The Hated One

Facebook's cryptocurrency Libra rides the decentralization bandwagon when in reality it might become the ultimate step towards wealth consolidation and information control of the global Facebook empire.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

You can donate completely anonymously with Monero. Learn more here: https://www.getmonero.org/

Facebook is going to launch its own cryptocurrency with the potential of turning the social network into the largest payment service in the world.
Zuckerberg promises strong privacy protections and claims the new digital currency will be independent of the Facebook company.
The new coin called Libra is planned to launch in early 2020, and to market it, Facebook is capitalizing on the growing popularity of blockchain cryptocurrencies.

Sources

Libra White Paper & official documentation
https://libra.org/en-US/white-paper/
https://libra.org/en-US/about-currency-reserve/
https://libra.org/en-US/association-council-principles/
https://libra.org/en-us/becoming-founding-member/
https://libra.org/en-US/permissionless-blockchain/#overview
https://developers.libra.org/docs/life-of-a-transaction
https://developers.libra.org/docs/libra-core-overview
https://developers.libra.org/docs/libra-protocol
https://developers.libra.org/docs/the-libra-blockchain-paper https://developers.libra.org/docs/assets/papers/the-libra-blockchain.pdf

News coverage of Libra
https://www.theguardian.com/technology/2019/may/24/facebook-plans-to-launch-globalcoin-cryptocurrency-in-2020
https://edition.cnn.com/2019/06/18/tech/facebook-libra-cryptocurrency/index.html
https://www.theverge.com/2019/6/18/18683867/facebook-cryptocurrency-libra-calibra-trust-banking
https://www.theverge.com/2019/6/26/18716326/facebook-libra-cryptocurrency-blockchain-irs-starbucks
https://www.nytimes.com/2019/06/19/opin..

In today's talk with David from Safing.io we are discussing Open Source software development as a business model and why opening source code is important and even beneficial for a business and a society.

Follow David and Safing

safing.io
stamp.community
twitter.com/davegson

Timestamps [to be updated]:

00:00 Hi
01:10 David's introduction and Safing products
08:32 How are you making money?
11:04 Business model
16:00 Why and what is Open Source?
40:00 Ideology of Open Source and Intellectual Property
59:00 Artificial Intelligence and Open Source

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

The United Kingdom, branded as the Énemy of the Internet, is on the path to become the world's first democracy turned into a digital dictatorship. This is how surveillance and censorship is changing the UK.

You can push back against the Online Hárms White Paper by giving your response at https://dcms.eu.qualtrics.com/jfe/form/SV_5nm7sPoxilSoTg9 by July 1 2019.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources
Online Harms White Paper full text https://www.gov.uk/government/consultations/online-harms-white-paper

News coverage & blogs
https://www.theguardian.com/technology/2019/apr/04/online-harms-white-paper-regulation-without-killing-innovation
https://www.wired.co.uk/article/online-harms-white-paper-uk-analysis
https://blogs.lse.ac.uk/mediapolicyproject/2019/04/10/the-online-harms-white-paper-its-approach-to-disinformation-and-the-challenges-of-regulation/
https://www.theguardian.com/commentisfree/2019/apr/14/white-paper-online-harms-global-first-needed-tech-industry-dcms-google-facebook

Enemies of the Internet by Reporters without Borders
https://rsf.org/sites/default/files/2014-rsf-rapport-enemies-of-the-internet.pdf
https://www.aljazeera.com/indepth/opinion/2012/04/201241373429356249.html

David Cameron calls to block social media
https://www.theguardian.com/uk/2011/aug/11/cameron-call-social-media-clampdown
https://www.theguardian.com/world/2011/jan/26/egypt-blocks-social-media-websites
https://news.yahoo.com/blogs/cutline/british-pm-david-cameron-considers-ban-twitter-facebook-150616849.html

Super-injunctions and libel laws
https://www.zdnet.com/article/google-facebook-twitter-warned-in-privacy-report/
https://www.zdnet.com/article/facebook-twitter-libel-claims-double-celebrities-still-prefer-super-injunctions/
https://www.zdnet.com/article/tech-injunction-gags-twitter-facebook-users-why-super-injunctions-onl..

