TruthArchive.ai - Tweets Saved By @RedTeamActual

Saved - August 12, 2025 at 2:41 PM
reSee.it AI Summary
Superchat funding, as used by certain influencers, is effective because it avoids creating a paper trail. This method allows for cash injections to promote specific narratives without regulatory scrutiny. The only record exists with the payment processor, creating a fragmented system that relies on aliases and intermediaries. This enables actors to subtly influence narratives as long as donations continue. I plan to share insights on identifying unusual patterns in onboarding and donation behaviors, utilizing available tools for analysis.

@RedTeamActual - R E D

Superchat funding, like @NickJFuentes uses, works well because it leaves no paper trail. You can inject cash into an “influencer” to push (insert narrative) without FARA breathing down your neck or other payment methods exchanging hands. The only trail is the transaction with the payment processor. This is a fragmented funding system using aliases and intermediaries. The best part? (Insert actor, foreign or domestic) can inject narratives without being overt. Fragment the superchat accounts and donations, and the host will keep pushing the narrative as long as the “donations” flow. I’ve already covered a portion of this in my old “influencer” thread. Will make a thread on how to identify unusual onboarding, cyclic timing, clustering and repetition. There are tools for it.

Saved - May 28, 2025 at 12:01 AM
reSee.it AI Summary
I’m frustrated that the issue of illegal content on X isn't discussed enough. Many bad actors exploit hashtags to link to dark web sites, using clever coding and misspellings to evade detection. Despite the platform's potential, it seems to do little to combat this problem, similar to Twitter 1.0. Influencers focused on engagement overlook these serious issues, which is disheartening. I urge those who claim to care about protecting kids to take action on X, rather than just chasing trends and collaborations.

@RedTeamActual - R E D

Okay this is a subject that doesn’t get talked about here on X. I could just say that X is just the bridge to darkweb through specific hashtags combination and links through specific posts. What a lot of bad actors are currently doing is using hashtags here on X to exploit and link their illegal content to their main web archives/hosting sites. I am not going to spell it out because it makes me sick to my stomach. @The1Parzival already covered this. This is all being done through embedded code language, emoji combination and slight misspelling of certain words and terms. X Hashtags are the main vector through tag stacking. They group unrelated tags to maximize exposure across communities. I don’t know what X is doing to remove, ban these accounts that use hashtag chaining for illegal offerings. Twitter 1.0 had the same problem. I am also appalled that “save the kids” influencers don’t talk and or bring this up about the platform which pays them through monetization. Same platform that doesn’t seem to be able to eradicate this type of content which is turning into a breeding ground for this. It’s a tough subject that doesn’t get talked about. The majority of accounts with large followings are more interested in engagement than real issues. It’s sad and a shame. @elonmusk please handle this. I feel dirty just by posting here on X.

@RedTeamActual - R E D

I am speechless really. Twitter 1.0 and now 2.0 still give oxygen to this type of content. It’s like they are doing the bare minimum and not even trying. While the big accounts playing P-Diddy commentary and or chasing PDFs while doing collaborations through state lines with photo op get togethers are not fighting harder for this. Do you want to save the “kids” how about all you clowns start here, yes here on X.

Saved - May 6, 2025 at 5:37 AM
reSee.it AI Summary
I find it appalling how some influencers fail to recognize the irony in their self-congratulatory posts about others selling out to foreigners. Instead of exposing anything, they merely point fingers at lesser figures while ignoring their own connections to foreign entities. It’s frustrating that they don’t call out their peers who have also engaged with foreign leaders or accepted money from them. I’m left waiting for them to acknowledge this hypocrisy.

@RedTeamActual - R E D

Please, spare us the self-congratulatory scheme. It’s appalling that you fail so miserably to identify the irony of “called out influencers selling out to foreigners”. You aren’t exposing anything with “I told you so”, you’re just pointing at bottom feeder pawns while worshiping the king of this chessboard you’re currently posting on. Do I have to make it more obvious? Since we’re here, why don’t you call some of the other “influencers” you associate with that have also taken trips or meetings with these foreign leaders and or money from foreign entities? I’ll wait…

Saved - March 25, 2025 at 10:24 PM
reSee.it AI Summary
The core issue with the Signal situation is being misunderstood or downplayed by some. The argument that unclassified communications are non-issues ignores the importance of federal records retention, chain of custody, and transparency. Even off-the-record platforms like Signal should be scrutinized for government business. Just because others have evaded accountability doesn't mean we should too. We must enforce record-keeping laws to ensure oversight and accountability. Using past actions as a defense is deflection; we need to address this issue seriously and improve operational security.

