Meta confirms they plan to add tons of AI-generated users to Instagram and Fedbook w/bios, PFP, and shares content
They claim 100K+ have already been created, but creators have allegedly kept most of them private.
Soft disclosures for a plan already set in place.
The Kissinger/Eric Schmidt book on AI basically states that the real promise of AI, from their perspective, is as a tool of perception manipulation - that eventually people will not be able to interpret or perceive reality without the help of an AI via cognitive diminishment and learned helplessness.
For that to happen, online reality must become so insane that real people can no longer distinguish real from fake in the virtual realm so that they can then become dependent on certain algorithms to tell them what is "real".
Please, please realize that we are in a war against the elites over human perception and that social media is a major battleground in that war. Hold onto your critical thinking and skepticism and never surrender it. – Source
They claim 100K+ have already been created, but creators have allegedly kept most of them private.
Soft disclosures for a plan already set in place.
The Kissinger/Eric Schmidt book on AI basically states that the real promise of AI, from their perspective, is as a tool of perception manipulation - that eventually people will not be able to interpret or perceive reality without the help of an AI via cognitive diminishment and learned helplessness.
For that to happen, online reality must become so insane that real people can no longer distinguish real from fake in the virtual realm so that they can then become dependent on certain algorithms to tell them what is "real".
Please, please realize that we are in a war against the elites over human perception and that social media is a major battleground in that war. Hold onto your critical thinking and skepticism and never surrender it. – Source
Five months after Schmidt was appointed to the National Security Commission on Artificial Intelligence, he made a little-noticed private investment in an initial seed round of financing for a start-up company called Beacon.
https://www.cnbc.com/amp/2022/10/24/how-googles-former-ceo-eric-schmidt-helped-write-ai-laws-in-washington-without-publicly-disclosing-investments-in-ai-start-ups.html
t.me/RedPillDealer4833
https://www.cnbc.com/amp/2022/10/24/how-googles-former-ceo-eric-schmidt-helped-write-ai-laws-in-washington-without-publicly-disclosing-investments-in-ai-start-ups.html
t.me/RedPillDealer4833
This media is not supported in your browser
VIEW IN TELEGRAM
"I'm incredibly excited about the Human Immunome Project,
eric schmidt 11/29/22
https://youtu.be/n1KwTgONQr0
"I'm incredibly excited about the Human Immunome Project, basically because I think we can try to do the kind of research that can really save millions of lives"
eric schmidt 11/29/22
https://youtu.be/n1KwTgONQr0
"I'm incredibly excited about the Human Immunome Project, basically because I think we can try to do the kind of research that can really save millions of lives"
This media is not supported in your browser
VIEW IN TELEGRAM
👁 Former Google CEO Eric Schmidt Becomes “Licensed Arms Dealer”
Schmidt recently transitioned into the defense sector by launching a startup called White Stork, which focuses on developing AI-driven drones.
The company aims to create low-cost, AI-targeted kamikaze drones capable of operating in GPS-jammed environments.
From Big Tech to the Military Industrial Complex - merging AI with war is bound to end well… 🤡
@RiseGS
Schmidt recently transitioned into the defense sector by launching a startup called White Stork, which focuses on developing AI-driven drones.
The company aims to create low-cost, AI-targeted kamikaze drones capable of operating in GPS-jammed environments.
From Big Tech to the Military Industrial Complex - merging AI with war is bound to end well… 🤡
@RiseGS
“We would just create a tech company.” He goes on to sketch out a vision of the internet of things with a deadly twist. “It would build a large number of inexpensive devices that were highly mobile, that were attritable, and those devices—or drones—would have sensors or weapons, and they would be networked together.” —ActivistPost
■■■□□ SmuggleShield is a browser extension that aims to prevent basic HTML smuggling attacks by detecting common patterns. While this is not a comprehensive or bulletproof solution, it is an attempt to provide an additional layer of security during browsing or during your red/puprle team exercise.
https://github.com/RootUp/SmuggleShield
https://github.com/RootUp/SmuggleShield
GitHub
GitHub - RootUp/SmuggleShield: Protection against HTML smuggling attacks.
Protection against HTML smuggling attacks. Contribute to RootUp/SmuggleShield development by creating an account on GitHub.
China achieves breakthrough in satellite-to-ground laser communication, paving the way for 6G. https://www.scmp.com/news/china/science/article/3293038/china-beats-starlink-hi-res-space-ground-laser-transmission-6g-standard "Musk's Starlink has revealed its laser inter-satellite communication system but hasn't deployed laser satellite-to-ground communication YET.
Bing🎯 2025
Bing🎯 2025
This media is not supported in your browser
VIEW IN TELEGRAM
Nokia 6G: Connecting Humans & Digital Worlds
Nokia and WEF plan to use humans as antennas for 6G. This is all connected to the Metaverse and the transhuman agenda, which is the end goal of the beast system.
New wireless generations come in 10-year cycles. Nokia Bell Labs have already started 6G research ahead of its arrival in the 2030s. But what is 6G and what is involved in getting there? 6G will connect the human and digital worlds. It will enable us to make holographic calls. It will include sensing capabilities that will enable us to see around corners.
👀 – 6G | Digital Twins & The Metaverse
Nokia and WEF plan to use humans as antennas for 6G. This is all connected to the Metaverse and the transhuman agenda, which is the end goal of the beast system.
New wireless generations come in 10-year cycles. Nokia Bell Labs have already started 6G research ahead of its arrival in the 2030s. But what is 6G and what is involved in getting there? 6G will connect the human and digital worlds. It will enable us to make holographic calls. It will include sensing capabilities that will enable us to see around corners.
👀 – 6G | Digital Twins & The Metaverse
Media is too big
VIEW IN TELEGRAM
Are We Building A Digital Mega Prison? 5G, 6G, and 7G Examined
The short answer: Yes
The long answer: Watch the video
The short answer: Yes
The long answer: Watch the video
Forwarded from It's FOSS
A quick chat with Kendall Nelson of the OpenInfra Foundation.
https://www.youtube.com/watch?v=W4GTjR1XIak
https://www.youtube.com/watch?v=W4GTjR1XIak
YouTube
In Conversation with Kendall Nelson, Dev Advocate at OpenInfra
Kendall is an Upstream Developer Advocate at the Open Infrastructure Foundation based in the United States.
She shares here views at the recently concluded openEuler summit 2024.
#itsfossateulersummit
She shares here views at the recently concluded openEuler summit 2024.
#itsfossateulersummit
This is why you should care about Degoogled phones and tech privacy because you're going to end up being de-banked one day if you don't.
https://www.youtube.com/watch?v=MmO2Lxz_Uu8
https://www.youtube.com/watch?v=MmO2Lxz_Uu8
YouTube
A New Control Tool to Disrupt Freedom and Free Speech
The government has found a new way to exercise more control over free speech; a method that is above the law and a thousand times more serious than simple censorship. This dangerous technique is done as a manipulation of existing regulations to suit the party…
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️ How Hackers Exploit Big Tech Phones
@takebackourtech
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I explore how mobile network injection attacks use fake cell towers to redirect you from regular sites to a site that can infect your phone.
Those who may be surveilled should watch this.
Sign up FREE to watch more webinar clips here.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
@takebackourtech
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I explore how mobile network injection attacks use fake cell towers to redirect you from regular sites to a site that can infect your phone.
Those who may be surveilled should watch this.
Sign up FREE to watch more webinar clips here.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech