The Hated One

F-Droid is a repository of Free and Open Source apps for Android. It's your first step on the journey to improve your smartphone privacy and security.

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

If you want to regain more control over your device and enhance your privacy and security, F-Droid is where you want to start. F-Droid gives you the opportunity to take your phone completely Google-free, because you can find a free and privacy-respecting alternative for pretty much any mainstream app on Play Store that doesn’t sell your data to Facebook or Google. If you are running LineageOS or some other custom ROM, you can avoid Google privacy invasion through Play Store by using F-Droid instead.

Sources
F-Droid https://f-droid.org/
How to install APK files from unknown sources on Android https://www.maketecheasier.com/install-apps-from-unknown-sources-android/
APK verifying tool https://apkpure.com/apk-signature-verification
NetGuard https://f-droid.org/en/packages/eu.faircode.netguard/
WebApps https://f-droid.org/en/packages/com.tobykurien.webapps/
Bromite for F-Droid https://www.bromite.org/fdroid
DuckDuckGo Privacy Browser https://f-droid.org/en/packages/com.duckduckgo.mobile.android/
Firefox Focus (Klar) https://f-droid.org/en/packages/org.mozilla.klar/
New Pipe https://f-droid.org/en/packages/org.schabi.newpipe/
Simple Apps - all can be found on F-Droid https://www.simplemobiletools.com/

Credits:
Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use law..

Network security tutorial that will teach you how you can secure your Wi-Fi, enhance the security of your router, firmware and network overall.

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Sources:
Cybersecurity will cost $6 trillion annually by 2021 https://www.forbes.com/sites/cognitiveworld/2018/09/05/a-scoville-heat-scale-for-measuring-cybersecurity/
How to open Command Prompt on Windows https://www.lifewire.com/how-to-open-command-prompt-2618089
Enable Windows Defender Firewall https://support.microsoft.com/en-us/help/4028544/windows-10-turn-windows-defender-firewall-on-or-off
Enable Firewall on Mac https://support.apple.com/en-us/HT201642
Linux firewall https://gufw.org/
NetGuard https://www.netguard.me/
Lockdown https://apps.apple.com/us/app/lockdown-apps/id1469783711

HTTPS EVERYWHERE Firefox https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/
- Chrome https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp
Tor https://www.torproject.org/
Tails https://tails.boum.org/
Whonix https://www.whonix.org/
ProtonVPN https://protonvpn.com/
Mullvad https://mullvad.net/en/

Change your DNS provider on Android, Mac, Windows, etc.
https://developers.google.com/speed/public-dns/docs/using
Encrypted DNS providers http://privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/providers/dns/
Comprehensive list of DNS-over-HTTPS providers https://github.com/curl/curl/wiki/DNS-over-HTTPS
DNScloak for iOS https://apps.apple.com/us/app/dnscloak-secure-dns-client/id1452162351

Pi-Hole tutorial from Linus Tech Tips https://www.youtube.com/watch?v=KBXTnrD_Zs4

Open source firmware alternatives http://privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/operating-systems/
OpenWRT open source firmware https://openwrt.o..

Part 2 of the digital security talk with Daniel from Safing.io. In this part, we discuss specific tools and strategies you can use to enhance your security online.

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

CNBC just released a video titled “How the U.S. avoided a recession for a decade”. And it's a case study of an appeal to authority.

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Original video: https://www.youtube.com/watch?v=0bVtfj29V9Q

Argument from authority, also known as appeal to authority, is when someone’s authority is used as evidence of their claims on its own. It’s a deeply unscientific conduct.

CNBC will try to show you how the U.S. has went through its longest economic expansion in history. And they won’t do it by proposing or explaining an academically scrutinized economic theory. They will do this by letting corporate officials and politicians make their talking points.

Sources:

Check my sources in my previous video on the Federal Reserve and economic recession https://www.youtube.com/watch?v=6_s1Zbs20aA

Home ownership rates https://tradingeconomics.com/united-states/home-ownership-rate
Employment-population ratio https://fred.stlouisfed.org/series/EMRATIO
The cost of Medicare for all https://www.bloomberg.com/news/articles/2018-07-30/study-medicare-for-all-bill-estimated-at-32-6-trillion
Moody's penalty https://www.theguardian.com/business/2017/jan/14/moodys-864m-penalty-for-ratings-in-run-up-to-2008-financial-crisis

Credits
Music by Chuki Beats https://www.youtube.com/user/CHUKImusic

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

This is an ultimate security guide for mobile devices, both iOS and Android. Learn how to improve your smartphone security and protect your mobile phone and your private data.

