memes, left to their own devices
https://mickeyz.substack.com/p/memes-left-to-their-own-devices
https://mickeyz.substack.com/p/memes-left-to-their-own-devices
Trump, the Final Downfall of this Country, and the Mass Slavery to Follow
https://garydbarnett.substack.com/p/trump-the-final-downfall-of-this-672
https://garydbarnett.substack.com/p/trump-the-final-downfall-of-this-672
Naomi Brockwell: Nothing to Hide
Gabriel Custodiet speaks with the long-time privacy instructor Naomi Brockwell about her origins, how to onboard normies to privacy, Flock cameras and private property, her updated thoughts on Bitcoin and crypto, and the mistakes parents make exposing their children online.
https://watchmanprivacy.substack.com/p/naomi-brockwell-nothing-to-hide
Gabriel Custodiet speaks with the long-time privacy instructor Naomi Brockwell about her origins, how to onboard normies to privacy, Flock cameras and private property, her updated thoughts on Bitcoin and crypto, and the mistakes parents make exposing their children online.
https://watchmanprivacy.substack.com/p/naomi-brockwell-nothing-to-hide
Substack
Naomi Brockwell: Nothing to Hide
Episode 211 of The Watchman Privacy Podcast – Naomi Brockwell: Nothing to Hide
Forwarded from Libertarian Media - Video/Audio/Memes/Articles
Cannabis: Don’t Just Reschedule, Deschedule
On December 18, US president Donald Trump signed an executive order — titled “Increasing Medical Marijuana and Cannabidiol Research” — which directs US attorney general Pam Bondi to “take all necessary steps to complete the rulemaking process related to rescheduling marijuana to Schedule III” from Schedule I.
To be clear up front, I’m not complaining: ANY relaxation of the federal government’s idiotic standards for, and ANY retreat in its evil war on, marijuana is a win.
It’s a win for patients whose ailments the drug addresses. It’s a win for taxpayers who fork over tens of billions of dollars a year to the DEA to maintain those standards and continue losing that war. And it’s a win for freedom in general.
https://thegarrisoncenter.org/archives/20206
On December 18, US president Donald Trump signed an executive order — titled “Increasing Medical Marijuana and Cannabidiol Research” — which directs US attorney general Pam Bondi to “take all necessary steps to complete the rulemaking process related to rescheduling marijuana to Schedule III” from Schedule I.
To be clear up front, I’m not complaining: ANY relaxation of the federal government’s idiotic standards for, and ANY retreat in its evil war on, marijuana is a win.
It’s a win for patients whose ailments the drug addresses. It’s a win for taxpayers who fork over tens of billions of dollars a year to the DEA to maintain those standards and continue losing that war. And it’s a win for freedom in general.
https://thegarrisoncenter.org/archives/20206
Canary Cry News Talk: Rigging Reality, Trump Moonbase, Palantir Monestary, Intel Ops for Society, Antarctica Egg | CCNT 902
Episode webpage: https://canarycrynewstalk.libsyn.com/rigging-reality-trump-moonbase-palantir-monestary-intel-ops-for-society-antarctica-egg-ccnt-902
Media file: https://traffic.libsyn.com/clean/secure/canarycrynewstalk/ccnt902_convo_mixdown.mp3?dest-id=400745
Episode webpage: https://canarycrynewstalk.libsyn.com/rigging-reality-trump-moonbase-palantir-monestary-intel-ops-for-society-antarctica-egg-ccnt-902
Media file: https://traffic.libsyn.com/clean/secure/canarycrynewstalk/ccnt902_convo_mixdown.mp3?dest-id=400745
Libsyn
Canary Cry News Talk: Rigging Reality, Trump Moonbase, Palantir Monestary, Intel Ops for Society, Antarctica Egg | CCNT 902
RIGGING REALITY - 12.22.2025 - #902 BestPodcastintheMetaverse.com Canary Cry News Talk #902 - 12.22.2025 - Recorded Live to 1s and 0s Deconstructing World Events from a Biblical Worldview Declaring Jesus as Lord amidst the Fifth Generation War! Cage…
TFTC: A Bitcoin Podcast: #692: Free Samourai with Keonne Rodriguez
Media file: https://feeds.fountain.fm/ZwwaDULvAj0yZvJ5kdB9/items/My5nxMtzgpb5Wz1rmPc4/files/AUDIO---DEFAULT---dfdd986e-3c74-43b7-b493-f99752f01f78.mp3
Media file: https://feeds.fountain.fm/ZwwaDULvAj0yZvJ5kdB9/items/My5nxMtzgpb5Wz1rmPc4/files/AUDIO---DEFAULT---dfdd986e-3c74-43b7-b493-f99752f01f78.mp3
Unlimited Hangout with Whitney Webb: Trump & the Technocratic Tyranny with Iain Davis
Episode webpage: https://unlimitedhangout.com
Media file: https://feeds.fountain.fm/Io7FC9RWfnv3bhIeI3sM/items/Tj8IfuCgbuFQMnDNdtPs/files/AUDIO---DEFAULT---6d53148a-5832-4f91-83da-1a2818ad3324.mp3
Episode webpage: https://unlimitedhangout.com
Media file: https://feeds.fountain.fm/Io7FC9RWfnv3bhIeI3sM/items/Tj8IfuCgbuFQMnDNdtPs/files/AUDIO---DEFAULT---6d53148a-5832-4f91-83da-1a2818ad3324.mp3
Unlimited Hangout
Unlimited Hangout with Whitney Webb
Uncensored Investigative Journalism
Brownstone Journal: How a Grown-Up Health Care System Operates
Episode webpage: https://brownstone.org/articles/how-a-grown-up-health-care-system-operates/
Media file: https://cdn.beyondwords.io/audio/projects/49654/podcasts/423c1480-28d3-4fd7-95cc-da890ba0910a/versions/1766491567/media/4e675991efe04f6676771e5e5f4e9d6b_compiled.mp3
Episode webpage: https://brownstone.org/articles/how-a-grown-up-health-care-system-operates/
Media file: https://cdn.beyondwords.io/audio/projects/49654/podcasts/423c1480-28d3-4fd7-95cc-da890ba0910a/versions/1766491567/media/4e675991efe04f6676771e5e5f4e9d6b_compiled.mp3
Brownstone Institute
How a Grown-Up Health Care System Operates ⋆ Brownstone Institute
If you get chance to take control of your “health care”, like with Health Savings Account, you might consider that.
Forwarded from ransomthehost
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from ransomthehost
This media is not supported in your browser
VIEW IN TELEGRAM
These people were the dumbest people to ever live. Not a chance in hell DC could possibly know who had what in those days
👇
👇
Forwarded from The Daily Psyop (PsyopDailyScheduler)
🔗SOURCE ➡️ Jackson Hinkle
Related: 10/13/24 — This is Entisar Hijaze, she’s a 23 year old teacher from Nazareth.
8/17/24 — Wow! This Is Must Watch Television.
Follow us on Minds / X / Substack
Boost This Channel
Follow ➡️ @PsyopDaily
Please open Telegram to view this post
VIEW IN TELEGRAM
Digital Threat Modeling Under Authoritarianism
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling.
In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a way to think about potential risks, possible defenses, and the costs of both. It’s how experts avoid being distracted by irrelevant risks or overburdened by undue costs...
https://www.schneier.com/blog/archives/2025/09/digital-threat-modeling-under-authoritarianism.html
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling.
In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a way to think about potential risks, possible defenses, and the costs of both. It’s how experts avoid being distracted by irrelevant risks or overburdened by undue costs...
https://www.schneier.com/blog/archives/2025/09/digital-threat-modeling-under-authoritarianism.html
Schneier on Security
Digital Threat Modeling Under Authoritarianism - Schneier on Security
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to…
BREAKING: Peer-Reviewed Reanalysis of the Henry Ford Birth Cohort Study Finds Vaccinated Children Sicker Across All 22 Chronic Disease Categories
Our newly published, peer-reviewed critique and independent reanalysis of the Henry Ford vaccinated–unvaccinated birth cohort study (Lamerato et al.) — revealed at the U.S. Senate Hearing on September 9, 2025 — shows that the original authors failed to analyze or disclose the dramatic proportional differences present in their own data.
https://www.globalresearch.ca/henry-ford-birth-cohort-study-finds-vaccinated-children-sicker-22-chronic-disease/5908854
Our newly published, peer-reviewed critique and independent reanalysis of the Henry Ford vaccinated–unvaccinated birth cohort study (Lamerato et al.) — revealed at the U.S. Senate Hearing on September 9, 2025 — shows that the original authors failed to analyze or disclose the dramatic proportional differences present in their own data.
https://www.globalresearch.ca/henry-ford-birth-cohort-study-finds-vaccinated-children-sicker-22-chronic-disease/5908854
AI is fake, QC is fake. Stop falling for marketing schemes
Cheating on Quantum Computing Benchmarks
quantum factorisation is performed using sleight-of-hand numbers that have been selected to make them very easy to factorise using a physics experiment and, by extension, a VIC-20, an abacus, and a dog. A standard technique is to ensure that the factors differ by only a few bits that can then be found using a simple search-based approach that has nothing to do with factorisation…. Note that such a value would never be encountered in the real world since the RSA key generation process typically requires that |p-q| > 100 or more bits [9]. As one analysis puts it, “Instead of waiting for the hardware to improve by yet further orders of magnitude, researchers began inventing better and better tricks for factoring numbers by exploiting their hidden structure” [10].
A second technique used in quantum factorisation is to use preprocessing on a computer to transform the value being factorised into an entirely different form or even a different problem to solve which is then amenable to being solved via a physics experiment…
https://www.schneier.com/blog/archives/2025/07/cheating-on-quantum-computing-benchmarks.html
Cheating on Quantum Computing Benchmarks
quantum factorisation is performed using sleight-of-hand numbers that have been selected to make them very easy to factorise using a physics experiment and, by extension, a VIC-20, an abacus, and a dog. A standard technique is to ensure that the factors differ by only a few bits that can then be found using a simple search-based approach that has nothing to do with factorisation…. Note that such a value would never be encountered in the real world since the RSA key generation process typically requires that |p-q| > 100 or more bits [9]. As one analysis puts it, “Instead of waiting for the hardware to improve by yet further orders of magnitude, researchers began inventing better and better tricks for factoring numbers by exploiting their hidden structure” [10].
A second technique used in quantum factorisation is to use preprocessing on a computer to transform the value being factorised into an entirely different form or even a different problem to solve which is then amenable to being solved via a physics experiment…
https://www.schneier.com/blog/archives/2025/07/cheating-on-quantum-computing-benchmarks.html
Schneier on Security
Cheating on Quantum Computing Benchmarks - Schneier on Security
Peter Gutmann and Stephan Neuhaus have a new paper—I think it’s new, even though it has a March 2025 date—that makes the argument that we shouldn’t trust any of the quantum factorization benchmarks, because everyone has been cooking the books: Similarly,…