497ceb2306a606471af https://apnews.com/article/technology-business-environment-and-nature-oregon-united-states-2385c62f1a87030d344261ef9c76ccda South Carolina https://www.postandcourier.com/news/google-s-controversial-groundwater-withdrawal-sparks-question-of-who-owns/article_bed9179c-1baa-11e7-983e-03d6b33a01e7.html https://www.datacenterdynamics.com/en/news/after-aquifer-concerns-googles-600m-south-carolina-expansion-finds-new-water-supply/ Lake Mead Depleting https://eu.usatoday.com/story/news/nation/2021/06/10/lake-mead-water-lowest-hoover-dam-built-colorado-river-shortage/7640437002/ Western U.S. drought https://www.azcentral.com/story/news/local/arizona-environment/2020/05/06/western-megadrought-centuries-worsened-climate-change-global-warming/3036460001/ Water shortages in US West https://www.latimes.com/world-nation/story/2021-04-20/us-west-prepares-for-possible-1st-water-shortage-declaration Colorado River Declining https://morrisoninstitute.asu.edu/sites/default/files/the_myth_of_safe-yield_0.pdf https://www.nbcnews.com/news/weather/punishing-heat-west-could-smash-records-experts-sound-alarm-wildfire-n1270696 Growing Internet demands https://www.cisco.com/c/dam/m/en_us/solutions/service-provider/vni-forecast-highlights/pdf/Middle_East_and_Africa_2021_Forecast_Highlights.pdf Growth of HyperScale Data Centers https://www.srgresearch.com/articles/microsoft-amazon-and-google-account-for-over-half-of-todays-600-hyperscale-data-centers Data center locations (USA) https://www.datacentermap.com/usa/ Data Center Energy Consumption https://www.nrdc.org/resources/americas-data-centers-consuming-and-wasting-growing-amounts-energy https://www.nytimes.com/2011/06/20/business/global/20green.html https://www.independent.co.uk/climate-change/news/global-warming-data-centres-to-consume-three-times-as-much-energy-in-next-decade-experts-warn-a6830086.html https://www.wired.com/story/data-centers-not-devouring-planet-electricity-yet/ Efficiency improvement https://iopscience.iop.org/article/10.1088/1748-9326/abfba1 Microsoft Underwater Data Center https://news.microsoft.com/innovation-stories/project-natick-underwater-datacenter/ https://www.allaboutcircuits.com/news/microsoft-brings-sea-to-servers-with-two-phase-liquid-immersion-cooling/ Replenishing 120% water consumed by data enters https://blogs.microsoft.com/blog/2020/09/21/microsoft-will-replenish-more-water-than-it-consumes-by-2030/ https://www.theverge.com/2021/9/10/22665445/google-water-conservation-goal-drought-data-centers Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/
x80EbmX5xys | 04 Dec 2021
A billionaire philanthropist took control of the global public health. This is what happened to vaccine distribution. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Bill gates has gained an incredible amount of control over the World Health Organization. But how is it possible for one billionaire to become so powerful and influential? This is a United Nations body that advises on public health policies of 194 member states. Bill Gates has been the richest man in the world since Windows 95 and never left the top 4 position. Private donations could easily introduce a conflict of interest when they could sway WHO’s policies to benefit big pharmaceutical corporations or food retailers. This is why the WHO doesn’t openly accept donations from these entities. But that’s not the policy of the Bill and Melinda Gates Foundation. In fact, with the main focus on building private-public partnerships, it is the exact opposite. Current models predict the vaccination rates of middle income countries won’t reach herd immunity levels sooner than 2023. Poor countries won’t reach those levels by 2024 if at all. This situation is way worse than bad. Low income nations aren’t just failing to inoculate their most vulnerable populations. High-income economies are actually administering booster doses at a faster rate than poor countries are administering their first doses. When rich countries have already 2/3 of their population fully vaccinated, in poor countries, barely 3% of their total population received a second dose. Most of the low-income countries aren’t hammered just by COVID19. Sources Vaccine Apartheid https://www.eiu.com/n/85-poor-countries-will-not-have-access-to-coronavirus-vaccines/ Pressuring low-income countries https://www.nytimes.com/2020/11/23/world/bill-gates-vaccine-coronavirus.html Forcing Oxford to partner with AstraZeneca https://khn.org/news/rather-than-give-away-its-covid-vaccine-oxford-makes-a-deal-with-drugmaker/ Statistics on doses, vaccinations and cases https://ourworldindata.org/covid-vaccinations Centralization of vaccine manufacturing https://www.nytimes.com/2021/09/22/us/politics/covid-vaccine-moderna-global.html Bill Gates' influence on patenting technologies https://newrepublic.com/article/162000/bill-gates-impeded-global-access-covid-vaccines Patents are a barrier to vaccine distribution https://theconversation.com/the-big-barriers-to-global-vaccination-patent-rights-national-self-interest-and-the-wealth-gap-153443 Forbes profile on Bill Gates https://www.forbes.com/profile/bill-gates/ Funding of the World Health Organization https://www.who.int/about/funding/ http://open.who.int/2020-21/contributors/contributor https://www.who.int/about/accountability/budget/ Who controls the W.H.O. https://ahrp.org/who-controls-the-who/ Bill and Melinda Gates Foundation & Trust CoI investments http://healthscienceandlaw.ca/wp-content/uploads/2017/01/Public-Interest-Position.WHO_.FENSAGates.Jan2017.pdf Foundation's financial reports https://docs.gatesfoundation.org/documents/a-01_gpp_form%20990_ty20%20(for%20public%20disclosure).pdf https://docs.gatesfoundation.org/documents/F_151002C-1B_Bill&MelindaGatesFoundation_FS.pdf Biontech investment from Gates Foundation https://investors.biontech.de/news-releases/news-release-details/biontech-announces-new-collaboration-develop-hiv-and Unintended consequences of Gates Foundation grants https://www.latimes.com/nation/la-na-gates16dec16-story.html https://www.nytimes.com/2008/02/17/world/americas/17iht-gates.4.10120087.html https://www.nytimes.com/2008/02/16/science/16malaria.html Bill Gates - The Most Powerful Doctor https://www.politico.eu/article/bill-gates-who-most-powerful-doctor/ The cost of vaccine nationalism https://iccwbo.org/media-wall/news-speeches/study-shows-vaccine-nationalism-could-cost-rich-countries-us4-5-trillion/ Pfizer sees significant opportunity https://www.businessinsider.com.au/pfizer-execs-highlight-significant-opportunity-hike-covid-vaccine-price-2021-3 Pfizer silencing governments https://www.citizen.org/news/report-how-pfizer-silences-world-governments-in-vaccine-negotiations/ https://www.thebureauinvestigates.com/stories/2021-02-23/held-to-ransom-pfizer-demands-governments-gamble-with-state-assets-to-secure-vaccine-deal N.I.H.-Moderna dispute over vaccine patents https://www.nytimes.com/2021/11/09/us/moderna-vaccine-patent.html Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
APyQddFHaXs | 13 Nov 2021
This is how 3D printing could solve shortages and decentralize production. https://www.patreon.com/thehatedone Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F 3D printing can do a lot. Doctors 3D-print customized implants and even medication with individual dosage needs. Rapid prototyping has relied on 3D printing for a decade now. There’s this themed restaurant in London where everything, from chairs through cutlery and even food is printed from scratch. Recently, hobbyists and enthusiasts held a national competition for 3D-printed guns. First startups are popping up with promising technology to print affordable housing faster, cheaper and more sustainably. 3D printers aren’t going to replace machines in traditional manufacturing. They’ll be their excellent companion. Bringing the best of the both worlds and eliminating their drawbacks. 3D printers can excel at customization and decentralizing the supply chain, while subtractive manufacturing can mass-produce at scale at low cost. We probably shouldn’t hope for 3D printing to be able to do more than that. But that might be more than enough. Sources About 3D printing in general https://www.allaboutcircuits.com/news/introduction-to-3d-printing-history-processes-and-market-growth/ Filaments https://all3dp.com/1/3d-printer-filament-types-3d-printing-3d-filament/ Poly-lactic acid (popular 3D printing filament) https://www.sciencedirect.com/topics/agricultural-and-biological-sciences/polylactic-acid ABS (filament) https://www.sciencedirect.com/topics/engineering/acrylonitrile-butadiene-styrene Health Care FDA approved drug https://www.fda.gov/drugs/news-events-human-drugs/cder-researchers-explore-promise-and-potential-3d-printed-pharmaceuticals https://www.computerworld.com/article/3048823/this-is-the-first-3d-printed-drug-to-win-fda-approval.html → https://www.youtube.com/watch?v=jG8N9ddst7M Medical applications https://www.raise3d.com/academy/how-is-3d-printing-used-in-the-medical-industry/ 3D printed valves https://www.bbc.com/news/technology-51911070 Windpipe support https://www.npr.org/sections/health-shots/2014/03/17/289042381/doctors-use-3-d-printing-to-help-a-baby-breathe/ Ears https://www.npr.org/sections/health-shots/2013/02/20/172493174/print-me-an-ear-3-d-printing-tackles-human-cartilage Bioprinting https://www.engineering.com/story/engineering-ourselves-the-future-potential-power-of-3d-bioprinting Titanium implants https://redshift.autodesk.com/3d-printed-titanium/ https://www.forbes.com/sites/amitchowdhry/2015/09/19/how-surgeons-implanted-3d-printed-titanium-ribs-in-a-cancer-patient/ → https://www.youtube.com/watch?v=Xt0CiUDVPHk https://www.iflscience.com/health-and-medicine/young-woman-receives-3d-printed-titanium-skull-implant/ https://3dprint.com/70401/3d-printed-skull-implant/ Cancer patient's implants https://www.3ders.org/articles/20160413-64-year-old-israeli-cancer-patient-receives-3d-printed-jaw-implant.html Decentralization & supply chain Shortages https://www.nytimes.com/2021/06/01/business/coronavirus-global-shortages.html Novena open-hardware laptop https://www.wired.com/2014/04/novena/ https://www.crowdsupply.com/sutajio-kosagi/novena Home fabrication https://www.newscientist.com/article/dn10922-desktop-fabricator-may-kick-start-home-revolution/ Smartphone sales https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/ 3D printing solutions to shortages https://www.tctmagazine.com/is-3d-printing-magic-bullet-supply-chain-covid-19/ Semiconductors https://www.allaboutcircuits.com/news/3d-printing-may-ease-semiconductor-shortage-woes/ https://www.forbes.com/sites/jimvinoski/2021/06/15/can-3d-printing-help-solve-our-chip-shortage/ https://www.tctmagazine.com/additive-manufacturing-3d-printing-industry-insights/technology-insights/chips-challenge-3d-printing-semiconductor-shortage/ 3D printing tank parts https://www.popsci.com/military/army-3d-prints-tank-part-during-exercise/ Housing and construction https://inhabitat.com/worlds-largest-3d-printed-building-made-from-powdered-cement-unveiled-at-uc-berkeley/ https://sanfrancisco.cbslocal.com/2015/03/06/researchers-at-uc-berkeley-create-bloom-first-ever-3-d-printed-cement-structure-that-stands-9-feet-tall/ https://edition.cnn.com/2021/03/18/business/california-3d-printed-neighborhood-trnd/index.html https://www.dwell.com/article/worlds-largest-3d-printed-building-apis-cor-6a4b7f45 https://arstechnica.com/gadgets/2021/10/texas-to-get-100-3d-printed-homes-as-builders-seek-to-solve-worker-shortages/ 3D printed guns https://www.washingtonpost.com/local/weapons-made-with-3-d-printers-could-test-gun-control-efforts/2013/02/18/9ad8b45e-779b-11e2-95e4-6148e45d7adb_story.html? 3D printed food https://www.ge.com/additive/additive-manufacturing/industries/food-beverage
unLxk8tfECQ | 26 Oct 2021
Autonomous weapons are taking over modern warfare. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Research and fact-checking on my subreddit Research thread: https://www.reddit.com/r/thehatedone/comments/q4hxei/help_me_research_military_ai/ Fact-check: https://www.reddit.com/r/thehatedone/comments/q8phau/factcheck_military_artificial_intelligence/ Sources [1] https://apnews.com/b7ef15f47cf2d123668ed1939db01485 [2] https://www.aljazeera.com/features/2020/10/13/nagorno-karabakh-new-weapons-for-an-old-conflict-spell-danger [3] https://www.washingtonpost.com/world/europe/nagorno-karabkah-drones-azerbaijan-aremenia/2020/11/11/441bcbd2-193d-11eb-8bda-814ca56e138b_story.html [4] https://www.brookings.edu/techstream/loitering-munitions-preview-the-autonomous-future-of-warfare/ [5] https://www.theatlantic.com/national/archive/2012/03/why-cant-the-air-force-build-an-affordable-plane/254998/ [6] https://en.wikipedia.org/wiki/Northrop_Grumman_B-2_Spirit [7] https://www.popsci.com/technology/marines-grenade-drone-40/ [8] https://www.wired.com/2016/01/when-good-drones-go-bad/ [9a] https://www.nytimes.com/2018/02/20/technology/artificial-intelligence-risks.html [9b] https://www.nytimes.com/interactive/2018/02/13/technology/skydio-autonomous-drones.html [10] https://www.theatlantic.com/technology/archive/2018/03/drone-swarms-are-going-to-be-terrifying/555005/ [11] https://www.theatlantic.com/technology/archive/2018/03/drone-swarms-are-going-to-be-terrifying/555005/ [12] https://www.cnbc.com/2019/09/18/saudi-arabia-drone-and-missile-debris-proves-iranian-role-in-attack.html [13] https://www.theguardian.com/world/2019/sep/19/how-did-attack-breach-saudi-defences-and-what-will-happen-next [14] https://www.cnbc.com/2019/09/20/oil-drone-attack-damage-revealed-at-saudi-aramco-facility.html [15] https://apnews.com/f9115454fd1124660a68396994ecbd3e [16] https://www.oryxspioenkop.com/2021/09/iranian-loitering-munitions-used.html [17] https://www.bbc.com/news/world-middle-east-49733558 [18] https://www.theguardian.com/world/2019/sep/16/middle-east-drones-signal-end-to-era-of-fast-jet-air-supremacy [19] https://www.theverge.com/2019/2/6/18213476/china-us-ai-arms-race-artificial-intelligence-automated-warfare-military-conflict [20] https://www.washingtonpost.com/world/who-is-attacking-russias-main-base-in-syria-a-new-mystery-emerges-in-the-war/2018/01/09/4fdaea70-f48d-11e7-9af7-a50bc3300042_story.html [21]https://www.bloomberg.com/news/articles/2018-03-06/google-ai-used-by-pentagon-drone-program-in-rare-military-pilot [22] https://www.nytimes.com/2021/06/03/world/africa/libya-drone.html [23] https://www.washingtonpost.com/technology/2021/07/07/ai-weapons-us-military/ [24] https://www.newscientist.com/article/2278852-drones-may-have-attacked-humans-fully-autonomously-for-the-first-time/ [25] https://thebulletin.org/2021/05/was-a-flying-killer-robot-used-in-libya-quite-possibly/ [26] https://tass.com/defense/935290 [27] https://www.newsweek.com/russia-military-challenge-us-china-missile-own-decisions-639926 [28] https://www.newsweek.com/drones-swarm-autonomous-russia-robots-609399 [29] https://www.popularmechanics.com/military/weapons/news/a27393/kalashnikov-to-make-ai-directed-machine-guns/ [30] https://tass.com/defense/957049 [31] https://www.bbc.com/news/technology-32334186 [32] https://www.bbc.com/news/technology-38569027 [33] https://www.newamerica.org/cybersecurity-initiative/digichina/blog/full-translation-chinas-new-generation-artificial-intelligence-development-plan-2017/ [34] https://www.nytimes.com/2018/11/15/magazine/autonomous-robots-weapons.html [35] https://gizmodo.com/google-is-helping-the-pentagon-build-ai-for-drones-1823464533 [36] https://thebulletin.org/2017/12/project-maven-brings-ai-to-the-fight-against-isis/ [37] https://theintercept.com/2018/03/06/google-is-quietly-providing-ai-technology-for-drone-strike-targeting-project/ [38] https://www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.html [39] https://theintercept.com/2018/05/31/google-leaked-emails-drone-ai-pentagon-lucrative/ [40] https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x [41] https://www.fastcompany.com/90682901/meet-the-ex-googler-whos-exposing-the-tech-military-industrial-complex Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
mAkCAZSq2a0 | 07 Oct 2021
Australia is lost. It's no longer a liberal democracy with government accountability. It's a surveillance state with unlimited police powers and eradicated civil rights. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F IMPORTANT!!! Sources wouldn't fit in the description. They are in the pinned comment of the video: https://www.youtube.com/watch?v=mAkCAZSq2a0 This is how Australia, once a much appraised liberal democracy, descended into a full-blown police state. Australian intelligence is one of the most powerful entities in the world. Yet it has the least amount of oversight out of all democratic nations. The law doesn’t grant Australian public the right to know about any intelligence operation, current or past ones. Disclosing information about operations is done solely at the discretion of Australian intelligence. Any unauthorized disclosure from public servants or intelligence officers, can lead to 10 years of imprisonment. No Edward Snowden or Julian Assange could ever come out of Australia, because even reporting journalists would be charged with the same crimes as whistleblowers. All attempts to limit intelligence powers have been quickly shut down before they could even reach parliamentary hearings. During the two years of the pandemic, Australian government expanded its powers to the point it rivals those behind the Great Firewall of China. In 2014, Australian parliament passed an amendment to the National Security Legislation with a new wording that allows ASIO to obtain a single warrant to wiretap the entire Internet. The amendment intentionally defines a computer such that it includes all computers operating in a network of a target. Any target person using the Internet is using a network of computers. Which makes the whole Internet the target of intelligence operations. Australian spies can now legally access, modify and delete files, install malware, gain higher privileges and monitor or impersonate people on any device connected to the Internet anywhere in the world. Since 2015, a new amendment now mandates data retention for telecommunication and Internet service providers. All of your browsing history, phone calls, text and email metadata have to be stored in Australia for two years. But all of that is nothing compared to what came next. Dubbed as the “anti-encryption law”, a new act now enables any law enforcement or intelligence agency in Australia to request data collection from companies under threat of hefty fines or imprisonment. A technical assistance notice can mandate a company to give access to customer data they already hold. This means any company can be required to secretly log data on any user without a warrant. If a government agency needs additional data a specific company cannot provide yet, a technical capability notice will mandate them to build new surveillance tools to collect that data. The technical assistance request is the only voluntary form of cooperation on the bill. This one, however, means companies can willingly provide special access to their customer data in absolute secrecy. It would never be a matter of any record. No systemic weakness limits apply to these requests. Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
VUhKTngpd8c | 20 Sep 2021
AI-derived scores rank individuals based on their profitability or risk as consumers, job candidates, or even defendants in court. Machine-learning algorithms decide your life. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Businesses, courts and the police have adopted artificial intelligence to assign scores to individuals based on poorly understood statistical analysis. The public needs to start a dialogue about whether or not we want to accept the ethics of this practice. Throughout my research, I have been able to identify seven different scores maintained on individuals or locations. Here’s what I could find. You have a: • consumer score, which is now widespread among customer-oriented enterprises • Health Score and Driver Score, – both of which are sought by insurance companies and I already covered these two scoring systems in separate videos. • Credit Rating Score – used in lending, loaning and banking markets. • Job Applicant Score – most commonly deployed in resume scanning and candidate ranking • a risk-assessment score used in criminal justice system, • and a predictive policing score Sources Bias and privacy concerns: https://news.harvard.edu/gazette/story/2020/10/ethical-concerns-mount-as-ai-takes-bigger-decision-making-role/ Consumer score https://www.theverge.com/2019/11/6/20952239/secret-consumer-score-data-privacy-kashmir-hill-airbnb-yelp https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html https://www.wsj.com/articles/on-hold-for-45-minutes-it-might-be-your-secret-customer-score-1541084656 https://www.inc.com/bill-murphy-jr/secret-consumer-scores-explain-why-some-people-get-much-better-service-than-others-now-you-can-finally-request-your-data-get-your-file.html Health score https://www.statnews.com/2015/12/15/insurance-big-data/ https://www.propublica.org/article/health-insurers-are-vacuuming-up-details-about-you-and-it-could-raise-your-rates https://time.com/4588104/medical-data-industry/ https://www.revealnews.org/blog/your-medical-data-is-for-sale-and-theres-nothing-you-can-do-about-it/ Driver score https://www.washingtonpost.com/technology/2019/12/17/what-does-your-car-know-about-you-we-hacked-chevy-find-out/ https://www.consumerreports.org/automotive-technology/the-cameras-in-your-car-may-be-harvesting-data-as-you-drive-a3473812015/ https://www.mckinsey.com/~/media/mckinsey/industries/automotive%20and%20assembly/our%20insights/monetizing%20car%20data/monetizing-car-data.ashx Job applicant score Amazon hiring AI bias: https://www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G https://www.cnbc.com/2021/08/23/the-resume-may-no-longer-be-the-tool-for-hiring-a-more-diverse-team.html Resume screening: https://www.vox.com/recode/2019/12/12/20993665/artificial-intelligence-ai-job-screen https://www.inc.com/minda-zetlin/ai-artificial-intelligence-screening-resumes-how-to-prepare.html Babysitter screening: https://gizmodo.com/predictim-claims-its-ai-can-flag-risky-babysitters-so-1830913997 Risk-assessment score in justice system https://www.wired.com/story/algorithms-shouldve-made-courts-more-fair-what-went-wrong/ https://www.wired.com/story/when-government-rules-by-software-citizens-are-left-in-the-dark/ https://www.telegraph.co.uk/news/2020/10/19/robot-judges-can-determine-guilt-will-commonplace-within-50/ Machine bias in criminal sentencing: https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing https://www.zdnet.com/article/ai-in-the-court-are-robot-judges-next/ https://www.nytimes.com/2016/06/23/us/backlash-in-wisconsin-against-using-data-to-foretell-defendants-futures.html https://www.nytimes.com/2017/05/01/us/politics/sent-to-prison-by-a-software-programs-secret-algorithms.html https://www.theverge.com/2019/1/17/18186674/daniel-chen-machine-learning-rule-of-law-economics-psychology-judicial-system-policy Predictive policing https://www.technologyreview.com/2020/07/17/1005396/predictive-policing-algorithms-racist-dismantled-machine-learning-bias-criminal-justice/ https://www.theverge.com/2018/2/27/17054740/palantir-predictive-policing-tool-new-orleans-nopd https://www.nytimes.com/2015/09/25/us/police-program-aims-to-pinpoint-those-most-likely-to-commit-crimes.html Credits Music by: Karl Casey - White Bat Audio Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
YnaBEiBVngw | 07 Sep 2021
Apple is secretly monopolizing advertising on the iOS platform and is on the path of becoming one of the largest advertisers on the global mobile market. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Apple Advertising Network: https://searchads.apple.com/ Apple Advertising Privacy Policy: https://support.apple.com/en-us/HT205223 Apple Privacy Policy: https://www.apple.com/legal/privacy/en-ww/ App Store privacy policy: https://developer.apple.com/app-store/user-privacy-and-data-use/ Apple's secret data sharing deal with Facebook https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html Apple's image scanning software: https://www.businessinsider.com/apple-plans-software-scan-us-iphones-child-abuse-images-report-2021-8 https://www.nytimes.com/2021/08/05/technology/apple-iphones-privacy.html https://www.nytimes.com/2021/08/18/technology/apple-child-abuse-tech-privacy.html Apple dropped end-to-end encrypted iCloud https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT Google's response to Apple's IDFA change https://www.reuters.com/article/google-apple-int/google-to-stop-using-apple-tool-to-track-iphone-users-avoiding-new-pop-up-warning-idUSKBN29W1VM Mozilla on IDFA https://blog.mozilla.org/en/internet-culture/mozilla-explains/turn-off-idfa-for-apps-apple-ios-14-5/ Apple's share on the mobile market https://digiday.com/marketing/ad-tech-is-girding-itself-for-the-loss-of-apples-idfa-heres-what-you-need-to-know/ https://finance.yahoo.com/news/global-mobile-advertising-market-2021-114300762.html https://www.statista.com/statistics/266572/market-share-held-by-smartphone-platforms-in-the-united-states/ https://digiday.com/marketing/state-mobile-advertising/ Smartphone sales in decline: https://www.cnet.com/tech/mobile/smartphone-sales-drop-20-in-q2-due-to-coronavirus-pandemic-analyst-says/ https://www.zdnet.com/article/as-smartphone-sales-decline-again-apple-may-have-a-few-lessons-to-learn-from-samsung-and-huawei/ Credits Music by: CO.Ag Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Karl Casey - White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
1Zjwwkzbp-Y | 24 Jul 2021
#short VPNs are useless for privacy. Good for Netflix. Full video here: https://youtu.be/6ohvf03NiIA Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Don’t use a VPN for privacy. I can’t even count how many times I’ve seen people being mislead into believing this fallacy. VPNs don’t protect your privacy. All free VPNs are data mining operations and paid VPNs are just false advertising. They just change your IP address. Even that is unreliable. Modern trackers inside apps and websites don’t even need to know your IP address to know who you are or where you are. If you are logged in to Facebook or Google or install their apps on your phone, a VPN does nothing to protect you. VPN encryption is pretty much useless for 99% of cases. Most connections to servers from websites and apps are encrypted by HTTPS or TLS respectively. You have to trust your VPN provider doesn’t keep logs of your browser activity. All of that fancy VPN encryption is stripped at your provider so they can see everything you do. And not just them but any server provider that you have no way of auditing or verifying their policies. VPNs were designed for businesses to connect remote offices with their main networks. They were not meant for consumer privacy. If you want privacy on the Internet, use Tor. It’s free, open source, and above all – it’s trustless. Keep your VPN for Netflix. Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
pid5kmWXSj8 | 17 Jul 2021
JavaScript will probably ruin your life. Disable it, block it, and stay safe from the most common vector of malware infection. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Text tutorial on how to disable JavaScript on Chromium browsers: https://www.howtogeek.com/663569/how-to-disable-and-enable-javascript-on-google-chrome/ Tor Browser security settings: https://tb-manual.torproject.org/ga/security-settings/ The following browser add-ons can be found in your browser's extension store (i.e. Chrome or Mozilla): NoScript: https://noscript.net/ uBlock Origin: https://github.com/gorhill/uBlock Official documentation on JavaScript by Mozilla https://developer.mozilla.org/en-US/docs/Web/JavaScript https://developer.mozilla.org/en-US/docs/Learn/JavaScript/First_steps/What_is_JavaScript General information about JavaScript https://w3techs.com/technologies/details/cp-javascript/ History of JS http://speakingjs.com/es5/ch04.html Web 2.0 https://www.britannica.com/topic/Web-20 https://www.oreilly.com/pub/a//web2/archive/what-is-web-20.html JavaScript security report 2020 https://go.talasecurity.io/global-data-risk-state-web-report-2020? Examples of exploits delivered by JavaScript https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/ https://www.zdnet.com/article/an-insecure-mess-how-flawed-javascript-is-turning-web-into-a-hackers-playground/ https://www.techrepublic.com/article/major-websites-plagued-by-lack-of-effective-security-against-javascript-vulnerabilities/ Cross-site scripting: https://www.cloudflare.com/learning/security/threats/cross-site-scripting/ https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/ https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html https://techcrunch.com/2019/08/29/google-iphone-secretly-hacked/ https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/ https://www.bleepingcomputer.com/news/security/google-fixes-sixth-chrome-zero-day-exploited-in-the-wild-this-year/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
nqV_0cImBxM | 10 Jul 2021
#shorts How your phone tracks your location and how you can stop it. Full video here: https://youtu.be/GMIY4J8jAUc Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources: GPS https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy Cell tower triangulation https://www.101computing.net/cell-phone-trilateration-algorithm/ https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy https://www.ghacks.net/2018/08/13/google-may-track-your-location-even-if-you-disable-location-tracking/ https://apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/ WiFi positioning and radio triangulation https://transition.fcc.gov/pshs/911/Apps%20Wrkshp%202015/911_Help_SMS_WhitePaper0515.pdf Bluetooth beacons and surveillance https://www.privacyinternational.org/explainer/3536/bluetooth-tracking-and-covid-19-tech-primer https://medium.com/supplyframe-hardware/bluetooth-indoor-positioning-and-asset-tracking-solutions-8c78cae0a03 https://www.nytimes.com/interactive/2019/06/14/opinion/bluetooth-wireless-tracking-privacy.html https://www.wsj.com/articles/coronavirus-tracking-apps-raise-questions-about-bluetooth-security-11588239000 Ultrasonic cross-device tracking https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ https://www.zdnet.com/article/hundreds-of-apps-are-using-ultrasonic-sounds-to-track-your-ad-habits/ https://techcrunch.com/2014/07/24/silverpush-audio-beacons/ https://www.campaignlive.com/article/retailers-shoppers-resist-apples-ibeacon-signals/1363907 https://arstechnica.com/gadgets/2015/07/meet-googles-eddystone-a-flexible-open-source-ibeacon-fighter/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Ev9_oDHNf-4 | 02 Jul 2021
This is how Tim Cook turned Apple into China's biggest ally in their imperial and authoritarian expansion. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Apple is making billions of dollars integrating into countries with authoritarian regimes. Even if it means helping to cement the power of the ruling elite or enabling egregious abuse of human rights. And there doesn’t seem to be anything Apple wouldn’t do for the sake of growth and expansion. Apple cites compliance with local laws as the reason for giving human rights abuse a go. But the actions of the most valuable company in the world go far beyond compliance with the law. Sources Apple's financial report: https://www.apple.com/newsroom/2021/04/apple-reports-second-quarter-results/ https://www.apple.com/newsroom/pdfs/FY21_Q2_Consolidated_Financial_Statements.pdf LGBT apps censored by Apple or removed from the App Store: https://www.dailymail.co.uk/sciencetech/article-9693665/Report-says-27-LGBT-apps-censored-Apple-China-tech-giant-denies-that.html https://www.protocol.com/china/china-app-store-lgbtq-censorship Apple's Private Relay feature not available in China: https://www.reuters.com/world/china/apples-new-private-relay-feature-will-not-be-available-china-2021-06-07/ Apple censoring Belarus activists: https://www.msn.com/en-us/news/world/apple-is-censoring-belarus-protesters-activists-say/ar-BB1a4oXd Telegram censorship: https://www.nytimes.com/2018/05/31/technology/telegram-apple-russia.html Apple helps Saudi men track their wives: https://www.insider.com/absher-14-members-of-congress-demand-apple-google-remove-saudi-app-2019-2 https://www.aljazeera.com/economy/2019/2/13/apple-google-urged-to-remove-app-that-lets-saudi-men-track-wives Apple's integration into China: https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html https://www.nytimes.com/2018/06/18/technology/apple-tim-cook-china.html https://www.nytimes.com/2020/08/19/technology/apple-2-trillion.html https://www.nytimes.com/2016/12/29/technology/apple-iphone-china-foxconn.html https://www.nytimes.com/2021/06/17/technology/apple-china-doug-guthrie.html Surrendering iCloud data to the Chinese government: https://www.theverge.com/2018/2/28/17055088/apple-chinese-icloud-accounts-government-privacy-speed https://www.nytimes.com/2018/01/23/opinion/apple-china-data.html https://www.bloomberg.com/news/articles/2017-07-12/apple-to-build-first-china-data-center-to-comply-with-local-law https://www.reuters.com/article/us-apple-datacenter-idUSKBN1FQ2E6 https://thediplomat.com/2017/06/chinas-cybersecurity-law-what-you-need-to-know/ https://www.nytimes.com/2017/07/12/business/apple-china-data-center-cybersecurity.html Apple censored New York Times app in China: https://www.nytimes.com/2017/01/04/business/media/new-york-times-apps-apple-china.html Censoring Hong Kong apps: https://www.nytimes.com/2019/10/09/technology/apple-hong-kong-app.html https://www.macrumors.com/2019/10/03/apple-bans-app-used-by-hong-kong-protestors/ https://techcrunch.com/2019/10/09/apple-pulls-hkmap-from-app-store-the-day-after-chinese-state-media-criticized-its-unwise-and-reckless-decision-to-approve-it/? Censoring Quartz: https://www.theverge.com/2019/10/9/20907228/apple-quartz-app-store-china-removal-hong-kong-protests-censorship Censoring VPNs: https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html? Tim Cook says "I'm gay": https://www.msnbc.com/msnbc/apple-ceo-tim-cook-comes-out-gay-im-proud-msna447236 Apple kowtowed to the FBI: https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT ...but Google didn't: https://security.googleblog.com/2018/10/google-and-android-have-your-back-by.html Hosting malware apps on the App Store that target Uyghurs: https://www.theinformation.com/articles/apple-hosts-apps-run-by-china-paramilitary-group-accused-of-uyghur-genocide https://appleinsider.com/articles/21/03/26/apple-accused-of-hosting-apps-by-chinese-group-tied-to-uyghur-genocide https://about.fb.com/news/2021/03/taking-action-against-hackers-in-china/ Apple censored 55,000 apps in China: https://www.reuters.com/article/us-apple-china-games-idUSKBN2950P1 Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
nK8mE94P7p4 | 23 Jun 2021
#short Is your phone listening to you? Well, this is what we know for sure. Full video: https://youtu.be/j1FfVK6sj4I Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Your phone is definitely listening. But not to you per se, but to your surroundings. Using access to the microphones on your phone, apps can listen to inaudible ultrasonic frequencies typically in the range between 18 and 20 kHz. They are listening for audio beacons inside other devices nearby and transmit small amount of information at the rate of about 10-20 bits per second. That’s enough to transfer identifiable information about your device or what ads you see on your desktop and commercials you watch on TV. This high-frequency sound transmission can capture data within a 65-feet radius, or about 20 meters and it can communicate even with devices that are not connected to the internet. This is called ultrasonic cross-device tracking. It’s using basic physical properties of moving components in modern electronic devices that are impossible to disable or opt out of. Even if you revoke microphone permission, ultra-sonic transmission can happen between gyroscope sensors which require no permission on iPhone and can only be revoked in Android developer settings and on GrapheneOS. Speaker-to-speaker transmission is also fully capable of ultra-sonic cross-device tracking and the only way to stop it is to desolder your speakers. Sources Ultrasonic cross-device tracking: https://intellisec.de/pubs/2016-batmobile.pdf https://techcrunch.com/2014/07/24/silverpush-audio-beacons/ https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/ https://thehackernews.com/2017/05/ultrasonic-tracking-signals-apps.html https://www.cbsnews.com/news/google-removes-apps-that-use-ultrasonic-frequencies-to-track-users/ https://www.zdnet.com/article/hundreds-of-apps-are-using-ultrasonic-sounds-to-track-your-ad-habits/ https://www.wired.com/story/ultrasonic-signals-wild-west-of-wireless-tech/ https://arstechnica.com/information-technology/2016/11/how-to-block-the-ultrasonic-signals-you-didnt-know-were-tracking-you/ https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ https://www.forbes.com/sites/thomasbrewster/2015/11/16/silverpush-ultrasonic-tracking/ https://intellisec.de/pubs/2016-batmobile.pdf Ultrasonic malware https://arstechnica.com/information-technology/2013/12/scientist-developed-malware-covertly-jumps-air-gaps-using-inaudible-sound/ Gyroscope ultrasonic tracking https://caslab.csl.yale.edu/publications/matyunin2018zeropermission.pdf Passive-speaker ultrasonic tracking https://www.sciencedirect.com/science/article/pii/S2214212619304697 Soundwave hacking https://fortune.com/2016/10/30/soundwave-hacking/ https://www.blackhat.com/eu-16/briefings.html#talking-behind-your-back-attacks-and-countermeasures-of-ultrasonic-cross-device-tracking Apple https://appleinsider.com/articles/20/09/08/future-apple-devices-may-use-sound-outside-of-human-hearing-to-signal-each-other https://www.comparitech.com/blog/information-security/block-ultrasonic-tracking-apps/ Fileless malware https://www.comparitech.com/blog/information-security/fileless-malware-attacks/ Cross-device tracking explained https://cdt.org/insights/cross-device-tracking-requires-strong-privacy-and-security-standards/ https://www.campaignlive.com/article/why-cross-device-tracking-latest-obsession-marketers/1361742 https://www.campaignlive.com/article/retailers-shoppers-resist-apples-ibeacon-signals/1363907 https://arstechnica.com/gadgets/2015/07/meet-googles-eddystone-a-flexible-open-source-ibeacon-fighter/ Ultrasound firewall https://phys.org/news/2018-05-ultrasound-firewall-mobile.html Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
aogw71PXvvc | 18 Jun 2021
Is it possible that autocratic rulers could use Bitcoin's transparent blockchain to crack down on their citizen? The tool of financial liberation could also be a tool of power consolidation. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F El Salvador is on the verge of a historic change. The country now led by a social media crafty 39-year-old millennial is rewriting its history. While until now, El Salvador has been most well-known for its endless struggles with gang wars, it may soon become a Central American hub for digital revolution of the blockchain technology. From September this year, every business in El Salvador will have to accept bitcoin as a payment method. But will this actually deliver Salvadorans on the Bitcoin’s promise of financial freedom? Or will El Salvador’s president use Bitcoin to prop up his regime? Sources El Salvador approves Bitcoi as a legal tendern: https://www.reuters.com/world/americas/el-salvador-approves-first-law-bitcoin-legal-tender-2021-06-09/ https://www.reuters.com/technology/el-salvador-presidents-bitcoin-push-casts-shadow-over-imf-efforts-2021-06-07/ https://www.nytimes.com/2021/06/09/world/americas/salvador-bitcoin.html https://arstechnica.com/tech-policy/2021/06/bitcoin-now-legal-tender-in-el-salvador-first-nation-to-adopt-cryptocurrency/ Bitcoin mining: https://www.reuters.com/technology/el-savador-exploring-volcanic-bitcoin-mining-bukele-says-2021-06-09/ https://www.coindesk.com/volcano-powered-bitcoin-mining-goes-from-twitter-idea-to-state-policy-in-el-salvador El Salvador Britannica https://www.britannica.com/place/El-Salvador https://www.britannica.com/place/El-Salvador/Economy CIA on El Salvador https://www.cia.gov/the-world-factbook/countries/el-salvador/ El Salvador World Bank overview: https://www.worldbank.org/en/country/elsalvador/overview El Salvador GDP https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG?end=2019&locations=SV&start=1966&view=chart Unbanked Salvadorans: https://globalfindex.worldbank.org/sites/globalfindex/files/chapters/2017%20Findex%20full%20report_chapter2.pdf Countries by remittance revenue: https://www.worldbank.org/en/topic/migrationremittancesdiasporaissues/brief/migration-remittances-data Homicide rates: https://insightcrime.org/news/analysis/2020-homicide-round-up/ https://insightcrime.org/news/analysis/homicide-drop-el-salvador/ https://dataunodc.un.org/data/homicide/Homicide%20rate%20by%20sex El Salvador pandemic response https://apnews.com/article/san-salvador-coronavirus-pandemic-el-salvador-1623416c0ddc7aa238911f8a422b6c8b Human rights abuses: https://www.hrw.org/news/2020/04/15/el-salvador-police-abuses-covid-19-response Nayib Bukele path to rule and how it threatens democracy in El Salvador https://news.yahoo.com/el-salvadors-fa-ade-democracy-121836174.html https://foreignpolicy.com/2021/05/12/central-america-rule-of-law-under-attack-el-salvador-nicaragua-guatemala-honduras/ https://www.aljazeera.com/news/2021/3/8/how-nayib-bukele-won-over-voters-unlikely-place https://www.aljazeera.com/news/2021/2/27/el-salvador-elections-president-bukele-set-to-gain-more-control https://www.latimes.com/world-nation/story/2021-05-16/nayib-bukele-the-most-popular-president-in-the-world-is-a-man-with-one-ideology-power https://www.latimes.com/world-nation/story/2020-02-28/el-salvadors-bukele-reformer-or-autocrat https://www.bloomberg.com/news/articles/2021-05-05/el-salvador-s-bukele-defends-firing-attorney-general-top-judges Gangs in El Salvador https://www.theguardian.com/world/2019/nov/22/el-salvador-a-nation-held-hostage-a-photo-essay Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
KkOqvQeOecM | 11 Jun 2021
PayPal has one of the worst reputations in the world and its centralized business model poses a threat to all users. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Companies that handle your money have a responsibility to their shareholders. They need to pay out dividends and increase share prices, otherwise investors might bail. Serving customers neutrally is risky, because at least some of them might use their service in ways that produce really bad PR. PayPal’s terms of service redefines what money means. Its narrow acceptable use policy makes money function as a permissioned tender. You cannot use your funds however you want. PayPal has a broad definition for which payments require pre-approval and which ones are not allowed at all. It isn’t the only financial company susceptible to the failures of centralization, but it’s a perfect case study for why you shouldn’t trust any single authority when it comes to your money. Sources PayPal sucks https://www.trustpilot.com/review/www.paypal.com PayPal's acceptable use policy https://www.paypal.com/en/webapps/mpp/ua/acceptableuse-full Ridiculous examples of PayPal financial censorship Tardigrade https://news.bitcoin.com/the-moss-piglet-dilemma-paypal-bans-payments-to-merchants-using-the-word-tardigrade/ https://twitter.com/c/ArchieMcPhee/status/1304434532293046272 https://www.geekwire.com/2020/weird-seattle-retailer-archie-mcphee-hit-even-weirder-paypal-security-glitch/ https://twitter.com/princessmlokhia/status/1394399401263632384 Cancelled without explanation https://mises.org/power-market/paypal-censorship-not-limited-online-provocateurs https://puntofisso.medium.com/paypal-closed-my-account-with-no-explanation-it-could-happen-to-you-6ff0ba4ea95f https://twitter.com/Kimberleypfp/status/1304443884005740544 Cancelled for speech https://www.theguardian.com/technology/2018/nov/09/paypal-proud-boys-antifa-ban-gavin-mcinnes-criticism https://www.huffpost.com/entry/tech-companies-white-supremacists-stripe-paypal-square-anedot_n_5b71fd68e4b0ae32af9ae20e https://www.theverge.com/2017/8/16/16159310/apple-pay-drops-support-white-supremacist-neo-nazi-merchandise https://www.buzzfeednews.com/article/blakemontgomery/the-alt-right-has-a-payment-processor-problem https://www.cnet.com/news/paypal-and-shopify-remove-trump-related-accounts-citing-policies-against-supporting-violence/ https://mashable.com/article/epik-domain-names-paypal-proud-boys/? https://www.nytimes.com/2021/01/10/technology/parler-app-trump-free-speech.html Screening based on keywords https://thegrayzone.com/2020/01/09/paypal-blocks-donations-iran/ https://www.coindesk.com/venmo-censorship-neutral-platforms-like-bitcoin https://www.businessinsider.com/venmo-blocking-palestine-relief-payments-us-treasury-sanctions-rules-2021-5 https://twitter.com/SJPUIC/status/1394417124458827780 Censoring publishers https://news.bitcoin.com/pornhub-accepts-bitcoin-top-adult-site-cryptocurrency-payment/ https://www.wired.com/2010/12/paypal-wikileaks/ https://www.thepaypalblog.com/2010/12/paypal-statement-regarding-wikileaks/ https://www.forbes.com/sites/andygreenberg/2010/12/07/visa-mastercard-move-to-choke-wikileaks/ https://www.coindesk.com/blackballed-by-paypal-scientific-paper-pirate-takes-bitcoin-donations https://www.washingtonpost.com/national-security/justice-department-investigates-sci-hub-founder-on-suspicion-of-working-for-russian-intelligence/2019/12/19/9dbcb6e6-2277-11ea-a153-dce4b94e4249_story.html PayPal under investigation https://www.washingtonpost.com/business/economy/us-consumer-watchdog-agency-investigates-venmo-payments-app/2021/02/05/a869e7d6-67ad-11eb-886d-5264d4ceb46d_story.html PayPal's crypto lure https://newsroom.paypal-corp.com/2020-10-21-PayPal-Launches-New-Service-Enabling-Users-to-Buy-Hold-and-Sell-Cryptocurrency https://blog.trezor.io/why-you-should-not-use-paypal-for-bitcoin-f6e2d436ca96? PayPal's compliance with government mandates https://www.bbc.com/news/technology-32067151 OFAC https://home.treasury.gov/policy-issues/office-of-foreign-assets-control-sanctions-programs-and-information https://newsroom.paypal-corp.com/Keeping-the-Venmo-Community-Secure-The-Companys-Approach-to-OFAC-Compliance PayPal's integration into China https://www.reuters.com/article/us-china-paypal-stake-idUSKBN29J0IC https://edition.cnn.com/2019/09/30/tech/paypal-gopay-china-payments/index.html https://techcrunch.com/2021/04/28/paypal-china/? Censorship by other centralized financial institutions https://www.huffpost.com/entry/bank-of-america-will-stop_n_798605 https://stripe.com/restricted-businesses Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne
ZWvh8Ttd9eA | 04 Jun 2021
The government can take anything from you for no reason - your cash, cars, even your entire home. It's called civil asset forfeiture. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Not to be confused with criminal forfeiture, which requires conviction of a defendant with proof beyond reasonable doubt, civil asset forfeiture allows the government to take your money or property of whatever value or amount, without you ever being convicted, charged, investigated or prosecuted. It is a civil action against an object, not a person, so no evidence of crime needs to be provided. Whatever the government takes is immediately put to use, auctioned for sale or kept for their own use if they like your stuff. Sources Reports from the Justice Department can be found here: https://www.justice.gov/afp/reports-0 2020 DoJ Annual report https://www.justice.gov/afms/fy2020-asset-forfeiture-fund-reports-congress Christian charity's assets forfeited https://www.washingtonpost.com/news/wonk/wp/2016/04/25/how-oklahoma-cops-took-53000-from-a-burmese-christian-band-a-church-in-omaha-and-an-orphanage-in-thailand/ Seizing prepaid cards https://oklahomawatch.org/2016/06/07/new-front-in-civil-forfeiture-okla-authorities-get-devices-to-seize-funds-loaded-onto-prepaid-cards/ https://www.huffpost.com/entry/oklahoma-police-erad_n_57584060e4b0e39a28ac2083 https://oklahomawatch.org/2016/06/13/highway-patrol-defends-use-of-prepaid-card-readers-blasts-internet-assassinations/ https://www.huffpost.com/entry/bob-colbert-oklahoma-civil-forfeiture_n_56fe92bce4b083f5c6077acf Abuse in spending https://oklahomawatch.org/2015/07/15/law-enforcement-seizures-misspent-missing/ Oklahoma Sheriff extortion https://www.oklahoman.com/article/5488745/grand-jury-indicts-wagoner-county-sheriff-calls-for-his-removal? Oklahoma audit on seized assets https://oklahomawatch.org/2015/07/15/audit-findings-for-seized-assets/ https://www.ajc.com/news/local-govt--politics/feds-want-reimbursement-for-gwinnett-sheriff-70k-muscle-car/zkOidGb5oRfCHGO5RlZGsL/ Civil Asset Forfeiture explained https://drugpolicy.org/sites/default/files/Drug_Policy_Alliance_Above_the_Law_Civil_Asset_Forfeiture_in_California.pdf https://www.washingtonpost.com/investigations/holder-ends-seized-asset-sharing-process-that-split-billions-with-local-state-police/2015/01/16/0e7ca058-99d4-11e4-bcfb-059ec7a93ddc_story.html https://www.washingtonpost.com/sf/investigative/collection/stop-and-seize-2/ https://www.newyorker.com/magazine/2013/08/12/taken https://www.washingtonpost.com/sf/investigative/2014/09/07/police-intelligence-targets-cash/ https://www.nytimes.com/2019/02/20/us/politics/civil-asset-forfeiture-supreme-court.html? https://www.propublica.org/article/law-to-clean-up-nuisances-costs-innocent-people-their-homes https://ij.org/issues/private-property/civil-forfeiture/ IRS forfeiture https://www.washingtonpost.com/opinions/george-f-will-the-heavy-hand-of-the-irs/2014/04/30/7a56ca9e-cfc5-11e3-a6b1-45c4dffb85a6_story.html US law lets government seize bank accounts with no crime required https://www.nytimes.com/2014/10/26/us/law-lets-irs-seize-accounts-on-suspicion-no-crime-required.html?_r=0 Civil asset forfeiture doesn't help limit crime https://www.propublica.org/article/police-say-seizing-property-without-trial-helps-keep-crime-down-a-new-study-shows-theyre-wrong https://www.washingtonpost.com/opinions/2019/06/11/study-civil-asset-forfeiture-doesnt-discourage-drug-use-or-help-police-solve-crimes/ FBI forfeiture of safe deposit boxes https://reason.com/2021/05/10/the-fbi-seized-heirlooms-coins-and-cash-from-hundreds-of-safe-deposit-boxes-in-beverly-hills-despite-knowing-some-belonged-to-honest-citizens/ Illegal forfeiture cases https://detroitnews.com/story/news/local/wayne-county/2018/12/06/suit-alleges-cops-illegally-seized-car-after-10-marijuana-buy/2218849002/ How asset forfeiture funds police budgets https://www.washingtonpost.com/sf/investigative/2014/10/11/asset-seizures-fuel-police-spending/ Police confiscates more than burglars steal https://www.washingtonpost.com/news/wonk/wp/2015/11/23/cops-took-more-stuff-from-people-than-burglars-did-last-year/? Wish lists of police departments https://www.nytimes.com/2014/11/10/us/police-use-department-wish-list-when-deciding-which-assets-to-seize.html Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
5yqRZo4usjk | 27 May 2021
Apple is the largest tech company in the world and puts the heaviest burden on manufacturers with horrible labor practices. This needs to be stopped. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Apple's integration in China https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html Apple suppliers using forced labor https://www.washingtonpost.com/technology/2020/12/29/lens-technology-apple-uighur/ https://www.washingtonpost.com/technology/2020/11/20/apple-uighur/ https://www.nytimes.com/2020/11/29/business/economy/nike-coca-cola-xinjiang-forced-labor-bill.html https://news.yahoo.com/multiple-apple-suppliers-accused-using-182539740.html https://www.techtransparencyproject.org/articles/apples-employee-uniforms-tied-forced-labor-xinjiang https://goodelectronics.org/seven-apple-suppliers-linked-to-uyghur-forced-labour/ https://www.nationalreview.com/news/china-forces-hundreds-of-thousands-of-uyghurs-to-work-in-xinjiang-cotton-fields-report/ https://dailycaller.com/2020/09/14/chinese-uighur-muslim-forced-reeducation-camps-concentration-camps-forced-labor-goods-suspended/ Labor law violations https://www.businessinsider.com/apple-halts-business-with-iphone-assembler-after-labour-abuses-2020-11 https://www.businessinsider.com/apple-foxconn-breaking-chinese-labor-law-2019-9 https://www.theverge.com/2020/12/9/22166286/apple-china-labor-violations-temporary-workers India workers strike against Apple factory https://timesofindia.indiatimes.com/city/bengaluru/violence-breaks-out-at-wistron-corps-iphone-manufacturing-plant-near-bengaluru/articleshow/79691511.cms https://www.reuters.com/article/india-wistron-workers/violence-at-apple-supplier-in-india-fuels-fears-of-further-worker-unrest-idusl4n2iv1df Apple lobbying against stopping forced labor products https://news.yahoo.com/apple-spent-90-000-lobbying-205737686.html Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
vcu2YUCa0lA | 21 May 2021
Emulating the Big Tech, Tesla is on its path to become a global automobile monopoly. If Musk's plans play out according to his strategy, Tesla might become the only available option for the majority of people. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Tesla is not trying to sell you a self-driving car. Once all the technology and relevant regulation is ready, Tesla’s main revenue will come from renting self-driving taxis. Once Tesla’s vision is fully realized, owning a car will be reserved to a small minority class of people. And there is no other company closer to reaching that vision than Tesla. Plenty of mainstream car companies have entered the autonomous and electric vehicle sphere. But none of them has the Tesla advantage. In 2016, about the time when other companies where just starting out with autopilot, Tesla already collected more than 1.3 billion miles of data from all kinds of real world scenarios, diverse roads and global weather conditions with regular people at the wheel. Their next competitor, Google’s Waymo, only covered 2 million miles since 2009, all with employees on board. The rate at which Tesla gathers more data is also unparalleled. By 2020, Tesla’s mileage with autopilot activated passed 3 billion. Waymo, on the other hand, only collected 20 million miles in autopilot. That’s Tesla leading by more than a factor of 100. Tesla is competing with other car companies but Tesla is not just a car company. It’s also an energy company, a charging company, a software company and most importantly a data company. Footage of Tesla's "vision" feed: https://www.youtube.com/c/Carscoopscom/ https://www.youtube.com/user/greentheonly/ Sources The Tesla Advantage https://www.bloomberg.com/news/articles/2016-12-20/the-tesla-advantage-1-3-billion-miles-of-data Tesla's Data Engine https://www.braincreators.com/brainpower/insights/teslas-data-engine-and-what-we-should-all-learn-from-it Tesla Data Collection: https://www.tesla.com/about/legal https://www.axios.com/what-tesla-knows-about-you-1f21d287-a204-4a6e-8b4a-0786b0afac45.html https://www.zimlon.com/b/comprehensive-list-of-data-tesla-collects-from-their-customers-cm529/ https://electrek.co/2020/10/24/tesla-collecting-insane-amount-data-full-self-driving-test-fleet/ https://electrek.co/2017/05/06/tesla-data-sharing-policy-collecting-video-self-driving/ https://electrek.co/2017/06/14/tesla-autopilot-data-floodgates/ https://electrek.co/2020/04/22/tesla-autopilot-data-3-billion-miles/ https://www.consumerreports.org/privacy/teslas-in-car-cameras-raise-privacy-concerns/ https://fortune.com/2015/10/16/how-tesla-autopilot-learns/ Mobility as a Service https://www.cio.com/article/3433931/tesla-the-data-company.html https://digital.hbs.edu/platform-digit/submission/tesla-a-data-driven-future/ https://www.consumerreports.org/automotive-technology/who-owns-the-data-your-car-collects/ Federated learning https://ai.googleblog.com/2017/04/federated-learning-collaborative.html Homomorphic encryption https://www.microsoft.com/en-us/research/publication/cryptonets-applying-neural-networks-to-encrypted-data-with-high-throughput-and-accuracy/ https://www.zdnet.com/article/tesla-deters-owners-from-picking-unofficial-providers-to-boost-car-performance/ https://www.cnet.com/roadshow/news/elon-musk-tesla-autopilot-price-subscription/ On vertical market integration https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/when-and-when-not-to-vertically-integrate Open Source battle: https://www.zdnet.com/article/tesla-starts-to-release-its-cars-open-source-linux-software-code/ https://www.theregister.com/2018/05/21/tesla_inches_toward_gpl_compliance/ https://gizmodo.com/it-only-took-six-years-but-tesla-is-no-longer-screwing-1826191876 https://sfconservancy.org/blog/2019/oct/30/calling-all-tesla-owners/ Tesla in China https://www.bloomberg.com/news/features/2021-01-13/china-loves-elon-musk-and-tesla-tsla-how-long-will-that-last Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
tJoO2uWrX1M | 14 May 2021
Signal's behavior resembles that of the big tech more and more. But it should be criticized even more harshly than them. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F IMPORTAN!!! Do NOT switch from Signal to Telegram, WhatsApp, etc... Switch to Matrix or stay with Signal if you don't want to use Matrix. Matrix https://matrix.org/ Element (Matrix client) https://element.io/get-started Safing Podcast with me and David: https://safing.io/podcast/2021/05/06/how-weak-business-models-corrupt-privacy-projects/ Sources Signal's Business Model https://nitter.cc/moxie/status/1350901586898259968#m http://ndtv.com/india-news/co-founder-brian-acton-to-ndtv-where-signal-scores-over-whatsapp-2351616 https://productmint.com/signal-business-model-how-does-signal-make-money/ Signal Outage https://www.theverge.com/2021/1/15/22232993/signal-outage-new-users-messages-not-sending MobileCoin Official MobileCoin sources https://github.com/mobilecoinfoundation/mobilecoin https://github.com/mobilecoinfoundation/mobilecoin/tree/master/transaction https://github.com/mobilecoinfoundation/mobilecoin/tree/master/ledger/db https://signal.org/blog/help-us-test-payments-in-signal/ https://nitter.cc/signalapp/status/1379472676905963523 https://signal.org/blog/update-on-beta-testing-payments/ https://www.mobilecoin.foundation/foundation-trusted-nodes https://www.mobilecoin.foundation/about https://mobilecoinfoundation.medium.com/mobilecoin-main-net-8e355d82c726 Media critique and reception from the cybersecurity community https://www.wired.com/story/signal-mobilecoin-payments-messaging-cryptocurrency/ https://www.coindesk.com/mobilecoin-mainnet-launch-ftx-trading Intel vulnerabilities https://www.wired.com/story/researchers-expose-a-new-vulnerability-in-intels-cpus/ Moxie's ties with MobileCoin https://www.coindesk.com/signal-founder-may-have-been-more-than-tech-adviser-mobilecoin https://techcrunch.com/2021/03/09/mobilecoin-a-cryptocurrency-involving-signal-founder-moxie-marlinspike-just-raised-venture-funding/? https://www.financemagnates.com/cryptocurrency/news/binance-labs-leads-30-million-fundraising-mobilecoin/ https://www.sec.gov/Archives/edgar/data/1739466/000173946618000001/xslFormDX01/primary_doc.xml Bruce Schneier on MobileCoin https://www.schneier.com/blog/archives/2021/04/wtf-signal-adds-cryptocurrency-support.html https://www.coindesk.com/secure-messaging-app-signal-reportedly-toying-with-crypto-payments https://news.bitcoin.com/signal-faces-scrutiny-over-mobilecoin-integration/ https://cointelegraph.com/news/revealed-top-4-user-complaints-about-signal-s-new-crypto-payments-beta https://amycastor.com/2021/04/07/signal-adopts-mobilecoin-a-crypto-project-linked-to-its-own-creator-moxie-marlinspike/ https://cointelegraph.com/news/signal-under-fire-over-mobilecoin-partnership Signal wasn't open source for a year https://www.androidpolice.com/2021/04/06/it-looks-like-signal-isnt-as-open-source-as-you-thought-it-was-anymore/ GitHub issues on Signal server code https://github.com/signalapp/Signal-Android/issues/11101#issuecomment-798900367 MobileCoin AMA https://news.ycombinator.com/item?id=26726246 Reddit reception https://old.reddit.com/r/signal/comments/mm6nad/bought_mobilecoin_you_might_have_been_scammed Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ze2i9V1_aIc | 07 May 2021
Passwords are obsolete. Technology has far surpassed the level of protection passwords can offer. Abandon them! Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Just realized I never elaborated on the 1 - 6 percent of the global GDB costs. It's from estimates of damages cost by cybercrime that range from $1 trillion to $6 trillion annually. Sources: https://cisomag.eccouncil.org/cybercrime-will-cost-the-world-us6-trillion-by-the-end-of-the-year-study/ https://www.techradar.com/news/cybercrime-cost-the-world-over-dollar1-trillion-in-2020 Passwords have been the default authentication method for decades and not much has changed about that. Except, we went from counting computing power in megahertz to gigahertz. But we are still using them, only with a non-binding recommendation of “try to make them more complicated.” Half of your password security depends on making sure you do everything right. Create and manage complicated and unique password for each of your accounts, that should periodically change every few months, store your passwords somewhere safe, with properly encrypted backups you should rotate every time you make a change in any of the dozens of your accounts. And you need to make sure that all of the devices and software you are using to store your password is up to date and your system isn’t compromised and that you never fall a victim of a phishing attack. Sources Cybercrime cost $1 trillion in 2020 https://www.techradar.com/news/cybercrime-cost-the-world-over-dollar1-trillion-in-2020 The password is dead https://securityintelligence.com/passwords-are-dead-we-need-a-better-system-now/ https://www.digitaltrends.com/computing/why-the-password-is-dying/ https://blog.lastpass.com/2019/05/passwords-still-problem-according-2019-verizon-data-breach-investigations-report/ https://www.wired.com/2012/11/ff-mat-honan-password-hacker/ Phishing https://atlasvpn.com/blog/a-record-2-million-phishing-sites-reported-in-2020-highest-in-a-decade/ https://www.techradar.com/news/huge-rise-in-phishing-domains-since-covid-vaccines-began https://www.helpnetsecurity.com/2021/04/27/defend-organization-phishing-attack/ Cybersecurity of data bases https://www.complianceweek.com/cyber-security/data-breach-disclosures-drop-in-2020-report-says/30234.article Facebook password fail https://www.nbcnews.com/tech/tech-news/facebook-left-hundreds-millions-user-passwords-unencrypted-n985876 Facebook data leak https://edition.cnn.com/2021/04/06/tech/facebook-data-leaked-what-to-do/index.html Passwords vs passwordless https://www.globenewswire.com/news-release/2018/06/13/1521214/0/en/New-Behavioral-Research-Shows-Over-70-of-Consumers-Choose-Passwordless-MFA-Login-Over-Traditional-Usernames-and-Passwords.html https://services.google.com/fh/files/blogs/google_security_infographic.pdf https://www.helpnetsecurity.com/2018/04/11/phishing-resistant-security/ FIDO https://fidoalliance.org/how-fido-works/ https://fidoalliance.org/specifications/ https://fidoalliance.org/specs/fido-v2.0-ps-20190130/fido-client-to-authenticator-protocol-v2.0-ps-20190130.html https://fidoalliance.org/specs/u2f-specs-master/fido-u2f-overview.html https://docs.microsoft.com/en-us/azure/active-directory/develop/support-fido2-authentication https://fidoalliance.org/fido2/ https://eprint.iacr.org/2020/1298.pdf Nitrokey: https://www.nitrokey.com/ SoloKeys: https://solokeys.com/ * I am not sponsored nor affiliated with either of these. Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
KBmBTY0kKj8 | 30 Apr 2021
#shorts YouTube needs to end. But also, watch this privacy tutorial if you only have 60 seconds left to live. End me now. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Not sponsored by anyone Not affiliated with anyone DuckDuckGo https://duckduckgo.com/ Matrix https://matrix.org/ Signal https://signal.org/ App Firewalls - Netguard https://netguard.me/ - TrackerControl https://trackercontrol.org/ - Blokada https://blokada.org/ - Disconnect https://disconnect.me/ - LockDown https://lockdownprivacy.com/ ProtonMail https://protonmail.com/ Tutanota https://tutanota.com/ OSMAND Map App https://osmand.net/ Credits Music by: CO.AG Music Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
r38Epj6ldKU | 25 Apr 2021
Your data is not safe with Apple. Wherever they can, Apple tracks you and shares your data. Their privacy policy got you covered. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Apple is not your friend. It’s a publicly traded corporation. Just because they sell a lot of hardware doesn’t mean they won’t take every opportunity to increase their revenue by monetizing customer data too. Samsung is much more of a hardware company than Apple but that doesn’t prove anything about their data practices. Their privacy policies and company track records do. Do not trust Apple with your data. Do not trust any company with your data. Compartmentalize. Use free and open source software with good security standards and leadership behind it. Do not put all your eggs in one basket. Use different providers for different services but choose from those that can actually prove they respect your privacy, rather than just use flowery PR talk. Sources Apple's real privacy policy: https://www.apple.com/legal/privacy/en-ww/ Developer guidelines on data practices: https://developer.apple.com/app-store/app-privacy-details Data policies of Apple services: https://www.apple.com/legal/privacy/data/ - Apple Advertising: https://support.apple.com/en-us/HT205223 - App Store: https://support.apple.com/en-us/HT210584 - Apple ID: https://support.apple.com/en-us/HT208650 - iMessage and FaceTime: https://support.apple.com/en-us/HT209110 - Siri: https://support.apple.com/en-us/HT210657 - Apple Pay: https://support.apple.com/en-us/HT210665 - Apple News: https://support.apple.com/en-us/HT205249 - Apple Music: https://support.apple.com/en-us/HT204881 - Apple Music Web Player: https://support.apple.com/en-us/HT208364 Apple transparency report: https://www.apple.com/legal/transparency/pdf/requests-2020-H1-en.pdf Google transparency report: https://transparencyreport.google.com/user-data/overview?hl=en&user_data_produced=authority:US;series:compliance&lu=user_data_produced Data analysis: https://www.import.io/post/business-data-analysis-what-how-why/ Apple kowtow's to the FBI's demands and drops end-to-end encryption: https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT Google develops end-to-end encryption nonetheless: https://security.googleblog.com/2018/10/google-and-android-have-your-back-by.html Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
y8SjmcVJOjw | 16 Apr 2021
Apple has benefited from Facebook data partnership for years. Their privacy grandstanding should be called into question. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Apple has figured out way to uniquely position itself as the sole arbiter of what’s right in the industry that has lost its way and betrayed its customers. And despite cleverly thought out PR stunts bashing other companies for monetizing their services with targeted ads and trackers, Apple has always benefit and participated in the exact same tracking and targeting to the full extent of their capacity. Sources Apple has an advertising network: https://www.adexchanger.com/mobile/is-apple-giving-its-own-ad-network-an-unfair-advantage/ Apple's hypocritical stance on privacy: https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/ Lewis from Unbox Therapy on Apple's privacy commercial: https://www.youtube.com/watch?v=jk3TtaI5_0o Cambridge Analytica: https://www.theguardian.com/us-news/2015/dec/11/senator-ted-cruz-president-campaign-facebook-user-data https://www.nytimes.com/2016/11/20/opinion/cambridge-analytica-facebook-quiz.html Secret device partnership between Facebook and Apple: https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html Google-Apple deal: https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042?il=0 Apple's search engine: https://www.techworm.net/2020/10/apple-search-engine-rival-google.html Apple's China revenue: https://www.cnbc.com/2021/01/28/apple-aapl-had-record-quarter-in-china-thanks-to-iphone-upgrades.html Apple's privacy changes don't affect Google, Facebook and others: https://www.businessinsider.com/apple-google-safari-battle-facebook-privacy-iphone-app-store-2021-2 Zuckerberg on iOS 14 IDFA and "privacy label" changes: https://constine.substack.com/p/pressclub-with-mark-zuckerberg-daniel Google stops using Apple's tracking tools: https://www.reuters.com/article/google-apple-int/google-to-stop-using-apple-tool-to-track-iphone-users-avoiding-new-pop-up-warning-idUSKBN29W1VM "Privacy labels": https://www.nytimes.com/2021/01/27/technology/personaltech/apple-privacy-labels.html Your iPhone tracks you while you sleep: https://www.washingtonpost.com/technology/2019/05/28/its-middle-night-do-you-know-who-your-iphone-is-talking/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
WX2SWUMt_fk | 09 Apr 2021
Your car is collecting so much of your private data it's rivaling social media companies. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Car companies are adopting the Silicon Valley business model to gradually transform drivers into users. Cars today are being enriched with more and more smartphone-like features as drivers lose more and more control over their vehicles. If you bought a car anywhere in the last decade, you didn’t just pay with your money. You signed up to hand over troves of data from your personal life as well. Automakers today are data companies. A modern car can generate about 4 TB of data a day. That’s roughly 25 GB every hour. Automakers realize the value of this data and are beginning investing heavily to compete with software companies for ad-driven user attention. Soon, the biggest competitors of GM or BMW won’t be just other car companies, but Facebook and TikTok. The trend is irreversible. Selling data is a high-margin business, with 80- to 90-percent profit. Compared with the average profit margins of selling cars that rarely exceed double digits, understanding the drive for data is easy. It’s the new currency. Sources Car company profit margins: https://www.statista.com/statistics/1186661/car-company-profit-margin/ Toyota Cloud city: https://www.autonews.com/article/20170710/OEM06/170719963/toyota-s-cloud-city BMW & Daimler partnership: https://www.seattletimes.com/business/bmw-daimler-launch-car-and-ride-sharing-joint-venture/ Car data companies: https://techcrunch.com/2019/05/23/automakers-faced-with-a-choice-become-data-companies-or-become-irrelevant/ Data profit margins: https://arstechnica.com/cars/2018/02/no-one-has-a-clue-whats-happening-with-their-connected-cars-data/ Car data collection: https://arstechnica.com/tech-policy/2021/03/one-company-wants-to-sell-the-feds-location-data-from-every-car-on-earth/ - https://www.vice.com/en/article/k7adn9/car-location-data-telematics-us-military-ulysses-group - https://www.washingtonpost.com/technology/2019/12/17/what-does-your-car-know-about-you-we-hacked-chevy-find-out/ - https://www.nytimes.com/2017/07/27/automobiles/wheels/car-data-tracking.html - https://www.consumerreports.org/automotive-technology/the-cameras-in-your-car-may-be-harvesting-data-as-you-drive-a3473812015/ - predicted value: https://www.mckinsey.com/~/media/mckinsey/industries/automotive%20and%20assembly/our%20insights/monetizing%20car%20data/monetizing-car-data.ashx Who owns your car data: https://www.consumerreports.org/automotive-technology/who-owns-the-data-your-car-collects/ Autonomous vehicle surveillance: https://spectrum.ieee.org/cars-that-think/transportation/self-driving/surveillance-and-the-selfdriving-car https://www.ftc.gov/system/files/documents/public_comments/2017/11/00046-141905.pdf Telematics: https://www.verizonconnect.com/resources/article/what-is-telematics/ Insurance and your car data: https://www.consumerreports.org/cro/car-insurance/credit-scores-affect-auto-insurance-rates/index.htm - https://www.chicagotribune.com/autos/sc-auto-tips-0102-driving-data-collection-20181225-story.html - https://www.nytimes.com/2017/07/27/automobiles/wheels/car-data-tracking.html Tesla data collection: https://www.cio.com/article/3433931/tesla-the-data-company.html - https://www.axios.com/what-tesla-knows-about-you-1f21d287-a204-4a6e-8b4a-0786b0afac45.html GM radio listening experiment: https://eu.freep.com/story/money/cars/general-motors/2018/10/01/gm-radio-listening-habits-advertising/1424294002/ Bluetooth and cars: https://eu.usatoday.com/story/money/cars/2018/01/30/car-renters-beware-bluetooth-use-can-reveal-your-private-data/1080225001/ Mobility as a Service: https://techcrunch.com/2021/03/18/maas-transit-the-business-of-mobility-as-a-service/ Police using private camera feeds: https://www.washingtonpost.com/technology/2019/08/28/doorbell-camera-firm-ring-has-partnered-with-police-forces-extending-surveillance-reach/ Smart Driver Score: https://www.washingtonpost.com/technology/2019/12/17/what-does-your-car-know-about-you-we-hacked-chevy-find-out/ Negative use cases: https://www.rollcall.com/2019/04/09/your-car-is-watching-you-who-owns-the-data/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
94ENNlF_05k | 04 Apr 2021
DELETE GOOGLE! Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Privacy concerns https://www.wsj.com/articles/SB10001424052748703940904575395073512989404 Online searches to be merged with your credit score https://www.zdnet.com/article/your-browser-history-could-soon-be-a-part-of-your-credit-score/ Google identifies your searches with your name https://www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking Google's FLoC non-solution to privacy invasive cookies https://www.eff.org/deeplinks/2021/03/googles-floc-terrible-idea - https://www.vox.com/recode/2021/3/3/22311460/google-cookie-ban-search-ads-tracking On Qwant https://about.qwant.com/download/49637/CP-Qwant-TechRockSummit-EN-1.pdf Algorithm Bias How Low Can Number One go https://moz.com/blog/how-low-can-number-one-go-2020 Filter Bubble in Google https://qz.com/1194566/google-is-finally-admitting-it-has-a-filter-bubble-problem/ https://www.wired.com/story/study-revives-debate-about-googles-filter-bubbles/ Antitrust investigations over Google's market dominance https://www.washingtonpost.com/technology/2020/12/17/google-search-antitrust-lawsuit/ https://www.cnbc.com/2020/10/06/google-overwhelmingly-dominates-search-market-house-committee-finds.html https://www.bloomberg.com/news/articles/2020-07-13/how-google-search-changes-make-it-more-expensive-to-win-traffic https://www.bloomberg.com/news/articles/2021-03-01/u-s-asks-google-for-detailed-search-data-in-antitrust-case Google's shift in search engine strategy https://www.washingtonpost.com/technology/2020/10/19/google-search-results-monopoly/ Google prioritizes own products over competitors https://themarkup.org/google-the-giant/2020/07/28/google-search-results-prioritize-google-products-over-competitors Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ED_Yh6nsGaQ | 16 Mar 2021
Bypass Google, block ads & trackers and circumvent age restriction. NewPipe is the most free and private way of watching YouTube Videos! Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Official website: https://newpipe.net/ Installation guide: https://github.com/TeamNewPipe/NewPipe#installation-and-updates Download an APK of the latest NewPipe release: https://github.com/TeamNewPipe/NewPipe/releases Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
vCRX0MZm2KI | 25 Feb 2021
The virtual keyboard on your phone is probably the biggest security vulnerability. Is what you type on your phone logged? Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Ethereum: 0x6aD936198f8758279C2C153f84C379a35865FE0F Sources Microsoft SwiftKey Reddit submission: https://old.reddit.com/r/Android/comments/4u5b7d/holy_fk_swiftkey_is_giving_me_someone_elses/ https://www.androidauthority.com/swiftkey-suspends-service-data-leak-706680/ https://blogs.microsoft.com/blog/2016/02/03/microsoft-acquires-swiftkey-in-support-of-re-inventing-productivity-ambition/#sm.0000w6ef72qu3dqevkx1zfg136v1p https://gizmodo.com/swiftkey-has-a-neural-network-keyboard-and-its-creepily-1735430695 https://www.engadget.com/2015-10-08-swiftkey-neural-alpha.html? AI.type https://www.howtogeek.com/335428/smartphone-keyboards-are-a-privacy-nightmare/ ZDNet .com investigation: https://www.zdnet.com/article/popular-virtual-keyboard-leaks-31-million-user-data/ MacKeeper research: https://mackeeper.com/blog/post/virtual-keyboard-developer-leaked-31-million-of-client-records/ Gboard Federated learning: https://www.wired.com/story/gboard-smart-reply-privacy/ https://ai.googleblog.com/2017/04/federated-learning-collaborative.html https://support.google.com/gboard/answer/9334583?hl=en&ref_topic=9333182 Incognito mode Signal: https://support.signal.org/hc/en-us/articles/360055276112-Incognito-Keyboard Gboard: https://www.technobuffalo.com/googles-gboard-keyboard-gets-an-incognito-mode Other Samsung fail: https://www.nowsecure.com/blog/2015/06/16/samsung-keyboard-security-risk-disclosed-600m-devices-worldwide-impacted/ Grammarly: https://www.cyberscoop.com/bug-in-grammarly-browser-extension-exposes-virtually-everything-a-user-ever-writes/ https://bugs.chromium.org/p/project-zero/issues/detail?id=1527&desc=2 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
shpiVm1qpnw | 04 Feb 2021
WhatsApp has always been a privacy nightmare. Use Signal and Matrix if you care about your privacy and security! Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Delete WhatsApp: https://faq.whatsapp.com/android/account-and-profile/how-to-delete-your-account/?lang=en&_fb_noscript=1 Use Matrix (Element): https://element.io/ Use Signal: https://signal.org/ Sources WhatsApp Privacy Policy: https://www.whatsapp.com/legal/updates/privacy-policy/?lang=en&_fb_noscript=1 The WhatsApp-Facebook deal: https://money.cnn.com/2014/02/19/technology/social/facebook-whatsapp/index.html Signal delivers end-to-end encryption to WhatsApp: https://signal.org/blog/whatsapp/ Jan Koum on Facebook's acquisition: https://blog.whatsapp.com/index.php/2014/02/facebook/?page=5&_fb_noscript=1 Acton and Koum leaving Facebook: https://www.washingtonpost.com/business/economy/whatsapp-founder-plans-to-leave-after-broad-clashes-with-parent-facebook/2018/04/30/49448dd2-4ca9-11e8-84a0-458a1aa9ac0a_story.html? New WhatsApp privacy policy: https://www.bloomberg.com/news/articles/2021-01-15/whatsapp-delays-updated-privacy-policy-after-confusing-users https://www.bloomberg.com/news/articles/2021-01-11/why-whatsapp-s-privacy-rules-sparked-moves-to-rivals-quicktake Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
1WAwXed88sE | 26 Jan 2021
Life in Sweden is closer to being 'normal' than in most other countries. Calling it a success or failure at this stage, however, is premature. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources The new Swedish law on pandemic measures: https://www.nytimes.com/2021/01/09/world/europe/sweden-coronavirus-restrictions.html https://au.news.yahoo.com/lockdown-shy-sweden-passes-pandemic-105304024.html https://www.euronews.com/2021/01/08/sweden-s-parliament-approves-law-to-allow-government-to-introduce-covid-19-measures Sweden's strategy developing https://www.wsj.com/articles/sweden-tries-to-isolate-covid-19-cases-without-a-lockdown-as-infections-surge-11602004646?mod=article_inline European CDC on mask wearing https://www.ecdc.europa.eu/en/publications-data/using-face-masks-community-reducing-covid-19-transmission Stanford study on lockdowns https://onlinelibrary.wiley.com/doi/10.1111/eci.13484 Sweden's response in spring https://www.nytimes.com/2020/04/28/world/europe/sweden-coronavirus-herd-immunity.html https://www.theguardian.com/world/commentisfree/2020/apr/21/sweden-covid-19-policy-trust-citizens-state https://www.bloomberg.com/news/articles/2020-04-19/sweden-says-controversial-covid-19-strategy-is-proving-effective World Health Organization on lockdowns: https://www.who.int/news-room/q-a-detail/herd-immunity-lockdowns-and-covid-19 Critique of the Sweden's strategy: https://time.com/5899432/sweden-coronovirus-disaster/ https://www.wsj.com/articles/long-a-holdout-from-covid-19-restrictions-sweden-ends-its-pandemic-experiment-11607261658 https://www.wsj.com/articles/scientist-behind-swedens-no-lockdown-policy-says-it-wasnt-strict-enough-11591196353?mod=article_inline Stockholm's population: https://www.scb.se/en/finding-statistics/statistics-by-subject-area/population/population-composition/population-statistics/pong/tables-and-graphs/yearly-statistics--municipalities-counties-and-the-whole-country/population-in-the-country-counties-and-municipalities-on-31-december-2019-and-population-change-in-2019/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were used for news, critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
H33ggs7bh8M | 27 Dec 2020
Monero is the most private currency in existence. More private than Bitcoin or even cash! Merch: https://www.youtube.com/c/TheHatedOne/store Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources Official Monero sources: Guides https://www.getmonero.org/resources/user-guides/ Moneropedia https://www.getmonero.org/resources/moneropedia/ News: https://markets.businessinsider.com/news/stocks/chainalysis-raises-100-million-at-over-1-billion-valuation-to-expand-its-global-regulatory-platform-for-surging-cryptocurrency-market-1029831277?op=1 https://www.coindesk.com/china-police-freeze-otc-traders-bank-accounts-tainted-crypto https://www.vice.com/en/article/wxq9xx/the-irs-wants-to-buy-tools-to-trace-privacy-focused-cryptocurrency-monero https://www.coindesk.com/ciphertrace-monero-cryptocurrency-payments-tracing-dhs Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
-bUWVgYz114 | 25 Dec 2020
Would you ever vote online even if you knew you couldn't verify your ballot's integrity? Securing online elections is way harder than you might think. Merch: https://www.youtube.com/c/TheHatedOne/store Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources: Research on and critique of security models of online voting systems https://www.darkreading.com/edge/theedge/is-voting-by-mobile-app-a-better-security-option-or-just-a-bad-idea/b/d-id/1336152 https://cacm.acm.org/magazines/2019/9/238963-online-voting/fulltext https://verifiedvoting.org/publication/if-i-can-shop-and-bank-online-why-cant-i-vote-online/ https://www.fastcompany.com/90249210/online-voting-is-a-security-nightmare-say-experts https://www.theguardian.com/technology/2015/mar/30/why-electronic-voting-is-not-secure https://www.csoonline.com/article/3269297/online-voting-is-impossible-to-secure-so-why-are-some-governments-using-it.html https://www.washingtonpost.com/politics/2020/10/14/cybersecurity-202-ruling-against-expanding-online-voting-is-win-cybersecurity-advocates/ https://observer.com/2020/06/election-security-why-cant-people-vote-online/ NIST report on online election security in the US https://s.wsj.net/public/resources/documents/Final_%20Risk_Management_for_Electronic-Ballot_05082020.pdf?mod=article_inline https://www.darkreading.com/edge/theedge/is-voting-by-mobile-app-a-better-security-option-or-just-a-bad-idea/b/d-id/1336152 Security flaws found in voting apps https://www.cyberscoop.com/online-voting-election-security-voatz-app-risky-business/ https://www.securitymagazine.com/articles/92584-cybersecurity-concerns-with-online-voting-for-2020-presidential-election https://internetpolicy.mit.edu/wp-content/uploads/2020/06/OmniBallot.pdf https://www.politico.com/news/2020/05/01/coronavirus-online-voting-229690 https://www.wired.com/story/voatz-voting-app-security-flaws/ https://arstechnica.com/tech-policy/2020/09/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research/ https://thefulcrum.us/voting/online-voting-security-risks https://www.npr.org/2020/04/28/844581667/states-expand-internet-voting-experiments-amid-pandemic-raising-security-fears Estonia https://www.csoonline.com/article/3269297/online-voting-is-impossible-to-secure-so-why-are-some-governments-using-it.html https://www.comparitech.com/blog/information-security/cryptography-secure-electronic-voting-systems/ https://www.govtech.com/blogs/lohrmann-on-cybersecurity/could-estonia-be-the-model-for-secure-online-voting.html https://time.com/5541876/estonia-elections-electronic-voting/ https://venturebeat.com/2020/06/11/what-estonia-could-teach-us-about-internet-voting-in-a-post-pandemic-world/ https://e-estonia.com/estonias-i-voting-more-popular-more-secure/ Blockchain https://blogs.lse.ac.uk/usappblog/2020/09/25/long-read-how-blockchain-can-make-electronic-voting-more-secure/ https://people.csail.mit.edu/rivest/pubs/PSNR20.pdf NSA router implants and supply chain attacks https://www.wired.com/2013/09/nsa-router-hacking/ https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ https://techcrunch.com/2014/05/18/the-nsa-cisco-and-the-issue-of-interdiction/ https://theintercept.com/2019/01/24/computer-supply-chain-attacks/ Estonian ID cards vulnerable https://arstechnica.com/information-technology/2017/10/crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
GM8bfPXuntI | 16 Dec 2020
Would you ever vote online even if you knew you couldn't verify your ballot's integrity? Securing online elections is way harder than you might think. Merch: https://www.youtube.com/c/TheHatedOne/store Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources: Research on and critique of security models of online voting systems https://www.darkreading.com/edge/theedge/is-voting-by-mobile-app-a-better-security-option-or-just-a-bad-idea/b/d-id/1336152 https://cacm.acm.org/magazines/2019/9/238963-online-voting/fulltext https://verifiedvoting.org/publication/if-i-can-shop-and-bank-online-why-cant-i-vote-online/ https://www.fastcompany.com/90249210/online-voting-is-a-security-nightmare-say-experts https://www.theguardian.com/technology/2015/mar/30/why-electronic-voting-is-not-secure https://www.csoonline.com/article/3269297/online-voting-is-impossible-to-secure-so-why-are-some-governments-using-it.html https://www.washingtonpost.com/politics/2020/10/14/cybersecurity-202-ruling-against-expanding-online-voting-is-win-cybersecurity-advocates/ https://observer.com/2020/06/election-security-why-cant-people-vote-online/ NIST report on online election security in the US https://s.wsj.net/public/resources/documents/Final_%20Risk_Management_for_Electronic-Ballot_05082020.pdf?mod=article_inline https://www.darkreading.com/edge/theedge/is-voting-by-mobile-app-a-better-security-option-or-just-a-bad-idea/b/d-id/1336152 Security flaws found in voting apps https://www.cyberscoop.com/online-voting-election-security-voatz-app-risky-business/ https://www.securitymagazine.com/articles/92584-cybersecurity-concerns-with-online-voting-for-2020-presidential-election https://internetpolicy.mit.edu/wp-content/uploads/2020/06/OmniBallot.pdf https://www.politico.com/news/2020/05/01/coronavirus-online-voting-229690 https://www.wired.com/story/voatz-voting-app-security-flaws/ https://arstechnica.com/tech-policy/2020/09/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research/ https://thefulcrum.us/voting/online-voting-security-risks https://www.npr.org/2020/04/28/844581667/states-expand-internet-voting-experiments-amid-pandemic-raising-security-fears Estonia https://www.csoonline.com/article/3269297/online-voting-is-impossible-to-secure-so-why-are-some-governments-using-it.html https://www.comparitech.com/blog/information-security/cryptography-secure-electronic-voting-systems/ https://www.govtech.com/blogs/lohrmann-on-cybersecurity/could-estonia-be-the-model-for-secure-online-voting.html https://time.com/5541876/estonia-elections-electronic-voting/ https://venturebeat.com/2020/06/11/what-estonia-could-teach-us-about-internet-voting-in-a-post-pandemic-world/ https://e-estonia.com/estonias-i-voting-more-popular-more-secure/ Blockchain https://blogs.lse.ac.uk/usappblog/2020/09/25/long-read-how-blockchain-can-make-electronic-voting-more-secure/ https://people.csail.mit.edu/rivest/pubs/PSNR20.pdf NSA router implants and supply chain attacks https://www.wired.com/2013/09/nsa-router-hacking/ https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ https://techcrunch.com/2014/05/18/the-nsa-cisco-and-the-issue-of-interdiction/ https://theintercept.com/2019/01/24/computer-supply-chain-attacks/ Estonian ID cards vulnerable https://arstechnica.com/information-technology/2017/10/crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
wyxnaaPqbRk | 26 Nov 2020
The Social Dilemma is a highly appraised Netflix documentary with deep flaws that needs addressing. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
tiNsca8mdls | 11 Nov 2020
In this phone anonymity tutorial, you'll learn how to use Tor on your phone - both Tor Browser and Orbot on Android, and Onion Browser on iOS. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
wTA5Vtp5e3I | 03 Nov 2020
Lemur Pro by System76 is probably the best Linux laptop for an average user. Here's my review of this awesome Linux laptop! Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Lemur Pro can be found here [NOT AFFILIATED]: https://system76.com/laptops/lemur Credits Music by: CHUKI BEATS https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
j1FfVK6sj4I | 25 Oct 2020
Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources Ultrasonic cross-device tracking: https://intellisec.de/pubs/2016-batmobile.pdf https://techcrunch.com/2014/07/24/silverpush-audio-beacons/ https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/ https://thehackernews.com/2017/05/ultrasonic-tracking-signals-apps.html https://www.cbsnews.com/news/google-removes-apps-that-use-ultrasonic-frequencies-to-track-users/ https://www.zdnet.com/article/hundreds-of-apps-are-using-ultrasonic-sounds-to-track-your-ad-habits/ https://www.wired.com/story/ultrasonic-signals-wild-west-of-wireless-tech/ https://arstechnica.com/information-technology/2016/11/how-to-block-the-ultrasonic-signals-you-didnt-know-were-tracking-you/ https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ https://www.forbes.com/sites/thomasbrewster/2015/11/16/silverpush-ultrasonic-tracking/ https://intellisec.de/pubs/2016-batmobile.pdf Ultrasonic malware https://arstechnica.com/information-technology/2013/12/scientist-developed-malware-covertly-jumps-air-gaps-using-inaudible-sound/ Gyroscope ultrasonic tracking https://caslab.csl.yale.edu/publications/matyunin2018zeropermission.pdf Passive-speaker ultrasonic tracking https://www.sciencedirect.com/science/article/pii/S2214212619304697 Soundwave hacking https://fortune.com/2016/10/30/soundwave-hacking/ https://www.blackhat.com/eu-16/briefings.html#talking-behind-your-back-attacks-and-countermeasures-of-ultrasonic-cross-device-tracking Apple https://appleinsider.com/articles/20/09/08/future-apple-devices-may-use-sound-outside-of-human-hearing-to-signal-each-other https://www.comparitech.com/blog/information-security/block-ultrasonic-tracking-apps/ Fileless malware https://www.comparitech.com/blog/information-security/fileless-malware-attacks/ Cross-device tracking explained https://cdt.org/insights/cross-device-tracking-requires-strong-privacy-and-security-standards/ https://www.campaignlive.com/article/why-cross-device-tracking-latest-obsession-marketers/1361742 https://www.campaignlive.com/article/retailers-shoppers-resist-apples-ibeacon-signals/1363907 https://arstechnica.com/gadgets/2015/07/meet-googles-eddystone-a-flexible-open-source-ibeacon-fighter/ Ultrasound firewall https://phys.org/news/2018-05-ultrasound-firewall-mobile.html Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
GMIY4J8jAUc | 18 Oct 2020
Your phone (Android or iPhone) is tracking your location even if you disable Location Services, turn on airplane mode, and disable Bluetooth. Learn how to stop it once and for all. Join my channel https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources: GPS https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy Cell tower triangulation https://www.101computing.net/cell-phone-trilateration-algorithm/ https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy https://www.ghacks.net/2018/08/13/google-may-track-your-location-even-if-you-disable-location-tracking/ https://apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/ WiFi positioning and radio triangulation https://transition.fcc.gov/pshs/911/Apps%20Wrkshp%202015/911_Help_SMS_WhitePaper0515.pdf Bluetooth beacons and surveillance https://www.privacyinternational.org/explainer/3536/bluetooth-tracking-and-covid-19-tech-primer https://medium.com/supplyframe-hardware/bluetooth-indoor-positioning-and-asset-tracking-solutions-8c78cae0a03 https://www.nytimes.com/interactive/2019/06/14/opinion/bluetooth-wireless-tracking-privacy.html https://www.wsj.com/articles/coronavirus-tracking-apps-raise-questions-about-bluetooth-security-11588239000 Ultrasonic cross-device tracking https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ https://www.zdnet.com/article/hundreds-of-apps-are-using-ultrasonic-sounds-to-track-your-ad-habits/ https://techcrunch.com/2014/07/24/silverpush-audio-beacons/ https://www.campaignlive.com/article/retailers-shoppers-resist-apples-ibeacon-signals/1363907 https://arstechnica.com/gadgets/2015/07/meet-googles-eddystone-a-flexible-open-source-ibeacon-fighter/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
dYTlSlnb-iE | 11 Oct 2020
The most important privacy and security features of Android 11 you should know about. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
SjCqCAgMuXc | 27 Sep 2020
Whonix is the safest way to be online and surf the web. Learn how to be anonymous and private with my Tor Tutorial Part 2. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Whonix can be downloaded and everything can be learned at https://www.whonix.org/ I am NOT affiliated or sponsored with Whonix in any way. Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
gTS17WzsZz8 | 18 Sep 2020
Joined by Henry from Techlore, today we are busting some myths about virtual private networks and their providers! Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Techlore's video with me: https://tube.privacytools.io/videos/watch/d5b44a87-446c-43ae-ad64-48db1d2ee72f Techlore channel: https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA and https://www.youtube.com/user/CHUKImusic (techlore's bits) Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
f6LMp74goVc | 05 Sep 2020
Insurance companies use big data to predict your health and profitability. Your life choices may easily cost you your coverage or accessibility of treatments. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources Insurance and Big Data https://www.statnews.com/2015/12/15/insurance-big-data/ https://www.propublica.org/article/health-insurers-are-vacuuming-up-details-about-you-and-it-could-raise-your-rates https://www.npr.org/sections/health-shots/2018/07/17/629441555/health-insurers-are-vacuuming-up-details-about-you-and-it-could-raise-your-rates https://www.propublica.org/series/the-health-insurance-hustle https://time.com/4588104/medical-data-industry/ https://www.aarp.org/caregiving/health/info-2017/how-private-is-medical-information.html Fitbit data can be used to deny health insurance https://theconversation.com/could-your-fitbit-data-be-used-to-deny-you-health-insurance-72565 Your medical data is for sale https://www.revealnews.org/blog/your-medical-data-is-for-sale-and-theres-nothing-you-can-do-about-it/ https://www.businessinsider.com/hospitals-and-health-insurers-using-data-brokers-2014-7?op=1 https://www.medicalrecords.com/consumers/will-medical-records-affect-health-insurance https://www.insure.com/health-insurance/what-they-know.html How re-identification of anonymized data sets work https://techcrunch.com/2019/07/24/researchers-spotlight-the-lie-of-anonymous-data/ https://www.fastcompany.com/90278465/sorry-your-data-can-still-be-identified-even-its-anonymized https://arstechnica.com/information-technology/2015/07/new-attack-on-tor-can-deanonymize-hidden-services-with-surprising-accuracy/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
3eC4Hp4MNBA | 22 Aug 2020
Signal Private Messenger is the most secure messaging app you can install on your phone. Support me through Patreon: https://www.patreon.com/thehatedone Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Some good resources for further understanding of Signal: Signal Tutorials by Infosec Bytes: https://www.youtube.com/watch?v=46ozjP-R2-E - on Android: https://www.youtube.com/watch?v=XQzhWbnop8c - on iOS: https://www.youtube.com/watch?v=kiX8lGJK3Ww Introduction to Signal: https://freedom.press/news/signal-beginners/ Signal PINs: https://support.signal.org/hc/en-us/articles/360007059792-Signal-PINs PIN-related feature: https://signal.org/blog/secure-value-recovery/ Moxie on Signal's future (unfortunately, not decentralized): https://signal.org/blog/looking-back-as-the-world-moves-forward/ Some news coverage on the PIN feature: https://www.zdnet.com/article/signal-to-move-away-from-phone-numbers-as-user-ids/ https://www.vice.com/en_us/article/pkyzek/signal-new-pin-feature-worries-cybersecurity-experts https://www.forbes.com/sites/kateoflahertyuk/2020/05/21/is-this-new-signal-feature-enough-to-make-you-ditch-whatsapp/ Moxie's take on the critical reception of the PIN feature: https://mobile.twitter.com/moxie/status/1281353114063257600 Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
qhPe3rLEktE | 02 Aug 2020
These are the top 8 steps to protect your online privacy in a chronological order of importance and effectiveness. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Top 8 steps to protect your privacy online and links #1 DuckDuckGo https://duckduckgo.com/ #2 Tor Browser https://www.torproject.org/ #3 Signal Private Messenger https://signal.org/ #4 Progressive Web Apps #5 Encrypted email: ProtonMail - https://protonmail.com/ & Tutanota - https://tutanota.com/ #6 Stregthen privacy settings #7 Minimilize your app count #8 Free and Open Source Software: F-Droid - https://f-droid.org/ & AlternativeTo - https://alternativeto.net/ Credits: Intro and Outro music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Other instrumentals by CHUKI Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
5UooWpC4yJs | 25 Jul 2020
TikTok has earned the hearts of millions, but it has a long record of questionable practices. Accusations of Chinese censorship, discrimination of users and misusing of users' data are among the most severe concerns. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources Tiktok moderation rules https://www.theguardian.com/technology/2019/sep/25/revealed-how-tiktok-censors-videos-that-do-not-please-beijing https://www.washingtonpost.com/technology/2019/09/15/tiktoks-beijing-roots-fuel-censorship-suspicion-it-builds-huge-us-audience/ https://theintercept.com/2020/03/16/tiktok-app-moderators-users-discrimination/ https://netzpolitik.org/2019/discrimination-tiktok-curbed-reach-for-people-with-disabilities/ Bytedance relationship with the Chinese government: https://foreignpolicy.com/2019/01/16/bytedance-cant-outrun-beijings-shadow/ https://www.businessinsider.com/tiktok-parent-company-bytedance-spreads-chinese-propaganda-report-2019-11? US teenager banned from Tiktok over treatment of Uighurs https://www.theguardian.com/technology/2019/nov/28/tiktok-says-sorry-to-us-teenager-blocked-after-sharing-xinjiang-videos Class-action lawsuit on data harvesting and transfer https://thediplomat.com/2017/06/chinas-cybersecurity-law-what-you-need-to-know/ https://gdpr.report/news/2019/12/04/privacy-tiktok-found-secretly-transferring-user-data-to-china/ Tiktok security https://www.nytimes.com/2020/01/08/technology/tiktok-security-flaws.html https://research.checkpoint.com/2020/tik-or-tok-is-tiktok-secure-enough/ https://www.nytimes.com/2019/11/01/technology/tiktok-national-security-review.html https://www.nytimes.com/2020/07/10/technology/tiktok-amazon-security-risk.html FTC probe into Tiktok children privacy https://www.nytimes.com/2019/02/27/technology/ftc-tiktok-child-privacy-fine.html https://www.washingtonpost.com/technology/2019/02/27/us-government-fined-app-now-known-tiktok-million-illegally-collecting-childrens-data/ https://www.cnet.com/news/tiktok-accused-of-secretly-gathering-user-data-and-sending-it-to-china/ Critical overview https://international.thenewslens.com/article/134846 Tiktok privacy policy: https://www.tiktok.com/legal/privacy-policy?lang=en Tiktok behind Facebook apps on the most downloaded apps worldwide https://sensortower.com/blog/top-apps-games-publishers-2018 Downlaoded over 2 billion times https://www.theverge.com/2020/4/29/21241788/tiktok-app-download-numbers-update-2-billion-users Top 10 most valuable startups https://www.valuewalk.com/2020/04/top-10-most-valuable-startups/ Credits Music by: CO.AG music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
xIXAzA555xk | 10 Jul 2020
There is only one spot available for the most private and secure phone you can get - and that spot has been taken by GrapheneOS. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Donate to GrapheneOS: https://grapheneos.org/donate GrapheneOS is a mobile operating system focused on user privacy and security. It is based on Android Open Source Project but it is completely devoid of any and all Google apps. This video will give you a thorough introduction into GrapheneOS, overview of the system and tutorial on how to install GrapheneOS on a Google Pixel phone. In this case, I am installing GrapheneOS on Google Pixel 3a. Essential resources Official GrapheneOS tutorial: https://grapheneos.org/install How to install fastboot (ADB, Android SDK platform-tools): https://www.xda-developers.com/install-adb-windows-macos-linux/ Download fastboot (ADB, Android SDK platform-tools): https://developer.android.com/studio/releases/platform-tools Install F-Droid to get FOSS apps: https://f-droid.org/ Credits First instrumental by CO.AG Music: https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Second instrumental by CHUKI BEATS: https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
kGhc_mTVcJ8 | 25 Jun 2020
Learn how to protect your privacy in a street surveillance situation. Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Useful links: EFF's ultimate guide to attending protests https://ssd.eff.org/en/module/attending-protest Evan Greers Twitter thread on privacy protection https://mobile.twitter.com/evan_greer/status/1266907715437121536 WIRED article on how to protect your privacy at a protest https://www.wired.com/story/how-to-protest-safely-surveillance-digital-privacy/ TOOLS: Signal Private Messenger https://signal.org/ Silence for encrypt SMS https://silence.im/ Wickr Me for secure messaging https://wickr.com/products/me/ Briar for anonymous peer-to-peer communication https://briarproject.org/ OsmAnd for open source navigation https://osmand.net/ ObscuraCam https://guardianproject.info/apps/obscuracam/ Image Scrubber https://everestpipkin.github.io/image-scrubber/ IMSI catchers knowledge base https://nsarchive.gwu.edu/news/cyber-vault/2019-11-15/stingrays-imsi-catchers https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks https://www.vice.com/en_us/article/gy7qm9/how-i-made-imsi-catcher-cheap-amazon-github https://harrisonsand.com/imsi-catcher/ https://techcrunch.com/2017/06/02/who-catches-the-imsi-catchers-researchers-demonstrate-stingray-detection-kit/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
K_a63r5Km9I | 03 Jun 2020
Divided we fall. Become a member: https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Qz3VBGo9jJU | 19 May 2020
Encrypted messaging is becoming mainstream. How do you decide which messenger is the most secure and private for your needs? Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Securing your digital communications should be your highest priority when going online. There are just way too many threats to trust any company with your private data. Companies care more about their bottom line then about fixing bugs in their software or poorly undersecured data centers. And they definitely don’t care if they expose your digital life to harassment, scammers, fraud and data mining advertisers. Can you actually find a secure messaging app you can trust? And how can you make sure an app that promises encryption won’t turn evil? Well, ever since the Snowden leaks on N.S.A. mass surveillance, we now have more options then ever before. You can thank the broad community of security researchers and developers on the front lines in the war against data mining and surveillance. Questions: Are all messages end-to-end encryption? Is the app fully open source or free software? How is the app making money? Does it have a good jurisdiction? What is the app’s metadata policy? Can you create an account anonymously? Can you do contact verification? Does your app provide disappearing messages? Is the encryption strengthened with forward secrecy? Is your app in a centralized ecosystem or on a decentralized platform? Some sources EFF guide to choosing a secure messenger https://www.eff.org/deeplinks/2018/03/thinking-about-what-you-need-secure-messenger Ultimate recommendation guide https://securechatguide.org/effguide.html iPhone exploitation https://techcrunch.com/2019/08/29/google-iphone-secretly-hacked/ https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html Snake oil encrypted phone https://arstechnica.com/information-technology/2013/09/worlds-most-secure-smartphone-looks-like-snake-oil-experts-say/ iMessage bug https://threatpost.com/apple-imessage-remote-attackersread-iphone-messages/146789/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
WRalTWAFBY4 | 01 May 2020
Apple and Google are developing contact tracing mass surveillance system based on Bluetooth Low Energy that is being rolled out as forced updates into users phones without their consent. Let's talk about this! Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Apple and Google, the global duopoly of mobile operating systems, are building a mass surveillance system that will be remotely introduced into every connected iPhone and Android device in the world. The aim is to help “government health authorities” and “a broader ecosystem of apps” trace contacts of infected people. Sources are listed in the pinned comment of this video to avoid potential demonetization and shadowbanning Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
3qgoto6kAgg | 14 Apr 2020