Nimses is a new social media app promoted even by Pewdiepie. Its main selling point is that it rewards users who download the app with nims, a virtual currency. But the price of your privacy and the false promises of Nimses don't make it such a lucrative deal.

Support my channel by signing up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout.

What is Nimses?
Nimses would have you believe it’s an American company. But make no mistake about it. It’s a Ukrainian social media platform that is trying to penetrate Western markets. Nimses is incorporated in Delaware, which is ranked among the best and most convenient states to incorporate your company in the US if you are a foreign entity.

Nimses’ strategy to win against the dominance of the Facebook/Instagram empire is trying to lure users in by offering them a virtual currency for their time spent on the platform.

Nimses generates one nim every minute of your life on the platform. This virtual currency is centrally controlled by the company and its value doesn’t seem to be backed by anything other than what the company currently says.

Sources
https://nimses.com/privacy/
https://temples.nimses.com/
https://nimses.com/en/nimonomy
https://nimses.com/en/whitepaper
https://data.nimses.com/?lang=en
https://nimses.com/en/cookie-policy/

https://www.reddit.com/r/PewdiepieSubmissions/comments/bxzvso/not_a_meme_but_saw_lots_of_people_commenting_this/

Social media surveillance and privacy
https://theoutline.com/post/5380/targeted-ad-creepy-surveillance-facebook-instagram-google-listening-not-alone?zd=1&zi=ucbo5ff2
https://techcrunch.com/2018/09/27/yes-facebook-is-using-your-2fa-phone-number-to-target-you-with-ads/
https://techcrunch.com/2016/08/25/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out/
https://gizmodo.com/facebook-is-giving-advertisers-access-to-your-shadow-co-1828476051
https://www.propublica.org/article/facebook-doesnt-tell-u..

Facial recognition advertising as depicted in Minority Report is coming to your local stores sooner than you thought. The technology is becoming so mainstream it will become a part of the new social contract.

NordVPN affiliate link: https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' for 75% discount

Several US retailers, including Walgreens and Kroger, are piloting facial recognition advertising in physical stores. The goal is to use all available information from the cameras to target customers with relevant ads in a similar way online advertising targets Internet users.

Apps on your phone can use your high definition selfie camera to track your emotional expressions of your face as you listen to music, and suggest you playlists that correspond to your mood. A social media platform can track your face as you are typing that comment or text with your friends, and suggest you mood-specific ads.

All major technology companies are heavily investing into the development of facial recognition, including Google, Apple, Amazon, Samsung or Microsoft. With their massive reach on the market, it will soon become extremely difficult for you to avoid being identified every step of your way if you want to be a functioning individual.

Sources:

Amazon Facial Rekognition bias
https://www.nytimes.com/2019/04/03/technology/amazon-facial-recognition-technology.html
https://www.reuters.com/article/us-amazon-com-facial-recognition/amazons-face-id-tool-mismatched-28-members-of-congress-to-mug-shots-aclu-idUSKBN1KG1K7

Facial recognition targeted advertising
https://www.cbc.ca/news/technology/cameras-targeted-advertising-1.5107784
https://www.cbc.ca/news/technology/facial-recognition-technology-concerns-1.4826931
https://www.wsj.com/articles/walgreens-tests-digital-cooler-doors-with-cameras-to-target-you-with-ads-11547206200
https://www.theguardian.com/media/pda/2010/sep/27/advertising-billboards-facial-recognition-japan
https://www.targetmarketingmag.com/arti..

Microsoft _NSAKEY is a signing key found in Microsoft's CryptoAPI since Windows 95. Many claimed this was the ultimate backdoor for the National Security Agency. But is this a hoax, or is this a real backdoor in Microsoft Windows?

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

A British researcher discovered that Microsoft was cryptographically signing its CryptoAPI with two keys. This means two separate entities could approve software running inside Windows. One of those entities was Microsoft. The identity of the other one remained a mystery.

But then Microsoft shipped a Service Pack 5 for WindowsNT4. Somebody down the chain of command at Microsoft forgot to remove information revealing the true identity of both of the signing keys. Chief security scientist at Ontario-based Cryptonym Andrew Fernandes found the names of the two keys. One was simply called “_KEY”. And the other was “_NSAKEY”.

Sources
News coverage
https://www.wired.com/1999/09/ms-denies-windows-spy-key/
https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/biztech/articles/04soft.html
https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/cyber/articles/04soft-side.html
http://us.cnn.com/TECH/computing/9909/13/backdoor.idg/index.html
http://edition.cnn.com/TECH/computing/9909/03/windows.nsa.02/
http://news.bbc.co.uk/2/hi/sci/tech/437967.stm
https://www.computerworld.com/article/2521889/microsoft-denies-it-built--backdoor--in-windows-7.html

Security experts & opinions
https://web.archive.org/web/20000617163417/http://www.cryptonym.com/hottopics/msft-nsa/msft-nsa.html
https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI
https://www.heise.de/tp/features/How-NSA-access-was-built-into-Windows-3444341.html
http://www.stat.rice.edu/~dobelman/kstorm.txt
https://cryptome.org/nsakey-ms..

The indictment of Julián Assánge is going to change the world forever. After the árrest of the founder of WikiLeáks, the fate of journalism and free press is called into question.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

The arrest of WikiLeáks founder Julian Assánge is going to leave a mark in the history books. Assánge has a complicated personality. But the story of WikiLeáks throughout the years challenges the very foundations of what it means to live in a Western society. On April 11th, Assánge was arrested by London Metropolitan Police.

But what makes history is neither of these cases. It’s his subsequent arrest at a central police station in London by British authorities on behalf of the United States.

The US arrest came with an indictment accusing Assange of conspiracy to commit computer intrusion with former US military intelligence analyst Chelsea Manning. The federal government is now seeking to extradite Assange into the United State where he could face up to five years of prison time for this single charge.

The indictment counts four main acts as part of the conspiracy:
1. The communication between Assange and Manning using Jabber instant messaging service where they agreed to acquire and disseminate the classified documents and crack the password on one of the DoD computers.
2. The effort Assange took to conceal Manning as the source of the leak.The indictment counts four main acts as part of the conspiracy:
3. That Assange encouraged Manning to provide more information from the government systems.
4. And the fact that Assange and Manning used a cloud drop box to transmit the leaked documents.

Sources
Indictment
https://www.justice.gov/usao-edva/pr/wikileaks-founder-charged-computer-hacking-conspiracy
https://www.justice.gov/usao-edva/press-release/file/..

Intel embeds Management Engine into all of its computers since 2008. Intel Management Engine has been criticized for its security risks and has been called a backdoor with rootkit possibilities by many security experts and researchers.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

This is Intel Management Engine. A subsystem microprocessor that’s operating inside every Intel CPU platform made from 2008 onward.
Despite its name and some basic functions, we don’t know anything about what Intel Management really does.

What we do know is that this microcontroller works completely independently from the main CPU. It can’t be manually removed or disabled. Even if the main computer is powered off, as long as it is plugged in to the mains or the battery, IME will continue to run.
Intel Management Engine is a computer within a computer. It is running it’s own operating system, called Minix, and is installed by default on every modern computer with an Intel CPU. This probably makes Minix the most widely used operating system in the world. But unlike Windows, Mac OS or Linux, Minix is completely outside of user control. It cannot be scanned by an antivirus or malware detection software. It can bypass any firewall configuration and has a dedicated network connection that can circumvent the main CPU and the main operating system.

Sources and further reading
https://www.slideshare.net/codeblue_jp/igor-skochinsky-enpub/17
https://www.howtogeek.com/334013/intel-management-engine-explained-the-tiny-computer-inside-your-cpu/

Intel Management Engine security problems
https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html
https://www.csoonline.com/article/3220476/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html
https://www.techrepublic.com/blog/it-security/researc..

Amazon is a monopoly in dozens of different markets because Jeff Bezos wants it to. In this criticism of Amazon, we analyze of Jeff Bezos business model threatens the very existence of free market.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Amazon is the second biggest corporation in the world and one of the only two companies to pass the $1 trillion mark. But during more than two decades of existence, Amazon has struggled to make any profit.

