The Hated One

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Many academics are sounding alarms that the death of the unified global Internet is already happening. More and more countries are voicing their desire for digital sovereignty and techno-isolationism.

Experts are worried this cyber-balkanization is creating a multi-verse of national Internets and corporate walled gardens that they refer to as the Splintertnet.

If Internet can be understood as a worldwide network of all networks, Splinternet would be the opposite of that. It is when nations stop participating in the ICANN consensus and begin assigning their own IP addresses. It is also when governments setup nationwide firewalls to restrict free flow of information to and from the country. Both of these trends are already well on their way to create the world’s first Splinternet.

Sources
[0] https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-computer-networking.html
[1] https://www.icann.org/resources/pages/effect-2012-02-25-en
[2] https://www.icann.org/resources/pages/what-2012-02-25-en
[3] https://techonomy.com/welcome-to-the-splinternet/
[4] https://www.economist.com/briefing/2010/09/02/a-virtual-counter-revolution
[5] https://www.technologyreview.com/2022/03/17/1047352/russia-splinternet-risk/
[6] https://edition.cnn.com/2022/03/03/tech/ukraine-russia-internet-icann/index.html
[7] https://www.bloomberg.com/news/articles/2022-03-10/russia-internet-isolation-accelerates-after-ukraine-invasion
[8] https://fortune.com/2022/03/22/russia-war-ukraine-great-firewall-splinternet-internet/
[9] https://www.reuters.com/technology/russia-disconnected-global-internet-tests-rbc-daily-2021-07-22/
[10] https://www.reuters.com/article/amazon-cloud-idUSN1E7A727Q20111109
[11] https://www.statista.com/topics/4418/amazon-web-services/
[12] https://www.statista.com/statistics/216573/worldwide-market-share-of-search-engines/
[13] https://about.facebook.c..

This is a talk with realguyman, a privacy researcher and a contributor to privacyguides.org.
https://github.com/orgs/privacyguides/people#member-realguyman
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps
00:00:00 Introduction
00:01:50 Who is the realguyman
00:02:20 The topic for today's talk
00:03:52 How the web works
00:06:40 Why End-to-End Encryption on the web is fundamentally flawed
00:11:25 The problem of the chain of trust
00:16:15 Trusting the servers is fundamentally flawed
00:19:00 Mobile apps have better security but there's a catch
00:23:40 Servers serve web content dynamically
00:26:10 Debunking popular myths about false accountability
00:37:40 The problem with Bitwarden
00:41:30 There is still value to some of these services
00:46:57 What developers shoul do to improve the situation
00:53:07 What average users can do to improve the situation
01:11:40 We are sitting ducks
01:13:30 Closing remarks

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

The 21st century has erased the relative anonymity of the public square. Street surveillance is so advanced and ubiquitous today that anyone and everyone can be identified and tracked at a distance without consent.

No one should have a reasonable expectation of privacy when in public. But that doesn’t mean we still don’t have sensitive information that we would not want to be tracked. Health insurance companies would certainly want to pick up on the spike in your recent visits to the pharmacy. A victim of domestic abuse wouldn’t want to be followed by an AI tool rented by their abuser. A protester might want to join the cause but can’t afford the risk of being identified and have the police visit their home.

Nothing you do in public can be considered private. But if you can be anonymous, then it’s all you need to prevent linking your public activities to your identity.

Being anonymous when everyone is watching sounds like a skill reserved only to the top secret agents from a spy movie. But with a number of tweaks, you can render much of street surveillance tech and tactics useless.

[1] https://www.theguardian.com/media-network/2016/aug/17/facial-recognition-a-powerful-ad-tool-or-privacy-nightmare
[2] https://qz.com/512378/ads-have-started-watching-you-back-which-is-not-creepy-at-all/
[3] https://www.cbc.ca/news/science/cameras-targeted-advertising-1.5107784
[4] https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html
[5] https://www.buzzfeednews.com/article/ryanmac/clearview-ai-local-police-facial-recognition
[6] https://www.nytimes.com/2014/02/02/technology/when-no-one-is-just-a-face-in-the-crowd.html
[7] https://www.washingtonpost.com/technology/2019/04/30/amazons-facial-recognition-technology-is-supercharging-local-police/
[8a] https://www.propublica.org/article/health-insurers-are-vacuuming-up-details-about-you-..

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps
00:00:00 Important message about our funding and business model
00:19:09 We need the freedom to point out the flaws in any product
00:25:54 Privacy is always evolving
00:28:26 Taking listener questions
00:30:00 Why is GrapheneOS so much more secure than other operating systems?
00:39:58 The Hated One and Closed Ntwrk Spar on disagreement over Android privacy
00:55:10 Why GrapheneOS is the most secure OS
01:04:20 Closed Ntwrk explains the difference between CalyxOS and GrapheneOS
01:12:20 Listener question
01:33:10 The Hated One and Closed Ntwrk go to war with each other over blockchain and cryptocurrency
01:57:00 Closed Ntwrk defends blockchain decentralization
02:26:08 The Hated One doesn't believe blockchain is the solution.
02:45:50 Explaining why Odysee doesn't solve the problem of centralized platforms
02:56:50 We should strive towards a permissionless system without blockchain
03:02:00 Closed Ntwrk calls The Hated one's bullshit on Lightening Network
03:16:50 The Hated One admits he is full of shit
03:26:40 We will return

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

YouTube is refusing to suggest my content to my subscribers and wider audiences. This can't go on. If you value my videos, please support my independent work on: https://www.patreon.com/thehatedone

I have never trusted YouTube. I have always considered it a necessary evil for this channel. YouTube search function is used more often than any other search engine except for Google itself.
YouTube is unavoidable. And this happened because YouTube used to be better than the alternative – the cable TV.

Today, YouTube has been corrupted and commercialized to the point it’s becoming worse than TV. All videos are riddled with ads and half of those videos are ads themselves. Either sponsored, or affiliated, creators looking for ways to make easy money online.

YouTube is a multi-tier system.

You see, if you want to make it big on YouTube, you have to play by the rules written by the algorithm. Because MrBeast’s formula is so successful, every channel now has to emulate it. Whether it fits the content or not.

The algorithm learned this is the only content that works right now. So every YouTuber under the sun is doing it. There is no integrity. Every YouTube video now has to be a shocking and outrageous clickbait.
The dick-sucking facial expressions are totally ubiquitous now. An anecdotal evidence: Here’s a personal finance channel that adopted the cock-throating technique and gets tons of views because of it.
Here’s another personal finance channel that didn’t adopt the technique and didn’t get the views because of it.
The line between entertainment and education is gone. It has been erased by the YouTube algorithm. Every video has to be a sensation. Anything short of that will fail.

On average, I dedicate anywhere between 5 – 10 hours of work for every minute of my videos. 5 – 10 hours of extensive research, scripting, recording and editing. Most of my videos barely earn $100 or $200. I let you do that math.

So small creators cannot rely on YouTube ads for th..

Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Timestamps:
00:00:00 The Hated One remembers to be a human
00:01:50 The comments and feedback from the previous episode
00:03:20 Correcting our mistake - spelling out Cwtch.im
00:04:32 Cwtch vs Briar
00:09:00 Configuring Brair to run with full-device Orbot
00:11:30 The limitation of peer-to-peer networks without an internet connection
00:16:40 Different ways of incentivizing decentralized networks
00:29:00 User experience has to be easy - Closed Ntwrk's issues with Briar
00:30:15 The Hated One dies mid podcast
00:36:10 Tradeoffs of centralized and decentralized platforms
00:38:15 Threat models
00:39:24 Closed Ntwrk's biggest mistake of his entire life (he will burn in hell for this)
00:50:57 Threat models are fluid
00:55:05 The benefits of VPS self-hosting
01:22:00 The benefits of diverse opinion and threat models
01:29:00 More bloomerism and hopium
01:35:30 The different approaches to teaching privacy by THO and Closed Ntwrk
01:45:00 Small open source developers are fighting the big tech
01:54:30 What's the first and the most important step to start your privacy journey
02:07:50 Assume your security will be breached
02:13:50 How the FBI hired Facebook to hack a Tails user

Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

If you want to attend a protest, you have to become unidentifiable. This is how you do it.
Become a producer of independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Police now have the ability to harass protesters with arrests, threats and coercion all the way back to their homes and offices. Attending a protest with a phone will now tell the police exactly who are you, who you communicate with and where you live.

Your phone has four main radio signals, all of which can compromise your security:
• Cellular radio – is your phone’s most revealing data point. Your SIM card has a unique IMSI number that is broadcast indiscriminately into all directions. The police can capture this number with so called IMSI catchers, find your real phone number and even intercept your calls and SMS texts.
• WiFi – is the second most common data point. Police can setup a rogue hotspot to trick your phone into connecting to it without you noticing and they can start monitoring your traffic in real time.
• Police can also use Bluetooth beacons to catch your phone’s unique identifier. They could also try to exploit known Bluetooth vulnerabilities to attack your device with malicious payload.
• GPS is broadly used for precise locations services, but this one is the safest data point. Your phone is only a receiver of GPS signals and doesn’t transmit any information. Your phone may, however, store GPS coordinates, which may be revealed to the police if they capture and unlock your phone.

Surveillance is the best tool to silence dissent. This is why if you care about your cause, you are going to have to care about protecting the identity of you and your fellow protesters. Your goal must be to become unidentifiable.

What follows is a comprehensive guide to become anonymous in the street. The goal is extreme anonymity and no middle-ground compromises. This guide will be split into two parts – Digital security, and physical s..

My podcast discussion with Closed Ntwrk on privacy, surveillance, decentralization and how we win back the Internet.
Help produce independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone
Closed Ntwrk: https://www.closedntwrk.com/episode-12-collab-with-the-hated-one-youtube-personality/

In the podcast, The Hated One and Closed Ntwrk discuss privacy, security, surveillance and decentralization. Our first debate quickly spirals into a discussion on how we take back the Internet and build a resilient decentralized infrastructure that is not dependent on any central point of failure.

The Hated One proposes how Briar, Cwtch and other peer-to-peer solutions could re-decentralized the Internet as it was intended back in the 1990s. Closed Ntwrks talks extensively about how self-hosting is a lot easier and more useful solution for privacy, security and information freedom issues than is commonly understood.

Towards the end of the podcast, we encourage people to get involved in helping open source projects grow, maintain and and expand. Likewise, communities should engage in activism and political movements to force bad legislation out and invite good legislation that promotes Internet freedom and privacy.

At the end of the podcast, we also share our mobile privacy setups and how we believe GrapheneOS is the most important security project of our time.

This podcast collaboration between The Hated One and Closed Ntwrk could be the beginning of a beautiful series on the most important topics of the Internet age.

Timestamps
00:00:00 Why Closed Ntwrk makes privacy podcast
00:03:55 Why privacy matters
00:07:40 Privacy doesn't matter
00:19:30 Paying for privacy
00:21:50 Privacy optimism
00:29:00 Self hosting is hard but important
00:36:10 The Hated One's vision of a peer-to-peer Utopia
00:58:00 The Internet is recentralized
01:04:15 Hacker wars over peer-to-peer Utopia
01:08:00 Let's help each other
01:14:55 Signal is not a long-ter..

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

International Red Cross recommends that all persons have an emergency survival kit with multiday supplies of the most essential items. This is in case of any natural or man-made crisis resulting in a need for evacuation or a major disruption of day-to-day services.

Part of this emergency kit is what I would call a digital bug out bag. It includes:
• copies of personal documents
• cell phone with chargers or extra batteries
• family and emergency contact information

Many if not all of these copies should be physical. But paper documents can easily get destroyed by floods, fire or collapse. They can be lost or stolen and in case of theft, your paper documents are not encrypted and they could be abused for fraud; which is the last thing you want to think about in a crisis.

Having a secure digital backup gives you an additional fail safe if all else is lost. Hopefully you will never be in a situation where you need this. But it’s always better to be prepared because this can save you the precious seconds that might be decisive in an emergency situation.

So in this short tutorial, I will guide you through the process of creating an encrypted digital backup on a microSD card, how to securely copy and store your files and how to protect it from theft, loss and physical elements.

I will also extend this tutorial to include emergency items and apps that could help you better navigate through a crisis situation. This won’t take long so let’s begin.

I chose a microSD card for this purpose because it is the most versatile storage medium for a digital bug out bag. Technically, a USB flash drive will be the most widely accepted standard among any modern computer, laptop or even mobile devices.

Sources
Official Veracrypt Website: https://veracrypt.fr/en/Home.html
Download Veracrypt: https://veracrypt.fr/en/Downloads.html
How To Verify Veracrypt PGP ..

Sanctions on Russia over Ukraine invasion will hurt Russian economy and its people. But they won't force Putin to change his mind.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

The sanctions on Russia imposed by the Western alliance is far beyond anything that could be considered reasonable. The sanctions didn’t stay confined to just the targets closest to Putin and individuals with actual power in the Russian government. They are hurting innocent Russian civilians who have no connection to Kremlin and no say in the matter of Putin’s foreign policy.

Sources
CIA profile on Russia: https://www.cia.gov/the-world-factbook/countries/russia/
Real GDP Purchasing Power Parity: https://www.cia.gov/the-world-factbook/field/real-gdp-purchasing-power-parity/country-comparison/
Russian economy profile: https://www.britannica.com/place/Russia/Economy
IMF economic data: https://www.imf.org/external/datamapper/[email protected]/OEMDC/ADVEC/WEOWORLD

The First Gulf War: https://www.britannica.com/event/Persian-Gulf-War
Iraq sanctions hurting people: https://www.nytimes.com/1995/12/01/world/iraq-sanctions-kill-children-un-reports.html
Counter-argument to the toll of sanctions on Iraq: https://www.washingtonpost.com/news/worldviews/wp/2017/08/04/saddam-hussein-said-sanctions-killed-500000-children-that-was-a-spectacular-lie/
Deterioration due to sanctions: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1120689/
Iraq's child mortality rate: https://www.jstor.org/stable/4417422
Excess mortality: https://www.pbs.org/frontlineworld/stories/iraq/sanctions.html

Study on the factors for sanctions to work: https://www.tandfonline.com/doi/abs/10.1080/13642989908406841?

Sanctions on Russia:
https://www.washingtonpost.com/politics/2022/02/24/russia-sanctions-ukraine-biden/?
https://home.treasury.gov/news/press-releases/jy0608
https://indianexpress.com/article/world/sanctions-imposed-on-russia-for-invading-ukraine-7797825/
Banning of news ..

Essay on how different Ukrainian president Volodymyr Zelenskiy from Russian president Vladimir Putin.
Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone

Russia’s invasion in Ukraine is a self-centered ambition of an authoritarian leader. The defense of Ukraine is an ambition of millions of Ukrainians standing up to a foreign autocrat.
I don’t see this conflict as just a territorial dispute. I see a young, flawed democracy struggling against an old empire ruled by an autocrat. Ukraine is not perfect. Like Russia, corruption and oligarchy have rotten much of the Ukrainian society.

But unlike Russians, Ukrainians have been free to choose their own leader that best represents their frustration with the corrupt system. The stark differences between Volodomyr Zelenskyy and Vladimir Putin say a lot about what kind of leaders you can get when you subject them to democratic accountability.

There is a big difference between the kind of a leader Zelenskyy is, and the kind of a leader Putin is. It’s not just their personalities. It’s how they rose to power, how they maintain power, how they treat their opposition, respect civil rights, appeal to their people, and what issues they focus on. So let’s compare.

Sources
Attitudes of Ukrainians and Russians toward one another: https://www.vedomosti.ru/politics/articles/2019/03/11/796144-ukraintsev-k-rossii

Volodymyr Zelenskiy profile
https://www.president.gov.ua/ru/news/ukrayina-ta-estoniya-pogliblyat-spivpracyu-dlya-realizaciyi-55861
https://www.britannica.com/biography/Volodymyr-Zelensky
https://en.wikipedia.org/wiki/Volodymyr_Zelensky
https://www.businessinsider.nl/who-is-volodymyr-zelensky-ukraine-president-central-to-trump-scandal-2019-9?
https://www.theatlantic.com/politics/archive/2019/12/zelensky-ukraine-impeachment/602905/
https://www.politico.eu/article/ukraine-servant-people-president-volodymyr-zelenskiy-war-russia/

Zelenskiy's path to presidency: https://c..

Tails - The Amnesic Incognito Live System, is the most anonymous operating system in the world. Edward Snowden used to leak the NSA documents. Here's how you can get it too.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Online anonymity sometimes demands much more than just obfuscating your location and IP address. Some threat models require that you leave no trace of your activity on the device you are using. The problem is that regular operating systems are designed to store troves of sensitive data in the hardware of your machine. Even with full-device encryption, memory logs can often be easily recovered by an adversary with physical access to your device. Not everyone has the luxury of physical security and they have to assume that their computer will likely fall into the wrong hands.

This is why security experts with a strong sense for protecting human rights in the digital world have been working on creating a system that doesn’t remember anything about itself. A system that forensically wipes all evidence of its use immediately after a user ends their session. A system that looks exactly the same no matter who uses it or for whatever purpose. And now such a system has a name. Tails. The Amnesic Incognito Live System.

Live system, because it’s an operating system designed to run off of a USB flash drive, instead of being permanently installed on an internal drive. Incognito, because its entire traffic is routed through Tor and the default fingerprint of each Tails installation matches perfectly with every other Tails users on the planet. Amnesic means every time you reboot, plug out your USB, or shut down, all information about your session activity is wiped from the USB flash drive as well as from the host..

Psychoacoustics hiding. Laser hacking. DolphinAttack. Inaudible voice commands. Your virtual assistant is more vulnerable to cyber attacks than you could imagine.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp
Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689
Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Sources

Hidden Audio Commands
https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html
Burger King TV Ad Trolling Google Home
https://www.nytimes.com/2017/04/12/business/burger-king-tv-ad-google-home.html?

Ultrasonic Voice Commands
https://www.bbc.com/news/technology-41188557
https://www.scientificamerican.com/article/ultrasonic-attack-device-hacks-phones-through-solid-objects/

Voice Obfuscation & Psychoacoustics
https://www.usenix.org/conference/woot15/workshop-program/presentation/vaidya
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
https://www.usenix.org/system/files/conference/woot15/woot15-paper-vaidya.pdf
Psychoacoustics
https://adversarial-attacks.net/
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
https://www.ndss-symposium.org/ndss-paper/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding/
Alexa Can Be Hacked By Chirping Birds
https://www.fastcompany.com/90240975/alexa-can-be-hacked-by-chirping-birds

Alexa Skills Hacking
https://www.wired.com/story/amazon-echo-alexa-skill-spying/
https://news.ncsu.edu/2021/03/alexa-skill-vulnerabilities/

Voice Squatting
https://www.forbes.com/sites/thomasbrewster/2018/05/16/amazon-echo-google-home-voice-squatting-attack-exposes-devices/

DolphinAttack
Animal Frequency Hearing Range
https://en.wikipedia.org/wiki/File:Animal_hearing_frequency_range.svg
https://www.fastcompany.com/90139019/a-simple-design-flaw-makes-it-ast..

This is what a cyberwar looks like. The 2007 cyberattacks on Estonia became largely considered to be the first cyber warfare in Internet history.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

To understand what can be realistically done with cyberwarfare, it serves best to look at the real world instead of hypothetical scenarios. One such cyber campaign was waged against one of the most digitally advanced countries in the world. It was the 2007 cyberwar in Estonia.

The face of the cyberwar will most likely take the form of skirmishes that take days or weeks at a time. A full-scale campaign on an entire nation’s infrastructure is only a viable threat to smaller countries mostly without military alliances. Waging such a massive cyber campaign is most effective when coordinated with kinetic force. But on its own, cyber offensive will eventually run out of resources and time and the defense will adapt.

The cyberwar in Estonia was successful mostly because it likely had hundreds or thousands of spontaneous participants. But Estonia’s economy didn’t crumble and the society bounced back to normal quickly after the attacks were fended off.

Sources
Immediate media coverage of the cyber attacks on Estonia
http://news.bbc.co.uk/1/hi/world/europe/6665145.stm
https://www.bbc.com/news/39655415
https://www.theguardian.com/world/2007/may/17/topstories3.russia
https://www.dailymail.co.uk/sciencetech/article-455467/Russia-launches-cyberwar-Estonia.html
Russia accused
https://arstechnica.com/information-technology/2007/05/massive-ddos-attacks-target-estonia-russia-accused/
https://www.reuters.com/article/oukin-uk-estonia-cyberwar-idUKL1847541120070518
Chronology of the cyber attacks
https://www.nytimes.com/2007/05/29/technology/29es..

You can be legally hacked and someone will make a fortune out of it. This is how it happens.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Sources

Bezos is my daddy... not!
https://www.theguardian.com/technology/2020/jan/21/amazon-boss-jeff-bezoss-phone-hacked-by-saudi-crown-prince
https://www.nytimes.com/2020/01/23/business/media/national-enquirer-jeff-bezos-saudi-hack.html

NSO & Pegasus
Profile
https://citizenlab.ca/2019/10/nso-q-cyber-technologies-100-new-abuse-cases/
https://citizenlab.ca/2021/11/palestinian-human-rights-defenders-hacked-nso-groups-pegasus-spyware/
36 Al Jazeera journalisted targeted
https://gizmodo.com/dozens-of-al-jazeera-journalists-were-hacked-via-zero-c-1845925960
The NSO Group company
https://www.fastcompany.com/90312043/cyberattack-firm-nso-group-woos-new-investors-amid-human-rights-firestorm
https://www.vice.com/en/article/qvy97x/israeli-nso-group-marketing-pr-push
Ahmed Mansoor
https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/
Jamal Khasshoggi
https://www.nytimes.com/2018/12/02/world/middleeast/saudi-khashoggi-spyware-israel.html
https://www.washingtonpost.com/investigations/interactive/2021/jamal-khashoggi-wife-fiancee-cellphone-hack/
Pegasus demo
https://www.vice.com/en/article/qvakb3/inside-nso-group-spyware-demo
French cabinet targeted
https://www.theguardian.com/news/2021/sep/23/spyware-found-on-phones-of-five-french-cabinet-members
Hungarian journalist targeted
https://www.theguardian.com/news/2021/sep/21/hungary-journalist-daniel-nemeth-phones-infected-with-nso-pegasus-spyware
Global NSO Pegasus leak
https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus
https://www.reuters..

Data centers are running out of water to cool their servers with. And they keep asking for more.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

In the United States, data centers are consuming 1.7 billion liters of water per day. Compared to the total daily water consumption of 1,218 billion liters, that’s less than 0.14%. Sounds like a negligible amount. Until it’s not.

Because the reality is, only one third of data center operators are measuring their water consumption. And the water that gets measured is only the one used directly for cooling. But there is a much bigger hidden cost to running a data center than that.

Sources

Data center water consumption
https://www.nature.com/articles/s41545-021-00101-w
https://www.datacenterdynamics.com/en/analysis/data-center-water-usage-remains-hidden/
Water used on cooling vs electricity generation
https://www.datacenterdynamics.com/en/opinions/an-industry-in-transition-1-data-center-water-use/
Arizona, Texas and Google
https://time.com/5814276/google-data-centers-water/
Data centers water impact on dry regions
https://www.nbcnews.com/tech/internet/drought-stricken-communities-push-back-against-data-centers-n1271344
Arizona water concerns over data centers
https://www.datacenterdynamics.com/en/news/huge-data-center-moves-forward-in-mesa-despite-arizona-water-concerns/
Data center tax breaks
https://www.datacenterdynamics.com/en/news/arizona-passes-data-center-tax-breaks/
Apple in Arizona
https://appleinsider.com/articles/17/05/10/apple-plans-major-expansions-at-arizona-and-nevada-data-centers
https://www.datacenterdynamics.com/en/news/mesa-council-approves-1bn-google-arizona-data-center-16m-tax-breaks/
Chandler, Arizona
https://azcentral.com/story/news/local/chandler/2021/11..

A billionaire philanthropist took control of the global public health. This is what happened to vaccine distribution.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Bill gates has gained an incredible amount of control over the World Health Organization. But how is it possible for one billionaire to become so powerful and influential? This is a United Nations body that advises on public health policies of 194 member states.

Bill Gates has been the richest man in the world since Windows 95 and never left the top 4 position.

Private donations could easily introduce a conflict of interest when they could sway WHO’s policies to benefit big pharmaceutical corporations or food retailers. This is why the WHO doesn’t openly accept donations from these entities. But that’s not the policy of the Bill and Melinda Gates Foundation. In fact, with the main focus on building private-public partnerships, it is the exact opposite.

Current models predict the vaccination rates of middle income countries won’t reach herd immunity levels sooner than 2023. Poor countries won’t reach those levels by 2024 if at all.
This situation is way worse than bad. Low income nations aren’t just failing to inoculate their most vulnerable populations. High-income economies are actually administering booster doses at a faster rate than poor countries are administering their first doses.

When rich countries have already 2/3 of their population fully vaccinated, in poor countries, barely 3% of their total population received a second dose. Most of the low-income countries aren’t hammered just by COVID19.

Sources

Vaccine Apartheid
https://www.eiu.com/n/85-poor-countries-will-not-have-access-to-coronavirus-vaccines/
Pressuring low-income countries
http..

This is how 3D printing could solve shortages and decentralize production.
https://www.patreon.com/thehatedone
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

3D printing can do a lot. Doctors 3D-print customized implants and even medication with individual dosage needs. Rapid prototyping has relied on 3D printing for a decade now. There’s this themed restaurant in London where everything, from chairs through cutlery and even food is printed from scratch. Recently, hobbyists and enthusiasts held a national competition for 3D-printed guns. First startups are popping up with promising technology to print affordable housing faster, cheaper and more sustainably.

3D printers aren’t going to replace machines in traditional manufacturing. They’ll be their excellent companion. Bringing the best of the both worlds and eliminating their drawbacks. 3D printers can excel at customization and decentralizing the supply chain, while subtractive manufacturing can mass-produce at scale at low cost. We probably shouldn’t hope for 3D printing to be able to do more than that. But that might be more than enough.

Sources

About 3D printing in general
https://www.allaboutcircuits.com/news/introduction-to-3d-printing-history-processes-and-market-growth/
Filaments
https://all3dp.com/1/3d-printer-filament-types-3d-printing-3d-filament/
Poly-lactic acid (popular 3D printing filament)
https://www.sciencedirect.com/topics/agricultural-and-biological-sciences/polylactic-acid
ABS (filament)
https://www.sciencedirect.com/topics/engineering/acrylonitrile-butadiene-styrene

Health Care
FDA approved drug
https://www.fda.gov/drugs/news-events-human-drugs/cder-researchers-explore-promise-and-potential-3d-printed-pharmaceuticals
https://www.computerworld.com/article/3048823/this-is-the-first-3d-printed-drug-to-win-fda-approval.html
→ https://..

Autonomous weapons are taking over modern warfare.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Research and fact-checking on my subreddit
Research thread: https://www.reddit.com/r/thehatedone/comments/q4hxei/help_me_research_military_ai/
Fact-check: https://www.reddit.com/r/thehatedone/comments/q8phau/factcheck_military_artificial_intelligence/

Sources
[1] https://apnews.com/b7ef15f47cf2d123668ed1939db01485
[2] https://www.aljazeera.com/features/2020/10/13/nagorno-karabakh-new-weapons-for-an-old-conflict-spell-danger
[3] https://www.washingtonpost.com/world/europe/nagorno-karabkah-drones-azerbaijan-aremenia/2020/11/11/441bcbd2-193d-11eb-8bda-814ca56e138b_story.html
[4] https://www.brookings.edu/techstream/loitering-munitions-preview-the-autonomous-future-of-warfare/
[5] https://www.theatlantic.com/national/archive/2012/03/why-cant-the-air-force-build-an-affordable-plane/254998/
[6] https://en.wikipedia.org/wiki/Northrop_Grumman_B-2_Spirit
[7] https://www.popsci.com/technology/marines-grenade-drone-40/
[8] https://www.wired.com/2016/01/when-good-drones-go-bad/
[9a] https://www.nytimes.com/2018/02/20/technology/artificial-intelligence-risks.html
[9b] https://www.nytimes.com/interactive/2018/02/13/technology/skydio-autonomous-drones.html
[10] https://www.theatlantic.com/technology/archive/2018/03/drone-swarms-are-going-to-be-terrifying/555005/
[11] https://www.theatlantic.com/technology/archive/2018/03/drone-swarms-are-going-to-be-terrifying/555005/
[12] https://www.cnbc.com/2019/09/18/saudi-arabia-drone-and-missile-debris-proves-iranian-role-in-attack.html
[13] https://www.theguardian.com/world/2019/sep/19/how-did-attack-breach-saudi-defences-and-what-will-happen-next
[14] https://www.cnbc.com/2019/09/20/oil-dro..

Australia is lost. It's no longer a liberal democracy with government accountability. It's a surveillance state with unlimited police powers and eradicated civil rights.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

IMPORTANT!!!
Sources wouldn't fit in the description. They are in the pinned comment of the video: https://www.youtube.com/watch?v=mAkCAZSq2a0

This is how Australia, once a much appraised liberal democracy, descended into a full-blown police state.

Australian intelligence is one of the most powerful entities in the world. Yet it has the least amount of oversight out of all democratic nations. The law doesn’t grant Australian public the right to know about any intelligence operation, current or past ones.

Disclosing information about operations is done solely at the discretion of Australian intelligence. Any unauthorized disclosure from public servants or intelligence officers, can lead to 10 years of imprisonment.

No Edward Snowden or Julian Assange could ever come out of Australia, because even reporting journalists would be charged with the same crimes as whistleblowers. All attempts to limit intelligence powers have been quickly shut down before they could even reach parliamentary hearings. During the two years of the pandemic, Australian government expanded its powers to the point it rivals those behind the Great Firewall of China.

In 2014, Australian parliament passed an amendment to the National Security Legislation with a new wording that allows ASIO to obtain a single warrant to wiretap the entire Internet.

The amendment intentionally defines a computer such that it includes all computers operating in a network of a target. Any target person using the Internet is using a network of comput..

AI-derived scores rank individuals based on their profitability or risk as consumers, job candidates, or even defendants in court. Machine-learning algorithms decide your life.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Businesses, courts and the police have adopted artificial intelligence to assign scores to individuals based on poorly understood statistical analysis. The public needs to start a dialogue about whether or not we want to accept the ethics of this practice.

Throughout my research, I have been able to identify seven different scores maintained on individuals or locations. Here’s what I could find. You have a:
• consumer score, which is now widespread among customer-oriented enterprises
• Health Score and Driver Score, – both of which are sought by insurance companies and I already covered these two scoring systems in separate videos.
• Credit Rating Score – used in lending, loaning and banking markets.
• Job Applicant Score – most commonly deployed in resume scanning and candidate ranking
• a risk-assessment score used in criminal justice system,
• and a predictive policing score

Sources

Bias and privacy concerns: https://news.harvard.edu/gazette/story/2020/10/ethical-concerns-mount-as-ai-takes-bigger-decision-making-role/

Consumer score
https://www.theverge.com/2019/11/6/20952239/secret-consumer-score-data-privacy-kashmir-hill-airbnb-yelp
https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html
https://www.wsj.com/articles/on-hold-for-45-minutes-it-might-be-your-secret-customer-score-1541084656
https://www.inc.com/bill-murphy-jr/secret-consumer-scores-explain-why-some-people-get-much-better-service-than-others-now-you-can-finally-request-your-data-ge..

Apple is secretly monopolizing advertising on the iOS platform and is on the path of becoming one of the largest advertisers on the global mobile market.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Sources

Apple Advertising Network: https://searchads.apple.com/
Apple Advertising Privacy Policy: https://support.apple.com/en-us/HT205223
Apple Privacy Policy: https://www.apple.com/legal/privacy/en-ww/
App Store privacy policy: https://developer.apple.com/app-store/user-privacy-and-data-use/

Apple's secret data sharing deal with Facebook https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html
Apple's image scanning software:
https://www.businessinsider.com/apple-plans-software-scan-us-iphones-child-abuse-images-report-2021-8
https://www.nytimes.com/2021/08/05/technology/apple-iphones-privacy.html
https://www.nytimes.com/2021/08/18/technology/apple-child-abuse-tech-privacy.html
Apple dropped end-to-end encrypted iCloud https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT
Google's response to Apple's IDFA change https://www.reuters.com/article/google-apple-int/google-to-stop-using-apple-tool-to-track-iphone-users-avoiding-new-pop-up-warning-idUSKBN29W1VM
Mozilla on IDFA https://blog.mozilla.org/en/internet-culture/mozilla-explains/turn-off-idfa-for-apps-apple-ios-14-5/
Apple's share on the mobile market https://digiday.com/marketing/ad-tech-is-girding-itself-for-the-loss-of-apples-idfa-heres-what-you-need-to-know/
https://finance.yahoo.com/news/global-mobile-advertising-market-2021-114300762.html
https://www.statista.com/statistics/266572/market-share-held-by-smartph..

#short VPNs are useless for privacy. Good for Netflix. Full video here: https://youtu.be/6ohvf03NiIA
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Don’t use a VPN for privacy. I can’t even count how many times I’ve seen people being mislead into believing this fallacy. VPNs don’t protect your privacy.
All free VPNs are data mining operations and paid VPNs are just false advertising.
They just change your IP address. Even that is unreliable. Modern trackers inside apps and websites don’t even need to know your IP address to know who you are or where you are.
If you are logged in to Facebook or Google or install their apps on your phone, a VPN does nothing to protect you.
VPN encryption is pretty much useless for 99% of cases. Most connections to servers from websites and apps are encrypted by HTTPS or TLS respectively.
You have to trust your VPN provider doesn’t keep logs of your browser activity. All of that fancy VPN encryption is stripped at your provider so they can see everything you do. And not just them but any server provider that you have no way of auditing or verifying their policies.
VPNs were designed for businesses to connect remote offices with their main networks. They were not meant for consumer privacy.
If you want privacy on the Internet, use Tor. It’s free, open source, and above all – it’s trustless. Keep your VPN for Netflix.

Credits
Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fai..

JavaScript will probably ruin your life. Disable it, block it, and stay safe from the most common vector of malware infection.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Sources
Text tutorial on how to disable JavaScript on Chromium browsers: https://www.howtogeek.com/663569/how-to-disable-and-enable-javascript-on-google-chrome/
Tor Browser security settings: https://tb-manual.torproject.org/ga/security-settings/

The following browser add-ons can be found in your browser's extension store (i.e. Chrome or Mozilla):
NoScript: https://noscript.net/
uBlock Origin: https://github.com/gorhill/uBlock

Official documentation on JavaScript by Mozilla
https://developer.mozilla.org/en-US/docs/Web/JavaScript
https://developer.mozilla.org/en-US/docs/Learn/JavaScript/First_steps/What_is_JavaScript

General information about JavaScript
https://w3techs.com/technologies/details/cp-javascript/
History of JS http://speakingjs.com/es5/ch04.html
Web 2.0 https://www.britannica.com/topic/Web-20
https://www.oreilly.com/pub/a//web2/archive/what-is-web-20.html

JavaScript security report 2020
https://go.talasecurity.io/global-data-risk-state-web-report-2020?

Examples of exploits delivered by JavaScript
https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/
https://www.zdnet.com/article/an-insecure-mess-how-flawed-javascript-is-turning-web-into-a-hackers-playground/
https://www.techrepublic.com/article/major-websites-plagued-by-lack-of-effective-security-against-javascript-vulnerabilities/
Cross-site scripting: https://www.cloudflare.com/learning/security/threats/cross-site-scripting/
https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/
htt..

#shorts How your phone tracks your location and how you can stop it. Full video here: https://youtu.be/GMIY4J8jAUc
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Monero:
84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Ethereum:
0x6aD936198f8758279C2C153f84C379a35865FE0F

Sources:

GPS
https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html
https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy

Cell tower triangulation
https://www.101computing.net/cell-phone-trilateration-algorithm/
https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy
https://www.ghacks.net/2018/08/13/google-may-track-your-location-even-if-you-disable-location-tracking/
https://apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not
https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/

WiFi positioning and radio triangulation
https://transition.fcc.gov/pshs/911/Apps%20Wrkshp%202015/911_Help_SMS_WhitePaper0515.pdf

Bluetooth beacons and surveillance
https://www.privacyinternational.org/explainer/3536/bluetooth-tracking-and-covid-19-tech-primer
https://medium.com/supplyframe-hardware/bluetooth-indoor-positioning-and-asset-tracking-solutions-8c78cae0a03
https://www.nytimes.com/interactive/2019/06/14/opinion/bluetooth-wireless-tracking-privacy.html
https://www.wsj.com/articles/coronavirus-tracking-apps-raise-questions-about-bluetooth-security-11588239000

Ultrasonic cross-device tracking
https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/
https://www.zdnet.com/article/hundreds-of-apps-are-using-ultrasonic-sounds-to-track-your-ad-habits/
https://techcrunch.com/2014/07/24/silverpush-audio-beacon..

SHOW MORE

Created 4 years, 8 months ago.

146 videos

Category Science & Technology

Uncovering the wrongdoing of governments and corporations irrespective of the political tribe they claim to allign with. When corporate monopolies abuse their dominance and governments fail their electorates, come to this channel to learn how you can guard your digital rights on your own.

If you like what I do on this channel, consider supporting me through a crypto-currency of your choice. Help me build the first crypto-funded channel on YouTube!

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Dash
XyBDwdFQuZNCnThkeeg1FRFks65hKMkTux

Litecoin
LcHJvrovBfqDBQyfHcxxBErGM8qq5zho8s

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

https://twitter.com/The_HatedOne_
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne