PLEASE UPDATE YOUR BROWSER
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Your Personal Privacy and Security are at Risk

 

This is ALF, from the 1980's sitcom Alien Life Form<\/p>","hotspot_offset_x":{"unit":"%","size":51,"sizes":[]},"hotspot_offset_y":{"unit":"%","size":48,"sizes":[]},"hotspot_tooltip_position":"yes","hotspot_tooltip_width":{"unit":"px","size":0,"sizes":[]},"hotspot_tooltip_text_wrap":"yes","hotspot_horizontal":"right","hotspot_link":{"url":"","is_external":"","nofollow":"","custom_attributes":""},"hotspot_icon":{"value":"","library":""},"hotspot_icon_position":null,"hotspot_icon_spacing":null,"hotspot_vertical":"top","hotspot_position":""}],"hotspot_sequenced_animation":"yes","hotspot_sequenced_animation_duration":{"unit":"px","size":10081,"sizes":[]},"tooltip_trigger":"mouseenter","tooltip_position":"top","tooltip_animation":"e-hotspot--fade-in-out"}" data-widget_type="hotspot.default">
giphy - word2
This is ALF, from the 1980's sitcom Alien Life Form

This is ALF, from the 1980's sitcom Alien Life Form

He’s watching and listening to everything you say and do online !

t - word2

You will own NOTHING !!! And you WILL be very very happy - eating bugs - lol

tor logo@2x 1 - word2

To advance human rights and freedoms by creating and deploying free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.

es - word2
We are fighting a digital war

Secure your digital turf and resist
Install Tor (The Onion Router), OnionShare & Tails (The Amnesic Incognito Live System)

Getting Started

1/ Download the to surf the “surface” net anonymously and access the dark web if you wish

2/   Download to share files and documents (Tax documents, medical information, or unpublished research) anonymously

This will work with your existing system (Windows, Mac or Linux) and give you a chance to evaluate TOR before taking the next step with – a bit more complex 🙂


Become Invisible Online With The Tails OS, Incognito Linux System Used by Edward Snowden to Evade the NSA
After Exposing Their Criminal Activities

This video discusses using the awesome power of Tails. Tails is a portable OS that you can run off a simple USB drive and comes equipped with the power of the Tor Browser. Tails focuses on privacy, security, and anonymity. It discuss how you can use it on nearly any PC and the additional benefits of features like persistence, Onion share, the Tor Browser and encryption.

 

HISTORY

In the 1990s, the lack of security on the internet and its ability to be used for tracking and surveillance was becoming clear, and in 1995, David Goldschlag, Mike Reed, and Paul Syverson at the U.S. Naval Research Lab (NRL) asked themselves if there was a way to create internet connections that don’t reveal who is talking to whom, even to someone monitoring the network. Their answer was to create and deploy the first research designs and prototypes of onion routing.

The goal of onion routing was to have a way to use the internet with as much privacy as possible, and the idea was to route traffic through multiple servers and encrypt it each step of the way. This is still a simple explanation for how Tor works today.


                    
OnionShare lets you securely and anonymously share a file of any size with someone. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL to access and download the file. It doesn't require setting up a server on the Internet somewhere or using a third party file sharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the Internet. The other user just needs to use the Tor Browser and to enter the URL to download the file from you.

Protect yourself when your online

with these FREE resources:

TOR Browser

Onionshare

TAILS Operating System

 

If you are unable to figure this out yourself, a usb drive is available for $100 loaded…
shipped to you and ready to go.

Stuck ? Consultations start at $50/hr.

Some of the big issues facing us …

If you are involved with anything that opposes or exposes any government policies – especially related to Covid 19 or SOGI123 – you need to be concerned about censorship, personal security, legal action, and privacy online.

*****

Are you using Gmail ? Do you know that google keeps a copy of all of your emails ? 

Windows 10 incorporates a keylogger – every single keystroke that you make goes back to Microsoft

Yes Windows 11 incorporates a keylogger as well

Proton mail ?     Proton mail caves to Swiss authorities

A sinister Chinese style social credit system is rapidly developing in Canada.
 A great deal of it's success depends on the Governments ability to surveil you.

DO NOT COMPLY

: The Alternative Search Engine to Google

whi - word2

Have you seen something that needs to be exposed ?

Securely, anonymously and confidentialy share sensetive information while protecting your identity.


... a crash course in information security for journalists. We're based at the Centre for Investigative Journalism in London and supported by the Logan Foundation. This is an introduction to the Tails operating system: a purpose-built, security-focused operating system which you can use to protect your journalistic work. To consult with an expert through CIJ, or to arrange a CIJ training session, get in touch: info@tcij.org To support the Center for Investigative Journalism with a donation, please visit . Infosec Bytes

 

These are the people who want to take it all from you …

pm trudeau 090 - word2
Justin Trudeau Pedophile and Prime Minister of Canada
petty - word2
cf - word2
Chrystia Freeland Deputy Prime Minister of Canada & Minister of Finance

These Articles and Stories Describe
What They Have in Store For You …

The American Restrict Act and Canada’s Bill C11 are the latest assaults on our freedoms

RESTRICT Act

The RESTRICT Act is proposed legislation that was first introduced in the United States Senate on March 7, 2023.
: (D‑VA)
:
:
: 25
: Restricting the Emergence of Security Threats that Risk Act of 2023

- word2

MUST SEE

image cloaking - word2

Image cloaking for personal privacy

There are many services which help outsiders find your social networks and other data with 1 your photo.As long as we use these tools ourselves, everything seems to be OK. But it is possible that others may try to use them to find you.

To prevent this, you can use Fawkes (http://sandlab.cs.uchicago.edu/fawkes/). It’s a program which changes the pixels in your photo so that algorithms can’t recognize your face.

For a human eye, the difference will not be noticeable at all The picture won’t change for you, but the algorithms will get confused.

It is available for Mac and Windows
(http://sandlab.cs.uchicago.edu/fawkes/#code

The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal

It turns out the conspiracy theorists were onto something. Classified documents provided by whistleblower Edward Snowden show that the National Security Agency indeed worked urgently to target bitcoin users around the world — and wielded at least one mysterious source of information to “,” according to a top-secret passage in an internal NSA report dating to March 2013. The data source appears to have leveraged the NSA’s ability to harvest and analyze raw, global internet traffic while also exploiting an unnamed software program that purported to offer anonymity to users, according to other documents.

Trudeau government to introduce national “Digital Identity Program”

 
 

A report last week on revamping the Government of Canada’s digital infrastructure states that the next step to making services more convenient is to introduce a federal “Digital Identity Program.” 

Details of the program were scarce in the publication titled Canada’s Digital Ambition 2022 which was signed off by President of the Treasury Board Mona Fortier and the Chief Information Officer of Canada, Catherine Luelo. 

Citing the pandemic, the report outlines how a federal framework would also be integrated with provincial digital identities. 

“The COVID-19 pandemic highlighted the need for government services to be accessible and flexible in the digital age. The next step in making services more convenient to access is a federal Digital Identity Program, integrated with pre-existing provincial platforms,” the report explained. 

“Digital identity is the electronic equivalent of a recognized proof-of-identity document (for example, a driver’s license or passport) and confirms that ‘you are who you say you are’ in a digital context.”

Steps currently underway to implement the program include “developing a common and secure framework to digital identity” and “launching public consultations on a federally managed digital identity framework.” 

When first appointed to the position by Prime Minister Justin Trudeau, Fortier’s mandate for the Treasury Board included a specific directive to work “towards a common and secure approach for a trusted digital identity platform to support seamless service delivery to Canadians across the country.” 

As exclusively by True North in May, the Trudeau government revealed that it was working with airlines to require “digital identity documents” and biometric data like facial recognition as boarding requirements. 

Currently, the Liberals are facing calls from the opposition to ditch the ArriveCAN application citing airport backlogs and privacy concerns. 

Canada’s privacy commissioner Philippe Dufresne was prompted to launch an into the app to see whether it violated any laws or improperly collected the personal information of Canadians.

During a June House of Commons information and ethics committee, former privacy commissioner Daniel Therrien also told MPs that there is a for digital identity to be “harmful to privacy” if designed incorrectly. 

“Digital ID, like all technologies, can be helpful and privacy protective or harmful to privacy depending on how it is designed. It is certainly conceivable that digital ID could enhance the verification process and the authentication process, allowing citizens to have access to services,” responded Therrien. 

“It is certainly possible that digital ID would lead to the data being available to many players or actors, corporate or governmental, that should not have access to all of this data, but it doesn’t have to be designed that way.”

 

 

De Googling an Android 10 Phone - word2

https://www.youtube.com/watch?v=UXLo15l2i4c

Your Cell Phone Security and Privacy

GoDark Faraday Bags for Phones and Tablets

GoDark Faraday Bags are military strength Faraday bags that protect your phone, tablet and other electronics from location tracking, hacking, and damage by blocking all incoming and outgoing EMF signals between 200 MHz and 40 GHz, including GPS, Cell Phone, Wi-Fi and Bluetooth. GoDark Bags are the trusted choice among journalists, security professionals, law enforcement, military, preppers and the privacy and health conscious across the world.

 

DIY CELL PHONE FARADAY POUCH

I have seen a lot of faraday cages the on Internet but they were all are too difficult to make and too expensive – so I decided to make the easiest one and here it is This Faraday Cage phone pouch blocks all radio signals coming in or out of your cellphone.

 

 
BraX2 Privacy Phone is now available on . Sign in to the platform to see the store. Merch Store

What Ontario’s new workplace electronic monitoring policy actually means for employees

New legislation requiring employers in Ontario to disclose electronic monitoring in the workplace will increase transparency but does not provide employees with any new privacy right, employment lawyers say.

The Ontario government passed legislation in April requiring employers with 25 or more employees to have an electronic monitoring policy.

This could cover whether an employer is monitoring an employee’s computers, cellphones or GPS and the extent to which it is occurring.

https://www.ctvnews.ca/business/what-ontario-s-new-workplace-electronic-monitoring-policy-actually-means-for-employees-1.6107294?fbclid=IwAR1Ohc7O3qIS4fFImUFx2omYC_lHRyhvqQlLkTkKNEk-YS8w43G2TApE7SI

CBC Ont - word2

JHF TODAY EH2 - word2

 

You want to know one of the great ironies of the news media?

With so many news channels offering 24/7 news coverage, you’d think they’d be able to cover all the most impactful news across the globe.

But instead, much of it is filled with the bites that get the most headlines, clicks and eyeballs.

What you probably did not hear is the recent $105,000,000 investment from the World Economic Forum to Canada to implement digital passports on all of its citizens.

So what are they wanting to track?

Not only will it allow them to track your whereabouts and your movements through your phone.

FOR THE ENTIRE COUNTRY.

But it will also allow the WEF to compile a profile of political leanings, gun ownership status and so on for every user.

You can skip to the .

With that information the WEF can influence crafting other mandates and legislation based on those results.

Take it one step further…

The Bill and Melinda Gates Foundation has just announced a $200,000,000 fund to implement the use of digital ID’s.

His primary interest?

The tracking of v@ccine status. Going so far as outlawing any and all travel without a proof of current jabs.


Why would he care about that enough to invest that much money?

Find out this quick breakdown video that shares what you’re not seeing on the news.

To your success,

Jeff Hays Films

“Movies that Make Movements”

P.S. You’ll also get some insights straight from the WHO (World Health Organization) partnering with Google to influence the search results you’re seeing from your internet searches.

Person of Interest (from 2011)

A billionaire software-genius named Harold Finch creates a Machine for the government that is designed to detect acts of terror before they can happen, by monitoring the entire world through every cell-phone, email and surveillance camera. Finch discovered that the machine sees everything, potential terrorist acts and violent crimes that involve ordinary people. When the government considered violent crimes between normal people “irrelevant”,

Science Fiction becomes reality

John McAfee

Founder of McAfee Anti-virus

Encrypted email and messaging systems like Protonmail, Signal, etc provide privacy?? HahahahahahHa ….. Wake the fuck up people!

824,930 views Feb 15, 2018 ►WHAT IS THIS In this video, I explore a weakness in security cameras (specifically the night vision variety) that renders a person incognito in its view. DISCLAMER: I imagine this is not the best thing to try in public; don’t try this yourself, just enjoy the science.

 

..A man just called Pizza Hut to order a pizza..

CALLER: Is this Pizza Hut?

GOOGLE: No sir, it’s Google Pizza.

CALLER: I must have dialed a wrong number, sorry.

GOOGLE: No sir, Google bought Pizza Hut last month.

CALLER: OK. I would like to order a pizza.

GOOGLE: Do you want your usual, sir?

CALLER: My usual? You know me?

GOOGLE: According to our caller ID data sheet, the last 12 times you called you ordered an extra-large pizza with three cheeses, sausage, pepperoni, mushrooms and meatballs on a thick crust.

CALLER: Super! That’s what I’ll have.

GOOGLE: May I suggest that this time you order a pizza with ricotta, arugula, sun-dried tomatoes and olives on a whole wheat gluten-free thin crust?

CALLER: What? I don’t want a vegetarian pizza!

GOOGLE: Your cholesterol is not good, sir.

CALLER: How do you know that?

GOOGLE: Well, we cross-referenced your home phone number with your medical records. We have the result of your blood tests for the last 7 years.

CALLER: Okay,…but I do not want your rotten vegetarian pizza! I already take medication for my cholesterol.

GOOGLE: Excuse me sir, but you have not taken your medication regularly. According to our database, you purchased only a box of 30 cholesterol tablets once at Lloyds Pharmacy, 4 months ago.

CALLER: I bought more from another Pharmacy.

GOOGLE: That doesn’t show on your credit card statement.

CALLER: I paid in cash!

GOOGLE: But you did not withdraw enough cash according to your bank statement.

CALLER: I have other sources of cash!!

GOOGLE: That doesn’t show on your latest tax returns unless you bought them using an undeclared income source, which is against the law!

CALLER: WHAT THE ?!!!

GOOGLE: I’m sorry sir, we use such information only with the sole intention of helping you…

CALLER: Enough already!! I’m sick to death of Google, Facebook, Twitter, WhatsApp and all the others!

I’m going to an island without the internet, TV, where there is no phone service and no one to watch me or spy on me.

GOOGLE: I understand sir, but you need to renew your passport first. It expired 6 weeks ago…

 

Is this you ?

cat - word2
[pvcp_website_count]
[pvcp_1]