The Hated One

Apple, Facebook, Google and Amazon are under investigation for anti-competitive behavior. However, the government that's investigating them is behind their very monopolization schemes they seek to stop.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

The Federal Trade Commission and the Department of Justice are investigating Apple, Facebook, Google and Amazon with an army of 50 attorneys general for their anti-competitive behavior and monopolizing their market positions.

The investigators are looking to find evidence that the big tech is conspiring to monopolize their market dominance. The question isn’t whether they have monopoly market shares, but whether they engage in practices that could lead them to become artificial monopolies.

This could lead to the greatest settlement fines in U.S. antitrust history or could even break up the Big Tech monopolies. But the real solution is in addressing the real root of the problem - monopolization of copyright and patented software.

Sources/references
[1] https://www.nytimes.com/2019/01/11/arts/fortnite-floss-dance-lawsuits.html
[2] https://www.yahoo.com/lifestyle/every-kid-dance-called-floss-heres-16-year-old-invented-225342533.html
[3] https://arstechnica.com/tech-policy/2019/09/congress-wants-facebook-google-apple-and-amazon-emails-as-probe-heats-up/
[4] https://arstechnica.com/tech-policy/2019/09/50-states-and-territories-launch-massive-joint-probe-into-google/
[5] https://judiciary.house.gov/story-type/letter/competition-digital-markets-document-request-91319
[6] https://medium.com/housejudiciary/house-antitrust-subcommittee-issues-document-requests-as-part-of-digital-markets-investigation-a07a683cf7e1
[7] https://www.valuewalk.com/2019/09/facebook-acquisitions-list/
[8] https://techcrunch.com/2013/02/28/facebook-acquires-atlas/
[9] http://blog.frie..

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

The Department of Justice is suing the NSA whistleblower and Macmillan Publishers for Snowden’s bestselling memoir Permanent Record. They want to seize all royalties not just from the book, but also from all the speeches that Snowden gave to keep himself alive.

The pre-publication review is a requirement to hand over to relevant government agencies any material former employees intend to talk about publicly or to anyone who is not authorized. The government has the right to reject or redact the publication in any way it chooses without giving any sensible explanation why. Failing to submit a publication for a review gives the government the right to seize all revenue generated from the forbidden material.

Sources:
[1] https://arstechnica.com/wp-content/uploads/2019/09/1-main.pdf
[1b] https://www.wired.com/story/after-six-years-in-exile-edward-snowden-explains-himself/
[2] https://arstechnica.com/tech-policy/2019/09/feds-seek-to-seize-all-profits-from-snowdens-book-over-nda-violation/
[3] https://www.aclu.org/press-releases/aclu-comment-edward-snowden-lawsuit
[4] https://www.aclu.org/press-releases/aclu-and-knight-institute-challenge-constitutionality-far-reaching-government
[5] https://www.vice.com/en_us/article/bjwvea/the-us-government-is-suing-edward-snowden
[6] https://www.nytimes.com/2012/04/21/us/judge-rules-on-profits-from-ishmael-jones-cia-book.html
[7,8] https://www.theguardian.com/world/2014/may/22/pentagon-report-snowden-leaks-national-security
[9] https://www.nytimes.com/2016/07/06/us/politics/hillary-clinton-fbi-email-comey.html
[10] https://www.nytimes.com/2016/05/26/us/politics/state-department-hillary-clinton-emails.html
[11] https://www.nytimes.com/2016/05/26/us/politics/state-department-hillary-clinton-emails.html
[12] https://www...

For over two years, 14 critical zero-day vulnerabilities in Apple's iOS have been weaponized into 5 privilege-escalating zero-click exploit chains that have remotely and completely taken over hundreds of thousands of iPhones. Apple's response? Not a big deal. This was just "narrow" "targeted" campaign.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

uBlock Origin tutorial: https://www.youtube.com/watch?v=2lisQQmWQkY

The exploits have been in some way used from at least September 2016 and the attackers were supporting their exploit chains since at least iOS 10.0.1 until 12.1.4. Infected users would immediately have all of their data from their devices uploaded to remote servers and updates sent every 60 seconds.

The data collected would include location, device model, keychain, name and serial number, phone number, contacts, messages, attachments, notes, list of installed apps, recordings, photos, files, call history, passwords and container directories of every app on the device.

The implant had a hardcoded list of apps from which it always uploaded plain-text data to the attacker controlled servers. Among the selected apps were: Gmail, Facebook, Skype, Telegraph, WhatsApp and others.

Sources
[1] https://techcrunch.com/2019/08/29/google-iphone-secretly-hacked/
[2] https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
[3] https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html
[4] https://www.vice.com/en_us/article/7x584y/exploit-sellers-say-there-are-more-iphone-hacks-on-the-market-than-theyve-ever-seen
[5] https://arstechnica.com/information-technology/2019/08/armed-with-ios-0days-hackers-indiscriminately-infected-iphones-for-two-years/
[6] https://www.wired.com/story/ios-attack-watering-hole-project-zero/
[7] https://www.apple.com/newsroom/2019/..

The Battle of Seattle was a week-long series of mass protests against the Ministerial Conference of the World Trade Organization hosted in downtown Seattle between November 30 and December 3 1999. It was one of the largest anti-globalization demonstrations and one of the first acts of mobilization coordinated via the Internet.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Sources:
[1] https://www.britannica.com/event/Seattle-WTO-protests-of-1999
[2] https://www.theguardian.com/world/1999/dec/04/wto.johnvidal1
[3] https://www.washingtonpost.com/wp-srv/WPcap/1999-12/01/089r-120199-idx.html?noredirect=on
[4] https://www.britannica.com/topic/World-Trade-Organization
[5] http://news.bbc.co.uk/2/hi/special_report/1999/11/99/battle_for_free_trade/549794.stm
[6] https://www.theguardian.com/world/1999/dec/05/wto.globalisation
[7] https://edition.cnn.com/ALLPOLITICS/time/1999/12/06/wto.html
[8] https://www.theguardian.com/world/1999/dec/05/wto.globalisation1
[9] https://web.archive.org/web/20070604232550/http://scid.stanford.edu/pdf/credpr63.pdf
[10] https://edition.cnn.com/ALLPOLITICS/time/1999/12/06/free.trade.html
[11] https://www.washingtonpost.com/business/economy/outsourcings-net-effect-on-us-jobs-still-an-open-ended-question/2012/07/01/gJQAs1szGW_story.html?noredirect=on
[12] http://community.seattletimes.nwsource.com/archive/?
[13] https://depts.washington.edu/wtohist/day1.htm
[14] https://fair.org/extra/prattle-in-seattle/
[15] https://mapcruzin.com/globalwatch/paul_hawken.htm
[16] https://www.salon.com/1999/12/10/anarchists/
[17] http://content.lib.washington.edu/wtoweb/index.html
[18] https://www.cbc.ca/news/world/wto-protests-hit-seattle-in-the-pocketbook-1.245428
[19] http://community.seattletimes.nwsource.com/archive/?date=20040117&slug=wto17m
[20] https://depts.washington.edu/wtohist/Repercus..

Cashless society seems like an inevitable progression into an easier, faster and more convenient future. But this comes at a huge of cost of privacy and anonymity of cash payments, and freedom from control over people's funds.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

Limiting cash payments and banning high-value bank notes is becoming a global trend. In France the cap on cash transactions is only 1,000 euros and in Italy it’s at €2,999.99. The European Central Bank has recently stopped issuing €500-notes, although they will remain accepted as a legal tender indefinitely. India’s Prime Minister Modi banned the use of 500 and 1,000 rupee notes basically overnight. In Sweden, no high street bank in big cities handles cash anymore with 85% of the population banking online.

Sources:

[1] https://paleofuture.gizmodo.com/1970s-researchers-predicted-debit-cards-would-be-great-1699216972
[2] https://paleofuture.gizmodo.com/the-privacy-dangers-of-a-cashless-society-were-clear-ov-512266908
[3] https://paleofuture.gizmodo.com/the-privacy-dangers-of-a-cashless-society-were-clear-ov-512266908
[4] https://www.theguardian.com/australia-news/2018/may/08/australia-federal-budget-2018-cash-payment-crackdown-tax-evasion
[5] https://gizmodo.com/australia-bans-cash-for-all-purchases-over-7-500-start-1825946888
[6] https://coingeek.com/australian-bill-to-exclude-crypto-from-new-cash-payment-restrictions/
[7] https://www.theguardian.com/world/2016/feb/08/german-plan-prohibit-large-5000-cash-transactions-fierce-resistance
[8] https://www.bloomberg.com/news/articles/2016-05-04/ecb-decrees-slow-death-of-500-euro-note-in-fight-against-crime
[9] https://www.theguardian.com/world/2016/nov/08/india-withdraws-500-1000-rupee-notes-fight-corruption
[10] https://www.abc.net.au/news/2018-03-06/$100-note-could-be-dumped-to-starve-..

As Google prevented Tulsi Gabbard from running campaign ads on Google Search after her successful debate night, the reliability and credibility of moderation driven by machine-learning algorithms is put to question.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

On the night after the first Democratic debates, Tulsi Gabbard was the single most Google-searched candidate by far. However, Google suspended her advertising account for 6 hours and so drastically limited her ability to direct newcomers to her campaign website.

The classic argument goes that machine-learning algorithms are mathematical, and by their very nature, neutral and unbiased. In reality, algorithms reinforce biases they learn about from their training data.

These are the biases identified in the video that can negatively impact outcomes of machine-learning algorithms:
1. a) Incorporated biases from the training data
1. b) Bad training data
2. User-manipulated bias
3. Manual interference
4. Marginalizing minorities
5. Corporate (for profit/influence) bias

References:

[1] https://www.salon.com/2019/07/25/tulsi-gabbard-sues-google-for-50-million/
[2] https://thehill.com/policy/technology/454746-tulsi-gabbard-sues-google-over-censorship-claims
[3] https://www.theguardian.com/technology/2018/oct/16/facebook-political-activism-pages-inauthentic-behavior-censorship ; b) https://www.washingtontimes.com/news/2017/oct/23/internet-giants-show-power-to-shape-politics/
[4] https://gizmodo.com/former-facebook-workers-we-routinely-suppressed-conser-1775461006
[5] https://www.statista.com/statistics/216573/worldwide-market-share-of-search-engines/ b) https://www.omnicoreagency.com/facebook-statistics/
[6] https://techcrunch.com/2014/07/09/yelp-google-anti-trust/
[7] https://www.mtu.edu/magazine/2019-1/stories/algorithm-bias/
[8] https://www.ny..

Facebook's cryptocurrency Libra rides the decentralization bandwagon when in reality it might become the ultimate step towards wealth consolidation and information control of the global Facebook empire.

Support independent content by donating Monero or Bitcoin

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

You can donate completely anonymously with Monero. Learn more here: https://www.getmonero.org/

Facebook is going to launch its own cryptocurrency with the potential of turning the social network into the largest payment service in the world.
Zuckerberg promises strong privacy protections and claims the new digital currency will be independent of the Facebook company.
The new coin called Libra is planned to launch in early 2020, and to market it, Facebook is capitalizing on the growing popularity of blockchain cryptocurrencies.

Sources

Libra White Paper & official documentation
https://libra.org/en-US/white-paper/
https://libra.org/en-US/about-currency-reserve/
https://libra.org/en-US/association-council-principles/
https://libra.org/en-us/becoming-founding-member/
https://libra.org/en-US/permissionless-blockchain/#overview
https://developers.libra.org/docs/life-of-a-transaction
https://developers.libra.org/docs/libra-core-overview
https://developers.libra.org/docs/libra-protocol
https://developers.libra.org/docs/the-libra-blockchain-paper https://developers.libra.org/docs/assets/papers/the-libra-blockchain.pdf

News coverage of Libra
https://www.theguardian.com/technology/2019/may/24/facebook-plans-to-launch-globalcoin-cryptocurrency-in-2020
https://edition.cnn.com/2019/06/18/tech/facebook-libra-cryptocurrency/index.html
https://www.theverge.com/2019/6/18/18683867/facebook-cryptocurrency-libra-calibra-trust-banking
https://www.theverge.com/2019/6/26/18716326/facebook-libra-cryptocurrency-blockchain-irs-starbucks
https://www.nytimes.com/2019/06/19/opin..

In today's talk with David from Safing.io we are discussing Open Source software development as a business model and why opening source code is important and even beneficial for a business and a society.

Follow David and Safing

safing.io
stamp.community
twitter.com/davegson

Timestamps [to be updated]:

00:00 Hi
01:10 David's introduction and Safing products
08:32 How are you making money?
11:04 Business model
16:00 Why and what is Open Source?
40:00 Ideology of Open Source and Intellectual Property
59:00 Artificial Intelligence and Open Source

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

The United Kingdom, branded as the Énemy of the Internet, is on the path to become the world's first democracy turned into a digital dictatorship. This is how surveillance and censorship is changing the UK.

You can push back against the Online Hárms White Paper by giving your response at https://dcms.eu.qualtrics.com/jfe/form/SV_5nm7sPoxilSoTg9 by July 1 2019.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources
Online Harms White Paper full text https://www.gov.uk/government/consultations/online-harms-white-paper

News coverage & blogs
https://www.theguardian.com/technology/2019/apr/04/online-harms-white-paper-regulation-without-killing-innovation
https://www.wired.co.uk/article/online-harms-white-paper-uk-analysis
https://blogs.lse.ac.uk/mediapolicyproject/2019/04/10/the-online-harms-white-paper-its-approach-to-disinformation-and-the-challenges-of-regulation/
https://www.theguardian.com/commentisfree/2019/apr/14/white-paper-online-harms-global-first-needed-tech-industry-dcms-google-facebook

Enemies of the Internet by Reporters without Borders
https://rsf.org/sites/default/files/2014-rsf-rapport-enemies-of-the-internet.pdf
https://www.aljazeera.com/indepth/opinion/2012/04/201241373429356249.html

David Cameron calls to block social media
https://www.theguardian.com/uk/2011/aug/11/cameron-call-social-media-clampdown
https://www.theguardian.com/world/2011/jan/26/egypt-blocks-social-media-websites
https://news.yahoo.com/blogs/cutline/british-pm-david-cameron-considers-ban-twitter-facebook-150616849.html

Super-injunctions and libel laws
https://www.zdnet.com/article/google-facebook-twitter-warned-in-privacy-report/
https://www.zdnet.com/article/facebook-twitter-libel-claims-double-celebrities-still-prefer-super-injunctions/
https://www.zdnet.com/article/tech-injunction-gags-twitter-facebook-users-why-super-injunctions-onl..

Nimses is a new social media app promoted even by Pewdiepie. Its main selling point is that it rewards users who download the app with nims, a virtual currency. But the price of your privacy and the false promises of Nimses don't make it such a lucrative deal.

Support my channel by signing up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout.

What is Nimses?
Nimses would have you believe it’s an American company. But make no mistake about it. It’s a Ukrainian social media platform that is trying to penetrate Western markets. Nimses is incorporated in Delaware, which is ranked among the best and most convenient states to incorporate your company in the US if you are a foreign entity.

Nimses’ strategy to win against the dominance of the Facebook/Instagram empire is trying to lure users in by offering them a virtual currency for their time spent on the platform.

Nimses generates one nim every minute of your life on the platform. This virtual currency is centrally controlled by the company and its value doesn’t seem to be backed by anything other than what the company currently says.

Sources
https://nimses.com/privacy/
https://temples.nimses.com/
https://nimses.com/en/nimonomy
https://nimses.com/en/whitepaper
https://data.nimses.com/?lang=en
https://nimses.com/en/cookie-policy/

https://www.reddit.com/r/PewdiepieSubmissions/comments/bxzvso/not_a_meme_but_saw_lots_of_people_commenting_this/

Social media surveillance and privacy
https://theoutline.com/post/5380/targeted-ad-creepy-surveillance-facebook-instagram-google-listening-not-alone?zd=1&zi=ucbo5ff2
https://techcrunch.com/2018/09/27/yes-facebook-is-using-your-2fa-phone-number-to-target-you-with-ads/
https://techcrunch.com/2016/08/25/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out/
https://gizmodo.com/facebook-is-giving-advertisers-access-to-your-shadow-co-1828476051
https://www.propublica.org/article/facebook-doesnt-tell-u..

Facial recognition advertising as depicted in Minority Report is coming to your local stores sooner than you thought. The technology is becoming so mainstream it will become a part of the new social contract.

NordVPN affiliate link: https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' for 75% discount

Several US retailers, including Walgreens and Kroger, are piloting facial recognition advertising in physical stores. The goal is to use all available information from the cameras to target customers with relevant ads in a similar way online advertising targets Internet users.

Apps on your phone can use your high definition selfie camera to track your emotional expressions of your face as you listen to music, and suggest you playlists that correspond to your mood. A social media platform can track your face as you are typing that comment or text with your friends, and suggest you mood-specific ads.

All major technology companies are heavily investing into the development of facial recognition, including Google, Apple, Amazon, Samsung or Microsoft. With their massive reach on the market, it will soon become extremely difficult for you to avoid being identified every step of your way if you want to be a functioning individual.

Sources:

Amazon Facial Rekognition bias
https://www.nytimes.com/2019/04/03/technology/amazon-facial-recognition-technology.html
https://www.reuters.com/article/us-amazon-com-facial-recognition/amazons-face-id-tool-mismatched-28-members-of-congress-to-mug-shots-aclu-idUSKBN1KG1K7

Facial recognition targeted advertising
https://www.cbc.ca/news/technology/cameras-targeted-advertising-1.5107784
https://www.cbc.ca/news/technology/facial-recognition-technology-concerns-1.4826931
https://www.wsj.com/articles/walgreens-tests-digital-cooler-doors-with-cameras-to-target-you-with-ads-11547206200
https://www.theguardian.com/media/pda/2010/sep/27/advertising-billboards-facial-recognition-japan
https://www.targetmarketingmag.com/arti..

Microsoft _NSAKEY is a signing key found in Microsoft's CryptoAPI since Windows 95. Many claimed this was the ultimate backdoor for the National Security Agency. But is this a hoax, or is this a real backdoor in Microsoft Windows?

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

A British researcher discovered that Microsoft was cryptographically signing its CryptoAPI with two keys. This means two separate entities could approve software running inside Windows. One of those entities was Microsoft. The identity of the other one remained a mystery.

But then Microsoft shipped a Service Pack 5 for WindowsNT4. Somebody down the chain of command at Microsoft forgot to remove information revealing the true identity of both of the signing keys. Chief security scientist at Ontario-based Cryptonym Andrew Fernandes found the names of the two keys. One was simply called “_KEY”. And the other was “_NSAKEY”.

Sources
News coverage
https://www.wired.com/1999/09/ms-denies-windows-spy-key/
https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/biztech/articles/04soft.html
https://archive.nytimes.com/www.nytimes.com/library/tech/99/09/cyber/articles/04soft-side.html
http://us.cnn.com/TECH/computing/9909/13/backdoor.idg/index.html
http://edition.cnn.com/TECH/computing/9909/03/windows.nsa.02/
http://news.bbc.co.uk/2/hi/sci/tech/437967.stm
https://www.computerworld.com/article/2521889/microsoft-denies-it-built--backdoor--in-windows-7.html

Security experts & opinions
https://web.archive.org/web/20000617163417/http://www.cryptonym.com/hottopics/msft-nsa/msft-nsa.html
https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI
https://www.heise.de/tp/features/How-NSA-access-was-built-into-Windows-3444341.html
http://www.stat.rice.edu/~dobelman/kstorm.txt
https://cryptome.org/nsakey-ms..

The indictment of Julián Assánge is going to change the world forever. After the árrest of the founder of WikiLeáks, the fate of journalism and free press is called into question.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

The arrest of WikiLeáks founder Julian Assánge is going to leave a mark in the history books. Assánge has a complicated personality. But the story of WikiLeáks throughout the years challenges the very foundations of what it means to live in a Western society. On April 11th, Assánge was arrested by London Metropolitan Police.

But what makes history is neither of these cases. It’s his subsequent arrest at a central police station in London by British authorities on behalf of the United States.

The US arrest came with an indictment accusing Assange of conspiracy to commit computer intrusion with former US military intelligence analyst Chelsea Manning. The federal government is now seeking to extradite Assange into the United State where he could face up to five years of prison time for this single charge.

The indictment counts four main acts as part of the conspiracy:
1. The communication between Assange and Manning using Jabber instant messaging service where they agreed to acquire and disseminate the classified documents and crack the password on one of the DoD computers.
2. The effort Assange took to conceal Manning as the source of the leak.The indictment counts four main acts as part of the conspiracy:
3. That Assange encouraged Manning to provide more information from the government systems.
4. And the fact that Assange and Manning used a cloud drop box to transmit the leaked documents.

Sources
Indictment
https://www.justice.gov/usao-edva/pr/wikileaks-founder-charged-computer-hacking-conspiracy
https://www.justice.gov/usao-edva/press-release/file/..

Intel embeds Management Engine into all of its computers since 2008. Intel Management Engine has been criticized for its security risks and has been called a backdoor with rootkit possibilities by many security experts and researchers.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

This is Intel Management Engine. A subsystem microprocessor that’s operating inside every Intel CPU platform made from 2008 onward.
Despite its name and some basic functions, we don’t know anything about what Intel Management really does.

What we do know is that this microcontroller works completely independently from the main CPU. It can’t be manually removed or disabled. Even if the main computer is powered off, as long as it is plugged in to the mains or the battery, IME will continue to run.
Intel Management Engine is a computer within a computer. It is running it’s own operating system, called Minix, and is installed by default on every modern computer with an Intel CPU. This probably makes Minix the most widely used operating system in the world. But unlike Windows, Mac OS or Linux, Minix is completely outside of user control. It cannot be scanned by an antivirus or malware detection software. It can bypass any firewall configuration and has a dedicated network connection that can circumvent the main CPU and the main operating system.

Sources and further reading
https://www.slideshare.net/codeblue_jp/igor-skochinsky-enpub/17
https://www.howtogeek.com/334013/intel-management-engine-explained-the-tiny-computer-inside-your-cpu/

Intel Management Engine security problems
https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html
https://www.csoonline.com/article/3220476/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html
https://www.techrepublic.com/blog/it-security/researc..

Amazon is a monopoly in dozens of different markets because Jeff Bezos wants it to. In this criticism of Amazon, we analyze of Jeff Bezos business model threatens the very existence of free market.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Amazon is the second biggest corporation in the world and one of the only two companies to pass the $1 trillion mark. But during more than two decades of existence, Amazon has struggled to make any profit.

It has everything to do with the business model of Jeff Bezos, the CEO of Amazon. In his own words, Bezos believes in shareholder supremacy, which means everything is justified as long as the share value is growing.

Jeff Bezos pushed Amazon great lengths to claim this dominance. From undercutting competitors with predatory pricing, through forcing itself into their business, to vertically integrating into strategic markets across the business line, Amazon is on track to gradually take over every aspect of e-commerce and to control and decide what we shop and what is allowed to be sold.

Sources
Amazon profits and revenue chart https://www.wsj.com/articles/amazon-reports-surge-in-profit-1461874333 and http://www.thestreet.com/story/875924/1/amazon-losses-widen-but-shares-rise-after-hours.html
Amazon earnings https://venturebeat.com/2019/01/31/amazon-earnings-q4-2018/ and https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
Amazon Prime and stocks https://www.bloomberg.com/news/articles/2010-11-24/whats-in-amazons-box-instant-gratification
Amazon e-commerce share https://techcrunch.com/2018/07/13/amazons-share-of-the-us-e-commerce-market-is-now-49-or-5-of-all-retail-spend/
Amazon Web Services statistics https://www.statista.com/topics/4418/amazon-web-services/
Jeff Bezos net worth https://www.forbes.com/profile/jeff-bezos/
More than 90% marke..

A former mobile game developer and an expert at centralized web technology talks about how apps and companies track and handle your personal data.

Ask David questions on the The Hated One subreddit Q&A thread: https://www.reddit.com/r/thehatedone/comments/b6rtxi/former_mobile_game_developer_discloses_hidden/
Use his reddit handle u/davegson to make sure he gets notified about your comments.
Or reach him on Twitter https://twitter.com/davegson
He is also a co-founder of safing.io.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Firefox is a very powerful browser and in this 2019 tutorial you learn how to access essential privacy and security settings to protect your online privacy.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

More info:
https://www.privacytools.io/
https://wiki.mozilla.org/Privacy/Privacy_Task_Force/firefox_about_config_privacy_tweeks

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Getting maximum privacy and security will require to go through a plethora of settings Firefox allows you to change, as well as installing a selection of privacy enhancing extensions that will protect your privacy even more.

Go to “Content blocking” and select “strict blocking”.
Scroll down to History and choose “Use custom settings for history”. Check “Always use private browsing mode”.
If you are changing these settings on a Firefox you’ve been using for a while, you can easily clear all previously stored data in privacy – Cookies and Site Data and under History - “Clear History”. Select everything and set time range to Everything.
Under Address Bar, uncheck suggestions for Browsing history, Bookmarks and Open Tabs.
Under permissions, go to settings for Location, Camera, Microphone and Notifications and select “Block new requests asking to access” each of these parameters.
By default, Mozilla will collect some information from your Firefox. This is not good. But it’s easy to turn it off with a single click.
Blocking dangerous and deceptive content might be useful for secure browsing, but this service is provided by Google Safe Browsing, which you actually don’t see here. So I choose to not trust Google with my security.
Change your default search engine to duckduckgo and opt out o..

Apple's infallible privacy grandstanding is a masterpiece of distinguishable marketing. For Apple privacy is a publicity stunt. It's a clever trick with words that lets Apple get away with the same invasive practices for which other companies eat the dirt.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Apple cleverly compares their practices with their seeming rivals like Google and Facebook. Because when it comes to the software Apple provides, they aren’t treating your data any differently than other software companies.

Companies that promise you strong privacy and security begin with preventing themselves from accessing your data. Apple doesn’t do that. Apple possesses keys to unlock your iCloud account, which is why phishing Apple employees is the number one tactic to break into people’s accounts.

iMessage promises end-to-end encryption, but its implementation is very poor when compared to other protocols like Signal. iMessage doesn’t provide any interface to verify authenticity of contacts people are communicating with and thus can inject keys that would enable Apple or law enforcement agencies to monitor your conversations in real time. iMessage doesn’t implement any way to obscure metadata and so all your contacts, IP addresses, time stamps, and the size and presence of attachments is open for surveillance.

Sources

Apple privacy hypocrisy due to censorship in China
https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html

Apple and government surveillance
https://theintercept.com/2014/09/22/apple-data/
http://appleinsider.com/articles/13/06/06/apple-reportedly-last-company-to-join-governments-prism-data-mining-program
https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-ce..

To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is the best approach to keep control of your data.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Important sources and software

Every piece of software recommended is listed here:
https://www.privacytools.io/
(more direct links will be added soon)

Techlore's Go Incognito tutorial series:
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO

How to be anonymous on the web
https://www.youtube.com/watch?v=_393maHbHWc

Master uBlock Origin in advanced mode
https://www.youtube.com/watch?v=2lisQQmWQkY

Privacy by compartmentalization is very simple. You will create virtual compartments where you concentrate carefully separated pools of data. Each compartment will revolve around a different sphere of your identity.

The more security you want, the stronger walls between your compartments you’ll build.

The first compartment is for your professional identity to separate your business email and work related activity from the rest of your online presence.

The second compartment is for your social media so that you keep those advertising giants away from your digital life outside of their platforms.

The third compartment is for your private identity where most of your light browsing, news reading, watching YouTube and making online purchases happen.

When you become familiar with this practice, you can build more compartments.

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the Uni..

Why privacy matters if you have nothing to hide? Because privacy from you people who want to exploit you for their own benefit. You potentially spend more money on products than others and are excluded from housing, credit or employment market places just because advertisers use information about you that puts in a disadvantage. Privacy gives you freedom from this kind of speculation and exploitation.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Sources:
Exploitation of weak privacy protections:
https://www.washingtonpost.com/posteverything/wp/2014/11/03/if-you-use-a-mac-or-an-android-e-commerce-sites-may-be-charging-you-more/?noredirect=on
Linus Tech Tips on cheaper flights https://www.youtube.com/watch?v=Utsnt6GFrKo
https://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=1&hp=&pagewanted=all
https://www.businessinsider.com/the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy-2012-2?international=true&r=US&IR=T
https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/

Facebook empire
https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html
https://www.nytimes.com/2018/12/18/technology/facebook-privacy.html

Abusive cases of privacy invasion
https://www.maryferrell.org/showDoc.html?docId=1159&search=King#relPageId=137
https://www.maryferrell.org/showDoc.html?docId=1158&search=NAACP#relPageId=25
https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x
https://techcrunch.com/2012/04/23/facebooks-amended-s-1-500-million-mobile..

Criticism of copyright laws and patents is a taboo but it shouldn't be. With initially good intentions, copyright and patent laws are concentrating more and more profit and power within the hands of right holders, which in most cases is big corporations, labels and studios. It's dangerous to free speech and privacy in the Age of the Internet.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Copyright is unlike any other right. It gives the class of authors supreme position over the rest of society, while treating everyone else as criminals when they want to exercise their free speech and property rights to the full extent.

Copyright is the exclusive right to reproduce and distribute someone’s work. It’s the right to make copies of a protected work, hence copy-right. Patents are government protections on improvements and inventions in devices and processes.

In reality, copyrights and patents are monopolies. Monopolies where only the right holders are allowed to profit from the resources. It’s a monopoly because the more copyrights and patents the government protects, the more restricted people are in exercising their property rights.

Imagine you and your neighbor both mine stone on your respective properties. Then your neighbor decides to build a sculpture out of his stone. In the world of copyright, the very pattern of this sculpture is now protected under the law. That means no one else is allowed to take full use of their property and make the same sculpture of their own. Since you also own stone, you are allowed to do everything except for making that sculpture.
If your neighbor was to start mining stone with a pick-axe, they could patent this new production method and for 20 years, you would not be allowed to use a pick-axe to mine your stone on your property.

The more people make copyri..

This is not a usual from me today. An important update on my latest video that was not only demonetized after a manual review, but it was also removed from discovery and recommendations on YouTube. It now receives almost no views, when it used to get hundreds per hour.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

Source on the YouTube algorithm and censorship https://www.youtube.com/watch?v=n3H8D2LrLHc

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Australia just declared end-to-end encryption illegal by requiring companies to provide access to plain text communications through a new Assistance and Access Bill that passed just before Christmas. This is a dangerous attack on the Internet freedom.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

The Assistance and Access Bill, known as the Australian ban on encryption, introduces three new technical notices the Australian government can use to leverage communication providers to yield data of their users even if they implement strong cryptographic protections.
• technical assistance notice,
• technical capability notice, and
• technical assistance request
Both technical assistance notice and technical capability notice demand mandatory cooperation from providers.
Technical assistance request is a voluntary version of the both mandatory notices combined but with absolutely no restrictions or oversight.

Sources:
Draft proposal https://assets.documentcloud.org/documents/4756739/The-Assistance-Access-Bill-2018.pdf

Explanatory bill https://assets.documentcloud.org/documents/4756738/Explanatory-Document.pdf

Why backdoor is dangerous: https://cs.stanford.edu/people/eroberts/cs181/projects/ethics-of-surveillance/tech_encryptionbackdoors.html

News coverage
https://arstechnica.com/tech-policy/2018/08/australian-govt-wants-to-force-tech-firms-to-weaken-crypto/
https://phys.org/news/2018-12-australia-anti-encryption-law-passage.html
https://arstechnica.com/tech-policy/2018/12/australia-passes-new-law-to-thwart-strong-encryption/
https://arstechnica.com/information-technology/2015/12/what-the-government-shouldve-learned-about-backdoors-from-the-clipper-chip/
https://www.theverge.com/2018/12/7/18130806/australia-access-and-assistance-encryption-bill-2018-facebook-google-apple-respond
https..

As the most popular encrypted email provider, ProtonMail has been criticized for false security promises and weak guarantees of its end-to-end encryption infrastructure. Can be ProtonMail's marketing of their Swiss-based email service justified? The results might SHOCK you!

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

These are encrypted email providers that I would recommend
Free and paid plans
https://www.protonmail.ch/
https://www.tutanota.com/
https://www.mailfence.com/
Only paid
https://www.mailbox.org/
https://www.posteo.de/

An Analysis of the ProtonMail Cryptographic Architecture by Nadim Kobeissi https://eprint.iacr.org/2018/1121
Liveoverflow End-to-End Encryption in the Browser Impossible? - ProtonMail https://www.youtube.com/watch?v=DM1tPmxGY7Y

The Reddit debate and Protonmail's response
https://www.reddit.com/r/ProtonMail/comments/9yqxkh/an_analysis_of_the_protonmail_cryptographic/ea3g0hm/
ProtonMail Threat Model https://protonmail.com/blog/protonmail-threat-model/
Why is ProtonMail more secure than Gmail https://protonmail.com/blog/protonmail-vs-gmail-security/

The problem with ProtonMail’s webmail service is that each time you go to sign in to their website, you have to completely trust ProtonMail that the javascript that your browser runs is correctly implementing PGP and is not trying to steal your private keys and read your messages. This problem is limited with smartphone apps, because each new version of an app has to be signed by the author and the platform – which in this case is ProtonMail and Google Play Store or Apple App Store. With these apps, users can verify whether they received the same binary for a particular version as everyone else.
Because of the differences in the levels of trust, webmail services are objectively less secure than desktop and smartphone apps...

Watch Google CEO Sundar Pichai get grilled by Representative Jordan over alleged election manipulation. This is a highlight of the congressional hearing before the U.S. House of Representatives' Judiciary Committee on Tuesday December 11th 2018.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at https://nordvpn.org/thehatedone or use my coupon code 'thehatedone' at the checkout to save 75% on the 3-year plan!

This excerpt was taken from Global News coverage of the Google CEO testimony https://www.youtube.com/watch?v=uM5IHHCEb3k

This was probably the only instance during the entire 3 and a half hour long congressional testimony were Google CEO was really pressed on the issue. While Google has a long record of scandals ranging from privacy and data collection, anti-competitive behavior, search engine manipulation, political lobbying, news censorship and anti-trust cases, it was election manipulation that Representative Jordan chose to tackle Sundar Pichai on. Quite successfully, but is that going to mean anything going forward?

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

SHOW MORE

Created 2 years ago.

64 videos

CategoryScience & Technology

Uncovering the wrongdoing of governments and corporations irrespective of the political tribe they claim to allign with. When corporate monopolies abuse their dominance and governments fail their electorates, come to this channel to learn how you can guard your digital rights on your own.

If you like what I do on this channel, consider supporting me through a crypto-currency of your choice. Help me build the first crypto-funded channel on YouTube!

Bitcoin:
1FuKzwa5LWR2xn49HqEPzS4PhTMxiRq689

Dash
XyBDwdFQuZNCnThkeeg1FRFks65hKMkTux

Litecoin
LcHJvrovBfqDBQyfHcxxBErGM8qq5zho8s

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

https://twitter.com/The_HatedOne_
https://www.reddit.com/user/The_HatedOne/
https://www.minds.com/The_HatedOne