The Hated One

channel image

The Hated One

The_HatedOne_

subscribers

Techno-optimism is now a well funded campaign that promotes billionaire backed future innovations as opposed to already available systemic solutions.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Techno-optimism is a toxic mindset that weaponizes positive thinking to perpetuate structures that caused our problems and guild everyone who speaks out against them. Techno-optimism has become a trend since about the mid 2010s. When suddenly wealthy tech entrepreneurs started giving speeches and talks, writing instant best sellers and featuring in popular podcasts amassing millions of hits. Now it’s a well funded campaign hellbent on convincing policy makers that wealthy investors will figure out what’s best for all of us.

The basic premise of techno-optimism goes like this – we don’t need to invest in robust public transit in our cities. We can just dig single-lane tunnels for taxis to drive through them. We don’t need high-speed rail, we’ll have hyperloop and electric cars. We don’t need a living wage, we’ll have automation doing all of the hard work for us. We don’t need a systemic reform today because we’ll have a technological solution in the future.

Sources [references in the transcript]
[0] https://oxfam.app.box.com/s/1rp115i9uiwmvsa11mwaa00vwc6ic437
[1] https://www.scientificamerican.com/article/ai-generated-data-can-poison-future-ai-models/
[2] https://www.nature.com/articles/d41586-024-00478-x
[3] https://www.sciencedirect.com/science/article/pii/S2588912517300085?via%3Dihub
[4] https://www.nature.com/articles/s41545-021-00101-w
[5] https://www.ucsusa.org/resources/water-power-plant-cooling
[6] https://www.datacenterdynamics.com/en/analysis/data-center-water-usage-remains-hidden/
[7] https://www.datacenterdynamics.com/en/opinions/an-industry-in-transition-1-data-center-water-use/
[8] https://www.nbcnews.com/tech/internet/drought-stricken-communities-push-back-a..

Our World In Data is a credible publication. But they don't represent the broader scientific community, much of which disagrees with their perspectives and assessments.
Listen to the footnote episode providing some additional info and context: https://www.patreon.com/posts/98991064
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

There is an increasing amount of content sponsored by billionaire philanthropies. A lot of this content relies on Our World In Data as a primary source or to arrive to conclusion from a scientific discourse. This is a vast topic so this video only covers a single issue - hunger and food supply.

Sources [references in the transcript]

[0] https://www.cjr.org/criticism/gates-foundation-journalism-funding.php
[1] https://www.thenation.com/article/society/bill-gates-foundation-philanthropy/
[2] https://archive.globalpolicy.org/images/pdfs/GPFEurope/Philanthropic_Power_online.pdf
[3] https://www.theguardian.com/global-development/2016/jan/15/bill-gates-rockefeller-influence-agenda-poor-nations-big-pharma-gm-hunger
[4] https://web.archive.org/web/20221103100100/https://ourworldindata.org/funding
[5] https://web.archive.org/web/20221103100112/https://ourworldindata.org/coverage
[6] https://www.researchgate.net/publication/374459550_Recalibrating_Data_on_Farm_Productivity_Why_We_Need_Small_Farms_for_Food_Security
[7] https://www.sciencedirect.com/science/article/pii/S2211912417301293
[8] https://www.etcgroup.org/sites/www.etcgroup.org/files/files/etc-whowillfeedus-english-webshare.pdf
[9] https://ourworldindata.org/smallholder-food-production
[10] https://web.archive.org/web/20161012025719/http://acbio.org.za/wp-content/uploads/2015/03/EGS-convening-introduction.pdf
[11] https://web.archive.org/web/20210923065344/https://www.theguardian.com/global-development/2021/sep/23/small-farmers-have-the-answer-to-feeding-the-world-why-isnt-the-un-listening
[12] https://www.theguardian.com/globa..

BlackRock allegedly owns and controls the world. But the investment giant claims they are just impartial shareholders. What is really going on?
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

According to popular theories on social media BlackRock owns almost all of the biggest corporations around the world. They own the big tech, big pharma, big everything AND the mainstream media. This insinuates their hidden influence and secret agenda they supposedly enforce on the corporate world.

BlackRock is is indeed among the largest shareholders in the biggest corporations across all sectors of the economy. This isn't hidden information. Anyone can pull this up from publicly available sources. But the catch is that BlackRock doesn't legally own anything. The $10,000,000,000 in assets they have are under management on behalf of their clients.

The issue of BlackRock's power and influence has been well studied and analyzed by economists for years. It isn't just about raw numbers on the ownership list of big corporations.
Economists found that many major problems that plague our economy today can be directly attributed to the concentration of economic power by BlackRock and the like. Stagnation in innovation, rise of consumer prices, decreasing wealth of the working class, even income inequality.

There is no need to believe in conspiracy theories. Rational explanation is bad enough.

Sources (references available in the transcript)

[0] https://www.reuters.com/article/factcheck-business-investment-idUSL2N2WI1K4
[1] https://www.statista.com/statistics/1260855/vanguard-aum/
[2] https://www.statista.com/statistics/1378611/worldwide-investment-fund-firms-leading-by-assets-under-management/
[3] https://www.bloomberg.com/news/features/2020-01-09/the-hidden-dangers-of-the-great-index-fund-takeover
[4] https://www.bu.edu/bulawreview/files/2019/06/BEBCHUK-HIRST-1.pdf
[5] https://www.cambridge.org/core/journals/business..

The popular belief that iPhone is a privacy alternative to Android is wrong.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Privacy is ultimately about taking control over what happens to your data. The less control you have, the more exposed you are. Most companies, much like Apple and Google, are working towards restricting user controls over their own devices.

It's as simple as restricting where users can download apps from to an only place controlled by the platform. Or not allowing users to change default apps for messaging or browsing. Or not giving users an option to fully utilize their devices without self-identification to the company.

Unlike iOS on the iPhone, Android is a fundamentally open platform. Any restrictions put in place by Google can be reversed by the user, thus gaining leverage over what happens to your data far greater than you could ever get on an iPhone.

Apple made iPhones very secure, much like Google did with Pixel phones. But security isn't the only privacy prerequisite. You need to have a comprehensive strategy that addresses other threats such as linkability and identifiability effectively. Only Android allows you to do that.

Sources (references are available in the transcript)
[0] https://www.bbc.com/news/world-asia-china-48607723
[1] https://www.vice.com/en/article/wxn7nq/anti-xi-jinping-posters-are-spreading-in-china-via-airdrop
[2] https://edition.cnn.com/2022/11/11/business/china-apple-airdrop-function-restricted-hnk-intl/index.html
[3] https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html
[4] ttps://www.tomsguide.com/news/apple-google-blizzard-hong-kong-protests
[5] https://www.nytimes.com/2019/10/09/technology/apple-hong-kong-app.html
[6] https://www.technologyreview.com/2019/09/10/102646/the-new-battle-in-hong-kong-isnt-on-the-streets-its-in-the-apps/
[7] https://www.scmp.com/news/china/politics/article/3223303/apples-airdrop-focus-china-moves..

When the biggest bank in the world can get away with everything, what do the rules even mean?
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

HSBC wasn't just an unwitting vector. They were proactively implicit in the schemes their clients were accused of. The bank developed several methods to help their clients hide their assets. HSBC actively used strict Swiss secrecy laws to reassure their clients that their assets were safe from the jurisdiction of their local authorities. But this wouldn't be enough for clients with not so legitimate intentions. So the bank came up with a scheme they called "hold mail" accounts. A hold mail account was a service offered to wealthy customers that would function without any correspondence of any kind going between clients and the bank. HSBC was very successful at attracting the highest value clientele from around the world. The list didn't contain just some random millionaires and businessmen. The Swiss bank accommodated the very top of the world's ruling elites. From royalty, through oligarchs to dictators.

Sources (references available in the official transcript)
[0] https://www.theguardian.com/business/2001/sep/13/3
[1] https://www.theguardian.com/business/2004/may/31/1
[2] https://www.telegraph.co.uk/finance/2733877/Ex-HSBC-officer-held-in-Monaco.html
[3] https://www.newyorker.com/magazine/2016/05/30/herve-falcianis-great-swiss-bank-heist
[4] https://www.nytimes.com/2013/08/09/business/global/a-whistle-blower-who-can-name-names-of-swiss-bank-account-holders.html
[5] https://en.wikipedia.org/wiki/Swiss_Leaks
[6] https://www.lemonde.fr/en/archives/article/2022/03/14/swissleaks-the-backstory-of-a-worldwide-investigation_5978499_113.html
[7] https://web.archive.org/web/20150218004301/http://www.lemonde.fr/economie/article/2014/01/27/listes-hsbc-la-saga-d-une-enquete-explosive-sur-l-evasion-fiscale_4354981_3234.html
[8] https://www.theguardian.com/business/2010/mar/11/..

Billionaire philanthropy is not just charitable giving. It's an investment venture before anything else. Then it's about hoarding wealth, avoiding taxes and getting some positive PR for it.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Private foundation is an institution with a very special status. They are tax exempt private organizations yet they are still allowed to invest into for profit companies. Foundations can hold corporate stocks and bonds and generate revenue this way.

There is only one major condition they have to fulfill to keep their tax exempt status - and that is to donate 5% of foundation's total assets on annual basis. So when you hear a billionaire donating their wealth to charity and it's going through a foundation, up to 95% of it can go into profitable investments. In practice, all foundations' assets in the US amount to more than $1 trillion. Yet, they donated only $90.88 billion in 2021.