@RedTeamActual - R E D

Okay, here’s the core issue with this Signal debacle. I waited 24 hours to do a write up on this and seeing how big accounts from a certain side trying to brush it off are either misunderstanding the issue or deliberately trying to pretend is a non-issue. Common theme has been, “if it’s not classified, it’s a non-issue issue” are completely misunderstanding the principles of federal records data retention, chain of custody and transparency in big brother operations. Even unclassified comms are subject to scrutiny if they involve government business period to include off the record platforms, in this case the Signal app. Just because the dems have had a free range and gotten away from accountability doesn’t mean “we” should do the same. If we can’t enforce government record keeping laws and federal records act then what’s the point in having them? The whole point of this is to preserve comms oversight, historical records, and legal accountability. X is flooded with the “former admin did worse” is pure deflection and not defense. We can’t use “well it wasn’t as bad” as a metric for wrongdoing and or incompetence. Just because the accountability bar is so low it doesn’t mean it should be optional. Do you see the issue? Parties involved need to own this clusterF and revamp their amateur OPSEC.

Saved - March 14, 2025 at 1:06 PM
reSee.it AI Summary
I’m reflecting on the chaos surrounding the hiring of what seems to be a highly incompetent lawyer by Trump. The situation with the Tate brothers shouldn't have escalated, especially with the administration seemingly involved. Now, this lawyer is scrambling to manage the fallout, but the damage is already evident, making the administration look foolish. I also want to clarify that no one manipulated the situation; the evidence is on video. The more the lies pile up, the deeper the trouble becomes.

@RedTeamActual - R E D

This is what happens when @realDonaldTrump hires what appears to be one of the most incompetent lawyers playing influencer. This shouldn’t have happened at all even if the admin which appears to be having a not so hidden hand into bringing the Tate brother to the states. Now, Gucci lawyer over here has to play damage control to save face. Damage is done, administration looks like a circus and eventually this is coming to bite them back. ….and NO, no one tried to “that was a great manipulation” no one twisted your words, look…you are on video. The mental zigzags you continue to do sink you deeper. You know, the more you lie the deeper the hole. How it started Currently 👇 👇

Video Transcript AI Summary
The speaker addresses accusations against the Tate brothers, stating they are disturbing and for the court to handle. The speaker clarifies that past comments about the Tates referred to their social media presence and potential political involvement in the UK, specifically their vocal opposition to certain things. The speaker emphasizes a separation between admiring their social media presence and condoning the serious accusations against them, including human trafficking and rape. As a lawyer, the speaker refrains from commenting on the specifics of the case but asserts that they do not condone the alleged behavior.
Full Transcript
Speaker 0: The accusations against the Tate brothers are stomach churning. They are disturbing. And, as I will say, you know, and I've said many times since then, that is, for the court to handle and they should handle it. Basically, people have told me you said you're a fan or something like that. Yeah, that was the what I said was it's some great manipulation. So the Tate brothers, you know, have a tremendous social media presence in terms of and what we were discussing with politics in The UK. He was talking about running. And, I am always passionate about people that are vocal against, certain things. Now, that is very separate. I want to be very clear than accusations of human trafficking, accusations of anything and rape, whatever the accusations are against them. You have to put that in one bucket, and that really is a very disturbing, charge. Now, I don't know the status of it. I'm also a lawyer, I know better than to talk about somebody's case. But I will say that it is there is no part of me that condones at all that behavior.
Saved - January 31, 2025 at 4:16 AM
reSee.it AI Summary
He had me until this point. Why lie about something so trivial that's all over social media and easily verifiable? You can hear the conflict in his voice, caught between different opinions. It’s a bad, bad judgment call.

@RedTeamActual - R E D

He had me until…..here. Why lie about something so trivial that has been plastered all over social media and anyone with a heartbeat can verify? You can hear the split second conflict in his voice, trying to listen to different voices telling him different things….YES, NO, YES, YES, NO, NO, WHAT… Bad, bad judgement call.

Saved - November 24, 2024 at 12:34 AM
reSee.it AI Summary
I’ve repeatedly pointed out that your ID Verification was sent 6,000 miles to AU10TIX in Israel, which is a subsidiary of ICTS International N.V. This company was founded in 1982 by ex-members of Shin Bet, Israel’s internal security agency. If you're looking to monetize, it’s ironic to criticize the same people to whom you willingly sent your biometric data, especially when you’re concerned about doxxing. The level of ignorance here is astounding.

@RedTeamActual - R E D

How many times do I have to say this. Your ID Verification was sent 6,000 miles away to AU10TIX headquartered at HaNagar 5B Street, Hod HaSharon, Israel. On top of all that, AU10TIX is a subsidiary of ICTS International N.V. Wait for it: ICTS International N.V. was founded in 1982 by former members of Shin Bet, Israel’s internal security agency. So, if you want to monetize don’t go around and nail to the wall the same people that you willingly sent your biometrics data to and complain how are these accounts are being doxxed. Stupidity levels 300%.

Saved - September 20, 2024 at 8:30 PM
reSee.it AI Summary
I've been discussing the subtle ways social media influencers can unknowingly spread disinformation, often manipulated by foreign or domestic actors. These tactics include boosting engagement through fake accounts, seeding misleading content that aligns with influencers' beliefs, and offering lucrative partnerships that promote false narratives. Influencers may also feel peer pressure from their communities to share trending topics, further amplifying disinformation. It's crucial to be aware of these dynamics, as they can lead to unwittingly serving someone else's agenda. Stay vigilant!

@RedTeamActual - R E D

Let’s talk about “Social Media Influencers” Before we start make yourself comfortable and grab your favorite snacks and or beverage. INFLUENCERS Have you ever wondered how social media influencers, the people we follow every day for advice, inspiration, or just entertainment, can end up pushing disinformation for foreign actors, sometimes without even knowing it? It’s more common than you think, and it’s a lot more subtle than you might expect. I have talked about this before that foreign actors don’t always need to make big, obvious moves to manipulate influencers; they’ve got tactics that slide under the radar. It often starts with something as simple as boosting engagement or offering sponsorship deals and or affiliations (we are familiar with those). Let’s say an influencer posts about a trending topic, maybe something political or a nerve-bashing social issue. Before long, a mysterious account starts promoting that content, retweeting or resharing it, and suddenly the post gets more traction (I have covered this through my Account Poaching posts). That influencer sees their views, likes, or followers grow, which feels good, right? What they don’t know is that some of those “boosters” could be bots, sock-puppet or fake accounts run by foreign or domestic actors, intentionally amplifying the content that serves their agenda.

@RedTeamActual - R E D

CONTENT SEEDING TECHNIQUE Foreign /Domestic actors will plant disinformation in a way that makes it seem like it’s just part of the everyday information flow. This could be through fake news articles, doctored videos, or viral memes that play into the influencer’s existing views or biases. How many times have I pointed this out? I hope you have paid attention. An “influencer”, who might be passionate about a particular issue, stumbles on this content and thinks, “Hey, this aligns with what I believe,” and shares it with their audience. What they don’t realize is that they’ve just taken the bait. They’ve unknowingly become part of a disinformation campaign that could be aimed at disrupting political events, spreading false narratives, or even weakening trust in institutions. Keep in mind that this gets amplified as we head towards finish line, in this case Election Day in November.

@RedTeamActual - R E D

TACTICS Some manipulation tactics are even more direct. Foreign / Domestic actors, posing as legitimate brands or organizations, will approach influencers with partnerships, pay per video episode with large sums of money that seem too good to be true (TENET MEDIA, anyone?) These offers might involve posting about a specific issue or promoting a particular worldview sometimes under the guise of “alternative facts” or “uncovering the truth.” The influencer gets paid, their platform grows, and all the while, they’re pushing narratives that have been carefully constructed to mislead and manipulate.

@RedTeamActual - R E D

PEER PRESSURE TACTIC Influencers often operate in tightly knit communities (DMs, Telegram, Discord, Signal rooms) and when a few key people start talking about a certain topic, others follow. Foreign actors know this and will target influencers within a certain niche, whether it’s politics, health, or even lifestyle content, creating the illusion of a trend. An influencer might see others in their circle posting about a particular issue, feel the pressure to jump on the bandwagon, and before they know it, they’re repeating talking points that originated from a foreign disinformation campaign.

@RedTeamActual - R E D

BOTS Again, I have covered this several times about the power of bots and fake followers. Bad actors use armies of fake accounts to flood an influencer’s mentions, likes, and shares, giving them the impression that their message is resonating. These bots, astroturfing accounts often reinforce specific narratives, making it seem like there’s broad public support for a particular idea when, in reality, it’s all orchestrated. This not only boosts the influencer’s confidence in what they’re sharing but also influences their real followers, who see the inflated numbers and think, “Wow, this must be legit.”……subscription flow.

@RedTeamActual - R E D

CREDIBILITY Say hello to the tactic of slowly building credibility. These actors don’t always come in hot with obvious disinformation. They’ll start with smaller, seemingly harmless engagements, maybe liking or sharing an influencer’s post here and there or even sending polite messages of support (DMs, watch out for these DMs 😎) Over time, they’ll drip-feed misinformation into the conversation, gradually steering the influencer toward sharing content that aligns with their agenda. This way, it doesn’t feel like manipulation it feels organic, like the influencer is just discovering this information themselves and passing it along to their audience.

@RedTeamActual - R E D

WRAPPED UP What’s especially dangerous is how this all plays out on social media platforms especially here on X, where engagement equals visibility. The algorithms (tired of it) are built to amplify content that gets the most reactions, and these actors know how to game that system. They’ll manipulate influencers by getting them hooked on the numbers, likes, shares, comments, and in the process, the influencers become unwitting pawns, spreading disinformation to bigger and bigger audiences. They may never even realize that they’ve been manipulated into serving someone else’s goals. Word of advise, please be careful out there and thank you for coming to my RED THREAD

Saved - August 18, 2024 at 1:56 AM
reSee.it AI Summary
I notice that many larger accounts on X focus on selling rather than genuine free speech. This account lacks original content, relying heavily on reposts and borrowed ideas, with only a few personal opinions. It seems more about monetization than meaningful contributions.

@RedTeamActual - R E D

Who do they repost? This account is what a lot of these bigger accounts on X are, always selling you something. For many, it was free-speech until monetized. Then it becomes narrative-speech. This account has absolutely nothing of value, zero original content. Everything is reposted, borrowed and or regurgitated from others with few opinion pieces sprinkled here and there. This account is trying to sell you know how and use OSINT using google / Grok to create posts for X and get monetized.

Saved - August 10, 2024 at 9:03 PM
reSee.it AI Summary
I had different plans for this, part of a larger project with @The1Parzival. Here’s a quick dry run despite my limited time and poor cell service. It reveals everything you need to know about the characters involved. There's more, but it's all the same people.

@RedTeamActual - R E D

Who Subscribes to Who I had different plans for this and is part of a larger project that I am working with @The1Parzival. Anyways, here is quick dry run with the little time I have and questionable cell service. This tells you everything you need to know. You are smart enough to put two and two together. This is who is who in the zoo. Note: There’s more a lot more but it’s all irrelevant since it’s all the same characters that show up on this.

Video Transcript AI Summary
The speaker talks about confronting those who betray and deceive, warning to protect loved ones. They criticize others for their behavior and question their motives. The speaker challenges societal norms and calls out hypocrisy, urging listeners to recognize the truth. The message emphasizes the importance of standing up against falsehoods and running from danger.
Full Transcript
Speaker 0: Beat your ass and have the bible if god watches. Sometimes you gotta pop out and show niggas. So the go to cell black 1. To any bitch that talk to him and they ain't love, just make sure you hide your little sister from him. They tell me Charles the only one that get your hand me downs and party at the party playing with his nose now. And Baca got a weird case where I see around, certified lover boy, certified pedophiles. Now fuck them up. I'm a do my stuff. Why you chilling like a bitch? Ain't you tired? Trying to strike a chord and it's probably a minor. They not like us. They not like us. Chin music and I won't pass the odds, aye How many stocks do I really have in stock, aye 1, 2, 3, 4, 5, plus 5, aye Devil is a lie here 69, god, aye Freaky mecca building railroads and trains. Bear with me for a second. Let me put y'all on theme. The settlers will choose a town folk to make them rich or fast forward. 2024, you got the same agenda. You run to Atlanta when you need a check balance. Let me break it down for you. This is the real nigger challenge. You caught future when you didn't see the club. Like, white little baby hubby get your mingle up. White 21, get your far but Eli, you run to Atlanta where you need a Speaker 1: few dollars. No. You're not Speaker 0: a colleague. You're a fucking colonizer. The family matter and the truth for the matter. Here was God's plan to show y'all the liar. He a fan. Here's 69 god. Freaky ass, nigga, here's 69 god. Freaky ass, nigga, here's 69 god. Freaky ass, nigga, here's 69 god. Freaky ass, nigga, here's 69 god. Freaky ass, nigga, here's 69 god. Hey. Hey. Hey. Hey. Run for your life. Hey. Hey. Hey. Run for your life. Run for your life. Say o v hoe. Then step this way. Step that way. Then step this way. Step that way.
Saved - July 9, 2024 at 11:58 AM

@RedTeamActual - R E D

Twitter 1.0 / 2.0 Short Documentary https://t.co/heTgyrsSqf

Video Transcript AI Summary
Twitter's power to shape narratives and influence public opinion comes with a responsibility to uphold free speech. However, allegations of censorship have circulated, particularly from the political right. The release of the Twitter files by Elon Musk exposed a complex system of rules and algorithms designed to police content. Shadow banning, algorithm manipulation, and the lack of transparency and accountability have raised concerns about Twitter's true intentions. Evidence suggests that the platform's algorithms favor certain viewpoints, impacting the information ecosystem and shaping public perception. The Twitter files also revealed a cozy relationship between Twitter and government agencies, raising concerns about censorship as a tool to silence dissent. The revelations have ignited a debate about the future of free speech in the digital age.
Full Transcript
Speaker 0: In Among these platforms, Twitter and now X used to stand as a titan, a global forum where everyday citizens, celebrities, and world leaders converge to engage in real time conversations. With every tweet, retweet, and hashtag, Twitter shapes narratives, influences public opinion, and even sways the course of history. The social media conglomerates power to connect and amplify voices is undeniable making them a force to be reckoned with with in the digital age. However, this immense power comes with a profound responsibility. The duty to uphold the principles of free speech and open dialogue the very foundation of a functioning democracy rests on the free exchange of ideas even those that are controversial or uncomfortable when this fundamental right is threatened the consequences can be dire eroding trust stifling dissent and ultimately jeopardizing the health of our democratic institutions. As we navigate this complex digital landscape, it is crucial to ask ourselves, are these platforms truly living up to their responsibility as guardians of free speech? Or are they under the guise of combating misinformation and promoting safety, subtly manipulating the flow of information to serve hidden agendas? This short documentary aims to answer these critical questions by delving into the shadowy world of Twitter's ex censorship algorithms. For years, whispers of censorship have circulated within the Twitterverse. Users, particularly those on the political right, alleged their voices are being silenced and their perspectives suppressed. Shadow bans, trending algorithm manipulation and the trust and safety council are central to the debate. The release of the Twitter files by Elon Musk has provided an unprecedented glimpse behind the curtain. A complex web of rules and automated systems designed to police content is now exposed. This documentary embarks on a journey to unravel these censorship mechanisms and their impact. Imagine a vast digital library containing billions upon billions of tweets, each 1 a whisper in the grand cacophony of the internet. Now, picture a team of librarians tasked with sifting through this endless stream of information, identifying and silencing certain voices deemed undesirable. This in essence is the role of Twitter's censorship algorithms, a complex network of automated systems designed to police content and control unprecedented access to users that can read between the lines and journalists unprecedented access to the inner workings of these systems. Like archaeologists unearthing ancient artifacts, is now laid bare for the world to see, revealing the intricate machinery that underpins Twitter's content moderation policies. The concept of shadow banning is insidious, operating without user knowledge. Imagine crafting a tweet only for it to disappear unseen by most followers. This is the reality for many users caught in Twitter's shadow banning net. Twitter can arbitrarily silence voices without justification. Users are silenced by an opaque algorithm with no recourse for justice. The revelations gleaned from Twitter's source code paint a troubling picture of a platform that appears to be actively working to suppress certain viewpoints. While Twitter maintained that its content moderation policies were designed to combat misinformation and promote healthy discourse, the evidence suggests a more insidious agenda was at play. The sheer volume of labels used to target users, the opaque nature of the shadow banning system and the lack of transparency and accountability, all point to a platform that was more interested in controlling the narrative than fostering open dialogue. This is particularly concerning given Twitter's immense influence in shaping public opinion and influencing political discourse. When a platform with such far reaching power engages in censorship, expressing dissenting opinions for fear of being silenced or ostracized. This ultimately undermines the very foundation of a healthy democracy, where the free exchange of ideas, even those that are controversial or unpopular is essential. The question then arises, is Twitter system now rigged? The evidence suggests that the platform's algorithms are designed to favor certain viewpoints over others. This bias, whether intentional or not, has a profound impact on the information ecosystem, shaping narratives and influencing public perception in ways that are often invisible to the average user. The release of the Twitter files, a trove of internal documents and communications made public by Elon Musk sent shock waves through the tech world. These files exposed a pattern of censorship and manipulation at the highest levels of Twitter. The Twitter files provided a smoking gun, a clear view into the machinery of digital suppression and manipulation. Among the revelations was a secret blacklist where disfavored accounts were banished. These accounts were subjected to digital exile, their reach limited and voices stifled. The blacklist was a calculated attempt to silence dissenting viewpoints. The Twitter files also exposed a cozy relationship between the platform and government agencies. What was once a conspiracy theory was now undeniable reality, laid bare in internal emails and Slack messages. The Twitter files revealed mechanisms to silence dissenting voices, including shadow banning, algorithmic manipulation, and account suspensions. Visibility filters made tweets virtually invisible, frustrating users as their tweets disappeared into a digital black hole. Not only did Twitter apply labels to accounts, but they also applied labels to individual tweets. This served to further reduce the reach of conservative accounts like those shown above. Trend suppression controlled online conversations and arbitrary suspension silenced high profile accounts. These tweet safety labels reduced visibility on some of the most important information for the public regarding COVID 19 and elections. We can see these overreaching labels here for misinfo COVID 19, misinfo COVID 19 vaccine, misinfo US elections. Section 3, uneven application of safety. Perhaps the most troubling aspect of the Twitter files was the revelation that these censorship practices were applied unevenly, disproportionately targeting conservative voices and viewpoints. While Twitter claimed to be impartial in its content moderation, the evidence told a different story. Accounts promoting left leaning ideologies, even those engaging in hateful rhetoric or spreading demonstrably false information, often escaped scrutiny, while their conservative counterparts were routinely flagged, shadow banned, or This double standard eroded trust in the platform and fueled accusations of political bias. The Twitter file showed that the platform's definition of harm was often malleable and subjective, applied inconsistently and seemingly influenced by the political leanings of those in charge. This raised serious concerns about the potential for censorship to be used as a tool to silence dissent and shape public opinion. The revelations of the Twitter files had a profound impact on the public's understanding of social media censorship. Truly open and democratic internet had just begun. Section 1, labels in the code. The Twitter files provided a roadmap into social media censorship. The source code confirmed the chilling reality. Hidden within lines of code were the labels, the filters, the algorithms. This was cold hard evidence embedded within the platform. Recent abuse strike trends blacklist do not amplify are hard coded into Twitters and carried over to X's system. The code confirmed their existence and chilling effectiveness. Labels like misinfo COVID 19 and misinfo US elections signaled suppression. The source code didn't lie. It corroborated the findings by Twitter user, the Parzival, providing evidence of manipulation. Twitter was a crime scene of epic proportions. Section 2, algorithmic suppression. Twitter's censorship went far beyond labeling accounts and tweets. A sophisticated system of algorithmic manipulation determined what users saw and how they perceived the world. It created an invisible architecture of control, shaping the online experience. The visibility filter could make an account or tweet virtually disappear. Imagine your tweet sinking like a stone garnering no engagement. This was was the visibility filter at work suppressing disfavored voices. The illusion of choice. The source code exposed the unsettling reality that on Twitter, free speech was often an illusion. Algorithms acted as invisible gatekeepers deciding which voices were amplified or suppressed. This manipulation extended even to the trending section. Engineers could manually manipulate trends, promoting certain topics while suppressing others it was about controlling conversations, creating an echo chamber where dissenting voices were drowned out. Stifling the debate. Twitter's censorship apparatus chills those who cherish open dialogue and free exchange of ideas. It's about stifling debates, suppressing information and manipulating knowledge flow. Twitter's censorship has profound consequences for public discourse. Imagine a public square where certain topics are off limits and dissenting opinions are hushed. This is the digital reality created by Twitter's censorship algorithms. Suppression of dissenting voices creates an echo chamber where confirmation bias reigns. Users are bombarded with reinforcing information while opposing views are filtered out. The COVID 19 pandemic showed how Twitter's censorship shaped public perception and stifled dissent. Under the guise of combating misinformation, Twitter silenced voices questioning the official narrative. Doctors and researchers citing studies were shadow banned or banned. This suppression hindered public discourse and eroded trust in health authority. The pandemic exposed the fragility of free speech in the digital age by spreading fear and misinformation. Section 3, undermining democratic processes. Twitter's censorship apparatus can undermine democratic processes and influence elections. Social media shapes public opinion and mobilizes voters, giving platforms like Twitter and add others dangerous power. The Twitter files revealed interference in the 2020 US election by suppressing the Hunter Biden laptop story followed by other platforms. Censorship algorithms can disproportionately silence certain viewpoints. This chills political discourse, discouraging open debate. In a democracy, citizens should express political views without fear of censorship Platforms like Twitter undermine democracy by silencing dissenting voices and manipulating information. The social credit system. Labels like scarlet letters branded undesirable content and accounts. Deep within Twitter, a social credit score system echoed the surveillance state in China. Every user was subjected to this invisible scoring system. User mass score reputation score also knows as tweet creed. Toxicity score follow score judgments determining their place. A high score meant increased visibility. A low score could mute your voice. Algorithms rewarded conformity and punished dissent. Dissenting opinions led to plummeting scores. Additionally, Twitter 1.0 also went beyond just censoring individual users, but censored entire groups, mainly conservatives, by using a clustering method. By grouping these accounts in clusters, they were able to silence entire groups and topics users began to self censor, creating a sanitized public square. As if these censorship mechanisms weren't enough, there is actually code for a government request to intervene on matters they consider misinformation. We can also see the code that was directly responsible for suspending and silencing the sitting president of the United States, Donald j Trump. Section 2. Invisible punishment. The mechanics of shadow banning. Of all the censorship tools at Twitter's disposal, none were as insidious or as effective as shadow banning. This digital blacklisting often invisible to the user allowed the platform to silence dissenting voices without overt censorship. The source code revealed the intricate mechanics of this shadow banning system. Imagine pouring your heart into a tweet, hitting send, and then watching as it disappears into the digital ether. Your followers, oblivious, scroll past. Their feeds curated by algorithms. This was the reality for countless users caught in Twitter's shadow banning net. They weren't banned, they were just made to disappear. The source code revealed a complex web of triggers that could result in a a shadow ban. Certain keywords, hashtags, and even the accounts a user followed could raise red flags, express an opinion deemed unfavorable, often unaware, were left to grapple with plummeting engagement. This lack of transparency made it impossible to challenge the shadow ban. It was a system designed to silence descent through obscurity the cumulative effect of Twitter's censorship apparatus was the creation of a digital echo chamber, a carefully curated information bubble. Users surrounded by like minded individuals were increasingly isolated from opposing viewpoints. This balkanization of the digital public square had a corrosive effect on trust. Trust in institutions eroded by the constant barrage of one-sided information. The erosion of trust extended beyond the digital realm spilling over into the real world. The time has come to dismantle these echo chambers and reclaim civil discourse. Twitter 1.0 censorship extended beyond individual accounts. It targeted entire groups based on shared interests. Clustering identified and suppressed groups silencing entire conversations. The source code revealed clusters linked by shared attributes. Algorithms detected subtle patterns forming distinct clusters. Once identified, clusters were targeted for suppression. Their reach and visibility were limited, effectively silencing them. Twitter 1.0 targeted entire networks of influence, shaping online discourse. It wasn't just about silencing voices, it was about controlling information flow. Political movements were stifled maintaining the status quo. The digital public square became a controlled environment. The fight for free speech is about safeguarding networks and communities. The source code of Twitter 1.0 revealed a chilling truth. It was actively collaborating with government agencies to silence dissenting voices. Hidden within the code were provisions for government requests to flag content. These requests operated in the shadows hidden from public view. Their existence eroded free speech in the digital age. The source code revealed a disturbing trend, the weaponization of misinformation for government censorship, Dissent reframed as disinformation, criticism as a threat. Tweets questioning policies were flagged, authors targeted. The consequences are profound, chilling free speech. Twitter, 1.0, in its quest to curate the perfect digital public square, went beyond silencing dissenting voices. It took upon itself the mantle of moral arbiter, appointing itself the guardian of online decency. These models, like digital sentinels, filtered content deemed harmful or offensive. Algorithms trained on vast data sets pass judgment on the appropriateness of every tweet. Twitter's transparency was an illusion. The reality was far more opaque. Keywords and algorithms were shrouded in secrecy, leaving users guessing. This fueled suspicion and distrust, leading many to believe in hidden agendas. The source code offered only glimpses into these models. The toxicity models keyword list was a closely guarded secret. This secrecy allowed for potential manipulation and bias. The lack of transparency extended beyond algorithms. Moderators operated in secrecy, their decisions opaque. The result was a digital public square with shifting rules and self censorship. Twitter's censorship apparatus from shadow banning to government collaboration has shaken public trust in social media. Once seen as neutral, social media is now viewed with suspicion and its actions scrutinized. This erosion of trust raises profound questions about the future of free speech in the digital age. Platforms like Twitter must be transparent and accountable to their users. They must safeguard free speech and prevent manipulation of public opinion. Yet, Twitter 1.0 violated this trust, manipulating algorithms and collaborating with government agencies. The consequences are profound, breeding cynicism and making it harder to discern truth. The revelations of Twitter's censorship apparatus have ignited a fierce debate about the future of free speech in the digital age. Despite rebranding efforts and promises of innovation, the underlying code that drives x still largely mirrors that of its predecessor. More concerning is the continued suppression of free speech, with numerous instances of content moderation and censorship stifling diverse voices. How do you keep current voices from raising concerns? You pay them through monetization. You monetize the platform and create paid patriots on both sides of the political spectrum by occasionally tipping the scales on 1 side. These accounts are easy to spot and are bound by payouts. The gates of Twitter 1.0 still remain. With x, you now have different gatekeepers. These gatekeepers self correct each other within the platform. Driven by payouts and armed with huge amount of followers, narratives through the guide of the algorithm. As it currently stands, the algo is fairly easy to abuse. Anyone can mass report any account among other ways. This absolves the platform from public outcry as the actions rely on the groups mentioned above. Hands clean in the public eye is the name of the game. As technology evolves, balancing free expression with combating misinformation and online harms is a pressing issue. Some argue for greater government regulation to hold platforms accountable. Others contend that regulation stifles innovation and empowers sensors. Transparency and accountability within the tech industry could be the answer. The path forward is fraught with complexity and uncertainty. The future of of free speech depends on engaging in difficult conversations and finding common ground. No matter which side you are on, your voices deserve to be heard. Our journey into the heart of Twitter's censorship apparatus has revealed a disturbing truth. The digital public square, once hailed as a bastion of free speech, has been compromised. Algorithms shape narratives, suppress dissent, and manipulate information. The Twitter files reveal a company straying from its mission. Shadow banning and opaque trust and safety models erode public trust. The battle for the digital public square is about our democracy. When dissenting voices are silenced, our democracy suffers. We cannot stand idly by as the digital public squares eroded by censorship, manipulation, and the abuse of power. Don't turn a blind eye because you are getting paid. Don't let social media platforms turn you into something that you are not. Stay true to yourself and your beliefs. The time has come for a collective awakening. We must demand transparency. The algorithms that govern our online lives should not operate in the shadows. Social media platforms must be more transparent about their content moderation policies. We deserve to know how our information is being filtered, manipulated, and suppressed. When platforms engage in censorship, free speech without transparency. We must demand a free speech without transparency. We must demand a digital public square that is truly open and inclusive. Embrace intellectual diversity and foster a culture of respectful dialogue, support organizations that fight for digital rights and hold officials accountable. The battle for the digital public square is worth fighting. The future of our democracy and freedom depend always research, educate yourself, question narratives, and verify information, and don't blindly follow. As always, stay true, stay awesome, and don't forget who you are.
Saved - June 29, 2024 at 8:21 PM
reSee.it AI Summary
I noticed that biometric data is being monetized through X. AU10TIX/ICTS & STRIPE are involved. Only a few accounts, including @The1Parzival, have raised this issue consistently. Facts don't take sides, they are just facts.

@RedTeamActual - R E D

Biometric Data and being Monetized through X. AU10TIX/ICTS & STRIPE Besides myself there were only few accounts that brought this issue up. Especially @The1Parzival for being consistent on highlighting certain issues that get overlooked. Facts are not pretty, they are just facts and take no sides.

Video Transcript AI Summary
Biometric data use raises concerns about privacy and security. Companies like AU 10 ticks, linked to Israeli intelligence, verify identities using biometric data. X partners with Stripe for US users to avoid sharing data with foreign entities. Despite security measures, breaches are possible, emphasizing the need for vigilance. Stay informed, monitor accounts, and be cautious with third-party connections. Protect your digital identity as platforms evolve to balance opportunities and risks. Security is a shared responsibility in the digital world.
Full Transcript
Speaker 0: Biometric data is becoming a cornerstone of identity verification. Here's why you should be concerned about its implications. AU 10 ticks, an Israeli identity solutions company, is a subsidiary of ICTS International with connections to Israeli intelligence. They work with the likes of Google, Uber and PayPal and as of late with X by integrating advanced technologies and identity verification. These companies use your biometric data to verify identities, ensuring a higher level of security. While they claim to ensure high accuracy and security, the reality can sometimes be different. These measures are meant to prevent identity theft and fraud, safeguarding your personal information. They do this by leveraging generative AI, which enhances their security protocols, making them more robust. However, handling vast amounts of personal data comes with inherent risks and challenges. What if your data is not as secure as you think? How severe could the consequences be? While stringent verification processes aim to ensure legitimate users are accurately identified, the potential for misuse remains a concern. Companies such as this, based in tech hubs like Israel, are at the forefront of these practices, leading the way in innovation. At least they use this as leverage and selling point. So when you trust your identity to these companies, think about the broader implications. Consider the significant implications of their biometric data practices and how they affect you. A lot of these practices are obscure, which brings me to x, where you are required to provide a copy of your driver's license, which contains a barcode containing all your encoded information. That information varies by the issuing authority. A lot of x users highlighted the fact that AU 10 ticks, a key player in this field, is linked to Israeli intelligence company raising further concerns about data privacy. However, in a, not so surprising turn of events, Elon Musk's X has decided to make few small changes. Instead, X has now partnered with Stripe for US creators only, while leaving the non US global market still on Israeli servers This change means that users in US can now monetize their X accounts without submitting sensitive biometric data to an Israeli company. Unfortunately, the majority of users already sent their data 5, 700 miles away to Middle East in 40 milliseconds. While AU 10 ticks is known for its advanced identity verification technologies, this move alleviates some of the privacy concerns tied to sharing biometric data with a foreign entity with intelligence tied. So, what does this shift mean for you? The user? By using Stripe. Also a data controller, X aims to streamline the monetization process while mitigating some of the risks associated with biometric data sharing. This could potentially ease your worries about who has access to your most sensitive information. Stripe brings its own set of security measures and protocols designed to protect your financial data. As a trusted name in the Fintech world, Stripe has a proven track record of safeguarding user information. Hold on. Not so fast. And remember, no system is entirely foolproof. It's essential to stay informed about how your data is being managed and to take proactive steps in securing your digital identity. With this partnership, x is taking a significant step towards enhancing user trust and maintaining a secure environment for all. However, it's crucial to remain vigilant and understand the broader implications of these changes. Your digital identity is valuable and protecting it should always be a priority. The shift to Stripe marks a new chapter for x users, 1 that promises both opportunities and challenges. Stay informed, stay secure and always be cautious about where and how your data is being used. While Stripe has implemented strong security measures, it is not immune to breaches. Specific details of major breaches in 2024 are not widely reported, but the general environment of cybersecurity shows that even highly secure platforms face constant threats and attacks. Payment platforms like Stripe are particularly targeted due to the sensitive financial data they handle. A significant issue highlighted is the potential for API keys to be exploited if exposed, which can lead to unauthorized access to sensitive information. This means that even as x moves towards a more secure and user friendly platform, the risk of data breaches persists. For you, the user, this underscores the importance of staying vigilant. Regularly monitor your accounts for any unusual activity and be cautious about the 3rd party apps and services that you connect to your X account. Remember, digital security is a shared responsibility. While platforms like X and Stripe work tirelessly, at least that's what they claim. To protect your data, you should ask yourself if monetization is worth it as reality can be deceiving. Stay informed, stay secure, and always be cautious about where and how your data is being used. Your digital security is paramount and in this connected world, a little caution goes a long way.
View Full Interactive Feed