Zoom is a privacy and security nightmare. It has horrible track record of handling user privacy, Zoom is leaking your data and its video calling is unsecured. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources [0] https://arstechnica.com/tech-policy/2020/04/us-senate-tells-members-not-to-use-zoom/ [1] https://www.nytimes.com/reuters/2020/04/02/business/02reuters-spacex-zoom-video-commn.html [2] https://metro.co.uk/2020/03/25/concern-zoom-video-conferencing-mod-bans-security-fears- 12455327/ [3] https://www.cyberscoop.com/zoom-shareholder-accuses-executives-fraud-security-practices/ [4a,b] https://mobile.twitter.com/dhh/status/1244997990382596096 https://mobile.twitter.com/random_walker/status/1244992287588986880 [5] https://theintercept.com/2020/03/31/zoom-meeting-encryption/ [6] https://www.vice.com/en_us/article/z3b745/zoom-removes-code-that-sends-data-to-facebook [7 a,b] https://mashable.com/article/zoom-conference-call-work-from-home-privacy-concerns/ https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account [8] https://www.insidehighered.com/news/2020/03/25/pivot-online-raises-concerns-ferpa-surveillance [9] https://zoom.us/docs/doc/FERPA%20Guide.pdf [10] https://techcrunch.com/2020/04/01/zoom-doom/ [11] https://mobile.twitter.com/hackerfantastic/status/1245133371262619654 [12] https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/ [13] https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-of-teleconferencing-and-online-classroom-hijacking-during-covid-19-pandemic [14] https://www.vice.com/en_us/article/k7e95m/zoom-leaking-email-addresses-photos [15] https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing [16] https://www.eff.org/deeplinks/2020/03/what-you-should-know-about-online-tools-during-covid-19-crisis Credits Music by: https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
yveTy-mf3u8 | 02 Apr 2020
In this 2020 Tor Browser Tutorial video, you'll learn how to correctly use Tor Browser Bundle to increase your online privacy and anonymity.Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Timestamps Intro: 00:00 - 01:52 Download & Install Tor Browser: 01:53 - 03:12 Configure Tor settings: 03:13 - 06:55 Operations Security advice: 06:56 - 11:04 End: 11:05 Download Tor Browser bundle for your platform from https://www.torproject.org/ Remember to check the official Tor Browser manual for further guidance https://tb-manual.torproject.org/ Look into to Tor documentation for more details https://2019.www.torproject.org/docs/documentation.html.en OPSEC advice from Whonix https://www.whonix.org/wiki/DoNot?PageSpeed=noscript OPSEC advice from Tails https://tails.boum.org/doc/about/warning/index.en.html Credit Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
jxeeKKfjb5o | 20 Mar 2020
This the Hated One's latest privacy tutorial in 2020. Learn the mindset on how to protect your privacy online with an easy to follow guide. Please support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources Google tracks you everywhere https://www.forbes.com/sites/johnkoetsier/2020/03/11/google-is-tracking-you-on-86-of-the-top-50000-websites-on-the-planet/ Third party trackers in mobile apps https://arxiv.org/pdf/1804.03603.pdf Secret consumer score https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html *Tools* Search DuckDuckGo https://www.duck.com Qwant https://www.qwant.com Searx https://www.searx.me Startpage https://www.startpage.com Browsing Tor Browser https://www.torproject.org Firefox https://www.mozilla.org/en-US/firefox/new/ Brave https://www.brave.com Bromite https://www.bromite.org NoScript tutorial https://www.youtube.com/watch?v=AC4ALEKZRfg Firefox privacy settings tutorial https://www.youtube.com/watch?v=tQhWdsFMc24 Chatting Signal https://www.signal.org Briar https://briarproject.org/ Email ProtonMail https://www.protonmail.com Tutanota https://www.tutanota.com Mailfence https://www.mailfence.com K-9 client https://k9mail.app/ Fair Email client https://email.faircode.eu/ Thunderbird client https://www.thunderbird.net/ Password managers Bitwarden https://bitwarden.com/ KeepassXC https://keepassxc.org/ Application firewalls Netguard (Android) https://www.netguard.me/ Lockdown (iOS) https://lockdownhq.com/ Others Nextcloud https://www.nextcloud.com Veracrypt https://www.veracrypt.fr Cryptomator https://cryptomator.org/ OsmAnd https://osmand.net/ *F-Droid* https://www.fdroid.org LineageOS https://lineageos.org/ GrapheneOS https://grapheneos.org/ Invidious https://www.invidio.us NewPipe https://newpipe.schabi.org/ Credit: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
laskfPArEvc | 03 Mar 2020
Prepare yourself for an outbreak with logic and reason - this is a security tutorial for pandemic preparedness. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources (as they appear in chronological order) Viral spread on cruise ships and planes @ia/health-environment/article/3051844/worse-aeroplane-how-being-confined-cruise-ship-fuelled R-0 of COVID-19 @s/coronavirus-may-spread-faster-than-who-estimate vs the seasonal flu https://www.theatlantic.com/science/archive/2020/01/how-fast-and-far-will-new-coronavirus-spread/605632/ Case-fatality rate of COVID-19 vs common cold/flu https://www.cnbc.com/2020/02/03/the-flu-has-already-killed-10000-across-us-as-world-frets-over-coronavirus.html Closed cases statistics https://www.worldometers.info/coronavirus/ Influenza hospitalization https://www.cdc.gov/flu/about/burden/index.html Lockdown, restrictions and quarantine in China https://edition.cnn.com/2020/02/16/asia/coronavirus-covid-19-death-toll-update-intl-hnk/index.html https://www.nytimes.com/2020/02/15/business/china-coronavirus-lockdown.html https://www.nytimes.com/2020/02/18/world/asia/china-coronavirus-cases.html European standards for face masks https://emag.medicalexpo.com/which-masks-actually-protect-against-coronavirus/ US CDC list of (non)approved masks https://www.cdc.gov/niosh/npptl/topics/respirators/disp_part/n95list1.html Credit Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
tJw2Kf1khlA | 18 Feb 2020
Biometric security is strong and unique. But what happens if somebody steals your faceprint or fingerprint? You are compromised everywhere for the rest of your life. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz The whole promise of biometric security stands and falls on how easy it is to replicate and abuse biometric modals. And the short answer is – it’s a cat and mouse game. On the long enough timeline, someone will be able to recreate a copy of your face or fingerprints that works just fine enough to fool authenticating systems. Once your biometric data is compromised, it affects all applications at once and you will be affected for the rest of your life. Sources (in chronological order): Entropy https://security.stackexchange.com/questions/144428/how-secure-is-a-fingerprint-sensor-versus-a-standard-password Biometric data compromise https://securelist.com/biometric-data-processing-and-storage-system-threats/95364/ CCC group tricking Apple Touch ID https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid → video https://vimeo.com/75324765 German minister fingerprint https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands Kaspersky report https://threatpost.com/threatlist-a-third-of-biometric-systems-targeted-by-malware-in-q3/150778/ Taylor Swift using facial recognition https://www.nbcnews.com/tech/tech-news/facial-recognition-tech-used-scan-stalkers-taylor-swift-show-report-n947581 Vimeo law suit over facial recognition https://threatpost.com/vimeo-slapped-with-lawsuit-over-biometrics-privacy-policy/148695/ Researchers bypass Apple Face ID https://threatpost.com/researchers-bypass-apple-faceid-using-biometrics-achilles-heel/147109/ Another bypass of Face ID https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xu Android face unlock features suck https://9to5mac.com/2018/03/23/face-id-premium-android-fingerprint-sensors/ U.S. Office of Personnel Management data breach https://www.opm.gov/cybersecurity/cybersecurity-incidents/ 1 million fingerprints lost in a UK data base https://www.theguardian.com/technology/2019/aug/14/major-breach-found-in-biometrics-system-used-by-banks-uk-police-and-defence-firms Airline data breaches https://www.cpomagazine.com/cyber-security/airline-data-breaches-worrying/ False rejection and false acceptance https://biometrictoday.com/10-advantages-disadvantages-biometrics-technology/ and this: https://protonmail.com/blog/biometric-authentication/ Passwords are better https://securelist.com/biometric-data-processing-and-storage-system-threats/95364/ Government can abuse Face ID, Touch ID https://www.theguardian.com/commentisfree/2016/feb/26/can-government-force-you-to-unlock-your-phone-fifth-amendment Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6ohvf03NiIA | 08 Feb 2020
Ultimate comparison between Tor and Virtual Private Networks - which one is better for anonymity, privacy and security? Which should you trust and use? Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Virtual private network? Or The Onion Router? Both of these tools are marketed to people looking for better privacy and anonymity on the Internet. Many regular people that choose VPNs do so to prevent their ISPs from spying on their browsing history and selling it to advertisers. What they don’t realize is that they are not enhancing their privacy – they are just delegating the trust to a different company. Your VPN provider acts as your entry and exit node. They know your true IP address and they know what websites you visit. If they want to, they can log this activity at any time. If they are required by law enforcement, they can hand over all of your browsing data to them. Credits: First track by Chuki Beats https://www.youtube.com/user/CHUKImusic Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
wpa6gQCOmhw | 05 Feb 2020
Videos from Google Photos were incorrectly exported to random people requesting their data via Google Takeout in a scandalous bug causing privacy and security nightmare for Google Photo users. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz I am not affiliated with any of these but I highly recommend them: Nextcloud https://nextcloud.com/ Syncthing https://syncthing.net/ Crytpomator (to encrypt files uploaded to cloud) https://cryptomator.org/ Sources: Reddit screenshot of the email Google sent to affected users https://old.reddit.com/r/thehatedone/comments/eynw8t/googles_another_fuckup/ Arstechnica coverage https://arstechnica.com/gadgets/2020/02/google-photos-bug-let-strangers-download-your-private-videos/ From the article: "a security and privacy bug affecting Google Photos users: for a time, it was possible for private videos to be downloaded by unrelated users." Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
tkY9dhOF2WU | 30 Jan 2020
Quick and easy 5-minute-long mobile OS privacy tutorials for all the normies out there. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz How to protect privacy on your smartphone (Android or iPhone). This is a mobile privacy tutorial in 5 minutes for normies and non-tech-savvy people. Get as much privacy as possible with install-and-forget approach - in other words - get the most amount of privacy on your phone while doing minimal work. Sources: Application firewall NetGuard for Android https://play.google.com/store/apps/details?id=eu.faircode.netguard&hl=en NetGuard on F-Droid https://f-droid.org/en/packages/eu.faircode.netguard/ Lockdown for iOS https://apps.apple.com/us/app/lockdown-apps/id1469783711 Encrypt DNS on Android https://developers.google.com/speed/public-dns/docs/using#android DNSCloak for iOS t encrypt DNS system-wide https://apps.apple.com/us/app/dnscloak-secure-dns-client/id1452162351 Limit Ad Tracking on iPhone https://support.apple.com/en-us/HT202074#iOS Turn off ad personalization on your Google Account https://support.google.com/ads/answer/2662922?hl=en Disable Location services on Android https://lifehacker.com/psa-your-phone-logs-everywhere-you-go-heres-how-to-t-1486085759 Disable Location Services on iPhone https://support.apple.com/en-us/HT207092 OsmAnd (OpenStreet Map Automated Navigation Directions) https://osmand.net/ OsmAnd on F-Droid https://f-droid.org/en/packages/net.osmand.plus/ DuckDuckGo Privacy Browser https://duckduckgo.com/app DDG Privacy Browser on F-Droid https://f-droid.org/en/packages/com.duckduckgo.mobile.android/ Signal Private Messenger https://signal.org/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
7FfWz1NRQJQ | 22 Jan 2020
F-Droid is a repository of Free and Open Source apps for Android. It's your first step on the journey to improve your smartphone privacy and security. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz If you want to regain more control over your device and enhance your privacy and security, F-Droid is where you want to start. F-Droid gives you the opportunity to take your phone completely Google-free, because you can find a free and privacy-respecting alternative for pretty much any mainstream app on Play Store that doesn’t sell your data to Facebook or Google. If you are running LineageOS or some other custom ROM, you can avoid Google privacy invasion through Play Store by using F-Droid instead. Sources F-Droid https://f-droid.org/ How to install APK files from unknown sources on Android https://www.maketecheasier.com/install-apps-from-unknown-sources-android/ APK verifying tool https://apkpure.com/apk-signature-verification NetGuard https://f-droid.org/en/packages/eu.faircode.netguard/ WebApps https://f-droid.org/en/packages/com.tobykurien.webapps/ Bromite for F-Droid https://www.bromite.org/fdroid DuckDuckGo Privacy Browser https://f-droid.org/en/packages/com.duckduckgo.mobile.android/ Firefox Focus (Klar) https://f-droid.org/en/packages/org.mozilla.klar/ New Pipe https://f-droid.org/en/packages/org.schabi.newpipe/ Simple Apps - all can be found on F-Droid https://www.simplemobiletools.com/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
wATfHRkaOGU | 13 Jan 2020
Network security tutorial that will teach you how you can secure your Wi-Fi, enhance the security of your router, firmware and network overall. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources: Cybersecurity will cost $6 trillion annually by 2021 https://www.forbes.com/sites/cognitiveworld/2018/09/05/a-scoville-heat-scale-for-measuring-cybersecurity/ How to open Command Prompt on Windows https://www.lifewire.com/how-to-open-command-prompt-2618089 Enable Windows Defender Firewall https://support.microsoft.com/en-us/help/4028544/windows-10-turn-windows-defender-firewall-on-or-off Enable Firewall on Mac https://support.apple.com/en-us/HT201642 Linux firewall https://gufw.org/ NetGuard https://www.netguard.me/ Lockdown https://apps.apple.com/us/app/lockdown-apps/id1469783711 HTTPS EVERYWHERE Firefox https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/ - Chrome https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp Tor https://www.torproject.org/ Tails https://tails.boum.org/ Whonix https://www.whonix.org/ ProtonVPN https://protonvpn.com/ Mullvad https://mullvad.net/en/ Change your DNS provider on Android, Mac, Windows, etc. https://developers.google.com/speed/public-dns/docs/using Encrypted DNS providers http://privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/providers/dns/ Comprehensive list of DNS-over-HTTPS providers https://github.com/curl/curl/wiki/DNS-over-HTTPS DNScloak for iOS https://apps.apple.com/us/app/dnscloak-secure-dns-client/id1452162351 Pi-Hole tutorial from Linus Tech Tips https://www.youtube.com/watch?v=KBXTnrD_Zs4 Open source firmware alternatives http://privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/operating-systems/ OpenWRT open source firmware https://openwrt.org/ Other network security tips Disable remote administration in your router firmware: https://www.computerhope.com/issues/ch001289.htm Secure your wireless router https://www.howtogeek.com/173921/SECURE-YOUR-WIRELESS-ROUTER-8-THINGS-YOU-CAN-DO-RIGHT-NOW/ How to make your router as secure as possible https://lifehacker.com/how-to-make-your-wifi-router-as-secure-as-possible-1827695547 Don't have a false sense of security https://www.howtogeek.com/132348/dont-have-a-false-sense-of-security-5-insecure-ways-to-secure-your-wi-fi/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
bn5u14jnzNU | 09 Jan 2020
Part 2 of the digital security talk with Daniel from Safing.io. In this part, we discuss specific tools and strategies you can use to enhance your security online. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
55rplfo_KS8 | 25 Dec 2019
CNBC just released a video titled “How the U.S. avoided a recession for a decade”. And it's a case study of an appeal to authority. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Original video: https://www.youtube.com/watch?v=0bVtfj29V9Q Argument from authority, also known as appeal to authority, is when someone’s authority is used as evidence of their claims on its own. It’s a deeply unscientific conduct. CNBC will try to show you how the U.S. has went through its longest economic expansion in history. And they won’t do it by proposing or explaining an academically scrutinized economic theory. They will do this by letting corporate officials and politicians make their talking points. Sources: Check my sources in my previous video on the Federal Reserve and economic recession https://www.youtube.com/watch?v=6_s1Zbs20aA Home ownership rates https://tradingeconomics.com/united-states/home-ownership-rate Employment-population ratio https://fred.stlouisfed.org/series/EMRATIO The cost of Medicare for all https://www.bloomberg.com/news/articles/2018-07-30/study-medicare-for-all-bill-estimated-at-32-6-trillion Moody's penalty https://www.theguardian.com/business/2017/jan/14/moodys-864m-penalty-for-ratings-in-run-up-to-2008-financial-crisis Credits Music by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
m_SN1CB3Kts | 19 Dec 2019
This is an ultimate security guide for mobile devices, both iOS and Android. Learn how to improve your smartphone security and protect your mobile phone and your private data. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Essential security tools and tips Encrypt your phone Android: https://www.guidingtech.com/68187/encrypt-android-phone/ iOS & Android https://nakedsecurity.sophos.com/2015/06/02/why-you-shouldnt-worry-about-privacy-and-security-on-your-phone/ Find My Device Android: https://support.google.com/accounts/answer/6160491?hl=en iOS https://support.apple.com/explore/find-my Second-factor authentication Android https://www.howtogeek.com/366653/how-to-make-android-as-secure-as-possible/ iOS: https://support.apple.com/en-us/HT204915 Authy https://authy.com/ Google Authenticator https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2 or App Store https://apps.apple.com/us/app/google-authenticator/id388497605 AndOTP https://play.google.com/store/apps/details?id=org.shadowice.flocke.andotp&hl=en_US or F-Droid https://f-droid.org/en/packages/org.shadowice.flocke.andotp/ FreeOTP https://freeotp.github.io/ Nitrokey https://www.nitrokey.com/ YubiKey https://www.yubico.com/ Updates Android: https://support.google.com/android/answer/7680439 iOS: https://support.apple.com/en-us/HT202180 Application Firewall Netguard https://www.netguard.me/ Lockdown https://lockdownhq.com/ Connectivity Orbot: https://guardianproject.info/apps/orbot/ Tor Browser for Android: https://play.google.com/store/apps/details?id=org.torproject.torbrowser&hl=en_US Onion Browser for iOS: https://apps.apple.com/us/app/onion-browser/id519296448 Encrypt backups, cloud and sync Cryptomator https://cryptomator.org/ Nextcloud https://nextcloud.com/ iTunes encryption https://support.apple.com/en-us/HT205220 Browser Bromite https://www.bromite.org/ Firefox Focus https://support.mozilla.org/en-US/kb/focus#w_install-firefox-focus Brave Browser https://brave.com/ HTTPS Everywhere https://www.eff.org/https-everywhere uBlock Origin https://github.com/gorhill/uBlock/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
QbyAVsbtGh0 | 16 Dec 2019
Support this channel on Patreon https://www.patreon.com/thehatedone Part I of the full talk with Daniel from Safing.io. We discuss the current state of digital security, most common threats, GDPR, artificial intelligence and quantum computing. Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Check Safing at https://safing.io/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
3H2CKTRqOEQ | 11 Dec 2019
Ultimate guide to securing your online accounts: password managers, second-factor authentication and operations security. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz You need three things to secure your online accounts: 0) Password manager to generate strong and unique passwords 1) Second-factor authentication - the best option is NitroKey Fido or YubiKey, followed by USB or app-based 2FA one-time-passwords. 2) Good OPSEC - or operations security - without it, no tool can save you. Sources and links: OPSEC https://www.amnesty.org/en/latest/research/2018/12/when-best-practice-is-not-good-enough/ https://ssd.eff.org/en/module/how-enable-two-factor-authentication https://cpj.org/2019/01/cpj-safety-advisory-sophisticated-phishing-attacks.php https://cpj.org/2019/07/digital-safety-kit-journalists.php https://cpj.org/2019/09/digital-safety-remove-personal-data-internet.php https://cpj.org/2019/01/digital-safety-using-security-keys-to-secure-accou.php https://securityinabox.org/en/guide/malware/ https://arstechnica.com/information-technology/2018/09/british-airways-site-had-credit-card-skimming-code-injected/ What if you were phished https://www.forbes.com/sites/joegray/2019/09/16/5-critical-steps-to-take-after-being-phished/ Information security for journalists https://www.youtube.com/playlist?list=PLOZKbRUo9H_rhmlF5IrlT0jxCCJk_odLV Tools [I have no affiliation with the following organizations] Password managers https://keepassxc.org/ https://bitwarden.com/ 2FA apps FreeOTP (iOS, Android) https://freeotp.github.io/ andOTP (Android) https://play.google.com/store/apps/details?id=org.shadowice.flocke.andotp && https://f-droid.org/packages/org.shadowice.flocke.andotp/ hint: both Bitwarden and KeepassXC offer 2FA TOTP Security keys and TOTP on a USB https://www.nitrokey.com/ https://solokeys.com/ https://www.yubico.com/ The full talk I had with Daniel is available on Patreon and will be released to all soon. He is working at Safing https://safing.io/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
5qE4J-7Iwzc | 02 Dec 2019
Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Is trusting your local ISp or a VPN provider more advisable than trusting a random person running a Tor exit node? Do you even have to trust a Tor exit node? Can you have privacy as a business model? These are the questions me and Daniel from Safing.io end up debating. Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6_s1Zbs20aA | 28 Nov 2019
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. The U.S. Federal Reserve creates free money for those who are "creditworthy", which artificially raises their wealth, indebts the poor, and inflates money on people's savings. It's time to have a discussion whether this is acceptable in a society of the greatest income inequality in history. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne Sources [1] https://geopolitics.co/2019/09/18/federal-reserve-intervenes-with-massive-repo-to-inject-cash-into-money-markets/ [2] https://www.wsj.com/articles/fed-to-conduct-first-overnight-repo-transactions-in-several-years-11568729757 [3] https://tradingeconomics.com/united-states/gdp-growth-annual [4] https://tradingeconomics.com/united-states/inflation-cpi [5] https://www.forbes.com/sites/leonlabrecque/2019/03/29/recessions-and-yield-curve-inversion-what-does-it-mean/ [6] https://tradingeconomics.com/united-states/business-confidence [7] https://www.nytimes.com/interactive/2018/02/01/business/economy/wages-salaries-job-market.html [8] https://apps.newyorkfed.org/markets/autorates/fed%20funds [9] https://www.fhfa.gov/AboutUs/Reports/ReportDocuments/HPI_August2019.pdf [10] https://www.marketwatch.com/investing/index/djia/charts [11] https://www.epi.org/publication/state-of-american-wages-2018/ [12] https://markets.businessinsider.com/news/stocks/fed-repo-injects-billions-into-market-first-time-in-decade-2019-9-1028534289? [13] https://moneymaven.io/mishtalk/economics/us-overnight-interest-rate-surges-to-10-fed-injects-emergency-75-billion-wJMW3d-SkECxvWo6Mj-A-A/ [14] https://news.yahoo.com/york-fed-steps-market-move-interest-rates-154639660.html? [15] https://www.morningstar.com/news/dow-jones/201909176404/fed-steps-into-repo-market-to-control-soaring-ratesupdate [16] https://www.reuters.com/article/us-usa-repos/u-s-federal-reserve-may-need-to-backstop-repo-market-baml-idUSKCN1P5273 [17] https://www.nytimes.com/2019/09/16/business/repo-markets-rates.html? [18] https://www.reuters.com/article/us-usa-repos/u-s-federal-reserve-may-need-to-backstop-repo-market-baml-idUSKCN1P5273 [19] https://mises.org/library/insolvency-fed [20] https://www.nytimes.com/2019/09/16/business/repo-markets-rates.html? [21] https://www.federalreserve.gov/monetarypolicy/bst_recenttrends.htm [22] https://www.investopedia.com/articles/economics/10/understanding-the-fed-balance-sheet.asp [23] https://www.nytimes.com/2019/11/20/business/economy/federal-reserve-minutes.html? [24] https://mises.org/library/can-central-bank-go-broke [26] https://www.linkedin.com/pulse/world-has-gone-mad-system-broken-ray-dalio [27a] https://www.forbes.com/sites/francescoppola/2017/10/31/how-bank-lending-really-creates-money-and-why-the-magic-money-tree-is-not-cost-free/ [27b] https://www.investopedia.com/ask/answers/102015/do-interest-rates-increase-during-recession.asp [28] https://news.crunchbase.com/news/unprofitable-ipos-are-getting-bigger/ [29] https://www.bloomberg.com/news/articles/2014-10-06/s-p-500-companies-spend-almost-all-profits-on-buybacks-payouts [30] https://www.yardeni.com/pub/buybackdiv.pdf [31] https://www.washingtonpost.com/news/monkey-cage/wp/2016/03/29/how-wall-street-became-a-big-chunk-of-the-u-s-economy-and-when-the-democrats-signed-on/ [32] https://www.pewresearch.org/fact-tank/2018/08/07/for-most-us-workers-real-wages-have-barely-budged-for-decades/ [33] https://www.nytimes.com/interactive/2018/02/01/business/economy/wages-salaries-job-market.html [34] https://www.forbes.com/sites/johntamny/2012/07/29/ron-paul-fractional-reserve-banking-and-the-money-multiplier-myth/ [35] https://www.investopedia.com/terms/f/fractionalreservebanking.asp [36] https://www.nytimes.com/2019/01/30/business/fed-quantitative-tightening.html [37] https://www.theguardian.com/business/2018/aug/22/wall-street-record-longest-rally-history-bull-market [38] https://www.investopedia.com/market-milestones-as-the-bull-market-turns-10-4588903 [39] https://www.investopedia.com/articles/markets/080716/why-negative-interest-rates-are-still-not-working-japan.asp [40] https://www.thebalance.com/current-federal-reserve-interest-rates-4770718 [41] https://www.nytimes.com/2019/09/11/business/economy/bonehead-trump-jay-powell.html Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
zb18XJmc7CM | 13 Nov 2019
Bitcoin is facing re-centralization. The cryptocurrency mining is becoming centralized and it’s due to a major design flaw in Bitcoin’s core protocol that still remains unfixed. And if nothing changes, it might be that Bitcoin will not survive its next decade. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources as referenced by numbers at the bottom left corner of the video frame: [0a] https://www.metzdowd.com/pipermail/cryptography/2008-October/014810.html [0b] https://www.coinmarketcap.com [1] http://www.bitcoin.org/bitcoin.pdf [2] https://www.bloomberg.com/news/articles/2011-11-28/secret-fed-loans-undisclosed-to-congress-gave-banks-13-billion-in-income [3] https://www.coindesk.com/bitmain-bitcoin-mining-launch-second-mining-pool [4] https://www.cryptocompare.com/mining/pools/f2pool/ [5] https://bitcoinmagazine.com/articles/btc-coms-bitcoin-mining-pool-dominance-threatened-by-poolin [6] https://bitcoinmagazine.com/articles/upstart-poolin-discusses-growth-state-of-mining-and-bitcoin-in-china [7] https://www.buybitcoinworldwide.com/mining/pools/ [8] https://www.blockchain.com/pools [9] https://www.coinwarz.com/difficulty-charts/bitcoin-difficulty-chart [10] https://en.bitcoin.it/wiki/Mining [11] https://www.coindesk.com/bitcoin-mining-600-profit-consolidation-competitive [12] https://www.theguardian.com/technology/2014/jun/16/bitcoin-currency-destroyed-51-attack-ghash-io [13] https://www.reddit.com/r/Bitcoin/comments/1us7ey/warning_ghashio_is_nearing_51_leave_the_pool/ [14] https://heavyeditorial.files.wordpress.com/2014/01/ghashio_press_release.pdf [15] https://www.coindesk.com/cex-io-response-fears-of-51-attack-spread [16] https://learncryptography.com/cryptocurrency/51-attack [17] https://medium.com/bitcoin-not-blockchain/is-bitcoin-mining-centralized-and-what-does-that-mean-for-my-coi-1fc1bc379601 [18] https://medium.com/@jimmysong/mining-centralization-scenarios-b74102adbd36 [19] https://medium.com/bitcoin-not-blockchain/is-bitcoin-mining-centralized-and-what-does-that-mean-for-my-coi-1fc1bc379601 [20] https://www.wsj.com/articles/china-moves-to-devalue-the-yuan-1439258401 [21] https://qz.com/1072907/why-china-is-so-hot-on-bitcoin/ [22] https://www.forbes.com/sites/ktorpey/2019/07/28/bitcoin-mining-centralization-is-quite-alarming-but-a-solution-is-in-the-works/ [23] https://medium.com/hackernoon/betterhash-decentralizing-bitcoin-mining-with-new-hashing-protocols-291de178e3e0 [24] https://thenextweb.com/hardfork/2018/04/12/bitcoin-mining-51-percent-attack/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
C_7-qf73yI8 | 09 Nov 2019
Fascinating interview with the CEO of Qwant (French-based search engine) and founder of Mozilla Europe Tristan Nitot. You can see Qwant for yourself at https://qwant.com/ and https://betterweb.qwant.com/ Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
R8oGP-kFmVM | 27 Oct 2019
Chinese government lures U.S. businesses into its vast consumer markets and then use their businesses as proxies for political influence. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources: [1] https://www.vox.com/2019/10/8/20904433/blizzard-hong-kong-hearthstone-blitzchung [2] https://news.blizzard.com/en-us/hearthstone/23179289/hearthstone-grandmasters-asia-pacific-ruling [3] https://news.blizzard.com/en-us/blizzard/23185888/regarding-last-weekend-s-hearthstone-grandmasters-tournament [4] https://www.ign.com/articles/2019/10/10/verified-chinese-blizzard-account-doubles-down-on-political-policy [5] https://www.pcgamer.com/hearthstone-card-art-changes/ [6] https://investor.activision.com/news-releases/news-release-details/activision-blizzard-announces-second-quarter-2019-financial [7] https://nikopartners.com/china-pc-online-games/ [8] https://www.pcgamer.com/its-time-to-pay-attention-to-china-inside-the-worlds-largest-pc-games-industry/ [9] https://www.theverge.com/2019/10/7/20902947/nba-rockets-daryl-morey-hong-kong-protests-tweet-internet-speech-censorship-china [10] https://www.businessinsider.com/china-suspend-nba-broadcasts-adam-silver-defend-daryl-morey-2019-10 [11] https://www.espn.com/nba/story/_/id/27770851/rockets-tilman-fertitta-distances-team-daryl-morey-tweet? [12] https://www.washingtonexaminer.com/news/nba-under-fire-for-hong-kong-protest-tweet [13] https://www.reuters.com/article/us-china-basketball-nba-nike/houston-rockets-nike-merchandise-disappears-from-china-stores-idUSKBN1WP109 [14] https://www.cbc.ca/news/entertainment/china-bohemian-rhapsody-1.5073331 [15] https://www.businessinsider.com/which-companies-have-changed-taiwan-description-china-2018-7? [16] https://www.businessinsider.com/china-fined-muji-30000-for-describing-taiwan-as-a-country-2018-5 [17] https://www.businessinsider.com.au/zara-marriott-qantas-apologized-to-china-listing-taiwan-as-country-2018-1 [18] https://www.reuters.com/article/us-china-delta/china-cracks-down-on-foreign-companies-calling-taiwan-other-regions-countries-idUSKBN1F10RC? [19] https://www.bloomberg.com/news/articles/2019-10-08/apple-pulls-taiwanese-flag-emoji-from-iphones-in-hong-kong [20] https://mashable.com/article/apple-rejects-hongkong-protest-app/? [21a] https://techcrunch.com/2017/07/29/apple-removes-vpn-apps-from-the-app-store-in-china/ [21b] https://www.theverge.com/2018/2/28/17055088/apple-chinese-icloud-accounts-government-privacy-speed [22] https://www.nytimes.com/2017/01/04/business/media/new-york-times-apps-apple-china.html [23] https://www.worldbank.org/en/country/china/overview [24] https://www.emarketer.com/content/global-ecommerce-2019 [25] https://www.cia.gov/library/publications/the-world-factbook/geos/print_ch.html [26] https://www.bbc.com/news/world-asia-pacific-13017877 [27] https://variety.com/2019/film/news/quentin-tarantino-once-upon-a-time-in-hollywood-china-1203375792/ [28] https://www.nytimes.com/2019/05/22/world/asia/china-surveillance-xinjiang.html Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
WnS2nXtw6s8 | 15 Oct 2019
Apple, Facebook, Google and Amazon are under investigation for anti-competitive behavior. However, the government that's investigating them is behind their very monopolization schemes they seek to stop. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz The Federal Trade Commission and the Department of Justice are investigating Apple, Facebook, Google and Amazon with an army of 50 attorneys general for their anti-competitive behavior and monopolizing their market positions. The investigators are looking to find evidence that the big tech is conspiring to monopolize their market dominance. The question isn’t whether they have monopoly market shares, but whether they engage in practices that could lead them to become artificial monopolies. This could lead to the greatest settlement fines in U.S. antitrust history or could even break up the Big Tech monopolies. But the real solution is in addressing the real root of the problem - monopolization of copyright and patented software. Sources/references [1] https://www.nytimes.com/2019/01/11/arts/fortnite-floss-dance-lawsuits.html [2] https://www.yahoo.com/lifestyle/every-kid-dance-called-floss-heres-16-year-old-invented-225342533.html [3] https://arstechnica.com/tech-policy/2019/09/congress-wants-facebook-google-apple-and-amazon-emails-as-probe-heats-up/ [4] https://arstechnica.com/tech-policy/2019/09/50-states-and-territories-launch-massive-joint-probe-into-google/ [5] https://judiciary.house.gov/story-type/letter/competition-digital-markets-document-request-91319 [6] https://medium.com/housejudiciary/house-antitrust-subcommittee-issues-document-requests-as-part-of-digital-markets-investigation-a07a683cf7e1 [7] https://www.valuewalk.com/2019/09/facebook-acquisitions-list/ [8] https://techcrunch.com/2013/02/28/facebook-acquires-atlas/ [9] http://blog.friendfeed.com/2007/ [10] https://techcrunch.com/2010/04/02/facebook-buys-up-divvyshot-to-make-facebook-photos-even-better/ [11] https://web.archive.org/web/20110323095100/http://blog.snaptu.com/?p=224 [12] https://mashable.com/2010/10/29/facebook-acquires-drop-io/ [13] https://gigaom.com/2010/08/04/facebook-buys-friendster-patents-for-40m/ [14] https://techcrunch.com/2009/08/10/facebook-acquires-friendfeed/ [15] https://techcrunch.com/2009/02/11/the-ap-reveals-details-of-facebookconnectu-settlement-with-best-hack-ever/ [16] https://www.wired.com/2014/02/a-huge-whatsapp-mistake/ [17] https://www.vox.com/2017/4/9/15235940/facebook-instagram-acquisition-anniversary [18] https://www.economist.com/business/2018/06/02/american-tech-giants-are-making-life-tough-for-startups [19] https://cheddar.com/media/facebook-blockchain-acquisition-chainspace [20] https://www.wired.com/story/facebooks-aggressive-moves-on-startups-threaten-innovation/ [21] https://www.wsj.com/articles/facebooks-onavo-gives-social-media-firm-inside-peek-at-rivals-users-1502622003 [22] https://www.economist.com/business/2018/06/02/american-tech-giants-are-making-life-tough-for-startups [23] https://netmarketshare.com/apple-market-share [24] https://www.washingtonpost.com/technology/2019/09/05/how-apple-uses-its-app-store-copy-best-ideas/ [25] https://www.forbes.com/sites/chuckjones/2018/01/06/apples-app-store-generated-over-11-billion-in-revenue-for-the-company-last-year/ [26] https://appleinsider.com/articles/18/05/10/justice-department-sides-with-apple-in-app-store-fee-antitrust-filing-with-supreme-court Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
al3E3DJbBd8 | 01 Oct 2019
Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz The Department of Justice is suing the NSA whistleblower and Macmillan Publishers for Snowden’s bestselling memoir Permanent Record. They want to seize all royalties not just from the book, but also from all the speeches that Snowden gave to keep himself alive. The pre-publication review is a requirement to hand over to relevant government agencies any material former employees intend to talk about publicly or to anyone who is not authorized. The government has the right to reject or redact the publication in any way it chooses without giving any sensible explanation why. Failing to submit a publication for a review gives the government the right to seize all revenue generated from the forbidden material. Sources: [1] https://arstechnica.com/wp-content/uploads/2019/09/1-main.pdf [1b] https://www.wired.com/story/after-six-years-in-exile-edward-snowden-explains-himself/ [2] https://arstechnica.com/tech-policy/2019/09/feds-seek-to-seize-all-profits-from-snowdens-book-over-nda-violation/ [3] https://www.aclu.org/press-releases/aclu-comment-edward-snowden-lawsuit [4] https://www.aclu.org/press-releases/aclu-and-knight-institute-challenge-constitutionality-far-reaching-government [5] https://www.vice.com/en_us/article/bjwvea/the-us-government-is-suing-edward-snowden [6] https://www.nytimes.com/2012/04/21/us/judge-rules-on-profits-from-ishmael-jones-cia-book.html [7,8] https://www.theguardian.com/world/2014/may/22/pentagon-report-snowden-leaks-national-security [9] https://www.nytimes.com/2016/07/06/us/politics/hillary-clinton-fbi-email-comey.html [10] https://www.nytimes.com/2016/05/26/us/politics/state-department-hillary-clinton-emails.html [11] https://www.nytimes.com/2016/05/26/us/politics/state-department-hillary-clinton-emails.html [12] https://www.theguardian.com/us-news/2016/feb/21/edward-snowden-willing-to-return-to-us-fair-trial [13] https://www.nytimes.com/2015/05/08/us/nsa-phone-records-collection-ruled-illegal-by-appeals-court.html [14] https://www.washingtonpost.com/graphics/politics/usa-freedom-act/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
zvTKikwUMRg | 16 Sep 2019
For over two years, 14 critical zero-day vulnerabilities in Apple's iOS have been weaponized into 5 privilege-escalating zero-click exploit chains that have remotely and completely taken over hundreds of thousands of iPhones. Apple's response? Not a big deal. This was just "narrow" "targeted" campaign. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz You can block scripts to prevent browser exploitation with: NoScript Security Suite: https://www.youtube.com/watch?v=AC4ALEKZRfg uBlock Origin tutorial: https://www.youtube.com/watch?v=2lisQQmWQkY The exploits have been in some way used from at least September 2016 and the attackers were supporting their exploit chains since at least iOS 10.0.1 until 12.1.4. Infected users would immediately have all of their data from their devices uploaded to remote servers and updates sent every 60 seconds. The data collected would include location, device model, keychain, name and serial number, phone number, contacts, messages, attachments, notes, list of installed apps, recordings, photos, files, call history, passwords and container directories of every app on the device. The implant had a hardcoded list of apps from which it always uploaded plain-text data to the attacker controlled servers. Among the selected apps were: Gmail, Facebook, Skype, Telegraph, WhatsApp and others. Sources [1] https://techcrunch.com/2019/08/29/google-iphone-secretly-hacked/ [2] https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html [3] https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html [4] https://www.vice.com/en_us/article/7x584y/exploit-sellers-say-there-are-more-iphone-hacks-on-the-market-than-theyve-ever-seen [5] https://arstechnica.com/information-technology/2019/08/armed-with-ios-0days-hackers-indiscriminately-infected-iphones-for-two-years/ [6] https://www.wired.com/story/ios-attack-watering-hole-project-zero/ [7] https://www.apple.com/newsroom/2019/09/a-message-about-ios-security/ [8] https://arstechnica.com/information-technology/2019/09/apple-takes-flak-for-disputing-ios-security-bombshell-dropped-by-google/ [9] https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/ [10] https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/ [11] https://techcrunch.com/2019/09/06/apple-doesnt-want-google-stoking-fear-about-serious-ios-security-exploits/ [12] https://www.reuters.com/article/us-china-cyber-uighurs/china-hacked-asian-telcos-to-spy-on-uighur-travelers-sources-idUSKCN1VQ1A5 [13] https://www.britannica.com/topic/Uighur [14] https://www.nytimes.com/2019/05/22/world/asia/china-surveillance-xinjiang.html [15] https://www.cyberscoop.com/apt3-nsa-tools-smb-check-point/ [16] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html [17] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html [18] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-4.html [19] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-5.html [20] https://www.wired.com/story/imessage-interactionless-hacks-google-project-zero/ [21] https://arstechnica.com/information-technology/2016/08/actively-exploited-ios-flaws-that-hijack-iphones-likely-spread-for-years/ [22] https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html [23] https://www.wired.com/story/imessage-interactionless-hacks-google-project-zero/ [24] https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/ [25] https://www.cyberscoop.com/zerodium-android-zero-days-bounty/ [26] https://www.chicagotribune.com/nation-world/ct-apple-fbi-encryption-debate-20160412-story.html [27] https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/ [28] https://www.cyberscoop.com/ios-bug-bounty-apple-hack-china-zerodium/ [29] https://www.volexity.com/blog/2019/09/02/digital-crackdown-large-scale-surveillance-and-exploitation-of-uyghurs/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
-t13R6ej-WQ | 01 Sep 2019
The Battle of Seattle was a week-long series of mass protests against the Ministerial Conference of the World Trade Organization hosted in downtown Seattle between November 30 and December 3 1999. It was one of the largest anti-globalization demonstrations and one of the first acts of mobilization coordinated via the Internet. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Sources: [1] https://www.britannica.com/event/Seattle-WTO-protests-of-1999 [2] https://www.theguardian.com/world/1999/dec/04/wto.johnvidal1 [3] https://www.washingtonpost.com/wp-srv/WPcap/1999-12/01/089r-120199-idx.html?noredirect=on [4] https://www.britannica.com/topic/World-Trade-Organization [5] http://news.bbc.co.uk/2/hi/special_report/1999/11/99/battle_for_free_trade/549794.stm [6] https://www.theguardian.com/world/1999/dec/05/wto.globalisation [7] https://edition.cnn.com/ALLPOLITICS/time/1999/12/06/wto.html [8] https://www.theguardian.com/world/1999/dec/05/wto.globalisation1 [9] https://web.archive.org/web/20070604232550/http://scid.stanford.edu/pdf/credpr63.pdf [10] https://edition.cnn.com/ALLPOLITICS/time/1999/12/06/free.trade.html [11] https://www.washingtonpost.com/business/economy/outsourcings-net-effect-on-us-jobs-still-an-open-ended-question/2012/07/01/gJQAs1szGW_story.html?noredirect=on [12] http://community.seattletimes.nwsource.com/archive/? [13] https://depts.washington.edu/wtohist/day1.htm [14] https://fair.org/extra/prattle-in-seattle/ [15] https://mapcruzin.com/globalwatch/paul_hawken.htm [16] https://www.salon.com/1999/12/10/anarchists/ [17] http://content.lib.washington.edu/wtoweb/index.html [18] https://www.cbc.ca/news/world/wto-protests-hit-seattle-in-the-pocketbook-1.245428 [19] http://community.seattletimes.nwsource.com/archive/?date=20040117&slug=wto17m [20] https://depts.washington.edu/wtohist/Repercussions.htm Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
GADZ46VXmtU | 18 Aug 2019
Cashless society seems like an inevitable progression into an easier, faster and more convenient future. But this comes at a huge of cost of privacy and anonymity of cash payments, and freedom from control over people's funds. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz Limiting cash payments and banning high-value bank notes is becoming a global trend. In France the cap on cash transactions is only 1,000 euros and in Italy it’s at €2,999.99. The European Central Bank has recently stopped issuing €500-notes, although they will remain accepted as a legal tender indefinitely. India’s Prime Minister Modi banned the use of 500 and 1,000 rupee notes basically overnight. In Sweden, no high street bank in big cities handles cash anymore with 85% of the population banking online. Sources: [1] https://paleofuture.gizmodo.com/1970s-researchers-predicted-debit-cards-would-be-great-1699216972 [2] https://paleofuture.gizmodo.com/the-privacy-dangers-of-a-cashless-society-were-clear-ov-512266908 [3] https://paleofuture.gizmodo.com/the-privacy-dangers-of-a-cashless-society-were-clear-ov-512266908 [4] https://www.theguardian.com/australia-news/2018/may/08/australia-federal-budget-2018-cash-payment-crackdown-tax-evasion [5] https://gizmodo.com/australia-bans-cash-for-all-purchases-over-7-500-start-1825946888 [6] https://coingeek.com/australian-bill-to-exclude-crypto-from-new-cash-payment-restrictions/ [7] https://www.theguardian.com/world/2016/feb/08/german-plan-prohibit-large-5000-cash-transactions-fierce-resistance [8] https://www.bloomberg.com/news/articles/2016-05-04/ecb-decrees-slow-death-of-500-euro-note-in-fight-against-crime [9] https://www.theguardian.com/world/2016/nov/08/india-withdraws-500-1000-rupee-notes-fight-corruption [10] https://www.abc.net.au/news/2018-03-06/$100-note-could-be-dumped-to-starve-black-economy-economist/9520210 [11] https://www.theguardian.com/world/2016/dec/30/india-cash-deadline-rupees-demonitisation-narendra-modi [12] https://www.theguardian.com/world/2017/jan/02/indias-bank-note-ban-how-modi-botched-the-policy-yet-kept-his-political-capital [13] https://www.bloomberg.com/opinion/articles/2016-10-14/the-cashless-society-is-a-creepy-fantasy [14] https://www.bbc.com/news/business-43645676 [15] https://www.fastcompany.com/3056736/what-happens-when-we-become-a-cashless-society [16] https://hbr.org/2014/06/the-hidden-costs-of-cash [17] https://www.inc.com/will-yakowicz/dealing-with-cash-costs-american-businesses-55-billion.html [18] https://www.zdnet.com/article/identity-theft-credit-card-fraud-cost-us-consumers-16-billion-in-2016/ [19] https://www.irs.gov/pub/irs-soi/p1415.pdf [20] https://itep.org/fact-sheet-apple-and-tax-avoidance/ [21] https://www.nytimes.com/2017/11/06/world/apple-taxes-jersey.html [22] https://washingtonsblog.com/2016/02/economics-professor-negative-interest-rates-aimed-driving-small-banks-business-eliminating-cash.html [23] https://www.businessinsider.com/the-effect-of-negative-interest-rates-2015-11?r=UK [24] https://tradingeconomics.com/euro-area/gdp-growth-annual [25] https://edition.cnn.com/2019/07/29/business/deutsche-bank-ecb-negative-rates/index.html [26] https://www.independent.co.uk/news/business/analysis-and-features/nudge-theory-richard-thaler-meaning-explanation-what-is-it-nobel-economics-prize-winner-2017-a7990461.html [27] https://www.bbc.com/news/business-27717594 [28] https://www.theguardian.com/commentisfree/2018/jul/19/cashless-society-con-big-finance-banks-closing-atms [29] https://money.cnn.com/2017/07/14/news/companies/visa-no-cash-restaurant-initiative/index.html [30] https://www.theguardian.com/world/2016/feb/08/german-plan-prohibit-large-5000-cash-transactions-fierce-resistance [31] https://www.bloomberg.com/news/features/2018-02-06/germany-is-still-obsessed-with-cash Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ZxOWfBKdfRo | 09 Aug 2019
As Google prevented Tulsi Gabbard from running campaign ads on Google Search after her successful debate night, the reliability and credibility of moderation driven by machine-learning algorithms is put to question. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz On the night after the first Democratic debates, Tulsi Gabbard was the single most Google-searched candidate by far. However, Google suspended her advertising account for 6 hours and so drastically limited her ability to direct newcomers to her campaign website. The classic argument goes that machine-learning algorithms are mathematical, and by their very nature, neutral and unbiased. In reality, algorithms reinforce biases they learn about from their training data. These are the biases identified in the video that can negatively impact outcomes of machine-learning algorithms: 1. a) Incorporated biases from the training data 1. b) Bad training data 2. User-manipulated bias 3. Manual interference 4. Marginalizing minorities 5. Corporate (for profit/influence) bias References: [1] https://www.salon.com/2019/07/25/tulsi-gabbard-sues-google-for-50-million/ [2] https://thehill.com/policy/technology/454746-tulsi-gabbard-sues-google-over-censorship-claims [3] https://www.theguardian.com/technology/2018/oct/16/facebook-political-activism-pages-inauthentic-behavior-censorship ; b) https://www.washingtontimes.com/news/2017/oct/23/internet-giants-show-power-to-shape-politics/ [4] https://gizmodo.com/former-facebook-workers-we-routinely-suppressed-conser-1775461006 [5] https://www.statista.com/statistics/216573/worldwide-market-share-of-search-engines/ b) https://www.omnicoreagency.com/facebook-statistics/ [6] https://techcrunch.com/2014/07/09/yelp-google-anti-trust/ [7] https://www.mtu.edu/magazine/2019-1/stories/algorithm-bias/ [8] https://www.nytimes.com/2015/07/10/upshot/when-algorithms-discriminate.html [9] https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing [10] https://www.theguardian.com/technology/2016/dec/16/google-autocomplete-rightwing-bias-algorithm-political-propaganda [11] https://www.businessinsider.de/amazon-built-ai-to-hire-people-discriminated-against-women-2018-10?op=1&r=US&IR=T [12] https://www.theverge.com/2019/4/5/18287318/youtube-logan-paul-pewdiepie-demonetization-adpocalypse-premium-influencers-creators [13] https://eu.usatoday.com/story/tech/2017/10/05/youtube-alters-algorithm-after-searches-las-vegas-shooting-turn-up-conspiracy-theories/736548001/ [14] https://medium.com/@mrtz/how-big-data-is-unfair-9aa544d739de [15] https://www.reuters.com/article/us-amazon-com-facial-recognition/amazons-face-id-tool-mismatched-28-members-of-congress-to-mug-shots-aclu-idUSKBN1KG1K7 [16] https://www.nytimes.com/2019/04/03/technology/amazon-facial-recognition-technology.html [17] http://www.benedelman.org/hardcoding/ [18] https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10 [19] https://techcrunch.com/2014/07/09/yelp-google-anti-trust/ [20] https://qz.com/823922/eric-schmidt-played-a-crucial-role-in-team-hillarys-election-tech/ [21] https://www.youtube.com/watch?v=tck3d_Hg4XQ Credits Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
quTUTUNdZx4 | 19 Jul 2019
Facebook's cryptocurrency Libra rides the decentralization bandwagon when in reality it might become the ultimate step towards wealth consolidation and information control of the global Facebook empire. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz You can donate completely anonymously with Monero. Learn more here: https://www.getmonero.org/ Facebook is going to launch its own cryptocurrency with the potential of turning the social network into the largest payment service in the world. Zuckerberg promises strong privacy protections and claims the new digital currency will be independent of the Facebook company. The new coin called Libra is planned to launch in early 2020, and to market it, Facebook is capitalizing on the growing popularity of blockchain cryptocurrencies. Sources Libra White Paper & official documentation https://libra.org/en-US/white-paper/ https://libra.org/en-US/about-currency-reserve/ https://libra.org/en-US/association-council-principles/ https://libra.org/en-us/becoming-founding-member/ https://libra.org/en-US/permissionless-blockchain/#overview https://developers.libra.org/docs/life-of-a-transaction https://developers.libra.org/docs/libra-core-overview https://developers.libra.org/docs/libra-protocol https://developers.libra.org/docs/the-libra-blockchain-paper https://developers.libra.org/docs/assets/papers/the-libra-blockchain.pdf News coverage of Libra https://www.theguardian.com/technology/2019/may/24/facebook-plans-to-launch-globalcoin-cryptocurrency-in-2020 https://edition.cnn.com/2019/06/18/tech/facebook-libra-cryptocurrency/index.html https://www.theverge.com/2019/6/18/18683867/facebook-cryptocurrency-libra-calibra-trust-banking https://www.theverge.com/2019/6/26/18716326/facebook-libra-cryptocurrency-blockchain-irs-starbucks https://www.nytimes.com/2019/06/19/opinion/facebook-currency-libra.html https://www.bloomberg.com/news/articles/2019-06-25/maxine-waters-wasn-t-kidding-about-a-facebook-token-moratorium https://www.bloomberg.com/opinion/articles/2019-06-20/facebook-s-libra-cryptocurrency-isn-t-actually-supposed-to-work?srnd=opinion https://marginalrevolution.com/marginalrevolution/2019/06/the-libra-reserve-discussion-of-background-documents.html https://www.nytimes.com/2019/02/28/technology/cryptocurrency-facebook-telegram.html https://www.bloomberg.com/news/articles/2018-12-21/facebook-is-said-to-develop-stablecoin-for-whatsapp-transfers https://www.coindesk.com/report-uber-paypal-visa-to-back-facebooks-globalcoin-cryptocurrency https://www.bbc.com/news/business-48383460 https://www.bbc.co.uk/news/business-47240760 https://www.investopedia.com/what-is-facebook-s-globalcoin-4688666 https://www.coinspeaker.com/project-libra-facebook-cryptocurrency-payments-system/ https://www.coinspeaker.com/barclays-facebook-coin-revenue/ https://www.coindesk.com/everything-we-know-about-facebooks-cryptocurrency www.ccn.com/crypto/facebook-rival-taringa-crypto/2019/07/07/ https://www.ccn.com/news/dangerous-allow-libra-regulatory-void-ecb/2019/07/08/ https://www.bloomberg.com/news/articles/2019-07-07/facebook-s-cryptocurrency-plan-draws-ecb-warning-on-regulation Satoshi Nakamoto introducing Bitcoin https://satoshi.nakamotoinstitute.org/posts/p2pfoundation/1/ Facebook operates as a dictatorship https://www.ccn.com/shareholders-want-dictator-zuck-out-as-chair-facebook-defends-him/ https://www.latimes.com/business/hiltzik/la-fi-hiltzik-mark-zuckerberg-facebook-20190416-story.html Other stablecoins https://www.coindesk.com/makerdao-quest-stable-stablecoin-continues Other social media cryptocurrencies https://www.nytimes.com/2018/03/04/technology/telegram-initial-coin-offering.html?module=inline Sandberg and Zuckerberg on a paid version of Facebook https://fortune.com/2018/04/07/sheryl-sandberg-says-facebook-users-would-have-to-pay-for-total-privacy/ https://www.businessinsider.com/mark-zuckerberg-always-a-version-of-facebook-free-2018-4 Facebook political censorship https://www.theguardian.com/technology/2018/oct/16/facebook-political-activism-pages-inauthentic-behavior-censorship The difference between permissionless and permissioned blockchains https://www.coindesk.com/information/what-is-the-difference-between-open-and-permissioned-blockchains Bitcoin rich list https://bitinfocharts.com/top-100-richest-bitcoin-addresses.html Shapeshift blacklisting bitcoin addresses https://www.ccn.com/shapeshift-is-assisting-police-to-trace-cashed-out-bitcoin-from-wannacry-ransomware/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne
54UT-gtfI9I | 02 Jul 2019
In today's talk with David from Safing.io we are discussing Open Source software development as a business model and why opening source code is important and even beneficial for a business and a society. Follow David and Safing safing.io stamp.community twitter.com/davegson Timestamps [to be updated]: 00:00 Hi 01:10 David's introduction and Safing products 08:32 How are you making money? 11:04 Business model 16:00 Why and what is Open Source? 40:00 Ideology of Open Source and Intellectual Property 59:00 Artificial Intelligence and Open Source 01:13:50 Closing up Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
PoctNo-lHHM | 27 Jun 2019
The United Kingdom, branded as the Énemy of the Internet, is on the path to become the world's first democracy turned into a digital dictatorship. This is how surveillance and censorship is changing the UK. You can push back against the Online Hárms White Paper by giving your response at https://dcms.eu.qualtrics.com/jfe/form/SV_5nm7sPoxilSoTg9 by July 1 2019. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Sources Online Harms White Paper full text https://www.gov.uk/government/consultations/online-harms-white-paper News coverage & blogs https://www.theguardian.com/technology/2019/apr/04/online-harms-white-paper-regulation-without-killing-innovation https://www.wired.co.uk/article/online-harms-white-paper-uk-analysis https://blogs.lse.ac.uk/mediapolicyproject/2019/04/10/the-online-harms-white-paper-its-approach-to-disinformation-and-the-challenges-of-regulation/ https://www.theguardian.com/commentisfree/2019/apr/14/white-paper-online-harms-global-first-needed-tech-industry-dcms-google-facebook Enemies of the Internet by Reporters without Borders https://rsf.org/sites/default/files/2014-rsf-rapport-enemies-of-the-internet.pdf https://www.aljazeera.com/indepth/opinion/2012/04/201241373429356249.html David Cameron calls to block social media https://www.theguardian.com/uk/2011/aug/11/cameron-call-social-media-clampdown https://www.theguardian.com/world/2011/jan/26/egypt-blocks-social-media-websites https://news.yahoo.com/blogs/cutline/british-pm-david-cameron-considers-ban-twitter-facebook-150616849.html Super-injunctions and libel laws https://www.zdnet.com/article/google-facebook-twitter-warned-in-privacy-report/ https://www.zdnet.com/article/facebook-twitter-libel-claims-double-celebrities-still-prefer-super-injunctions/ https://www.zdnet.com/article/tech-injunction-gags-twitter-facebook-users-why-super-injunctions-only-apply-to-britain/ ISP blocking & age verification https://www.telegraph.co.uk/technology/news/9236667/Pirate-Bay-must-be-blocked-High-Court-tells-ISPs.html https://www.independent.co.uk/life-style/gadgets-and-tech/porn-filters-overwhelmingly-rejected-by-uk-internet-users-9623489.html https://www.wired.co.uk/article/uk-porn-age-verification https://www.theguardian.com/technology/2019/jun/20/uks-porn-age-verification-system-to-be-delayed-indefinitely https://www.theguardian.com/technology/2016/nov/23/internet-age-checks-are-an-overreaction UK mass surveillance https://www.theguardian.com/uk-news/2018/jan/30/uk-mass-digital-surveillance-regime-ruled-unlawful-appeal-ruling-snoopers-charter https://www.bloomberg.com/news/articles/2016-02-11/-snooper-s-charter-would-make-brits-most-spied-upon-people https://www.theguardian.com/world/2012/apr/07/surveillance-technology-repressive-regimes UK CCTV cameras and street surveillance https://www.theguardian.com/uk/2011/mar/02/cctv-cameras-watching-surveillance https://www.theguardian.com/society/2012/oct/30/cctv-increases-peoples-sense-anxiety https://www.theguardian.com/business/2017/aug/18/former-burglars-barking-dogs-cctv-best-deterrent http://news.bbc.co.uk/2/hi/uk_news/2071496.stm http://www.1in12.com/publications/cctv/ditton.htm Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
RFaI_L_AGHg | 13 Jun 2019
Nimses is a new social media app promoted even by Pewdiepie. Its main selling point is that it rewards users who download the app with nims, a virtual currency. But the price of your privacy and the false promises of Nimses don't make it such a lucrative deal. What is Nimses? Nimses would have you believe it’s an American company. But make no mistake about it. It’s a Ukrainian social media platform that is trying to penetrate Western markets. Nimses is incorporated in Delaware, which is ranked among the best and most convenient states to incorporate your company in the US if you are a foreign entity. Nimses’ strategy to win against the dominance of the Facebook/Instagram empire is trying to lure users in by offering them a virtual currency for their time spent on the platform. Nimses generates one nim every minute of your life on the platform. This virtual currency is centrally controlled by the company and its value doesn’t seem to be backed by anything other than what the company currently says. Sources https://nimses.com/privacy/ https://temples.nimses.com/ https://nimses.com/en/nimonomy https://nimses.com/en/whitepaper https://data.nimses.com/?lang=en https://nimses.com/en/cookie-policy/ https://www.reddit.com/r/PewdiepieSubmissions/comments/bxzvso/not_a_meme_but_saw_lots_of_people_commenting_this/ Social media surveillance and privacy https://theoutline.com/post/5380/targeted-ad-creepy-surveillance-facebook-instagram-google-listening-not-alone?zd=1&zi=ucbo5ff2 https://techcrunch.com/2018/09/27/yes-facebook-is-using-your-2fa-phone-number-to-target-you-with-ads/ https://techcrunch.com/2016/08/25/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out/ https://gizmodo.com/facebook-is-giving-advertisers-access-to-your-shadow-co-1828476051 https://www.propublica.org/article/facebook-doesnt-tell-users-everything-it-really-knows-about-them https://www.nytimes.com/2013/03/26/technology/facebook-expands-targeted-advertising-through-outside-data-sources.html?pagewanted=all&_r=0 https://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/ https://www.propublica.org/article/facebook-enabled-advertisers-to-reach-jew-haters http://www.slate.com/articles/technology/technology/2013/03/facebook_advertisement_studies_their_ads_are_more_like_tv_ads_than_google.single.html? https://theintercept.com/2018/09/13/google-china-search-engine-employee-resigns/ https://www.nytimes.com/2018/05/30/technology/google-project-maven-pentagon.html https://www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.html https://www.theguardian.com/technology/2014/apr/15/gmail-scans-all-emails-new-google-terms-clarify https://www.nytimes.com/2017/06/23/technology/gmail-ads.html https://www.wsj.com/articles/techs-dirty-secret-the-app-developers-sifting-through-your-gmail-1530544442 https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data https://www.theverge.com/2017/11/21/16684818/google-location-tracking-cell-tower-data-android-os-firebase-privacy Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Ri9vkrlNiU4 | 02 Jun 2019
Facial recognition advertising as depicted in Minority Report is coming to your local stores sooner than you thought. The technology is becoming so mainstream it will become a part of the new social contract. Several US retailers, including Walgreens and Kroger, are piloting facial recognition advertising in physical stores. The goal is to use all available information from the cameras to target customers with relevant ads in a similar way online advertising targets Internet users. Apps on your phone can use your high definition selfie camera to track your emotional expressions of your face as you listen to music, and suggest you playlists that correspond to your mood. A social media platform can track your face as you are typing that comment or text with your friends, and suggest you mood-specific ads. All major technology companies are heavily investing into the development of facial recognition, including Google, Apple, Amazon, Samsung or Microsoft. With their massive reach on the market, it will soon become extremely difficult for you to avoid being identified every step of your way if you want to be a functioning individual. Sources: Amazon Facial Rekognition bias https://www.nytimes.com/2019/04/03/technology/amazon-facial-recognition-technology.html https://www.reuters.com/article/us-amazon-com-facial-recognition/amazons-face-id-tool-mismatched-28-members-of-congress-to-mug-shots-aclu-idUSKBN1KG1K7 Facial recognition targeted advertising https://www.cbc.ca/news/technology/cameras-targeted-advertising-1.5107784 https://www.cbc.ca/news/technology/facial-recognition-technology-concerns-1.4826931 https://www.wsj.com/articles/walgreens-tests-digital-cooler-doors-with-cameras-to-target-you-with-ads-11547206200 https://www.theguardian.com/media/pda/2010/sep/27/advertising-billboards-facial-recognition-japan https://www.targetmarketingmag.com/article/facial-recognition-ads-target-consumers/ https://qz.com/512378/ads-have-started-watching-you-back-which-is-not-creepy-at-all/ https://www.nytimes.com/2014/02/02/technology/when-no-one-is-just-a-face-in-the-crowd.html?_r=0 https://www.washingtonpost.com/news/the-switch/wp/2015/06/11/facial-recognition-technology-is-everywhere-it-may-not-be-legal/ https://adexchanger.com/online-advertising/webcam-based-emotion-ad-tracking-is-a-real-thing-and-big-brands-are-doing-it/ https://www.digitaltrends.com/cool-tech/facial-recognition-taxi-japan/ https://www.inc.com/molly-reynolds/how-facial-recognition-is-shaping-the-future-of-marketing-innovation.html https://www.theguardian.com/media-network/2016/aug/17/facial-recognition-a-powerful-ad-tool-or-privacy-nightmare https://www.forbes.com/sites/jaysondemers/2017/11/27/facial-recognition-could-drive-the-next-online-marketing-revolution-heres-how/ https://digiday.com/marketing/5-campaigns-used-facial-recognition-technology/ https://adage.com/article/digital/apple-iphone-features-facial-recognition/310434 https://adage.com/article/news/brands-facial-recognition-campaigns/244233 https://www.globenewswire.com/news-release/2018/08/16/1553082/0/en/Facial-Recognition-Market-to-Touch-US-8-Bn-by-2022-at-19-68-CAGR-Industry-Leaders-Analysis-Safran-SA-NEC-Corporation-Gemalto-Cognitec-Systems-Aware-Inc-Daon-FaceFirst-Ayonix-Key-Le.html https://www.washingtonpost.com/technology/2019/04/30/amazons-facial-recognition-technology-is-supercharging-local-police/ https://news.yahoo.com/amazon-shareholders-support-selling-face-recognition-tech-police-214215508.html?guccounter=1&guce_referrer=aHR0cHM6Ly9kdWNrZHVja2dvLmNvbS8&guce_referrer_sig=AQAAALe3aIF8cnRu8y8uVO_ZmXymLXlhzU2E52rDQRCg9i3AgAoMtJFgA7SE3fkcPQ14YoadGiPIseH4sYl82Ou3teyzAe-pp3ysCAjCxvB3gzL8SJypcvNzFRTK_PYjmhIZYvngAjsvhQh0Hf3RgdvrSnsWAkxFTPqGb-WSdbwbf2Ut Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
x8JuUW41pbQ | 22 Apr 2019
Microsoft _NSAKEY is a signing key found in Microsoft's CryptoAPI since Windows 95. Many claimed this was the ultimate backdoor for the National Security Agency. But is this a hoax, or is the _NSAKEY a real backdoor in Microsoft Windows? A British researcher discovered that Microsoft was cryptographically signing its CryptoAPI with two keys. This means two separate entities could approve software running inside Windows. One of those entities was Microsoft. The identity of the other one remained a mystery. But then Microsoft shipped a Service Pack 5 for WindowsNT4. Somebody down the chain of command at Microsoft forgot to remove information revealing the true identity of both of the signing keys. Chief security scientist at Ontario-based Cryptonym Andrew Fernandes found the names of the two keys. One was simply called “_KEY”. And the other was “_NSAKEY”. Sources News coverage https://www.wired.com/1999/09/ms-denies-windows-spy-key/ https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/biztech/articles/04soft.html https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/cyber/articles/04soft-side.html http://us.cnn.com/TECH/computing/9909/13/backdoor.idg/index.html http://edition.cnn.com/TECH/computing/9909/03/windows.nsa.02/ http://news.bbc.co.uk/2/hi/sci/tech/437967.stm https://www.computerworld.com/article/2521889/microsoft-denies-it-built--backdoor--in-windows-7.html Security experts & opinions https://web.archive.org/web/20000617163417/http://www.cryptonym.com/hottopics/msft-nsa/msft-nsa.html https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI https://www.heise.de/tp/features/How-NSA-access-was-built-into-Windows-3444341.html http://www.stat.rice.edu/~dobelman/kstorm.txt https://cryptome.org/nsakey-ms-dc.htm Other Code is speech https://www.eff.org/deeplinks/2015/04/remembering-case-established-code-speech/ Microsoft NSA cooperation on mass surveillance https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data https://theintercept.com/2014/06/17/germany-nsas-largest-listening-post-europe/ Credits: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
5-cdpYN06Lc | 14 Apr 2019
The indictment of Julian Assange is going to change the world forever. After the arrest of the founder of WikiLeaks, the fate of journalism and free press is called into question. The arrest of WikiLeáks founder Julian Assánge is going to leave a mark in the history books. Assánge has a complicated personality. But the story of WikiLeáks throughout the years challenges the very foundations of what it means to live in a Western society. On April 11th, Assánge was arrested by London Metropolitan Police. But what makes history is neither of these cases. It’s his subsequent arrest at a central police station in London by British authorities on behalf of the United States. The US arrest came with an indictment accusing Assange of conspiracy to commit computer intrusion with former US military intelligence analyst Chelsea Manning. The federal government is now seeking to extradite Assange into the United State where he could face up to five years of prison time for this single charge. The indictment counts four main acts as part of the conspiracy: 1. The communication between Assange and Manning using Jabber instant messaging service where they agreed to acquire and disseminate the classified documents and crack the password on one of the DoD computers. 2. The effort Assange took to conceal Manning as the source of the leak.The indictment counts four main acts as part of the conspiracy: 3. That Assange encouraged Manning to provide more information from the government systems. 4. And the fact that Assange and Manning used a cloud drop box to transmit the leaked documents. Sources Indictment https://www.justice.gov/usao-edva/pr/wikileaks-founder-charged-computer-hacking-conspiracy https://www.justice.gov/usao-edva/press-release/file/1153481/download News coverage https://www.theguardian.com/uk-news/2019/apr/11/julian-assange-arrested-at-ecuadorian-embassy-wikileaks https://theintercept.com/2019/04/11/the-u-s-governments-indictment-of-julian-assange-poses-grave-threats-to-press-freedoms/ https://www.theguardian.com/media/2019/apr/11/everything-you-need-to-know-about-julian-assange https://www.theguardian.com/media/2019/apr/11/julian-assange-charged-with-computer-hacking-conspiracy https://www.politico.com/story/2019/03/06/trump-civilian-deaths-drone-strikes-1207409 https://www.washingtonpost.com/world/europe/wikileakss-julian-assange-evicted-from-ecuador-embassy-in-london/2019/04/11/1bd87b58-8f5f-11e8-ae59-01880eac5f1d_story.html? https://www.washingtonpost.com/world/national-security/julian-assange-has-been-charged-prosecutors-reveal-in-inadvertent-court-filing/2018/11/15/9902e6ba-98bd-48df-b447-3e2a4638f05a_story.html? WikiLeaks tweeting about extradition before the arrest https://mobile.twitter.com/wikileaks?max_id=1115997048426381311 Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Credits Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Lr-9aCMUXzI | 07 Apr 2019
Intel embeds Management Engine into all of its computers since 2008. Intel Management Engine has been criticized for its security risks and has been called a backdoor with rootkit possibilities by many security experts and researchers. This is Intel Management Engine. A subsystem microprocessor that’s operating inside every Intel CPU platform made from 2008 onward. Despite its name and some basic functions, we don’t know anything about what Intel Management really does. What we do know is that this microcontroller works completely independently from the main CPU. It can’t be manually removed or disabled. Even if the main computer is powered off, as long as it is plugged in to the mains or the battery, IME will continue to run. Intel Management Engine is a computer within a computer. It is running it’s own operating system, called Minix, and is installed by default on every modern computer with an Intel CPU. This probably makes Minix the most widely used operating system in the world. But unlike Windows, Mac OS or Linux, Minix is completely outside of user control. It cannot be scanned by an antivirus or malware detection software. It can bypass any firewall configuration and has a dedicated network connection that can circumvent the main CPU and the main operating system. Sources and further reading https://www.slideshare.net/codeblue_jp/igor-skochinsky-enpub/17 https://www.howtogeek.com/334013/intel-management-engine-explained-the-tiny-computer-inside-your-cpu/ Intel Management Engine security problems https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html https://www.csoonline.com/article/3220476/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html https://www.techrepublic.com/blog/it-security/researchers-create-nearly-undetectable-hardware-backdoor/ https://www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/ https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it https://mjg59.dreamwidth.org/48429.html https://www.wired.com/story/intel-management-engine-vulnerabilities-pcs-servers-iot/ https://www.zdnet.com/article/computer-vendors-start-disabling-intel-management-engine/ https://www.zdnet.com/article/minix-intels-hidden-in-chip-operating-system/ https://www.networkworld.com/article/3236064/minix-the-most-popular-os-in-the-world-thanks-to-intel.html https://www.fsf.org/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom https://www.fsf.org/blogs/licensing/intel-me-and-why-we-should-get-rid-of-me https://www.zdnet.com/article/researchers-say-intels-management-engine-feature-can-be-switched-off/ Purism's approach to Intel ME https://puri.sm/learn/intel-me/ https://puri.sm/posts/deep-dive-into-intel-me-disablement/ Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Credits Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
pBffKzWECUQ | 31 Mar 2019
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. Amazon is a monopoly in dozens of different markets because Jeff Bezos wants it to. In this criticism of Amazon, we analyze of Jeff Bezos business model threatens the very existence of free market. Amazon is the second biggest corporation in the world and one of the only two companies to pass the $1 trillion mark. But during more than two decades of existence, Amazon has struggled to make any profit. It has everything to do with the business model of Jeff Bezos, the CEO of Amazon. In his own words, Bezos believes in shareholder supremacy, which means everything is justified as long as the share value is growing. Jeff Bezos pushed Amazon great lengths to claim this dominance. From undercutting competitors with predatory pricing, through forcing itself into their business, to vertically integrating into strategic markets across the business line, Amazon is on track to gradually take over every aspect of e-commerce and to control and decide what we shop and what is allowed to be sold. Sources Amazon profits and revenue chart https://www.wsj.com/articles/amazon-reports-surge-in-profit-1461874333 and http://www.thestreet.com/story/875924/1/amazon-losses-widen-but-shares-rise-after-hours.html Amazon earnings https://venturebeat.com/2019/01/31/amazon-earnings-q4-2018/ and https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue Amazon Prime and stocks https://www.bloomberg.com/news/articles/2010-11-24/whats-in-amazons-box-instant-gratification Amazon e-commerce share https://techcrunch.com/2018/07/13/amazons-share-of-the-us-e-commerce-market-is-now-49-or-5-of-all-retail-spend/ Amazon Web Services statistics https://www.statista.com/topics/4418/amazon-web-services/ Jeff Bezos net worth https://www.forbes.com/profile/jeff-bezos/ More than 90% market share in 5 products https://marketingland.com/amazon-owns-more-than-90-market-share-across-5-different-product-categories-report-241135 Amazon vs Quidsi and Diapers https://slate.com/technology/2013/10/amazon-book-how-jeff-bezos-went-thermonuclear-on-diapers-com.html? Amazon cloud https://www.reuters.com/article/amazon-cloud-idUSN1E7A727Q20111109 Amazon Tax https://www.businessinsider.in/Billionaire-VC%20-says-that-most-companies-will-eventually-pay-an-Amazon-tax/articleshow/50662558.cms Amazon Antitrust https://www.nytimes.com/2016/07/13/business/economy/antitrust-competition-inequality.html Amazon tightens grip on technology https://www.wsj.com/amp/articles/amazon-microsoft-tighten-grip-on-enterprise-tech-11552949379 https://www.wsj.com/articles/amazon-alphabet-and-walmart-were-top-it-spenders-in-2018-11547754757?mod=article_inline https://www.nytimes.com/2009/12/06/magazine/06fob-q4-t.html https://www.skyhighnetworks.com/cloud-security-blog/microsoft-azure-closes-iaas-adoption-gap-with-amazon-aws/ A major essay on Amazon anti-competitive practices and monopolization: Amazon antitrust paradox https://www.yalelawjournal.org/note/amazons-antitrust-paradox Credits: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
loG5_UhgqK4 | 28 Mar 2019
A former mobile game developer and an expert at centralized web technology talks about how apps and companies track and handle your personal data. Ask David questions on the The Hated One subreddit Q&A thread: https://www.reddit.com/r/thehatedone/comments/b6rtxi/former_mobile_game_developer_discloses_hidden/ Use his reddit handle u/davegson to make sure he gets notified about your comments. Or reach him on Twitter https://twitter.com/davegson He is also a co-founder of safing.io. The book mentioned: Timestamps in the description. Q&A on our subreddit: https://www.reddit.com/r/thehatedone/comments/b6rtxi/former_mobile_game_developer_discloses_hidden/ David can be reached on Twitter as well: twitter.com/davegson The book mentioned: https://inteltechniques.com/book2.html TIMESTAMPS 0:00 - Intro Hated 1:00 - Talk starts - small talk - introduction 2:53 - Introduction to the backend - what David worked on 6:08 - Davids responsibility in the company 10:49 - Timestamps and intro to data collection 13:15 - What specific data was stored? 17:58 - Who had access to the data? 22:28 - Analytic Companies 27:12 - Google Analytics & Trigger Points 34:03 - What can Google see through Google Analytics on iOS devices? 38:10 - GDPR - the affects on the company 40:40 - Why collect data? 45:26 - Employee access to the data 50:40 - Zooming into people 54:05 - What changed for David? Why quit the job? 58:05 - Why did David move into the privacy realm? 59:36 - Surveillance Capitalism & Free Speech 1:00:52 - Why does privacy matter? 1:03:55 - The bias of algorithms 1:08:45 - How does AI make decisions? 1:11:33 - How is the AI bias abused? 1:14:20 - What it means to give governments & regimes this power 1:18:35 - Part 2: Start of Questions 1:19:00 - What happens when you delete Facebook? 1:22:42 - How much data can be collected from a 'normal' person living a life without protecting their privacy? 1:25:02 - Why should I care if I have nothing to hide? 1:28:10 - Do you think Google/FB/Amazon secretly are listening to your Phones/Home Assistants? 1:34:06 - What are some use cases of collected data and what are some the worst consequences being used? 1:36:20 - Are there any privacy offenders that aren't commonly known as such? 1:43:40 - How do apps collect data and do companies have power to overcome your denial when the app asks for some kind of permission? 1:49:54 - What steps did you take to protect your privacy? 1:56:26 - Compartmentalization on mobile phones? 2:04:30 - Best methods to find and neutralize all/most data recorded of us since the beginning of the Internet? 2:06:30 - What are the ways mobile games manipulate their players for profit? And possible solutions to make the mobile gaming industry less creepy? 2:17:00 - Thoughts about Purism 2:17:50 - Final thoughts & outro Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
tQhWdsFMc24 | 17 Mar 2019
Firefox is a very powerful browser and in this 2019 tutorial you learn how to access essential privacy and security settings to protect your online privacy. More info: https://www.privacytools.io/ https://wiki.mozilla.org/Privacy/Privacy_Task_Force/firefox_about_config_privacy_tweeks Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Getting maximum privacy and security will require to go through a plethora of settings Firefox allows you to change, as well as installing a selection of privacy enhancing extensions that will protect your privacy even more. Go to “Content blocking” and select “strict blocking”. Scroll down to History and choose “Use custom settings for history”. Check “Always use private browsing mode”. If you are changing these settings on a Firefox you’ve been using for a while, you can easily clear all previously stored data in privacy – Cookies and Site Data and under History - “Clear History”. Select everything and set time range to Everything. Under Address Bar, uncheck suggestions for Browsing history, Bookmarks and Open Tabs. Under permissions, go to settings for Location, Camera, Microphone and Notifications and select “Block new requests asking to access” each of these parameters. By default, Mozilla will collect some information from your Firefox. This is not good. But it’s easy to turn it off with a single click. Blocking dangerous and deceptive content might be useful for secure browsing, but this service is provided by Google Safe Browsing, which you actually don’t see here. So I choose to not trust Google with my security. Change your default search engine to duckduckgo and opt out of search suggestions so that your search records aren’t shared with the provider. Credits Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
shxTTon5lfs | 11 Mar 2019
Apple's infallible privacy grandstanding is a masterpiece of distinguishable marketing. For Apple privacy is a clever trick with words that lets them get away with the same invasive practices for which other companies eat the dirt. When it comes to the software Apple provides, they aren’t treating your data any differently than other software companies. Companies that promise you strong privacy and security begin with preventing themselves from accessing your data. Apple doesn’t do that. iMessage's implementation of end-to-end encryption is very poor when compared to other protocols like Signal. iMessage doesn’t provide any interface to verify authenticity of contacts which allows Apple to inject keys that would enable them or law enforcement agencies to monitor your conversations in real time. iMessage doesn’t obscure metadata. All your contacts, IP addresses, time stamps, and the size and presence of attachments is open for surveillance. Sources Apple privacy hypocrisy due to censorship in China https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html Apple and government surveillance https://theintercept.com/2014/09/22/apple-data/ http://appleinsider.com/articles/13/06/06/apple-reportedly-last-company-to-join-governments-prism-data-mining-program NSA mass surveillance cooperation with the big tech https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?utm_term=.277e14f1d5ee NSA gag order to silence mass surveillance http://america.aljazeera.com/articles/2014/1/27/us-to-allow-internetcompaniestodisclosemoredetailsonnsarequests.html NSA fines non-compliant service providers https://www.theguardian.com/world/2014/sep/11/yahoo-nsa-lawsuit-documents-fine-user-data-refusal Snowden on Apple vs FBI https://theintercept.com/2016/03/08/snowden-fbi-claim-that-only-apple-can-unlock-phone-is-bullshit/ Apple products still reveal a lot of information to the FBI https://www.lawfareblog.com/iphones-fbi-and-going-dark All the data Apple can give to the police https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ Apple reveals US surveillance requests https://www.theguardian.com/technology/2013/jun/17/apple-reveals-us-surveillance-requests iMessage privacy https://blog.quarkslab.com/imessage-privacy.html The case against Apple privacy https://appleinsider.com/articles/15/01/21/nsa-leaker-edward-snowden-refuses-to-use-apples-iphone-over-spying-concerns---report https://readwrite.com/2013/05/02/apples-privacy-record-sucks-heres-why-you-should-care/ https://www.eff.org/who-has-your-back-2013 https://www.eff.org/who-has-your-back-2017 https://www.forbes.com/sites/theopriestley/2015/08/24/did-apple-lie-about-your-privacy/ https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/ https://www.gnu.org/proprietary/malware-apple.en.html https://mobile.twitter.com/alexeheath/status/1090618686258458624 Secret Apple-Facebook deal over users data https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html Facebook vs Apple https://www.washingtonpost.com/technology/2019/01/30/facebook-paid-teens-use-research-app-that-could-monitor-online-activity-communication/?noredirect=on https://arstechnica.com/information-technology/2019/02/in-addition-to-facebooks-apple-restores-googles-ios-app-certificate/ https://arstechnica.com/gadgets/2019/01/facebook-and-google-offered-gift-cards-for-root-level-access-to-ios-users-data/ Privacy on Apple products https://arstechnica.com/information-technology/2018/09/dozens-of-ios-apps-surreptitiously-share-user-location-data-with-tracking-firms/ https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/?noredirect=on https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/ Differential privacy https://www.wired.com/2016/06/apples-differential-privacy-collecting-data/ https://www.wired.com/story/apple-differential-privacy-shortcomings/ https://www.apple.com/legal/privacy/en-ww/ https://www.apple.com/privacy/ Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne
odkgmdDqqF8 | 03 Mar 2019
Mark Zuckerberg announced a plan to integrate messaging platforms of WhatsApp, Instagram, and Facebook Messenger. Behind promises of more convenience and growth is a plan to dominate the world of data and social media. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 All of Facebook’s IT department, thousands of developers, are going to devote the next year or so to merge the backbone of the three platforms into one, so that their users can seamlessly send messages to each other across all three apps. The job won’t be done until it’s possible for WhatsApp users to send messages to Instagram users even if they don’t have Instagram accounts at all. Facebook has a long track record of violating and invading users privacy. From opening up access to their data to third party developers and advertisers, through sharing user data without their explicit consent, to tracking non-Facebook users and targeting them with ads. The move to integrate all three platforms into one seems that much more bizarre, as the integration could open up the ecosystem to even more security vulnerabilities and information manipulation. Sources The Facebook, Instagram, WhatsApp integration https://www.nytimes.com/2019/01/25/technology/facebook-instagram-whatsapp-messenger.html The New York Times coverage of Facebook's privacy cases https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html https://www.nytimes.com/2018/12/18/technology/facebook-privacy.html Other coverage https://www.slashgear.com/why-facebook-whatsapp-instagram-cross-service-encryption-cant-happen-25563705/ https://www.wired.com/story/facebook-messenger-whatsapp-instagram-chat-combined-encryption-identity/ https://slate.com/technology/2019/01/facebook-messenger-instagram-whatsapp-encryption.html?via=gdpr-consent https://www.ibtimes.com/facebook-instagram-whatsapp-integration-project-creates-challenges-opportunities-2758430 Advertisers are all happy for this https://mobilemonkey.com/blog/2019/01/facebook-messenger-instagram-whatsapp-need-to-know https://www.wired.com/story/facebook-messenger-whatsapp-instagram-chat-combined-encryption-identity/ Credits: CO.AG Musichttps://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
lLessJ4R6w8 | 25 Feb 2019
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is the best approach to keep control of your data. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Techlore's Go Incognito tutorial series: https://www.youtube.com/playlist?list=PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO How to be anonymous on the web https://www.youtube.com/watch?v=_393maHbHWc Master uBlock Origin in advanced mode https://www.youtube.com/watch?v=2lisQQmWQkY Important sources and software Good intro into security approaches and compartmentalization https://theinvisiblethings.blogspot.com/2008/09/three-approaches-to-computer-security.html Every piece of software recommended is listed here: https://www.privacytools.io/ More direct links: QubesOS https://www.qubes-os.org/ Intro to QubesOS https://www.youtube.com/watch?v=dD0_gq_ugw8 Joanna Rutkowska on Qubes https://www.youtube.com/watch?v=S0TVw7U3MkE Tor Browser https://www.torproject.org/ Tor for iOS https://blog.torproject.org/tor-heart-onion-browser-and-more-ios-tor https://itunes.apple.com/us/app/onion-browser/id519296448?mt=8 Orbot on Android https://guardianproject.info/apps/orbot/ Firefox addons uBlock Origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ - read the docs https://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-quick-guide https://github.com/gorhill/uBlock/wiki Cookie Autodelete https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete/ HTTPS Everywhere https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/ DecentralEyes https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/ F-Droid https://f-droid.org/ Firefox Klar https://f-droid.org/en/packages/org.mozilla.klar/ K-9 email client for android https://k9mail.github.io/ KeepassXC https://keepassxc.org/ Gmail Fireforwarding https://support.google.com/mail/answer/10957?hl=en How to get a burner phone https://theintercept.com/2017/02/20/how-to-run-a-rogue-government-twitter-account-with-an-anonymous-email-address-and-a-burner-phone/?curator=MediaREDEF Privacy by compartmentalization is very simple. You will create virtual compartments where you concentrate carefully separated pools of data. Each compartment will revolve around a different sphere of your identity. The more security you want, the stronger walls between your compartments you’ll build. The first compartment is for your professional identity to separate your business email and work related activity from the rest of your online presence. The second compartment is for your social media so that you keep those advertising giants away from your digital life outside of their platforms. The third compartment is for your private identity where most of your light browsing, news reading, watching YouTube and making online purchases happen. When you become familiar with this practice, you can build more compartments. Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Hjspu7QV7O0 | 10 Feb 2019
Why privacy matters if you have nothing to hide? Because privacy from you people who want to exploit you for their own benefit. You potentially spend more money on products than others and are excluded from housing, credit or employment market places just because advertisers use information about you that puts in a disadvantage. Privacy gives you freedom from this kind of speculation and exploitation. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Sources: Exploitation of weak privacy protections: https://www.washingtonpost.com/posteverything/wp/2014/11/03/if-you-use-a-mac-or-an-android-e-commerce-sites-may-be-charging-you-more/?noredirect=on Linus Tech Tips on cheaper flights https://www.youtube.com/watch?v=Utsnt6GFrKo https://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=1&hp=&pagewanted=all https://www.businessinsider.com/the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy-2012-2?international=true&r=US&IR=T https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/ Facebook empire https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html https://www.nytimes.com/2018/12/18/technology/facebook-privacy.html Abusive cases of privacy invasion https://www.maryferrell.org/showDoc.html?docId=1159&search=King#relPageId=137 https://www.maryferrell.org/showDoc.html?docId=1158&search=NAACP#relPageId=25 https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x https://techcrunch.com/2012/04/23/facebooks-amended-s-1-500-million-mobile-users-paid-300m-cash-23-million-shares-for-instagram/ Ads discrimination https://www.propublica.org/article/facebook-advertising-discrimination-housing-race-sex-national-origin https://www.propublica.org/article/facebook-lets-advertisers-exclude-users-by-race http://business.time.com/2012/06/26/orbitz-shows-higher-prices-to-mac-users/ https://eu.usatoday.com/story/travel/columnist/mcgee/2013/04/03/do-travel-deals-change-based-on-your-browsing-history/2021993/ Government surveillance https://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy https://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html?noredirect=on&utm_term=.3d49d6bb9009 https://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/? https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?utm_term=.7e980dc5490f Why privacy matters https://www.wired.com/2011/06/why-privacy-matters-even-if-you-have-nothing-to-hide/ https://teachprivacy.com/10-reasons-privacy-matters/ https://lifehacker.com/plenty-to-hide-5918171 https://www.aclu.org/blog/national-security/qa-daniel-solove-how-bad-security-arguments-are-undermining-our-privacy?redirect=blog/technology-and-liberty/qa-daniel-solove-how-bad-security-arguments-are-undermining-our-privacy https://www.entrepreneur.com/article/293785 https://lifehacker.com/why-you-should-care-about-and-defend-your-privacy-5904966 https://www.wired.com/2006/05/the-eternal-value-of-privacy/ Legal standing of privacy https://www.aclu.org/cases/carpenter-v-united-states https://www.lawfareblog.com/summary-supreme-court-rules-carpenter-v-united-states https://www.lawfareblog.com/fourth-amendment-reasonableness-after-carpenter-v-united-states https://www.lawfareblog.com/what-if-responsible-encryption-back-doors-were-possible https://www.lawfareblog.com/roadmap-exceptional-access-research https://www.lawfareblog.com/protecting-republic-securing-communications-more-important-ever https://fas.org/sgp/crs/misc/R43586.pdf https://www.lawfareblog.com/resisting-law-enforcements-siren-song-call-cryptographers-improve-trust-and-security http://thefederalist.com/2017/11/28/supreme-court-hear-important-fourth-amendment-case-generation/ https://www.lawfareblog.com/apples-going-dark-doublespeak https://lifehacker.com/you-dont-own-your-data-1556088120 Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
QVkeJI2feyQ | 26 Jan 2019
Criticism of copyright laws and patents is a taboo but it shouldn't be. With initially good intentions, copyright and patent laws are concentrating more and more profit and power within the hands of right holders, which in most cases is big corporations, labels and studios. It's dangerous to free speech and privacy in the Age of the Internet. Copyright is unlike any other right. It gives the class of authors supreme position over the rest of society, while treating everyone else as criminals when they want to exercise their free speech and property rights to the full extent. Copyright is the exclusive right to reproduce and distribute someone’s work. It’s the right to make copies of a protected work, hence copy-right. Patents are government protections on improvements and inventions in devices and processes. In reality, copyrights and patents are monopolies. Monopolies where only the right holders are allowed to profit from the resources. It’s a monopoly because the more copyrights and patents the government protects, the more restricted people are in exercising their property rights. Imagine you and your neighbor both mine stone on your respective properties. Then your neighbor decides to build a sculpture out of his stone. In the world of copyright, the very pattern of this sculpture is now protected under the law. That means no one else is allowed to take full use of their property and make the same sculpture of their own. Since you also own stone, you are allowed to do everything except for making that sculpture. If your neighbor was to start mining stone with a pick-axe, they could patent this new production method and for 20 years, you would not be allowed to use a pick-axe to mine your stone on your property. The more people make copyrighted works from their stone, the less and less property rights you can exercise with your stone. The more patents are registered, the more restricted you are in what you can and can’t do on your property. That’s because the logic behind copyright and patent laws treats ideas as scarce resources when in reality, they are infinitely abundant. Sources Philosophy against copyright https://www.gnu.org/philosophy/komongistan.html https://www.gnu.org/philosophy/not-ipr.html https://questioncopyright.org/what_we_lose_when_we_embrace_copyright https://torrentfreak.com/language-matters-framing-the-copyright-monopoly-so-we-can-keep-our-liberties-130714/ https://www.gnu.org/philosophy/misinterpreting-copyright.html https://locusmag.com/2016/11/cory-doctorow-sole-and-despotic-dominion/ https://store.mises.org/Against-Intellectual-Property-P523.aspx https://www.gnu.org/philosophy/copyright-and-globalization.html US Constitution on intellectual monopolies https://www.law.cornell.edu/constitution/articlei#section8 Copyright censorship and problems with patent monopoly https://www.businessinsider.com/payments-company-stripe-2014-12? https://lumendatabase.org/ https://www.theguardian.com/environment/2013/feb/12/monsanto-sues-farmers-seed-patents https://www.vanityfair.com/news/2008/05/monsanto200805 https://www.eff.org/deeplinks/2018/01/copyright-first-wave-internet-censorship https://www.eff.org/deeplinks/2014/05/state-censorship-copyright-spanish-firm-abuses-DMCA https://www.techdirt.com/articles/20170929/17100738318/former-revenge-porn-site-operator-readies-senate-run-issuing-bogus-takedown-requests-to-youtube.shtml https://www.theguardian.com/technology/2016/may/23/copyright-law-internet-mumsnet https://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/06/27/part-owner-of-miami-heat-likely-to-lose-copyright-claim-against-blogger-who-republished-unflattering-photo/?utm_term=.9c8e0aed1217 https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/11/copyright-as-censorship-katz-v-chevaldina/?noredirect=on&utm_term=.9208a98bf9d1 https://www.eff.org/deeplinks/2017/01/copyright-shouldnt-be-tool-censorship Other https://www.nytimes.com/2018/09/28/technology/bytedance-fundraising-toutiao-tiktok.html https://en.wikipedia.org/wiki/Artificial_scarcity Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Credits: Music by Chuki Beats https://www.youtube.com/user/CHUKImusic and CO.AG. Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
v70e1WWwOj4 | 16 Jan 2019
This is not a usual from me today. An important update on my latest video that was not only demonetized after a manual review, but it was also removed from discovery and recommendations on YouTube. It now receives almost no views, when it used to get hundreds per hour. Source on the YouTube algorithm and censorship https://www.youtube.com/watch?v=n3H8D2LrLHc Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
r2h3iSA-Vac | 12 Jan 2019
Australia just declared end-to-end encryption illegal by requiring companies to provide access to plain text communications through a new Assistance and Access Bill that passed just before Christmas. This is a dangerous attack on the Internet freedom. The Assistance and Access Bill, known as the Australian ban on encryption, introduces three new technical notices the Australian government can use to leverage communication providers to yield data of their users even if they implement strong cryptographic protections. • technical assistance notice, • technical capability notice, and • technical assistance request Both technical assistance notice and technical capability notice demand mandatory cooperation from providers. Technical assistance request is a voluntary version of the both mandatory notices combined but with absolutely no restrictions or oversight. Sources: Draft proposal https://assets.documentcloud.org/documents/4756739/The-Assistance-Access-Bill-2018.pdf Explanatory bill https://assets.documentcloud.org/documents/4756738/Explanatory-Document.pdf Why backdoor is dangerous: https://cs.stanford.edu/people/eroberts/cs181/projects/ethics-of-surveillance/tech_encryptionbackdoors.html News coverage https://arstechnica.com/tech-policy/2018/08/australian-govt-wants-to-force-tech-firms-to-weaken-crypto/ https://phys.org/news/2018-12-australia-anti-encryption-law-passage.html https://arstechnica.com/tech-policy/2018/12/australia-passes-new-law-to-thwart-strong-encryption/ https://arstechnica.com/information-technology/2015/12/what-the-government-shouldve-learned-about-backdoors-from-the-clipper-chip/ https://www.theverge.com/2018/12/7/18130806/australia-access-and-assistance-encryption-bill-2018-facebook-google-apple-respond https://techcrunch.com/2018/12/05/australia-rushes-its-dangerous-anti-encryption-bill-into-parliament/ https://www.eff.org/deeplinks/2018/09/australian-government-ignores-experts-advancing-its-anti-encryption-bill https://www.abc.net.au/news/2018-12-04/encryption-whatsapp-signal-messages-explained/10580208 https://www.commsalliance.com.au/Documents/releases/2016-media-releases3/2018-media-release-38 https://www.bbc.com/news/world-australia-46463029 https://protonmail.com/blog/australia-anti-encryption-law/ (not news) https://theconversation.com/police-want-to-read-encrypted-messages-but-they-already-have-significant-power-to-access-our-data-82891 https://www.zdnet.com/article/australias-anti-encryption-law-will-merely-relocate-the-backdoors-expert/ https://stateofit.com/interception/ (Analysis) https://www.nytimes.com/2018/12/06/world/australia/encryption-bill-nauru.html Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA and Chuki Beats https://www.youtube.com/user/CHUKImusic Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
AhdJzjC7Leo | 31 Dec 2018
As the most popular encrypted email provider, ProtonMail has been criticized for false security promises and weak guarantees of its end-to-end encryption infrastructure. Can be ProtonMail's marketing of their Swiss-based email service justified? The results might SHOCK you! These are encrypted email providers that I would recommend Free and paid plans https://www.protonmail.ch/ https://www.tutanota.com/ https://www.mailfence.com/ Only paid https://www.mailbox.org/ https://www.posteo.de/ An Analysis of the ProtonMail Cryptographic Architecture by Nadim Kobeissi https://eprint.iacr.org/2018/1121 Liveoverflow End-to-End Encryption in the Browser Impossible? - ProtonMail https://www.youtube.com/watch?v=DM1tPmxGY7Y The Reddit debate and Protonmail's response https://www.reddit.com/r/ProtonMail/comments/9yqxkh/an_analysis_of_the_protonmail_cryptographic/ea3g0hm/ ProtonMail Threat Model https://protonmail.com/blog/protonmail-threat-model/ Why is ProtonMail more secure than Gmail https://protonmail.com/blog/protonmail-vs-gmail-security/ The problem with ProtonMail’s webmail service is that each time you go to sign in to their website, you have to completely trust ProtonMail that the javascript that your browser runs is correctly implementing PGP and is not trying to steal your private keys and read your messages. This problem is limited with smartphone apps, because each new version of an app has to be signed by the author and the platform – which in this case is ProtonMail and Google Play Store or Apple App Store. With these apps, users can verify whether they received the same binary for a particular version as everyone else. Because of the differences in the levels of trust, webmail services are objectively less secure than desktop and smartphone apps. That is if you expect ProtonMail to try to execute a malicious javascript that would let them read your emails without being detected. The fact that webmail is less secure than native apps is not new and ProtonMail has been saying that from day one. In their threat model article, ProtonMail explains this issue and even openly says that ProtonMail is for average people who want to protect themselves against mass surveillance, but it’s not for a next Edward Snowden. ProtonMail successfully accomplishes this mission because their servers can’t be tapped by the NSA to read plain-text emails as is the case with Gmail, Yahoo, Apple, or Microsoft. Where ProtonMail and Nadim differ, is that Nadim thinks that end-to-end encryption is not possible in webmail and ProtonMail should not be calling it that. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Flf2xqqZhsQ | 20 Dec 2018
Breaking down Google CEO testimony before the US Congress. Dodging many questions, there was at least one instance where Google CEO Sundar Pichai was caught lying under oath in the US House of Representatives. All privacy, anonymity and security tutorials https://www.youtube.com/watch?v=gFsRXfifcYg&list=PLR_ghQEN2SgBOLJaDomLoK95Ay_xV5aZV How to stop Google tracking https://www.youtube.com/watch?v=6EfJR1lI0l0 You can also use NoScript to do this https://www.youtube.com/watch?v=AC4ALEKZRfg How to use uBlock Origin https://www.youtube.com/watch?v=2lisQQmWQkY Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 If you didn’t want to spend 3 hours of your life listening to America’s elected representatives embarrassing themselves, here’s my summary of Sundar Pichai’s testimony. Apart from one major thing, Pichai’s hearing was strikingly similar to Zuckerberg’s 10-hour-long damage control marathon. Google was accused of the same wrongdoing – mishandling users privacy, abusing their dominant market position, manipulating search results, censoring conservatives, and of course Russian bots. The only difference was that unlike Zuckerberg, Pichai was under oath. Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Music: Chuki Beats https://www.youtube.com/user/CHUKImusic CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
tck3d_Hg4XQ | 15 Dec 2018
Watch Google CEO Sundar Pichai get grilled by Representative Jordan over alleged election manipulation. This is a highlight of the congressional hearing before the U.S. House of Representatives' Judiciary Committee on Tuesday December 11th 2018. This excerpt was taken from Global News coverage of the Google CEO testimony https://www.youtube.com/watch?v=uM5IHHCEb3k This was probably the only instance during the entire 3 and a half hour long congressional testimony were Google CEO was really pressed on the issue. While Google has a long record of scandals ranging from privacy and data collection, anti-competitive behavior, search engine manipulation, political lobbying, news censorship and anti-trust cases, it was election manipulation that Representative Jordan chose to tackle Sundar Pichai on. Quite successfully, but is that going to mean anything going forward? Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
t3HsqLKpoO4 | 10 Dec 2018
Some people think privacy doesn't matter as long as you have nothing to hide. But online privacy is a form free speech. Despite government efforts, encryption is not a munition and source code is speech protected under the first amendment. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 In the 1990s, the government fiercely attacked online privacy by classifying encryption software as a munition, and regulating it as biological weapons or firearms. Exporting encryption was heavily restricted, required a government license, and made its implementation on the Internet virtually impossible. In 1991 Phil Zimmerman developed his first version of an encryption program called Pretty Good Privacy designed to secure email communications, files or even entire disks. Two years later, Zimmerman was under criminal investigation for exporting munitions without a license and was barred from sharing his software on the Internet. Zimmerman published the whole PGP source code in a hardcover book distributed by MIT Press. In a digital form, PGP was an outlawed piece of software. But printed in a book, it was free speech protected by the Constitution. In 1994, a graduate student at the University of California was developing an encryption algorithm that he intended to publish, distribute and share openly on public lectures and on the Internet. However, the US Department of State classified his cryptographic software under the Arms Export Control Act and the International Traffic in Arms Regulations. After several years of legal battles, the court eventually decided that Bernstein’s source code is protected by the Constitution. The judge ruled that code is speech. Online privacy protects you from censorship. Encryption allows you to express yourself publicly but anonymously. It lets you develop and try ideas before you are comfortable to share them with others. It gives you a space with your own borders where you are free from judgment and control. The first amendment grants you the right to encrypted speech. Sources Legal cases https://www.eff.org/cases/bernstein-v-us-dept-justice https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1180&context=btlj https://www.eff.org/deeplinks/2015/04/remembering-case-established-code-speech https://www.eff.org/deeplinks/2005/07/eff15-phone-call https://www.eff.org/press/archives/2008/04/21-40 https://www.eff.org/press/archives/2008/04/21-29 https://www.eff.org/press/archives/2008/04/21-42 https://www.eff.org/deeplinks/2014/09/nine-epic-failures-regulating-cryptography https://law.stackexchange.com/questions/3696/is-the-right-to-keep-and-bear-crypto-protected-by-the-second-amendment Other https://networkingnerd.net/2016/03/16/thoughts-on-encryption/ http://www.cypherspace.org/rsa/legal.html https://www.millercanfield.com/resources-417.html https://www.gpo.gov/fdsys/pkg/FR-2018-08-30/pdf/2018-18771.pdf#page=1 https://www.ecfr.gov/cgi-bin/text-idx?node=pt22.1.121 https://www.law.cornell.edu/cfr/text/22/121.1 https://www.washingtonpost.com/wp-srv/politics/special/encryption/encryption.htm??noredirect=on https://www.nytimes.com/1996/11/08/business/us-classifies-a-device-to-surf-the-web-as-a-weapon.html https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html https://en.wikipedia.org/wiki/Pretty_Good_Privacy#cite_ref-zimmermann2_16-0 Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
uMZrJAusdFE | 02 Dec 2018
Calls for regulating social media and online platforms as public utilities attract critics both on the left and the right. But would public utility regulation actually help freedom of speech on the Internet? Companies like Google, Facebook, Microsoft and Apple do enjoy very dominant positions and they do abuse their power. Facebook and Twitter have been recently purging hundreds of alternative and independent media with millions of followers from their platforms. Google has been long extremely anti-competitive as it’s been artificially giving its own services higher ranks in the search results than their competition. And they are not wrong. We allowed these corporations to monitor our everyday activities, study our psychologies and develop tools and products that are most responsive to our emotional states. But no matter how big they are, positions of none of these Internet giants are locked in. Their services are not tied to any geographical location. The Internet market is the whole globe. Anyone from anywhere in the world from almost any background can compete with them. If you don’t like centralized corporations offering you centralized services, is it reasonable to expect from a centralized government to bring about any meaningful change? Maybe it's time to stop using these services and switch to alternatives. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Sources Calls for regulations and classifying social media as public utilities https://arstechnica.com/tech-policy/2018/11/newly-elected-republican-senator-could-be-googles-fiercest-critic/ https://arstechnica.com/tech-policy/2017/11/conservative-backlash-a-missouri-republican-is-investigating-google/ https://arstechnica.com/tech-policy/2017/08/google-is-losing-allies-across-the-political-spectrum/ https://www.ago.mo.gov/home/breaking-news/ag-hawley-issues-investigative-demands-to-google-inc- https://techcrunch.com/2018/07/17/facebook-public-utility/ https://www.c-span.org/video/?448566-1/house-judiciary-committee-examines-social-media-filtering-practices https://www.forbes.com/sites/adamthierer/2011/07/24/the-danger-of-making-facebook-linkedin-google-and-twitter-public-utilities/ Lobbying https://www.washingtonpost.com/politics/how-google-is-transforming-power-and-politicsgoogle-once-disdainful-of-lobbying-now-a-master-of-washington-influence/2014/04/12/51648b92-b4d3-11e3-8cb6-284052554d74_story https://www.opensecrets.org/lobby/top.php?indexType=s&showYear=2018 https://qz.com/823922/eric-schmidt-played-a-crucial-role-in-team-hillarys-election-tech/ https://wikileaks.org/podesta-emails/emailid/36828 https://wikileaks.org/podesta-emails/emailid/37262 https://wikileaks.org/podesta-emails/emailid/39107 Censorship problem https://arstechnica.com/tech-policy/2017/08/gab-the-right-wing-twitter-rival-just-got-its-app-banned-by-google/ https://www.theverge.com/2017/8/18/16166240/gab-google-play-removed-hate-speech https://www.washingtonpost.com/technology/2018/08/10/hate-speech-crackdown-spreads-behind-the-scenes-tech/??noredirect=on Music by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
XbSrSLNJ52w | 25 Nov 2018
Apple, Google, Microsoft and Yahoo all reserve the right to read your emails not just through machines, but by their employees too. Contents of your emails are for sale and scrutiny by poorly vetted actors, unless you start using end-to-end encryption and switch to secure email providers like ProtonMail, Tutanota or Posteo. Alternative emails: https://protonmail.com/ https://tutanota.com/ https://posteo.de/en Other encrypted email providers https://www.privacytools.io/ Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf In 2007, the US National Security Agency approached Yahoo with an order to gain direct access to its data centers and record and collect all information passing through in a decrypted form. Seven years later, the US intelligence came to Yahoo with a new request – to scan all of their users emails in real time on the governments behalf. Yahoo now reserves the right to read contents of your emails for any purposes – including research and targeted advertising. Google has been long implementing the policy to read emails of Gmail users. In some cases, Google employees would be allowed to read private emails. Google lets hundreds of third-party developers access inboxes of Gmail users, read their contents, and even share that data with their partners. Apple has started using their customers’ call and email metadata to assign devices “trust scores”, in what they claim to be measures against fraud. Trusting companies with invasive privacy policies isn’t the only option you have. If you don’t want your private conversations to be exposed to advertisers and manipulative marketing campaigns you might disapprove of, the solution lies in end-to-end encrypted email. Sources Yahoo helps the government read your emails https://www.washingtonpost.com/lifestyle/style/yahoo-helps-the-government-read-your-emails-just-following-orders-they-say/2016/10/05/05648894-8b01-11e6-875e-2c1bfe943b66_story.html? https://www.theguardian.com/technology/2016/oct/04/yahoo-secret-email-program-nsa-fbi https://arstechnica.com/tech-policy/2016/10/report-fbi-andor-nsa-ordered-yahoo-to-build-secret-e-mail-search-tool/ https://www.washingtonpost.com/news/the-switch/wp/2016/10/04/yahoo-scanned-all-of-its-users-incoming-emails-on-behalf-of-u-s-intelligence-officials/ https://www.washingtonpost.com/business/technology/us-threatened-massive-fine-to-force-yahoo-to-release-data/2014/09/11/38a7f69e-39e8-11e4-9c9f-ebb47272e40e_story.html? https://www.cnet.com/news/yahoo-aol-oath-privacy-policy-verizon-emails-messages/ How Apple, Yahoo and Google do the same https://www.theguardian.com/technology/2014/mar/21/yahoo-google-and-apple-claim-right-to-read-user-emails Microsoft also reads your emails https://www.theguardian.com/technology/2014/mar/20/former-microsoft-employee-arrested-over-windows-8-leaks Gmail lets third parties to read your email and share it with their partners https://www.theverge.com/2018/7/2/17527972/gmail-app-developers-full-email-access https://www.theverge.com/2017/5/4/15544608/google-docs-spam-phishing-email-hack-secure-account https://www.wsj.com/articles/techs-dirty-secret-the-app-developers-sifting-through-your-gmail-1530544442 https://topglobalnews.org/science-hi-tech/techs-dirty-secret-app-developers-are-sifting-through-your-gmail/ https://www.theguardian.com/technology/2014/apr/15/gmail-scans-all-emails-new-google-terms-clarify https://www.nytimes.com/2017/06/23/technology/gmail-ads.html https://www.wsj.com/articles/google-says-it-continues-to-allow-apps-to-scan-data-from-gmail-accounts-1537459989 http://wcontest.com/2018/09/20/google-says-it-continues-to-allow-apps-to-scan-data-from-gmail-accounts/ Apple 'trust' score based on your emails https://www.businessinsider.in/apple-is-going-to-track-your-calls-and-emails-and-give-your-device-a-trust-score-to-combat-fraud/articleshow/65871773.cms https://nypost.com/2018/09/20/apple-says-its-tracking-your-calls-and-emails-to-prevent-fraud/ https://www.businessinsider.com/apple-to-calculate-trust-scores-to-combat-fraud-2018-9 https://venturebeat.com/2018/09/18/apple-creates-an-itunes-device-trust-score-based-on-your-calls-and-emails/ Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
oja3UzuuqGQ | 18 Nov 2018
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. Most VPN providers will tell you their virtual private network will make you anonymous. But anonymous VPNs don't exist. Should you use a VPN if you expect privacy and anonymity on the web? How to use a VPN if you want to protect your online privacy? Let's find out. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Today I take on the best of the best VPN providers that boast with top-level encryption and security protocols that are meant to give you privacy on the Internet, or even make you anonymous. But is that true? VPNs are supposed to secure your traffic by sending it through an encrypted tunnel and give you a different IP address so that your true IP address is not revealed to the websites and services you are connecting to. Your VPN provider can still see everything your Internet Service Provider can see: all you traffic, logs, devices, browser history… all that prevents your VPN provider from abusing this information against you is their promise. Virtual private networks offer privacy by policy, not privacy by design – that is nothing technologically prevents your VPN from monitoring your traffic and do with that whatever they want – sell it, throttle it, or censor it. No VPN service is anonymous. Most of them require your email address upon sign-up and most payment methods will reveal your identity directly, unless they accept cryptocurrency, which is only pseudonymous, or cash, which can be truly anonymous. But cash is very rarely accepted, and even then, your VPN provider always knows your real IP address. So yes, they change your IP address, by they are also your single point of failure, so if the server or the whole VPN is compromised, all traffic leads directly to your IP address and your devices. Some sources: https://www.theatlantic.com/technology/archive/2011/09/lulzsec-hacker-exposed-service-he-thought-would-hide-him/337545/ https://torrentfreak.com/purevpn-logs-helped-fbi-net-alleged-cyberstalker-171009/ https://torrentfreak.com/proxy-sh-vpn-provider-monitored-traffic-to-catch-hacker-130930/ https://www.bestvpn.com/privacy-news/no-logs-ipvanish-hands-logs-homeland-security/ https://www.theatlantic.com/technology/archive/2011/09/lulzsec-hacker-exposed-service-he-thought-would-hide-him/337545/ https://medium.com/@12504771/virtualshield-cannot-be-trusted-e5d054560699 Credit: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
IKhn20KYnF0 | 11 Nov 2018
Google censorship has been a rising issue over the past years. Accusations about Google censoring news are surfacing more and more. Let's compare Google search results with Bing, Yahoo and DuckDuckGo to find out if we can see instances of Google manipulating search results. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf My methodology To evaluate Google’s search results, I compared them with Bing, Yahoo, DuckDuckGo and Startpage. To get as anonymous results as possible, I used separate Firefox profiles for Google, DuckDuckGo and Bing. I turned off telemetry and Google safe browsing feature, and I set Firefox to never remember browser history. This should get rid of most of Google trackers planted on the device, which could interfere with the results. To pull Yahoo results, I used Vivaldi with similar settings and for Startpage I used Tor Browser. Startpage lists Google results but more privately and without Google’s trackers, and I only use it to double check whether I really get non-personalized Google results. I was not logged in to any account and I didn’t have any other browser open at the time of recording these search experiments. For each search engine, we are going to compare results from the first two pages only, as this is where the vast majority of clicks happen. For each search on Google, I connected from a different IP address in the United States and I restarted Firefox to wipe all browser data. This was done using NordVPN servers, to make sure Google can’t track my real location and personalize my results that way. I also used different US-based IP addresses for Bing, Yahoo and DuckDuckGo, and I restarted the browser for each search on them as well. Music by Chuki Beats https://www.youtube.com/user/CHUKImusic and CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
_393maHbHWc | 03 Nov 2018
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. Why should you become anonymous? And how can you even be anonymous on the web? Watch to learn how to use essential anonymity tools to become anonymous on the web. If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75%! In this online anonymity tutorial, you will learn what it means to be anonymous on the web, how to use essential anonymity tools, and you’ll learn some tips and habits to help you protect your online anonymity even better. You will learn how to use Tor and install and run Tor Browser. You'll discover how to install Whonix and how it can help you become anonymous even more. We'll learn how to install Tails and boot from a live USB. You'll be introduced to Linux, mostly PureOS, Trisquel and Linux Mint Cinnamon. Online anonymity is not something that’s just for criminals or persecuted individuals. It’s important if you don’t want a record of your interests, preferences, searches, emails, messages, contacts, browsing history, and social media activity stored indefinitely on remote data centers. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 All the tools for anonymity on the web: Tor Browser Bundle https://www.torproject.org/ DuckDuckGo onion address https://3g2upl4pq6kufc4m.onion/ Tails https://tails.boum.org/ NoScript Tutorial https://www.youtube.com/watch?v=AC4ALEKZRfg Whonix https://www.whonix.org/ VirtualBox https://www.virtualbox.org/ Orbot, Orfox, and F-Droid https://guardianproject.info/apps/ LineageOS https://lineageos.org/ PureOS https://www.pureos.net Trisquel https://trisquel.info/ Linux Mint https://linuxmint.com/ Qubes OS https://www.qubes-os.org/ Free encrypted cloud storage https://nextcloud.com/ Sources: On online anonymity https://www.whonix.org/wiki/Documentation SPYING https://www.washingtonpost.com/business/technology/google-tracks-consumers-across-products-users-cant-opt-out/2012/01/24/gIQArgJHOQ_story.html?noredirect=on https://www.theguardian.com/technology/2016/oct/21/how-to-disable-google-ad-tracking-gmail-youtube-browser-history https://www.theguardian.com/technology/2015/jun/23/google-eavesdropping-tool-installed-computers-without-permission https://news.softpedia.com/news/microsoft-edge-sends-browsing-history-to-microsoft-how-to-block-it-490684.shtml https://adexchanger.com/data-exchanges/a-marketers-guide-to-cross-device-identity/ https://www.recode.net/2016/6/14/11926124/facebook-ads-track-store-visits-retail-sales https://www.zdnet.com/article/facebook-turns-user-tracking-bug-into-data-mining-feature-for-advertisers/ https://techcrunch.com/2017/03/07/facebook-advanced-measurement/ https://www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking Lobbying https://www.wsj.com/articles/tech-executives-warn-of-overregulation-in-privacy-push-1537987795?mod=pls_whats_news_us_business_f https://www.recode.net/2018/4/22/17267740/facebook-record-lobbying-spending-tech-companies-amazon-apple-google https://theintercept.com/2018/09/28/california-privacy-law-big-tech/ https://www.theregister.co.uk/2011/05/05/google_backs_do_not_track_opposition/ https://arstechnica.com/tech-policy/2017/05/google-and-facebook-lobbyists-try-to-stop-new-online-privacy-protections/ https://www.recode.net/2017/10/21/16512414/apple-amazon-facebook-google-tech-congress-lobbying-2017-russia-sex-trafficking-daca https://news.softpedia.com/news/Facebook-to-Follow-Google-Microsoft-in-Cutting-Ties-with-Conservative-Lobby-Group-ALEC-459747.shtml The Chinese Google search engine https://theintercept.com/2018/09/14/google-china-prototype-links-searches-to-phone-numbers/ Music by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6EfJR1lI0l0 | 26 Oct 2018
So you want to stop Google spying on you. But how do you do that? Learn how you can stop Google from tracking your location, browsing history, search queries and find out more about Google alternatives. Change Google privacy settings, switch from Chrome to Firefox, replace Google apps with alternatives, start using DuckDuckGo, and use uBlock Origin to block Google trackers. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 In this video, we'll go through how to change Google privacy settings as well as privacy settings on your Android device. We install some essential privacy tools like Firefox, uBlock Origin, Cookie Autodelete and DecentralEyes to block Google from tracking our browsing history. We will show what Google alternatives to use to stop Google from spying on you like DuckDuckGo, Qwant, Startpage, Protonmail, Tutanota, Nextcloud, Mega.nz, Cryptomator, Brave Browser, Tor Browser and more. Google tracks your every move on the Internet and in the real world, even if you don’t use Google services. We are going to learn how to stop all of Google spying in its entirety. It is possible to stop Google tracking without disconnecting from the Internet. We’re going to go through Google privacy settings and we will learn how to use some simple tools to block all known Google trackers. uBlock Origin rulesets - JUST COPY PASTE to My Rules in uBlock Origin settings To block all Google trackers * admob.com * block * adsensecustomsearchads.com * block * adwords.com * block * doubleclick.net * block * fonts.googleapis.com * block * google-analytics.com * block * google.com * block * googleadservices.com * block * googleapis.com * block * googlesyndication.com * block * googletagmanager.com * block * googletagservices.com * block * googletraveladservices.com * block * googleusercontent.com * block * gstatic.com * block * urchin.com * block * youtube.com * block * ytimg.com * block To allow youtube.com www.youtube.com content.googleapis.com * noop www.youtube.com ggpht.com * noop www.youtube.com google.com * noop www.youtube.com googleusercontent.com * noop www.youtube.com googlevideo.com * noop www.youtube.com gstatic.com * noop www.youtube.com plus.googleapis.com * noop www.youtube.com youtube-nocookie.com * noop www.youtube.com ytimg.com * noop Music: Chuki Beats https://www.youtube.com/user/CHUKImusic and Co.Ag Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Qt5NOxdYMjc | 20 Oct 2018
Censorship on Facebook has no limits. The social media giant purged 800 independent groups, mostly anti-establishment and anti-authoritarian left and right wing groups. What is the solution to the Facebook censorship problem? Both right and left wing groups Facebook blocked had huge followings. On the left, Reasonable People Unite had 2.25 million followers before the shutdown, Trump-supporting Nation in Distress amassed more than 3 million followers, left-wing Reverb Press had 816,000 followers, Right Wing News accumulated 3.2 million, and Punk Rock Libertarians had 190,000 followers before the take down. Another bizarre case is Russia Today America’s correspondent Rachel Blevins, who had 70,000 fans disappear with her page with no explanation why. Many of the deleted pages were spreading conspiracy theories but they were also openly against drug war, foreign interventions, power abuse, and corruption. Some Facebook groups also got their Twitter pages deleted. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Sources: News coverage https://www.theguardian.com/technology/2018/oct/11/facebook-purge-page-removal-spam https://www.rt.com/usa/441144-facebook-rt-america-correspondent/ https://www.rt.com/usa/441140-facebook-purge-victims-speak/ https://www.rt.com/usa/441040-facebook-deplatforms-political-pages/ https://www.rt.com/usa/438504-facebook-thinkprogress-censored-articles/ https://www.msn.com/en-gb/finance/technology/facebooks-spam-purge-is-silencing-genuine-debate-political-page-creators-say/ar-BBOrM9S https://mashable.com/article/facebook-removes-accounts-spreading-fake-news-in-us.amp/? https://www.nytimes.com/2018/10/11/technology/fake-news-online-disinformation.html https://www.theblaze.com/news/2018/10/12/facebook-shuts-down-hundreds-of-accounts-ahead-of-midterms-political-groups-cry-foul/amp https://www.washingtonpost.com/technology/2018/10/11/facebook-purged-over-accounts-pages-pushing-political-messages-profit/? https://www.zdnet.com/google-amp/article/facebook-removes-800-accounts-and-pages-for-political-spam-disinformation/ https://mashable.com/article/facebook-cracks-down-voter-suppression.amp/? https://venturebeat.com/2018/10/11/facebook-removes-more-than-800-pages-and-accounts-for-political-spamming/amp/ https://heavy.com/news/2018/10/facebook-purge-list-deleted-accounts/ Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA/featured 'Free' by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
SrsCEbi5N7Y | 13 Oct 2018
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. Ultimate comparison between DuckDuckGo and Google is here listing all the reasons why you should switch from Google Search to DuckDuckGo. This is *NOT* and a paid promotion. I just wanted to turn off as many people as possible from Google. Switch to DuckDuckGo https://duckduckgo.com/ Also install DuckDuckGo on your phone and web browser too! Because search engines are second gate-keepers to the internet, it's absolutely crucial to choose the one that will respect your privacy and provide uncensored and unfiltered search results. Google's search neutrality has been compromised. Google notoriously develops more and more of its own tools that it then puts in front of organic search results. DuckDuckGo's business model is the greatest advantage over Google Search. DuckDuckGo doesn’t have a filter bubble. Its search results are derived from over 400 sources, that include big search engines like Bing or Yahoo, but also DuckDuckGo’s own web crawlers. Its organic results aren’t intervened by personalized filters, because DuckDuckGo doesn’t maintain a personal profile on you like Google does. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Sources: Weingerg vs Google https://www.cnet.com/news/google-owns-duck-com-but-itll-give-rival-duckduckgo-a-shoutout-anyhow/ https://www.cnet.com/news/today-i-learned-duck-com-redirects-to-google-much-to-duckduckgos-annoyance/ https://twitter.com/DuckDuckGo/status/1019565939317202944 https://www.huffingtonpost.com/2012/11/22/duckduckgo-google_n_2174286.html https://thenextweb.com/insider/2012/01/30/we-bet-you-dont-know-who-owns-duck-com-and-what-it-redirects-to/ Bias https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10 https://www.scribd.com/doc/233260174/techcrunch-confidential-yelp-user-behavior-study-on-google-results https://techcrunch.com/2014/07/09/yelp-google-anti-trust/ http://www.benedelman.org/hardcoding/ https://www.theguardian.com/technology/2016/dec/16/google-autocomplete-rightwing-bias-algorithm-political-propaganda https://www.nytimes.com/2018/08/30/technology/bias-google-trump.html https://techaeris.com/2016/06/10/google-manipulating-results-favor-hillary-clinton/ Privacy https://theintercept.com/2018/09/13/google-china-search-engine-employee-resigns/ https://www.nytimes.com/2018/05/30/technology/google-project-maven-pentagon.html Google reads your Gmail https://www.theguardian.com/technology/2014/apr/15/gmail-scans-all-emails-new-google-terms-clarify https://www.wsj.com/articles/google-to-stop-reading-users-emails-to-target-ads-1498247136?mod=article_inline https://www.nytimes.com/2017/06/23/technology/gmail-ads.html http://wcontest.com/2018/09/20/google-says-it-continues-to-allow-apps-to-scan-data-from-gmail-accounts/ Location tracking https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/ In retail https://techcrunch.com/2018/08/31/google-and-mastercard-reportedly-partner-to-track-offline-purchases/ http://www.slate.com/blogs/future_tense/2017/08/01/google_tracks_people_offline_to_see_if_online_ads_work.html https://www.washingtonpost.com/news/the-switch/wp/2017/05/23/google-now-knows-when-you-are-at-a-cash-register-and-how-much-you-are-spending/?utm_term=.d26ce8fc4f40 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA/featured
dTF8_DwDjW4 | 06 Oct 2018
Google is spying on everything you. Literally everything. If you are not protecting yourself, Google is after your personal life whether you like it or it. Google spies on you and it's not just a conspiracy theory anymore. Google’s presence is literally everywhere and it wants to play god without permission. Google’s surveillance has no limits. They track literally everything you do and everywhere you go. And not just on the Internet, but even in real life. This how Google manages to follow your every step. Google servers are tapped by intelligence agencies in the US and other Five eyes countries, which include UK, Canada, Australia and New Zealand. The US National Security Agency then keeps a copy of your search history tied back to your phone number forever in their data centres. Google really wants to know where you go. So much so that it keeps tracking your location even if you tell it not to. Google achieved dominance in digital advertising thanks to their focus, commitment and sheer will. The will to know about every single step you make. Google is able to attract advertisers thanks to their ability to profile records of your entire activity on the web. But this time, the corporate behemoth is able to track what you buy even in physical stores. Google spying has no limits. The laws are ancient and broken because Google lobbies millions of dollars every year to keep privacy regulations at check. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Sources: Google in China https://www.theguardian.com/technology/2018/sep/18/google-china-dragonfly-search-engine https://theintercept.com/2018/08/01/google-china-search-engine-censorship/ https://www.buzzfeednews.com/article/carolineodonovan/google-project-dragonfly-employees-quitting https://theintercept.com/2018/09/13/google-china-search-engine-employee-resigns/ https://www.nytimes.com/2018/08/16/technology/google-employees-protest-search-censored-china.html Pentagon https://www.nytimes.com/2018/05/30/technology/google-project-maven-pentagon.html https://www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.html https://dod.defense.gov/News/Article/Article/1254719/project-maven-to-deploy-computer-algorithms-to-war-zone-by-years-end/ Gmail scanning and reading https://www.theguardian.com/technology/2014/apr/15/gmail-scans-all-emails-new-google-terms-clarify https://www.wsj.com/articles/google-to-stop-reading-users-emails-to-target-ads-1498247136?mod=article_inline https://www.nytimes.com/2017/06/23/technology/gmail-ads.html https://www.esquire.com/uk/latest-news/a23354205/when-google-said-it-wasnt-scanning-your-gmail-it-actually-meant-it-was-definitely-scanning-your-gmail/ https://www.wsj.com/articles/google-says-it-continues-to-allow-apps-to-scan-data-from-gmail-accounts-1537459989 http://wcontest.com/2018/09/20/google-says-it-continues-to-allow-apps-to-scan-data-from-gmail-accounts/ https://www.wsj.com/articles/techs-dirty-secret-the-app-developers-sifting-through-your-gmail-1530544442 https://www.foxnews.com/tech/techs-dirty-secret-app-developers-are-sifting-through-your-gmail Google location tracking https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data https://www.theverge.com/2017/11/21/16684818/google-location-tracking-cell-tower-data-android-os-firebase-privacy https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/ https://apnews.com/828aefab64d4411bac257a07c1af0ecb https://www.reuters.com/article/us-alphabet-google-privacy-lawsuit/lawsuit-says-google-tracks-phone-users-regardless-of-privacy-settings-idUSKCN1L51M3 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne #dontbeevil #googlespying #creepyline
vEDGJWocYd8 | 01 Oct 2018
It's not a matter of opinion anymore. You should delete your Facebook account now and stop using Facebook altogether. There is every bit of evidence that Facebook is not a benevolent corporation. Their unreasonable pursuit of control and invasive policies have plagued our social lives on the Internet. It's time to stop using Facebook. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Sources: Facebook data breach and censorship https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html https://newsroom.fb.com/news/2018/09/security-update/ Intrusive Facebook Policy https://bits.blogs.nytimes.com/2007/11/29/the-evolution-of-facebooks-beacon/ https://www.computerworld.com/article/2540320/data-privacy/facebook-s-beacon-more-intrusive-than-earlier-thought--ca-says.html https://usatoday30.usatoday.com/tech/hotsites/2009-09-21-facebook-beacon_N.htm https://en.wikipedia.org/wiki/Criticism_of_Facebook#cite_ref-informer_68-0 https://theoutline.com/post/5380/targeted-ad-creepy-surveillance-facebook-instagram-google-listening-not-alone?zd=1&zi=ucbo5ff2 https://www.propublica.org/article/facebook-enabled-advertisers-to-reach-jew-haters https://techcrunch.com/2018/09/27/yes-facebook-is-using-your-2fa-phone-number-to-target-you-with-ads/ https://www.propublica.org/article/facebook-enabled-advertisers-to-reach-jew-haters https://www.propublica.org/article/facebook-lets-advertisers-exclude-users-by-race https://www.nytimes.com/2013/03/26/technology/facebook-expands-targeted-advertising-through-outside-data-sources.html?pagewanted=all&_r=0 https://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/ http://www.slate.com/articles/technology/technology/2013/03/facebook_advertisement_studies_their_ads_are_more_like_tv_ads_than_google.single.html? https://www.wsj.com/articles/SB10001424052702304772804575558484075236968 https://venturebeat.com/2010/10/17/wsj-reports-facebook-apps-including-banned-lolapps-games-transmitted-private-user-data/ Lies https://techcrunch.com/2016/08/25/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out/ https://www.marketingweek.com/2014/02/20/whatsapp-promises-no-ads-no-games-no-gimmicks-after-19bn-facebook-acquisition/ https://www.marketingdive.com/news/whatsapp-may-go-back-on-its-promise-of-no-ads/234979/ https://www.wsj.com/articles/behind-the-messy-expensive-split-between-facebook-and-whatsapps-founders-1528208641 https://lifehacker.com/5994380/how-facebook-uses-your-data-to-target-ads-even-offline https://www.propublica.org/article/facebook-doesnt-tell-users-everything-it-really-knows-about-them https://gizmodo.com/facebook-is-giving-advertisers-access-to-your-shadow-co-1828476051 https://www.wsj.com/articles/SB10001424052702304772804575558484075236968 https://www.cnet.com/news/facebook-facial-recognition-prompts-eu-privacy-probe/ Social Experiments https://www.nature.com/articles/nature11421 https://www.theguardian.com/technology/2014/jun/29/facebook-users-emotions-news-feeds https://money.cnn.com/2014/07/02/technology/social/facebook-apology/index.html?iid=TL_Popular https://medium.com/@JamesGrimmelmann/illegal-unethical-and-mood-altering-8b93af772688 https://medium.com/@filip_struharik/biggest-drop-in-organic-reach-weve-ever-seen-b2239323413 Apologies https://techcrunch.com/2014/10/01/facebook-apologizes-to-lgbt-community-and-promises-changes-to-real-name-policy/ https://www.businessinsider.com/facebook-apologizes-for-real-name-policy-2014-10?IR=T https://www.theguardian.com/technology/2012/jul/06/facebook-apologises-free-speech-syria https://www.cbsnews.com/news/facebooks-trending-fail-news-section-reportedly-highlights-fake-news-on-megyn-kelly/ https://thehill.com/policy/technology/395583-facebook-apologizes-for-labeling-part-of-declaration-of-independence-as https://thehill.com/policy/technology/382029-facebook-apologizes-after-ngos-in-myanmar-criticize-zuckerberg https://www.cbc.ca/news/technology/facebook-zuckerberg-congress-election-1.4612495 https://www.theverge.com/2018/3/25/17161398/facebook-mark-zuckerberg-apology-cambridge-analytica-full-page-newspapers-ads https://www.marketwatch.com/story/facebook-apologizes-for-breach-of-trust-in-newspaper-ads-2018-03-25 https://www.bbc.com/news/technology-45247302 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne Music by Chuki Beats https://www.youtube.com/user/CHUKImusic
AC4ALEKZRfg | 27 Sep 2018
To protect your online privacy and security, one of the best tools to achieve that is NoScript Security Suite. In this NoScript tutorial, we are going to look at what NoScript can do and how we can use it to boost our privacy online and Internet security overall. If you want to support my channel and protect your online privacy, sign up for NordVPN https://nordvpn.com/ and use coupon code thehatedone and save 66%! Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 One of the most effective tools for security on the web is NoScript extension for Firefox. NoScript was built to block execution of Javascript by your web browser in order to prevent infiltration by malware, trackers and annoying ads. Javascript, unfortunately, is still most frequent code used by web developers to deliver content and run websites. So if you want to experience the web fully, you’ll need to know how to operate NoScript to get the most out of it. The trade-offs are absolutely worth it. For little inconvenience, you get a tremendous amount of security. NoScript will act as a local firewall for your web browser, blocking malicious attacks before they get a chance to get inside your system. Music by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
GqjNvtX_Xbw | 25 Sep 2018
The new EU copyright law is going to have drastic affects on the freedom and openness of the Internet. Beyond banning memes, Article 13 of the European Copyright Directive 2018 will result in automated surveillance and centralized control of the Internet. The directive makes online platforms liable for the content generated by their users. That means that on top of punitive and vaguely worded terms of services, Internet gate-keepers like Facebook, Google, or Twitter will be required by law to proactively monitor and censor content. These online platforms will be required by law to create automated mechanisms to filter infringing content. Such technology would essentially turn into “upload filters”. These automated filters won’t be recognizing between infringing and legitimate content, like parodies, satire, commentary or other instances of fair use. To balance the flaws of automated upload filters, the directive also requires platforms to build staffed systems for filing complaints for illegitimate takedowns. I make these videos because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Credits: Music 'A System of Numbers' by CO.AG music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Sources: Text of the EU Copyright Directive https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52016PC0593 EFF on the EU Directive https://www.eff.org/deeplinks/2018/09/today-europe-lost-internet-now-we-fight-back https://www.eff.org/deeplinks/2018/09/fake-compromises-real-threats-next-weeks-eu-copyright-vote https://www.eff.org/deeplinks/2018/09/new-copyright-powers-new-terrorist-content-regulations-grim-day-digital-rights https://www.eff.org/files/2018/06/13/article13letter.pdf News Coverage https://www.theverge.com/2018/9/12/17849868/eu-internet-copyright-reform-article-11-13-approved http://www.europarl.europa.eu/news/en/press-room/20180906IPR12103/parliament-adopts-its-position-on-digital-copyright-rules https://www.theverge.com/2018/6/19/17480344/eu-european-union-parliament-copyright-article-13-upload-filter https://www.theverge.com/2018/6/20/17482554/eu-european-union-copyright-filter-article-11-13-passes-juri-vote https://arstechnica.com/tech-policy/2015/07/new-study-shows-spains-google-tax-has-been-a-disaster-for-publishers/ https://www.politico.eu/article/plan-to-make-google-pay-for-news-hits-rocks-copyright-reform-european-commission/ https://www.politico.eu/interactive/copyright-reform-power-matrix-gunther-oettinger-european-commission-eu-policy/ https://www.theguardian.com/technology/2018/jun/20/eu-votes-for-copyright-law-that-would-make-internet-a-tool-for-control https://www.theguardian.com/technology/2018/jun/20/music-industry-wins-key-vote-in-youtube-copyright-battle https://www.theguardian.com/business/2017/apr/15/music-industry-youtube-video-streaming-royalties https://www.bloomberg.com/news/articles/2018-09-20/silicon-valley-and-publishers-fight-on-after-eu-copyright-vote https://www.billboard.com/articles/business/8474706/eu-copyright-vote-music-sector-final-lobbying-push https://qz.com/1387581/article-11-the-eus-copyright-law-could-give-publishers-power-over-google-and-facebook/ https://qz.com/1389385/article-11-and-article-13-axel-voss-is-surprised-by-eu-copyright-law/ Opposition https://juliareda.eu/eu-copyright-reform/censorship-machines/ https://juliareda.eu/2017/03/study-article13-upload-surveillance/ https://juliareda.eu/wp-content/uploads/2017/03/angelopoulos_platforms_copyright_study.pdf https://drive.google.com/file/d/0B7NZMlL3kj5qQzN0RXd2Z0JaR1JmemxhNDd2VmgzSjhFQXdj/view https://juliareda.eu/eu-copyright-reform/extra-copyright-for-news-sites/ https://juliareda.eu/2017/04/copyright-reform-kills-eu-startups/ https://www.youtube.com/watch?v=z6EMOTLwYLM https://europeancopyrightsocietydotorg.files.wordpress.com/2015/12/ecs-opinion-on-eu-copyright-reform-def.pdf http://www.locusmag.com/Features/2008/11/cory-doctorow-why-i-copyfight.html Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
mDVBDOaPGtE | 18 Sep 2018
In the latest interview on Joe Rogan Experience, Elon Musk expressed his lack of concern for privacy. Musk even suggested that most average people don't need care about their privacy and that national security agencies don't care about what is going on in the lives of average people. I dispute these claims with a history of abuse of mass surveillance power by the National Security Agency. Joe Rogan Experience is a YouTube podcast show hosted by comedian Joe Rogan. His recent guest, Elon Musk, entrepreneur and CEO of Tesla and SpaceX, was invited for an almost three-hour-long interview. They debate issues like life being a simulation, dangers of artificial intelligence, and of course, privacy. It's quite remarkable that Elon Musk so openly shares his fears of artificial intelligence yet he doesn’t seem to be concerned about what information this dangerous AI knows about him. It’s pretty clear that the more it knows the more powerful advantage over humans it gets. Which logically explains why Musk also fears Google. Entrepreneurs like Elon himself might have never become successful without their private realms where they could develop without the fear of prying eyes. There are places in the world where people are persecuted for things that should never be considered a crime in the first place. And privacy is the only thing these people have to protect their own lives. The argument isn’t ‘you have nothing to hide, you have nothing to fear’, but rather - ‘you have nothing to hide, therefore they have no reason to look’. Whatever happens with your privacy should be based on your clear consent, which corporations and governments today don’t bother to ask for when they follow your every step you make in digital and physical world. And that’s why you should care about your privacy. I make these videos because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Credits: Music 'A System of Numbers' by CO.AG music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA 'Running' by Chuki Beats https://www.youtube.com/user/chukimusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
YFwTabn9_S0 | 13 Aug 2018
The Hacker Crackdown - an 18-month long collaborative effort of the United States Secret Service and broken-up AT&T to take control of the Internet in the early 1990s. They stroke right at the heart of what makes the Internet such a powerful tool - the hacker culture. Hackers were people who believed access to the Internet and computer technology should be as free and open as possible. They believed cyberspace was a not place for governments to censor and monitor. It was not a place for corporations to control and manipulate. For hackers, cyberspace was a new frontier that would free the mind and open endless opportunities. The Hacker Crackdown was the United States government ideological dirty war to take control of the digital realm. This is a story of people, for whom cyberspace was a war zone. Government surveillance. Corporate censorship. Media manipulation. This is the reality of the Internet today. Bit by bit, multi-billion-dollar corporations are taking control of what we can do, see, and say on the cyberspace. We can’t make comments on social media, chat with people, or browse the web, without the government somewhere taking a copy in a rogue database dully paid for by us. It’s almost as if there was a waging war for this huge digital space that was once dreamed of as setting people free. A frontier where everybody could unleash their potential. A true equality of opportunities. And it seems governments and big corporations hate this empowerment of the little ones. They despise it so much they work hand-in-hand to attack with full force in order to deny us any expansion of Constitutional rights into the digital realm. And it all started at the dawn of the commercial Internet with a drastic crackdown on their most feared opposition: hackers. The Hacker Crackdown of 1990 set a precedent for much of what is happening today. I make these videos because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf SOURCES The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling https://www.goodreads.com/reader/2212-the-hacker-crackdown?percent=1.4984 In case the link above doesn't work http://www.worldcolleges.info/sites/default/files/sterling-bruce-1954_the-hacker-crackdown-law-and-disorder-on-the-electronic-frontier_0.pdf In another case the links above don't work, here is a podcast of the book https://boingboing.net/2008/01/13/podcast-of-bruce-ste.html Another link http://www.mit.edu/hacker/chronology.html http://www.mit.edu/hacker/part1.html https://en.wikipedia.org/wiki/The_Hacker_Crackdown Steve Jackson Games v. The United States Secret Service https://scholar.google.com/scholar_case?case=15578406156657124091 https://scholar.google.com/scholar_case?case=3765716184001998475 http://www.sjgames.com/SS/topten.html http://www.sjgames.com/ourgames/ https://www.athosgroup.com/about-us/meet-the-team/tim-foley/ https://en.wikipedia.org/wiki/Steve_Jackson_Games,_Inc._v._United_States_Secret_Service http://www.sjgames.com/SS/ Hacker Documents https://www.eff.org/cyberspace-independence http://www.phrack.org/archives/issues/7/3.txt http://phrack.org/issues/32/1.html http://www.phrack.org/issues/1/1.html http://www.sjgames.com/SS/crimpuzz.html https://encyclopediadramatica.rs/Fry_Guy https://en.wikipedia.org/wiki/Loyd_Blankenship https://en.wikipedia.org/wiki/Erik_Bloodaxe_(hacker) https://en.wikipedia.org/wiki/Mark_Abene https://web.archive.org/web/20080203234704/http://www.totse.com/en/law/justice_for_all/cn_trial.html https://epic.org/crypto/legislation/freeh_797.html News coverage https://www.nytimes.com/1990/09/09/business/the-executive-computer-can-invaders-be-stopped-but-civil-liberties-upheld.html https://www.nytimes.com/1991/04/21/magazine/in-defense-of-hackers.html https://www.phworld.org/history/attcrash.htm https://users.csc.calpoly.edu/~jdalbey/SWE/Papers/att_collapse https://www.nytimes.com/1998/04/15/business/at-t-data-network-fails-and-commerce-takes-a-hit.html Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Credits Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA/featured The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
HfvG56U0gYA | 06 May 2018
Mark Zuckerberg volunteered to come before Congress to clear his name and repair Facebook's reputation. During his testimony, Zuckerberg exhibited some of the most classic examples of marketing manipulation. This analysis of Zuckerberg's Congressional hearings shows how Mark Zuckerberg manipulates everyone through the power of best marketing techniques. This video analyzes Zuckerberg's speaking and discussion methods from both of the Congressional hearings of Mark Zuckerberg over the data scandal with the Cambridge Analytica. Facebook is accused of mishandling the data of 87 million users, an incident about which Facebook hadn't notify its users for 2 years. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Sources: The Senate hearing https://www.youtube.com/watch?v=u-FlWZ1BOcA The House hearing https://www.youtube.com/watch?v=QmA3TsQ_ULo Atlas Advertising platform http://adage.com/article/digitalnext/facebook-s-atlas-means-brands-agencies/295293/ http://www.businessinsider.com/facebooks-atlas-ad-server-in-digital-2015-4 https://techcrunch.com/2014/09/28/facebook-atlas-relaunch/ Audience Network http://www.businessinsider.com/what-is-facebook-audience-network-and-why-does-it-matter-2016-2 Some general stuff bout marketing techniques, if you want to get deeper into it: https://www.inc.com/steve-tobak/how-to-sell-anything-to-anybody.html https://www.wikihow.com/Sell-a-Product https://www.inc.com/joel-comm/sell-me-this-pen-the-one-trick-that-beats-the-toughest-interview-question.html https://www.monster.com/career-advice/article/how-answer-job-interview-question-sell-me-this-pencil https://techcrunch.com/2014/08/20/startup-marketing-how-emotion-drives-customer-action/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Credits: Music by Chris Zabrieskie http://chriszabriskie.com/licensing/ and beats by Chuki Beats https://www.youtube.com/user/CHUKImusic and Jorge Mendez "Cold" The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ePmEZBVv41o | 19 Apr 2018
U.S. House of Representative from New York Chris Collins used to his 4 minutes quorum to blow Mark Zuckerberg, the CEO of Facebook. Collins reassured Zuckerberg that he loves more than he loves wife Mary and his three children. The excerpt was taken from the United States House of Representative hearing of Mark Zuckerberg over the data scandal with the Cambridge Analytica. Facebook is accused of mishandling the data of 87 million users, an incident about which Facebook hadn't notify its users for 2 years. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Source: Facebook CEO Mark Zuckerberg testifies before Congress on data scandal - YouTube https://www.youtube.com/watch?v=u-FlWZ1BOcA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Christopher Carl Collins (born May 20, 1950) is an American politician and member of the Republican Party who has been the United States Representative for New York's 27th congressional district since 2013. Previously he was the county executive of Erie County, New York from 2007 to 2011. He is a resident of Clarence, New York. https://en.wikipedia.org/wiki/Chris_Collins_(American_politician) The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
MYJghO0qjy4 | 17 Apr 2018
Lindsey Graham grills Mark Zuckerberg over Facebook's monopoly position. Together with other U.S. senators, the CEO of Facebook is challenged whether and how the US Government should approach such a tech behemoth. The excerpt was taken from the United States Senate hearing of Mark Zuckerberg over the data scandal with the Cambridge Analytica. Facebook is accused of mishandling the data of 87 million users, an incident about which Facebook hadn't notify its users for 2 years. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Source: Facebook CEO Mark Zuckerberg testifies before Congress on data scandal - YouTube https://www.youtube.com/watch?v=u-FlWZ1BOcA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
f01sClsPdAQ | 16 Apr 2018
The United States Chair of the Senate Commerce, Science, and Transportation Committee, John Thune grills Facebook CEO Mark Zuckerberg over Facebook's want to police the world and develop artificial intelligence tools to censor hate speech. Chair Thune challenges Mark Zuckerberg about transparency of Facebook's Terms of Service. Zuckerberg responds with the ambition to develop AI "to take a proactive view in policing the ecosystem". The excerpt was taken from the United States Senate hearing of Mark Zuckerberg over the data scandal with the Cambridge Analytica. Facebook is accused of mishandling the data of 87 million users, an incident about which Facebook hadn't notify its users for 2 years. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Source: Facebook CEO Mark Zuckerberg testifies before Congress on data scandal - YouTube https://www.youtube.com/watch?v=u-FlWZ1BOcA John Randolph Thune is an American politician serving as the senior United States Senator from South Dakota, a seat he has held since 2005. A member of the Republican Party, he previously served as the U.S. Representative for South Dakota's at-large congressional district from 1997 to 2003. He became South Dakota's senior U.S. Senator with the retirement of Tim Johnson in 2015. He served as the GOP's Chief Deputy Whip in 2006, chairman of the Republican Policy Committee in June 2009, and Republican Conference Chairman in 2011, the third-ranking position in the Senate. He has worked in politics and civic organizations since completing his MBA graduate degree. He is also the current dean of South Dakota's congressional delegation. https://en.wikipedia.org/wiki/John_Thune Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
74HTHA_7KJE | 15 Apr 2018
United States Senator from Nebraska Benjamin Sasse grills Facebook CEO Mark Zuckerberg over Facebook's decision to censor hate speech and illegal speech on the platform. Senator Sasses asks Zuckerberg: "Can you define hate speech?" Mark Zuckerberg has committed multiple times in the past that he's determined to police the speech and content on the platform, claiming Facebook is responsible for the content generated by its users. The excerpt was taken from the United States Senate hearing of Mark Zuckerberg over the data scandal with the Cambridge Analytica. Facebook is accused of mishandling the data of 87 million users, an incident about which Facebook hadn't notify its users for 2 years. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Source: Facebook CEO Mark Zuckerberg testifies before Congress on data scandal - YouTube https://www.youtube.com/watch?v=u-FlWZ1BOcA Benjamin Eric Sasse is an American politician of the Republican Party serving as the junior United States Senator from Nebraska since 2015. Sasse earned a doctorate in American History from Yale University. He taught at the University of Texas and served as an assistant secretary in the U.S. Department of Health and Human Services. In 2010, he was named president of Midland University in Fremont, Nebraska. In 2014, he was elected to the U.S Senate, defeating Democratic Party candidate David Domina by a margin of 65% to 31%. https://en.wikipedia.org/wiki/Ben_Sasse Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
o40BqdIrKKk | 15 Apr 2018
United States Senator from Connecticut Richard Blumenthal grills Facebook CEO Mark Zuckerberg over untrue claims that Facebook was deceived by Dr. Kogan who obtained user data and handed them over to Cambridge Analytica. The excerpt was taken from the United States Senate hearing of Mark Zuckerberg over the data scandal with the Cambridge Analytica. Facebook is accused of mishandling the data of 87 million users, an incident about which Facebook hadn't notify its users for 2 years. Mark Zuckergberg consistently blamed Dr. Aleksandr Kogan, a Cambridge University academic, who had built the "thisisyourdigitallife" app and paid 270,000 users to download it and take part in personality tests. In 2014, Facebook policy allowed app developers access data not of their users, but of their friends as well. After Zuckerberg found out Kogan handed the data to Cambridge Analytica in 2014, he requested that they delete all user data but never enforced it or conducted manual audits of Cambridge Analytica. Alexander Nix lied to Facebook about the deletion and his company kept the data throughout the US presidential election. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Source: Facebook CEO Mark Zuckerberg testifies before Congress on data scandal - YouTube https://www.youtube.com/watch?v=u-FlWZ1BOcA Richard Blumenthal is an American attorney and politician who has served as a United States Senator from Connecticut since 2011. He has been the state's senior senator since 2013 and is ranked as the second wealthiest member of the Senate. Previously, he served as Attorney General of Connecticut from 1991 to 2011. He is a member of the Democratic Party. https://en.wikipedia.org/wiki/Richard_Blumenthal Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
gaE2JpB55YE | 12 Apr 2018
Without exaggerating, signing the Omnibus bill with the CLOUD Act included is the worst thing Trump has done to America during his presidency. CLOUD Act enables the US government to obtain private user data without a warrant or a probable cause. This bill rewrites all the democratic principles of criminal justice system. You are now an enemy of the state. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf The Clarifying Lawful Overseas Use of Data Act is a bill that enables the US government or any other foreign government the United States has surveillance partnerships with to obtain private user data without a warrant or a probable cause. The US or foreign law enforcement would obtain the user data directly from private companies, without notifying the individual, or the law enforcement of said country. Prior to the CLOUD Act, if US persons had their data held in overseas data centers of an American company, like Facebook, Apple, or Microsoft, companies could have defended against complying with such data requests by citing overseas protections in a foreign jurisdiction. CLOUD Act changes everything. It strips away American companies of any protection from unwarranted data requests. Under the CLOUD Act the US government doesn’t have to go to court or ask the foreign government to compel a data disclosure. They go directly to the US company and CLOUD Act legally obliges them to comply. Sources: The CLOUD Act text https://www.congress.gov/115/bills/hr4943/BILLS-115hr4943ih.pdf FISA amendments https://intelligence.house.gov/uploadedfiles/s_139_text_as_amended.pdf https://intelligence.house.gov/uploadedfiles/fisa_amendments_reauthorization_act_of_2017_bill_text.pdf Brief analyses https://www.natlawreview.com/article/cloud-act-now-law https://www.eff.org/deeplinks/2018/03/responsibility-deflected-cloud-act-passes https://www.eff.org/deeplinks/2018/02/cloud-act-dangerous-expansion-police-snooping-cross-border-data https://searchsecurity.techtarget.com/news/252437526/CLOUD-Act-stirs-tension-between-privacy-advocates-and-big-tech News & blogs https://edition.cnn.com/2018/03/22/politics/house-vote-spending-bill-omnibus-shutdown/index.html https://www.zdnet.com/google-amp/article/microsoft-responds-to-new-warrant-for-emails-in-irish-datacenter-case/ https://blogs.microsoft.com/on-the-issues/2018/03/21/microsoft-statement-on-the-inclusion-of-the-cloud-act-in-the-omnibus-funding-bill/ https://www.theguardian.com/technology/2015/sep/09/microsoft-court-case-hotmail-ireland-search-warrant https://blogs.microsoft.com/on-the-issues/2015/02/27/bipartisan-bicameral-leads-act-essential-to-the-future-of-digital-privacy/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Credits Music by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6osaDvBISdQ | 06 Apr 2018
A hybrid of Fight Online Sex Trafficking Act and Stop Enabling Sex Trafficking Act (SESTA / FOSTA) have made through both chambers of Congress. The SESTA/FOSTA is a censorship bill that will ban a lot of online content and do nothing to help victims of human trafficking. SESTA/FOSTA is an amendment of section 230 of the Communications Act of 1934 that was supposed to protect online platforms for being held accountable for the content posted by their users. So now SESTA/FOSTA will hold website operators liable for content posted by users of their platforms. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Sources: Bills https://www.congress.gov/115/bills/hr1865/BILLS-115hr1865enr.pdf https://www.congress.gov/bill/115th-congress/house-bill/1865/text DoJ http://docs.techfreedom.org/DOJ_FOSTA_Letter.pdf Coverage https://www.theverge.com/2017/9/14/16308066/sex-trafficking-bill-sesta-google-cda-230 https://motherboard.vice.com/en_us/article/3kjnwn/fosta-sesta-vote-passed-senate https://www.eff.org/deeplinks/2018/02/house-vote-fosta-win-censorship https://cdt.org/blog/goodlattes-online-trafficking-bill-makes-key-improvements-but-risks-to-free-speech-persist/ https://cdt.org/blog/its-all-downsides-hybrid-fosta-sesta-hinders-law-enforcement-hurts-victims-and-speakers/ https://www.washingtonpost.com/news/true-crime/wp/2018/02/27/house-passes-anti-online-sex-trafficking-bill-allows-targeting-of-websites-like-backpage-com/ https://www.engadget.com/2018/02/27/house-passes-fosta/ https://cdt.org/blog/its-all-downsides-hybrid-fosta-sesta-hinders-law-enforcement-hurts-victims-and-speakers/ Further reading https://www.reddit.com/r/announcements/comments/863xcj/new_addition_to_sitewide_rules_regarding_the_use/?st=jfn3gm8u&sh=64ad683a# https://injusticetoday.com/proposed-federal-trafficking-legislation-has-surprising-opponents-advocates-who-work-with-bf418c73d5b4 https://www.thecut.com/2018/03/sesta-anti-sex-trafficking-bill-fosta.html https://www.theverge.com/2018/3/21/17147688/senate-sesta-fosta-vote-anti-sex-trafficking https://www.eff.org/deeplinks/2017/12/amended-version-fosta-would-still-silence-legitimate-speech-online https://www.eff.org/deeplinks/2017/12/internet-censorship-bills-wouldnt-help-catch-sex-traffickers https://www.eff.org/deeplinks/2018/02/fosta-would-be-disaster-online-communities https://www.nytimes.com/2012/07/04/business/in-rethinking-the-war-on-drugs-start-with-the-numbers.html https://www.state.gov/documents/organization/187109.pdf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Credits Music by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
2lisQQmWQkY | 31 Mar 2018
uBlock Origin has very confusing user interface in the advanced user mode if you haven't read the lengthy documentation. This video tutorial explains how to use uBlock Origin in advanced user mode and all the advanced settings to protect your online privacy. With this uBlock Origin video, you'll learn how to use it to protect your online privacy and security. The biggest benefit of this tutorial is that you'll learn how to block scripts with uBlock Origin. uBlock Origin is essential to learn how to protect your online privacy, and can replace other extensions like uMatrix, Request Policy, Adblock Plus, Privacy Badger, and many other blockers. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Many people take uBlock Origin as an adblocker but it's actually a wide-spectrum blocker. That means uBlock Origin can block malware, spyware, trackers, analytics software, scripts, iframes, CSS, and images. Ublock Origin has an incredible power and potential to protect you from virtually all malware, trackers, advertisers, hackers, and creeps much better than any other blocker or even your anti-virus software. In this video I explain how uBlock Origin works in both static filtering and dynamic filtering and I also explain cosmetic filtering. Then I go into in-depth explanation of how to best use uBlock Origin in easy mode (slightly enhanced default mode), medium mode, and hard mode. If you don’t protect yourself, there are thousands of remote servers making requests on just a handful of your most favorite websites you visit daily. They have the audacity to track you without your consent and drain your power and bandwidth on top of that. When you learn to use uBlock Origin to its full potential, it will act as your top-layer firewall that will block loads of malware circulating across the web. For example, with uBlock Origin in advanced mode, you would be immune to many cyber attacks and malware circulating across the web. Reading Official Wiki: https://github.com/gorhill/uBlock/wiki Credits Music by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
PSor4e1TGsM | 28 Mar 2018
New leaks by Facebook’s former operations manager Sandy Parakilas reveal that the feature Cambridge Analytica exploited in 2014 was also abused by tens of thousands of other app developers. In the first years of Facebook this appears to have been major source of the platform's growth and revenue. Not just Trump Campaign, but also Obama's Campaign and most likely Hillary Clinton's too used social media manipulation to get more votes. The age of surveillance authoritarianism is already here. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf In February 2013 Facebook announced it would acquire Atlas Advertiser Suite from Microsoft. This was a major shift of business strategy for Facebook. Launching an advertising network like Atlas could help Facebook get ahead of Google in online advertising. So offering app developers direct access to its pool of user data was directly counterproductive to the new strategy of creating their own ad network. Any of those developers could acquire Facebook data and sell them to the advertisers or launch their own ad networks. That's why Facebook terminated the feature Cambridge Analytica exploited in 2014. Sources Main articles: https://www.theguardian.com/news/2018/mar/20/facebook-data-cambridge-analytica-sandy-parakilas https://nakedsecurity.sophos.com/2018/03/22/new-whistleblower-says-facebook-turned-a-blind-eye-to-covert-data-harvesting/ Atlas advertising network articles: https://techcrunch.com/2013/02/28/facebook-acquires-atlas/ https://techcrunch.com/2014/09/28/facebook-atlas-relaunch/ http://adage.com/article/digitalnext/facebook-s-atlas-means-brands-agencies/295293/ Social media & online manipulation http://www.slate.com/articles/technology/future_tense/2015/12/why_google_search_results_favor_democrats.html http://www.ibtimes.com/media-out-destroy-trump-study-finds-91-percent-news-coverage-negative-2437262 http://www.pnas.org/content/112/33/E4512 http://observer.com/2016/08/tech-companies-apple-twitter-google-and-instagram-collude-to-defeat-trump/ https://searchengineland.com/google-crooked-hillary-251152 Credits: Music by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
_mXW7-0ebK0 | 22 Mar 2018
Trump Campaign wasn't the only one that manipulated Facebook users. In the fallout of the Trump campaign Cambridge Analytica scandal, mainstream media took the opportunity to play partisan politics. But manipulation of US voters through Facebook was first done by Obama in 2012 presidential election. Cambridge Analytica manipulation of Facebook users is fundamentally wrong no matter who does it. So let's be correct here and not fall into the tribal partisanship. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Trump campaign didn’t have a permission to use Facebook data of 50 million users. The app developed by Cambridge University academic Alexander Kogan paid its 270,000 users to download it for research purposes only. When Facebook found out Cambridge Analytica used this harvested information, they told the company to delete all user data. But Facebook couldn’t just go out there and admit to the leak of 50 million Facebook users that was going to be used for a political campaign. So they kept quiet, and Cambridge Analytica proceeded to use the data for Trump campaign without any sanctions. Obama’s campaign on the other hand was allowed to manipulate Facebook users by flooding their social feeds with posts that would act as behavioral triggers. We learned from the last video that Facebook uses these behavioral triggers to influence people’s actions. Sources: The article: http://swampland.time.com/2012/11/20/friended-how-the-obama-campaign-connected-with-young-voters/ Tweets: https://twitter.com/cld276/status/975576363112509440 https://twitter.com/cld276/status/975564499297226752 Further reading: https://theintercept.com/2016/04/22/googles-remarkably-close-relationship-with-the-obama-white-house-in-two-charts/ https://ijr.com/2018/03/1077083-ex-obama-campaign-director-fb/ https://ijr.com/2018/03/1077208-former-obama-campaign-facebook-data/ Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Credits: https://www.youtube.com/user/CHUKImusic Music by Chuki Beats The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ynVfOdvAtqU | 19 Mar 2018
The data analytics Cambridge Analytica that worked with Donald Trump’s election team and the winning Brexit campaign harvested 50 million Facebook profiles of US voters and used them to build a powerful software program to predict and influence choices at the ballot box. This video showcases Cambridge Analytica explained through the history of how they manipulated Trump campaign. The man behind Cambridge Analytica and the manipulation of US election is the CEO of Cambridge Analytica Alexander Nix. He hired Christopher Wylie, the whistle-blower, who then hired Dr Kogan from Cambridge University to conduct the harvesting of Facebook profiles. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Cambridge Analytica explained It all started with a Cambridge University academic Aleksandr Kogan. He developed an app called thisisyourdigitallife, and paid about 270,000 people to download it and take a personality test. In the process, all users agreed to have their data collected for academic purposes. Quartz claims that users did not authorize their data to be shared with other companies, especially not for commercial purposes. What’s interesting is that since the time, Facebook’s policy prohibits data sharing from researchers to commercial actors without user consent. What’s more is that this not only collected their users’ data, it also collected all of their friends data, which accumulated data of over 50 million people. And this is what kind of pissed of Facebook. Facebook is not just a social network and an advertiser, they are a data broker too. That means they collect people’s private information within and outside of Facebook to create advertising profiles on them and sell this invaluable information that only Facebook can really collect. Kogan however, managed to get all this Facebook data for free, essentially stealing profit from Facebook. At this time, Republican donor, Robert Mercer, steps in and invests $15 million in Cambridge Analytica. Trump campaign wants to use this data to target American voters and pays $6 million to make that happen. Facebook got even madder because this is something they definitely want campaigners to pay for directly to them. So after they found out about this, Facebook deleted the app and wanted to take action. But they were pushed into the corner because revealing a 50-million strong data leak would definitely cause some huge damage. Companies never talk about breaches of their cyber security. So Facebok decides to bite their tongue and politely asks Cambridge Analytica to delete all user data. Which they didn’t, and Facebook never enforced this. Publicly, Facebook denies everything. They kept lying about the scope of the leak, and Cambridge Analytica added up to the lies by saying they never had Facebook data in the first place. These are all mutually beneficial lies, because everybody seems to have been breaking rules of contracts and even law. Eventually, they threw all the blame on Kogan by saying it was his fault violating Facebook’s policy, and not the company’s fault for holding on to the user data without their consent or actually hiring Kogan to do it in the first place. Reports clearly show that Cambridge Analytica collected information about people from their Facebook profiles directly. Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Sources: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election?CMP=Share_iOSApp_Other https://www.theguardian.com/media/2017/nov/10/data-firm-that-worked-for-trump-asked-wikileaks-to-share-hacked-emails https://www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-trump-campaign.html https://qz.com/1231643/cambridge-analytica-illegally-obtained-data-from-50-million-facebook-users-to-run-trump-ads/ https://www.theguardian.com/technology/2017/may/07/the-great-british-brexit-robbery-hijacked-democracy https://www.theguardian.com/politics/2017/feb/26/us-billionaire-mercer-helped-back-brexit https://www.theguardian.com/technology/2017/mar/04/cambridge-analytics-data-brexit-trump https://www.theguardian.com/us-news/2015/dec/11/senator-ted-cruz-president-campaign-facebook-user-data https://www.nytimes.com/2017/03/06/us/politics/cambridge-analytica.html http://www.newsobserver.com/news/business/article205653624.html Credits: Music by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
DRX7P9H1kk0 | 07 Mar 2018
On multiple separate speaking occasions, Bret Weinstein explained the danger of the monopoly position of Google and other tech monopolies. He continuously warns that the society is deeply manipulated by corporate surveillance and algorithmic censorship and explains why privacy matters. Sources: Tedx: https://www.youtube.com/watch?v=SjNRtrZjkfE Joe Rogan's podcasts: #1006 00:26:55 https://www.youtube.com/watch?v=6G59zsjM2UI #1055 01:07:00 https://www.youtube.com/watch?v=LzAgSp_O03I Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Credits Music by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
gFsRXfifcYg | 22 Feb 2018
No matter how tech savvy you are, if you want to protect your online privacy you can easily follow this tutorial that walk you through online privacy protection step by step. I made this channel because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. I am not a professional. I just try to spread the message I believe is important. I am non-partisan. I always will be. If at any point during the video you feel like this is too much for you, feel free to leave it there and keep your privacy protection at a level that suits you best. Also you could do me a favor if you commented your level of privacy protection you decided to go with. Bitcoin: 13YW3RrLv7bYACyVLAdt4aEPKtxThAvpCE Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Further reading: privacytools.io reddit.com/r/privacy reddit.com/r/privacytoolsio Music by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
nuRuFj5c0bE | 07 Feb 2018
Too many people seem to unite behind the idea of universal basic income with the assumption of greater freedom and more spare time. But they don't realize they are completely wrong about universal basic income. UBI is only designed to elevate people out of poverty, but with the current political and economic system, and artificial intelligence on the rise, we can only expect a dystopian future. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf This isn't a case against universal basic income per se. The problem is that universal basic income is probably going to be used by economic and political elites as a distraction from a much more sever social restructuring. With the power of the artificial intelligence within the hands of the few biggest corporations they will control and manipulate everything. It's not a conspiracy theory. They are doing it right now. In this video, I build up on the arguments and premises laid out by AI developers and researches like Elon Musk, Mark Zuckerberg, Ray Kurzweil, and Sam Harris. While Elon Musk thins universal basic income is inevitable, we still share the stance on the dangers of artificial intelligence. Where I differ is that we can't rely on the system where we can no longer earn our own income, but have to rely on the corporations and governments to sustain our living. Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Sources: Google abusing its monopoly https://arstechnica.co.uk/tech-policy/2016/05/google-antitrust-case-europe-details-analysis/?comments=1 Timeline of Google search engine (from a biased perspective!) http://www.foundem.co.uk/Foundem_Google_Timeline.pdf Facebook tracking browsing history https://www.theguardian.com/technology/2017/jul/03/facebook-track-browsing-history-california-lawsuit Twitter censorship https://www.independent.co.uk/life-style/gadgets-and-tech/news/android-apps-beacons-tracking-users-inaudible-sound-hidden-adverts-ultrasonic-audio-privacy-phones-a7723871.html http://mashable.com/2017/11/17/twitter-hate-speech-symbols-december-18/ Advertising surveillance http://www.nytimes.com/2012/11/18/technology/your-online-attention-bought-in-an-instant-by-advertisers.html http://www.nytimes.com/2012/08/19/business/electronic-scores-rank-consumers-by-potential-value.html http://cyberlaw.stanford.edu/blog/2011/10/tracking-trackers-where-everybody-knows-your-username http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all Government surveillance https://www.eff.org/deeplinks/2018/01/house-fails-protect-americans-unconstitutional-nsa-surveillance https://theintercept.com/2018/01/12/the-same-democrats-who-denounce-trump-as-a-lawless-treasonous-authoritarian-just-voted-to-give-him-vast-warrantless-spying-powers/ https://theintercept.com/2018/01/09/nsa-surveillance-fisa-section-702-reauthorization-fbi/ https://theintercept.com/2017/03/13/rand-paul-is-right-nsa-routinely-monitors-americans-communications-without-warrants/ From NSA Leaks by Edward Snowden https://www.forbes.com/sites/andygreenberg/2013/06/05/nsas-verizon-spying-order-specifically-targeted-americans-not-foreigners/#7b0b422c38fe https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0&pagewanted=all https://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html https://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?hp Videos: Sam Harris on AI power at 19:20 https://www.youtube.com/watch?v=h0962biiZa4 Ray Kurzweil on AI power at 8:30 Elon Musk on AI power at 36:00 Julian Assange on Propaganda functions at 11:15 https://www.youtube.com/watch?v=cQRZvnGp1Gs Bret Weinstein on AI censorship at 27:40 https://www.youtube.com/watch?v=6G59zsjM2UI We are building surveillance authoritarianism to make people click on ads: https://www.youtube.com/watch?v=iFTWM7HV2UI Credits: 'Controlled Chaos' by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 http://creativecommons.org/licenses/by/3.0/ http://chriszabriskie.com/ Chuki Beats https://www.youtube.com/user/CHUKImusic
G0443bdDJV8 | 16 Jan 2018
Democrats could have prevented the extension of the Section 702 of the Foreign Intelligence Surveillance Act that grants the US Government warrantless mass surveillance over the American people. Instead they decided to give Donald Trump unlimited powers, while comparing him to Stalin and calling him a treasonous Putin's despotic puppet. My bitcoin address: 1NmqcqYRZVmbCWweaREigX6qZVdtGND6Mx Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The Foreign Intelligence Surveillance Act, also known as FISA is an act that was supposed to put reasonable barriers on the US intelligence community. However, since the Section 702 came to place under Bush in 2008, spying agencies like the National Security Agency, together with the law enforcement, continue to abuse this act to routinely violate the 4th amendment rights of American citizens. Everything gets collected by the NSA programs before anybody can even ask whether they should. Everything gets collected through various programs. Prism partners with the tech giants to grant NSA direct access to their databases. The Section 702 then allows for the bulk collection of Internet traffic that they didn’t get from Prism partnerships. If this doesn’t satisfy their collection fetish the NSA uses the Even when you talk to your friends over the Internet who live right across the street, your Internet traffic channels around the world before it reaches your contact. In the eyes of the NSA creeps this makes it a foreign communication. Sources and further reading: Section 702 Long version https://www.gpo.gov/fdsys/pkg/PLAW-110publ261/pdf/PLAW-110publ261.pdf Short version https://fas.org/irp/news/2013/06/nsa-sect702.pdf How the vote happened https://www.nytimes.com/2018/01/11/us/politics/fisa-surveillance-congress-trump.html https://arstechnica.com/tech-policy/2018/01/as-house-passes-surveillance-bill-wyden-and-paul-vow-filibuster/ https://arstechnica.com/tech-policy/2018/01/after-fox-and-friends-segment-trump-changes-his-tune-on-nsa-spying/ http://thefederalist.com/2018/01/11/congress-shouldnt-expand-intelligence-agencies-power-spy-americans/ https://www.nytimes.com/2018/01/11/us/politics/right-left-react-nsa-spying-warantless-surveillance.html?smtyp=cur https://www.politico.com/amp/story/2018/01/11/fisa-passes-trump-336499 https://theintercept.com/2018/01/12/the-same-democrats-who-denounce-trump-as-a-lawless-treasonous-authoritarian-just-voted-to-give-him-vast-warrantless-spying-powers/ https://theintercept.com/2018/01/12/the-same-democrats-who-denounce-trump-as-a-lawless-treasonous-authoritarian-just-voted-to-give-him-vast-warrantless-spying-powers/ https://theintercept.com/2018/01/09/nsa-surveillance-fisa-section-702-reauthorization-fbi/ How they spy on you https://theintercept.com/2017/03/13/rand-paul-is-right-nsa-routinely-monitors-americans-communications-without-warrants/ NSA Leaks from Edward Snowden https://www.forbes.com/sites/andygreenberg/2013/06/05/nsas-verizon-spying-order-specifically-targeted-americans-not-foreigners/#7b0b422c38fe https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=0&pagewanted=all https://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html https://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?hp https://apps.washingtonpost.com/g/page/world/communication-breakdown/1153/ https://apps.washingtonpost.com/g/documents/world/ordinary-web-users-far-outnumber-foreign-targets-in-conversations-intercepted-by-the-nsa/1091/ https://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls https://www.nytimes.com/2015/08/16/us/politics/att-helped-nsa-spy-on-an-array-of-internet-traffic.html https://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html http://www.spiegel.de/media/media-34104.pdf XKEYSCORE - the NSA's Google: https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/ https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data http://www.businessinsider.com/israelis-bugged-the-us-for-the-nsa-2013-6 The unmasking http://www.washingtonexaminer.com/trump-surveillance-what-does-unmasking-mean/article/2619191 Credits: ‘Bars’, ‘Time’, ‘Old School #3’ by https://www.youtube.com/user/CHUKImusic
gxVj9ZMYbbo | 11 Jan 2018
Enforcing net neutrality as a public policy without enforcing competition of broadband providers in the US is a losing strategy. The Internet has never been neutral. The FCC is free to define its policies and each new administration can rewrite net neutrality completely. Thus, we need to bring back local loop unbundling as our only chance to bring broadband competition in the US. I'll give you an in-dept explanation of how the Internet operates, and how the nature of traffic exchange makes it difficult to enforce net neutrality as a public policy. My bitcoin address: 1NmqcqYRZVmbCWweaREigX6qZVdtGND6Mx Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne How to save net neutrality Many opponents of net neutrality have argued against it simply because of their political affiliation. They failed to address solutions to the real problem - America lacks broadband competition and consumers have no power to enforce net neutrality through their market choices. The problem is that telecommunications market is highly noncompetitive in the US. Essentially, all major telecom providers are monopolies. How to bring competition of broadband providers in the US While implementing net neutrality might sound logical, it's only a cosmetic change that doesn't solve the root of the problem. So to bring back competition of broadband providers, we need to implement so called local loop unbundling. Local loop unbundling explained: "Local Loop Unbundling is where the Countries Incumbent telecomms operator is required to lease access to its copper lines to other Communications Providers (CPs). This is normally enforced by a regulator to create competition in the market. These service providers then install their own broadband equipment (i.e. a Digital Subscriber Line Access Multiplexer - DSLAM) in the Incumbents Central Office. The equipment is then able to access the copper line out to a customers premises via a handover frame. The incumbent is still responsible for fixing faults on the copper line and the voice phone service (Plain Old Telephone Service - POTS)." - http://www.llunbundling.eu/index.htm Sources: Legal documents behind net neutrality 1934 Communications Act https://transition.fcc.gov/Reports/1934new.pdf 1996 Telecommunications Act https://transition.fcc.gov/Reports/tcom1996.pdf 2010 Open Internet Order https://apps.fcc.gov/edocs_public/attachmatch/FCC-10-201A1.pdf Court ruling in Verizon v. FCC from 14 January 2014 https://www.cadc.uscourts.gov/internet/opinions.nsf/3AF8B4D938CDEEA685257C6000532062/$file/11-1355-1474943.pdf Computer Inquiries history https://en.wikipedia.org/wiki/FCC_Computer_Inquiries https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1324&context=fclj Verizon sues FCC https://www.washingtonpost.com/blogs/post-tech/post/verizon-sues-fcc-over-net-neutrality-rules/2011/09/30/gIQAFUP0AL_blog.html Peering, transit, and Tier 1 Internet Service Providers http://www.us.ntt.net/downloads/papers/IDC_Tier1_ISPs.pdf Big cable lobbying against municipal broadband https://arstechnica.com/tech-policy/2014/01/who-wants-competition-big-cable-tries-outlawing-municipal-broadband-in-kansas/ Big telecoms lobbying in US https://www.opensecrets.org/lobby/clientsum.php?id=D000000076&year=2017 ISP has won limits on public broadband in 20 states https://arstechnica.com/tech-policy/2014/02/isp-lobby-has-already-won-limits-on-public-broadband-in-20-states/ Why America lacks broadband competition https://arstechnica.com/information-technology/2014/04/one-big-reason-we-lack-internet-competition-starting-an-isp-is-really-hard/ Broadband competition in the US https://www.fcc.gov/reports-research/maps/bpr-2016-fixed-25mbps-3mbps-providers/#4/38.82/-94.04/ https://www.fcc.gov/reports-research/reports/broadband-progress-reports/2016-broadband-progress-report Local Loop Unbundling in Europe http://www.icc-uk.com/download/papers/LLU_in_Europe-New_Challenges.pdf Different implementations of local loop unbundling requirements in OECD countries. https://www.oecd.org/sti/broadband/2-7.pdf Credits: Music by https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
K6fWuUpyPG4 | 17 Dec 2017
History of net neutrality is an endless bureaucratic warfare. Each new administration can decide how they want to define their policies. Learn about the complete history of net neutrality since 1934 until today and 6 lies that led to the Ajit Pai's repeal of net neutrality. I made this channel because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. I am not a professional. I just try to spread the message I believe is important. I am non-partisan. I always will be. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Music by https://www.youtube.com/user/CHUKImusic Sources: Legal documents behind net neutrality 1934 Communications Act https://transition.fcc.gov/Reports/1934new.pdf 1996 Telecommunications Act https://transition.fcc.gov/Reports/tcom1996.pdf Four Internet Freedoms https://apps.fcc.gov/edocs_public/attachmatch/DOC-243556A1.pdf 2005 Internet policy statement https://apps.fcc.gov/edocs_public/attachmatch/FCC-05-151A1.pdf Net Neutrality enforced in AT&T and Verizon mergers https://apps.fcc.gov/edocs_public/attachmatch/DOC-261936A1.pdf 2010 Open Internet Order https://apps.fcc.gov/edocs_public/attachmatch/FCC-10-201A1.pdf Title II Order 2015 https://apps.fcc.gov/edocs_public/attachmatch/FCC-15-24A1_Rcd.pdf The Net Neutrality Debate: Access to Broadband Networks https://fas.org/sgp/crs/misc/R40616.pdf Computer Inquiries history https://en.wikipedia.org/wiki/FCC_Computer_Inquiries https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1324&context=fclj Repeal of net neutrality https://transition.fcc.gov/Daily_Releases/Daily_Business/2017/db1122/DOC-347927A1.pdf Broadband competition in the US https://www.fcc.gov/reports-research/maps/bpr-2016-fixed-25mbps-3mbps-providers/#4/38.82/-94.04/ https://www.fcc.gov/reports-research/reports/broadband-progress-reports/2016-broadband-progress-report History of net neutrality https://www.wired.com/story/how-the-fccs-net-neutrality-plan-breaks-with-50-years-of-history/ ISP net neutrality stories Verizon blocking Google Wallet http://www.businessinsider.com/verizon-blocking-google-wallet-2011-12 http://www.latimes.com/business/technology/la-fi-tn-netflix-time-warner-cable-20140820-story.html AT&T Capitalizing on data caps https://arstechnica.com/information-technology/2014/01/att-turns-data-caps-into-profits-with-new-fees-for-content-providers/ Comcast throttling BitTorrent https://arstechnica.com/tech-policy/2017/11/comcast-throttling-bittorrent-was-no-big-deal-fcc-says/ Netflix vs Verizon https://arstechnica.com/information-technology/2014/02/verizon-ceo-confident-about-getting-payments-from-netflix-too/ https://arstechnica.com/information-technology/2014/02/netflix-packets-being-dropped-every-day-because-verizon-wants-more-money/ https://arstechnica.com/information-technology/2014/02/netflix-performance-on-verizon-and-comcast-has-been-dropping-for-months/ Why US lacks ISP competition https://arstechnica.com/information-technology/2014/04/one-big-reason-we-lack-internet-competition-starting-an-isp-is-really-hard/ https://arstechnica.com/information-technology/2013/07/why-youtube-buffers-the-secret-deals-that-make-and-break-online-video/ Comcast VPN http://www.practicallynetworked.com/news/comcast.htm FCC wants to reclassify ISPs under Title II https://arstechnica.com/tech-policy/2014/01/fcc-will-find-new-way-to-prevent-isp-abuse-after-net-neutrality-loss/ How 2010 Open Internet Order was never enough to enforce net neutrality https://arstechnica.com/tech-policy/2014/01/how-the-fcc-screwed-up-its-chance-to-make-isp-blocking-illegal/ EFF Evaluates the 2010 Open Internet Order https://www.eff.org/deeplinks/2011/02/pt-ii-eff-evaluates-fcc-s-net-neutrality-rules-its https://www.eff.org/cases/ala-v-fcc Broadcast flags https://www.eff.org/issues/broadcast-flag https://www.pcworld.com/article/120654/article.html Net neutrality enforced in 2005 https://www.cnet.com/news/telco-agrees-to-stop-blocking-voip-calls/ Redbox Instant shuts down https://www.forbes.com/sites/amitchowdhry/2014/10/07/redbox-instant-shutting-down/ Ajit Pai lies about net neutrality crippling broadband investment https://www.wired.com/story/the-fcc-says-net-neutrality-cripples-investment-thats-not-true/
b7GH_ZA5jik | 28 Nov 2017
Twitter announced that it will track its users browsing history and spy on their activity outside of Twitter, so that they can better censor opinions and people they disagree with. This is Twitter's official censorship and surveillance campaign. I present you with an easy solution that will make it impossible for Twitter to track you and censor based on your browsing history. My bitcoin address: 1NmqcqYRZVmbCWweaREigX6qZVdtGND6Mx How to use uMatrix browser extension to fight against corporate surveillance and censorship https://youtu.be/TVozpo3zUBk How to use Facebook anonymously (similar approach) https://youtu.be/I7kz7sqIgEk Best browsers for privacy https://youtu.be/cCnkfSqw2t4 Be careful about VPN providers https://youtu.be/VZNbYhhUqic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Learn about VPN providers: https://thatoneprivacysite.net/ https://www.reddit.com/r/VPN/ https://www.reddit.com/r/privacy/ https://privacytools.io/ Download Firefox https://www.mozilla.org/en-US/firefox/new/ Download IceCat https://www.gnu.org/software/gnuzilla/ Download Tor Browser to access hidden network and anonymity on the web https://www.torproject.org/download/download Brave Browser https://www.brave.com/ Sources: Twitter censorship and surveillance announcement http://mashable.com/2017/11/17/twitter-hate-speech-symbols-december-18/ https://support.twitter.com/articles/18311 How they spy on you through your browser fingerprint https://www.eff.org/deeplinks/2010/05/every-browser-unique-results-fom-panopticlick Test your device for its uniqueness https://panopticlick.eff.org/ More on browser fingerprints http://www.pcworld.com/article/192648/browser_fingerprints.html http://www.zdnet.com/article/google-facebook-do-not-track-requests-fcc-says-they-can-keep-ignoring-them/ More on Twitter and other corps tracking you https://www.eff.org/deeplinks/2017/05/new-twitter-policy-abandons-longstanding-privacy-pledge https://www.theguardian.com/technology/2017/jul/03/facebook-track-browsing-history-california-lawsuit https://www.independent.co.uk/life-style/gadgets-and-tech/news/android-apps-beacons-tracking-users-inaudible-sound-hidden-adverts-ultrasonic-audio-privacy-phones-a7723871.html Virtual Private Network (VPN) providers mentioned in the video: AzireVPN, BlackVPN, BolehVPN, NordVPN, Mullvad, Trust.zone, Proxy.sh From Twitter rules: “We believe in freedom of expression and open dialogue, but that means little as an underlying philosophy if voices are silenced because people are afraid to speak up. In order to ensure that people feel safe expressing diverse opinions and beliefs, we prohibit behavior that crosses the line into abuse, including behavior that harasses, intimidates, or uses fear to silence another user’s voice.” I believe in freedom of speech 'BUT' I want to censor everyone that I disagree with. Twitter intentionally hides behind “we are against murder” narrative, to make it appear like their new policy is a no brainer. No bullying, threats, suicide, doxxing, child abuse, sexual content etc. But these are all cases where the law decides what’s right or wrong and the law enforcement goes after these people anyway. What Twitter wants to do, however, is purely political, as they reserve the right to define what’s hurting other people’s feelings and what isn’t. The narrative is going to be set by those who scream “harassment” the loudest. So you’ll want to prevent Twitter from getting access to your browsing history. In ‘security by compartmentalization’ strategy, each compartment has its own separate entry, completely independent from all other compartments. This is to make sure that even if an adversary breaks through one compartment, they still can’t gain access to other compartments. For you, your compartments are going to be web browsers. You are going to have a separate web browser for Twitter, and a separate one for everything else you do on the Internet. Set your Firefox to never remember history. After you’re done wtih that, go to the addons section and download and install these: uBlock Origin, Decentraleyes, Cookie AutoDelete, and HTTPS Everywhere. If you are willing to go even more hardcore to be absolutely safe, you can install uMatrix to block third party requests, scripts, and all the tracking and malicious code on websites. Even if you are not logged in to twitter, websites you visit across the Internet use social media pluggins that track you everywhere. These usually come in a form of “Like” and “Share” buttons that you see on many articles. You have to block these to make sure Twitter isn’t following you. And that’s exactly what uMatrix is for. The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
pd7MDdWrWBM | 20 Nov 2017
Facebook experiments with democracy in 6 developing countries as part of their running test of the new feature called "Explore Feed". Facebook implements this feed to separate public posts from private posts on people's newsfeeds. But in countries like Slovakia, Serbia, Sri Lanka, or Cambodia, Facebook users all of a sudden stopped seeing important news coverage from credible sources. This experiment with democracy adds up to the list of Facebook attempts to manipulate newsfeed for "research purposes". These feature currently running in the chosen countries isn't planned to roll out globally. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Sources used: About the experiment in Slovakia, Cambodia, Guatemala, Sri Lanka, Serbia, and Bolivia: https://www.theguardian.com/technology/2017/oct/23/facebook-non-promoted-posts-news-feed-new-trial-publishers https://www.theguardian.com/technology/2017/oct/25/facebook-orwellian-journalists-democracy-guatemala-slovakia https://medium.com/@filip_struharik/biggest-drop-in-organic-reach-weve-ever-seen-b2239323413 https://www.theguardian.com/technology/2017/oct/24/facebook-no-plans-news-feed-change-worldwide https://twitter.com/MattNavarra/status/920299640834183169/photo/1 Facebook emotional manipulation https://mashable.com/2014/06/29/anger-facebook-emotion-manipulation-study/ Facebook election manipulation http://www.motherjones.com/politics/2014/10/can-voting-facebook-button-improve-voter-turnout/ The New York Times is also paranoid like me about Facebook's power to influence everything that's going on around the world and around you. https://www.youtube.com/watch?v=cR_XVGemAnw Facebook has started experimenting with democracy in six small countries around the world. In Slovakia, Sri Lanka, Serbia, Bolivia, Guatemala and Cambodia, Facebook removed all professional media and content from Facebook pages from the main newsfeed. The main newsfeed will now see only posts by friends and sponsors and everything else is supposed to be in its designated Explore Feed. The purpose of splitting the feeds as in Facebook’s own words has been to separate personal content from public. In these six countries, Facebook removed all established publishers’ content from the main feed, even coming from those sources users chose to follow. All of these countries coincidentally have ongoing democratic development and their political climate is very eruptive. Overnight, these people have stopped seeing important coverage from outlets they decided to follow. The main personal feed is nowhere near personal either. Facebook will let paid content through. Which means that established advertisers will see their content popping through. Huge mainstream media corporations will essentially manage to get through the paywall in form of advertisements. But important coverage and content from smaller publishers, and new start-ups who rely on the social media interactions will be burned down. Credits: 'Hush' by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 http://creativecommons.org/licenses/by/3.0/ Beat #19, 'Psycho' by Chuki Beats https://www.youtube.com/user/CHUKImusic Help us fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
ttmGO4QGmoc | 02 Nov 2017
Google drains 1.5 million gallons of water every day from Coastal South Carolina aquifers to cool its data center. Together with its 4 million gallons of tap water withdrawal, Google is by far the third largest consumer of fresh water resources in the counties surrounding Charleston. Thus Google uses increasingly scarce fresh water to cool its Goose Creek data center in Berkeley County, only to deliver you targeted advertisements. Google trades water for marketing. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The Charleston aquifer is is currently non-sustainable, because discharge of groundwater exceeds rates of recharge. Despite dropping water levels, Google still went ahead to tap into the aquifer, further escalating the already alarming downward trends. Google is not the biggest consumer of fresh water, but it is the one that's most redundant. Farmers need to water to grow food, people need groundwater to drink. But we don't to spent fresh water so that Google can track us for their own marketing needs. Do you think that depleting fresh water resources to cool data centers should be allowed or not? Currently there are almost no regulations regarding groundwater withdrawals, so Google can take as much ground to cool its Goose Creek data center In Berkeley County, South Carolina, as they want. Sources Google's controversial groundwater withdrawal sparks question of who owns South Carolina water http://www.postandcourier.com/news/google-s-controversial-groundwater-withdrawal-sparks-question-of-who-owns/article_bed9179c-1baa-11e7-983e-03d6b33a01e7.html Data centers waste vast amounts of energy http://www.nytimes.com/2012/09/23/technology/data-centers-waste-vast-amounts-of-energy-belying-industry-image.html Regulators OK aquifer plan clearing way to act on google http://www.postandcourier.com/news/regulators-ok-aquifer-plan-clearing-way-to-act-on-google/article_f8aa2ef0-364b-11e7-a882-b7dcd690ac42.html USGS Charleston aquifer study https://www.usgs.gov/centers/sa-water/science/simulation-groundwater-flow-charleston-aquifer-near-mount-pleasant-sc?qt-science_center_objects=0#qt-science_center_objects Study of South Carolina aquifers http://www.dnr.sc.gov/ccworkshops/pdf/CCWSDec5Harder.pdf Other draining aquifers in the US https://www.nationalgeographic.com/magazine/2016/08/vanishing-aquifer-interactive-map/ Google's plan to use aquifer for cooling in South Carolina raises concerns http://www.datacenterdynamics.com/content-tracks/power-cooling/googles-plan-to-use-aquifer-for-cooling-in-south-carolina-raises-concerns/98199.fullarticle 4k footage of Columbia https://www.youtube.com/watch?v=9eRkNFcqDnY Credits: Neo Western, Enter the Maze, Junkyard Tribe, Satiate, Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 http://creativecommons.org/licenses/by/3.0/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
oFORyZggzS8 | 23 Oct 2017
UK wants to ban encryption. Privacy is for criminals and bad people. Encryption is bad. The British government wants to ban WhatsApp from using end-to-end encryption. Join me to debate the state of surveillance and privacy in the United Kingdom. The government of the United Kingdom seeks to implement backdoor into encryption, that is break encryption completely, to allow unlimited access to the contents of people's messages. This tactic has proven to provide little help to catch real criminals. Rather the mere capability presents the threat to our freedom and privacy. End-to-end encryption is important to protect your information and online privacy. Without it anybody can read your messages without even hacking your accounts. With this kind of approach to cyber security, it’s only a matter of years before Equifax breaches will happen to all kinds of data collecting programs. And soon it will be in the news that all of your whatsapp, Facebook, and Gmail messages are available to read and search by your real name for free leaked somewhere on the Internet. It will be too late then for the outrage of embarrassed spouses, fired employees, ruined relationships, jeopardized business deals, destroyed careers, doxxed activists, and depressed kids having their mistakes public in front of everyone. Read this article: https://techcrunch.com/2017/10/04/uk-gives-whatsapp-another-spanking-over-e2e-crypto/ Featured https://thehackernews.com/2014/05/ex-nsa-director-admits-we-kill-people.html https://www.theguardian.com/technology/2017/mar/29/uk-government-encryption-whatsapp-investigatory-powers-act https://www.reuters.com/article/us-britain-security-whatsapp/uk-says-whatsapp-lets-paedophiles-and-gangsters-operate-beyond-the-law-idUSKCN1C8165?feedType=RSS&feedName=technologyNews&utm_source=Twitter&utm_medium=Social&utm_campaign=Feed%3A+reuters%2FtechnologyNews+%28Reuters+Technology+News%29 https://www.theguardian.com/society/2011/oct/11/pornography-internet-service-providers https://arstechnica.com/tech-policy/2017/05/google-and-facebook-lobbyists-try-to-stop-new-online-privacy-protections/? https://www.salon.com/2007/06/01/intel_contractors/ http://www.washingtonpost.com/wp-dyn/content/article/2006/05/06/AR2006050601088.html http://www.telegraph.co.uk/news/politics/11764958/Porn-sites-accessed-20000-times-a-month-on-parliament-computers.html https://www.rt.com/uk/310857-parliament-porn-sites-access/ https://www.techrepublic.com/article/dhs-orders-federal-agencies-to-bolster-cybersecurity-with-https-email-authentication/ https://www.theguardian.com/technology/2017/mar/26/intelligence-services-access-whatsapp-amber-rudd-westminster-attack-encrypted-messaging https://www.theguardian.com/world/2016/nov/19/extreme-surveillance-becomes-uk-law-with-barely-a-whimper Recommended https://www.forbes.com/sites/thomasbrewster/2017/01/22/whatsapp-facebook-backdoor-government-data-request/#b3b603c1030c Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
TVozpo3zUBk | 18 Oct 2017
This is How to use uMatrix to protect your privacy online. This uMatrix tutorial will teach you some basics about how to use this browser add-on to increase your online security, decrease bandwidth, and stop third party trackers from spying on your browsing history. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Essential reading: Learn about uMatrix scopes https://github.com/gorhill/httpswitchboard/wiki/The-matrix-scope Two ways to use uMatrix: block all / allow exceptionally; or allow all / block exceptionally https://github.com/gorhill/httpswitchboard/wiki/How-to-use-HTTP-Switchboard:-Two-opposing-views Walkthrough for first-time users https://github.com/gorhill/uMatrix/wiki/Very-bare-walkthrough-for-first-time-users The Matrix cells https://github.com/gorhill/httpswitchboard/wiki/The-matrix-cells Recommended reading: Examples of useful rulesets: https://github.com/gorhill/uMatrix/wiki/Examples-of-useful-rulesets https://github.com/kristerkari/umatrix-recipes https://rictusempra.github.io/uMatrix-Rules/ Featured https://arstechnica.com/information-technology/2017/10/equifax-rival-transunion-also-sends-site-visitors-to-malicious-pages/ https://www.incapsula.com/blog/world-largest-site-xss-ddos-zombies.html Umatrix is a point-and-click web content blocker. On this channel we mostly talk about protecting your privacy, which is how we are going to use this tool. But uMatrix is also extremely effective firewall that will stop a lot of malware, trackers, and malicious code from making their way into your device. And because it blocks a lot of unnecessary bloatware on websites, it will also save you significant amounts of bandwidth consumption. Umatrix was built so that third party websites can’t snoop on your private information they shouldn’t have access to in the first place. Web developers can’t be trusted with their security and often times, even they don’t know how much they expose and leak your private data. And that goes for the big sites like Google and Facebook as well. Let’s take control of our online privacy and security. After you downloaded and installed uMatrix from your browser extension repository, the first step is to understand what it does. What’s great about this add-on is that you don’t have to understand everything. You can be as novice or as advanced with it as you want to be. So first we are going to look at the interface and explain umatrix, then we’ll interact with it a little bit, we’ll go over some settings and then I’ll show you some tips & tricks that you may want to use. Music: ‘Stuck’, ‘Memories’, ‘Walk’, ‘Time’ by https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
VZNbYhhUqic | 04 Oct 2017
What is a Virtual Private Network? And why using a VPN is not enough to protect your online privacy? There is also a way to be completely anonymous on the web. If that's something you're into, watch this tutorial: https://www.youtube.com/watch?v=_393maHbHWc I made this channel because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. I am not a professional. I just try to spread the message I believe is important. I am non-partisan. I always will be. Guide to choosing a VPN on https://thatoneprivacysite.net/ What is a Virtual Private Network (VPN)? VPN is a private network that makes “virtual” connections routed through a public network, which could easily be and in most cases even was the Internet. How does a VPN work? Basically what a VPN does is that it takes packets of data that would normally run through an insecure network, like Internet, encapsulates them in an entirely new packet, and puts its own VPN header on top of it, masking the original source of information. This process is called tunneling and it is how VPNs mask your IP address. This is why you can trick websites to having a different IP and bypass geolocation censorship. But this is not what guarantees the confidentiality of your data. For that you need encryption. VPNs achieve that by encrypting the traffic between a client and the VPN server. This means that a company VPN client can encrypt data coming from their employee’s laptop working out in the field and connected to a local wifi. Encryption doesn’t necessarily mean privacy. The reason why VPNs work to protect corporate privacy but fail at guarding consumer privacy is the fundamental design of VPN technology. VPN server is always going to know some personally identifiable information about you. Whether it’s your real IP address, information you submitted upon account creation, and information taken from your payment method. The process of collecting this information is called logging, and there is not much you can do to verify what a VPN company really does with user logs. So how do you choose a VPN provider? Well you need to do two things – you need to evaluate your threat model. We will go over that on my channel in the future. And you need to do a lot of research and educate yourself about the topic. Never trust a single source. Don’t even look at torrentfreak or Pcmag reviews. Look at what the community is saying about VPN providers. One good source of reviews of a lot of features from a lot of VPN providers is at thatoneprivacysite.net. Reddit is an excellent source of customer reviews and you can browse those without having a Reddit account. How can websites track you even if you use a VPN? Let’s say you find and buy your monthly subscription at a renowned VPN provider. And then you do something like this. You successfully configure your VPN connection, then you open your favorite web browser, which should NEVER be Chrome, but statistically it most likely will be. You login to your Gmail, which Chrome takes as if you are logging in to the browser itself for syncing, and then you browse the web for all kinds of purposes – education, work, entertainment, shopping, travel… You just handed over ALL of your private information to the most privacy-violent corporation in the world. China doesn’t have the surveillance capabilities of Google. And Google will sell your privacy to every website and retailer you visit. If you don’t block trackers properly, you are just wasting your money. You need to re-assess your threat model. You need to ask yourself: from whom are you trying to protect your private information? Your Internet Service Provider, vendors of software and applications connecting to the Internet, website operators, advertisers, governments, and hackers. Description I made this channel because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. I am not a professional. I just try to spread the message I believe is important. I am non-partisan. I always will be. Bitcoin: 1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689 Dash XyBDwdFQuZNCnThkeeg1FRFks65hKMkTux Litecoin LcHJvrovBfqDBQyfHcxxBErGM8qq5zho8s Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne
cCnkfSqw2t4 | 26 Sep 2017
If you are looking for top Google Chrome alternatives, here is a list of best privacy focused browsers out there. I review Brave browser, Firefox, Palemoon, Waterfox, and Tor. Degoogleify yourself with the help of my another video tutorial that will help you protect your privacy. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf So you are looking for Google Chrome alternatives because you want to protect your privacy. There is countless of web browsers out there and you want to pick one that makes it worth ditching Chrome. You don’t need to sacrifice functionality. Quite the contrary. By switching to these privacy browsers, your device will no longer devote its resources to send your browsing history and other private information to Google’s servers. You want a privacy-focused browser that either blocks all trackers by default, or lets you easily do that with simple configuration. It needs to be fast, and should let you opt out of sending any personal information to anyone. Brave browser review The first privacy-focused browser we’re gonna look at is Brave Browser. Right out of box, Brave will block all advertisements, trackers, and malware. Brave integrated HTTPS Everywhere, which forces websites to use encryption if they support it, so that your connection is more secure. Third party cookies are also blocked, and if you are more vigilant about your privacy, you can even block scripts and enable fingerprinting protection. While this could break some sites, Brave allows you to easily manage that and only enable scripts on sites you trust. Firefox review Another privacy browser is made by the champion of fighting for digital rights and privacy on the Internet, the Mozilla Foundation. Their Firefox browser is a flagship free and open source software, that came more than a decade ago to save us all from the Internet Explorer. Waterfox review Waterfox browser is essentially Firefox clone, but it has some features of its own. Mostly it distances itself from the Mozilla Foundation and removes all data collection and telemetry. So it’s basically same as Firefox but with even better default privacy. You’d still need to go through same privacy configuration and install same add-ons as on Firefox. Luckily majority of them are supported. Palemoon review There is another fork, called Palemoon, which forked from an older version of Firefox. Palemoon is what Firefox used to be a couple of years ago. It provides you with more customization, and there is also no data collection and no profit behind the organization. It looks a bit old, which might put off some of the younger users. I didn’t really like its default theme so I changed it. It resembles Firefox in every aspect, but the layout maintains its traditional look. Tor review Firefox is also used by Tor Browser bundle, which I list as another privacy browser you can use. You can download tor from torproject.org and access websites with a hidden IP address. Your traffic will be anonymized, and although websites and your ISP will know that you are connecting through Tor, they won’t be able to identify you. To use Tor correctly, don’t login to your online identities while browsing the web on the same session. Tor doesn’t magically protect you from data you submit to websites. So even if you use Facebook onion link, Facebook will still collect your posts, likes, comments, and chat messages. They will also be able to see your browsing history from Tor if you visit other websites while logged in to your Facebook account. This video is part of a Degoogleify series launched by my 'Why you need to stop using Google' video. Credits: Music 'Hide', and 'Strafe', by Chukie Beats Music https://www.youtube.com/user/CHUKImusic Space images by https://www.youtube.com/user/HubbleSiteChannel Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
BTl2CLMgVfM | 21 Sep 2017
Once your private information is out there it’s going to stay there forever. There is no “delete” button for the Internet. Especially for the darknet side of it. Your data will be floating around before it gets to the hands of the right people to make you become a victim of a major cyber crime. Why privacy matters Privacy is not just to ease paranoid conspiracy theorists. It’s a right of everyone to protect yourself from abuse from the government, your employer, advertisers, your neighbors, criminals, or anyone else you want to stay away from. There is no counter argument for privacy. Privacy means you have nothing to hide, therefore they have no reason to look. Equifax breach of private information Equifax breach is a proof why privacy matters. Once the government collects your data, once Facebook tracks you all over the Internet, once Google sells your gmail messages and Google searches to advertisers, once Apple knows everywhere you go, your private information is just as well open for anyone to do with it whatever they desire. It’s not about you not worrying about this, because you don’t do anything wrong. You don’t do anything wrong, therefore nobody has a reason to watch you. Every time a data brokering ad exchange shares your data with their business partners, they leave them insecure traveling across the world through the Internet. It only takes someone inclined to attack these ad exchanges and steal profiles with everyone’s private information. You are not asked for your consent. Everyone’s data are collected. Period. If not by Facebook, Google, or Microsoft, your data are being collected by Axciom, Epsilon, Exparian, Adobe, Oracle, or even Equifax, all of which are their marketing partners at some point of the marketing food chain. Facebook, Google, and its partners even lobby against your right to choose not to have your private data used for manipulative advertising. Explain to me how what Equifax is doing is any different from what Google or Facebook are doing? They collect all of your data, including your personal information like social security number, phone number, home address, credit card data, and they score your profile according to the monetization opportunity for advertisers. If you are ranked waste, your data is sold cheap. If you rank higher, you make them more lucrative deals. This is why privacy matters. Privacy matters now. By protecting your privacy today, you are protecting your privacy tomorrow. By standing for your rights now, you are standing up for them in the future. We are defending privacy as a fundamental universal right. Privacy is for everybody equally. If you revoke it for someone, you revoke it for everyone else. Either everyone has privacy, or no one has privacy. Equivalent to Equifax breach will happen with all of your Internet data Facebook and Google collected. Equifax is a case study how poorly companies treat your private information and maintain their security. They are rarely held responsible, because they just vaguely attribute the attack to state actors without any proof, rather than admitting their failure. They know they’ll get away with it, just like the big banks know they’ll get away with predatory lending. The practices of Wall Street are spreading to Silicon Valley. This another example how corporate America rigged the economy and democracy, and ruined everything in the process. If you still don’t care about your privacy, fine. You are free to post your personal information all over Facebook and Twitter. Tweet your passwords, share your bank records, dump your home address and employment history all over the web. Install cameras and microphones into your house livestreaming yourself 24/7 to Google, Facebook, and Amazon, and its hundreds upon hundreds of mergers, partners, and third parties. If you are so actively trying to kill privacy, the foundation of democracy, you might as well just do that. But don’t take down everyone else’s right to privacy with yours. Credits: Echoes of Time, Echoes of Time v2 by Kevin McLoed (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 http://creativecommons.org/licenses/by/3.0/ Follow me: https://www.bitchute.com/TheHatedOne/ https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
I7kz7sqIgEk | 15 Sep 2017
Do you know how to use Facebook anonymously? Facebook tracks you all over the web and to regain your online privacy, you need stop Facebook tracking mechanisms. In this video, you'll learn how to stop Facebook tracking. How much Facebook knows about you? Everything: https://youtu.be/9sFl2qGedFQ Learnt to protect yourself from hackers and doxxing and secure your Facebook account. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf How to use Facebook anonymously Facebook onion link for Tor https://www.facebookcorewwwi.onion/ This is part of my tutorial on how to use Facebook anonymously. The package comes with advanced online privacy protection, malware prevention, and firewall against hackers and governments. This is an unbreakable shield, but it's enough to to eliminate all potential attackers if you are a law abiding citizen. Protect your online privacy from Facebook tracking AI and advertisements. Protect your online identity. Protect your Facebook account from getting hacked or doxxed. ENABLE 2-FACTOR-AUTHENTICATION https://www.eff.org/deeplinks/2016/12/how-enable-two-factor-authentication-facebook Even though this tutorial to use Facebook anonymously primarily targets Facebook users, it's extremely useful to everyone on the Internet. Facebook tracks you even after you logged or don't have a Facebook account. You don't have a choice to opt out. Facebook has hundreds of partners and mergers who never care to disclose their privacy policy to you. You are victim of the biggest organized cyber theft of century. Secure your Facebook account and protect your browsing and online activities from getting tracked by Facebook. Facebook selling your private information - stop Facebook spying on you You can’t trust Facebook with your data. Facebook works with over 190 marketing partners that work with thousands upon thousands of retailers and advertisers. All of your Facebook data are shared with hundreds of data brokering companies, all of which are equally vulnerable to cyber attacks like the one that happened to Equifax. Data brokers who bought your data from Facebook will sell it with your real life identity to whomever is willing to pay for that, without checking the background of their clients. I advise you to watch my breakdown of how and where Facebook collects and sells all of your personal information and online and offline activities. Take back your online security and privacy. Today, we are going to start with Facebook, the most popular social media platform with over two billion monthly active users. Securing your online presence is like securing your house – you just add layers of security features like multiple locks, alarms, and a bunch of starving dogs, to give criminals more obstacles to overcome before they can get it. Facebook uses your assigned identification code to track you across platforms and even on your phone. If you use Facebook apps, you give Facebook access to know what other apps you have installed on your device, and all other personal information Facebook got permission to access. Facebook will take all your private information and match them with your credit card credentials, to link your online activities to purchases in physical and online stores. In order to achieve that, you need a browser that deletes all Facebook’s trackers each time you close it. So that when you restart your browser, a new session will start and Facebook won’t have any access to them. You can either use Tor for all of your Internet traffic. Or set up privacy configured Firefox and have a separate browser for surfing the Internet and a separate one for your online identities. Tor makes it difficult for an observing government agency or an advertiser to correlate your browsing history with your real-life identity. You can blacklist Facebook trackers, together with Google, Twitter, Microsoft, Apple and others that you might come across. You can choose which content you want to allow to run. this is a privacy configuration but this is also essential protection from malware, hackers, and viruses on the Internet. Another good security measure is to have a separate email address just for Facebook. Your Facebook account is probably going to be primary target for hackers. Similarly to having an anonymous phone number, if your email address doesn’t tie back to your real name, it’s a plus. Credits: 'Grind', 'Fall' by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne
P6vlB63B938 | 12 Sep 2017
Pewdiepie N word controversy sparks outrage across the Internet. But few mention that his actions fall under the European hate speech laws. This is Pewdiepie N word legal defense based on the hate speech laws of the United Kingdom, where Felix lives, and European Union Code of Conduct signed with Youtube. Pewdiepie N word legal defense and Europe hate speech laws Many people who defend Pewdiepie on the basis of the right to freedom of speech fail to recognize the fact that Europe generally doesn’t have a freedom of speech. Or more precisely, many European countries have strict hate speech and libel laws. His only option for legal defense would be to prove his words were not intended to stir up racial hatred, or to be threatening, abusive, or insulting. Judges would have to determine whether this apology …. is enough to prove his intent was not a racial insult. Using his words, he probably didn’t threaten anyone, and probably didn’t abuse anyone. But insult is a very broad, general way to describe an offense and Pewdiepie’s act could well fall into this category. I think if Pewdiepie had only a million subscribers, this wouldn’t have been in headlines on more than three websites. But since he is where he is, he is often a scapegoat that is wanted to be held accountable for all the damage advertising controversy has done to Youtube. What is your take on this story? Do you feel like Pewdiepie violated some European laws? I hope this video helped you clarify the European perspective on Pewdiepie N word controversy and free speech in general. I think what’s more important about this case is not Pewdiepie, but the value of the freedom of speech itself in Western democracy. We need to have a conversation about this, but without emotions and political agenda. Freedom of speech affects us all, irrespective of political affiliations. SOURCES: United Kingdom Public Order Act 1986 http://www.legislation.gov.uk/ukpga/1986/64/part/III/crossheading/acts-intended-or-likely-to-stir-up-racial-hatred Pewdiepie N word controversy https://www.youtube.com/watch?v=4jdh7EQRgps Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ Credits: 'Free' by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
9sFl2qGedFQ | 09 Sep 2017
Facebook tracks you online and offline, creating profile for targeted advertisements. Facebook knows what you buy and what sites you visit. Do you know where Facebook sells your private information? They have so much they can turn masses against their own government or manipulate people's emotions by tweaking their social media feeds. The cost of letting somebody know everything about you is just too high. You should stop using Facebook. My bitcoin address: 1NmqcqYRZVmbCWweaREigX6qZVdtGND6Mx Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Facebook tracks you online and offline | Facebook privacy policy It's known that Facebook collects and sells all of your personal information on their social network for their Facebook ads.Facebook tracks your online and offline activities everywhere you go. With newly introduced Facebook IDs, Facebook will recording your browsing history through social media plugins and like and share buttons on websites, and use Facebook mobile apps to track your offline activities, physical location, and telemetric data. Stop using Facebook | Facebook sells your information Facebook privacy issue is a severe threat to our current democracy. Facebook stands behind big data broking marketing industry that collects your personally identifiable information, creates a personalized profile on you, and sell that information to retailers and governments around the world. There is no privacy protection. It's not explained in the Facebook privacy policy. You have no idea to know where Facebook sells your private information Facebook targeted advertisements | Facebook privacy Acxiom collects Facebook data and matches them with your personally identifiable information. The goal is to sell customer recognition to its retail clients. Will you stop using Facebook? Sources: Facebook Atlas ad platform https://www.nytimes.com/2014/09/29/business/with-new-ad-platform-facebook-opens-the-gates-to-its-vault-of-consumer-data.html https://atlassolutions.com/2014/09/29/meet-the-new-atlas/ https://atlassolutions.com/product-tour/ https://atlassolutions.com/partners/ https://atlassolutions.com/why-atlas/introduction/ Facebook privacy policy https://www.forbes.com/sites/anthonykosner/2013/08/31/new-facebook-policies-sell-your-face-and-whatever-it-infers/#2bb368f0273a Facebook ads sharing your personally identifiable data http://edition.cnn.com/2010/TECH/social.media/10/21/facebook.gay.ads/index.html Facebook apps collecting and selling personal information https://arstechnica.com/tech-policy/2010/10/many-faceook-apps-found-to-be-collecting-selling-user-info/ Facebook tracking through social like and share buttons and plug-ins https://securehomes.esat.kuleuven.be/~gacar/fb_tracking/fb_plugins.pdf From social media service to advertising network. A critical analysis of Facebook’s Revised Policies and Terms http://www.law.kuleuven.be/citip/en/news/item/facebooks-revised-policies-and-terms-v1-2.pdf Acxiom data broker http://www.nytimes.com/2013/09/05/technology/acxiom-lets-consumers-see-data-it-collects.html Acxiom Audience Operating System https://adexchanger.com/analytics/acxiom-prepares-new-audience-operating-system-amid-wobbly-earnings/ Acxiom customer recognition and 360 degree view on consumers http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all FTC seeks privacy regulations and Acxiom is aware http://www.nytimes.com/2012/03/27/business/ftc-seeks-privacy-legislation.html?pagewanted=all https://www.nytimes.com/2014/05/28/technology/ftc-urges-legislation-to-shed-more-light-on-data-collection.html FTC report on data broking marketing industry https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf Epsilon security breach http://www.nytimes.com/2011/04/05/business/05hack.html?_r=1 Surveillance economy http://www.nytimes.com/2012/12/09/business/company-envisions-vaults-for-personal-data.html Ranking of consumer according to their monetization opportunity http://www.nytimes.com/2012/08/19/business/electronic-scores-rank-consumers-by-potential-value.html Advertising is NOT anonymous Stanford research http://cyberlaw.stanford.edu/blog/2011/10/tracking-trackers-where-everybody-knows-your-username http://www.centerfordigitaldemocracy.org/sites/default/files/20100407-FTCfiling.pdf Do not call law http://donotcallus.net/federal-laws.asp Credits: Shadowlands 1, Dark Frog, Satiate, Stormfront, Bicycle by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
snA4KjE9qcE | 30 Aug 2017
Are Youtube alternatives viable option today? It's hard to build a video sharing platform that will compete with Youtube, when even Google can't make it profitable. This is my review of some Youtube alternatives and current problems alternative video sharing websites face. Which alternative to Youtube is the best? Some alternatives to Youtube could actually make some significant noise in the coming years. But most video sharing websites struggle to gain traffic. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 If you are content creator and consider that you stop using Youtube, you can turn to these alternative video sharing platforms. What best Youtube alternative should do Should any Youtube alternative succeed, it ought to give people a strong motivation to stop using the second most visited website, second largest search engine, most profitable digital marketing platform, and most open video sharing service in the world. A proper Youtube alternative that’s gonna be successful needs to be doing things Youtube does right, and correct things Youtube does wrong. It can’t be opposite to Youtube. It has to be a social network where people are able to connect easily without a steep learning curve. The hurdle of transferring from Youtube to another platform must be very low. The alternative platform essentially needs to be a search engine with smart algorithms able to show results people are looking for. It has to be possible to optimize the content for search engines and have them indexed in search aggregates. It can’t be an isolated website people have to actively look for to find. Successful Youtube alternative is going to have to balance the relationship between creators, advertisers, and its own platform. Many promises and desires about Youtube alternatives are that they fix the copyright abuse problem, broken flagging system, totally unusable Youtube comment section, and won’t actively take down or demonetize channels or videos that conflict with the politics of Youtube and its advertisers. De-google-ify yourself from Youtube! Vimeo has been around as long as Youtube and is a name that is perhaps equally as known as Youtube. It has only one problem. Vimeo is nowhere near a Youtube alternative. Vimeo strictly doesn’t display any ads over its videos. The only revenue stream for content creators is if their viewers pay to watch. Which means you’d have to have some strong motivation to pay for content and that’s not an option for unestablished creators. Vid.me review Vid.me is not a good Youtube alternative either because it's less popular than Vessel and Vessel got shut down very soon after its launch. Vid.me doesn't offer anything special for viewers and creators to subscribe to their website. Minds.com review In my short review of Minds I mostly rant about its user interface and lack of features. I like minds core ideas, but from UE and UI perspective – are they trying to be an alternative to Facebook? But they do call in a lot of Youtubers promising payoffs from various monetizing features – like peer-to-peer support, paid subscriptions, donations, and they apparently want to make an alternative to patreon. Minds doesn’t have any objective reasonable algorithm content creators could follow to make their videos searchable. Search engine optimization is completely absent, videos are viewed as posts, which makes it impossible to search for them by merit, you can’t add tags to your videos, if you share your videos they’ll get zero views unless you boost. The channel’s content is viewed as posts in feed and not list of videos on a channel page. Bitchute.com review Bitchute could actually be the best alternative to Youtube by design of its own project. But it lacks the momentum. Bitchute trades as a peer-to-peer network based on a web browser version of bit torrent. This means that the site’s developers do not provide their own servers for hosting the videos, but rather spread this costly burden to the network of torrent users seeding file storage from their devices. Bitchute currently doesn’t serve its own search. Any search will transfer you away from their website to DuckDuckGo’s search engine, which proxies results from Yahoo. It is crucially important to see a thumbnail of a video. Youtube heavily relies on it. Videos wouldn’t get nearly as discovered if they were offshoot of Google index pages. You don’t search for videos to read but to watch. Credits: Instrumentals by https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne
xFHRP3saw7o | 25 Aug 2017
Secure your privacy and claim a new encrypted email at these secure and private email services. Follow my guide to gmail alternatives and end-to-end encryption using private email providers as part of degoogleify campaign. I made this channel because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Tutanota.com review 5:20 Mailfence.com review 8:20 Disroot.org review 10:42 Protonmail.com review 12:54 Secure and private email service - De-googleify yourself! End-to-end encryption protects your email messages from being stolen by hackers, read by spies, or used by Google or Microsoft for targeted advertising. Encrypted email is essential for protection of your online privacy, security, and digital rights. Mainstream email providers like Yahoo Mail, Gmail, or Hotmail, don't offer you end-to-end encryption because that would jeopardize their business model. However, your personal email should be completely private and not read by companies to make a profit off of you. Luckily, there are plenty of gmail/yahoo/hotmail alternatives that keep your messages private and secure from prying eyes of advertisers and governments. Don't expose your private email messages to hackers, cyber criminals, identity thieves, and governments around the world you can’t trust. Sign up with one of these secure and private email providers for an encrypted email. All of these private email services offer free basic entry for account creation, end-to-end encryption using asymmetric public key cryptography, public cause and activism, anonymous sign-up. What is end-to-end encryption, public key cryptography and asymmetric encryption? Asymmetric encryption is the one where users generate two keys to encrypt their data – a private key, and a public key. When someone wants to contact you securely, they use your public key to encrypt the message. To read the message when you receive it, you decrypt it with your private key. Since public keys are available to everyone, you need to make sure nobody tried to spoof your identity using your public key to impersonate you and communicate with your contacts. Tutanota.com encrypted email service review utanota is a free and open source email service based in Germany. The name stems from Latin and translates as “secure message”. Tutanota user experience feels very nice and smooth. Intuitive, logical, nothing new to learn. This is exactly what a privacy email alternative should look like. The basic option is 1 GB of free space that you can devote to your emails and contacts. Tutatona offers you a premium version. It’s possible to send encrypted messages via Tutanota’s application to external accounts. Mailfence.com secure and private email review This is another end-to-end encryption email service but unlike Tutanota, Mailfence supports OpenPGP so that you can manually exchange encryption keys independent from Mailfence servers. The website’s interface is also simple and clean-looking. Basic account will give you 200 MB in messages and additional 500 MB for documents. You can upgrade for 5 and 12 GB plan with unlimited calendars and contacts, or get a pro account with 30 GB in messages and 24 in documents for only a little over 8 bucks a month. Disroot.org protect your privacy review Disroot is one of the two services on this list that similarly to mailfence, enables you to use third party mail clients via POP or IMAP to store your messages locally. Disroot is an encrypted email service with SSL and TLS to transfer your messages as “envelope” and not a “postcard”. Protonmail.com Swiss-based encrypted and secure email review Swiss based encrypted email service developed by scientists from CERN and MIT, Protonmail offers top security and privacy in their end-to-end encrypted webmail application. Protonmail offers two-factor-authentification, but you can also create separate mailbox password. Credits: Instrumentals Real Chill and Spite, Momentum, Faded Nights, Now by https://www.youtube.com/user/CHUKImusic Chill Wave and Shadowlands 4 by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/ EFF Flickr images Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne
iVfnQUovgWA | 20 Aug 2017
If you want to stop using Google and are looking for Google Search alternatives, here is a list of top 5 best privacy search engines. If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%! Degoogleify yourself! Google monopoly power is a dangerous problem and alternative search engine are necessary to diversify our cyber ecosystem. Follow my guide to privacy search engines to learn more. Help me build the first crypto-funded channel on YouTube by donating to one of my addresses. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Dash Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc Litecoin LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT Ethereum 0x6F8bb890E122B9914989D861444Fa492B8520575 Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne These are the best Google Search alternatives Guide to privacy search engines Qwant.com review - search engine that respect your privacy First on the list of Google Search engine alternatives is made in France Qwant. Searx.me review Second privacy search engine, perhaps the most private search engine of all, aggregating search results from other major search engines, including Google. Startpage.com review European based search engine that provides private Google search results that completely anonymous. Ixquick.com Is the same search engine as Startpage but acts as metasearch engine aggregating results from various search engines rather than just Google. Duckduckgo.com review Search engine that doesn't track you My top privacy search engine that I set as default one is DuckDuckGo.com. I love this private search for its range of features, community aspect, onion website on Tor network, and potential of DuckDuckGo to replace Google Search engine in the future. It's hard to find the best alternative search engine to Google but I hope that my guide to private search alternatives made it easier for you to decide. Google can't be trusted as a search engine as the company frequently manipulates search, censor websites based on their political persuasion, threatens small businesses, and prioritizes its own content above others. If you want to learn more about why to stop using Google, check my video "Why you need to stop using Google - How Google monopoly threatens everything" to learn more. https://youtu.be/vZBa5-wFAfQ Help us fight for our digital rights: https://act.eff.org/ Credits: Lucid, Dazed by Chuki Beats https://www.youtube.com/user/CHUKImusic Some graphics were from Flickr account of the EFF The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
6ZOc8gNDQpc | 16 Aug 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Firefox fake news bandwagon is happening. Mozilla joins fake news propaganda Is it time for Firefox alternatives? Let's analyze the Mozilla Information Trust Initiative It depends on how important the issue of this establishment agenda is for you. If you fear fake news will censor Internet, then you can ditch Firefox in favor of alternatives like Palemoon or Waterfox. But don't fall into false illusions that by switching to Chrome from Firefox, you are doing the world a favor by boycotting Firefox fake news agenda. The Mozilla Information Trust Initiative https://blog.mozilla.org/blog/2017/08/08/mozilla-information-trust-initiative-building-movement-fight-misinformation-online/ Is Mozilla fake news now? Mozilla recently launched a systemic effort called as Mozilla Information Trust Initiative to use Firefox to combat fake news and misinformation on the Internet. What Mozilla wants to do now with the whole Firefox, Pocket and Coral filtering fake news thing, is to basically serve as a useful idiot to the established mainstream media. Media need to be challenged. Clearing their path off of competition will only make the "credible sources" become fake news as well. So in the end, Firefox is not really combating misinformation and fake news on the Internet, but promotes elitism among journalists and creates more walls among ordinary users and establishment insiders. This could also jeopardize the whole Mozilla Foundation, as Firefox fake news Mozilla Information Trust Initiative will set a precedence to tweak Mozilla's core principles to fit the current political narrative. And that might affect efforts to keep net neutrality a status quo and protect our online privacy. Web browsers Pale Moon https://www.palemoon.org/ Waterfox https://www.waterfoxproject.org/ Brave https://brave.com/ Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ Credits: Instrumentals by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
vZBa5-wFAfQ | 12 Aug 2017
Why you need to stop using Google - because Google can't be trusted as a search engine any more. I made this channel because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take care of itself. If you too believe this cause and want to help in this pursuit, you can donate to any of my cryptocurrency wallets. I am not a professional. I just try to spread the message I believe is important. I am non-partisan. I always will be. Why stop using Google? Because relevant advertisement don't make up for relevant search results. Because Google maniuplates search results. Because Google tracks almost then entire Internet to make more profit and hands over all this data to whatever government requests it. That's why you need to stop using Google now. Bitcoin: 1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Whether you think private corporations can do whatever they want, Google does abuse its monopoly power at the expense of all small to medium size enterprise. Google manipulates search. The company has captured way too big a chunk of the search engine market and now its position is an obstacle to many small businesses wanting to compete. Google's "don't be evil" is the irony of century. Google is evil Google is a monopoly. It doesn't have a competition. However, there are alternatives to Google. For Google search engine alternative, I use DuckDuckGo, but other search engines like startpage or xsearch are also good. I also don't use Gmail, which I replaced for Protonmail, end-to-end encrypted email. I think this is the best Google alternative of all. I never use Google Chrome. I stick with Firefox or I go for Brave if I need anything more. People should stop using Google because Google manipulates its search results, creates personalized filter bubbles, and abuses its monopoly power by prioritizing its own Google content and services over others' irrespective of merit. This is the main problem with Google and why you should stop using Google now. Google also manipulates search by filtering results with personalizing algorithms. Also Google Search censors certain content according to Google's political persuasion. It's up to you whether you want to call it Google censorship or not, but the truth is that if you want your business to emerge and Google doesn't display you on their search engine, you don't exist. Google holds between 80 - 90 per cent of the search market. If you are not advertised with Google, your business doesn't exist for the rest of us in the world. Did I persuade you to stop using Google? Maybe you can read some more sources that I used in making of this video. Learn to degoogleify yoursefl! Ok Google! Don't be evil! Sources worth reading https://arstechnica.co.uk/tech-policy/2016/05/google-antitrust-case-europe-details-analysis/?comments=1 http://europa.eu/rapid/press-release_SPEECH-12-372_en.htm Google vs Foundem monopoly abuse timeline http://www.foundem.co.uk/Foundem_Google_Timeline.pdf http://www.telegraph.co.uk/business/2016/05/14/google-faces-record-breaking-fine-for-web-search-monopoly-abuse/ https://www.medianama.com/2016/04/223-eu-android-contracts-anticompetitive/ https://techcrunch.com/2016/03/14/google-loses-android-antitrust-appeal-in-russia/ EU memo on Google monopoly abuse http://europa.eu/rapid/press-release_MEMO-15-4781_en.htm Google monopoly abuse in India http://economictimes.indiatimes.com/tech/internet/cci-charges-google-with-rigging-search-results-flipkart-facebook-corroborate-complaints/articleshow/48736706.cms Google Android licensing abuse https://arstechnica.com/gadgets/2014/02/new-android-oem-licensing-terms-leak-open-comes-with-restrictions/ Credits: Ossuary, Echoes of Time, Thunderbird by Kevin McLoed incompetech.com licensed under a Creative Commons License Urban Deliberation by Teknoax Drizzle to downpour by Youtube Audio Library Mystery by Holix Help us fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
0cKEyag7jBM | 08 Aug 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Why no one cares about online privacy or government surveillance? At least not enough? Why are people not concerned about businesses and governments tracking their every step? Hearmy advice to privacy advocates that I compiled based on my experience. Care about government surveillance! Check out my Online privacy tutorial and learn how to protect your privacy online https://youtu.be/n-A8RVB9Cdo After finishing this video on why I think nobody cares about privacy, I noticed that there could be someone who would hear my message as criticism of privacy advocates. But that's exact opposite of my intent. I am join privacy advocacy every day, and I just want to share my experience I've had with other activists, and I'd like to advise fellow privacy advocates to avoid those mistakes I saw other activists make. In this video I share some privacy arguments against mass surveillance, bulk collection and corporate spying. #1 Don’t be like vegans. Don’t expect people to turn full Richard Stallman after you had a conversation with them. If you are privacy activist and see an asshole like this, don’t align yourself with unless they cool their head. #2 Don’t expect everybody to be uniformly informed People have different priorities and rightfully so. Some people have multiple jobs and struggle live salary to salary. They’ve got enough of their daily struggles and they don’t have any energy left to pay attention to other stuff (like protecting their privacy and fighting for digital rights). Not everybody can care about government survaillance. #3 Legal battle is more important than user awareness Even if we persuade all people to VPN-up, use encrypted services, and ditch big brother altogether, we still lose because the legal loopholes will still be there to prevent such a scenario from taking place. Digital communication needs to be protected the same way as physical. Your private emails and messages should be private and not even providers of those services should be allowed to attempt to access them and capitalize on their content. #4 Filter out conspiracies But additional unproven conspiracy theories just deligitimize all the effort of those who try to point to the already proven existing problems. #5 The liberty argument works People might trust their government now, but they can’t rule out that the power will always attempt to turn against them. Every government activity we accept today sets precedence for future to build blocks upon blocks of abuse on top of it. We really are approaching a state where it won’t be possible at all to live without having the prying eyes on you every second of your life wherever you are. #6 Learn and explain bureaucratic politics Every branch of government competes for public resources. Credits: Instrumentals provided by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
lXOviwA-N64 | 05 Aug 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Hi, this is Bitcoin Cash explained video. What is Bitcoin Cash? A new cryptocurrency was created as fork of original Bitcoin. Explaining Bitcoin Cash is like trying to shoot a moving target - there is lot going on in with the new blockchain. At some point, it looked like Bitcoin Cash will crash, but right now it does receive more support from mining pools. After all, everybody who owned bitcoins on August 1st would be rewarded equal amount Bitcoin Cash. That's some extra money for free, right? This video is about Bitcoin Cash explained! Enjoy my bitcoin cash video explanation! Well not so many people were to eager to deal with Bitcoin Cash, which resulted in a state where it was impossible to move it, sell it, or cash for fiat money (e.g. dollars). So what is Bitcoin Cash exactly? What is bitcoin cash? Bitcoin Cash is a fork of Bitcoin. Bitcoin is an open source cryptocurrency that relies on pure mathematics and economics to determine its value. Since the software of Bitcoin is open source, anybody can take it and create their own currency. The real catch here is that it needs to be supported, if you want it to have any value. Bitcoin cash fork a new cryptocurrency Bitcoin Cash was created because some developers and few big mining pools wanted to increase size of Bitcoin blocks from 1 MB to 8 MB. Each block holds a number of transaction, which take up some space of bytes. These are blocks are validated by solving difficult puzzles, for which miners receive rewards (Bitcoins). Bitcoin blocksize limit debate However, the bitcoin's block size limit allowed maximum of 7 transactions a minute. And as Bitcoin grows in number of users, this cap was soon to be hit, which resulted in slow down of confirmations of transactions. Bitcoin growth The limit is made to secure the network and ensure its decentralized nature that prevents big players from gaining control. That wasn't appealing to some people who view Bitcoin's growth as more important than decantralization and security. This dispute over Bitcoin's block size limit was going on for over 2 years and escalated into now forking Bitcoin Cash as a separate cryptocurrency independent from Bitcoin. Both Bitcoin and Bitcoin Cash exist and trade simultaneously, and they have no direct effects on another. Difference between Bitcoin and Bitcoin Cash is now like between Bitcoin and Ethereum, or any other cryptocurrency in the world. What does Bitcoin split to Bitcoin Cash mean in the long run? That's really hard to tell. Bitcoin Cash was made to surpass or even replace original bitcoin, but bitcoin is now growing value, surpassing $3,000 dollar milestone just after the fork of Bitcoin Cash. Bitcoin will implement SegWit, Segregated Witness, to deal with the pressure of its own growth. You'll learn what is segwit in this video. Nevertheless, it's going to be extremely interesting and worthwhile studying cryptocurrency as they keep growing on value, influence, and bitcoin is now even entering mainstream. Sources: To understand Bitcoin and cryptocurrency: http://www.michaelnielsen.org/ddi/how-the-bitcoin-protocol-actually-works/ Bitcoin blockchain technology https://www.coindesk.com/information/what-is-blockchain-technology/ Bitcoin Cash just split https://arstechnica.com/tech-policy/2017/08/why-the-bitcoin-network-just-split-in-half-and-why-it-matters/ https://arstechnica.com/tech-policy/2017/07/a-new-deal-could-end-bitcoins-long-running-civil-war/ Bitcoin block size limit https://www.cryptocompare.com/coins/guides/what-is-the-block-size-limit/ What is SegWit https://www.cryptocompare.com/coins/guides/what-is-segwit/ https://mybroadband.co.za/news/banking/206742-bitcoin-and-ethereum-vs-visa-and-paypal-transactions-per-second.html http://www.businessinsider.com/bitcoin-cash-price-may-be-house-of-cards-close-to-collapsing-2017-8 Credits: Painted Indigo by Teknoax Real Chill Experimental Freestyle Hip Hop Instrumental (With Trippy visuals) by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
jIEN8Lo4RqE | 02 Aug 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- How to protect your computer from malware and hackers in 2017? Protection against malware and viruses is often presented as a far to simple task. "Just install an antivirus and back up your software and you'll be fine." However, to truly protect yourself from malware, viruses, and hackers, you need change your thinking and daily computing habits. Follow my 2017 malware protection tutorial to learn more about what you can do to protect your computer from malware and viruses. #1 Don't rely on following "10 tips to protect your computer from malware". Cybersecurity is a process not a product. There are 700 million malwares in existence right now. You need be more vigilant than just following ten easy tips on how to manage your cyber security and protection against malware. #2 Malware is not just viruses. There are so many types of malware that require different approach to protect yourself from them, that having an antivirus can be as far as even more damaging than not having one. You need to understand that malware executes itself just like any other program (in most cases). That means it need administrative (root) privileges, which YOU, the user, have to grant it in order to function. On windows you probably use administrative user account by default, but that's the biggest security flaw of your system. You need be logged in as standard (non-admin) user and elevate privileges only if you have to install a trusted software. Linux does this job for you by default, so if you want best security you can get, install Linux and use it as much as you can. #3 Use common sense. To protect your data from getting encrypted by ransomware, always back up on external hard drives. 2 is 1 and 1 is none. To protect against software vulnerabilities, do regular security updates. To protect your computer against malware with remote access, use non-admin account and install software only from trusted sources. #4 Never trust anyone with your data, don't trust anybody to do the job for you. Even patched systems can be vulnerable, because many times companies don't immediately fix vulnerabilities - Wannacry and Petya ransomwares were created like this. No antivirus can protect you from the 700 million malwares that are in the world. You are responsible for your security so take it that way all the time. Sources: http://www.techrepublic.com/article/cyberweapons-are-now-in-play-from-us-sabotage-of-a-north-korean-missile-test-to-hacked-emergency/ https://thewire.in/137220/wannacry-cyber-security-threat-us-non-proliferation/ http://www.techrepublic.com/blog/it-security/security-is-an-ecosystem-not-a-product/ http://www.techrepublic.com/article/cyberweapons-are-now-in-play-from-us-sabotage-of-a-north-korean-missile-test-to-hacked-emergency/ Credits: The Complex s by McLoed (incompetech.com) http://creativecommons.org/licenses/b... 'Reveal' by Chuki Beats https://www.youtube.com/user/CHUKImusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help fight for our digital rights: https://act.eff.org/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
w_z0ZAsJD1Y | 12 Jul 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Should you turn off Windows Update and manually keep your operating system up to date and patched? Troy Hunt, a cyber security expert and technology blogger, thinks telling people to turn off Windows Update is an idiotic advice. Today, I jump into the debate on whether you should rely on Microsoft to keep your devices secure or should you do extra steps to protect yourself and evaluate the trade-off of privacy, convenience and security for yourself. My argument is that relying on Windows Update for security is not enough. Microsoft is not doing enough to patch its operating system and Windows has never been meant to be connected to the Internet. In other words - because Windows is always insecure, you should never trust Microsoft with your data. Windows update doesn't offer you enough security, but takes away your privacy and the control over your own system. The trade-off is leaning towards turning of the Windows Update and keeping your system up to date and secure manually. You can always manually update your system to stay secure, but on top of that you'll gain more control and privacy over your system and data you have got on it. Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ Sources: https://www.troyhunt.com/dont-tell-people-to-turn-off-windows-update-just-dont/ Credits: Severe Tire Damage by Incompetech.com The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
FXfu4SoqPME | 03 Jul 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ New Petya based ransomware is spreading through the world encrypting disks of patched and unpatched computers. It doesn’t just encrypt all the files on your computer, it targets the entire filesystem, which means the whole operating system is rendered unusable. Initially, the ransomware was receiving payments of $300 in bitcoin, but since their email address to exchange the keys was blocked, once a disk gets encrypted, there’s no going back. This ransomware appears to be more professionally coded, doesn’t have as many bugs and is distributed through several vectors of infection. To spread through the Internet, Petya uses the EternalBlue exploit, a nickname by the NSA for a Windows SMB-v1 vulnerability. Once it infects just one device it spreads through the entire network via PsExec by accessing administrative credentials of the infected computer. Windows is too dominant in current times. And it requires a whole lot more attention to keep the system safe. Sys admins and individuals in general are going to be forced to diversify their systems otherwise they will be just as vulnerable as their lazy neighbor. Linux will eventually become a necessity. It’s not just that it has smaller market share that makes it more secure. Its architecture with separate root and user access and the presence of incredibly diverse distributions make Linux the most secure and reliable operating system there is. And on top of that it’s completely open source and free. So why should anybody ever pay hundreds of dollars for systems that fail on regular basis? Apple, Microsoft and Google are going to hate this fact, but developers are going to have to support Linux as the most secure and fastest platform on the market. Sources A new ransomware outbreak similar to WCry is shutting down computers worldwide https://securelist.com/schroedingers-petya/78870/ Petya-based ransomware using ternal blue to infect computers around the world https://blog.avast.com/petya-based-ransomware-using-eternalblue-to-infect-computers-around-the-world Avast analysis of the Petya ransomware https://www.avast.com/c-petya Analysis of the Wannacry ransomware two weeks after https://blog.kryptoslogic.com/malware/2017/05/29/two-weeks-later.html notPetya / Petyawrap is deadlier than Wannacry https://www.forbes.com/sites/thomasbrewster/2017/06/27/petya-notpetya-ransomware-is-more-powerful-than-wannacry/#3dfd7536532e Credits Framework by Youtube Audio Library The Complex by Incompetech.com The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
qf_-mMrH0Bg | 23 Jun 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ How authoritarian is the European Union? The idea that the European Union might actually deeply authoritarian transnational organization may come as a slanderous statement. But in reality, the structure of the European Union is fundamentally undemocratic. There is no room for democratic representation, its mechanisms are too complicated, decision making is conducted by unelected groups, and the laws are too powerful and abrogative across the board. In my analysis, I am trying to make a case why the European Union is actually an authoritarian organization. Democratic deficit of the European Union The idea of democracy stems from the principle of localization – that is you can only be represented to a certain level of geographical coverage. In the ancient Greece, it was small city-states the size of today’s small towns. After that, the establishment of democracy turned nation-wide, but the most successful projects still relied on great ability of as local representatives as possible to keep check on the central government. That’s why modern democratic countries are split electable districts, regions, cantons, departments… only local population can know the best who they are voting for. The legislative power in the European Union is shared between the Parliament and the Council, none of which can propose a legislative initiative. In other words, the only directly elected body that the people are normally supposed to be represented by cannot make laws of its own. What a great way to start. Laws are only proposed by the European Commission, which acts as the government of the EU. To be fair, European Parliament does have a right to politely ask the Commission to make a law. But it can’t dictate anything to the executive branch. But what’s more interesting is that a minority of Western states outnumber the rest of the Union in the number seats. For example, you could count Germany, France, Italy, United Kingdom, Spain and Netherlands and you would already have 392 votes, a simple majority in the parliament of 747 members. This is troubling, because whenever it comes to voting on for example economic issues where each state should have an equal state, this coalition tends to vote commonly so that they silence the majority of other states. Even after UK leaves the EU, you just add Sweden and Belgium and you still get 384 votes, a comfortable majority. Democracy has to have a geographical limit. You can’t have global or continental democracy The furthest you can go is state, but even that is divided into smaller governing areas with local constituencies. For ordinary people with daily problems, it’s hard to follow their own domestic politics, not to even get know politics of other countries that can create laws on top of their state legislature. That’s why the voters’ turnout at the European Parliamentary elections are so ridiculously low. People don’t see the European Union as their legitimate government. It is hard to keep the political establishment of your local country in check, not to mention making sense of the politics of foreign nations you have nothing in common with. Sources Members of European Parliament by country and political affiliation http://www.europarl.europa.eu/meps/en/crosstable.html Legislative procedure in the European Union http://www.europarl.europa.eu/external/appendix/legislativeprocedure/europarl_ordinarylegislativeprocedure_howitworks_en.pdf European Commission https://europa.eu/european-union/about-eu/institutions-bodies/european-commission_en Council of the European Union (European Council) http://europa.eu/european-union/about-eu/institutions-bodies/european-council_en On democratic deficit http://www.economist.com/node/21555927 http://euanddemocracy.ideasoneurope.eu/2017/04/06/eu-democratic-deficit-recurring-unaddressed-problem/ Credits Music: Hitman, Undaunted by Incompetech Wish You Were Here by Joakim Karud The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
8qNQWs707PQ | 13 Jun 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ Universal Basic Income is not a solution Universal basic income. If even Elon Musk supports this idea, it must be revolution. Or could it lead to the end of democracy? For the past 10,000 years, human economic interaction depended on the ability to exchange goods and services for other commodities and eventually money. Today, automation has a potential to destroy 45% of our jobs. If there comes a time when large portion of population is no longer economically productive, implementing universal basic income would eliminate poverty, bud deepen income and wealth inequality. Universal basic income would permanently separate wealthiest technology owners from everyone else who didn’t happen to create a multi-billion dollar technology start-up. With everybody receiving equal amount of benefits without having the ability to earn for themselves, the option to improve your standards would disappear. It would eventually make everybody own equally basic wealth except for those who make the decisions. Essentially, everybody who doesn’t own artificial intelligence will fall into this category. If you give unemployable people universal basic income, you sure improve their living standards, but nothing is going to change on their ability to participate in the decision making. Their voice would be limited to casting a vote to whomever promises them the highest benefits. Not only is the universal basic income just one option out of many when dealing with poverty, it’s the least desirable. The fact that the Sillicon Valley so keen on introducing this idea so much ahead of its time is deeply troubling. It would grant them ultimate monopoly powers on the market as they would be the first and only owners of the automation. Universal basic income would thus make barriers to entry the market with your own entrepreneurship, because you wouldn’t be able to increase your income or make profits on your own. The real problem why automation deepens inequality is the existence of high barriers to entry the market and diversify competition in automation driven industry. Most of the artificial intelligence is through corporate protective regulations within the hands of few multi-billion dollar transnational companies. The rate of new entrepreneurs entering the market is declining fast. Technology start-ups are no longer focusing on creating new products, but rather spend most of their resources on improving the data collecting AI to make it more and more invasive. It creates a multi-billion dollar bubble that will burst once buyers no longer have enough wealth to keep their spending. Universal basic income sounds like the same solution as the financial bailout of the banks that crashed the economy. That is a no solution at all. Sources: Milton Friedman on negative income tax: https://www.youtube.com/watch?v=xtpgkX588nM OECD basic income policy report https://www.oecd.org/social/soc/Basic-Income-Policy-Option-2017.pdf Universal Basic Income is not an Innovation Policy https://www.forbes.com/sites/washingtonbytes/2017/06/06/universal-basic-income-is-not-an-innovation-policy/#381e31142e8f Credits Music: The Framework by Youtube Audio Library Painted Indigo, Further Investigation by Teknoax.com The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
i_gDrA6jhQk | 01 Jun 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ How to read the news? Are you getting lost into abyss of misinformation and overload of events? There's too much happening the world. How do you find the truth? During my studies, I came up with my strategy on how to read the news so that you are immune to misinformation. Follow my guide and take some tips on what you can do to stay informed on what's truly important in the world. The number one suggestion I make on how to read the news effectively is to prioritize your short range of topics. You can't be uniformly informed about everything. Rely on yourself and choose the topics that are closest to you based on your preferences, interests, profession or hobby. Something you understand already. Search for news headlines using duckduckgo search engine. Pick a couple of articles from different sites. Choose ones with the most diverse background. Read comments and participate in forums. Reddit is very helpful. Don't worry about daily coverage. Deeper knowledge is more useful than following everyday events. Credits: Music by ChukiP http://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
KpplFma_27s | 27 May 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Help us fight for our digital rights: https://act.eff.org/ Google aims to connect online ads to physical stores http://www.chicagotribune.com/business/ct-google-online-ads-retail-shopping-20170523-story.html Google will spy on you in physical stores – Can businesses really do anything Google will now spy on you even if you go offline. They will be able track your credit card purchases at physical stores to your online activity and advertising identity. Google celebrates it can prove advertisers that its online ads work even on purchases on the streets. It is also able to suggest personalized advertisements suggesting nearby stores to someone's location. Great right? A great nightmare for privacy. Tracking of credit card payments at physical stores bridges the gap between your online and offline activity. The only way you can avoid being spied on offline by Google is to use cash payments. But how long before face recognition will be installed into CCTVs inside stores to get your identity when you pay in cash at a counter? Google has now crossed a final line into the absolute state of surveillance. The potential for endless spying is enormous. Can businesses do really anything? I strongly disagree that private businesses can spy on people all they want. It's illegal for a private post company to read its costumers letters. Why is it legal for Google to read Gmail messages? It's illegal to stalk people in real life, why is it ok for Amazon and Facebook to track people's activity outside their websites? It's illegal to peak into people's private properties, why is it legal for tech giants to eavesdrop on people through recording webcam and microphones on their devices? The law is clearly behind on the technology. We need to apply the same rules that protect our physical privacy to safeguard our online privacy as well. People's data are they own data. Not the company's they happen to generate them at. This is something that cannot be solved by ditching Google in favor of alternatives. Soon, there will be no viable alternatives to choose from anyway. But even if ethical open source developers will keep producing privacy concerned alternatives, the interconnectedness of the chain of advertisers makes it impossible to keep away from the prying eyes unless you stay of the grid completely. Undoable in modern society. Tracking offline payments has to be stopped immediately before it grows into the unstoppable monster. People's identity and privacy has to be protected to maintain society free from surveillance and culture of fear. Credits: Music by Chris Zabriskie The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
yt7q8uHveP4 | 16 May 2017
Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Windows patch: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598 On Friday 12 2017 a patient expecting his heart surgery was just getting prepared for his operation that was about to begin, when a surgeon walked into into the room announcing “the surgery has to be canceled because we’ve been hacked”. They saw a strange message on their Windows-based computer systems informing them that all their data have been encrypted and the only way to unlock them is to pay $300 in bitcoin. Failing to do so in three days would result in doubling the ransom and then completely shutting down after seven days should the victims refuse to pay. Within hours 48 of Britain’s National Health Service hospitals, offices and ambulances have been rendered unusable by this malware. 11 out of 14 Scottish NHS boards were also hit. Soon, reports of Wanna Cry ransomware have emerged from Spanish telecom giant Telefonica, Protugal Telecom, US FedEx, Chinese schools, Italian university lab, Sweden’s local authority, Deutsche Bahn, Nissan’s manufacturing center in England, and even Russian Interior Minister. By the end of Friday, the malware spread to estimated 80 countries around the world. And from observing the Bitcoin traffic, around $33,000 worth of cryptocurrency have circulated towards the Bitcoin accounts displayed on the ransomware. The malware was bound to become one of the largest cyberatacks in history and the most severe ransomware ever. As of right now it is estimated that the Wcry ransomware could have affected over a quarter million computers in 150 countries. This malware was spreading through the internet like a worm, and not an ordinary cyber attack, utilizing the weaponized Microsoft Windows vulnerability EternalBlue, developed by the National Security Agency, and recently stolen and leaked by the Shadow Brokers hacker group. The attack was so serious that Microsoft released immediate security patches for version of the operating systems it no longer supports – including Windows XP, Windows 8, and Server 2003. The problem was that the attackers only used a hole in the system to spread the virus they learned about almost exactly a month ago. There is no guarantee that even patched systems couldn’t get affected. In the meantime, a 22-year-old cybersecurity researcher from UK discovered a kill-switch by registering a domain name, which was hardcoded into the malware in case the attackers wanted to shut it down. However, nothing can stop them from bypassing this kill-switch by creating a variant with a different domain name. As of right now, the kill-switch only managed to stop massive spread of the virus into the United States. But that may just be temporary. What’s most interesting in this hack is the timeline. So the first occurrences of the Wannacry began on May 12, and the EternalBlue exploit was leaked on April 14 the same year. However, Microsoft released a patch for this exploit exactly a month before it was released. It is not known how long Shadow Brokers have been holding the hacked information before releasing it to the public. But it leaves plenty of room for uncomfortable speculation. There are no official confirmations that the NSA hasn’t worked with the companies on weaponizing the exploits. But the NSA has been caught requiring companies not to fix the epxloits it discovered and wanted to use for cyber operations. Could the NSA discover they’ve been successfully hacked and that their information could be held by adversaries, and told Microsoft to release the patch? It appears to be extremely likely. There seems to be tight behind-closed-door cooperation between a state organization, funded fully by the taxpayers’ money, and private technological conglomerates operating across the globe. This attack is also a powerful argument for privacy advocates who have been saying all along that a backdoor vulnerability for our government, is the backdoor access for anyone else in the world. State intelligence agency has been weaponizing private companies’ vulnerabilities, which have been stolen by someone, and then used by probably some medium-level Eastern European non-state hackers. The problem is that no amount of surveillance state can secure itself against the kind of threat that can emerge from anywhere in the world without any attribution whatsoever. The bigger the monster grows, the more exposed to hits it gets. Wannacry is the worst infection since the Conficker worm attack in 2009 that infected millions of systems in 190 countries. The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
f-M68DS4UK4 | 20 Apr 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- How the United States and Russia are fighting each other in proxy wars in the Middle East https://youtu.be/esG8DVN6aGU Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Hillary Clinton: "we created the problem we are fighting today" Back in the day, even Hillary Clinton used to admit what nobody from the establishment would say this way: the United States created the problem they are now fighting. It describes the geopolitical struggle between the United States and the Soviet Union, now Russian Federation. But many people forget to mention what consequences this struggle for hegemony and the balance of power politics have on the lives of ordinary people. How the US created al-Qaeda Hillary Clinton: We created the problem that we are now fighting. Could be interpreted as Hillary Clinton saying "we created al Qaeda", or "we created Taliban", or "we created ISIS". It is fair to say that the United States did not create the ideology, but it definitely helped such groups thrive and make territorial gains. Sources: Operation Cyclone https://www.academia.edu/2897792/Operation_Cyclone_1979-1989_A_Brief_Analysis_of_the_U.S._Involvement_in_the_Soviet-Afghan_War Soviet invasion of Afghanistan https://www.britannica.com/event/Soviet-invasion-of-Afghanistan Hillary Clinton: "we created the problem we are fighting today" | How the US created al-Qaeda The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
esG8DVN6aGU | 17 Apr 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Why there will be no World War Three between Russia & USA | US & Russian proxy wars explained You've heard it many times. "This could escalate into a world war three with Russia". "Putin is preparing for world war three". "This incident means world war three with Russia against the United States". Will there be world war 3? World war 3 predictions I am here to argue that it is not actually the case. Among experts on international security, it becomes widely agreed upon that interstate conflicts are gradually disappearing from the international relations. What we see instead are the superpowers outsourcing their power and influence through proxies. What is a proxy war or conflict? Proxy wars explained Proxy is a group or an actor that fights with the support of foreign intervening power in order to gain leverage over another power. These proxy fights are very common in the Middle East and can be seen as Saudi Arabia's intervention in Yemen's conflict to fight Iran supported Shia groups that fight as proxies on behalf of Iran against Saudi Arabia. United States proxy Another example of proxy conflicts I give here was the Soviet-Afghan war and the US Operation Cyclone orchestrated by the Central Intelligence Agency. In this proxy war, the USSR supported the Afghan's government, who was very oppressive of the growing opposition. The United States immediately saw an opportunity in this, and when the Soviet Union invaded Afghanistan, launched covert CIA Operation Cyclone. The goal was to arm radical jihadi groups united under Mujahideen, provide them tactical advantage, and make sure the Soviet Union gets stuck as long as possible, while bleeding billions of rubles. Eventually, the Soviet Union left Afghanistan and gradually dismantled. Russia proxy This proxy strategy was as an overwhelming success in the United States. From that moment, the US foreign policy was continuously supporting radical groups, with the ideological and monetary help from Saudi Arabia. Thus the Wahhabi ideology was spread in the Middle East as US proxy against the Russian backed or supported governments. Perfect case is Syria. Assad is propped by Putin, because the same ideology and often time same men form rebel groups that tore parts of Russia apart. That's why both Russia and the United States are so heavily involved in the Middle East. For the United States, the strategy still works. Russia is struggling and throwing out a lot of money in fight against jihadi groups. While Russia is involved so heavily because unlike the US, they are not protecting from the groups by miles of ocean. Their security is immediately threatened by jihadists. Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Sources Operation Cyclone https://www.academia.edu/2897792/Operation_Cyclone_1979-1989_A_Brief_Analysis_of_the_U.S._Involvement_in_the_Soviet-Afghan_War https://en.wikipedia.org/wiki/Operation_Cyclone The Islamic State Comes to Russia http://www.securityaffairs.org/issues/number-30/islamic-state-comes-russia The North Caucasus Insurgents and Syria Fighters https://www.crisisgroup.org/europe-central-asia/caucasus/north-caucasus/north-caucasus-insurgency-and-syria-exported-jihad US Proxy fights: https://en.wikipedia.org/wiki/Foreign_policy_of_the_United_States#Covert_actions Credits: The Song of Ice and Fire by HolFix https://holfix.bandcamp.com/music Breaking the Clouds by TeknoAXE http://teknoaxe.com/Home.php Welcome to Chaos by Ross Bugden https://www.youtube.com/channel/UCQKGLOK2FqmVgVwYferltKQ/featured New Frontiers by TeknoAXE http://teknoaxe.com/Home.php The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
n-A8RVB9Cdo | 10 Apr 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- How to protect your privacy online 2017 This is my online privacy tutorial that I created to help people better protect online privacy on their own. I cover privacy configuration on different levels including privacy extensions, privacy emails, privacy concerned search engines, and privacy web browsers. The goal here is to protect your privacy online and make spying uneconomical. https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne Links to all services: Source: Privacytools.io & their subreddit r/privacytoolsIO/ Tor Browser https://www.torproject.org/ Mail Client Mozilla Thunderbird https://www.mozilla.org/en-US/thunderbird/ Brave browser https://brave.com/ Chromium browser https://www.chromium.org/ Firefox privacy add-ons: Privacy settings: http://firefox.add0n.com/privacy-settings.html Essential privacy add-ons for Firefox and Chrome HTTPS Everywhere: https://www.eff.org/https-everywhere uBlock Origin: https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/?src=search Privacy Badger: https://www.eff.org/privacybadger Recommended privacy extensions for Firefox Self-destructing cookies: https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/?src=api Random agent spoofer: https://addons.mozilla.org/en-US/firefox/addon/random-agent-spoofer/?src=search Decentraleyes: https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/ Masterpassword password manager: http://masterpasswordapp.com/ Protonmail.com end-to-end encrypted privacy email provider Signal instant messenger: https://whispersystems.org/ best privacy messaging app How to protect your privacy online How do you protect your online privacy in the age of surveillance state and pervasive marketing? You need a strategy that will make corporate and government spying uneconomical. It would be too expensive for the governments to go after you, and too profitless for the businesses to track your behavior, if you follow my online privacy tutorial. Online privacy tutorial This online privacy tutorial 2017 will show you which browser extensions to install, what email providers to choose that will protect your privacy, or other applications that you might use for daily communication. I recommend Protonmail for email, Thunderbird as a client for Gmail or other privacy non-respecting providers, Signal for instant messaging, Tor for secure accounts, Brave for light browsing, Firefox for better privacy. Why you need to protect online privacy now Vault 7, CIA leaks, Snowden leaks, NSA surveillance... Powerful cyber-security and intelligence agencies around the world are attempting to mass collect data on all citizens. But you don't have to hide in a cage. There are still ways how we can fight for our privacy. A hard to crack encryption makes it uneconomical for the governments to conduct mass surveillance. They can still get to you individually if they really want to, but that's more expensive and requires targeted afford. Unlikely to happen to you unless you are on a watch list. But what about corporations spying on us? Some people don't find it intrusive, but they have to remember - it's their business model that enables destruction of our privacy in the first place. With their powerful market positions and lobbying powers, they now own data on entire sections of the population, able to make sense of the collected information in their favor. This is a dangerous situation that puts citizens into a very disadvantageous situation. We have to protect our privacy online. It's the only way we safeguard our democracy and freedom from oppression. Let's not forget that the democracy is the only way we can avoid oppression. This is my guide for best online privacy protection you can get without paying for a VPNs or encryption services. It's not completely bulletproof nor perfect, but as a privacy protection strategy, this will help us all fight pervasive marketing techniques and surveillance. Credits: Welcome to Chaos by McLoed (incompetech.com) http://creativecommons.org/licenses/by/3.0/ 'Reveal' by Chuki Beats https://www.youtube.com/user/CHUKImusic The Stewardship of Guilt Spark by Teknoaxe http://www.youtube.com/user/teknoaxe The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
8XNlLiO3ZO0 | 07 Mar 2017
Trump, Putin and the New Cold War is an article by New Yorker which slams Russian propaganda and campaign "against" the West. https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne New cold war with Russia? In this video I answer debate following questions: Are we in new cold war with Russia? Is Russia a threat to the USA? Is Russia against Western democracies? Are Trump and Putin allies? Is there a new cold war? Is Trump escalating new cold war with Russia? Is Putin escalating new cold war? Who wants the new cold war? Are the United States in new cold war with Russia? Is Trump leading the United States into a new cold war with Russia? Is anti-Russian propaganda new cold war? Who is in the new cold war? Trump Putin and new Cold War - Trump new cold war The article by New Yorker bases its main argument on the DNC hacks as Russian perpetrated, which is a weak position to hold as there's still lack of evidence for such claims. But is Russia a threat to the US? Is Russia threat at all? The New Yorker's article revolves around President Donald Trump having ties to Russia's President Vladimir Putin. And that Kremlin might somehow be influencing the institutions and democracies in the United States. While this is a strong media backlash, it's build on sand. Are we in a new cold war with Russia? Are we in a new cold war with Russia? Is USA in new cold war with Russia? Probably. It largely depends on what you consider a cold war. There are still proxy wars around the world, just like during the days of Soviet Russia, but no major powers are in a hot war against each other. However, there is no bipolarity in the world. The United States came out as a global hegemon in world politics and still holds this position, despite heavy affords by Russia and China to enhance their power and influence. Russia is a regional hegemon, and thus doesn't match the United States capabilities to operate globally. Remember, when Russia and the United States face each other, its usually at the doorstep of Russia. In the Middle East, Eastern Europe, or Central Asia. Not Caribbean, Latin America, or Pacific Ocean. America new cold war with Russia So is America in a new cold war with Russia? Now that's a different question. In the minds of many US policy decision makers, that might in fact be true. Just look at how many mainstream media and officials in both Republic and Democratic parties employ cold war rhetoric against Russia as an "aggressor" or adversary to US national interests. But what they fail to acknowledge is that Russia doesn't have thousands of troops deployed at the borders of United States. Russia is considered to be a threat by the United States. But Russia is not a threat. Even if it wanted to, Russia doesn't have enough financial resources, logistics, and level of modernization to balance out the forces of the United States. So Russia is not a threat. The world continues to be unipolar in favor of the United States hegemony. The DNC hacks card doesn't work even if Russia hacked the emails. So Russia would be doing a propaganda. Isn't that what the United States is doing? Do you recall nation building, installing and toppling regimes, arming rebels etc.? Is it really Trump and new cold war? Is Russia threat to the US The United States has 10 times the defense budget of Russia, 10 times the amount of aircraft carriers, up to a 1000 military bases across the globe. If there is a cold war with Russia or anyone else, it's one sided. It seems more like there is a cold war with America. Even though the United States now has to listen more to what others have to say. That doesn't mean they are a threat to world peace. Trump new cold war So you can calm yourself. Even with Donald Trump in power, we are not in a cold war with Russia and the United States, and we have far less reasons to escalate into a hot war than during the real cold war. Russia will not attack Baltic states. It just can't afford to. new cold war with Russia is Russia threat to the United States Sources: Trump, Putin, and the New Cold War http://www.newyorker.com/magazine/2017/03/06/trump-putin-and-the-new-cold-war Russia's Military Capabilities "Great Power" Ambitions and Reality https://www.swp-berlin.org/en/publication/russias-military-capabilities/ The 35 Most Powerful Militaries In The World http://uk.businessinsider.com/35-most-powerful-militaries-in-the-world-2014-7?r=US&IR=T War on Chechnya First Chechnya War - 1994-1996 http://www.globalsecurity.org/military/world/war/chechnya1.htm Credits: Habanera, Clash Defiant, Echoes of Time, McLoed (incompetech.com) http://creativecommons.org/licenses/by/3.0/ Fog by jimmysquare is licensed under a Creative Commons License. Spite, Faded Nights by Chuki Beats https://www.youtube.com/user/CHUKImusic
Y6UkbEcp5N4 | 17 Feb 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Elon Musk - "merge with machine". Should we become cyborgs? https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne What do you think when one of the greatest entrepreneurs of all times, Elon Musk, says humans must merge with machines? Artificial intelligence, machine learning, and humans becoming cyborgs. This is no longer a science fiction. According to Elon Musk, humans must merge with machines or they face becoming irrelevant. The claim that people will eventually turn into cyborgs is no longer a crazy science fiction. But what happens when humans merge with machines? Artificial intelligence is making such an important progress now that humans will have to significantly change their ways of lives. Machine learning is process that we must take under control. One way to do is that we merge with robots It is possible that with the advancement of artificial general intelligence, the only plausible scenario for human race is to become cyborgs - merge with artificial intelligence and stay in control of it. Elon Musk merge with machines Otherwise, if we build AI separately, we would necessarily have to deal with what to do when robots become smarter than us by several orders of magnitude. This isn't to suggest that robot would kill us like it's most popular in movies. Even though Elon Musk said that artificial intelligence could wipe out humans. But the economic difficulties that come with any economic revolutions must be addressed properly. What do we do when autonomous machines take over most of our jobs? From self driving (or more precisely, autonomous) cars, through AI in medicine, design, and pretty much all low skilled jobs, we are going to face existential challenges as soon as next couple of years. Of course it is possible that we wouldn't build an AI but that's not a benign scenario either. The only thing that would prevent from creating artificial intelligence is an event of a natural disaster, like climate change, or a major interstate war. But if we don't boil ourselves to death or nuke our planet into oblivion, AI is a serious concern. It's certainly a great innovation that is capable of creating Star Trek abundance. But we need have to do this right. Musk proposed that we should unanimously ban use of AI for military purposes across the globe. But what if just one actor disagrees? Will everyone just trust each other? On the other hand, if we don't prevent creation of another potential of destroying life on Earth, should even proceed? These are some but not all of the questions that we need to have answered by the time we get to the age of robots smarter than humans. What do you think? Should humans merge with machines? Would you want to become cyborg? Do you agree with Elon Musk on artificial intelligence? As Elon Musk says could artificial intelligence wipe out humanity? What do you expect from the age of artificial intelligence? Is Musk a cyborg? :-) I hope you like my thumbnail where I tried to turn Elon Musk into cyborg. The idea was to suggest that Elon Musk merges with robot. I used a picture of a Terminator and blended it together with Musk's face. Now it's Elon Musk Terminator :-) Sources: Humans must become cyborgs to survive says Musk https://arstechnica.co.uk/information-technology/2017/02/humans-must-become-cyborgs-to-survive-says-elon-musk/ Elon Musk: Humans must merge with machines or become irrelevant in AI age http://www.cnbc.com/2017/02/13/elon-musk-humans-merge-machines-cyborg-artificial-intelligence-robots.html Artificial intelligence, human brain to merge in 2030s, says futurist Kurzweil http://www.cbc.ca/news/technology/artificial-intelligence-human-brain-to-merge-in-2030s-says-futurist-kurzweil-1.3100124 Merging humans with AI to create superior cyberbrains http://www.quantumrun.com/article/merging-humans-ai-create-superior-cyberbrains Neural lace has been invented to organically connect your brain with a computer http://www.ibtimes.co.uk/neural-lace-has-been-invented-organically-connect-your-brain-computer-1506481 Credits: Phantom, The Complex, Dark Times, Echoes of Times, by Kevin McLoed (incompetech.com) http://creativecommons.org/licenses/by/3.0/ Dizzy Tracks by Chuki Beats https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
VvA49_GubK0 | 12 Feb 2017
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne This is my analysis of whether the immigration ban (proclaimed Muslim ban) proposed by President Trump would actually help prevent terrorism. Trump aims to prevent terrorist attacks by suspending entry of immigrants of foreign nationals to the United States. The idea is to prevent influx of foreign born terrorists into the United States. He picked seven nations from the Middle East based on a "threat" model. But would the "Muslim ban" prevent terrorism? Trump Muslim ban debate As I explain in this video, banning immigration is not a smart solution. There are far too many countries exporting terrorists around the world. For example, in 2014 Tunisia led the supply of foreign fighters to ISIS, as well as two nationals who committed lorry attacks in Nice and Berlin most recently. Most of the attacks in Europe were conducted by EU citizens, admittedly from immigrant families, such as Pakistan, Morocco, Iraq, Syria, Somalia, but also Mali and Jamaica. Foreign born terrorists have plenty of other places to migrate from. This is my attempt to contribute to the Trump Muslim ban debate. Foreign born terrorists What's also confusing about Trump's pick of countries to ban entry for their nationals, is that no American was murdered by a foreign born terrorist from these seven countries between 1975 - 2015. But as you well know, the immigration ban excludes Saudi Arabia, which supplied 15 out of 19 hijackers of the 9/11. On the other hand, Iran is included in the ban, which serves to escalate unnecessary tensions between the US and Iran. Immigration ban / Muslim ban - Trump muslim ban debate I come to call Trump's executive order an immigration ban in result and Muslim ban in intent. Trump clearly wanted to fulfill on his promise to impose ban on Muslims entering the United States, but that decisions seems to be unconstitutional and illegal. This immigration ban, however, is as far as the liberal constitution of the United States allows him to go. So this is Trump's Muslim ban, but effectively made as immigration ban. Executive order Muslim ban Hopefully, this commentary of mine will contribute to the Trump's Muslim ban debate and you'll find my analysis helpful. If you find any disagreements or comments, please feel free to let me know. I appreciate all your feedback. Sources: The Cato Institute report was "Terrorism and Immigration: a Risk Analysis" https://www.cato.org/publications/policy-analysis/terrorism-immigration-risk-analysis and "Guideto Trump's Exectuive Order to Limit Migration for 'National Security' Reasons" https://www.cato.org/blog/guide-trumps-executive-order-limit-migration-national-security-reasons Trump Signs Order Promising 'Great Rebuilding' of the Military http://www.defensenews.com/articles/report-draft-executive-order-would-give-pentagon-short-term-funding-boost Trump missed his main target in Yemen raid that killed 30 civilians and one US Navy SEAL http://www.independent.co.uk/news/world/americas/donald-trump-missed-target-al-qaeda-leader-yemen-raid-a7566211.html The Saudi Arabia $525 million weapons deal http://www.dsca.mil/major-arms-sales/kingdom-saudi-arabia-74k-persistent-threat-detection-system-ptds-aerostats Look at some terror attacks in US, Europe, and their perpetrators: http://www.ksla.com/story/34382318/look-at-terror-attacks-in-us-europe-and-their-perpetrators Tunisia, after igniting Arab Spring, sends the most fighters to Islamic State in Syria https://www.washingtonpost.com/world/national-security/tunisia-after-igniting-arab-spring-sends-the-most-fighters-to-islamic-state-in-syria/2014/10/28/b5db4faa-5971-11e4-8264-deed989ae9a2_story.html Reagan's Osama Connection http://www.slate.com/articles/news_and_politics/war_stories/2004/06/reagans_osama_connection.html The EU report on Saudi Arabia funding of Wahabists/Salafists http://www.europarl.europa.eu/RegData/etudes/etudes/join/2013/457137/EXPO-AFET_ET(2013)457137_EN.pdf Saudi-Led Coalition Strikes Market with US-Made Bombs https://www.youtube.com/watch?v=aQS7sxaXVw4 On the Drone Campaign https://theintercept.com/drone-papers/ Credits: Crowd Hammer, Crypto, Long Note Three, Floating Cities, Industrial Cinematic, by Kevin McLoed (incompetech.com) http://creativecommons.org/licenses/by/3.0/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
5RS2fOcAEvw | 30 Nov 2016
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Another crappy video of my thoughts on the current hysteria about Trump's victory. Everybody needs to chill. Music: Chuki HipHop (BE) https://www.youtube.com/user/CHUKImusic The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
hoXKxXDTHqI | 08 Nov 2016
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- Did you choose to vote against the other candidate rather for someone? Did you vote for lesser of two evils? I didn't. The lesser of two evils is still evil. I stopped lying to myself and rationalizing my conscience about the political game that is being play by establishment politicians and corporate overlords to trick us ordinary peasants into loving this state of "democracy". We don't have to vote. How about having no one for president? The lesser of two evils meaning If you vote for lesser of two evils now, the worse evil will be your better choice in the future, until you sacrifice all your values and freedoms for corrupt politicians in rigged process. The lesser of two evils is still evil To me both candidates, Hillary Clinton and Donald Trump, are equally bad. They differ only insignificantly in some issues, but are equally part of the establishment, no matter what Trump claims in his campaigns. We know all about how corrupt Hillary is, but we also know that Trump isn't a solution, because he would still do according to the bidding of the richest corporations and powerful foreign interests. The establishment has decided on this without us. It doesn't make a difference to who wins this election. Unless it would be someone like Bernie Sanders who is now only a perfect example of how we all get screwed by the establishment. Why not to vote - not voting for anyone The change is easier than it seems - we need to have direct authority over our representatives, so that whenever we deem necessary, we pull their breaks or throw them out of our house. That's what all the Western democracy needs right now. No one for president The system is so corrupt that it truly, really doesn't matter at all who becomes the leader. All the agenda and decision making is already brokered behind the closed door. Not involving your opinions, concerns or well-being. Money and power is the only incentive. This is not democracy but we can take back and it's a lot easier than it seems. No pitchforks, no bloodshed, no civil war revolutions. The corrupt will never oversee each other. It's the people who have to do it. The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
C31AX7LOSvg | 28 Aug 2016
Will democracy end? Are we reaching the end of democracy? https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne This is an analysis of Francis Fukuyama End of History essay and Samuel Huntington Clash of Civilization thesis. Both are interesting reads on political science, but are which one is more correct? Are we reaching the end of history or the clash of civilizations? Clash of civilizations vs the end of history. Fukuyama vs Huntington. How democracy will end I think neither. From my observations and analysis, it seems we are reaching the end of democracy. Will democracy end? NSA surveillance explained Mostly because of the government surveillance and spying by NSA, CIA, GCHQ, through programs like Five Eyes all the way through Fourteen Eyes. NSA surveillance explained in the video. The income inequality problem too isn't acknowledged enough but it's going to cause more problems than just who earns more money. It will disproportionately distribute power towards the upper echelon of our societies. The end of democracy Internet censorship The Internet censorship on Youtube, Facebook, Google, is just a cherry on top. This is how democracy will end. SOURCES: The Clash of Civilizations? https://www.foreignaffairs.com/articles/united-states/1993-06-01/clash-civilizations The End of History? http://www.wesjones.com/eoh.htm Government survaillance program:https://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google FBI Can Access Hundreds of Millions of Face Recognition Photos https://www.eff.org/deeplinks/2016/06/fbi-can-search-400-million-face-recognition-photos Federal Court: The Fourth Amendment Does Not Protect Your Home Computer https://www.eff.org/deeplinks/2016/06/federal-court-fourth-amendment-does-not-protect-your-home-computer People Don't Want Personalized Ads. http://www.forbes.com/sites/roberthof/2012/03/09/people-dont-want-personalized-ads-what-should-marketers-do/#3fd29eb357c0 Universities are tracking their students. Is it clever or creepy? https://www.theguardian.com/higher-education-network/2016/aug/03/learning-analytics-universities-data-track-students https://www.theguardian.com/technology/2016/aug/02/battery-status-indicators-tracking-online https://theintercept.com/2016/08/19/the-nsa-was-hacked-snowden-documents-confirm/ N.S.A. Able to Foil Basic Safeguards of Privacy on Web http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all&_r=1 NSA Can Spy on Smart Phone Data http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html NSA broke privacy rules thousands of times per year, audit finds https://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html The inequality problem http://www.nytimes.com/interactive/2015/01/25/upshot/shrinking-middle-class.html?_r=0 Income and Poverty in US '13 https://www.census.gov/content/dam/Census/library/publications/2014/demo/p60-249.pdf https://www.eff.org/issues/tpp https://www.theguardian.com/business/2015/may/27/corporations-paid-us-senators-fast-track-tpp Censorship on the Internet https://www.theguardian.com/technology/2014/aug/21/twitter-free-speech-champion-selective-censor Twitter Censorship And The Future Of Authoritarianism In A High-Tech World http://www.forbes.com/sites/erikkain/2012/01/28/twitter-censorship-and-the-future-of-authoritarianism-in-a-high-tech-world/#632b4477d19d Rights Groups Outraged As US Tech Giants Sign Up To EU Hate Speech Rules http://www.forbes.com/sites/emmawoollacott/2016/05/31/rights-groups-outraged-as-us-tech-giants-sign-up-to-eu-hate-speech-rules/#aa2a9056c163 The mentioned document CODE OF CONDUCT ON HATE SPEECH http://ec.europa.eu/justice/fundamental-rights/files/hate_speech_code_of_conduct_en.pdf TAX AVOIDANCE by Tech Giants Microsoft Admits Keeping $92 Billion Offshore to Avoid Paying $29 Billion in U.S. Taxes http://www.ibtimes.com/microsoft-admits-keeping-92-billion-offshore-avoid-paying-29-billion-us-taxes-1665938 Google boss: I'm very proud of our tax avoidance scheme http://www.independent.co.uk/news/uk/home-news/google-boss-im-very-proud-of-our-tax-avoidance-scheme-8411974.html How Apple Sidesteps Billions in Taxes http://www.nytimes.com/2012/04/29/business/apples-tax-strategy-aims-at-low-tax-states-and-nations.html?pagewanted=all&_r=0 Credits: Edited using free version of Lightworks. Music Ethan Meixsell - Battleground I Am Running with Temporary Success from a Monstrous Vacuum in Pursuit by Chris Zabriskie is licensed under a Creative Commons License. Inspired, Echoes of Time, The Complex by Kevin McLoed (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 http://creativecommons.org/licenses/by/3.0/ Fair Use laws of the United States Copyright act of 1976.
OSpqRQTFZbU | 29 Jul 2016
What are the main outcomes of the failed coup in Turkey? Erdogan's reaction to the failed coup is dangerous. Should he succeed in eliminating his opposition, not only will Turkey turn full authoritarian, but the whole region of the Middle East becomes less stable. This video talks about failed coup in Turkey aftermath. It explains the failed coup in Turkey. Failed coup in Turkey aftermath I attempt to answer these questions: Will Turkey turn into dictatorship after the failed coup? How will Erdogan use failed coup in Turkey to strengthen his position? What happens to Kurds after the failed coup in Turkey? What is the fate of failed coup in Turkey and secularism in Turkey and the Middle East? How will the failed coup in Turkey affect the balance of power in the Middle East? What are the effects of failed coup in Turkey and the Middle East? How will the failed coup in Turkey benefit ISIS? Failed coup in Turkey and ISIS. What is the failed coup in Turkey and Russia's response? Russia has a stake in the Middle East and the failed coup in Turkey might increase Russia's involvement in the Middle East. Turkey failed coup explained. These are my main outcomes in the aftermath of failed coup in Turkey: #1 Turkey will turn into a dictatorship - Erdogan strengthens his position. Failed coup in Turkey dictatorship. #2 The failed coup in Turkey will lead to further Islamization of Turkey and the Middle East. Failed coup in Turkey will end secularism in the Middle East. Failed coup in Turkey and secularism. #3 The failed coup in Turkey and the balance of power #4 Failed coup in Turkey and the Kurds. Impacts of the Turkey failed coup on Kurds explained. #5 Failed coup in Turkey will benefit ISIS. #6 Failed coup in Turkey will increase involvement of Russia in the Middle East Politics. Failed coup in Turkey Russia's response. Russia's involvement and the failed coup in Turkey. This video talks about 6 most crucial outcomes of the failed coup in Turkey that occurred on the night of 15th of July and claimed up to 300 deaths and 1400 injured, which is more than most terror attacks in recent history. I hope this will help you in your understanding of the failed coup in Turkey and its aftermath. Turkey coup d'etat aftermath I analyse the failed coup in Turkey as its direct impacts on Turkey but also on the region of the Middle East. What I have come to observe is that not only Erdogan builds autocracy around his cult of personality, he also uses Islamization to make an illusion of one Turkish nation united in religion following 'the great leader'. This has an impact on how Turkey's main adversaries - the Kurds and Iran - perceive yet another strongman with hegemonic ambitions. Not only will this encourage more suspicion and insecurity among the leaders and the people, but ISIS will benefit from their enemies turning against one another. The failed coup in Turkey leads to dictatorship and autocracy in Turkey. This video also explains effect of failed coup in Turkey on Kurds. Failed coup in turkey explained from my analytical point of view. Credits: Master Disorder, by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/ Faded Nights, and The Streets by Chuki Production, https://www.youtube.com/channel/UCSyBSyLk4ZvXd2Fj-tLojag The footage and images featured in the video were for critical analysis, news and education, which are protected under the Fair Use laws of the United States Copyright act of 1976.
LoVChFzBiWc | 26 Jul 2016
https://twitter.com/The_HatedOne_ https://www.reddit.com/user/The_HatedOne/ https://www.minds.com/The_HatedOne How to protect your privacy online? Why do you have to protect your privacy on the web? Online privacy is major issue that gets tackled with every bill, legislation, and new law passed onto us through fear mongering law makers taking advantage of terror attacks. Government surveillance explained - ban encryption This video will help you understand how the intelligence community, the NSA, GCHQ and the governments across the globe, transform our societies into surveillance states of Orwellian measures. They are trying to ban encryption. Outlaw encryption. They claim to protect our physical security for the lack of online security. How to protect online privacy - why you should care about privacy But banning encryption has privacy and security risks. If you ban encryption you can no longer protect your data from everyone, hackers, governments, thieves. We need to protect our privacy online and prevent banning encryption. Can the government ban encryption? Should the government ban encryption? Watch my video to get advice on how to protect your privacy online. Privacy tutorial I provide examples on how you can protect your privacy online using privacy addons or extensions on your web browser. How to protect your privacy online - online privacy tutorial The second part of this will guide you through all the necessary privacy extensions and privacy applications that you can use to protect your privacy and are actually really good privacy concerned alternatives to the mainstream application. You have to realize that most of the popular apps will invade your privacy to take as much data and metadata from you to market it and target advertisements at you. Or in other words, make money of your identity. Privacy vs convenience The more these corporations have on you the more influence they can get. The more you lose your privacy for little convenience. You don't have to sacrifice convenience for privacy. You can have both. I show you how to protect your privacy and keep convenience at the same time. Government surveillance vs encryption Encryption is being blamed for all the recent terror attacks by authorities who failed to protect us from public violence. They use their failure to strip off more and more of our rights to privacy and freedom from unreasonable search seizure. Protect your online privacy - encryption works But we have options. Don't let anyone tell you that you can't protect your online privacy. There are plenty of really good alternatives to almost anything you need to do online. Using encryption has never been so easy, so you stop blindly trusting the big corporations with your data, because chances are it will be used against whether you'll notice it or not. Privacy tutorial - how to protect your privacy online Encryption works. I offer my list of best privacy add-ons for Firefox and Chrome. These privacy extensions for Firefox and Chrome are easy to install and easy to deal with. I reccomend using HTTPS Everywhere, Privacy Badger, Random Agent Spoofer, uBlock Origin, Disconnect, Better Privacy, Decentraleyes, Privacy Settings. For instant messaging use Signal from Open Whysper Systems. It works on iOS as well as Android. For email use Protonmail instead of Gmail or Yahoo. How to fight for online privacy Anyone who cares about privacy and protecting yourself on the internet should be sharing this message. There are a lot of people who don't even know there privacy concerned alternatives out there that are equally good as the mainstream options who snoop on your life, but offer you all that good old privacy. Government surveillance vs corporate surveillance and businesses spying on you It's not only the government and the spying agencies intruding on us. It's also and I think mostly all those big corporations and tech giants that you decide to trust your data with. Because you share all your private information with them willingly, the NSA is able to get all that in their hands. But if you try to be cautious you can actually prevent the spies from making sense of the data you generate when you are on the internet. How to protect your privacy online Online privacy tutorial I hope this tutorial means something. I am just at the stage of learning how to make videos. I am very thankful for everyone who is able to bear with me as make my way trying to learn and improve with every step. Thank you all for watching my content. Credits: Master Disorder, Apocalypse, and Pyro Flow by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/ Faded Nights, The Streets, and Mornings by Chuki Production, https://www.youtube.com/channel/UCSyBSyLk4ZvXd2Fj-tLojag
gM86IMZSqtg | 20 Jul 2016
Don't believe the established media saying Brexit is a catastrophe. Don't believe your politicians that not only is it better to stay, but it's the only option we have. It's a lie of the European establishment. Please leave a comment about what you think and if you like my video sharing would help me spread the message. The Union has become just as corrupt as any other political entity in the Western world, with the only difference that the EU institutions are unelectable and can't be held accountable. Benefits of cooperation in Europe are guaranteed within the European Economic Area and the European Free Trade Association. The only ones that benefit from the EU are big banks and corporations. The EU holds no exclusive benefits that couldn't be enjoyed fairly without being a part of this mess. Credits: Hush Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/