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Essential security tools and tips

Encrypt your phone
Android: https://www.guidingtech.com/68187/encrypt-android-phone/
iOS & Android https://nakedsecurity.sophos.com/2015/06/02/why-you-shouldnt-worry-about-privacy-and-security-on-your-phone/

Find My Device
Android: https://support.google.com/accounts/answer/6160491?hl=en
iOS https://support.apple.com/explore/find-my

Second-factor authentication
Android https://www.howtogeek.com/366653/how-to-make-android-as-secure-as-possible/
iOS: https://support.apple.com/en-us/HT204915
Authy https://authy.com/
Google Authenticator https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2 or App Store https://apps.apple.com/us/app/google-authenticator/id388497605
AndOTP https://play.google.com/store/apps/details?id=org.shadowice.flocke.andotp&hl=en_US or F-Droid https://f-droid.org/en/packages/org.shadowice.flocke.andotp/
FreeOTP https://freeotp.github.io/
Nitrokey https://www.nitrokey.com/
YubiKey https://www.yubico.com/

Updates
Android: https://support.google.com/android/answer/7680439
iOS: https://support.apple.com/en-us/HT202180

Application Firewall
Netguard https://www.netguard.me/
Lockdown https://lockdownhq.com/

Connectivity
Orbot: https://guardianproject.info/apps/orbot/
Tor Browser for Android: https://play.google.com/store/apps/details?id=org.torproject.torbrowser&hl=en_US
Onion Browser for iOS: https://apps.apple.com/us/app/onion-browser/id519296448

Encrypt backups, cloud and sync

Cryptomator https://cryptomator.org/
Nextcloud https://nextcloud.com/
iTunes encryption ht..

Support this channel on Patreon https://www.patreon.com/thehatedone

Part I of the full talk with Daniel from Safing.io. We discuss the current state of digital security, most common threats, GDPR, artificial intelligence and quantum computing.

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Check Safing at https://safing.io/

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Ultimate guide to securing your online accounts: password managers, second-factor authentication and operations security.

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

You need three things to secure your online accounts:
0) Password manager to generate strong and unique passwords
1) Second-factor authentication - the best option is NitroKey Fido or YubiKey, followed by USB or app-based 2FA one-time-passwords.
2) Good OPSEC - or operations security - without it, no tool can save you.

Sources and links:
OPSEC
https://www.amnesty.org/en/latest/research/2018/12/when-best-practice-is-not-good-enough/
https://ssd.eff.org/en/module/how-enable-two-factor-authentication
https://cpj.org/2019/01/cpj-safety-advisory-sophisticated-phishing-attacks.php
https://cpj.org/2019/07/digital-safety-kit-journalists.php
https://cpj.org/2019/09/digital-safety-remove-personal-data-internet.php
https://cpj.org/2019/01/digital-safety-using-security-keys-to-secure-accou.php
https://securityinabox.org/en/guide/malware/
https://arstechnica.com/information-technology/2018/09/british-airways-site-had-credit-card-skimming-code-injected/
What if you were phished https://www.forbes.com/sites/joegray/2019/09/16/5-critical-steps-to-take-after-being-phished/
Information security for journalists https://www.youtube.com/playlist?list=PLOZKbRUo9H_rhmlF5IrlT0jxCCJk_odLV

Tools [I have no affiliation with the following organizations]
Password managers
https://keepassxc.org/
https://bitwarden.com/

2FA apps
FreeOTP (iOS, Android) https://freeotp.github.io/
andOTP (Android) https://play.google.com/store/apps/details?id=org.shadowice.flocke.andotp && https://f-droid.org/packages/org.shadowice.flocke.andotp/
hint: both Bitwarden and KeepassXC offer 2FA TOTP

Security keys and TOTP on a USB
https://www.nitrokey.com..

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Is trusting your local ISp or a VPN provider more advisable than trusting a random person running a Tor exit node? Do you even have to trust a Tor exit node? Can you have privacy as a business model? These are the questions me and Daniel from Safing.io end up debating.

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

The U.S. Federal Reserve creates free money for those who are "creditworthy", which artificially raises their wealth, indebts the poor, and inflates money on people's savings. It's time to have a discussion whether this is acceptable in a society of the greatest income inequality in history.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

Sources
[1] https://geopolitics.co/2019/09/18/federal-reserve-intervenes-with-massive-repo-to-inject-cash-into-money-markets/
[2] https://www.wsj.com/articles/fed-to-conduct-first-overnight-repo-transactions-in-several-years-11568729757
[3] https://tradingeconomics.com/united-states/gdp-growth-annual
[4] https://tradingeconomics.com/united-states/inflation-cpi
[5] https://www.forbes.com/sites/leonlabrecque/2019/03/29/recessions-and-yield-curve-inversion-what-does-it-mean/
[6] https://tradingeconomics.com/united-states/business-confidence
[7] https://www.nytimes.com/interactive/2018/02/01/business/economy/wages-salaries-job-market.html
[8] https://apps.newyorkfed.org/markets/autorates/fed%20funds
[9] https://www.fhfa.gov/AboutUs/Reports/ReportDocuments/HPI_August2019.pdf
[10] https://www.marketwatch.com/investing/index/djia/charts
[11] https://www.epi.org/publication/state-of-american-wages-2018/
[12] https://markets.businessinsider.com/news/stocks/fed-repo-injects-billions-into-market-first-time-in-decade-2019-9-1028534289?
[13] https://moneymaven.io/mishtalk/economics/us-overnight-interest-rate-surges-to-10-fed-injects-emergency-75-billion-wJMW3d-SkECxvWo6Mj-A-A/
[14] https://news.yahoo.com/york-fed-steps-market-move-interest-rates-154639660.html?
[15] https://www.morningstar.com/news/dow-jones/20190917640..

Bitcoin is facing re-centralization. The cryptocurrency mining is becoming centralized and it’s due to a major design flaw in Bitcoin’s core protocol that still remains unfixed. And if nothing changes, it might be that Bitcoin will not survive its next decade.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Sources as referenced by numbers at the bottom left corner of the video frame:

[0a] https://www.metzdowd.com/pipermail/cryptography/2008-October/014810.html
[0b] https://www.coinmarketcap.com
[1] http://www.bitcoin.org/bitcoin.pdf
[2] https://www.bloomberg.com/news/articles/2011-11-28/secret-fed-loans-undisclosed-to-congress-gave-banks-13-billion-in-income
[3] https://www.coindesk.com/bitmain-bitcoin-mining-launch-second-mining-pool
[4] https://www.cryptocompare.com/mining/pools/f2pool/
[5] https://bitcoinmagazine.com/articles/btc-coms-bitcoin-mining-pool-dominance-threatened-by-poolin
[6] https://bitcoinmagazine.com/articles/upstart-poolin-discusses-growth-state-of-mining-and-bitcoin-in-china
[7] https://www.buybitcoinworldwide.com/mining/pools/
[8] https://www.blockchain.com/pools
[9] https://www.coinwarz.com/difficulty-charts/bitcoin-difficulty-chart
[10] https://en.bitcoin.it/wiki/Mining
[11] https://www.coindesk.com/bitcoin-mining-600-profit-consolidation-competitive
[12] https://www.theguardian.com/technology/2014/jun/16/bitcoin-currency-destroyed-51-attack-ghash-io
[13] https://www.reddit.com/r/Bitcoin/comments/1us7ey/warning_ghashio_is_nearing_51_leave_the_pool/
[14] https://heavyeditorial.files.wordpress.com/2014/01/ghashio_press_release.pdf
[15] https://www.coindesk.com/cex-io-response-fears-of-51-attack-spread
[16] https://learncryptography.com/cryptocurrency/51-attack
[17] https://medium.com/bitcoin-not-blockchain/is-bitcoin-mining-centralized-and-what-does-that-mean-for-my-co..

Fascinating interview with the CEO of Qwant (French-based search engine) and founder of Mozilla Europe Tristan Nitot.

You can see Qwant for yourself at https://qwant.com/ and https://betterweb.qwant.com/

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Chinese government lures U.S. businesses into its vast consumer markets and then use their businesses as proxies for political influence.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Sources:
[1] https://www.vox.com/2019/10/8/20904433/blizzard-hong-kong-hearthstone-blitzchung
[2] https://news.blizzard.com/en-us/hearthstone/23179289/hearthstone-grandmasters-asia-pacific-ruling
[3] https://news.blizzard.com/en-us/blizzard/23185888/regarding-last-weekend-s-hearthstone-grandmasters-tournament
[4] https://www.ign.com/articles/2019/10/10/verified-chinese-blizzard-account-doubles-down-on-political-policy
[5] https://www.pcgamer.com/hearthstone-card-art-changes/
[6] https://investor.activision.com/news-releases/news-release-details/activision-blizzard-announces-second-quarter-2019-financial
[7] https://nikopartners.com/china-pc-online-games/
[8] https://www.pcgamer.com/its-time-to-pay-attention-to-china-inside-the-worlds-largest-pc-games-industry/
[9] https://www.theverge.com/2019/10/7/20902947/nba-rockets-daryl-morey-hong-kong-protests-tweet-internet-speech-censorship-china
[10] https://www.businessinsider.com/china-suspend-nba-broadcasts-adam-silver-defend-daryl-morey-2019-10
[11] https://www.espn.com/nba/story/_/id/27770851/rockets-tilman-fertitta-distances-team-daryl-morey-tweet?
[12] https://www.washingtonexaminer.com/news/nba-under-fire-for-hong-kong-protest-tweet
[13] https://www.reuters.com/article/us-china-basketball-nba-nike/houston-rockets-nike-merchandise-disappears-from-china-stores-idUSKBN1WP109
[14] https://www.cbc.ca/news/entertainment/china-bohemian-rhapsody-1.5073331
[15] https://www.businessinsider.com/which-companies-have-changed-taiwan-description-china-2018-7?
[16] https://www.businessinsider.com/china-fined-muji-30000-for-describing-taiwan-as-a-country-2018-5
[17] https://www.bus..

Apple, Facebook, Google and Amazon are under investigation for anti-competitive behavior. However, the government that's investigating them is behind their very monopolization schemes they seek to stop.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

The Federal Trade Commission and the Department of Justice are investigating Apple, Facebook, Google and Amazon with an army of 50 attorneys general for their anti-competitive behavior and monopolizing their market positions.

The investigators are looking to find evidence that the big tech is conspiring to monopolize their market dominance. The question isn’t whether they have monopoly market shares, but whether they engage in practices that could lead them to become artificial monopolies.

This could lead to the greatest settlement fines in U.S. antitrust history or could even break up the Big Tech monopolies. But the real solution is in addressing the real root of the problem - monopolization of copyright and patented software.

Sources/references
[1] https://www.nytimes.com/2019/01/11/arts/fortnite-floss-dance-lawsuits.html
[2] https://www.yahoo.com/lifestyle/every-kid-dance-called-floss-heres-16-year-old-invented-225342533.html
[3] https://arstechnica.com/tech-policy/2019/09/congress-wants-facebook-google-apple-and-amazon-emails-as-probe-heats-up/
[4] https://arstechnica.com/tech-policy/2019/09/50-states-and-territories-launch-massive-joint-probe-into-google/
[5] https://judiciary.house.gov/story-type/letter/competition-digital-markets-document-request-91319
[6] https://medium.com/housejudiciary/house-antitrust-subcommittee-issues-document-requests-as-part-of-digital-markets-investigation-a07a683cf7e1
[7] https://www.valuewalk.com/2019/09/facebook-acquisitions-list/
[8] https://techcrunch.com/2013/02/28/facebook-acquires-atlas/
[9] http://blog.frie..

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

The Department of Justice is suing the NSA whistleblower and Macmillan Publishers for Snowden’s bestselling memoir Permanent Record. They want to seize all royalties not just from the book, but also from all the speeches that Snowden gave to keep himself alive.

The pre-publication review is a requirement to hand over to relevant government agencies any material former employees intend to talk about publicly or to anyone who is not authorized. The government has the right to reject or redact the publication in any way it chooses without giving any sensible explanation why. Failing to submit a publication for a review gives the government the right to seize all revenue generated from the forbidden material.

Sources:
[1] https://arstechnica.com/wp-content/uploads/2019/09/1-main.pdf
[1b] https://www.wired.com/story/after-six-years-in-exile-edward-snowden-explains-himself/
[2] https://arstechnica.com/tech-policy/2019/09/feds-seek-to-seize-all-profits-from-snowdens-book-over-nda-violation/
[3] https://www.aclu.org/press-releases/aclu-comment-edward-snowden-lawsuit
[4] https://www.aclu.org/press-releases/aclu-and-knight-institute-challenge-constitutionality-far-reaching-government
[5] https://www.vice.com/en_us/article/bjwvea/the-us-government-is-suing-edward-snowden
[6] https://www.nytimes.com/2012/04/21/us/judge-rules-on-profits-from-ishmael-jones-cia-book.html
[7,8] https://www.theguardian.com/world/2014/may/22/pentagon-report-snowden-leaks-national-security
[9] https://www.nytimes.com/2016/07/06/us/politics/hillary-clinton-fbi-email-comey.html
[10] https://www.nytimes.com/2016/05/26/us/politics/state-department-hillary-clinton-emails.html
[11] https://www.nytimes.com/2016/05/26/us/politics/state-department-hillary-clinton-emails.html
[12] https://www...

For over two years, 14 critical zero-day vulnerabilities in Apple's iOS have been weaponized into 5 privilege-escalating zero-click exploit chains that have remotely and completely taken over hundreds of thousands of iPhones. Apple's response? Not a big deal. This was just "narrow" "targeted" campaign.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

uBlock Origin tutorial: https://www.youtube.com/watch?v=2lisQQmWQkY

The exploits have been in some way used from at least September 2016 and the attackers were supporting their exploit chains since at least iOS 10.0.1 until 12.1.4. Infected users would immediately have all of their data from their devices uploaded to remote servers and updates sent every 60 seconds.

The data collected would include location, device model, keychain, name and serial number, phone number, contacts, messages, attachments, notes, list of installed apps, recordings, photos, files, call history, passwords and container directories of every app on the device.

The implant had a hardcoded list of apps from which it always uploaded plain-text data to the attacker controlled servers. Among the selected apps were: Gmail, Facebook, Skype, Telegraph, WhatsApp and others.

Sources
[1] https://techcrunch.com/2019/08/29/google-iphone-secretly-hacked/
[2] https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
[3] https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html
[4] https://www.vice.com/en_us/article/7x584y/exploit-sellers-say-there-are-more-iphone-hacks-on-the-market-than-theyve-ever-seen
[5] https://arstechnica.com/information-technology/2019/08/armed-with-ios-0days-hackers-indiscriminately-infected-iphones-for-two-years/
[6] https://www.wired.com/story/ios-attack-watering-hole-project-zero/
[7] https://www.apple.com/newsroom/2019/..

The Battle of Seattle was a week-long series of mass protests against the Ministerial Conference of the World Trade Organization hosted in downtown Seattle between November 30 and December 3 1999. It was one of the largest anti-globalization demonstrations and one of the first acts of mobilization coordinated via the Internet.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Sources:
[1] https://www.britannica.com/event/Seattle-WTO-protests-of-1999
[2] https://www.theguardian.com/world/1999/dec/04/wto.johnvidal1
[3] https://www.washingtonpost.com/wp-srv/WPcap/1999-12/01/089r-120199-idx.html?noredirect=on
[4] https://www.britannica.com/topic/World-Trade-Organization
[5] http://news.bbc.co.uk/2/hi/special_report/1999/11/99/battle_for_free_trade/549794.stm
[6] https://www.theguardian.com/world/1999/dec/05/wto.globalisation
[7] https://edition.cnn.com/ALLPOLITICS/time/1999/12/06/wto.html
[8] https://www.theguardian.com/world/1999/dec/05/wto.globalisation1
[9] https://web.archive.org/web/20070604232550/http://scid.stanford.edu/pdf/credpr63.pdf
[10] https://edition.cnn.com/ALLPOLITICS/time/1999/12/06/free.trade.html
[11] https://www.washingtonpost.com/business/economy/outsourcings-net-effect-on-us-jobs-still-an-open-ended-question/2012/07/01/gJQAs1szGW_story.html?noredirect=on
[12] http://community.seattletimes.nwsource.com/archive/?
[13] https://depts.washington.edu/wtohist/day1.htm
[14] https://fair.org/extra/prattle-in-seattle/
[15] https://mapcruzin.com/globalwatch/paul_hawken.htm
[16] https://www.salon.com/1999/12/10/anarchists/
[17] http://content.lib.washington.edu/wtoweb/index.html
[18] https://www.cbc.ca/news/world/wto-protests-hit-seattle-in-the-pocketbook-1.245428
[19] http://community.seattletimes.nwsource.com/archive/?date=20040117&slug=wto17m
[20] https://depts.washington.edu/wtohist/Repercus..

Cashless society seems like an inevitable progression into an easier, faster and more convenient future. But this comes at a huge of cost of privacy and anonymity of cash payments, and freedom from control over people's funds.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Limiting cash payments and banning high-value bank notes is becoming a global trend. In France the cap on cash transactions is only 1,000 euros and in Italy it’s at €2,999.99. The European Central Bank has recently stopped issuing €500-notes, although they will remain accepted as a legal tender indefinitely. India’s Prime Minister Modi banned the use of 500 and 1,000 rupee notes basically overnight. In Sweden, no high street bank in big cities handles cash anymore with 85% of the population banking online.

Sources:

[1] https://paleofuture.gizmodo.com/1970s-researchers-predicted-debit-cards-would-be-great-1699216972
[2] https://paleofuture.gizmodo.com/the-privacy-dangers-of-a-cashless-society-were-clear-ov-512266908
[3] https://paleofuture.gizmodo.com/the-privacy-dangers-of-a-cashless-society-were-clear-ov-512266908
[4] https://www.theguardian.com/australia-news/2018/may/08/australia-federal-budget-2018-cash-payment-crackdown-tax-evasion
[5] https://gizmodo.com/australia-bans-cash-for-all-purchases-over-7-500-start-1825946888
[6] https://coingeek.com/australian-bill-to-exclude-crypto-from-new-cash-payment-restrictions/
[7] https://www.theguardian.com/world/2016/feb/08/german-plan-prohibit-large-5000-cash-transactions-fierce-resistance
[8] https://www.bloomberg.com/news/articles/2016-05-04/ecb-decrees-slow-death-of-500-euro-note-in-fight-against-crime
[9] https://www.theguardian.com/world/2016/nov/08/india-withdraws-500-1000-rupee-notes-fight-corruption
[10] https://www.abc.net.au/news/2018-03-06/$100-note-could-be-dumped-to-starve-..

As Google prevented Tulsi Gabbard from running campaign ads on Google Search after her successful debate night, the reliability and credibility of moderation driven by machine-learning algorithms is put to question.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

On the night after the first Democratic debates, Tulsi Gabbard was the single most Google-searched candidate by far. However, Google suspended her advertising account for 6 hours and so drastically limited her ability to direct newcomers to her campaign website.

The classic argument goes that machine-learning algorithms are mathematical, and by their very nature, neutral and unbiased. In reality, algorithms reinforce biases they learn about from their training data.

These are the biases identified in the video that can negatively impact outcomes of machine-learning algorithms:
1. a) Incorporated biases from the training data
1. b) Bad training data
2. User-manipulated bias
3. Manual interference
4. Marginalizing minorities
5. Corporate (for profit/influence) bias

References:

[1] https://www.salon.com/2019/07/25/tulsi-gabbard-sues-google-for-50-million/
[2] https://thehill.com/policy/technology/454746-tulsi-gabbard-sues-google-over-censorship-claims
[3] https://www.theguardian.com/technology/2018/oct/16/facebook-political-activism-pages-inauthentic-behavior-censorship ; b) https://www.washingtontimes.com/news/2017/oct/23/internet-giants-show-power-to-shape-politics/
[4] https://gizmodo.com/former-facebook-workers-we-routinely-suppressed-conser-1775461006
[5] https://www.statista.com/statistics/216573/worldwide-market-share-of-search-engines/ b) https://www.omnicoreagency.com/facebook-statistics/
[6] https://techcrunch.com/2014/07/09/yelp-google-anti-trust/
[7] https://www.mtu.edu/magazine/2019-1/stories/algorithm-bias/
[8] https://www.ny..

Facebook's cryptocurrency Libra rides the decentralization bandwagon when in reality it might become the ultimate step towards wealth consolidation and information control of the global Facebook empire.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

You can donate completely anonymously with Monero. Learn more here: https://www.getmonero.org/

Facebook is going to launch its own cryptocurrency with the potential of turning the social network into the largest payment service in the world.
Zuckerberg promises strong privacy protections and claims the new digital currency will be independent of the Facebook company.
The new coin called Libra is planned to launch in early 2020, and to market it, Facebook is capitalizing on the growing popularity of blockchain cryptocurrencies.

Sources

Libra White Paper & official documentation
https://libra.org/en-US/white-paper/
https://libra.org/en-US/about-currency-reserve/
https://libra.org/en-US/association-council-principles/
https://libra.org/en-us/becoming-founding-member/
https://libra.org/en-US/permissionless-blockchain/#overview
https://developers.libra.org/docs/life-of-a-transaction
https://developers.libra.org/docs/libra-core-overview
https://developers.libra.org/docs/libra-protocol
https://developers.libra.org/docs/the-libra-blockchain-paper https://developers.libra.org/docs/assets/papers/the-libra-blockchain.pdf

News coverage of Libra
https://www.theguardian.com/technology/2019/may/24/facebook-plans-to-launch-globalcoin-cryptocurrency-in-2020
https://edition.cnn.com/2019/06/18/tech/facebook-libra-cryptocurrency/index.html
https://www.theverge.com/2019/6/18/18683867/facebook-cryptocurrency-libra-calibra-trust-banking
https://www.theverge.com/2019/6/26/18716326/facebook-libra-cryptocurrency-blockchain-irs-starbucks
https://www.nytimes.com/2019/06/19/opin..

In today's talk with David from Safing.io we are discussing Open Source software development as a business model and why opening source code is important and even beneficial for a business and a society.

Follow David and Safing

safing.io
stamp.community
twitter.com/davegson

Timestamps [to be updated]:

00:00 Hi
01:10 David's introduction and Safing products
08:32 How are you making money?
11:04 Business model
16:00 Why and what is Open Source?
40:00 Ideology of Open Source and Intellectual Property
59:00 Artificial Intelligence and Open Source

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

The United Kingdom, branded as the Énemy of the Internet, is on the path to become the world's first democracy turned into a digital dictatorship. This is how surveillance and censorship is changing the UK.

You can push back against the Online Hárms White Paper by giving your response at https://dcms.eu.qualtrics.com/jfe/form/SV_5nm7sPoxilSoTg9 by July 1 2019.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources
Online Harms White Paper full text https://www.gov.uk/government/consultations/online-harms-white-paper

News coverage & blogs
https://www.theguardian.com/technology/2019/apr/04/online-harms-white-paper-regulation-without-killing-innovation
https://www.wired.co.uk/article/online-harms-white-paper-uk-analysis
https://blogs.lse.ac.uk/mediapolicyproject/2019/04/10/the-online-harms-white-paper-its-approach-to-disinformation-and-the-challenges-of-regulation/
https://www.theguardian.com/commentisfree/2019/apr/14/white-paper-online-harms-global-first-needed-tech-industry-dcms-google-facebook

Enemies of the Internet by Reporters without Borders
https://rsf.org/sites/default/files/2014-rsf-rapport-enemies-of-the-internet.pdf
https://www.aljazeera.com/indepth/opinion/2012/04/201241373429356249.html

David Cameron calls to block social media
https://www.theguardian.com/uk/2011/aug/11/cameron-call-social-media-clampdown
https://www.theguardian.com/world/2011/jan/26/egypt-blocks-social-media-websites
https://news.yahoo.com/blogs/cutline/british-pm-david-cameron-considers-ban-twitter-facebook-150616849.html

Super-injunctions and libel laws
https://www.zdnet.com/article/google-facebook-twitter-warned-in-privacy-report/
https://www.zdnet.com/article/facebook-twitter-libel-claims-double-celebrities-still-prefer-super-injunctions/
https://www.zdnet.com/article/tech-injunction-gags-twitter-facebook-users-why-super-injunctions-onl..

Nimses is a new social media app promoted even by Pewdiepie. Its main selling point is that it rewards users who download the app with nims, a virtual currency. But the price of your privacy and the false promises of Nimses don't make it such a lucrative deal.

Support my channel by signing up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout.

What is Nimses?
Nimses would have you believe it’s an American company. But make no mistake about it. It’s a Ukrainian social media platform that is trying to penetrate Western markets. Nimses is incorporated in Delaware, which is ranked among the best and most convenient states to incorporate your company in the US if you are a foreign entity.

Nimses’ strategy to win against the dominance of the Facebook/Instagram empire is trying to lure users in by offering them a virtual currency for their time spent on the platform.

Nimses generates one nim every minute of your life on the platform. This virtual currency is centrally controlled by the company and its value doesn’t seem to be backed by anything other than what the company currently says.

Sources
https://nimses.com/privacy/
https://temples.nimses.com/
https://nimses.com/en/nimonomy
https://nimses.com/en/whitepaper
https://data.nimses.com/?lang=en
https://nimses.com/en/cookie-policy/

https://www.reddit.com/r/PewdiepieSubmissions/comments/bxzvso/not_a_meme_but_saw_lots_of_people_commenting_this/

Social media surveillance and privacy
https://theoutline.com/post/5380/targeted-ad-creepy-surveillance-facebook-instagram-google-listening-not-alone?zd=1&zi=ucbo5ff2
https://techcrunch.com/2018/09/27/yes-facebook-is-using-your-2fa-phone-number-to-target-you-with-ads/
https://techcrunch.com/2016/08/25/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out/
https://gizmodo.com/facebook-is-giving-advertisers-access-to-your-shadow-co-1828476051
https://www.propublica.org/article/facebook-doesnt-tell-u..

Facial recognition advertising as depicted in Minority Report is coming to your local stores sooner than you thought. The technology is becoming so mainstream it will become a part of the new social contract.

NordVPN affiliate link: https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' for 75% discount

Several US retailers, including Walgreens and Kroger, are piloting facial recognition advertising in physical stores. The goal is to use all available information from the cameras to target customers with relevant ads in a similar way online advertising targets Internet users.

Apps on your phone can use your high definition selfie camera to track your emotional expressions of your face as you listen to music, and suggest you playlists that correspond to your mood. A social media platform can track your face as you are typing that comment or text with your friends, and suggest you mood-specific ads.

All major technology companies are heavily investing into the development of facial recognition, including Google, Apple, Amazon, Samsung or Microsoft. With their massive reach on the market, it will soon become extremely difficult for you to avoid being identified every step of your way if you want to be a functioning individual.

Sources:

Amazon Facial Rekognition bias
https://www.nytimes.com/2019/04/03/technology/amazon-facial-recognition-technology.html
https://www.reuters.com/article/us-amazon-com-facial-recognition/amazons-face-id-tool-mismatched-28-members-of-congress-to-mug-shots-aclu-idUSKBN1KG1K7

Facial recognition targeted advertising
https://www.cbc.ca/news/technology/cameras-targeted-advertising-1.5107784
https://www.cbc.ca/news/technology/facial-recognition-technology-concerns-1.4826931
https://www.wsj.com/articles/walgreens-tests-digital-cooler-doors-with-cameras-to-target-you-with-ads-11547206200
https://www.theguardian.com/media/pda/2010/sep/27/advertising-billboards-facial-recognition-japan
https://www.targetmarketingmag.com/arti..

Microsoft _NSAKEY is a signing key found in Microsoft's CryptoAPI since Windows 95. Many claimed this was the ultimate backdoor for the National Security Agency. But is this a hoax, or is this a real backdoor in Microsoft Windows?

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

A British researcher discovered that Microsoft was cryptographically signing its CryptoAPI with two keys. This means two separate entities could approve software running inside Windows. One of those entities was Microsoft. The identity of the other one remained a mystery.

But then Microsoft shipped a Service Pack 5 for WindowsNT4. Somebody down the chain of command at Microsoft forgot to remove information revealing the true identity of both of the signing keys. Chief security scientist at Ontario-based Cryptonym Andrew Fernandes found the names of the two keys. One was simply called “_KEY”. And the other was “_NSAKEY”.

Sources
News coverage
https://www.wired.com/1999/09/ms-denies-windows-spy-key/
https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/biztech/articles/04soft.html
https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/cyber/articles/04soft-side.html
http://us.cnn.com/TECH/computing/9909/13/backdoor.idg/index.html
http://edition.cnn.com/TECH/computing/9909/03/windows.nsa.02/
http://news.bbc.co.uk/2/hi/sci/tech/437967.stm
https://www.computerworld.com/article/2521889/microsoft-denies-it-built--backdoor--in-windows-7.html

Security experts & opinions
https://web.archive.org/web/20000617163417/http://www.cryptonym.com/hottopics/msft-nsa/msft-nsa.html
https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI
https://www.heise.de/tp/features/How-NSA-access-was-built-into-Windows-3444341.html
http://www.stat.rice.edu/~dobelman/kstorm.txt
https://cryptome.org/nsakey-ms..

The indictment of Julián Assánge is going to change the world forever. After the árrest of the founder of WikiLeáks, the fate of journalism and free press is called into question.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

The arrest of WikiLeáks founder Julian Assánge is going to leave a mark in the history books. Assánge has a complicated personality. But the story of WikiLeáks throughout the years challenges the very foundations of what it means to live in a Western society. On April 11th, Assánge was arrested by London Metropolitan Police.

But what makes history is neither of these cases. It’s his subsequent arrest at a central police station in London by British authorities on behalf of the United States.

The US arrest came with an indictment accusing Assange of conspiracy to commit computer intrusion with former US military intelligence analyst Chelsea Manning. The federal government is now seeking to extradite Assange into the United State where he could face up to five years of prison time for this single charge.

The indictment counts four main acts as part of the conspiracy:
1. The communication between Assange and Manning using Jabber instant messaging service where they agreed to acquire and disseminate the classified documents and crack the password on one of the DoD computers.
2. The effort Assange took to conceal Manning as the source of the leak.The indictment counts four main acts as part of the conspiracy:
3. That Assange encouraged Manning to provide more information from the government systems.
4. And the fact that Assange and Manning used a cloud drop box to transmit the leaked documents.

Sources
Indictment
https://www.justice.gov/usao-edva/pr/wikileaks-founder-charged-computer-hacking-conspiracy
https://www.justice.gov/usao-edva/press-release/file/..

SHOW MORE

Created 2 years, 4 months ago.

76 videos

CategoryScience & Technology

Uncovering the wrongdoing of governments and corporations irrespective of the political tribe they claim to allign with. When corporate monopolies abuse their dominance and governments fail their electorates, come to this channel to learn how you can guard your digital rights on your own.

If you like what I do on this channel, consider supporting me through a crypto-currency of your choice. Help me build the first crypto-funded channel on YouTube!

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Dash
XyBDwdFQuZNCnThkeeg1FRFks65hKMkTux

Litecoin
LcHJvrovBfqDBQyfHcxxBErGM8qq5zho8s

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

https://twitter.com/The_HatedOne_
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne