Forwarded from ransomthehost
This media is not supported in your browser
VIEW IN TELEGRAM
These people were the dumbest people to ever live. Not a chance in hell DC could possibly know who had what in those days
👇
👇
Forwarded from The Daily Psyop (PsyopDailyScheduler)
🔗SOURCE ➡️ Jackson Hinkle
Related: 10/13/24 — This is Entisar Hijaze, she’s a 23 year old teacher from Nazareth.
8/17/24 — Wow! This Is Must Watch Television.
Follow us on Minds / X / Substack
Boost This Channel
Follow ➡️ @PsyopDaily
Please open Telegram to view this post
VIEW IN TELEGRAM
Digital Threat Modeling Under Authoritarianism
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling.
In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a way to think about potential risks, possible defenses, and the costs of both. It’s how experts avoid being distracted by irrelevant risks or overburdened by undue costs...
https://www.schneier.com/blog/archives/2025/09/digital-threat-modeling-under-authoritarianism.html
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling.
In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a way to think about potential risks, possible defenses, and the costs of both. It’s how experts avoid being distracted by irrelevant risks or overburdened by undue costs...
https://www.schneier.com/blog/archives/2025/09/digital-threat-modeling-under-authoritarianism.html
Schneier on Security
Digital Threat Modeling Under Authoritarianism - Schneier on Security
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to…
BREAKING: Peer-Reviewed Reanalysis of the Henry Ford Birth Cohort Study Finds Vaccinated Children Sicker Across All 22 Chronic Disease Categories
Our newly published, peer-reviewed critique and independent reanalysis of the Henry Ford vaccinated–unvaccinated birth cohort study (Lamerato et al.) — revealed at the U.S. Senate Hearing on September 9, 2025 — shows that the original authors failed to analyze or disclose the dramatic proportional differences present in their own data.
https://www.globalresearch.ca/henry-ford-birth-cohort-study-finds-vaccinated-children-sicker-22-chronic-disease/5908854
Our newly published, peer-reviewed critique and independent reanalysis of the Henry Ford vaccinated–unvaccinated birth cohort study (Lamerato et al.) — revealed at the U.S. Senate Hearing on September 9, 2025 — shows that the original authors failed to analyze or disclose the dramatic proportional differences present in their own data.
https://www.globalresearch.ca/henry-ford-birth-cohort-study-finds-vaccinated-children-sicker-22-chronic-disease/5908854
AI is fake, QC is fake. Stop falling for marketing schemes
Cheating on Quantum Computing Benchmarks
quantum factorisation is performed using sleight-of-hand numbers that have been selected to make them very easy to factorise using a physics experiment and, by extension, a VIC-20, an abacus, and a dog. A standard technique is to ensure that the factors differ by only a few bits that can then be found using a simple search-based approach that has nothing to do with factorisation…. Note that such a value would never be encountered in the real world since the RSA key generation process typically requires that |p-q| > 100 or more bits [9]. As one analysis puts it, “Instead of waiting for the hardware to improve by yet further orders of magnitude, researchers began inventing better and better tricks for factoring numbers by exploiting their hidden structure” [10].
A second technique used in quantum factorisation is to use preprocessing on a computer to transform the value being factorised into an entirely different form or even a different problem to solve which is then amenable to being solved via a physics experiment…
https://www.schneier.com/blog/archives/2025/07/cheating-on-quantum-computing-benchmarks.html
Cheating on Quantum Computing Benchmarks
quantum factorisation is performed using sleight-of-hand numbers that have been selected to make them very easy to factorise using a physics experiment and, by extension, a VIC-20, an abacus, and a dog. A standard technique is to ensure that the factors differ by only a few bits that can then be found using a simple search-based approach that has nothing to do with factorisation…. Note that such a value would never be encountered in the real world since the RSA key generation process typically requires that |p-q| > 100 or more bits [9]. As one analysis puts it, “Instead of waiting for the hardware to improve by yet further orders of magnitude, researchers began inventing better and better tricks for factoring numbers by exploiting their hidden structure” [10].
A second technique used in quantum factorisation is to use preprocessing on a computer to transform the value being factorised into an entirely different form or even a different problem to solve which is then amenable to being solved via a physics experiment…
https://www.schneier.com/blog/archives/2025/07/cheating-on-quantum-computing-benchmarks.html
Schneier on Security
Cheating on Quantum Computing Benchmarks - Schneier on Security
Peter Gutmann and Stephan Neuhaus have a new paper—I think it’s new, even though it has a March 2025 date—that makes the argument that we shouldn’t trust any of the quantum factorization benchmarks, because everyone has been cooking the books: Similarly,…
Techlore Surveillance Report: Federal Court Just Dealt a Major Blow to Age Verification Laws
Episode webpage: https://techlore.tech/federal-court-just-dealt-a-major-blow-to-age-verification-laws/
Media file: https://sphinx.acast.com/p/open/s/65e15188b8456c00169f4864/e/694f604744fae3e802db2e06/media.mp3
Episode webpage: https://techlore.tech/federal-court-just-dealt-a-major-blow-to-age-verification-laws/
Media file: https://sphinx.acast.com/p/open/s/65e15188b8456c00169f4864/e/694f604744fae3e802db2e06/media.mp3
Techlore
Federal Court Just Dealt a Major Blow to Age Verification Laws
Techlore Surveillance Report: Weekly News for Your Digital Freedom
Forwarded from 🏴Truth Addict Media Archive🏴
Media is too big
VIEW IN TELEGRAM
Iain Davis Speaks At The Mass Non Compliance Protest Against Digital ID (2025)
🔥1
The Peter Schiff Show Podcast: Silver Rocket, Bitcoin Breakdown: Why Metals Are Crushing Crypto (2025 Recap)
Episode webpage: https://schiffradio.com
Media file: https://pdst.fm/e/dts.podtrac.com/redirect.mp3/pscrb.fm/rss/p/clrtpod.com/m/mgln.ai/e/137/audio4.redcircle.com/episodes/8b0249db-7259-46a4-9832-65be7e219103/stream.mp3
Episode webpage: https://schiffradio.com
Media file: https://pdst.fm/e/dts.podtrac.com/redirect.mp3/pscrb.fm/rss/p/clrtpod.com/m/mgln.ai/e/137/audio4.redcircle.com/episodes/8b0249db-7259-46a4-9832-65be7e219103/stream.mp3
The Peter Schiff Show
Peter Schiff
Peter Schiff is an economist, financial broker/dealer, author, frequent guest on national news, and host of the Peter Schiff Show Podcast. He follows up his daily two-hour show with a weekly two-hour podcast focusing on weekly economic data analysis and unbiased…
Brownstone Journal: The Fourth Big Lie of Vaccinology
Episode webpage: https://brownstone.org/articles/the-fourth-big-lie-of-vaccinology/
Media file: https://cdn.beyondwords.io/audio/projects/49654/podcasts/92aba0dc-1a0a-492e-9bbb-7c1159c6d732/versions/1767009737/media/349237d9723a16342827a007f78773ce_compiled.mp3
Episode webpage: https://brownstone.org/articles/the-fourth-big-lie-of-vaccinology/
Media file: https://cdn.beyondwords.io/audio/projects/49654/podcasts/92aba0dc-1a0a-492e-9bbb-7c1159c6d732/versions/1767009737/media/349237d9723a16342827a007f78773ce_compiled.mp3
Brownstone Institute
The Fourth Big Lie of Vaccinology ⋆ Brownstone Institute
The Fourth Big Lie of Vaccinology – declaring multiple simultaneous injections to be safe – is a reckless false assumption that has no basis.
Sunday Buffet @ Good Neighbor, Bad Citizen (private feed for thetruthaddict@tutanota.com): Roasted Stuffing!
Episode webpage: https://goodneighborbadcitizen.substack.com/p/roasted-stuffing
Media file: https://api.substack.com/feed/podcast/182615828/27f829c6f417ff11d4ab2d8d6a25d320.mp3?token=742a8599-184d-4bee-a865-53fb25bcb59e
Episode webpage: https://goodneighborbadcitizen.substack.com/p/roasted-stuffing
Media file: https://api.substack.com/feed/podcast/182615828/27f829c6f417ff11d4ab2d8d6a25d320.mp3?token=742a8599-184d-4bee-a865-53fb25bcb59e
Substack
Roasted Stuffing!
Sunday Buffet 2.05