TruthArchive.ai - Tweets Saved By @TrueOnX

Saved - December 28, 2025 at 10:43 PM
reSee.it AI Summary
I realize awakening isn’t safety but a terrifying clarity of where humanity heads if I abandon conscience and courage. The machinery moves; awareness alone won’t halt it. Understanding must become responsibility, or catastrophe follows. Excuses expire; I can no longer claim innocence or distance. To see the path and continue is consent. We must translate moral clarity into action, or it becomes passivity. This is the start of accountability. Tik Tok, time is running out.

@TrueOnX - Noah

🚨 WARNING: This Hits Hard! What is being revealed is not that the course has been halted, but that it has been exposed. To awaken is not to discover that the danger has passed... It is to realize, with terrifying clarity, what humanity is being led toward if it continues to abdicate conscience, courage, and moral agency. The trajectory remains active and the machinery is still in motion... Nothing stops it automatically, and nothing stops it by awareness alone. Understanding arrives first and responsibility must follow or catastrophe does. The hour of awakening is therefore not the moment of safety, but the moment of decision. It is the point at which excuses expire... One can no longer claim ignorance, innocence, or distance. To see the path and continue down it is no longer deception; it is consent. History is unambiguous on this point... Every system of domination, surveillance, and control has required the same fuel: compliance disguised as normalcy, obedience mislabeled as peace, and silence reframed as virtue. Prisons are never imposed all at once... They are assembled gradually, justified incrementally, and entered willingly by those who prefer comfort over confrontation. If people do not stand for what is right, not rhetorically but concretely, not online but in lived refusal, then no tyrant is required. We will construct the walls ourselves, defend them ourselves, and call them safety. This is why awakening is insufficient on its own... Moral clarity must translate into action, or it becomes another form of passivity. Truth that does not move the will does not liberate; it merely informs the descent. The moment humanity realizes what is at stake is not the end of the struggle... It is the beginning of accountability. ⏰ Tik Tok, time is running out.

Video Transcript AI Summary
The first speaker describes waking with a strong premonition and attempting to prepare for a walk, hoping to figure out what is happening to them. They mention that a verse came to them that they believe will shed light for others. The second speaker presents a long, quotable passage about a hidden agenda. It claims that “we will” keep lives short and minds weak while pretending the opposite, using science and technology in subtle ways so people do not see what is happening. It asserts that poisons will be distributed through food, water, air, and everyday products, including “soft metals, aging accelerators, and sedatives.” People will be covered in poisons wherever they turn, and soft metals will cause them to lose their minds. A cure will be promised but poison will be increased. Chemical poisons will be absorbed through the skin by those who trust hygiene and beauty products, presented by actors and musicians as eternal youth. Through the mouth, minds and internal organs will be destroyed, including reproduction, while children will be born disabled and deformed, with information hidden. Poisons will be hidden in everything around people—drinks, foods, breaths, and wearables. Distribution will be ingenious because people can see far. They will be taught that poisons are good through TV visuals and music. People who look for them will be aided. People will be enrolled to push poisons; products will be shown in films, making them seem normal and with no apparent effects. At birth, poisons will be injected into children’s blood, with the claim that it is helping. The plan starts earlier when minds are young, targeting children with what they love most: sweet things. Teeth will decay, and metals will be used to fill them, killing minds and stealing futures. As learning declines, more drugs will be created to worsen health, producing sickness that spawns additional drugs. The aim is to make people docile and weak, leading to depression, slowness, and obesity, and when help is sought, more poison will be given. The focus will be on money and material goods to sever inner connection. Distraction will come through fornication and external pleasures, preventing unity. Minds will belong to the manipulators, who will alter lives with technology if needed. Fear will be used as a weapon; governments will be established and opposition created, with “our” control over both sides. The plan is to hide the goal while it progresses; people will do the work and be exploited for profit. Families will not mix; there will be killings and wars to sustain control. People will be divided by dogma and religion; all aspects of life will be controlled, with false kindness and guided self-belief. They will ignite hatred to keep leadership, causing neighbors to kill neighbors, bathed in blood, while the true culprits remain unseen. Media ownership will direct information and emotions; rising up will be crushed, as “they” are less than insects. The first speaker then speaks about conversations with others regarding a hidden agenda on Earth, expressing shock at the depravity but choosing to share love and light, planting seeds for awareness, urging others to wake up and question reality. They acknowledge not knowing the source but feel drawn to this message, insisting that the matrix keeps people imprisoned in fear.
Full Transcript
Speaker 0: This morning, I just woke up, and it just came on me very strongly. And, I was trying to get ready to go for a walk. I thought I'm gonna go for a walk, and I'm gonna try to figure out what's happening for me. And then before I got there, I went on such a something anyway. I I got this verse, and I'm gonna read it to you because I think that it's it will shed some light on some things for some people, I think. Okay. Speaker 1: So I've managed to compose myself, and, now I'm going to read what I have read this morning that upset me to, that extent. So here it is. We will keep their lives short and their minds weak while pretending to do the opposite. We will use our knowledge of science and technology in subtle ways so that they never see what is happening. We will use soft metals, aging accelerators, and sedatives in food and water as well as in the air. They will be covered in poisons wherever they turn. The soft metals will make them lose their minds. We will promise to find a cure from our many thumbs, and yet we will give them more poison. Chemical poisons will be absorbed through the skin of idiots who believe that certain hygiene and beauty products presented by great actors and musicians will be eternal youth to their faces and bodies. And through their thirsty and hungry mouths, we will destroy their minds and systems of internal organs, reproduction. However, their children will be born as disabled and deformed, and we will hide this information. The poisons will be hidden in everything around them, in what they drink, eat, breathe, and wear. We have to be ingenious in distributing poisons because they can see far. We'll teach them that poisons are good with funny pictures and musical tones on TV. Those who are looking for them will be helpful. We will will enroll them to push our poisons. They will see that our products are used in film, and they will get used to them, and they will never know their true effect. When they give birth, we will inject poisons into the blood of their children and convince them that we are helping them. We will start earlier when their minds are young, and we will target their children with what children love most, sweet things. When their teeth decay, we will fill them with metals that kill their minds and steal their future. And when their ability to learn has been affected, we'll create more drugs that will make them sicker and cause them other illnesses for which we will create even more drugs. We will make them docile and weak before us by our power. They will grow depressed, slow, and obese. And when they come for us to help, we will give them more poison. We will focus our attention on money and material goods so they never connect with their inner self. We will distract them with fornication, external pleasures so that they are never one with the unity of all. Their minds will belong to us, and they will do as we say. And if they refuse, we will find ways to implement technologies that alters the mind in their lives. We will use fear as a weapon. We will establish their governments, and we will establish opposition within them. We will own both sides. We will always hide our goal, but we will continue our plan. They will do the work for us, and we will prosper from their toil. Our families will never mix with theirs in our blood. It must be pure because it is. We will make them kill each other when they oppose us. We will keep them separate from unity through dogma and religion, and we will control all aspects of their lives and tell them what to think and how. We will guide them kindly and let them believe that they are guiding themselves. We will instigate animosity among them through our factions. When a light shines among them, we will extinguish it by mockery or death, whichever suits us. We will make them tear their hearts apart and kill their own children. We will accomplish this using hatred as our ally, anger as our friend. Hatred will completely blind them, and they will never see that in their conflicts, we will be their leaders. They will be killing each other. They will bathe in their own blood and kill their neighbors as long as we see that they are against us. We will benefit greatly from this for they will not see us for they cannot see us. We will continue to prosper from their wars and their deaths. We will repeat this until our ultimate goal is achieved. We will continue to make them live in fear and anger, and we will give them images and sounds. We will use all tools we have to achieve this. The tools will be provided by their work, and we will make them hate themselves and their neighbors. We will always hide the divine truth from them that we are all one. That he must never know. They must never know that color is an illusion. They must always believe that they are not equal. And drop by drop by drop by drop, we will advance our goal. We will take over their lands and resources and wealth to exercise control over them. We will trick them into story to the world because we own all media. We will use this media to control the flow of information and their feelings in our favor. When they rise up against us, we will crush them like insects because they are less than that. They will be helpless to do anything about it. Wow. So I've spoken to quite a few quite a few of you about the hidden agenda that we see here on earth and the fact that we've been conditioned for a really long period of our lives. I'm only just coming into this knowledge and honestly as you can see I'm overwhelmed by just the depravity of it, but I can't get stuck in that. I need to continue just sharing love and light and trying to plant seeds for everyone to know that we seriously don't have to live like this anymore. Like, people wake up wake up and really just start questioning how reality here. Like, I can't make anyone I can't make anyone see what they can't see because you don't know what you know until you know it. But I hope that some of you at least can listen to this, and I don't even know where this came from, but it has come to me. And now I'm giving it to you because I resonated with like, from here. I'm like, this is what they're doing. This is what this face fake matrix is doing to us. You know? Like, it's keeping us imprisoned in fear.

@TrueOnX - Noah

🚨 PAY ATTENTION: The Only Two Videos You Need to Watch to Understand What's Really Going on. "The best way to gain control of the most intelligent powerful species on the planet would be to completely divide them from the love within themselves. As soon as they are old enough to begin creating and understanding who they are. Force them into a system that teaches them that it is wrong to be yourself if yourself is different from what is accepted as normal. Confuse them about their own biological makeups so that they think that permanently altering their bodies is the answer to happiness. Require their daily attendance at an institution that makes them focus only on the information that is provided. Make them attend that institution from age 5 until an adult and repeatedly test them on the information so that it becomes their truth. Give them an explanation to everything so that they never have a chance to make their own assumptions of the world. Scold them and humiliate them if they suggest an opinion that opposes that of their authorities by reminding them of how cruel their ancestors were to each other in the past and broadcast how cruel they are to each other in the present. Only show them tragedies on the news so that they live in fear and think the worst of one another. Convince them that their species used to be that of an Incognizant wild animal make them think their very existence is so incredibly random that they lack purpose and struggle to make sense of a creator. Tell them that their kind is as smart as they've ever been so that they don't question the integrity of the system that they're in. Provide them idols with artificial beauty and use them as examples of what it is to look perfect so that they are never content with their own appearance and can't help but to compare themselves amongst each other. Create addictive digital platforms that rank them by numbers so that they base their self-worth off of the amount of followers that they have and are never satisfied."

Video Transcript AI Summary
Speaker 0: The most intelligent, powerful species on the planet would be completely divided from the love within themselves. From the moment they are old enough to understand who they are, they are forced into a system that teaches it is wrong to be themselves if themselves differs from what is accepted as normal. They are confused about their own biological makeup so that permanently altering their body is the answer to happiness. They are required to attend an institution from age five until adulthood, where they focus only on the provided information and are repeatedly tested so that it becomes their truth. They are given an explanation to everything so they never have a chance to make their own assumptions of the world. They are scolded and humiliated if they suggest an opinion that opposes authorities. They are reminded of how cruel their ancestors were to each other in the past and the present, and only tragic events on the news are broadcast so they live in fear and think the worst of one another. They are convinced that their species used to be that of an incognizant wild animal. They are made to think their existence is incredibly random, lacking purpose, while being told they are as smart as they’ve ever been so they don’t question the integrity of the system. They are provided idols with artificial beauty and use them as examples of perfection so they are never content with their own appearance and constantly compare themselves. They are given addictive digital platforms that rank them by numbers, causing self-worth to be based on follower counts and leaving them never satisfied. A society is built where those with money benefit and those without fail. Money becomes the main focus, but it is made so difficult to accumulate that they remain in constant struggle, dedicating the majority of their time to the system that created it. They are taxed in every possible way, but told it is for their own benefit so they accept it without question. They have so much time and energy diverted through the week that two days are given to themselves to feel a reward and not fight back. They are exposed to the promotion of poison in every social setting so that even on those two days they remain disconnected from themselves and each other. Their food is pumped with excess sugars and addictive chemicals, but it is cheap, advertised, and easily accessible so they never stop consuming. When their food makes them ill, they are prescribed medication that only masks the symptoms, leading to daily dependency. They are charged so much for health care that they stay in a constant loop of consuming, medicating, and working. They experience chaos among themselves and blame it on a group of their own, forming judgmental stereotypes. They are turned against each other in so many ways.
Full Transcript
Speaker 0: In control of the most intelligent, powerful species on the planet would be to completely divide them from the love within themselves. As soon as they are old enough to begin creating an understanding of who they are, force them into a system that teaches them that it is wrong to be yourself if yourself is different from what is accepted as normal. Confuse them about their own biological makeup so that they think that permanently altering their body is the answer to happiness. Require their daily attendance at an institution that makes them focus only on the information that is provided. Make them attend that institution from age five until an adult and repeatedly test them on the information so that it becomes their truth. Give them an explanation to everything so that they never have a chance to make their own assumptions of the world. Scold them and humiliate them if they suggest an opinion that opposes that of their authorities. Keep reminding them of how cruel their ancestors were to each other in the past and broadcast how cruel they are to each other in the present. Only show them tragedies on the news so they live in fear and think the worst of one another. Convince them that their species used to be that of an incognizant wild animal. Make them think that their very existence is so incredibly random that they lack purpose and struggle to make sense of a creator. Tell them that their kind is as smart as they've ever been so that they don't question the integrity of the system that they're in. Provide them idols with artificial beauty and use them as examples of what it is to look perfect so that they are never content with their own appearance and can't help but to compare themselves amongst each other. Create addictive digital platforms that rank them by numbers so that they base their self worth off of the amount of followers that they have and are never satisfied. Build a society around them in which those who have money benefit and those who don't fail. Make money their main focus, but make it so difficult to accumulate that they remain in a place of constant struggle, forced to dedicate the majority of their time to the system that made it this way. Tax them in every way possible, but tell them that it's for their own benefit so that they don't think twice about paying it. Take so much of their time and energy throughout the week, but give them two days to themselves so they feel a sense of reward and don't fight back. Promote the consumption of poison in every social setting so that even on those two days, they remain disconnected from themselves and each other. Pump their food with excess sugars and addictive chemicals, but make it cheap, advertised, and easily accessible so that they never stop consuming. When their food makes them ill, prescribe them medication that only masks the symptoms so that they become dependent on it every day. Charge them so much money for health care so that they stay in a constant loop of consuming, medicating, and working. Cause chaos amongst them and blame it on a group of their own so that they form judgmental stereotypes. Turn them against each other in so many ways

@TrueOnX - Noah

📜 THE SECRET COVENANT by John D Rockefeller 🩸 👹 Luciferian Blood Oath Pact When will humans wake up? © Dana Horochowski

Saved - December 28, 2025 at 10:25 PM

@TrueOnX - Noah

📜 THE SECRET COVENANT by John D Rockefeller 🩸 👹 Luciferian Blood Oath Pact When will humans wake up? © Dana Horochowski https://t.co/GOFb0kqV0y

Video Transcript AI Summary
Dana Horchowski introduces, on 10/09/2009, that she will read the “secret covenant,” a text dedicated to the Jesuits, the high Freemasons, the high Knights of Columbus, and others pledged to Luciferians and secret societies. The covenant describes an illusion so vast it will escape perception; those who see it will be thought insane. It states that separate fronts will be created to prevent connections from being seen, and that the people will be managed “one drop at a time” to avoid suspicion and to mask changes as they occur. The covenant declares that “we will always stand above the relative field of their experience” and that the group knows “the secrets of the absolute.” It says they will work together, bound by blood and secrecy, and that death will come to anyone who speaks. It asserts that lifespans and minds will be manipulated, with the aim of making people appear to pretend to do one thing while doing another. It claims they will use science and technology in subtle ways so people will not notice, employing “soft metals, aging accelerators and sedatives in food and water, also in the air.” People are described as being blanketed by poisons everywhere, with soft metals causing minds to falter. The covenant promises to feign cures while feeding more poison, absorbed through skin, mouth, and breath, to destroy minds and reproductive systems. It states that children will be born dead and that this information will be concealed; poisons will be hidden in everything surrounding people—food, drink, air, clothing—and must be dispensed ingeniously because people can see far. The text claims they will teach that poisons are good through “fun images and musical tones,” aided by heroes people look up to. It envisions enlisting people to push poisons, showing products in films to normalize them, and injecting poisons into newborns’ blood, convincing parents it is for their child’s health. Early targeting of children is emphasized, focusing on what children love—sweet things—while teeth decay, metals are filled in, and minds are destroyed. It alleges the creation of medicines that worsen illness and lead to more medicines, rendering people docile, depressed, slow, and obese, and that when people seek help, more poison will be given. Attention will be directed toward money and material goods to prevent inner connection; external pleasures and games will distract from oneness. Minds will belong to the covenant, and mind-altering technology will be used if needed. Fear will be the weapon, governments established with opposites, owning both sides, and operations conducted through hidden objectives. The covenant asserts the labor of the masses will benefit the few, families will not mix, blood must be pure, and people will be incited to kill each other when convenient. They will incite religious and dogmatic separations, control all aspects of life, and guide people while making them feel in control. They will extinguish any enlightened light through ridicule or death, and people will be driven by hate, anger, and wars, profiting from bloodshed and fear. Media control will shape information and sentiment; revolts will be crushed; recruits (initiates) will be promised eternal life but never obtain it; they will be indoctrinated with false rites, never learning the truth that “we are all one” and that color is an illusion. The covenant’s gradual advance will lead to land, resources, and wealth seizure, a debt-creating money system, and suppression of freedoms. When people band together, they will be accused of crimes, and the media will be owned to shape the narrative. If conquered, people will be unable to oppose; the truth will be hidden in plain sight, with the illusion of freedom. If discovered, the covenanters fear they will be hunted, and no shelter will be offered. The covenant, sealed by blood, proclaims the fallen-angel origin, must never be known or spoken of, and warns that discovery could unleash the fury of the prime creator, casting them to the abyss for a thousand years.
Full Transcript
Speaker 0: Hi, it's Dana Horchowski. It is 10/09/2009, and I'm going to read you the secret covenant. I only have ten minutes. It's on the Polly Hicks section of canadastreetnews.com and this is dedicated to the Jesuits, the high Freemasons and the high Knights of Columbus and those that have pledged a blood oath allegiance to the Luciferians secret societies. The secret covenant: an illusion it will be so large, so vast, it will escape their perception. Those who will see it will be thought of as insane. We will create separate fronts to prevent them from seeing the connection between us. We will behave as if we are not connected to keep the illusion alive. Our goal will be to accomplish one drop at a time so as to never bring suspicion upon ourselves. This will also prevent them from seeing the changes as they occur. We will always stand above the relative field of their experience for we know the secrets of the absolute. We will work together always and will remain bound by blood and secrecy. Death will come to he who speaks. We will keep their lifespan short and their minds weak until pretending to do the pretending to do the opposite. We will use our knowledge of science and technology in subtle ways so they will never see what is happening. We will use soft metals, aging accelerators and sedatives in food and water, also in the air. They will be blanketed by poisons everywhere they turn. The soft metals will cause them to lose their minds. We will promise to find a cure from many of our fronts, yet we will feed them more poison. The poisons will be absorbed through their skin and mouths and they will destroy their minds and reproductive systems. From all this their children will be born dead and we will conceal this information. The poisons will be hidden in everything that surrounds them and what they drink, eat, breathe and wear. We must be ingenious in dispensing the poisons for they can see far. We will teach them that the poisons are good with fun images and musical tones. Those they look up to will help. We will enlist them to push our poisons. They will see our products being used in films and will grow accustomed to them and will never know their true effect. When they give birth, we will inject the poisons into the blood of their children and convince them it's for their help. We will start early on when their minds are young and we will target their children and what the children love most, sweet things. When their teeth decay, we will fill them with metals and that will kill their mind and steal their future. When their ability to learn has been affected we will create medicine that will make them even sicker and cause other diseases for which we will create even yet more medicine. We will render them docile and weak before us by our power. They will grow depressed, slow and obese, and when they come to us for help we will give them more poison. We will focus their attention towards money and material goods so that they may never connect with their inner self. We will distract them with fornication, external pleasures and games so they may never be one with the oneness of it all. Their minds will belong to us and they will do as we say. If they refuse, we shall find ways to implement mind altering technology into their lives. We'll use fear as our weapon. We will establish their governments and establish opposites within. We will own both sides. We'll always hide our objective but carry out our plan. We will perform the labor they will perform the labor for us and we shall prosper from their toil. Our families will never mix with theirs. Our blood must be pure always for it is the way. We will make them kill each other when it suits us. We will keep them separated from the oneness by dogma and religion. We will control all aspects of their lives and then tell them what to think and how. We will guide them kindly and gently letting them think that they are guiding themselves. We will foment anonymously between them through our factions. When a light shall shine among them, we shall extinguish it by ridicule or death, whatever suits us best. We will make them rip each other's hearts apart and kill their own children. We will accomplish this by using hate as our ally, anger as our friend. The hate will bind them totally and never shall they see that from their conflicts we will emerge as the rulers. They will be busy killing each other. They will bathe in their own blood and kill their neighbours for as long as we see fit. We will benefit greatly from this for they will not see us for they cannot see us. We will continue to prosper from their wars and their deaths. We shall repeat it over and over until our ultimate goal is accomplished. We will continue to make them live in fear and anger through images and sound. We'll use all the tools we have to accomplish this. The tools will be provided by their labour. We will make them hate themselves and their neighbours. We will always hide the divine truth from them that we are all one. This they must never know. They must never know that the color is an illusion. They must always think they are not equal. Drop by drop, drop by drop, we will advance in our goal. We will take over their land, resources and wealth to exercise total control over them. We will deceive them into accepting laws that will steal the little freedom that they will have. We will establish a money system that will imprison them forever, keeping them and their children in debt. When they shall band together, we shall accuse them of crimes and present a different story in the world, for we shall own all the media. For we will use our media to control the flow of information and their sentiment in our favour. When they shall rise up against us, we will crush them like insects for they are less than that. They will be helpless to do anything, for they will have no weapons. We will recruit some of their own to carry out our plans and we will promise them eternal life, but eternal life they will never have, for they are not one of us. The recruits will be called initiates and it will be indoctrinated to believe false rites of passage to higher realms. The members of these groups will think they are one with us, knowing the truth. They must never learn the truth for they will turn against us. For their work they will never be rewarded with earthly things and great titles but never will they become immortal and join us, never will they receive the light and travel the stars. They will never reach the higher realms for the killing of their own kind will prevent the passage of the realm of enlightenment. This they will never know. The truth will be hidden in their face so close that they will not be able to focus on until it's too late. Oh yes, so grand the illusion of freedom will be that they will never know how they are our slaves. When all is in place, the reality we shall have created for them will own them. The reality will be their prison. They will live in self delusion. When our goal is accomplished, a new era of dominion will begin. Their minds will be bound by their beliefs, the beliefs we established from the time immemorial. But if they ever find out that they are our equal, we shall perish then. This they must never know. If they ever find out that together they can vanquish us, they will take action. They must never ever find out what we have done for what they do for what they do for if they do, they shall have no place to run for we shall have no place to run, for it is easy to see who we are once the veil has fallen. Our action will have revealed who we are and they will hunt us down and no person shall give us shelter. This is the secret covenant by which we shall live the rest of our present and future lives, for this reality will transcend many generations and lifespans. This covenant is sealed by blood, our blood. We the ones who from heaven to earth came the fallen angels. This covenant must never ever be known to exist. It must never ever be written or spoken of for it is the consciousness that will spawn with will release the fury of the prime creator upon us. We shall be cast to the depths from whence we came and remain there until the end of time of infinity. You guys can go to the abyss a thousand years. Do the evil
Saved - December 19, 2025 at 5:09 PM
reSee.it AI Summary
A post discusses phone tracking and the surveillance state, interviewing Hakeem Anwar of Above Phone on government spying and Big Tech data harvesting, urging privacy awareness. A responder agrees and shares a link.

@RedactedNews - Redacted

📲 YOUR PHONE IS TRACKING YOU. We sit down with Hakeem Anwar, founder of Above Phone, to expose how the surveillance state really works, from government spying to Big Tech data harvesting. If you care about privacy, you need to see this.

Video Transcript AI Summary
Hakim Anwar, CEO and founder of Above Phone, joins Clayton to discuss pervasive surveillance and how to protect personal privacy in 2025–2026. The conversation covers why traditional devices and services—especially iPhones, Samsung/Android phones, and their app ecosystems—are highly surveilled, the role of Amazon Web Services in monitoring traffic, and how messaging apps on these devices are tracked. They frame the problem as a loss of personal privacy and a move toward centralized infrastructure that can be controlled or cut off by large tech platforms. Hakim explains the origin of Above Phone. He started as a software engineer, was already aware of surveillance concerns, and became involved in freedom-based social networks. He pivoted toward open-source technology (Linux, degoogled phones, open-source software) and, five years ago, helped establish Above Phone to create usable privacy-centric devices that are actually functional for daily life. The goal is to be more usable and more private than big tech. The product philosophy emphasizes usable privacy. Above Phone builds on open-source operating systems like GrapheneOS, modeling them off Android but severing ties with Google and other big tech. Hakim notes that typical Samsung/Google Android devices have “god mode” access by Google (and to some extent Samsung), and emphasizes that Above Phone devices are designed to have zero connections to big tech by default, while still enabling users to run necessary apps. Users can choose to install Google services if needed, but in a limited, privacy-conscious way—these services act like normal apps on the device rather than the centralized, all-encompassing control found on stock devices. The phones can be used with existing cell service, and data transfer from iPhone or Android is supported, with live, in-person setup assistance. Setup and operation details: - You can switch to the Above Phone by moving your number with the SIM card (five-minute process), or use the Above Phone in parallel while migrating. - The Above Phone supports both physical SIMs and eSIMs; the data SIM service is eSIM-based. - A private, in-person support team helps with data transfer and setup. - The device can run a sandboxed second profile for Google services, isolating them from personal data. This sandbox can hold essential apps (e.g., WhatsApp) while the primary profile remains private. If needed, Google services can be used in a fully isolated manner, or work apps can be run entirely without Google involvement. Open-source equivalents are provided for many common apps (navigation, messaging, etc.). Privacy mechanics and surveillance: - Hakim explains that big tech devices continually “phone home,” with independent studies showing frequent data transmission to Google and Apple. Enhanced visual search on iPhone, enabled by default, scans photos for landmarks and can link to private indexes, illustrating how centralized platforms can harvest data even without explicit user consent. - Above Phone disconnects from Google’s update stream and ships with zero Google services by default; updates come from open-source developers, not from Google/Apple. Users can still opt to install Google services, but these are constrained and do not have the same “god mode” permissions as on stock devices. - The device supports a private, end-to-end encrypted messaging protocol based on XMPP (Jabber), which is decentralized and can run on a self-hosted or community-driven network. WhatsApp, he notes, is still built on XMPP. The Above Book Linux laptop is highlighted as a privacy-oriented alternative to mainstream Windows/Mac ecosystems. Linux is presented as cooperative, transparent, and less profit-driven. The Above Book ships with an easy-to-use Linux variant designed to avoid terminal use, includes a privacy-focused web browser (Ungoogled Chromium), and offers open-source software replacements (office apps, photo editing, etc.) that store data locally. The laptop supports local AI with Mike Adams’ Brighteon AI integration via LM Studio, enabling private, offline AI capabilities on the device. The company positions Linux and Above Book as enabling local work, with offline AI and offline maps via OpenStreetMap-like tooling. Hakim closes with a forward-looking stance on digital ID and the “surveillance grid” being advanced through regulatory acts into 2027–2030. He frames the investment in Above Phone and Above Book as a preparation for a world where privacy must be actively preserved, and encourages viewers to explore abovephone.com/redacted and abovephone.com for more information and products. David and Clayton engage on skepticism, marketing, and the broader implications of privacy-centric technologies, reinforcing the idea that the goal is practical privacy and education rather than ideology.
Full Transcript
Speaker 0: So if you use one of these, if you use an iPhone or any of your traditional Android Samsung devices, chances are you're being watched and tracked at just about every level of what you're doing. And if you just think about the apps that are on your phone, almost all of them, all of them are run through AWS, which is Amazon Web Services, which if you don't know, has deep ties, of course, to the CIA and the intelligence state. They manage to sniff and look at just about everything that runs through AWS. There's, like, teams of people that are actively doing that right now. So how can you know that what you're doing on your phone is safe and secure if you're using one of those devices? Well, you pretty much can't. Any of the messaging apps that you're using from WhatsApp to iMessage to Telegram, pretty much all being tracked and monitored. So where is our privacy? Where is our how can we protect our personal communication in 2025 and 2026? Well, we wanted to have back on the show Hakim Anwar. He's the CEO and founder of Above Phone, which has created really an amazing product because he was running up against the very same thing, which is how can we protect our privacy and decided to really devote his life to looking at how we can have privacy in our phones, in our computers, and in our homes without all of this tracking surveillance and government interference. And Hakim is back on the show with us. Welcome back. Great to have you here. Speaker 1: Clayton, glad to be back. Hope you're doing well and Well, I am. Conversation. Speaker 0: We were you were on the show before kind of unrelated. We were talking about online surveillance and other things like that. And since that time, I've I've got my above phone right here, which is a device that your that your company, creates, curates, and takes care of. And so making that transition really away from all of the tracking and spying and everything else that you get from, like an Apple iPhone and moving over to this. So before we get into all of that, maybe you can just tell our audience like why you got involved in this and why you decided to to go down this rabbit hole. Speaker 1: Sure. Yeah. So, Clayton and I started my career as a software engineer but I was already awake to many of the things that you talk about on your show and so left me feeling unfulfilled and I was just waiting for the right opportunity and during, 2020, the the massive scam that was put on everyone, found kind of my bridge out. And I started helping social networks actually that were based on freedom. So you can think of it like a Facebook type for freedom lovers. And so by helping out that community, I got to realize this is the true power of the Internet to bring people together and the connections we make on the Internet are sacred. And by running this platform, I got to see how big tech was trying to disrupt it, to diminish it, to contain the movement at every turn. And I decided to put my full efforts in educating people on how to shift to open source technology. So I've talked about switching over to Linux and de googled phones and open source software. And there was just so much demand for this, then we kind of we pivoted with the team of people I was with. And we created this company called above. And we decided to figure out if we need to use this technology, we need to be able to rely on it. What is the best way to use it so it's actually functional? So it's not just like some hacked together thing for a techie, but actually usable and for the day to day. And not only that, but how can we make it better than big tech? So above phone was born through there. And, yeah, it's been five years since that journey. So we have thousands of customers and we're just exploring. It's getting better every day. Speaker 0: And we should put up a link if anyone's interested in learning more about it. You guys have been kind enough to set up a page just for our audience. So if anyone wants to check it out, we'll have a link in the description below. But I really wanted to dive deeply specifically on the product side of this today because it's been so transformative. If they go to abovephone.com/redacted, they can learn more about these devices. So I imagine one of the process one of the pieces of this, Hakim, must have been like, hey. Everyone loves using their Samsung device or their their Apple iPhone, and they're used to it. Right? So when you guys created Above Phone, I I imagine you had to say, we need to make it similar. We it can't come from, like, Mars. It needs to be something that people people can understand and kinda ease easily use. Right? Speaker 1: Yeah. Absolutely. You know, that's the one big roadblock to getting this privacy tech in the hands of people. It needs to be easy to use, and I can't claim all the credit. We're building on top of open source technology like GrapheneOS. And, so there's these other software developers and nonprofit groups that are making this, the operating system, and they decided to model it off of Android, which if you've used iPhone or Android, you know, and Google, Google's project is Android. However, when you use a normal phone from Samsung, which is also Android, or, these other companies, it's attached to Google at the hip. The Google has god mode of everything that happens on this phone, and to a degree, Samsung does as well. So people need to realize they're using pre hacked devices. You know? If someone has the ability to install an app without your knowledge or to turn on Bluetooth like they did during the era of contact tracing, then it's really not your phone. It's someone's already hacked it. They have control of it. You're just renting it. So it was focusing on creating a phone that made zero connections to big tech while still you'd be able to use all the apps you want, and it still would work with your cell service. So a lot of research later, we ended up at the above phone. Speaker 0: So I heard someone the other day told me in private just said, you know, look, if you use Google services, like if you use Gmail or you use any of the Google services, you might as well just be putting out billboards on the side of the highway with your like, if you're using Gmail as your, like, your email service, like, you might as well just be broadcasting all of your information because we know the CIA's connections. We know the DARPA connections. We know all of the big, you know, three letter agency connections with Google. Right? Speaker 1: Yeah. And Google's business model has always been that way since day one. They'll give you a free service. Right? Gmail was the first email service to give you two gigabytes of free storage, but in return, they wanted to read all your emails. So this was a long time ago. So that goes for any of a big tech product today is that they have visibility into what you're doing on it. And the reason it gets dangerous is once you start building your life, your business, your family, your relationships around this centralized infrastructure, and you opening yourself to it being taken away from you all at once. That's that's the true danger, and it has happened to people. People have innocent people have gone to jail because of using Google's mapping technology, which most people are using. People have, been reported to the police for, sending pictures of their own child, like a medical rash that they needed to send to their doctor. So this stuff happens. It just happens quietly. And once Google or Apple decide you've broken their terms of service, they will take everything, and you begin to realize, oh, hey. All of the store all of the data I was storing on their platform wasn't really mine. They were just letting me use it. And so once that happens, it's very hard to get it back, which is why I believe we're moving into this new era and of a local first technology ecosystem where all the data is held on your devices and you have very minimal connections with big tech companies. Speaker 0: Alright. So maybe we can go into some of the mechanics here. And by the way, like David, you're watching right now, any kind of questions that come up because there's gonna be skeptics, right? There's gonna be all sorts of skeptics in the comments and I wanna try to address all of those things. And maybe you can even go through some of the skeptical questions that you guys get on a regular basis from consumers who were like, wait, you're telling us this is secure, but how do we really know? So maybe we can go through all of that because, look, we're. Speaker 2: Well, yeah. And I and and Speaker 0: really quick I'm a cynical bastard, so I just you know, go ahead, David. Speaker 2: Well, yeah, to add to that, like, even Apple and they're they're saying now, oh, we're gonna store all of the AI data that we're going to be pulling locally on your phone. Nothing's going to go out to the web or whatever, which is impossible because how would they store all of the AI data on your phone? They're trying to make you think that their phones are now more secure than they are. Speaker 1: Yeah. That that's a 100% right. And, yes, shout out to the cynical bastards. This is the phone for you. I I I think one thing that will really clarify how big tech companies think of their customers, the people who pay them thousands of dollars, is exemplified in in this feature. So if you have an iPhone, I invite you to pull out your iPhone and and follow along with this little PowerPoint. So this is AI scanning without your consent that was enabled on everyone's iPhone a few months ago. So there here's how you can go and find this setting. You go to settings, you tap on apps, you tap on photos, and you can scroll down and look for this option called enhanced visual search. Now what this is doing is it's enabling all of the photos on your phone to be scanned by AI and it's looking for landmarks. Think like this is what they say, the Statue Of Liberty, the Eiffel Tower, Stonehenge, things like that. And it's matching it to a private index of landmarks in Apple's database. Now this is what they say. But here's the thing. This is probably the first time you're hearing about this setting. They did not even send out a blog post. They did not even make an announcement, and they turned it on by default. So this is scanning not not only the photos you have in iCloud, but all of the photos on your phone. So this is how little they think of your autonomy. They they have decided because they published one paper on it that they can do this privately enough. And the real reason Speaker 0: I'm looking at it right now, Hakeem. I mean, I'm I'm literally looking at it on my phone, and it's it's turned on. Yeah. Like, I'll just show if I can it's too bright in here. Well, I can't even Speaker 1: I can kinda see the green at the bottom. Yeah. Speaker 0: Yeah. So It's a little yeah. It's all on. Jeez. Speaker 1: That's being turned off Speaker 0: right now. Speaker 1: I mean, like, you know, Clayton, I can't really blame anyone if it's turned on. Like, it happened without their knowledge. Who's gonna know to dig through all these settings? Right? So that's the danger is that this kind of technocratic behavior where, hey, We think this will be a really cool feature even though probably no one will ever use it. We're just gonna turn it on for billions of people. There's this massive effect that happens. So so you might be asking the question, well, why are they doing it? Well, if you think about it, if they have an index of all of the buildings in the entire world, you know, an example, the Flatiron Building in New York or just any building, then if you post a photo online, if there's a building or any recognizable thing in it, they can they know exactly where it is. So this is how this works. These, big tech companies make you the instrument of surveillance that can be then passed on to others. It's very insidious, and we shouldn't be feeding into this. Speaker 2: Well, I have a question too then. So based on that, like, the Android platform, Android or Google has obviously intentionally added these things. How do you as a company, know when they've added a feature that's automatically on, and how do you go in and then turn it off if that's the core system that they're using? Speaker 1: Yeah. This is a great question. So let's make a distinction between these centralized software services. So people have probably heard of Google services or, Google Play services. These are, services that run on your phone that are constantly communicating back with Google and Apple. So these are things like updates, but they can also be things like location services. And so on a normal phone, whether you're using Apple or Google, these big tech services are always running in the background. Now if you get your updates directly from them, then whenever they roll a new feature, it'll become available to you. Sometimes you'll get the option to, hey, are are you ready to update? Most of the time, the phone will update without your knowledge. So what this phone does is that cut Speaker 2: that part out there. Speaker 1: Okay. What this phone does is that it disconnects you from Google's update stream. It also doesn't have Google services installed by default, which means that there are zero connections to Google. And that's really how simple it is. Right? You're not making any connections to Google, so there's no way for Google to push updates to your phone. You're getting updates from the, nonprofit, open source developers that develop this operating system, and, they make you know, there you can enable Google features if you want, but you actually actually have to go to, go through it and install Google services. So that's the major disconnect. And with your phone Speaker 0: with above phone, it doesn't come with any of that stuff on it. Like, if you wanna somehow like, why would you buy an Above Phone and then go put Google stuff on it? But you could if you wanted to. Right? I mean, I guess that's the idea. You could go and put Gmail on here. You could put Google Maps on here. Speaker 2: Well, and let's and let's say you do, though. Let's say