The Hated One

The indictment of Julián Assánge is going to change the world forever. After the árrest of the founder of WikiLeáks, the fate of journalism and free press is called into question.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

The arrest of WikiLeáks founder Julian Assánge is going to leave a mark in the history books. Assánge has a complicated personality. But the story of WikiLeáks throughout the years challenges the very foundations of what it means to live in a Western society. On April 11th, Assánge was arrested by London Metropolitan Police.

But what makes history is neither of these cases. It’s his subsequent arrest at a central police station in London by British authorities on behalf of the United States.

The US arrest came with an indictment accusing Assange of conspiracy to commit computer intrusion with former US military intelligence analyst Chelsea Manning. The federal government is now seeking to extradite Assange into the United State where he could face up to five years of prison time for this single charge.

The indictment counts four main acts as part of the conspiracy:
1. The communication between Assange and Manning using Jabber instant messaging service where they agreed to acquire and disseminate the classified documents and crack the password on one of the DoD computers.
2. The effort Assange took to conceal Manning as the source of the leak.The indictment counts four main acts as part of the conspiracy:
3. That Assange encouraged Manning to provide more information from the government systems.
4. And the fact that Assange and Manning used a cloud drop box to transmit the leaked documents.

Sources
Indictment
https://www.justice.gov/usao-edva/pr/wikileaks-founder-charged-computer-hacking-conspiracy
https://www.justice.gov/usao-edva/press-release/file/..

Intel embeds Management Engine into all of its computers since 2008. Intel Management Engine has been criticized for its security risks and has been called a backdoor with rootkit possibilities by many security experts and researchers.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

This is Intel Management Engine. A subsystem microprocessor that’s operating inside every Intel CPU platform made from 2008 onward.
Despite its name and some basic functions, we don’t know anything about what Intel Management really does.

What we do know is that this microcontroller works completely independently from the main CPU. It can’t be manually removed or disabled. Even if the main computer is powered off, as long as it is plugged in to the mains or the battery, IME will continue to run.
Intel Management Engine is a computer within a computer. It is running it’s own operating system, called Minix, and is installed by default on every modern computer with an Intel CPU. This probably makes Minix the most widely used operating system in the world. But unlike Windows, Mac OS or Linux, Minix is completely outside of user control. It cannot be scanned by an antivirus or malware detection software. It can bypass any firewall configuration and has a dedicated network connection that can circumvent the main CPU and the main operating system.

Sources and further reading
https://www.slideshare.net/codeblue_jp/igor-skochinsky-enpub/17
https://www.howtogeek.com/334013/intel-management-engine-explained-the-tiny-computer-inside-your-cpu/

Intel Management Engine security problems
https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html
https://www.csoonline.com/article/3220476/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html
https://www.techrepublic.com/blog/it-security/researc..

Amazon is a monopoly in dozens of different markets because Jeff Bezos wants it to. In this criticism of Amazon, we analyze of Jeff Bezos business model threatens the very existence of free market.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Amazon is the second biggest corporation in the world and one of the only two companies to pass the $1 trillion mark. But during more than two decades of existence, Amazon has struggled to make any profit.

It has everything to do with the business model of Jeff Bezos, the CEO of Amazon. In his own words, Bezos believes in shareholder supremacy, which means everything is justified as long as the share value is growing.

Jeff Bezos pushed Amazon great lengths to claim this dominance. From undercutting competitors with predatory pricing, through forcing itself into their business, to vertically integrating into strategic markets across the business line, Amazon is on track to gradually take over every aspect of e-commerce and to control and decide what we shop and what is allowed to be sold.

Sources
Amazon profits and revenue chart https://www.wsj.com/articles/amazon-reports-surge-in-profit-1461874333 and http://www.thestreet.com/story/875924/1/amazon-losses-widen-but-shares-rise-after-hours.html
Amazon earnings https://venturebeat.com/2019/01/31/amazon-earnings-q4-2018/ and https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
Amazon Prime and stocks https://www.bloomberg.com/news/articles/2010-11-24/whats-in-amazons-box-instant-gratification
Amazon e-commerce share https://techcrunch.com/2018/07/13/amazons-share-of-the-us-e-commerce-market-is-now-49-or-5-of-all-retail-spend/
Amazon Web Services statistics https://www.statista.com/topics/4418/amazon-web-services/
Jeff Bezos net worth https://www.forbes.com/profile/jeff-bezos/
More than 90% marke..