Sources (references are available in the transcript)

[0a] https://nccs.urban.org/publication/nonprofit-sector-brief-2019#recipients
[0b] https://www.statista.com/statistics/250878/number-of-foundations-in-the-united-states/
[1] https://www.propublica.org/article/the-secret-irs-files-trove-of-never-before-seen-records-reveal-how-the-wealthiest-avoid-income-tax
[2] https://www.nytimes.com/2021/06/08/us/politics/income-taxes-bezos-musk-buffett.html
[3] https://www.irs.gov/charities-non-profits/charitable-organizations/private-foundations
[4] https://www.irs.gov/charities-non-profits/private-foundations/taxes-on-failure-to-distribute-income-private-foundations
[5] https://www.nptrust.org/philanthropic-resources/charitable-giving-statistics/
[6] https://www.issuelab.org/resources/36381/36381.pdf
[7] https://www.gatesfoundation.org/about/financials
[8] https://www.thenation.com/article/society/bill-gates-foundation-philanthropy/
[9] https://www.latimes.com/archives/la-xpm-2007-jan-07-na-gatesx07-s..

Bill Gates used his immense wealth and connections to influence how trillions of public funds are spent on education in the US. This is how it happened.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps
00:00 Introduction
02:05 Small schools
04:00 Common Core
07:31 Opposition to the Common Core State Standards
12:40 Teacher evaluation & introducing competition among teachers
16:18 Influencing curriculum
18:16 Why is Bill Gates so heavily involved in influencing public school policy?
20:42 End me

Gates and his Foundation have been celebrated for endeavors in poverty and health care around world. But when you analyze the publicly available grant database, you’ll see that in the last two decades the Gates Foundation dedicated more than $10+ billion to education agenda in the United States.

Gates’ connections and wealth were able to dictate the fate of trillions of tax payers money that followed his investments. Gates became the main architect of US public school policy, bankrolling research, deployment and lobbying campaigns that pushed for a reform after reform according to the whims of the world's most influential elite.

Sources [citations available in the video transcript (i.e. subtitles)]

[0] https://www.gatesfoundation.org/about/foundation-fact-sheet
[1] https://www.forbes.com/profile/bill-gates/?list=billionaires&sh=208d2042689f
[2] https://www.cia.gov/the-world-factbook/field/real-gdp-purchasing-power-parity/country-comparison
[3] https://www.gatesfoundation.org/about/committed-grants
[4] https://www.youtube.com/watch?v=VfRJx6x764U
[5] https://www.washingtonpost.com/politics/how-bill-gates-pulled-off-the-swift-common-core-revolution/2014/06/07/a830e32e-ec34-11e3-9f5c-9075d5508f0a_story.html
[6] https://archive.seattletimes.com/archive/?date=20000320&slug=4011028
[7] https://www.washingtonpost.com/education/2021/05/05/what-bill-melinda-gates-did-to-education/
[8] https://www.washin..

Kurzgesagt is not just a popular science outreach channel. It's a major tool for propaganda of their billionaire sponsors.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Kurzgesagt received estimated $7 million from billionaire funds. This would be more money than Kurzgesagt received from their supporters on Patreon (estimated $3.5 million) in the entire history of the channel.

Kurzgesagt never was this small, independent, almost entirely viewer-funded channel. As soon as the studio incorporated, billionaires began lining up. They transformed the small Munich-based design studio with 5 employees into a multi-million-dollar media powerhouse with dozens of employees.

Sources [First half only; second part in the pinned comment]
[0] https://web.archive.org/web/20221108134548/https://www.youtube.com/watch?v=qNWWrDBRBqk
[1] https://www.reuters.com/article/us-diseases-neglected-pharma-idUSTRE80T0LO20120130
[2] https://en.wikipedia.org/wiki/London_Declaration_on_Neglected_Tropical_Diseases
[3] https://www.gatesfoundation.org/Ideas/Media-Center/Press-Releases/2012/01/private-and-public-partners-unite-to-combat-10-neglected-tropical-diseases-by-2020
[4] https://www.businessinsider.com/r-fight-against-neglected-tropical-diseases-needs-big-pharma-push-who-2017-4
[5] https://www.latimes.com/nation/la-na-gates16dec16-story.html
[6] https://academic.oup.com/bmb/article/93/1/179/307584?
[7] https://www.thelancet.com/journals/lancet/article/PIIS0140673609608850/fulltext?
[8] https://www.vox.com/2015/6/10/8760199/gates-foundation-criticism
[9] https://jamanetwork.com/journals/jama/fullarticle/2762308
[10] https://www.thenation.com/article/society/bill-gates-foundation-philanthropy/
[11] https://www.latimes.com/archives/la-xpm-2007-jan-07-na-gatesx07-story.html
[12] https://www.washingtonpost.com/education/2020/02/10/bill-melinda-gates-have-spent-billions-dollars-shape-education-policy-now-they-say-theyre-skeptical-bill..

Social media is flooded with CIA propaganda disseminated by former spies. Their lies are dangerous and need to be dealt with.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

CIA now has a large social media presence with multi-million-follower accounts on Twitter, Instagram and Twitter. The agency is using social media as a recruitment tool but another mission of their social media arm is to make the public view the CIA in a positive light. Anytime you are suggested content with a “CIA spy reacts” or an “interview with a former/current CIA operative” you are being enrolled into re-education class.

This is dangerous. But how do I prove it to you? How do you know when a spy is telling you a lie passed down from the highest ranks in the government? Manipulation only works if you don’t know the whole truth. So allow me to show you the other side of the story.

Sources
0. https://www.britannica.com/topic/propaganda
1. https://www.politico.com/news/2021/09/08/cia-least-covert-mission-510043
2. https://foreignpolicy.com/2020/06/25/cia-recruitment-joined-social-media-age/
3. https://www.news.com.au/finance/work/leaders/wikileaks-password-is-an-anticia-jfk-quote/news-story/d6c1cc5385c4f1330bb87f1be2ecefa3
4. https://apnews.com/article/technology-business-race-and-ethnicity-intelligence-agencies-demographics-e22ea4d22d4564608d7972be95e570b9
5. https://www.washingtonexaminer.com/news/white-house/cia-makes-social-media-splash-with-i-spy-challenge-on-instagram
6. https://money.cnn.com/2018/02/02/media/youtube-state-funded-media-label/index.html
7. https://www.propublica.org/article/youtube-promised-to-label-state-sponsored-videos-but-doesnt-always-do-so
8. https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
9. https://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records
10. https://www.pbs.org/newshour/politics/n..

Did intelligence operatives install backdoor into Huawei products?
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Huawei is the world’s largest manufacturer of telecommunications equipment and one of the top smartphone makers in the globe. The Huawei empire now sells products or carries the traffic of Internet users in 170 countries. And for over a decade, the Shenzen giant faced and dismissed accusations that they have pwned billions of users on behalf of the authoritarian Chinese government. Whether or not there is a Huawei backdoor must be thoroughly scrutinized before any conclusion can be made. Hard evidence is scarce. This is an analysis of all major accusations and allegations of backdoor planted into Huawei products.

Sources
1. https://www.bloomberg.com/news/articles/2021-12-16/chinese-spies-accused-of-using-huawei-in-secret-australian-telecom-hack
2. https://www.statista.com/chart/16827/huawei-revenue-and-smartphone-market-share/
3. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html
1. 3b https://www.forbes.com/companies/huawei/
4. https://www.latimes.com/business/la-na-pol-trump-huawei-ban-20190515-story.html
5. https://www.techrepublic.com/article/evidence-of-backdoors-in-huawei-equipment-collapse-under-light-scrutiny/
6. https://web.archive.org/web/20140423215024/http://www.afr.com/p/national/transcript_interview_with_former_KnS7JDIrw73GWlljxA7vdK
7. https://www.techrepublic.com/article/us-intelligence-chiefs-say-huawei-zte-products-pose-national-security-risk/
8. https://www.latimes.com/business/technology/story/2020-02-12/huawei-equipment-has-backdoor-for-spying-white-house-claims
9. https://arstechnica.com/tech-policy/2020/02/us-gave-allies-evidence-that-huawei-can-snoop-on-phone-networks-wsj-says/
10. https://www.wsj.com/articles/u-s-officials-say-huawei-can-covertly-access-telecom-network..

Become untraceable by creating anonymous identities. This is how it's done. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

The Internet is a giant network of privately owned spaces open to public, where every participant knows the exact identity and location of one another and where corporate stalking is a perfectly legitimate business model. If you are not okay with automated decisions being made about your every move, you should consider creating an anonymous identity.

Anonymity is the most powerful mitigation strategy on a publicly observable network such as the Internet. It is the most direct path towards privacy. This guide will tell you exactly what you need to know and do in order to create and maintain your very own anonymous identity.

The Internet is a privacy nightmare because every action is by default identifiable and linkable. That means actions always lead to a unique location and/or account on the network and actions can built a profile over time. Linkability and identifiability are your biggest privacy and anonymity threats on the Internet. For maximum anonymity, both of these threats need to be mitigated to the fullest extent possible.

Our first step with any service will be to dissociate our account details from our personal information. The second step is to compartmentalize our anonymous identities so that they are isolated from our personal identities.

Dissociation and isolation of your anonymous identities are not the only steps to keep your anonymity. Be extremely cautious of what types of data you submit to these services while using them. Always think of the linkability and identifiability threats when using these accounts.

PRIVACY THREAT MODELING
https://www.threatmodelingmanifesto.org/
LINDDUN strategy for threat modeling
https://www.linddun.org/post/keys-to-successful-privacy-threat-modeling
https://www.linddun.org/linddun
https://www.linddun.org/_files/ugd/cc602e_cf..

Privacy tutorial with a threat model methodology. This will help you achieve strong privacy consistently and reliably.
Support independent research: https://www.patreon.com/thehatedone

Privacy tools are inconsistent. The inventory of recommended countermeasures changes all the time. On the long enough timeline, you can’t trust any single product. So what if instead of focusing on the tools, you would learn a consistent method that would help you proactively mitigate privacy threats as they arise?

This is exactly what this guide aims to give you. It will introduce you to a tested methodology with which you will be able to achieve strong privacy. The secret is to start with a threat model. For our threat modeling exercise, we will use LINDDUN Go cards to help us elicit and mitigate all the threats we could face in our time.

Sources
[0] https://duckduckgo.com/?q=site%3Agithub.com+%22privacyguides%22+%22remove%22&ia=web
[1] https://www.bleepingcomputer.com/news/security/duckduckgo-browser-allows-microsoft-trackers-due-to-search-agreement/
[2] https://www.reuters.com/article/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT
[3] https://www.cnbc.com/2020/05/07/zoom-buys-keybase-in-first-deal-as-part-of-plan-to-fix-security.html
[4] https://www.vice.com/en/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text
[5] https://www.linddun.org/post/keys-to-successful-privacy-threat-modeling
[6] https://www.threatmodelingmanifesto.org/
[7] https://www.cisco.com/c/en/us/products/security/what-is-threat-modeling.html
[8] https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf
[9a] https://www.linddun.org/linddun
[9b] https://yewtu.be/watch?v=C9F8X1j9Zpg
[10] https://www.linddun.org/_files/ugd/cc602e_cf7e4c6b1d894bdaabc3094c48b26869.pdf
[11] https://www.linddun.org/go-getting-started
[12] https://yewtu.be/watch?v=7xqWQ1OTBpw
[13] https://www.linddun.org/_files/ugd/cc602e_f98d9a92e4804e6a9631104c02261e1f.pdf
[14] https://www.l..

This is a talk I had in May with Alex from Local Monero. Alex was a great guest and we had a respectful debate about some of our disagreements on failures and promises of cryptocurrencies and corporate influence on YouTubers.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

00:00:00 Introduction
00:01:09 The conflict of interest of sponsored and affiliated YouTubers
00:26:33 What is Monero and how is it different than Bitcoin?
00:30:50 What is LocalMonero peer-to-peer exchange?
00:35:30 The traceability of Bitcoin makes it useless
00:39:32 The anonymity of Monero and taxability of transactions
00:42:20 How can the government crack down on Monero?
00:52:57 Bitcoin has failed to uphold its cypherpunk values. Can Monero save it?
01:28:00 Do cryptocurrencies solve the central bank monetary policy?
02:22:45 Economists are not exact scientists and are often wrong
02:31:30 Cryptocurrency needs to propose a reasonable monetary policy
02:55:30 Why we need consent based solutions
03:07:40 Closing remarks

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

The champion of privacy and security is an open source mobile operating system built by a non-profit. This is how GrapheneOS built the most secure phone on the planet.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone
GrapheneOS: https://twitter.com/GrapheneOS
https://github.com/GrapheneOS
https://grapheneos.org/donate

Gabe (guest on the podcast): https://twitter.com/flawedworlddev
https://github.com/flawedworld

A secure mobile operating system is built on top of a complicated software stack whose every single building block is isolated to enforce the strict security policy. All system components and processes, third party apps and services are separated from one another in a multi-party consent of developers, users and the platform itself. This is known as an Application Sandbox and it is how Android designed its architecture.

GrapheneOS is a non-profit security research project that focuses on hardening privacy and security features of the operating system while maintaining usability at the same time. GrapheneOS adds to Android’s defense in depth by protecting against exploits abusing unknown vulnerabilities, so called 0day exploits. These exploits are being sold legally by malware brokers for millions of dollars because crafting them requires a high set of skills and experience.

GrapheneOS has made such a vast number of improvements it would be impossible to cover them in one video. Many of GrapheneOS’s enhancements have been adopted by the mainstream Android itself. The research project maintains an extensive documentation on all the important features many of which were missed out by this video.

Sources:
[0] https://source.android.com/security/authentication
[1] https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/
[2] https://en.wikipedia.org/wiki/WannaCry_ransomware_attack
[3] https://arxiv.org/pdf/1904.05572.pdf
[4] https://tribune.co..

This is an exclusive interview with Gabe, a developer and a security researcher at GrapheneOS. GrapheneOS is a non-profit research project focused on developing the most secure production-ready operating system in the world. It has been recommended by Edward Snowden and is renowned among the security community for its industry leading achievements.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Follow GrapheneOS:
https://twitter.com/GrapheneOS
https://github.com/GrapheneOS
https://grapheneos.org/donate

Follow Gabe
https://twitter.com/flawedworlddev
https://github.com/flawedworld

Timestamps:
00:00:00 Thanking Gabe for coming on again for the first time
00:00:31 What is GrapheneOS?
00:02:11 How GrapheneOS improves privacy and security
00:03:22 Why Pixel devices?
00:05:13 Explaining Titan M security chip
00:06:43 Resistance to brute force attacks
00:07:51 Insider Attack Resistance
00:10:36 GrapheneOS preserves Verified Boot
00:15:21 How GrapheneOS made Android more secure for billions
00:21:41 GrapheneOS ecosystem is growing
00:24:36 Talking about optimistic cahnges coming in the near future
00:35:53 Some of the best privacy and security features of GrapheneOS
00:45:00 Hardened Memory Allocator
00:47:03 How much more secure is GrapheneOS than Android?
00:51:59 GrapheneOS resellers
00:53:40 Removing microphones, cameras, sensors and Faraday bags
01:02:46 Future roadmap
01:09:05 Sandboxed Google Play
01:12:13 GrapheneOS is an anonymous phone - Hardware Identifiers
01:17:21 Need for an up-to-date device
01:32:18 Closing remarks and where to follow GrapheneOS

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

I needed to anonymize my phone. This how I did it.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

I can’t trust anyone with my data. When I use a phone with a Google Account or Apple ID, these companies are by default going to be collect unique hardware identifiers, my location information and app usage data without possibility to opt out.

If I want to use a phone I need to choose one that is going to allow me to use it completely anonymously and let me be in control of all of my data. I want to a phone that maintains Android’s security model and keeps the best security practices for security updates.

GrapheneOS has a far-reaching number of substantial improvements that altogether make up for the most secure mobile operating system for the end user.

Because I want to keep this device as anonymous as possible, I do not even insert a SIM card at all and use the phone as a WiFi-only device. To protect my IP address, I use Orbot to route my traffic through Tor.

Sources
[1a] https://www.phoenixnewtimes.com/news/google-geofence-location-data-avondale-wrongful-arrest-molina-gaeta-11426374
[1b] https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html
[2]a https://www.abc15.com/news/region-west-valley/avondale/valley-man-suing-avondale-police-for-false-arrest
[2b] https://azcentral.com/story/news/local/southwest-valley/2019/07/31/jorge-luis-molina-says-avondale-police-used-google-data-wrongfully-arrest-him-murder-joe-knight/1873878001/
[3] https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
[4] https://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining
[5] https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html
[6] https://www.wired.com/story/geofence-warrants-google/
[7] https://www.fastcompany.com/9045..

If you want to maximize your digital privacy and security, you should use your phone. Computer operating systems are a security nightmare!
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

It has been the case for years that modern phone security models allow for a much greater protection of your sensitive data than any desktop offers today. There are plenty of problems with phones, many of which are totally unethical. But any issue you can criticize a modern phone for is several times worse on a desktop equivalent of it.

Both Android and iOS were designed with a thorough threat model in mind. Modern mobile operating systems implement defense in depth mechanisms that eliminate the ability of malicious software to access your sensitive data. Much of this is done via exploit mitigation, attack surface reduction and isolation. Isolation and containment is where the differences between desktop and mobile security models are most visible to the end user.

Many zealots in the privacy community, if such a thing even exists, do not make a distinction between services and platforms. Android means a lot of completely unrelated things to a lot of different people. But in reality, Android is just a free and open source mobile operating system. It has no Google apps or services, no pre-installed bundles or bloatware.

It’s important to make this distinction, because it’s possible to use an Android device without any privacy invasive apps and services. The Android’s model allows for it.

Android is private and safe by default. It’s best if you can use it without privacy invasive services, such as the Google Play Store. This is best achieved on GrapheneOS. But even if you can’t use your phone without them, it’s not all lost. You should still go through the privacy settings of each of these services and disable all the collection you are not comfortable with.

If you are buying a phone for privacy, Pixel phones from Goo..

This was the most important talk I have ever had. A real life hacker reveals the deeply flawed state of cybersecurity.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps:

00:00:52 Who the hackerman is

00:10:30 He can do some damage & code of ethics

00:14:18 Why did you choose to be a white hat hacker 19 - things are bad

00:23:34 People wouldn't want to use computers if they realized how insecure they are 25:25 there is no making it secure

00:30:30 There is no incentive for security

00:36:55 Nobody is listening to security teams

00:45:29 Security experts are frustrated

00:51:00 Government security is probably even worse

00:58:05 No one is taking this seriously until something very bad happens

01:21:20 Is cyber Bombing in Mr Robot possible?

01:26:17 Privacy is important to security

01:38:00 We need to change how we advocate for privacy - teach about abuse, not vulnerabilities

01:48:10 Is forcing interopearability a good solution?

02:02:40 We need mathematicians

02:08:45 Citizens should fight for more privacy and security

02:13:45 There is no single solution

02:16:33 Mobile security vs desktop security

02:26:45 Informed consent

02:32:48 Case for optimism

02:47:00 Estonia's e-government project

03:08:00 We need more ethical hackers to come out

03:16:25 Snowden is our inspiration

03:25:30 Hackerman will return

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Many academics are sounding alarms that the death of the unified global Internet is already happening. More and more countries are voicing their desire for digital sovereignty and techno-isolationism.

Experts are worried this cyber-balkanization is creating a multi-verse of national Internets and corporate walled gardens that they refer to as the Splintertnet.

If Internet can be understood as a worldwide network of all networks, Splinternet would be the opposite of that. It is when nations stop participating in the ICANN consensus and begin assigning their own IP addresses. It is also when governments setup nationwide firewalls to restrict free flow of information to and from the country. Both of these trends are already well on their way to create the world’s first Splinternet.

Sources
[0] https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-computer-networking.html
[1] https://www.icann.org/resources/pages/effect-2012-02-25-en
[2] https://www.icann.org/resources/pages/what-2012-02-25-en
[3] https://techonomy.com/welcome-to-the-splinternet/
[4] https://www.economist.com/briefing/2010/09/02/a-virtual-counter-revolution
[5] https://www.technologyreview.com/2022/03/17/1047352/russia-splinternet-risk/
[6] https://edition.cnn.com/2022/03/03/tech/ukraine-russia-internet-icann/index.html
[7] https://www.bloomberg.com/news/articles/2022-03-10/russia-internet-isolation-accelerates-after-ukraine-invasion
[8] https://fortune.com/2022/03/22/russia-war-ukraine-great-firewall-splinternet-internet/
[9] https://www.reuters.com/technology/russia-disconnected-global-internet-tests-rbc-daily-2021-07-22/
[10] https://www.reuters.com/article/amazon-cloud-idUSN1E7A727Q20111109
[11] https://www.statista.com/topics/4418/amazon-web-services/
[12] https://www.statista.com/statistics/216573/worldwide-market-share-of-search-engines/
[13] https://about.facebook.c..

This is a talk with realguyman, a privacy researcher and a contributor to privacyguides.org.
https://github.com/orgs/privacyguides/people#member-realguyman
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps
00:00:00 Introduction
00:01:50 Who is the realguyman
00:02:20 The topic for today's talk
00:03:52 How the web works
00:06:40 Why End-to-End Encryption on the web is fundamentally flawed
00:11:25 The problem of the chain of trust
00:16:15 Trusting the servers is fundamentally flawed
00:19:00 Mobile apps have better security but there's a catch
00:23:40 Servers serve web content dynamically
00:26:10 Debunking popular myths about false accountability
00:37:40 The problem with Bitwarden
00:41:30 There is still value to some of these services
00:46:57 What developers shoul do to improve the situation
00:53:07 What average users can do to improve the situation
01:11:40 We are sitting ducks
01:13:30 Closing remarks

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

The 21st century has erased the relative anonymity of the public square. Street surveillance is so advanced and ubiquitous today that anyone and everyone can be identified and tracked at a distance without consent.

No one should have a reasonable expectation of privacy when in public. But that doesn’t mean we still don’t have sensitive information that we would not want to be tracked. Health insurance companies would certainly want to pick up on the spike in your recent visits to the pharmacy. A victim of domestic abuse wouldn’t want to be followed by an AI tool rented by their abuser. A protester might want to join the cause but can’t afford the risk of being identified and have the police visit their home.

Nothing you do in public can be considered private. But if you can be anonymous, then it’s all you need to prevent linking your public activities to your identity.

Being anonymous when everyone is watching sounds like a skill reserved only to the top secret agents from a spy movie. But with a number of tweaks, you can render much of street surveillance tech and tactics useless.

[1] https://www.theguardian.com/media-network/2016/aug/17/facial-recognition-a-powerful-ad-tool-or-privacy-nightmare
[2] https://qz.com/512378/ads-have-started-watching-you-back-which-is-not-creepy-at-all/
[3] https://www.cbc.ca/news/science/cameras-targeted-advertising-1.5107784
[4] https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
[5] https://www.buzzfeednews.com/article/ryanmac/clearview-ai-local-police-facial-recognition
[6] https://www.nytimes.com/2014/02/02/technology/when-no-one-is-just-a-face-in-the-crowd.html
[7] https://www.washingtonpost.com/technology/2019/04/30/amazons-facial-recognition-technology-is-supercharging-local-police/
[8a] https://www.propublica.org/article/health-insurers-are-vacuuming-up-details-about-you-..

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps
00:00:00 Important message about our funding and business model
00:19:09 We need the freedom to point out the flaws in any product
00:25:54 Privacy is always evolving
00:28:26 Taking listener questions
00:30:00 Why is GrapheneOS so much more secure than other operating systems?
00:39:58 The Hated One and Closed Ntwrk Spar on disagreement over Android privacy
00:55:10 Why GrapheneOS is the most secure OS
01:04:20 Closed Ntwrk explains the difference between CalyxOS and GrapheneOS
01:12:20 Listener question
01:33:10 The Hated One and Closed Ntwrk go to war with each other over blockchain and cryptocurrency
01:57:00 Closed Ntwrk defends blockchain decentralization
02:26:08 The Hated One doesn't believe blockchain is the solution.
02:45:50 Explaining why Odysee doesn't solve the problem of centralized platforms
02:56:50 We should strive towards a permissionless system without blockchain
03:02:00 Closed Ntwrk calls The Hated one's bullshit on Lightening Network
03:16:50 The Hated One admits he is full of shit
03:26:40 We will return

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

YouTube is refusing to suggest my content to my subscribers and wider audiences. This can't go on. If you value my videos, please support my independent work on: https://www.patreon.com/thehatedone

I have never trusted YouTube. I have always considered it a necessary evil for this channel. YouTube search function is used more often than any other search engine except for Google itself.
YouTube is unavoidable. And this happened because YouTube used to be better than the alternative – the cable TV.

Today, YouTube has been corrupted and commercialized to the point it’s becoming worse than TV. All videos are riddled with ads and half of those videos are ads themselves. Either sponsored, or affiliated, creators looking for ways to make easy money online.

YouTube is a multi-tier system.

You see, if you want to make it big on YouTube, you have to play by the rules written by the algorithm. Because MrBeast’s formula is so successful, every channel now has to emulate it. Whether it fits the content or not.

The algorithm learned this is the only content that works right now. So every YouTuber under the sun is doing it. There is no integrity. Every YouTube video now has to be a shocking and outrageous clickbait.
The dick-sucking facial expressions are totally ubiquitous now. An anecdotal evidence: Here’s a personal finance channel that adopted the cock-throating technique and gets tons of views because of it.
Here’s another personal finance channel that didn’t adopt the technique and didn’t get the views because of it.
The line between entertainment and education is gone. It has been erased by the YouTube algorithm. Every video has to be a sensation. Anything short of that will fail.

On average, I dedicate anywhere between 5 – 10 hours of work for every minute of my videos. 5 – 10 hours of extensive research, scripting, recording and editing. Most of my videos barely earn $100 or $200. I let you do that math.

So small creators cannot rely on YouTube ads for th..

Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps:
00:00:00 The Hated One remembers to be a human
00:01:50 The comments and feedback from the previous episode
00:03:20 Correcting our mistake - spelling out Cwtch.im
00:04:32 Cwtch vs Briar
00:09:00 Configuring Brair to run with full-device Orbot
00:11:30 The limitation of peer-to-peer networks without an internet connection
00:16:40 Different ways of incentivizing decentralized networks
00:29:00 User experience has to be easy - Closed Ntwrk's issues with Briar
00:30:15 The Hated One dies mid podcast
00:36:10 Tradeoffs of centralized and decentralized platforms
00:38:15 Threat models
00:39:24 Closed Ntwrk's biggest mistake of his entire life (he will burn in hell for this)
00:50:57 Threat models are fluid
00:55:05 The benefits of VPS self-hosting
01:22:00 The benefits of diverse opinion and threat models
01:29:00 More bloomerism and hopium
01:35:30 The different approaches to teaching privacy by THO and Closed Ntwrk
01:45:00 Small open source developers are fighting the big tech
01:54:30 What's the first and the most important step to start your privacy journey
02:07:50 Assume your security will be breached
02:13:50 How the FBI hired Facebook to hack a Tails user

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

If you want to attend a protest, you have to become unidentifiable. This is how you do it.
Become a producer of independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Police now have the ability to harass protesters with arrests, threats and coercion all the way back to their homes and offices. Attending a protest with a phone will now tell the police exactly who are you, who you communicate with and where you live.

Your phone has four main radio signals, all of which can compromise your security:
• Cellular radio – is your phone’s most revealing data point. Your SIM card has a unique IMSI number that is broadcast indiscriminately into all directions. The police can capture this number with so called IMSI catchers, find your real phone number and even intercept your calls and SMS texts.
• WiFi – is the second most common data point. Police can setup a rogue hotspot to trick your phone into connecting to it without you noticing and they can start monitoring your traffic in real time.
• Police can also use Bluetooth beacons to catch your phone’s unique identifier. They could also try to exploit known Bluetooth vulnerabilities to attack your device with malicious payload.
• GPS is broadly used for precise locations services, but this one is the safest data point. Your phone is only a receiver of GPS signals and doesn’t transmit any information. Your phone may, however, store GPS coordinates, which may be revealed to the police if they capture and unlock your phone.

Surveillance is the best tool to silence dissent. This is why if you care about your cause, you are going to have to care about protecting the identity of you and your fellow protesters. Your goal must be to become unidentifiable.

What follows is a comprehensive guide to become anonymous in the street. The goal is extreme anonymity and no middle-ground compromises. This guide will be split into two parts – Digital security, and physical s..

SHOW MORE

Created 6 years, 6 months ago.

164 videos

Category Science & Technology

Uncovering the wrongdoing of governments and corporations irrespective of the political tribe they claim to allign with. When corporate monopolies abuse their dominance and governments fail their electorates, come to this channel to learn how you can guard your digital rights on your own.

If you like what I do on this channel, consider supporting me through a crypto-currency of your choice. Help me build the first crypto-funded channel on YouTube!

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Dash
XyBDwdFQuZNCnThkeeg1FRFks65hKMkTux

Litecoin
LcHJvrovBfqDBQyfHcxxBErGM8qq5zho8s

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

https://twitter.com/The_HatedOne_
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne