🏴TheTruthAddict🏴
199 subscribers
18.3K photos
4.47K videos
1.26K files
38.4K links
thetruthaddict.substack.com
Fedi: @thetruthaddict@noauthority.social

XMR
8AVwAiPGVRGSrsfpvjjGBPQcZmHJpkRWwCripXFKdQVYLyc1zmhWAr2itCGn61btVhDcARZ1RpGc9LHSAoX1GJAZJrJA2Hs
Download Telegram
Escape Key: ​​Reverse Engineering the Architecture of Totalitarian Control

Ben Rubin spoke with Escape Key, a systems analyst who has researched the methods, means, and origins of the global dictatorship that has already been built.

https://youtu.be/wic1sGd-0-E
1
How the world can free itself from US financial colonialism: Economist Michael Hudson explains

Economist Michael Hudson describes how the Western powers designed the international financial, legal, and political system in a way that benefits North American corporations at the expense of the countries of the Global South. He also proposes ways for the Global Majority to resist US neocolonialism, in this interview with host Ben Norton.

https://youtu.be/tgBUbbTF5Sg
The New Oil

The Beginner’s Guide to
Data Privacy & Cybersecurity

How would you like to feel - and more importantly, be - safe online again? Most of us know that we could be doing better when it comes to our online habits: we reuse bad passwords, overshare personal information, and leave ourselves exposed to all kinds of risks all over the internet. But it doesn’t have to be that way and it doesn’t have to be hard, either.

Welcome to The New Oil. This site is designed to help readers take back control of their data and regain their privacy online. Are you a programmer, sysadmin, networking expert, or hacker? If you answered “no,” you’re in the right place! This site is not aimed at tech experts. If you know how to download an app on your phone, how to sign up for an email account, or what a password is, you’ve got the qualifications to tackle the advice and content on this site.

Whether you’re looking to keep yourself safe from identity theft and common hacks, whether you simply object to mass surveillance, or anything in between, this site will help you learn the basics about protecting your identity, your safety, and your data in a way that’s accessible and achievable. Welcome to privacy made easy.


https://thenewoil.org/en/
RockYou2024: 10 billion passwords leaked in the largest compilation of all time

The largest password compilation with nearly ten billion unique passwords was leaked on a popular hacking forum. The Cybernews research team believes the leak poses severe dangers to users prone to reusing passwords.

https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
Media is too big
VIEW IN TELEGRAM
Crypto Anarchist Manifesto | Crypto Anarchist Series | Episode 1 (WiM273)

Max Hillebrand is a free software entrepreneur building tools to empower individual sovereignty. He joins me for a series of conversations covering the work on crypto-anarchism. In this episode, we discuss the "Crypto Anarchist Manifesto" written by Timothy C. May.

The crypto anarchist manifesto
https://theanarchistlibrary.org/library/timothy-c-may-crypto-anarchist-manifesto

https://youtu.be/3e_qXR4cubw?list=PL2jAZ0x9H0bQLp8fuFb-xHF7gCO7PosTH
Media is too big
VIEW IN TELEGRAM
A Cypherpunk Manifesto | Crypto Anarchist Series | Episode 2 (WiM299)

Max Hillebrand joins me for a series of conversations covering various works on crypto-anarchism. In this episode, we discuss "A Cypherpunk's Manifesto" written by Eric Hughes.

A Cypherpunk's Manifesto
https://www.activism.net/cypherpunk/manifesto.html

https://youtu.be/RPfA_uqeo-8?list=PL2jAZ0x9H0bQLp8fuFb-xHF7gCO7PosTH
Media is too big
VIEW IN TELEGRAM
A Declaration of the Independence of Cyberspace | Crypto Anarchist Series | Episode 3 (WiM416)

Max Hillebrand joins me for a series of conversations covering various works on crypto-anarchism. In this episode, we discuss "A Declaration of the Independence of Cyberspace" written by John Perry Barlow.


A Declaration of the Independence of Cyberspace
https://www.eff.org/cyberspace-independence

https://youtu.be/xF2PwQbCgcI?list=PL2jAZ0x9H0bQLp8fuFb-xHF7gCO7PosTH
Media is too big
VIEW IN TELEGRAM
A Declaration of Separation | Crypto Anarchist Series | Episode 4 (WiM429)

Max Hillebrand joins me for a series of conversations covering various works on crypto-anarchism. In this episode, we discuss the essay titled “A Declaration of Separation”.

A Declaration of Separation
https://web.archive.org/web/20210801184140/https://anarplex.net/hosted/files/declarationseparation.html

https://youtu.be/yj8th_ekOdc?list=PL2jAZ0x9H0bQLp8fuFb-xHF7gCO7PosTH
Forwarded from Working Men Memes (Atomic Rooster)
This media is not supported in your browser
VIEW IN TELEGRAM
Can one be domesticated?
Forwarded from Herding Cats
HOW TO ERASE YOURSELF FROM DATA BROKER SITES

Concrete Steps. No Forgiveness. Just Erasure.
You’re being sold.

Your name, age, address, income, family tree, political lean, buying habits, and what you searched for last night while half asleep. It’s all out there. Indexed. Packaged. Sold.

This isn’t a side hustle. It’s an industry worth over $250 billion.
And you didn’t consent to any of it.

Data brokers scrape, hoard, and sell your life story to advertisers, insurance companies, government agencies, and anyone else with a credit card. It’s surveillance-as-a-service.

You don’t get to opt in, but you can claw back some control.

No apologies. Just erasure.


https://untraceabledigitaldissident.com/how-to-erase-yourself-from-data-broker-sites/
How to Build a Strong Digital Persona

How to Build a Strong Digital Persona: A Guide for Privacy Conscious Individuals

Most people walk into the internet like it’s their living room.
Same name. Same photo. Same email. Everywhere.

If that sounds like you, stop doing that.

The web isn’t neutral. It remembers everything.
So if you want to stay private, you need to stop being one person online.

Time to compartmentalize.


https://untraceabledigitaldissident.com/how-to-build-a-strong-digital-persona/
🔥
Full-Chain Membership Proofs Development

Full-Chain Membership Proofs, as a concept, is a replacement for rings within the Monero protocol. While rings have offered sender privacy to Monero since it launched, they're vulnerable to attacks such as the EAE attack, have difficulties upon chain reorganizations, and in general enable statistical analysis (mitigated by distribution of the decoy selection algorithm). Full-Chain Membership Proofs prove the output spent is one of any output on the chain, effectively removing all of these risks. This means every input goes from an immediate anonymity set of 16 to 100,000,000.

https://www.getmonero.org/2024/04/27/fcmps.html
New Xfinity router motion-detecting feature stokes privacy fears — feature powered by Wi-Fi signals

'...At face value, this sounds convenient, and it would have been fine and dandy if Xfinity hadn't pulled the classic fine print shenanigans. Buried deep within the terms of service, the company has a clause stating that once you enable this feature, you give the company the right to collect and log your data, which can subsequently be sold to advertisers...'

https://www.tomshardware.com/networking/routers/new-xfinity-router-motion-detecting-feature-stokes-privacy-fears-feature-powered-by-wi-fi-signals