A former mobile game developer and an expert at centralized web technology talks about how apps and companies track and handle your personal data.

Ask David questions on the The Hated One subreddit Q&A thread: https://www.reddit.com/r/thehatedone/comments/b6rtxi/former_mobile_game_developer_discloses_hidden/
Use his reddit handle u/davegson to make sure he gets notified about your comments.
Or reach him on Twitter https://twitter.com/davegson
He is also a co-founder of safing.io.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Firefox is a very powerful browser and in this 2019 tutorial you learn how to access essential privacy and security settings to protect your online privacy.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

More info:
https://www.privacytools.io/
https://wiki.mozilla.org/Privacy/Privacy_Task_Force/firefox_about_config_privacy_tweeks

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Getting maximum privacy and security will require to go through a plethora of settings Firefox allows you to change, as well as installing a selection of privacy enhancing extensions that will protect your privacy even more.

Go to “Content blocking” and select “strict blocking”.
Scroll down to History and choose “Use custom settings for history”. Check “Always use private browsing mode”.
If you are changing these settings on a Firefox you’ve been using for a while, you can easily clear all previously stored data in privacy – Cookies and Site Data and under History - “Clear History”. Select everything and set time range to Everything.
Under Address Bar, uncheck suggestions for Browsing history, Bookmarks and Open Tabs.
Under permissions, go to settings for Location, Camera, Microphone and Notifications and select “Block new requests asking to access” each of these parameters.
By default, Mozilla will collect some information from your Firefox. This is not good. But it’s easy to turn it off with a single click.
Blocking dangerous and deceptive content might be useful for secure browsing, but this service is provided by Google Safe Browsing, which you actually don’t see here. So I choose to not trust Google with my security.
Change your default search engine to duckduckgo and opt out o..

Apple's infallible privacy grandstanding is a masterpiece of distinguishable marketing. For Apple privacy is a publicity stunt. It's a clever trick with words that lets Apple get away with the same invasive practices for which other companies eat the dirt.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Apple cleverly compares their practices with their seeming rivals like Google and Facebook. Because when it comes to the software Apple provides, they aren’t treating your data any differently than other software companies.

Companies that promise you strong privacy and security begin with preventing themselves from accessing your data. Apple doesn’t do that. Apple possesses keys to unlock your iCloud account, which is why phishing Apple employees is the number one tactic to break into people’s accounts.

iMessage promises end-to-end encryption, but its implementation is very poor when compared to other protocols like Signal. iMessage doesn’t provide any interface to verify authenticity of contacts people are communicating with and thus can inject keys that would enable Apple or law enforcement agencies to monitor your conversations in real time. iMessage doesn’t implement any way to obscure metadata and so all your contacts, IP addresses, time stamps, and the size and presence of attachments is open for surveillance.

Sources

Apple privacy hypocrisy due to censorship in China
https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html

Apple and government surveillance
https://theintercept.com/2014/09/22/apple-data/
http://appleinsider.com/articles/13/06/06/apple-reportedly-last-company-to-join-governments-prism-data-mining-program
https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-ce..

To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is the best approach to keep control of your data.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Important sources and software

Every piece of software recommended is listed here:
https://www.privacytools.io/
(more direct links will be added soon)

Techlore's Go Incognito tutorial series:
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO

How to be anonymous on the web
https://www.youtube.com/watch?v=_393maHbHWc

Master uBlock Origin in advanced mode
https://www.youtube.com/watch?v=2lisQQmWQkY

Privacy by compartmentalization is very simple. You will create virtual compartments where you concentrate carefully separated pools of data. Each compartment will revolve around a different sphere of your identity.

The more security you want, the stronger walls between your compartments you’ll build.

The first compartment is for your professional identity to separate your business email and work related activity from the rest of your online presence.

The second compartment is for your social media so that you keep those advertising giants away from your digital life outside of their platforms.

The third compartment is for your private identity where most of your light browsing, news reading, watching YouTube and making online purchases happen.

When you become familiar with this practice, you can build more compartments.

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the Uni..

Why privacy matters if you have nothing to hide? Because privacy from you people who want to exploit you for their own benefit. You potentially spend more money on products than others and are excluded from housing, credit or employment market places just because advertisers use information about you that puts in a disadvantage. Privacy gives you freedom from this kind of speculation and exploitation.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources:
Exploitation of weak privacy protections:
https://www.washingtonpost.com/posteverything/wp/2014/11/03/if-you-use-a-mac-or-an-android-e-commerce-sites-may-be-charging-you-more/?noredirect=on
Linus Tech Tips on cheaper flights https://www.youtube.com/watch?v=Utsnt6GFrKo
https://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=1&hp=&pagewanted=all
https://www.businessinsider.com/the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy-2012-2?international=true&r=US&IR=T
https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/

Facebook empire
https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html
https://www.nytimes.com/2018/12/18/technology/facebook-privacy.html

Abusive cases of privacy invasion
https://www.maryferrell.org/showDoc.html?docId=1159&search=King#relPageId=137
https://www.maryferrell.org/showDoc.html?docId=1158&search=NAACP#relPageId=25
https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x
https://techcrunch.com/2012/04/23/facebooks-amended-s-1-500-million-mobile..

Criticism of copyright laws and patents is a taboo but it shouldn't be. With initially good intentions, copyright and patent laws are concentrating more and more profit and power within the hands of right holders, which in most cases is big corporations, labels and studios. It's dangerous to free speech and privacy in the Age of the Internet.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Copyright is unlike any other right. It gives the class of authors supreme position over the rest of society, while treating everyone else as criminals when they want to exercise their free speech and property rights to the full extent.

Copyright is the exclusive right to reproduce and distribute someone’s work. It’s the right to make copies of a protected work, hence copy-right. Patents are government protections on improvements and inventions in devices and processes.

In reality, copyrights and patents are monopolies. Monopolies where only the right holders are allowed to profit from the resources. It’s a monopoly because the more copyrights and patents the government protects, the more restricted people are in exercising their property rights.

Imagine you and your neighbor both mine stone on your respective properties. Then your neighbor decides to build a sculpture out of his stone. In the world of copyright, the very pattern of this sculpture is now protected under the law. That means no one else is allowed to take full use of their property and make the same sculpture of their own. Since you also own stone, you are allowed to do everything except for making that sculpture.
If your neighbor was to start mining stone with a pick-axe, they could patent this new production method and for 20 years, you would not be allowed to use a pick-axe to mine your stone on your property.

The more people make copyri..

This is not a usual from me today. An important update on my latest video that was not only demonetized after a manual review, but it was also removed from discovery and recommendations on YouTube. It now receives almost no views, when it used to get hundreds per hour.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Source on the YouTube algorithm and censorship https://www.youtube.com/watch?v=n3H8D2LrLHc

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Australia just declared end-to-end encryption illegal by requiring companies to provide access to plain text communications through a new Assistance and Access Bill that passed just before Christmas. This is a dangerous attack on the Internet freedom.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

The Assistance and Access Bill, known as the Australian ban on encryption, introduces three new technical notices the Australian government can use to leverage communication providers to yield data of their users even if they implement strong cryptographic protections.
• technical assistance notice,
• technical capability notice, and
• technical assistance request
Both technical assistance notice and technical capability notice demand mandatory cooperation from providers.
Technical assistance request is a voluntary version of the both mandatory notices combined but with absolutely no restrictions or oversight.

Sources:
Draft proposal https://assets.documentcloud.org/documents/4756739/The-Assistance-Access-Bill-2018.pdf

Explanatory bill https://assets.documentcloud.org/documents/4756738/Explanatory-Document.pdf

Why backdoor is dangerous: https://cs.stanford.edu/people/eroberts/cs181/projects/ethics-of-surveillance/tech_encryptionbackdoors.html

News coverage
https://arstechnica.com/tech-policy/2018/08/australian-govt-wants-to-force-tech-firms-to-weaken-crypto/
https://phys.org/news/2018-12-australia-anti-encryption-law-passage.html
https://arstechnica.com/tech-policy/2018/12/australia-passes-new-law-to-thwart-strong-encryption/
https://arstechnica.com/information-technology/2015/12/what-the-government-shouldve-learned-about-backdoors-from-the-clipper-chip/
https://www.theverge.com/2018/12/7/18130806/australia-access-and-assistance-encryption-bill-2018-facebook-google-apple-respond
https..

As the most popular encrypted email provider, ProtonMail has been criticized for false security promises and weak guarantees of its end-to-end encryption infrastructure. Can be ProtonMail's marketing of their Swiss-based email service justified? The results might SHOCK you!

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

These are encrypted email providers that I would recommend
Free and paid plans
https://www.protonmail.ch/
https://www.tutanota.com/
https://www.mailfence.com/
Only paid
https://www.mailbox.org/
https://www.posteo.de/

An Analysis of the ProtonMail Cryptographic Architecture by Nadim Kobeissi https://eprint.iacr.org/2018/1121
Liveoverflow End-to-End Encryption in the Browser Impossible? - ProtonMail https://www.youtube.com/watch?v=DM1tPmxGY7Y

The Reddit debate and Protonmail's response
https://www.reddit.com/r/ProtonMail/comments/9yqxkh/an_analysis_of_the_protonmail_cryptographic/ea3g0hm/
ProtonMail Threat Model https://protonmail.com/blog/protonmail-threat-model/
Why is ProtonMail more secure than Gmail https://protonmail.com/blog/protonmail-vs-gmail-security/

The problem with ProtonMail’s webmail service is that each time you go to sign in to their website, you have to completely trust ProtonMail that the javascript that your browser runs is correctly implementing PGP and is not trying to steal your private keys and read your messages. This problem is limited with smartphone apps, because each new version of an app has to be signed by the author and the platform – which in this case is ProtonMail and Google Play Store or Apple App Store. With these apps, users can verify whether they received the same binary for a particular version as everyone else.
Because of the differences in the levels of trust, webmail services are objectively less secure than desktop and smartphone apps...

Watch Google CEO Sundar Pichai get grilled by Representative Jordan over alleged election manipulation. This is a highlight of the congressional hearing before the U.S. House of Representatives' Judiciary Committee on Tuesday December 11th 2018.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

This excerpt was taken from Global News coverage of the Google CEO testimony https://www.youtube.com/watch?v=uM5IHHCEb3k

This was probably the only instance during the entire 3 and a half hour long congressional testimony were Google CEO was really pressed on the issue. While Google has a long record of scandals ranging from privacy and data collection, anti-competitive behavior, search engine manipulation, political lobbying, news censorship and anti-trust cases, it was election manipulation that Representative Jordan chose to tackle Sundar Pichai on. Quite successfully, but is that going to mean anything going forward?

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Some people think privacy doesn't matter as long as you have nothing to hide. But online privacy is a form free speech. Despite government efforts, encryption is not a munition and source code is speech protected under the first amendment.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66% on the 2-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

In the 1990s, the government fiercely attacked online privacy by classifying encryption software as a munition, and regulating it as biological weapons or firearms. Exporting encryption was heavily restricted, required a government license, and made its implementation on the Internet virtually impossible.

In 1991 Phil Zimmerman developed his first version of an encryption program called Pretty Good Privacy designed to secure email communications, files or even entire disks. Two years later, Zimmerman was under criminal investigation for exporting munitions without a license and was barred from sharing his software on the Internet. Zimmerman published the whole PGP source code in a hardcover book distributed by MIT Press. In a digital form, PGP was an outlawed piece of software. But printed in a book, it was free speech protected by the Constitution.