It has everything to do with the business model of Jeff Bezos, the CEO of Amazon. In his own words, Bezos believes in shareholder supremacy, which means everything is justified as long as the share value is growing.

Jeff Bezos pushed Amazon great lengths to claim this dominance. From undercutting competitors with predatory pricing, through forcing itself into their business, to vertically integrating into strategic markets across the business line, Amazon is on track to gradually take over every aspect of e-commerce and to control and decide what we shop and what is allowed to be sold.

Sources
Amazon profits and revenue chart https://www.wsj.com/articles/amazon-reports-surge-in-profit-1461874333 and http://www.thestreet.com/story/875924/1/amazon-losses-widen-but-shares-rise-after-hours.html
Amazon earnings https://venturebeat.com/2019/01/31/amazon-earnings-q4-2018/ and https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
Amazon Prime and stocks https://www.bloomberg.com/news/articles/2010-11-24/whats-in-amazons-box-instant-gratification
Amazon e-commerce share https://techcrunch.com/2018/07/13/amazons-share-of-the-us-e-commerce-market-is-now-49-or-5-of-all-retail-spend/
Amazon Web Services statistics https://www.statista.com/topics/4418/amazon-web-services/
Jeff Bezos net worth https://www.forbes.com/profile/jeff-bezos/
More than 90% marke..

A former mobile game developer and an expert at centralized web technology talks about how apps and companies track and handle your personal data.

Ask David questions on the The Hated One subreddit Q&A thread: https://www.reddit.com/r/thehatedone/comments/b6rtxi/former_mobile_game_developer_discloses_hidden/
Use his reddit handle u/davegson to make sure he gets notified about your comments.
Or reach him on Twitter https://twitter.com/davegson
He is also a co-founder of safing.io.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Firefox is a very powerful browser and in this 2019 tutorial you learn how to access essential privacy and security settings to protect your online privacy.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

More info:
https://www.privacytools.io/
https://wiki.mozilla.org/Privacy/Privacy_Task_Force/firefox_about_config_privacy_tweeks

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Getting maximum privacy and security will require to go through a plethora of settings Firefox allows you to change, as well as installing a selection of privacy enhancing extensions that will protect your privacy even more.

Go to “Content blocking” and select “strict blocking”.
Scroll down to History and choose “Use custom settings for history”. Check “Always use private browsing mode”.
If you are changing these settings on a Firefox you’ve been using for a while, you can easily clear all previously stored data in privacy – Cookies and Site Data and under History - “Clear History”. Select everything and set time range to Everything.
Under Address Bar, uncheck suggestions for Browsing history, Bookmarks and Open Tabs.
Under permissions, go to settings for Location, Camera, Microphone and Notifications and select “Block new requests asking to access” each of these parameters.
By default, Mozilla will collect some information from your Firefox. This is not good. But it’s easy to turn it off with a single click.
Blocking dangerous and deceptive content might be useful for secure browsing, but this service is provided by Google Safe Browsing, which you actually don’t see here. So I choose to not trust Google with my security.
Change your default search engine to duckduckgo and opt out o..

Apple's infallible privacy grandstanding is a masterpiece of distinguishable marketing. For Apple privacy is a publicity stunt. It's a clever trick with words that lets Apple get away with the same invasive practices for which other companies eat the dirt.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Apple cleverly compares their practices with their seeming rivals like Google and Facebook. Because when it comes to the software Apple provides, they aren’t treating your data any differently than other software companies.

Companies that promise you strong privacy and security begin with preventing themselves from accessing your data. Apple doesn’t do that. Apple possesses keys to unlock your iCloud account, which is why phishing Apple employees is the number one tactic to break into people’s accounts.

iMessage promises end-to-end encryption, but its implementation is very poor when compared to other protocols like Signal. iMessage doesn’t provide any interface to verify authenticity of contacts people are communicating with and thus can inject keys that would enable Apple or law enforcement agencies to monitor your conversations in real time. iMessage doesn’t implement any way to obscure metadata and so all your contacts, IP addresses, time stamps, and the size and presence of attachments is open for surveillance.

Sources

Apple privacy hypocrisy due to censorship in China
https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html

Apple and government surveillance
https://theintercept.com/2014/09/22/apple-data/
http://appleinsider.com/articles/13/06/06/apple-reportedly-last-company-to-join-governments-prism-data-mining-program
https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-ce..

To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is the best approach to keep control of your data.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Important sources and software

Every piece of software recommended is listed here:
https://www.privacytools.io/
(more direct links will be added soon)

Techlore's Go Incognito tutorial series:
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO

How to be anonymous on the web
https://www.youtube.com/watch?v=_393maHbHWc

Master uBlock Origin in advanced mode
https://www.youtube.com/watch?v=2lisQQmWQkY

Privacy by compartmentalization is very simple. You will create virtual compartments where you concentrate carefully separated pools of data. Each compartment will revolve around a different sphere of your identity.

The more security you want, the stronger walls between your compartments you’ll build.

The first compartment is for your professional identity to separate your business email and work related activity from the rest of your online presence.

The second compartment is for your social media so that you keep those advertising giants away from your digital life outside of their platforms.

The third compartment is for your private identity where most of your light browsing, news reading, watching YouTube and making online purchases happen.

When you become familiar with this practice, you can build more compartments.

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the Uni..

Why privacy matters if you have nothing to hide? Because privacy from you people who want to exploit you for their own benefit. You potentially spend more money on products than others and are excluded from housing, credit or employment market places just because advertisers use information about you that puts in a disadvantage. Privacy gives you freedom from this kind of speculation and exploitation.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources:
Exploitation of weak privacy protections:
https://www.washingtonpost.com/posteverything/wp/2014/11/03/if-you-use-a-mac-or-an-android-e-commerce-sites-may-be-charging-you-more/?noredirect=on
Linus Tech Tips on cheaper flights https://www.youtube.com/watch?v=Utsnt6GFrKo
https://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=1&hp=&pagewanted=all
https://www.businessinsider.com/the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy-2012-2?international=true&r=US&IR=T
https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/

Facebook empire
https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html
https://www.nytimes.com/2018/12/18/technology/facebook-privacy.html

Abusive cases of privacy invasion
https://www.maryferrell.org/showDoc.html?docId=1159&search=King#relPageId=137
https://www.maryferrell.org/showDoc.html?docId=1158&search=NAACP#relPageId=25
https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x
https://techcrunch.com/2012/04/23/facebooks-amended-s-1-500-million-mobile..

Criticism of copyright laws and patents is a taboo but it shouldn't be. With initially good intentions, copyright and patent laws are concentrating more and more profit and power within the hands of right holders, which in most cases is big corporations, labels and studios. It's dangerous to free speech and privacy in the Age of the Internet.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Copyright is unlike any other right. It gives the class of authors supreme position over the rest of society, while treating everyone else as criminals when they want to exercise their free speech and property rights to the full extent.

Copyright is the exclusive right to reproduce and distribute someone’s work. It’s the right to make copies of a protected work, hence copy-right. Patents are government protections on improvements and inventions in devices and processes.

In reality, copyrights and patents are monopolies. Monopolies where only the right holders are allowed to profit from the resources. It’s a monopoly because the more copyrights and patents the government protects, the more restricted people are in exercising their property rights.

Imagine you and your neighbor both mine stone on your respective properties. Then your neighbor decides to build a sculpture out of his stone. In the world of copyright, the very pattern of this sculpture is now protected under the law. That means no one else is allowed to take full use of their property and make the same sculpture of their own. Since you also own stone, you are allowed to do everything except for making that sculpture.
If your neighbor was to start mining stone with a pick-axe, they could patent this new production method and for 20 years, you would not be allowed to use a pick-axe to mine your stone on your property.

The more people make copyri..

This is not a usual from me today. An important update on my latest video that was not only demonetized after a manual review, but it was also removed from discovery and recommendations on YouTube. It now receives almost no views, when it used to get hundreds per hour.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Source on the YouTube algorithm and censorship https://www.youtube.com/watch?v=n3H8D2LrLHc

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Australia just declared end-to-end encryption illegal by requiring companies to provide access to plain text communications through a new Assistance and Access Bill that passed just before Christmas. This is a dangerous attack on the Internet freedom.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

The Assistance and Access Bill, known as the Australian ban on encryption, introduces three new technical notices the Australian government can use to leverage communication providers to yield data of their users even if they implement strong cryptographic protections.
• technical assistance notice,
• technical capability notice, and
• technical assistance request
Both technical assistance notice and technical capability notice demand mandatory cooperation from providers.
Technical assistance request is a voluntary version of the both mandatory notices combined but with absolutely no restrictions or oversight.

Sources:
Draft proposal https://assets.documentcloud.org/documents/4756739/The-Assistance-Access-Bill-2018.pdf

Explanatory bill https://assets.documentcloud.org/documents/4756738/Explanatory-Document.pdf

Why backdoor is dangerous: https://cs.stanford.edu/people/eroberts/cs181/projects/ethics-of-surveillance/tech_encryptionbackdoors.html

News coverage
https://arstechnica.com/tech-policy/2018/08/australian-govt-wants-to-force-tech-firms-to-weaken-crypto/
https://phys.org/news/2018-12-australia-anti-encryption-law-passage.html
https://arstechnica.com/tech-policy/2018/12/australia-passes-new-law-to-thwart-strong-encryption/
https://arstechnica.com/information-technology/2015/12/what-the-government-shouldve-learned-about-backdoors-from-the-clipper-chip/
https://www.theverge.com/2018/12/7/18130806/australia-access-and-assistance-encryption-bill-2018-facebook-google-apple-respond
https..

As the most popular encrypted email provider, ProtonMail has been criticized for false security promises and weak guarantees of its end-to-end encryption infrastructure. Can be ProtonMail's marketing of their Swiss-based email service justified? The results might SHOCK you!

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

These are encrypted email providers that I would recommend
Free and paid plans
https://www.protonmail.ch/
https://www.tutanota.com/
https://www.mailfence.com/
Only paid
https://www.mailbox.org/
https://www.posteo.de/

An Analysis of the ProtonMail Cryptographic Architecture by Nadim Kobeissi https://eprint.iacr.org/2018/1121
Liveoverflow End-to-End Encryption in the Browser Impossible? - ProtonMail https://www.youtube.com/watch?v=DM1tPmxGY7Y

The Reddit debate and Protonmail's response
https://www.reddit.com/r/ProtonMail/comments/9yqxkh/an_analysis_of_the_protonmail_cryptographic/ea3g0hm/
ProtonMail Threat Model https://protonmail.com/blog/protonmail-threat-model/
Why is ProtonMail more secure than Gmail https://protonmail.com/blog/protonmail-vs-gmail-security/

The problem with ProtonMail’s webmail service is that each time you go to sign in to their website, you have to completely trust ProtonMail that the javascript that your browser runs is correctly implementing PGP and is not trying to steal your private keys and read your messages. This problem is limited with smartphone apps, because each new version of an app has to be signed by the author and the platform – which in this case is ProtonMail and Google Play Store or Apple App Store. With these apps, users can verify whether they received the same binary for a particular version as everyone else.
Because of the differences in the levels of trust, webmail services are objectively less secure than desktop and smartphone apps...

Watch Google CEO Sundar Pichai get grilled by Representative Jordan over alleged election manipulation. This is a highlight of the congressional hearing before the U.S. House of Representatives' Judiciary Committee on Tuesday December 11th 2018.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

This excerpt was taken from Global News coverage of the Google CEO testimony https://www.youtube.com/watch?v=uM5IHHCEb3k

This was probably the only instance during the entire 3 and a half hour long congressional testimony were Google CEO was really pressed on the issue. While Google has a long record of scandals ranging from privacy and data collection, anti-competitive behavior, search engine manipulation, political lobbying, news censorship and anti-trust cases, it was election manipulation that Representative Jordan chose to tackle Sundar Pichai on. Quite successfully, but is that going to mean anything going forward?

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Some people think privacy doesn't matter as long as you have nothing to hide. But online privacy is a form free speech. Despite government efforts, encryption is not a munition and source code is speech protected under the first amendment.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66% on the 2-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

In the 1990s, the government fiercely attacked online privacy by classifying encryption software as a munition, and regulating it as biological weapons or firearms. Exporting encryption was heavily restricted, required a government license, and made its implementation on the Internet virtually impossible.

In 1991 Phil Zimmerman developed his first version of an encryption program called Pretty Good Privacy designed to secure email communications, files or even entire disks. Two years later, Zimmerman was under criminal investigation for exporting munitions without a license and was barred from sharing his software on the Internet. Zimmerman published the whole PGP source code in a hardcover book distributed by MIT Press. In a digital form, PGP was an outlawed piece of software. But printed in a book, it was free speech protected by the Constitution.

In 1994, a graduate student at the University of California was developing an encryption algorithm that he intended to publish, distribute and share openly on public lectures and on the Internet. However, the US Department of State classified his cryptographic software under the Arms Export Control Act and the International Traffic in Arms Regulations. After several years of legal battles, the court eventually decided that Bernstein’s source code is protected by the Constitution. Th..

Calls for regulating social media and online platforms as public utilities attract critics both on the left and the right. But would public utility regulation actually help freedom of speech on the Internet?

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Companies like Google, Facebook, Microsoft and Apple do enjoy very dominant positions and they do abuse their power. Facebook and Twitter have been recently purging hundreds of alternative and independent media with millions of followers from their platforms. Google has been long extremely anti-competitive as it’s been artificially giving its own services higher ranks in the search results than their competition. And they are not wrong. We allowed these corporations to monitor our everyday activities, study our psychologies and develop tools and products that are most responsive to our emotional states.

But no matter how big they are, positions of none of these Internet giants are locked in. Their services are not tied to any geographical location. The Internet market is the whole globe. Anyone from anywhere in the world from almost any background can compete with them.

If you don’t like centralized corporations offering you centralized services, is it reasonable to expect from a centralized government to bring about any meaningful change? Maybe it's time to stop using these services and switch to alternatives.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources
Calls for regulations and classifying social media as public utilities
https://arstechnica.com/tech-policy/2018/11/newly-elected-republican-senator-could-be-googles-fiercest-critic/
https://arstechnica.com/tech-policy/2017/11/conservative-backlash-..

Apple, Google, Microsoft and Yahoo all reserve the right to read your emails not just through machines, but by their employees too. Contents of your emails are for sale and scrutiny by poorly vetted actors, unless you start using end-to-end encryption and switch to secure email providers like ProtonMail, Tutanota or Posteo.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Alternative emails:
https://protonmail.com/
https://tutanota.com/
https://posteo.de/en
Other encrypted email providers https://www.privacytools.io/

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

In 2007, the US National Security Agency approached Yahoo with an order to gain direct access to its data centers and record and collect all information passing through in a decrypted form. Seven years later, the US intelligence came to Yahoo with a new request – to scan all of their users emails in real time on the governments behalf. Yahoo now reserves the right to read contents of your emails for any purposes – including research and targeted advertising.

Google has been long implementing the policy to read emails of Gmail users. In some cases, Google employees would be allowed to read private emails. Google lets hundreds of third-party developers access inboxes of Gmail users, read their contents, and even share that data with their partners.

Apple has started using their customers’ call and email metadata to assign devices “trust scores”, in what they claim to be measures against fraud.

Trusting companies with invasive privacy policies isn’t the only option you have. If you don’t want your private conversations to be exposed to advertisers and manipulative marketing campaigns you might disappro..

Most VPN providers will tell you their virtual private network will make you anonymous. But anonymous VPNs don't exist. Should you use a VPN if you expect privacy and anonymity on the web? How to use a VPN if you want to protect your online privacy? Let's find out.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Today I take on the best of the best VPN providers that boast with top-level encryption and security protocols that are meant to give you privacy on the Internet, or even make you anonymous. But is that true?

VPNs are supposed to secure your traffic by sending it through an encrypted tunnel and give you a different IP address so that your true IP address is not revealed to the websites and services you are connecting to.

Your VPN provider can still see everything your Internet Service Provider can see: all you traffic, logs, devices, browser history… all that prevents your VPN provider from abusing this information against you is their promise. Virtual private networks offer privacy by policy, not privacy by design – that is nothing technologically prevents your VPN from monitoring your traffic and do with that whatever they want – sell it, throttle it, or censor it.

No VPN service is anonymous. Most of them require your email address upon sign-up and most payment methods will reveal your identity directly, unless they accept cryptocurrency, which is only pseudonymous, or cash, which can be truly anonymous. But cash is very rarely accepted, and even then, your VPN provider always knows your real IP address. So yes, they change your IP address, by they are also your single point of failure, so if the server or the whole VPN is compromised, all traffic leads directly to your IP address and your devices.

Some sources:

https://www.theatlantic.com/technology/archive/2011/09/lulzsec-hacker-exposed-service-he-thought..

Google censorship has been a rising issue over the past years. Accusations about Google censoring news are surfacing more and more. Let's compare Google search results with Bing, Yahoo and DuckDuckGo to find out if we can see instances of Google manipulating search results.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

My methodology
To evaluate Google’s search results, I compared them with Bing, Yahoo, DuckDuckGo and Startpage. To get as anonymous results as possible, I used separate Firefox profiles for Google, DuckDuckGo and Bing. I turned off telemetry and Google safe browsing feature, and I set Firefox to never remember browser history. This should get rid of most of Google trackers planted on the device, which could interfere with the results. To pull Yahoo results, I used Vivaldi with similar settings and for Startpage I used Tor Browser. Startpage lists Google results but more privately and without Google’s trackers, and I only use it to double check whether I really get non-personalized Google results.

I was not logged in to any account and I didn’t have any other browser open at the time of recording these search experiments.
For each search engine, we are going to compare results from the first two pages only, as this is where the vast majority of clicks happen.
For each search on Google, I connected from a different IP address in the United States and I restarted Firefox to wipe all browser data. This was done using NordVPN servers, to make sure Google can’t track my real location and personalize my results that way. I also used different US-based IP addresses for Bing, Yahoo and DuckDuckGo, and I restarted the brow..

So you want to stop Google from spying on you. But how do you do that? Learn how you can stop Google from tracking your location, browsing history, search queries and find out more about Google alternatives.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 66%!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

In this video, we'll go through how to change your Google and Android privacy settings. We install some essential privacy tools like Firefox, uBlock Origin, Cookie Autodelete and DecentralEyes to block Google from tracking our browsing history. We will show what Google alternatives to use to stop Google from spying on you like DuckDuckGo, Qwant, Startpage, Protonmail, Tutanota, Nextcloud, Mega.nz, Cryptomator, Brave Browser, Tor Browser and more.

Google tracks your every move on the Internet and in the real world, even if you don’t use Google services.
We are going to learn how to stop all of Google spying in its entirety. It is possible to stop Google tracking without disconnecting from the Internet. We’re going to go through Google privacy settings and we will learn how to use some simple tools to block all known Google trackers.

uBlock Origin rulesets - JUST COPY PASTE to My Rules in uBlock Origin settings
To block all Google trackers
* admob.com * block
* adsensecustomsearchads.com * block
* adwords.com * block
* doubleclick.net * block
* fonts.googleapis.com * block
* google-analytics.com * block
* google.com * block
* googleadservices.com * block
* googleapis.com * block
* googlesyndication.com * block
* googletagmanager.com * block
* googletagservices.com * block
* googletraveladservices.com * block
* googleusercontent.com * block
* gstatic.com * block
* urchin.com * block..

SHOW MORE

Created 1 year, 10 months ago.

58 videos

CategoryScience & Technology

Uncovering the wrongdoing of governments and corporations irrespective of the political tribe they claim to allign with. When corporate monopolies abuse their dominance and governments fail their electorates, come to this channel to learn how you can guard your digital rights on your own.

If you like what I do on this channel, consider supporting me through a crypto-currency of your choice. Help me build the first crypto-funded channel on YouTube!

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Dash
XyBDwdFQuZNCnThkeeg1FRFks65hKMkTux

Litecoin
LcHJvrovBfqDBQyfHcxxBErGM8qq5zho8s

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

https://twitter.com/The_HatedOne_
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne