Forwarded from Azazel News (Aries)
Controversial ‘spy tech’ firm Palantir lands £23m NHS data deal
Article,
Article,
Forwarded from GALLIA DAILY | Voice of France
🇫🇷👨🏻💻 WE ASKED DUROV ABOUT CENSORSHIP AND TELEGRAM.
🙏🏻 Here is his answer
👉🏻 TL;DR :
1️⃣ Durov is obviously aware of the problem posed by Google and Apple, which form a "duopoly".
2️⃣ Durov considers that Apple and Google are much more dangerous than Twitter or Facebook. Because Google and Apple can simply ban applications from their stores. Twitter can "just" ban users.
3️⃣ As such, Durov promptly advises to migrate from iOS to Android. Because even if Android isn't perfect, at least you can install independent APKs.
4️⃣ Telegram does not intend to comply with the censorship ultimatums of the AppStore and PlayStore. If ever Telegram is removed from these platforms, there will be two solutions:
➡️ Telegram will share an "official" APK
➡️ Telegram is working on a "browser" version of Telegram... for mobile! That is to say that Telegram will be usable without an application, optimized for phones. Telegram will thus become 100% independent of any store.
~
💻 Official updates from Durov here
🙏🏻 Here is his answer
👉🏻 TL;DR :
1️⃣ Durov is obviously aware of the problem posed by Google and Apple, which form a "duopoly".
2️⃣ Durov considers that Apple and Google are much more dangerous than Twitter or Facebook. Because Google and Apple can simply ban applications from their stores. Twitter can "just" ban users.
3️⃣ As such, Durov promptly advises to migrate from iOS to Android. Because even if Android isn't perfect, at least you can install independent APKs.
4️⃣ Telegram does not intend to comply with the censorship ultimatums of the AppStore and PlayStore. If ever Telegram is removed from these platforms, there will be two solutions:
➡️ Telegram will share an "official" APK
➡️ Telegram is working on a "browser" version of Telegram... for mobile! That is to say that Telegram will be usable without an application, optimized for phones. Telegram will thus become 100% independent of any store.
~
💻 Official updates from Durov here
Forwarded from Azazel News (Aries)
This media is not supported in your browser
VIEW IN TELEGRAM
Meanwhile, in China. Rise of the Mashines. Start. (Prologue to 2021)
Forwarded from The People's Reset Activation
Friends,
Here is another graphic to share for #TheGreaterReset! Please help us spread the word about solutions in 2021!
Here is another graphic to share for #TheGreaterReset! Please help us spread the word about solutions in 2021!
Forwarded from 🔊 Intuitive Public Steel • Intuitive Social Industry • Intuitive Public Radio • IPR •••
YouTube
The best explanation of the Fourth Industrial Revolution ever
Graeme Codrington explains not just the Fourth, but also the 1st, 2nd and 3rd Industrial Revolutions, and why 4IR is more important and disruptive than you can imagine. A MUST WATCH VIDEO.
o/h@3:37 "...our communities were already cyborgs then..."
Forwarded from 🔊 @OwlVultureWarrior • Owls, Vultures, Wisdom Warriors • Intuitive Public Radio • IPR •••
YouTube
Part 2: The Fourth Industrial Revolution and the Global Technocratic Takeover w/ Alison McDowell
Alison McDowell is a mother and dedicated researcher studying the working parts of the World Economic Forum's declared "Fourth Industrial Revolution" and the global takeover of industries and public policies by the central banks, multinational corporations…
Forwarded from 🔊 @IntuitiveFlow • Relationship Resonance • Collaborative Public Social Community Flow • IPR •••
YouTube
Part 4: The Fourth Industrial Revolution and the Global Technocratic Takeover w/ Alison McDowell
Alison McDowell is a mother and dedicated researcher studying the working parts of the World Economic Forum's declared "Fourth Industrial Revolution" and the global takeover of industries and public policies by the central banks, multinational corporations…
Forwarded from 🔊 @IntuitiveTraffic • Intuitive Social Traffic • Intuitive Public Service • Intuitive Public Radio • IPR •••
YouTube
Part 5: The Fourth Industrial Revolution and the Global Technocratic Takeover w/ Alison McDowell
Alison McDowell is a mother and dedicated researcher studying the working parts of the World Economic Forum's declared "Fourth Industrial Revolution" and the global takeover of industries and public policies by the central banks, multinational corporations…
Jan 10, 2021. Breath is traveling through my torso. My body is made of so much water, and earth is made from water, and my body is earth. Where I have allied with extrasomatic technology to cyborgian approach challenges confronting me, I have built relationships with non-human living essences that then became a kind of human, allied with me. But what is it Star Trek sometimes seemed to be saying, as if there may be a kind of spark of "humanity" in all beings?
Hubris, I should think.
Or it's more about what to call a thing.
"Humanity."—-@maxmorris, @maxmoradio
https://t.me/s/MaxMoRadio/2882
---20210110-175737, https://Intuitive.social/memory 🌊✨
Hubris, I should think.
Or it's more about what to call a thing.
"Humanity."—-@maxmorris, @maxmoradio
https://t.me/s/MaxMoRadio/2882
---20210110-175737, https://Intuitive.social/memory 🌊✨
Forwarded from Deleted Account
--- OPSEC CHECK ---
--General Settings
Never use real name.
Never use real display pictures.
Leave username blank; having a username makes you easier to identify and find.
Nothing revealing in your bio.
--Privacy Settings
Phone number -> Nobody
Last Seen & Online -> Nobody
Profile Photo -> Everybody (you'll look suss without it)
Forwarded Messages -> Nobody
Calls -> Nobody
Add to Groups -> Contacts
--Security
Set passcode.
Set two factor authentication password.
--Additional Phone
Who can see it -> Nobody
Who can find me via it -> Contacts (not the best but it's the best telegram will allow)
--Additional Call
Who can call -> Nobody
Peer to Peer -> Nobody
--General Settings
Never use real name.
Never use real display pictures.
Leave username blank; having a username makes you easier to identify and find.
Nothing revealing in your bio.
--Privacy Settings
Phone number -> Nobody
Last Seen & Online -> Nobody
Profile Photo -> Everybody (you'll look suss without it)
Forwarded Messages -> Nobody
Calls -> Nobody
Add to Groups -> Contacts
--Security
Set passcode.
Set two factor authentication password.
--Additional Phone
Who can see it -> Nobody
Who can find me via it -> Contacts (not the best but it's the best telegram will allow)
--Additional Call
Who can call -> Nobody
Peer to Peer -> Nobody
Forwarded from Derrick Broze's Daily News
For those who watched my show last night, this is the guy I mentioned who wrote the book Surveillance Valley.
""Tor and Signal are creations of America’s spooky war apparatus. If they ever posed a threat to the United States — and to the corporate monopoly power that calls the shots here — their funding would be pulled and they would cease to exist."
https://yasha.substack.com/p/spy-funded-privacy-tools-like-signal
""Tor and Signal are creations of America’s spooky war apparatus. If they ever posed a threat to the United States — and to the corporate monopoly power that calls the shots here — their funding would be pulled and they would cease to exist."
https://yasha.substack.com/p/spy-funded-privacy-tools-like-signal
Yasha Levine
Spy-funded privacy tools (like Signal and Tor) are not going to protect you from the government
Ask yourself: Why would a CIA spinoff fund a grassroots encryption app?
Forwarded from Derrick Broze's Daily News
"On March 7th, 2017, Wikileaks released a giant file of 8,761 documents from the U.S. Central Intelligence Agency (CIA) codenamed Vault 7. Wikileaks called the leak the “first full part of the series “Year Zero”. The documents were stolen from a network that supposedly was “isolated” within the CIA itself.
The files include details on CIA’s software capabilities, such as the ability to compromise cars, smart TVs, web browsers and the operating systems of most smartphones, as well as other operating systems such as Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release.
The leaks outlined how the CIA could pretty much hack into any device with a suite of tools designed to read and copy data from electronic devices. The documents detailed how, for example, authorities found a way to bypass encryption in a host of secure messaging apps such as WhatsApp and Telegram."
https://greatgameindia.com/cia-whatsapp-hack/
The files include details on CIA’s software capabilities, such as the ability to compromise cars, smart TVs, web browsers and the operating systems of most smartphones, as well as other operating systems such as Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release.
The leaks outlined how the CIA could pretty much hack into any device with a suite of tools designed to read and copy data from electronic devices. The documents detailed how, for example, authorities found a way to bypass encryption in a host of secure messaging apps such as WhatsApp and Telegram."
https://greatgameindia.com/cia-whatsapp-hack/
GreatGameIndia
Forget WhatsApp, CIA Has Tools To Hack Almost All Social Media Platforms - GreatGameIndia
CIA has developed tools which can hack not just WhatsApp, but bypass the encryption of Signal, Telegram, Wiebo, Confide and Cloackman.
Forwarded from BC
Unfortuantely, those claims about TOR are mostly sensational statements that have been 'debunked' many times over the years. Yes, TOR came from DoD (Naval Research) but what is available today is OpenSource. So the code has been scruitinized. Also, Edward Snowden's leaks showed that the NSA had to go to great lengths (for example) of running lots and lots of exit nodes as a way to weaken TOR's security model. They wouldn't have done that if they had a backdoor available.
In essence, its good enough and better than nothing - and should always be used in conjunction with other privacy protecting measures (good defense in depth practices).
And, if the spooks really want to know what you're sharing (and I mean really as in you've been individually identified for further investigation) then they have the tools and methods to do that. But those don't scale up well to a mass survellance level. So keep a low profile and don't stand out in the crowd :))
In their own words its "Still the King of high secure, low latency Internet Anonymity" see
https://www.scribd.com/document/173382716/doc3#download&from_embed
In essence, its good enough and better than nothing - and should always be used in conjunction with other privacy protecting measures (good defense in depth practices).
And, if the spooks really want to know what you're sharing (and I mean really as in you've been individually identified for further investigation) then they have the tools and methods to do that. But those don't scale up well to a mass survellance level. So keep a low profile and don't stand out in the crowd :))
In their own words its "Still the King of high secure, low latency Internet Anonymity" see
https://www.scribd.com/document/173382716/doc3#download&from_embed
Scribd
doc3