In 1994, a graduate student at the University of California was developing an encryption algorithm that he intended to publish, distribute and share openly on public lectures and on the Internet. However, the US Department of State classified his cryptographic software under the Arms Export Control Act and the International Traffic in Arms Regulations. After several years of legal battles, the court eventually decided that Bernstein’s source code is protected by the Constitution. Th..

Calls for regulating social media and online platforms as public utilities attract critics both on the left and the right. But would public utility regulation actually help freedom of speech on the Internet?

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Companies like Google, Facebook, Microsoft and Apple do enjoy very dominant positions and they do abuse their power. Facebook and Twitter have been recently purging hundreds of alternative and independent media with millions of followers from their platforms. Google has been long extremely anti-competitive as it’s been artificially giving its own services higher ranks in the search results than their competition. And they are not wrong. We allowed these corporations to monitor our everyday activities, study our psychologies and develop tools and products that are most responsive to our emotional states.

But no matter how big they are, positions of none of these Internet giants are locked in. Their services are not tied to any geographical location. The Internet market is the whole globe. Anyone from anywhere in the world from almost any background can compete with them.

If you don’t like centralized corporations offering you centralized services, is it reasonable to expect from a centralized government to bring about any meaningful change? Maybe it's time to stop using these services and switch to alternatives.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources
Calls for regulations and classifying social media as public utilities
https://arstechnica.com/tech-policy/2018/11/newly-elected-republican-senator-could-be-googles-fiercest-critic/
https://arstechnica.com/tech-policy/2017/11/conservative-backlash-..

Apple, Google, Microsoft and Yahoo all reserve the right to read your emails not just through machines, but by their employees too. Contents of your emails are for sale and scrutiny by poorly vetted actors, unless you start using end-to-end encryption and switch to secure email providers like ProtonMail, Tutanota or Posteo.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Alternative emails:
https://protonmail.com/
https://tutanota.com/
https://posteo.de/en
Other encrypted email providers https://www.privacytools.io/

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

In 2007, the US National Security Agency approached Yahoo with an order to gain direct access to its data centers and record and collect all information passing through in a decrypted form. Seven years later, the US intelligence came to Yahoo with a new request – to scan all of their users emails in real time on the governments behalf. Yahoo now reserves the right to read contents of your emails for any purposes – including research and targeted advertising.

Google has been long implementing the policy to read emails of Gmail users. In some cases, Google employees would be allowed to read private emails. Google lets hundreds of third-party developers access inboxes of Gmail users, read their contents, and even share that data with their partners.

Apple has started using their customers’ call and email metadata to assign devices “trust scores”, in what they claim to be measures against fraud.

Trusting companies with invasive privacy policies isn’t the only option you have. If you don’t want your private conversations to be exposed to advertisers and manipulative marketing campaigns you might disappro..

Most VPN providers will tell you their virtual private network will make you anonymous. But anonymous VPNs don't exist. Should you use a VPN if you expect privacy and anonymity on the web? How to use a VPN if you want to protect your online privacy? Let's find out.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Today I take on the best of the best VPN providers that boast with top-level encryption and security protocols that are meant to give you privacy on the Internet, or even make you anonymous. But is that true?

VPNs are supposed to secure your traffic by sending it through an encrypted tunnel and give you a different IP address so that your true IP address is not revealed to the websites and services you are connecting to.

Your VPN provider can still see everything your Internet Service Provider can see: all you traffic, logs, devices, browser history… all that prevents your VPN provider from abusing this information against you is their promise. Virtual private networks offer privacy by policy, not privacy by design – that is nothing technologically prevents your VPN from monitoring your traffic and do with that whatever they want – sell it, throttle it, or censor it.

No VPN service is anonymous. Most of them require your email address upon sign-up and most payment methods will reveal your identity directly, unless they accept cryptocurrency, which is only pseudonymous, or cash, which can be truly anonymous. But cash is very rarely accepted, and even then, your VPN provider always knows your real IP address. So yes, they change your IP address, by they are also your single point of failure, so if the server or the whole VPN is compromised, all traffic leads directly to your IP address and your devices.

Some sources:

https://www.theatlantic.com/technology/archive/2011/09/lulzsec-hacker-exposed-service-he-thought..

Google censorship has been a rising issue over the past years. Accusations about Google censoring news are surfacing more and more. Let's compare Google search results with Bing, Yahoo and DuckDuckGo to find out if we can see instances of Google manipulating search results.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

My methodology
To evaluate Google’s search results, I compared them with Bing, Yahoo, DuckDuckGo and Startpage. To get as anonymous results as possible, I used separate Firefox profiles for Google, DuckDuckGo and Bing. I turned off telemetry and Google safe browsing feature, and I set Firefox to never remember browser history. This should get rid of most of Google trackers planted on the device, which could interfere with the results. To pull Yahoo results, I used Vivaldi with similar settings and for Startpage I used Tor Browser. Startpage lists Google results but more privately and without Google’s trackers, and I only use it to double check whether I really get non-personalized Google results.

I was not logged in to any account and I didn’t have any other browser open at the time of recording these search experiments.
For each search engine, we are going to compare results from the first two pages only, as this is where the vast majority of clicks happen.
For each search on Google, I connected from a different IP address in the United States and I restarted Firefox to wipe all browser data. This was done using NordVPN servers, to make sure Google can’t track my real location and personalize my results that way. I also used different US-based IP addresses for Bing, Yahoo and DuckDuckGo, and I restarted the brow..

So you want to stop Google from spying on you. But how do you do that? Learn how you can stop Google from tracking your location, browsing history, search queries and find out more about Google alternatives.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

In this video, we'll go through how to change your Google and Android privacy settings. We install some essential privacy tools like Firefox, uBlock Origin, Cookie Autodelete and DecentralEyes to block Google from tracking our browsing history. We will show what Google alternatives to use to stop Google from spying on you like DuckDuckGo, Qwant, Startpage, Protonmail, Tutanota, Nextcloud, Mega.nz, Cryptomator, Brave Browser, Tor Browser and more.

Google tracks your every move on the Internet and in the real world, even if you don’t use Google services.
We are going to learn how to stop all of Google spying in its entirety. It is possible to stop Google tracking without disconnecting from the Internet. We’re going to go through Google privacy settings and we will learn how to use some simple tools to block all known Google trackers.

uBlock Origin rulesets - JUST COPY PASTE to My Rules in uBlock Origin settings
To block all Google trackers
* admob.com * block
* adsensecustomsearchads.com * block
* adwords.com * block
* doubleclick.net * block
* fonts.googleapis.com * block
* google-analytics.com * block
* google.com * block
* googleadservices.com * block
* googleapis.com * block
* googlesyndication.com * block
* googletagmanager.com * block
* googletagservices.com * block
* googletraveladservices.com * block
* googleusercontent.com * block
* gstatic.com * block
* urchin.com * block..

Censorship on Facebook has no limits. The social media giant purged 800 independent groups, mostly anti-establishment and anti-authoritarian left and right wing groups. What is the solution to the Facebook censorship problem?

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%!

Both right and left wing groups Facebook blocked had huge followings. On the left, Reasonable People Unite had 2.25 million followers before the shutdown, Trump-supporting Nation in Distress amassed more than 3 million followers, left-wing Reverb Press had 816,000 followers, Right Wing News accumulated 3.2 million, and Punk Rock Libertarians had 190,000 followers before the take down. Another bizarre case is Russia Today America’s correspondent Rachel Blevins, who had 70,000 fans disappear with her page with no explanation why.

Many of the deleted pages were spreading conspiracy theories but they were also openly against drug war, foreign interventions, power abuse, and corruption. Some Facebook groups also got their Twitter pages deleted.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources:
News coverage
https://www.theguardian.com/technology/2018/oct/11/facebook-purge-page-removal-spam
https://www.rt.com/usa/441144-facebook-rt-america-correspondent/
https://www.rt.com/usa/441140-facebook-purge-victims-speak/
https://www.rt.com/usa/441040-facebook-deplatforms-political-pages/
https://www.rt.com/usa/438504-facebook-thinkprogress-censored-articles/
https://www.msn.com/en-gb/finance/technology/facebooks-spam-purge-is-silencing-genuine-debate-political-page-creators-say/ar-BBOrM9S
https://mashable.com/article/facebook-removes-accounts-spreading-fake-news-in-us.amp/?
https://www.nytimes.com/2018/10/11/technolo..

Ultimate comparison between DuckDuckGo and Google is here listing all the reasons why you should switch from Google Search to DuckDuckGo.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%!

Because search engines are second gate-keepers to the internet, it's absolutely crucial to choose the one that will respect your privacy and provide uncensored and unfiltered search results. Google's search neutrality has been compromised. Google notoriously develops more and more of its own tools that it then puts in front of organic search results.

DuckDuckGo's business model is the greatest advantage over Google Search. DuckDuckGo doesn’t have a filter bubble. Its search results are derived from over 400 sources, that include big search engines like Bing or Yahoo, but also DuckDuckGo’s own web crawlers. Its organic results aren’t intervened by personalized filters, because DuckDuckGo doesn’t maintain a personal profile on you like Google does.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources:
Weingerg vs Google
https://www.cnet.com/news/google-owns-duck-com-but-itll-give-rival-duckduckgo-a-shoutout-anyhow/
https://www.cnet.com/news/today-i-learned-duck-com-redirects-to-google-much-to-duckduckgos-annoyance/
https://twitter.com/DuckDuckGo/status/1019565939317202944
https://www.huffingtonpost.com/2012/11/22/duckduckgo-google_n_2174286.html
https://thenextweb.com/insider/2012/01/30/we-bet-you-dont-know-who-owns-duck-com-and-what-it-redirects-to/

Bias
https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10
https://www.scribd.com/doc/233260174/techcrunch-confidential-yelp-user-behavior-study-on-google-results
https://techcrunch.com/2014/07/09/yelp-google-anti-t..

Google is tracking everything you. Literally everything. If you are not protecting yourself, Google is after your personal life whether you like it or it. Google spies on you and it's not just a conspiracy theory anymore.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehated or use my coupon code 'thehatedone' to save 66%!

Google’s presence is literally everywhere and it wants to play god without permission. Google’s surveillance has no limits. They track literally everything you do and everywhere you go. And not just on the Internet, but even in real life. This how Google manages to follow your every step.

Google servers are tapped by intelligence agencies in the US and other Five eyes countries, which include UK, Canada, Australia and New Zealand. The US National Security Agency then keeps a copy of your search history tied back to your phone number forever in their data centres.

Google really wants to know where you go. So much so that it keeps tracking your location even if you tell it not to. Google achieved dominance in digital advertising thanks to their focus, commitment and sheer will. The will to know about every single step you make. Google is able to attract advertisers thanks to their ability to profile records of your entire activity on the web. But this time, the corporate behemoth is able to track what you buy even in physical stores.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Credits:
Music by CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA

Sources:

Google in China
https://www.theguardian.com/technology/2018/sep/18/google-china-dragonfly-search-engine
https://theintercept.com/2018/08/01/google-china-search-engine-censorship/
https://www.buzzfeednews.com/article/carolineodonovan/google-project-dragonfly..

It's not a matter of opinion anymore. You should delete your Facebook account now and stop using Facebook altogether. There is every bit of evidence that Facebook is not a benevolent corporation. Their unreasonable pursuit of control and invasive policies have plagued our social lives on the Internet. It's time to stop using Facebook.

Support my channel and start protecting yourself on the web at https://nordvpn.org/thehatedone or use code thehatedone and save 66%!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources:

Facebook data breach and censorship
https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html
https://newsroom.fb.com/news/2018/09/security-update/

Intrusive Facebook Policy
https://bits.blogs.nytimes.com/2007/11/29/the-evolution-of-facebooks-beacon/
https://www.computerworld.com/article/2540320/data-privacy/facebook-s-beacon-more-intrusive-than-earlier-thought--ca-says.html
https://usatoday30.usatoday.com/tech/hotsites/2009-09-21-facebook-beacon_N.htm
https://en.wikipedia.org/wiki/Criticism_of_Facebook#cite_ref-informer_68-0

https://theoutline.com/post/5380/targeted-ad-creepy-surveillance-facebook-instagram-google-listening-not-alone?zd=1&zi=ucbo5ff2

https://www.propublica.org/article/facebook-enabled-advertisers-to-reach-jew-haters

https://techcrunch.com/2018/09/27/yes-facebook-is-using-your-2fa-phone-number-to-target-you-with-ads/

https://www.propublica.org/article/facebook-enabled-advertisers-to-reach-jew-haters
https://www.propublica.org/article/facebook-lets-advertisers-exclude-users-by-race
https://www.nytimes.com/2013/03/26/technology/facebook-expands-targeted-advertising-through-outside-data-sources.html?pagewanted=all&_r=0
https://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/
http://www.slate.com/articles/technology..

To protect your online privacy and security, one of the best tools to achieve that is NoScript Security Suite. In this NoScript tutorial, we are going to look at what NoScript can do and how we can use it to boost our privacy online and Internet security overall.

If you want to support my channel and protect your online privacy, sign up for NordVPN https://nordvpn.com/ and use coupon code thehatedone and save 66%!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

One of the most effective tools for security on the web is NoScript extension for Firefox. NoScript was built to block execution of Javascript by your web browser in order to prevent infiltration by malware, trackers and annoying ads.

Javascript, unfortunately, is still most frequent code used by web developers to deliver content and run websites. So if you want to experience the web fully, you’ll need to know how to operate NoScript to get the most out of it.

The trade-offs are absolutely worth it. For little inconvenience, you get a tremendous amount of security. NoScript will act as a local firewall for your web browser, blocking malicious attacks before they get a chance to get inside your system.

Music by Chuki Beats https://www.youtube.com/user/CHUKImusic

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

In the latest interview on Joe Rogan Experience, Elon Musk expressed his lack of concern for privacy. Musk even suggested that most average people don't need care about their privacy and that national security agencies don't care about what is going on in the lives of average people. I dispute these claims with a history of abuse of mass surveillance power by the National Security Agency.

Joe Rogan Experience is a YouTube podcast show hosted by comedian Joe Rogan. His recent guest, Elon Musk, entrepreneur and CEO of Tesla and SpaceX, was invited for an almost three-hour-long interview. They debate issues like life being a simulation, dangers of artificial intelligence, and of course, privacy.

It's quite remarkable that Elon Musk so openly shares his fears of artificial intelligence yet he doesn’t seem to be concerned about what information this dangerous AI knows about him. It’s pretty clear that the more it knows the more powerful advantage over humans it gets. Which logically explains why Musk also fears Google.

Entrepreneurs like Elon himself might have never become successful without their private realms where they could develop without the fear of prying eyes. There are places in the world where people are persecuted for things that should never be considered a crime in the first place. And privacy is the only thing these people have to protect their own lives.

The argument isn’t ‘you have nothing to hide, you have nothing to fear’, but rather - ‘you have nothing to hide, therefore they have no reason to look’. Whatever happens with your privacy should be based on your clear consent, which corporations and governments today don’t bother to ask for when they follow your every step you make in digital and physical world.
And that’s why you should care about your privacy.

I make these videos because I believe standing up against power and illegitimate authority is a moral duty. I believe all humans are fundamentally free. But this freedom won't take c..

SHOW MORE

Created 1 year, 7 months ago.

52 videos

CategoryScience & Technology

Uncovering the wrongdoing of governments and corporations irrespective of the political tribe they claim to allign with. When corporate monopolies abuse their dominance and governments fail their electorates, come to this channel to learn how you can guard your digital rights on your own.

If you like what I do on this channel, consider supporting me through a crypto-currency of your choice. Help me build the first crypto-funded channel on YouTube!

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Dash
XyBDwdFQuZNCnThkeeg1FRFks65hKMkTux

Litecoin
LcHJvrovBfqDBQyfHcxxBErGM8qq5zho8s

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

https://twitter.com/The_HatedOne_
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne