Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Your Personal Privacy and Security are at Risk

 

This is ALF, from the 1980's sitcom Alien Life Form

This is ALF, from the 1980's sitcom Alien Life Form

He’s watching and listening to everything you say and do online !

You will own NOTHING !!! And you WILL be very very happy - eating bugs - lol

To advance human rights and freedoms by creating and deploying free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.

We are fighting a digital war

Secure your digital turf and resist
Install Tor (The Onion Router), OnionShare & Tails (The Amnesic Incognito Live System)

Getting Started


1/ Download the Tor Browser to surf the net anonymously and access the dark web

2/   Download Onionshare to share files and documents (Tax documents, medical information, or unpublished research) anonymously.

This will work in your existing system (Windows, Mac or Linux) and give you a chance to evaluate TOR before taking the next step with TAILS – a bit more complex 🙂

 

https://www.torproject.org/download/
https://onionshare.org/

Become Invisible Online With The Tails OS, Incognito Linux System Used by Edward Snowden to Evade the NSA
After Exposing Their Criminal Activities

This video discusses using the awesome power of Tails. Tails is a portable OS that you can run off a simple USB drive and comes equipped with the power of the Tor Browser. Tails focuses on privacy, security, and anonymity. It discuss how you can use it on nearly any PC and the additional benefits of features like persistence, Onion share, the Tor Browser and encryption.

https://www.youtube.com/watch?v=YdE4-o2_v14

HISTORY

In the 1990s, the lack of security on the internet and its ability to be used for tracking and surveillance was becoming clear, and in 1995, David Goldschlag, Mike Reed, and Paul Syverson at the U.S. Naval Research Lab (NRL) asked themselves if there was a way to create internet connections that don’t reveal who is talking to whom, even to someone monitoring the network. Their answer was to create and deploy the first research designs and prototypes of onion routing.

The goal of onion routing was to have a way to use the internet with as much privacy as possible, and the idea was to route traffic through multiple servers and encrypt it each step of the way. This is still a simple explanation for how Tor works today.

https://www.torproject.org/about/history/
OnionShare lets you securely and anonymously share a file of any size with someone. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL to access and download the file. It doesn't require setting up a server on the Internet somewhere or using a third party file sharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the Internet. The other user just needs to use the Tor Browser and to enter the URL to download the file from you.
https://onionshare.org/#download

Protect yourself when your online

with these FREE resources:

TOR Browser https://www.torproject.org/

Onionshare https://onionshare.org/#download

TAILS Operating System https://tails.boum.org/install/index.en.html

 

If you are unable to figure this out yourself, a usb drive is available for $100 loaded…
shipped to you and ready to go.

Stuck ? Consultations start at $50/hr.

Some of the big issues facing us …

If you are involved with anything that opposes or exposes any government policies – especially related to Covid 19 – you need to be concerned about censorship, personal security and privacy online.

*****

Are you using Gmail ? Do you know that google keeps a copy of all of your emails ? 

Windows 10 incorporates a keylogger – every single keystroke that you make goes back to Microsoft

Yes Windows 11 incorporates a keylogger as well

How to Disable Windows 11’s Built-in Keylogger

Proton mail ?     Proton mail caves to Swiss authorities

CANADA Bill C-59: Mass Surveillance and Cyber Powers in Canada

VPN use in Canada: Can government agencies track you for using a VPN in Canada?

RCMP gave banks police info on Ottawa protesters with a list of accounts to freeze

Self-Driving Cars Have a Secret Weapon: Remote Control

A sinister Chinese style social credit system is rapidly developing in Canada.
 A great deal of it's success depends on the Governments ability to surveil you.

DO NOT COMPLY

Have you seen something that needs to be exposed ?

Securely, anonymously and confidentialy share sensetive information while protecting your identity.

A tool for journalists and whistleblowers:

Infosec Bytes, learn about information security

https://www.journalism.co.uk/news/tool-for-journalists-infosec-bytes-for-learning-about-information-security/s2/a714174/

... a crash course in information security for journalists. We're based at the Centre for Investigative Journalism in London and supported by the Logan Foundation. This is an introduction to the Tails operating system: a purpose-built, security-focused operating system which you can use to protect your journalistic work. Make sure to watch our other videos To consult with an expert through CIJ, or to arrange a CIJ training session, get in touch: info@tcij.org To support the Center for Investigative Journalism with a donation, please visit http://tcij.org/donate. Infosec Bytes https://www.youtube.com/channel/UCfET6btFpe1e0CRGTFOulNg

These are the people who want to take it all from you …

Justin Trudeau Pedophile and Prime Minister of Canada
Chrystia Freeland Deputy Prime Minister of Canada & Minister of Finance

These Articles and Stories Describe
What They Have in Store For You …

Image cloaking for personal privacy

There are many services which help outsiders find your social networks and other data with 1 your photo.As long as we use these tools ourselves, everything seems to be OK. But it is possible that others may try to use them to find you.

To prevent this, you can use Fawkes (http://sandlab.cs.uchicago.edu/fawkes/). It’s a program which changes the pixels in your photo so that algorithms can’t recognize your face.

For a human eye, the difference will not be noticeable at all❗️ The picture won’t change for you, but the algorithms will get confused.

It is available for Mac and Windows
(http://sandlab.cs.uchicago.edu/fawkes/#code

 

The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal

It turns out the conspiracy theorists were onto something. Classified documents provided by whistleblower Edward Snowden show that the National Security Agency indeed worked urgently to target bitcoin users around the world — and wielded at least one mysterious source of information to “help track down senders and receivers of Bitcoins,” according to a top-secret passage in an internal NSA report dating to March 2013. The data source appears to have leveraged the NSA’s ability to harvest and analyze raw, global internet traffic while also exploiting an unnamed software program that purported to offer anonymity to users, according to other documents.

Trudeau government to introduce national “Digital Identity Program”

 
 

A report published last week on revamping the Government of Canada’s digital infrastructure states that the next step to making services more convenient is to introduce a federal “Digital Identity Program.” 

Details of the program were scarce in the publication titled Canada’s Digital Ambition 2022 which was signed off by President of the Treasury Board Mona Fortier and the Chief Information Officer of Canada, Catherine Luelo. 

Citing the pandemic, the report outlines how a federal framework would also be integrated with provincial digital identities. 

“The COVID-19 pandemic highlighted the need for government services to be accessible and flexible in the digital age. The next step in making services more convenient to access is a federal Digital Identity Program, integrated with pre-existing provincial platforms,” the report explained. 

“Digital identity is the electronic equivalent of a recognized proof-of-identity document (for example, a driver’s license or passport) and confirms that ‘you are who you say you are’ in a digital context.”

Steps currently underway to implement the program include “developing a common and secure framework to digital identity” and “launching public consultations on a federally managed digital identity framework.” 

When first appointed to the position by Prime Minister Justin Trudeau, Fortier’s mandate letter for the Treasury Board included a specific directive to work “towards a common and secure approach for a trusted digital identity platform to support seamless service delivery to Canadians across the country.” 

As exclusively reported by True North in May, the Trudeau government revealed that it was working with airlines to require “digital identity documents” and biometric data like facial recognition as boarding requirements. 

Currently, the Liberals are facing calls from the opposition to ditch the ArriveCAN application citing airport backlogs and privacy concerns. 

Canada’s privacy commissioner Philippe Dufresne was prompted to launch an investigation into the app to see whether it violated any laws or improperly collected the personal information of Canadians.

During a June House of Commons information and ethics committee, former privacy commissioner Daniel Therrien also told MPs that there is a potential for digital identity to be “harmful to privacy” if designed incorrectly. 

“Digital ID, like all technologies, can be helpful and privacy protective or harmful to privacy depending on how it is designed. It is certainly conceivable that digital ID could enhance the verification process and the authentication process, allowing citizens to have access to services,” responded Therrien. 

“It is certainly possible that digital ID would lead to the data being available to many players or actors, corporate or governmental, that should not have access to all of this data, but it doesn’t have to be designed that way.”

Trudeau government to introduce national “Digital Identity Program”

 

https://www.youtube.com/watch?v=UXLo15l2i4c

Your Cell Phone Security and Privacy

GoDark Faraday Bags for Phones and Tablets

GoDark Faraday Bags are military strength Faraday bags that protect your phone, tablet and other electronics from location tracking, hacking, and damage by blocking all incoming and outgoing EMF signals between 200 MHz and 40 GHz, including GPS, Cell Phone, Wi-Fi and Bluetooth. GoDark Bags are the trusted choice among journalists, security professionals, law enforcement, military, preppers and the privacy and health conscious across the world.

 

GoDark Faraday Bags for Phones and Tablets

DIY CELL PHONE FARADAY POUCH

I have seen a lot of faraday cages the on Internet but they were all are too difficult to make and too expensive – so I decided to make the easiest one and here it is This Faraday Cage phone pouch blocks all radio signals coming in or out of your cellphone.

 

https://www.instructables.com/EASIEST-FARADAY-PHONE-POUCH/

 
BraX2 Privacy Phone is now available on https://brax.me. Sign in to the platform to see the store. Merch Store https://my-store-c37a50.creator-sprin…

What Ontario’s new workplace electronic monitoring policy actually means for employees

New legislation requiring employers in Ontario to disclose electronic monitoring in the workplace will increase transparency but does not provide employees with any new privacy right, employment lawyers say.

The Ontario government passed legislation in April requiring employers with 25 or more employees to have an electronic monitoring policy.

This could cover whether an employer is monitoring an employee’s computers, cellphones or GPS and the extent to which it is occurring.

https://www.ctvnews.ca/business/what-ontario-s-new-workplace-electronic-monitoring-policy-actually-means-for-employees-1.6107294?fbclid=IwAR1Ohc7O3qIS4fFImUFx2omYC_lHRyhvqQlLkTkKNEk-YS8w43G2TApE7SI

 

You want to know one of the great ironies of the news media?

With so many news channels offering 24/7 news coverage, you’d think they’d be able to cover all the most impactful news across the globe.

But instead, much of it is filled with the bites that get the most headlines, clicks and eyeballs.

What you probably did not hear is the recent $105,000,000 investment from the World Economic Forum to Canada to implement digital passports on all of its citizens.

So what are they wanting to track?

Not only will it allow them to track your whereabouts and your movements through your phone.

FOR THE ENTIRE COUNTRY.

But it will also allow the WEF to compile a profile of political leanings, gun ownership status and so on for every user.

You can skip to the 4:55 mark in this video to hear all about it.

With that information the WEF can influence crafting other mandates and legislation based on those results.

Take it one step further…

The Bill and Melinda Gates Foundation has just announced a $200,000,000 fund to implement the use of digital ID’s.

His primary interest?

The tracking of v@ccine status. Going so far as outlawing any and all travel without a proof of current jabs.


Why would he care about that enough to invest that much money?

Find out this quick breakdown video that shares what you’re not seeing on the news.

To your success,

Jeff Hays Films

“Movies that Make Movements”

P.S. You’ll also get some insights straight from the WHO (World Health Organization) partnering with Google to influence the search results you’re seeing from your internet searches.

See it all HERE.

John McAfee

Founder of McAfee Anti-virus

Encrypted email and messaging systems like Protonmail, Signal, etc provide privacy?? HahahahahahHa ….. Wake the fuck up people!

More on McAfee …

824,930 views Feb 15, 2018 ►WHAT IS THIS In this video, I explore a weakness in security cameras (specifically the night vision variety) that renders a person incognito in its view. DISCLAMER: I imagine this is not the best thing to try in public; don’t try this yourself, just enjoy the science.

 

..A man just called Pizza Hut to order a pizza..

CALLER: Is this Pizza Hut?

GOOGLE: No sir, it’s Google Pizza.

CALLER: I must have dialed a wrong number, sorry.

GOOGLE: No sir, Google bought Pizza Hut last month.

CALLER: OK. I would like to order a pizza.

GOOGLE: Do you want your usual, sir?

CALLER: My usual? You know me?

GOOGLE: According to our caller ID data sheet, the last 12 times you called you ordered an extra-large pizza with three cheeses, sausage, pepperoni, mushrooms and meatballs on a thick crust.

CALLER: Super! That’s what I’ll have.

GOOGLE: May I suggest that this time you order a pizza with ricotta, arugula, sun-dried tomatoes and olives on a whole wheat gluten-free thin crust?

CALLER: What? I don’t want a vegetarian pizza!

GOOGLE: Your cholesterol is not good, sir.

CALLER: How do you know that?

GOOGLE: Well, we cross-referenced your home phone number with your medical records. We have the result of your blood tests for the last 7 years.

CALLER: Okay,…but I do not want your rotten vegetarian pizza! I already take medication for my cholesterol.

GOOGLE: Excuse me sir, but you have not taken your medication regularly. According to our database, you purchased only a box of 30 cholesterol tablets once at Lloyds Pharmacy, 4 months ago.

CALLER: I bought more from another Pharmacy.

GOOGLE: That doesn’t show on your credit card statement.

CALLER: I paid in cash!

GOOGLE: But you did not withdraw enough cash according to your bank statement.

CALLER: I have other sources of cash!!

GOOGLE: That doesn’t show on your latest tax returns unless you bought them using an undeclared income source, which is against the law!

CALLER: WHAT THE ?!!!

GOOGLE: I’m sorry sir, we use such information only with the sole intention of helping you…

CALLER: Enough already!! I’m sick to death of Google, Facebook, Twitter, WhatsApp and all the others!

I’m going to an island without the internet, TV, where there is no phone service and no one to watch me or spy on me.

GOOGLE: I understand sir, but you need to renew your passport first. It expired 6 weeks ago…

 

Is this you ?

Total Website Visits: 163794
Total Page Visits: 410
Total Page Visits: 410 - Today Page Visits: 2