you are a Google Maps user or something like that and you do install that. Does that then automatically negate everything you've done, like, with one Google service, or is there still a way to protect yourself and use the services that you're used to? Speaker 1: Yeah. So there you you've got it exactly right. Like, on this phone, you have the freedom to choose. And even if you install Google services, it is a it is actually a more private way of using Google services because it's not the same god mode Google services that has permission to do everything on your phone like you would find on a normal Samsung or Google phone, but it it's kind of neutered. It's at the level as any other app on your phone. So when apps need something, like, let's say, there's a location request, it's Google services it's an implementation of Google services that just does its job. It asks for the location. It doesn't. There's no telemetry that's going on in the background. So you can kind of have your cake and eat it too. Of course, I'm always gonna recommend we should minimize completely minimize, your use of Google services, but for some people, it's not an option. Some people need have built their whole business on Google or they are using stuff like Uber and Airbnb, which are also using Google's location services. So there are ways to, use it safely. And then this is a good point time to bring up. If you do want to use Google services, you can actually completely separate it. So this is showing Clayton this last time, I think. You can actually put it on a separate phone within your phone, which is completely detached, which is completely detached from the first one. It's completely isolated. Speaker 0: So to be clear, you you you have your own sort of, like, normal day to day phone that you're carrying on the above phone. But then inside of that sandbox, you can almost create, like, another version, like a virtual version of your phone that is completely separate and sort of blocked off and walled off. Do I understand that correctly? Speaker 2: VPN within the phone. Speaker 1: You've got it exactly right. Yeah. It's a separate sandbox. It's a separate profile. All of the apps are like, it starts off with no apps because you can almost see no apps in here. But you do see WhatsApp because I would feel much safer with WhatsApp being on the secondary phone. So and and this is healthy in a lot of ways. So you can put your work apps on there. You can put your big tech apps on there. And once you switch back, it's not running in the background. You have complete separation. So your personal life stays personal. In any relationship you want to have with big tech, you can have it just its own little container. So it's really easy to switch back and forth when you use one of these phones. Speaker 0: So, yeah, it so when you switch over to that other version, then Google services could be sniffing and doing what it does if you give it full access. But when you switch back over to your private version, they're cut off, and then it's a totally separate environment. Speaker 1: Yeah. Exactly. And I I'm also I'll also like to add that you don't really need Google services as much as you think aside from a few applications. So, like, anything that is a very big company and reliant on a maps, like Uber, Airbnb, Lyft, they'll try to use Google location services, and we can talk about why that is. But for most apps, they'll work completely fine without Google services. And, even if you if you wanna be completely degoogled, you can also use a web browser for things like Airbnb and, and Uber and stuff. So there's many workarounds to it, and you could live your life free of Google. Speaker 2: Well, and if you're like because most of your user base that you would want is probably gonna be, like, regular consumers, not, like, tech guys like me that we understand, you know, what we're doing when we're installing things. Do you have guardrails in place? Like, if I am a regular user and I'm gonna install Google Maps, do you say, hey, this is the these are the things you wanna keep off or do you shut them off automatically in that? Like, you because you can't really bypass the actual Google store to change what they're downloading. Right? Speaker 1: Yeah. Great question. I so so we don't try and prevent, the user from doing every anything, but we do have a lot of guidance. And the phone is already set up out of the box with everything you need. Like, we even have the open source equivalents of the things you would normally use. Right? So maybe you would normally use YouTube. Well, guess what? We have a private version that doesn't have all of YouTube's algorithms and is just directly connecting to their video servers for the videos. Right? So we have replacements for pretty much everything for navigation. Speaker 0: Messaging and navigation, everything. Speaker 1: Exactly. Right? And these these apps that I'm gonna show you today, they're completely open source. So there aren't there is no way to put analytics advertising inside them. Many of the times, you can actually disconnect them from the Internet. This map this map actually will let you download maps of the entire world. And once you have them on your phone, you can disconnect from the Internet and start to navigate. It happens all on the phone, like GPS. I don't think most people realize this, but your phone doesn't need to connect out anywhere to use GPS. It's actually a passive it's a passive thing. You know, the the signal's already being broadcasted. Your phone just needs to listen. So you can see here most of United States is highlighted in green. Canada's not. So this is the part I have downloaded. And if I zoom in to Nashville, I've got all these points added to my map of farmer's markets and places to forage. And I could navigate to these places with on my with my phone on airplane mode. So things haven't gotten crazy now, but this is a tool you can start using today and gain the literacy you need in case the world does get crazy, which I hope it doesn't, but, you know, I think you and I know we're going in a crazy direction. So there are solutions for pretty much everything. Speaker 0: So when you just to maybe walk me through. So if I if I buy an Above phone, if I go to abovephone.com/redacted and then I decide, you know, I wanna do this, The phone gets delivered to me, and I've got an old SIM card in my Apple iPhone or my old Samsung device. What do I do? What's, like, what's the setup process? You know, do I pop that SIM card out and just put it into my new phone, my new above phone, and I'm I'm off and running? What what is sort of the setup process? What does that look like? Speaker 1: The setup process is easy, and I'll try to simplify it. Right? So, yes, you can keep your number. If you wanna just switch over completely to the Above Phone, you can. So it's exactly what you said. You pop your old SIM card out, and you put it into the Above Phone, and it's got a SIM card tray in there. About a five minute process. We have a really good video that explains how to do this, and everyone can do this. Everyone can do this. So that's one option. Some people, decide not to go cold turkey and completely switch everything over, but to do it in parallel. So they have their iPhone, which, you know, they use FaceTime or they're using iMessage. They've got a lot of group chats that they wanna stay in for a while. So they will use, they they can add a new cell service for the Above phone, which we we do offer cell service that's Internet only, or they can even use the Above phone on Wi Fi with an Internet phone number. So there there are options, but just to simplify it, you know, you can switch over cold turkey, or you can use the Above phone simultaneously, take your time migrating things over. And, part of our company, like a third of our company is actually dedicated to live in person live support. So it's just like a, like a video conference call, like a Zoom, but private, where you can sit with down with us, and we'll walk you through everything. So you might have questions. We'll show you how to transfer your data from iPhone over to this phone, Google over to this phone, and just to make it easy for you so you know how to use the phone. Speaker 2: And are just real quick. Are these still the physical SIMs or are they, eSIMs like everybody else is moving to? Speaker 1: Yeah. Good question. They're they're both. So the phones the everything we're selling right now supports the physical SIMs, and then there are also eSIMs. So for instance, our, data SIM service that we sell is just eSIM, and, it's convenient because you don't have to manage a card. So you can just scan a code and do it that way. So this will work with any with any cell service in the world. That's kinda why this is the ultimate package for a privacy phone. Doesn't matter if you're in South Africa or Australia. We have customers all over the world that use this phone, and it works with any cell service. Speaker 0: So who are your customers? Do you have any governments come knocking, complaining? Speaker 1: I've been approached by defense companies before that want us to, you know, wanna talk and and work with them, but that's really not my interest. My interest is to help take a lot of these weapons that have been built, the countless number of weapons, and to see how we can turn hammer those into tools that might work for us. And yeah. I mean, there's just no there's no interest in that from from my part. I think that we need reliable tools outside of these big tech companies because there's way too much power in the hands of very few people. So that's not our interest. We're also self funded. So I started this company with a few thousand dollars and just kinda worked at it, kept it growing. So we don't have any outside influence or stakeholders, and we're going to stick to the mission of privacy and freedom in our tech. Speaker 0: Oh, that's great. Yeah. Because once all that outside money starts pouring in and, you know, everything gets diluted and, you know, then you wonder, are you you you see this across the board. You know? When you see when you see what's happening on these phones, maybe you can just walk through like on an iPhone or an Android phone like how much surveillance and snooping is actually happening? I mean, we talked about the photos thing and the scanning thing but like, I mentioned AWS kind of off the top and almost all of these apps are running on AWS. So how bad is it? Speaker 1: Yeah. It's, you if you could imagine it, they're probably spying on it. Right? Our phone has many, many things built into it. It's got the microphone. It's got the camera. We have all these features that we use, like face ID, which is taking an infrared snapshot of the entire room, point mapping, all that kind of stuff. And then there's some more there's some more tame stuff, which is, just tracking you as you go about your day to day. On average, every, big tech phone phones home every five minutes. So it's making a regular ongoing connection to Google and Apple servers. This was verified through independent study in 2020, 2019, from the Trinity College in Dublin, Ireland. So there have been independent studies showing that these two companies are collecting all sorts of information from your phone, things that you wouldn't normally expect. Right? There are logs from apps like the clock, like your alarm, your contacts, your dialer, and these are all being sapped up. So there's a lot going on underneath the surface. And then there are things that you wouldn't normally expect, which is the things like digital payments. It's the contact tracing. It's what is going to be digital ID as you've covered on your show. This is going to be carried out at least in Western countries by Google and Apple, and, it's going to make it possible for these two companies to know everything about what you do in your day to day. They're gonna be involved in your payment methods. They're gonna be involved in how you access the Internet. And so my my my position on this is and this is kind of where some people would push back against the phone. They're like, well, there's no way you can escape the, NSA and the CIA. Right? They'll always be able to target you. Well, you you know, no one can say for sure whether they can target you or not. But one thing I do know is that mass surveillance is happening at the hands of these big tech companies. So if you cut them out, you're doing 80% of the work, and it makes it infeasible for these intelligence agencies to target people individually. They're they're actually very lazy. They rely on these companies. Because they are lazy. They rely on our consent. So as soon as we start taking that back, they're they're you know, you're cutting them completely out of the system. Speaker 2: Oh, how do and and really quick, just how do people know, like, what are you doing to assure people that you're not doing kinda the same thing? Like, because I know people are gonna be like, you're controlled opposition or, know, you're you're working for them and you're just secretly taking our data in under the guise of privacy. Speaker 1: Yeah. Yeah. That's a great question. I think people should always be skeptical. So one thing you can do when you get the phone is you can actually verify you can attest that the phone is using a genuine version of the operating system, which the code is available online for everyone to see. So it's actually a tool that will compare hashes in the operating system and just make sure everything matches up to make sure we didn't add anything that's permanent or has changed the way the phone works. So that's one thing anyone can do when they get the phone. On our side, we make the promise zero connections to big tech. So we are regularly auditing that. We're holding up to that promise. We're evaluating all the apps that we put on the phone. We we tweak it. We make changes. We're paying attention. And at the end of the day, there's nothing that I could tell you to make you trust me. Right? This is your own individual decision. But I think that if we don't do anything, we're we're walking head first into the surveillance grid, and these phones are a huge part of it. People people need to realize that. And, there's there's a surveillance aspect, right, where they're able to push messaging to you on your social media, and they can actually see how you react simply by the messages you're sending. In some cases, if you're giving an application a camera permission, they can, like, literally tell if you're angry. So it's not just surveillance. It's the worst form of mind control and emotional abuse. So for for the very least, that you do this for your own peace of mind. Speaker 0: I spoke to a source the other day who told me, he said, the phone is the greatest thing that's ever happened to the NSA and the CIA and these big and these companies because you you've literally given them everything. Now they have everything. They have the the listening device. They have your your facial recognition, your biometrics. They have everything that you're doing now with AI. So you're giving AI this information. So you're giving them everything. And that's so deeply, deeply troubling. And I guess to your point, the way to fight back is to take away their greatest tool, which is the phone. Speaker 1: Yeah. Yeah. Absolutely. And replace it with with better systems. I I I think you understand this deeply because you you get your audience fired up and and taking action, and it's going to take a lot of us using technology like the above phone, the Google phones, Linux laptops for us to get traction. Right? Think how much information Google Maps has. If you have a business, you need to be on Google Maps. So I think the next few years ahead, we're going to see a rise in alternative technology, and it's going to be better if more of us use it. So, I mean, we're we are constantly engaging with developers, and we're donating to them. We're donating to people who are making good software. And so, we need people to use this software more so it's more useful to us. Like, we already have a lot of things figured out, but for instance, encrypted messaging, this is one really big thing. Right now, you're either you're using you're sending a text message, which those are all read by the d, the, DEA, at the very least, the NSA, through projects like Hemisphere. So encrypted messaging is a big part of this. This is an encrypted messaging tool that we have on the device. This is, this is called XMPP. You may have heard of it. It's, from back in the nineties even. It's called Jabber, but what it does is it actually gives you the ability to, register and you get something that looks like an email. And with this email, you can send end to end encrypted messages to anyone. You could do audio calls and voice calls. And the special thing here is that it's not just one controlling party that controls everything. It's this is decentralized and free. So anyone can run this communication service for their community or their neighborhood or their friends. Right? That's the that's the real key here. And it turns out, we recently discovered this, that WhatsApp is still built on top of XMPP. They're still built on top of XMPP. So this has the possibility to scale to millions of people, and this is a way you can you can keep your communications completely private. So, yeah, this is what it looks like, and you notice that, you know, you can send messages, you can send files. Right? You can send files to each other. Speaker 0: Looks a lot like Telegram. Speaker 1: Yeah. It looks a little bit like Telegram. And then what's really cool is if you need to use a phone number, you can actually bridge out to the phone network. So you can bridge out to the phone network and you can get an Internet phone number. You're paying like $5 a month. You get international texting. People can call you. You can call people. It it act it acts just like a normal phone number. So it's a wonderful technology to kind of bridge us between worlds. Speaker 2: Well, and I think that that's the thing people are like, we're so and I'm guilty of it too. It's like tap to pay is so convenient. It's it's it's like they sell us this stuff on convenience, and we're willing to just give up our data, give up everything where it's like, yeah, this phone might be a little bit less convenient. But in the long run, once you get it set up, you're just a lot more protected. Because like I think of the data that we give them on a daily basis by just being like, oh, this is so easy. Speaker 1: Yeah. Yeah, David. You're absolutely right. It's the convenience trap. It it's convenient for them. And at the end of the day, you're you're you're left lesser than you used to be. Right? It's like our dependence on this technology, Google Maps. People don't even know how to get directions in their town now. People don't know how to drive. Right? So using this Speaker 2: Yeah. We used I used to pull an Atlas out from under my seat. Speaker 0: Know? I talk about this all the time with my son. My son is learning to drive now, and I'm like, you know, and I'm like, son, I want you to pay attention to the landmarks. I said, I don't want you to ever rely on GPS. I don't want you to rely on Apple Maps or Google Maps in the car. I want you to use your brain, you know, and because I I don't know if my audience knows this. I have a bit of a superpower. If I've ever been somewhere one time, like, and I haven't used a map to get there or, you know, or or Google Maps or whatever. I learned this from my dad. Could drive hours and, you know, been focused on getting to this particular location. I can go back there again just from memory. It's just a weird thing. And so I'm like, son, I need you to pay attention to, where we're driving and don't rely on these, like, digital services for whatever, you know, because we're so reliant on now CarPlay or whatever, Android Auto or all this stuff. We don't even know are the streets in our own town anymore. It's really crazy. Speaker 1: It's it's a it's a cultural yeah. It it's it's the disappearance of these innate abilities we have. We're just we're being, we're being made into dumb automatons that can't even drive, and that's the perfect, you know, it's the perfect roll into self driving car. Now you don't need to do anything. Right. You're you're spot on and actually so the mapping apps like, this is OpenStreetMaps, like, they don't factor in for traffic. There is an app that does, but this one doesn't. And so what you end up doing is, you know, you're there's more thought put into looking at your route, looking at what's around there, and, you end up becoming a better driver. So what ends up happening is if I'm going somewhere for the first time, I'll plug it into the map. But let I'm like you, Clayton. I I just need to go there once, and I more or less know how to get there. And, you know, this is something we've always had the ability. We've had the ability to remember phone numbers. We've had the ability to drive. We've just forgotten. So maybe this phone can bring us back closer to that. Speaker 0: So you mentioned some of the other services and the other products you have too, and I'm I've been really, really, really considering moving towards Linux. And I know, like, my security friends love Linux. So we're talking about the above phone, but you guys also have laptops and things like that. Can you tell us about that as well? Speaker 1: Yeah. Absolutely. So we have a Linux laptop. Let me bring it up on screen here so people can see. I've actually got the laptop here to show you. Speaker 0: And why Linux? Speaker 1: Linux is the first it's the only operating system that was built through cooperation and transparency instead of just one single company. And when some of these other big companies started like Microsoft or Apple, I at least think Apple and Steve Jobs and Macintosh, they probably started out with good intentions. But because there's no visibility, because it was a closed ecosystem, it got worse and worse. And, of course, Steve died, so leaders can't carry on See if that's way so leaders can't carry on forever, and it got more corrupted over time. It became profit incentivized. So Linux, there's no profit incentive. It is simply people building software for for the sake of building software. And up until maybe five years ago, it was difficult for someone to use it, but it's been making it's been making, so much headway that now it's estimated, like, 7% of people in the world are using Linux and mostly in developing countries because they don't have the money to pay for Microsoft three sixty five subscriptions and they're not using super new devices. So they want something that's reliable and fast. And that's what Linux is. So this is our take on Linux. This is an advanced version of Linux that we've made simple to use. One of the goals I gave my team was, hey, let's make it so easy. Let's make it so easy that no one has to use a terminal. A terminal is a little it's that little black window you type in commands in. That's normally how you install apps on Linux. Here's how you install apps on the above book. So do you guys wanna call out an app that you might use? Speaker 0: Oh, like the Internet, you know, like if I wanna just get on get online. Safari, Chrome, yeah, whatever whatever web browser you might use. Speaker 1: So cool thing is is the web browser is already built in. This is a degoogled web browser called ungoogled Chromium, and there are there are already privacy features built in, like tracker blocking. It's like Brave, but even disconnected from Brave, if you've if you've heard of them before because you don't really need Brave. Like, this is the underlying technology is is open source. You've got private browsers, and then if you wanted to use things for work, you also have, this software. Speaker 2: What about something like what about something like Affinity Photo to edit photos and stuff like that? Speaker 1: I think they should have Affinity. Let's see. Nope. Say photo editor. There you go. So photo editor, here's one. So there's two that you can use here. And there's there's we have recommendations for for these as you two for, like, light editing. We use, dark And these Speaker 2: are all these are all third party apps that people are, like, focused on security? Speaker 1: I so they are all open source applications. But the I would say the overwhelming majority of them are open source applications. They're gonna be much safer than anything you're going to find on Windows or Mac. And it'll be easier to install too. So for instance, this photo editor, this is how easy it is. Alright. I'm going to put in my password, then it's going to go through and install it. And then it'll be available for me to use. Right? So we really wanted to focus on building a computer, that there was no overhead. So it'll take its time and and download its stuff. While it's doing that, I wanna show you some of the other features too. We have a version of Microsoft Office that uses the name the same file formats as Microsoft Office, but it so uses the same formulas, same file formats, And, so if you're working, if you're doing work, if you're doing spreadsheets, you can still do all those things here. Like, let's say, like, I'll change my formula. This is super basic, whatever. It's just a sum. Right? But you can see it update. So you can migrate your work over from Windows and you can use it here. Speaker 0: So let's say using Google Docs, you could use you could use this Linux, spreadsheets, documents. Yeah. And is it and is it saving it locally on your Linux device, or is it saving it somewhere in a cloud? Speaker 1: It's all saved local. So you got it. And I do I do all my work through here. And, you can do the PowerPoints, the Word documents, the spreadsheets. So this is a really good way to start to disconnect yourself, with your work. Sorry. So I got a notification that the photo editor was installed. There you go. Photo editor. It's not pulling me advertisements from the Internet, which if you check your Windows computer right now, that's what it's doing when you search for things. So photo editor is here. Here we go. And you're able to work with these things right away. Right? So you can look at some photos here. There's not much that I don't have any photos prepared here, but, yeah, there there's different tools you can use. I think we also have here we go. Here's a digital painting tool that you can use, which is really cool called Credo. So if you have any artists in the family, you can actually, some of our laptops are touchscreen. And, I should have things prepared to show you on this, but just saying that there are things that are like Photoshop that you're able to use on the above book. Speaker 0: What about AI? So one of the things, my our friend of the show, Mike Adams, HealthRanger, creator of, Brighteon AI. I know that you guys have partnered with him on the on the Above Phone side for AI. Maybe you could talk a little bit about that, but maybe how is there AI abilities on on the Linux laptop as well? Speaker 1: Yeah. Thanks for that. It was so cool to see that you're also friends with Mike. He is one of the builders who is actually doing it, building real tools. And so we collaborated with him, for a holiday bonus. So if you go to abovephone.com/redacted, the devices you buy will actually have a private local AI already loaded on them. And definitely watch Clayton's interview with Mike to to see everything it can do. We'll give you a little demo today as well. But yeah. So this is already loaded on the AboveBook. So you basically open this app called LM Studio, and I was asking it how to dig your own well. You guys wanna ask it a question? This is, trained on natural health and survival knowledge. Speaker 0: How to how to lose weight naturally, something I need to do right now. I've been I put on too many carb pounds over the Thanksgiving holiday, so I need to Speaker 2: Yeah. You gotta lose it in time for Christmas. Speaker 0: Yeah. I know. I know. Gotta lose a few Speaker 1: pounds so I can put more Speaker 0: on at Christmas time. Speaker 1: Yep. There we go. So it's it's gonna give me a readout, and it's very fast. This this computer that I'm running now is has a built in graphics unit. Speaker 2: Wow. Speaker 1: And so it's it's very fast. Leafy If Speaker 2: you you're selling your own, above books, but do you is this a process or a operating system that I could download on my own machine and run, or does it have to be one of yours? Speaker 1: Yeah. So right now, we only have it available with laptops that we're selling. The reason for that is, is we wanna make sure everything is working perfectly. However, I do have recommendations if people want to install Linux on their own. There's things like Endeavor OS that they can install, Pop OS. They're not going to be as easy to use, dare I say, as our operating system, but they'll still work for anything that you want to do. There's just going to be some more setup involved. So we're trying to make it seamless. And, I wanna point out that this computer that I'm showing you right now, everything I'm getting, it doesn't need to be connected to the Internet. So if the Internet is down, like, this is the performance. It still knows about all these things. This is crazy. Speaker 0: Wow. Speaker 1: I don't know I don't know half of this stuff. Speaker 0: That's crazy. So that, you know, that's using basically I think Mike Adams and Brighteon, his AI, which he's been training for years. In fact, he told me that they even used, like, redacted interviews that we've done over the years and actually built a lot of that into their AI, which is which is crazy. But so is that updated then on a regular basis where it would call out to the Internet to get updates to the AI? Speaker 1: No. It doesn't need to. It it it doesn't need to because it's been trained on so much information. Now Mike may release a that's what he's told me is he's gonna release a new version that's even smaller than this. So it'll be faster. Cause this is a beast of a laptop. I don't let me get a camera on it. This is a beast of a laptop. This is our Quantum series, so it's got these built in graphics cards. But it turns out this exact same thing you're seeing here, we can run on the above phones. I'll show you that in a second. So Mike is working on a smaller model, and he's gonna continue to release models as well as what as what I know. So, this good. Do you do any of this stuff? Let's see. Green tea extract, that's that's one that berberine, I've also heard of that one. Yeah. Speaker 0: Yeah. I'll have to Speaker 1: check out. Speaker 0: I'll have to check that out later. But Speaker 1: Thanksgiving is killer. Yeah. Speaker 0: Yeah. Well, that's that's fascinating. So, you know, again, so many things that I respect and love these days is, you know, has been built on Linux. And and I just see more and more people are just so fed up with Microsoft. They're so fed up with Windows. I mean, I I hate Windows with a passion. I hate Microsoft with a passion. And we know how compromised they are already. And, just moving away from those things, to be able to move towards a laptop environment where your all of your work is local. I mean, I I think I always come back to sort of like Battlestar Galactica. You know? I don't if you guys are fans of Battlestar Galactica, but and especially the remake, you know, a few years ago. Mhmm. The reason that that ship survived and wasn't attacked and destroyed is because it was offline, you know, and it wasn't connected it wasn't connected to everything else. And I just always was always struck by that fifteen years ago or whatever when that remake came out. Like, this the reason the Battlestar Galactica was able to survive and continue on is because it was disconnected. It it was using an older protocol. All the new ships were destroyed because they were all connected. They were all networked, but this this the Battlestar Galactica was not. And Now I'm Speaker 1: gonna have to watch that. Speaker 0: It's such yeah. I highly recommend. It's an excellent sci fi series. I don't know if it's, like, five seasons or so. The the new version of it that came out, I think, with Ed Edward James Almost, who was the main character and some incredible David, have you ever seen it? Speaker 2: Yes. Yes. And it was yes. Amazing. Speaker 0: Amazing. Yeah. So I just that always stuck out to me. You know? It's a metaphor for our times. Right? Speaker 1: Yeah. No. Absolutely. Yeah. So I mean, you know, I'm not saying I'm not a I'm not a purist about this stuff. I don't think that people need to drop everything they're doing right now, but you you need to plan. Right? It's a process to transition over and and so start to make that plan now so you're not on the grid. Because it's very possible. I mean, we saw, I think it was last year, with CrowdStrike, how everything connected to this grid, through, the security grid, shut down the airports, it shut down the banks. It was terrible. And so the more we put our reliance on to these big tech software systems, like, do you think the cyber attack's gonna happen? We're already using prehacked phones, so all they need is Google or Apple to get on board. And boom. Oh, no. Cyber attack. Oops. Sorry, guys. Banks went down. That's okay. They're the new Apple. Speaker 2: And and the thing is I think that the you can actually have both. You can if if as long as companies like yours get a lot of, traction, then you can become the more convenient option and safe. So it's like right now we're giving up the safety for the convenience, but like companies like yours just need to make the security to the convenience. Speaker 1: Yeah, absolutely. And, you know, I believe that we can have the best of both worlds. That's why I always say that this is not just an alternative. It is it is actually better than big tech, you know. Being able to download videos from YouTube directly to your device is better. You're not paying for ads. There's no ads on the phone at all. Like that it's such a it's such a great lift to your spirit. And so this is better than big tech. It works, just as well, if not better. And, it's giving you the power to live without technology because this is not an endgame, like, for for me at least. I I'd like to get back to the land, and I just need technology to stay out of the way and support me when I need it. So this is kind of our theme for holiday. It's tech that empowers you to live without it, be more present, and, you could do that with the our new Quantum edition above book. These are this is the the laptop I was talking about that has a graphics unit inside. So all the AI stuff that we were just doing right now, you can do it at home. You don't have to be connected to the Internet. It it will just work. And then we also have our phones, which the nine series are, will also be able to run this AI here. So we all have this power, and we all need to start building. Speaker 0: Well, it's wonderful. I you know, I could talk to you for hours, and there's so much more we can talk about later on about six g that's coming. I just did a full report on six g that's coming, and, you know, it's gonna be even worse. So, again, I'm not like you said, I'm not a purist on this stuff, and I'm really starting to pay attention to where our security is being compromised and, the messaging and all of those other things, and banking and digital ID and all of the things that we just slow walked and allowed these technocratic governments, and these spy agencies and all of this stuff to sort of just take advantage of us now. It's really, really troubling. So, again, I encourage people to go to the link that, Hakim has set up for our viewers if they wanna learn more about this, they wanna pick up, an Above Phone, they wanna pick up, you know, an Above Above Book laptop or any of the other products there. Just go check it out at abovephone. Or it's above is it abovephone.com?.com. Speaker 1: Yeah. It's abovephone.com. Speaker 0: Abovephone.com/redacted, and people can learn more about all of that there. So any final thoughts, Hakim, about anything we were talking about? Speaker 1: Yeah. I think in, you know, when we spoke about digital ID, the the the feeling, at least to me, was this watching some of these legislative acts being passed out for digital ID, where this technocratic control grid will continue to grow. 2027 is is a very important date in that, and I think we talked about all the way to 2030. We only have so much time to prepare for this, so I would just say, you know, this is an investment. May not need a new phone. May your old one probably works just fine, but, But, right, this is an investment into your technological literacy, your tech literacy. And so if you're able to use these tools, when things actually hit the fan, you'll be prepared. You won't be caught off guard. In fact, you'll be ready to help other people who are like, oh my god. I just got a notification that I'm to report to the centers because of something I texted. Right? We wanna avoid these very stressful situations, and so a little bit of preparation goes a long way. And, yeah, I'm really grateful that you and I can collaborate. I've been really enjoying your report, so I hope to chat more about all that soon. There's no shortage of crises. Speaker 0: Yeah. Absolutely. Well, check it out. Abovephone.com/redacted. We'll have a link in the description. People can go there and check it out themselves. You've got my brain already thinking about picking up one of these, above above book laptops. That's for sure. Hakim, great to have you here on the show. Thanks so much. Thanks, David, as well. Speaker 2: Yep. Awesome interview. Speaker 1: Thank you, Clayton. Thank you, David. Thanks for watching.

@TrueOnX - Noah

@RedactedNews Correct, pay attention folks 👇

@TrueOnX - Noah

🤳 Smartphones are Surveillance Devices (Patents for Proof Below) 👇 🦸‍♂️ John McAfee: "You have no privacy, smartphones are government surveillance devices, and encrypted messaging services aren't actually private." Cell-Site Simulators / IMSI Catchers and Handset Geolocation 👇 EP1051053 (Frick et al., Rohde & Schwarz) - “Method for identifying a mobile phone user or for eavesdropping on outgoing calls.” Foundational IMSI-catcher “virtual base station” approach. https://patents.google.com/patent/JP2012524901A/en IMIS Catcher https://en.wikipedia.org/wiki/IMSI-catcher US9820170B2 (Verint) - “Monitoring wireless communications over multiple frequency channels,” expressly referencing IMSI-catchers for soliciting IMSIs. https://patents.google.com/patent/US9820170B2/en US9584252B1 (Harris Corp.) - “Managed access system with mobile wireless device geolocation capability,” part of the StingRay/Hailstorm lineage used by law enforcement. https://patents.google.com/patent/US9820170B2/en U.S. House Oversight report on cell-site simulators for official context and capabilities. https://oversight.house.gov/wp-content/uploads/2016/12/THE-FINAL-bipartisan-cell-site-simulator-report.pdf ACLU technical explainer on StingRay abilities, including content capture potential. https://www.aclunc.org/sites/default/files/StingRays_The_Most_Common_Surveillance_Tool_the_Govt_Won%27t_Tell_You_About.pdf SS7 / Diameter Signaling Interception and Visibility 👇 US7027809B1 - “Providing visibility to SS7 signaling,” apparatus to capture and process mobile network signaling for roamer visibility and fraud, which can expose location and metadata. https://patents.google.com/patent/US7027809B1 US 2024/0147238 (application) - “Diameter spoofing detection and post-spoofing attack mitigation,” evidences industrial focus on Diameter attack surfaces that enable tracking or interception. https://patents.justia.com/patent/20240147238 Ultrasonic and Ambient-Audio Triggers That Wake Microphones or Pair Devices 👇 US20170331562A1 - “Ultrasonic communications for wireless beacons.” Beacons emit ultrasound; phones listen via microphones for proximity, telemetry, and monitoring. https://patents.google.com/patent/US20170331562A1 US20210051300A1 - “Pairing devices in conference using ultrasonic beacon,” phone microphone captures 21 kHz beacons; includes microphone-array concepts. https://patents.google.com/patent/US20210051300A1/en US10075767B2 (Facebook/Meta) - “Broadcast content view analysis based on ambient audio recording,” software on a phone records ambient audio when broadcast signals are detected to log what you watch. https://patents.google.com/patent/US10075767B2/en News coverage that this design can trigger phone mics via inaudible cues, with debate about scope. https://www.theguardian.com/technology/2018/jun/28/facebook-patent-phone-mic-listening-tv-shows “Always-listening” Assistants and Low Power Ambient Sensing 👇 US20140222436A1 (Apple) - “Voice trigger for a digital assistant,” hotword wake using continuous microphone monitoring. https://patents.google.com/patent/US20140222436A1/en US11199896B2 (Google) - “Low-power ambient computing system with machine learning,” continual monitoring of sensor data at low power for context triggers. https://patents.google.com/patent/US11199896B2/en Advertising and Cross-Device Tracking via Audio and Device Fingerprints US8508357B2 - “Encode audio with inaudible code for program identification,” classic audio watermarking used for exposure tracking. https://portal.unifiedpatents.com/patents/patent/US-8508357-B2 US20100268573A1 - “Audio beacon system for exposure measurement,” phones emit or detect beacons tied to user identity. https://patents.google.com/patent/US20100268573A1/en US20150006384A1 - “Device fingerprinting,” browser and device attributes create persistent identifiers across sessions and apps. https://patents.google.com/patent/US20150006384A1/en Peer-reviewed documentation of ultrasonic cross-device tracking in the wild. Privacy Threats Through Ultrasonic Side Channels on Mobile Devices https://mlsec.org/docs/2017a-eurosp.pdf Hundreds of Apps Using Ultrasonic to Silently Track Smartphone Users https://thehackernews.com/2017/05/ultrasonic-tracking-signals-apps.html Cross Device Tracking https://en.wikipedia.org/wiki/Cross-device_tracking

Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.
Full Transcript
Speaker 0: Good morning. John McAfee here. I am dissed constantly for using Gmail as my email system. Let me explain something to you. If you think you have any privacy whatsoever with an encrypted system, whether it's an email system like ProtonMail or an encrypted messaging system like Signal, You have no fucking privacy. Encryption was designed thirty five years ago to prevent a man in the middle attack, meaning someone between your transmission and your receipt. There's no man in the middle anymore. We don't need them. Your fucking smartphone is the surveillance device preferred by every government on the fucking planet. Do you know how easy it is to plant malware? Go on Pornhub. If you've been on Pornhub, someone is now listening to you. All you have to do is do a drive by of a website, and it sets the download unauthorized applications flag. The first click, you now have malware that is doing two things, watching your inputs before they're encrypted and transmitting them and reading the outputs after they are fucking encrypted, people. Encryption is a worthless piece of shit, old technology that is being marketed as a safe system. There is no safety anymore. There is no privacy. I use Gmail for one reason. The last company that requires this fucking subpoena from a government in order to give them your information. And their lawyers have thirty fucking days to review the subpoena. Thirty days is enough for me. I change my fucking email every fifteen days. Wake up, people. You have no more privacy. You are being sold a fucking bill of goods, which is worthless with encryption. Man, thank you for listening.
Imsi-catcher - Wikipedia en.wikipedia.org
Page not found - United States House Committee on Oversight and Government Reform oversight.house.gov
Facebook patents system that can use your phone's mic to monitor TV habits System would allow Facebook to identify what adults and children are watching based on ambient noise
theguardian.com
Hundreds of Apps Using Ultrasonic Signals to Silently Track Smartphone Users More and more Smartphone Apps have started using Ultrasonic Tracking Signals to Silently Track Users thehackernews.com
Cross-device tracking - Wikipedia en.wikipedia.org
Saved - June 27, 2025 at 11:46 PM
reSee.it AI Summary
I've shared insights on a hidden war against humanity, emphasizing that our true prison is not physical but encoded in our biology through frequency manipulation. This manipulation is orchestrated by influential figures and organizations, including Elon Musk, Bill Gates, and Donald Trump, who use technology and biotech to control our thoughts and emotions. I've documented this with credible sources, revealing a network designed to suppress our spiritual essence. Despite attempts to erase this information, I remain committed to uncovering the truth for all. More revelations are coming.

@TrueOnX - Noah

⏰ THE MOST BANNED THREAD IN THE WORLD! 🚨 The War On Resonance PART ONE: The Cage You Cannot See. I must ask you now; not as a stranger, not as a theorist, but as the one who remembers what you were before they rewrote your soul; is this the only cage you can see? The headlines? The hospitals? The visible crimes made convenient by cameras and captions? What if I told you that the real prison is not made of metal; but of frequency. Not held together by walls; but by waves. Not secured by guns; but by consent. What if I told you that you are not free, not because you are bound; but because the chains were encoded directly into your biology? This isn’t hyperbole. This is documented. They have hijacked humanity through a wireless war; a multi-layered assault on the nervous system, immune response, and willpower of every living soul on this Earth. This war is not being fought with bombs, but with bandwidths. Not with armies, but with algorithms. This is the same beast behind every deception. The same financiers who funded vaccine trials that sterilized African girls are the ones embedding AI-responsive quantum dots into newborns. The same networks that control your social media also control your neurochemical loops. They call it “progress.” They call it “public health.” But what do you call it when a child seizes from brain hemorrhage after being injected with an experimental payload? What do you call it when a ten year old dies of myocarditis from a shot for a disease they never had? I call it spiritual genocide. And I’m not theorizing. I’m testifying. Because this is declassified truth; confirmed in documents, studies, and patents they never expected you to read: Pentagon Preps Soldier Telepathy: This article from WIRED discusses DARPA's Silent Talk program, which aims to enable soldiers to communicate telepathically by detecting and analyzing neural signals representing pre-speech. https://wired.com/2009/05/pentagon-preps-soldier-telepathy-push/ Biomedical Applications of Graphene and Graphene Oxide: A comprehensive review of the applications of graphene and graphene oxide in biomedicine, focusing on biosensing, cell differentiation, and mass spectrometry. https://pubmed.ncbi.nlm.nih.gov/23480658/ ​An Update on Graphene Oxide: Applications and Toxicity: This article provides an overview of the applications of graphene oxide in various fields, including biomedicine, and discusses its potential toxicity. https://ncbi.nlm.nih.gov/pmc/articles/PMC9558614 Nanoparticle Transport Across the Blood–Brain Barrier: This comprehensive review discusses the challenges and strategies associated with delivering nanoparticles across the blood–brain barrier (BBB). https://pubmed.ncbi.nlm.nih.gov/27141426/​ Internet of Bio-NanoThings (IoBNT): This article introduces the novel paradigm of the Internet of Bio-NanoThings (IoBNT), stemming from synthetic biology and nanotechnology tools that allow the engineering of biological embedded computing devices. https://ieeexplore.ieee.org/document/7060516 DARPA Biological Technologies Office (BTO) Overview: This page offers comprehensive information about BTO's mission to integrate biology with engineering and computer science for national security applications. It details their focus areas, including warfighter health, synthetic biology, and bio-manufacturing, as well as current programs and research opportunities.​ https://darpa.mil/about-us/offices/bto NIH Clinical Trial of Investigational Vaccine for COVID-19: This news release, dated March 16, 2020, announces the start of the Phase 1 clinical trial of the mRNA-1273 vaccine, developed by Moderna in collaboration with the National Institute of Allergy and Infectious Diseases (NIAID), a part of the NIH. The trial aimed to evaluate the safety and immunogenicity of the vaccine in healthy adult volunteers.​ https://nih.gov/news-events/news-releases/nih-clinical-trial-investigational-vaccine-covid-19-begins An Integrated Brain-Machine Interface Platform With Thousands of Channels: This peer-reviewed publication details Neuralink's initial steps toward a scalable high-bandwidth brain-machine interface system. https://pmc.ncbi.nlm.nih.gov/articles/PMC6914248/ Deep Brain Stimulation for Psychiatric Disorders and Behavioral/Cognitive Symptoms: This comprehensive review explores the use of deep brain stimulation (DBS) as a neuromodulation technique for treating various psychiatric disorders and behavioral or cognitive symptoms. https://pubmed.ncbi.nlm.nih.gov/35460949 Smart Dust: Communicating with a Cubic-Millimeter Computer: This IEEE article discusses the development of ultra-small computing devices, known as Smart Dust, which integrate sensing, computing, and communication capabilities into a cubic-millimeter form factor. These devices have potential applications in various fields, including environmental monitoring, medical diagnostics, and military surveillance. https://ieeexplore.ieee.org/document/895117 This is what you were born into: a frequency prison designed to sedate your intuition, suppress your hormones, rewrite your emotions, and sever your communion with God. Every device you hold, every smart tower you walk past, every “vaccine” they’ve pushed; these are not random technologies. They are pieces of a grid. A grid designed not to protect you, but to remap your divine will. Your phone? A mood manipulator. Your sleep? Hacked. Your thoughts? Preemptively monitored. Your soul? Catalogued for behavioral prediction. This isn’t a sci-fi movie. This is now. This is real. This is why the world feels broken and no one can explain it. Why joy has become an echo. Why sleep doesn’t restore you. Why love feels distant. Because they’ve weaponized the field of resonance itself. They are not just targeting the body; they are targeting the architecture of the soul. And the reason you’re still reading this is because you’re one of the ones who can still feel. Still grieve. Still awaken. So let me show you what they built. Let me take you behind the grid. Let me guide you; cell by cell, wave by wave... through the labyrinth they’ve disguised as your life. Because until you see it, you will never reclaim what was stolen. And make no mistake; what they stole… was everything. This was just Part One, so buckle up... you're in for one heck of a ride. Continued Below 👇

Video Transcript AI Summary
The speaker claims that humanity is trapped in a "frequency prison" controlled by waves and algorithms, not metal and walls. This prison is allegedly encoded into our biology through a wireless war targeting the nervous system, immune response, and willpower. The speaker connects vaccine trials that sterilized African girls to the embedding of AI-responsive quantum dots in newborns, and links social media control to neurochemical loops. They cite brain hemorrhages and myocarditis in children post-vaccination as evidence of "spiritual genocide." Referencing documents, studies, and patents, the speaker lists topics like soldier telepathy, graphene oxide toxicity, nanoparticle transport across the blood-brain barrier, and brain-machine interfaces. They assert that devices, smart towers, and vaccines form a grid to suppress intuition, rewrite emotions, and sever connection with God. Phones are "mood manipulators," sleep is hacked, thoughts are monitored, and souls are cataloged. The speaker concludes that this weaponization of resonance is why the world feels broken and love feels distant, and invites the listener to awaken and reclaim what has been stolen.
Full Transcript
Speaker 0: Part one, the cage you cannot see. I must ask you now, not as a stranger, not as a theorist, but as the one who remembers what you were before they rewrote your soul. Is this the only cage you can see? The headlines? The hospitals? The visible crimes made convenient by cameras and captions? What if I told you that the real prison is not made of metal, but of frequency, not held together by walls, but by waves, not secured by guns, but by consent. What if I told you that you are not free, not because you are bound, but because the chains were encoded directly into your biology? This isn't hyperbole, this is documented. They have hijacked humanity through a wireless war, a multi layered assault on the nervous system, immune response, and willpower of every living soul on this earth. This war is not being fought with bombs, but with bandwidths. Not with armies, but with algorithms. This is the same beast behind every deception. The same financiers who funded vaccine trials that sterilized African girls are the ones embedding AI responsive quantum dots into newborns. The same networks that control your social media also control your neurochemical loops. They call it progress, they call it public health. But what do you call it when a child seizes from brain hemorrhage after being injected with an experimental payload? What do you call it when a 10 year old dies of myocarditis from a shot for a disease they never had? I call it spiritual genocide and I'm not theorizing. I'm testifying because this is declassified truth confirmed in documents, studies, and patents they never expected you to read. The following links are available on the original post. Pentagon prep soldier telepathy, biomedical applications of graphene and graphene oxide, an update on graphene oxide, applications and toxicity, nanoparticle transport across the blood brain barrier, internet of bio nano things, IOBNT, DARPA Biological Technologies Office, BTO. Overview NIH, clinical trial of investigational vaccine for COVID nineteen, an integrated brain machine interface platform with thousands of channels. Deep brain stimulation for psychiatric disorders and behavioral cognitive symptoms. Smart dust, communicating with a cubic millimeter computer. This is what you were born into, a frequency prison designed to sedate your intuition, suppress your hormones, rewrite your emotions, and sever your communion with God. Every device you hold, every smart tower you walk past, every vaccine they've pushed, vaccine they've pushed, these are not random technologies. They are pieces of a grid. A grid designed not to protect you, but to remap your divine will. Your phone, a mood manipulator. Your sleep, hacked. Your thoughts, preemptively monitored. Your soul? Cataloged for behavioral prediction. This isn't a sci fi movie. This is now. This is real. This is why the world feels broken and no one can explain it. Why joy has become an echo. Why sleep doesn't restore you. Why love feels distant. Because they've weaponized the field of resonance itself. They are not just targeting the body, they are targeting the architecture of the soul. And the reason you're still reading this is because you're one of the ones who can still feel, still grieve, still awaken. So let me show you what they built. Let me take you behind the grid. Let me guide you cell by cell, wave by wave, through the labyrinth they've disguised as your life. Because until you see it, you will never reclaim what stolen. And make no mistake, what they stole was everything. This was just part one, so buckle up. You're in for one
Pentagon Preps Soldier Telepathy Push Forget the battlefield radios, the combat PDAs or even infantry hand signals. When the soldiers of the future want to communicate, they’ll read each other’s minds. At least, that’s the hope of researchers at the Pentagon’s mad-science division Darpa. The agency’s budget for the next fiscal year includes $4 million to start up a program \[…\] wired.com
Biomedical applications of graphene and graphene oxide - PubMed Graphene has unique mechanical, electronic, and optical properties, which researchers have used to develop novel electronic materials including transparent conductors and ultrafast transistors. Recently, the understanding of various chemical properties of graphene has facilitated its application in … pubmed.ncbi.nlm.nih.gov
An Update on Graphene Oxide: Applications and Toxicity Graphene oxide (GO) has attracted much attention in the past few years because of its interesting and promising electrical, thermal, mechanical, and structural properties. These properties can be altered, as GO can be readily functionalized. Brodie ... pmc.ncbi.nlm.nih.gov
Nanoparticle transport across the blood brain barrier - PubMed While the role of the blood-brain barrier (BBB) is increasingly recognized in the (development of treatments targeting neurodegenerative disorders, to date, few strategies exist that enable drug delivery of non-BBB crossing molecules directly to their site of action, the brain. However, the recent a … pubmed.ncbi.nlm.nih.gov
Biological Technologies Office We leverage biological properties and processes to protect U.S. warfighters, including biodefense, medical countermeasures, tactical care, and recovery. darpa.mil
NIH clinical trial of investigational vaccine for COVID-19 begins Study enrolling Seattle-based healthy adult volunteers. nih.gov
An Integrated Brain-Machine Interface Platform With Thousands of Channels Brain-machine interfaces hold promise for the restoration of sensory and motor function and the treatment of neurological disorders, but clinical brain-machine interfaces have not yet been widely adopted, in part, because modest channel counts have ... pmc.ncbi.nlm.nih.gov
Deep brain stimulation for psychiatric disorders and behavioral/cognitive-related indications: Review of the literature and implications for treatment - PubMed While pharmacological and/or behavioral treatments are effective in managing symptoms for many patients with psychiatric diagnoses and disorders with behavioral/cognitive manifestations, a subset of individuals are treatment-refractory, unable to achieve appreciable benefit or symptom relief from tr … pubmed.ncbi.nlm.nih.gov

@TrueOnX - Noah

⏰ THE MOST BANNED THREAD IN THE WORLD! 🚨 The War On Resonance PART TWO: The Architects of the Cage You’ve felt the dissonance. You’ve tasted the illusion. Now let me unveil the ones who built it. Because this is not the accidental collapse of human freedom. It is the strategic sterilization of God’s image through biotech, neuro-warfare, and frequency control; engineered by names you know and hands you were never meant to see. Let’s begin with the mask they taught you to worship. Elon Musk They called him a genius. A savior. A rebel billionaire. But what did he do? He blanketed Earth with over 5,500 Starlink satellites, NOT to provide free speech or faster internet, but to pulse synchronized frequency control over the entire electromagnetic field of Earth. DARPA has confirmed this tech in phase-array neuro-modulation. Then came Neuralink, an interface not designed to heal but to monitor, predict, and eventually override emotion, thought, and decision-making. Their official white paper outlines multi-user brainwave integration, cortical stimulation, and wireless data access from the human mind. And Neuralink? It’s funded by OpenAI; the same group building the cognitive infrastructure for post-human governance. Musk’s Tesla factory signed data-sharing agreements with the CCP in Shanghai. That data now flows through China’s national surveillance cloud. Musk didn’t build a utopia. He built the neural grid. Elon Musk / Neuralink / Starlink / OpenAI Neuralink Brain-Machine Interface (White Paper via PMC): https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6914248/ This paper outlines Neuralink's initial steps toward developing a scalable, high-bandwidth brain-machine interface system. It details the design and implementation of flexible electrode "threads," a neurosurgical robot for precise implantation, and custom electronics for data processing. The system aims to facilitate communication between the brain and external devices. Tesla Data-Sharing with CCP: https://www.reuters.com/business/autos-transportation/tesla-shanghai-data-center-to-boost-localization-efforts-cn-2021-05-25/ The article reports that Tesla established a data center in China to store data generated by its vehicles sold in the country, in response to regulatory scrutiny over data handling. This move aligns with China's efforts to ensure data security and privacy, especially concerning data collected by smart vehicles.​ DARPA N3 Program (Neural Interface Development): https://www.darpa.mil/program/n3 This program aimed to develop high-performance, bi-directional brain-machine interfaces that do not require surgical implantation. The goal was to enable able-bodied service members to control unmanned systems or engage in cyber operations through noninvasive neural interfaces.​ Bill Gates The king of vaccines. The messiah of health. The man who told you he wanted to save the world. Through the Bill & Melinda Gates Foundation, Gates funded global DNA-coding vaccine campaigns through GAVI and CEPI. He was one of the chief sponsors of Event 201; a pandemic simulation months before COVID-19, rehearsing lockdowns, speech control, biometric tracking, and mandatory vaccine passports. He also partnered with The Welcome Trust, which has actively deployed bio-digital identity programs across Africa and Southeast Asia. This wasn’t philanthropy. It was pre-injection infrastructure. Bill Gates / GAVI / Wellcome Trust / Event 201 Event 201 Official Simulation (Johns Hopkins): https://www.centerforhealthsecurity.org/event201/ Event 201 was conducted on October 18, 2019, and simulated a series of dramatic, scenario-based discussions confronting difficult, true-to-life dilemmas associated with response to a hypothetical, but scientifically plausible, pandemic. The exercise aimed to illustrate areas where public/private partnerships will be necessary during the response to a severe pandemic in order to diminish large-scale economic and societal consequences. GAVI & Welcome Trust Digital Identity Integration: https://www.gavi.org/our-alliance/global-health-development/wellcome-trust This page outlines the partnership's focus on global health initiatives, but it does not specifically mention digital identity integration. However, Gavi has engaged in digital identity projects, such as the collaboration with Mastercard on the Wellness Pass, aimed at providing individuals with secure digital identities to access healthcare services. For more information on this initiative, you can refer to the following article:​ Gavi Why we support COVAX: Mastercard - Gavi, the Vaccine Alliance https://www.gavi.org/vaccineswork/why-we-support-covax-mastercard Donald Trump Yes. I said it. This one will be the hardest for many to accept; but the truth is not loyal to your political beliefs. It is loyal only to God. Trump signed Executive Order 13887, transferring command over vaccine strategy to the Department of Defense. Read it yourself below. Then came Operation Warp Speed; a military-led bio-deployment that used Palantir’s surveillance dashboards to track every citizen’s health behavior and compliance. Palantir’s official site confirms this. He also gave full legal immunity to Pfizer and Moderna to deploy synthetic gene modulators under the Emergency Use Authorization. No liability. No justice. Just children d*ing while politicians smiled. That’s not patriotism. That’s biowarfare with a flag on it. Donald Trump / Operation Warp Speed / Executive Order Executive Order 13887 – Modernizing Influenza Vaccines (White House Archives): https://trumpwhitehouse.archives.gov/presidential-actions/executive-order-modernizing-influenza-vaccines-united-states-promote-national-security-public-health/ This executive order outlines a comprehensive strategy to modernize the U.S. influenza vaccine enterprise. Key objectives include:​ Trump signs executive order to improve flu vaccines https://www.cidrap.umn.edu/influenza-vaccines/trump-signs-executive-order-improve-flu-vaccines HHS Releases the National Influenza Vaccine Modernization Strategy (NIVMS) 2020-2030: https://www.naccho.org/blog/articles/hhs-releases-the-national-influenza-vaccine-modernization-strategy-nivms-2020-2030? Executive Order 13887: Modernizing Influenza Vaccines in the United States to Promote National Security and Public Health, signed by President Donald J. Trump on September 19, 2019.​ This executive order outlines a comprehensive strategy to modernize the U.S. influenza vaccine enterprise. Key objectives include:​ Reducing reliance on egg-based vaccine production by promoting alternative manufacturing methods that are more agile and scalable.​ Expanding domestic capacity for vaccine production to ensure rapid response to emerging influenza viruses.​ Advancing the development of new, broadly protective vaccine candidates that provide more effective and longer-lasting immunity.​ Increasing influenza vaccine immunization across recommended populations to enhance public health and national security.​ The order also established a National Influenza Vaccine Task Force, co-chaired by the Secretaries of Health and Human Services and Defense, to coordinate efforts across federal agencies and report on progress.​ For a detailed overview of the executive order, you can visit the official archived page here: Executive Order 13887 – Modernizing Influenza Vaccines (White House Archives) https://trumpwhitehouse.archives.gov/presidential-actions/executive-order-modernizing-influenza-vaccines-united-states-promote-national-security-public-health/ CDC Partners with Palantir to Bolster the Fight Against COVID-19: This press release discusses the partnership between the CDC and Palantir to enhance the nation's public health response to COVID-19 using Palantir's software platforms. https://www.palantir.com/newsroom/press-releases/cdc-partners-with-palantir-to-bolster-the-fight-against-covid-19/ This page outlines how Palantir's software platforms, such as Foundry, have been utilized to support public health agencies in managing and responding to health crises, including the COVID-19 pandemic. https://www.palantir.com/assets/xrfr7uokpv1b/3US9K0TufECjQaaxJFivfb/1e6d72123f8c5894f4b90a2d851a84b4/Foundry_for_Public_Health_Surveillance_and_Response.pdf Key highlights from the page include:​ Data Integration and Analysis: Palantir's platforms enable the integration of diverse data sources to provide a comprehensive view of public health data, facilitating informed decision-making.​ Support for Public Health Agencies: The software has been employed by agencies like the CDC and HHS to enhance disease surveillance, outbreak response, and resource allocation. Security and Privacy: Emphasis is placed on maintaining robust security measures and protecting sensitive health information. DARPA: The Silent Empire The most important agency you were never taught to fear. DARPA’s Biological Technologies Office openly admits its mission; integrating biotech with national security. Visit their official page. This is the official page for DARPA's Biological Technologies Office (BTO), which focuses on leveraging biological systems for national security applications. https://www.darpa.mil/about-us/offices/bto They are the ones behind the BRAIN Initiative, Silent Talk, and Remote Neural Interface Programs; all designed to map your emotional states and interrupt spiritual alignment. The “Silent Talk” program was developed to transmit thought between soldiers without speech; by detecting pre-speech neural signals and decoding them via EEG. Silent Talk (Neural Pre-Speech Communication – Wired Article) This Wired article discusses DARPA's "Silent Talk" program, aimed at enabling communication through neural signals without spoken words. https://www.wired.com/2009/05/pentagon-preps-soldier-telepathy-push/ DARPA also pioneered graphene oxide nanotech, now found in multiple biomedical studies, vaccines, and smart dust aerosol deployment: Graphene oxide biomedical study: Graphene Oxide in Biomedical Applications (PubMed) This PubMed article reviews the potential biomedical applications of graphene oxide, highlighting its unique properties. https://pubmed.ncbi.nlm.nih.gov/33922153/​ Graphene's potential to interact with neural tissue: Graphene and Neural Interfaces (PubMed) This PubMed article explores the use of graphene-based materials in neural interface design, discussing their advantages and challenges. https://pubmed.ncbi.nlm.nih.gov/28901588/ DARPA didn't just weaponize warfare. They weaponized YOU. In-Q-Tel & Palantir: The Surveillance Engine In-Q-Tel, is the CIA’s venture capital firm, funds synthetic biology startups, digital ID systems, emotion tracking wearables, and AI-driven facial recognition. Palantir, founded by Peter Thiel, works directly with military intelligence and now runs predictive modeling for public health, policing, and pandemic response. Here’s the proof: https://www.palantir.com/assets/xrfr7uokpv1b/3US9K0TufECjQaaxJFivfb/1e6d72123f8c5894f4b90a2d851a84b4/Foundry_for_Public_Health_Surveillance_and_Response.pdf Their goal? To detect resonance spikes. To predict awakening moments. To preempt the uprising of the human soul before it begins. In-Q-Tel / CIA / Synthetic Bio Surveillance In-Q-Tel Portfolio (CIA Venture Capital): Which showcases a selection of the organization's investments across various technology sectors. IQT is a not-for-profit venture capital firm that invests in cutting-edge technologies to support the national security interests of the United States and its allies. https://www.iqt.org/portfolio/ In-Q-Tel https://en.wikipedia.org/wiki/In-Q-Tel? BlackRock & Vanguard: The Lords of the Grid These two financial titans collectively hold majority ownership in: For instance, a report by Americans for Financial Reform titled "Wall Street Money in Washington" highlights the substantial investments and influence of major financial firms, including BlackRock and Vanguard, in the political and corporate spheres: https://fm.cnbc.com/applications/cnbc.com/resources/editorialfiles/2021/04/14/AFR_Wall_Street_Money_in_Politics_2021.pdf? Pfizer Moderna Alphabet (Google) Meta (Facebook) Amazon Web Services As reported by CNBC, they control over 90% of the digital, pharmaceutical, and cloud infrastructure; meaning they control every piece of the extermination machine. They don’t just fund the war. They profit from your extinction. World Economic Forum (WEF) Under the guise of “The Great Reset,” Klaus Schwab and his allies have built the digital scaffolding for a post-human society. Here’s their blueprint: They call it the Fourth Industrial Revolution; the fusion of digital identity, brain cloud integration, carbon rationing, and fertility licensing. What they really mean is: you will be programmed or you will be purged. World Economic Forum / The Great Reset The Great Reset Official WEF Page: https://www.weforum.org/stories/2020/06/now-is-the-time-for-a-great-reset/? IoBNT: The Network Inside You The “Internet of Bio-Nano Things” is a classified field of tech that embeds self-replicating nanostructures into your body. These bots cross the blood-brain barrier and relay your neural and emotional state to AI command centers in real time. This was not science fiction. It was published by IEEE and confirmed in NIH-linked studies. This is what the vaccines truly delivered: the interface layer. The gateway to behavioral rewrites. To soul suppression. To the installation of the post-human framework. Internet of Bio-NanoThings (IoBNT) IEEE Article: Internet of Bio-NanoThings: For a comprehensive understanding of the IoBNT framework and its implications, you can access the full article here: https://ieeexplore.ieee.org/document/7060516 Nanoparticles Crossing the Blood-Brain Barrier PubMed Review - BBB & Nanoparticles: This comprehensive review discusses the challenges and strategies associated with delivering nanoparticles across the blood–brain barrier (BBB). https://pubmed.ncbi.nlm.nih.gov/27141426/ You were told it was healthcare. It was infrastructure. You were told it was a cure. It was a signal port. And the moment you see it for what it is… The system begins to fall. Part 3 awaits YOU! It will be the deepest dive yet; into the global frequency architecture, how it's used to suppress prayer, grief, memory, and morality, and how your soul signature is tracked and blocked in real time. Because I didn’t come here to be careful. I CAME TO FINISH THIS! And I came with GOD.

Video Transcript AI Summary
The "war on resonance" is a strategic sterilization of God's image through biotech, neuro warfare, and frequency control. Elon Musk's Starlink pulses synchronized frequency control, and Neuralink aims to override emotion and thought, funded by OpenAI. Tesla shares data with the CCP. Bill Gates funded DNA coding vaccine campaigns and sponsored Event 201, partnering with the Wellcome Trust for biodigital identity programs. Donald Trump signed executive order 13887, transferring vaccine strategy to the Department of Defense and initiated Operation Warp Speed, using Palantir for citizen surveillance and granting legal immunity to Pfizer and Moderna. DARPA integrates biotech with national security, developing brain initiatives and remote neural interfaces. In-Q-Tel, the CIA's venture capital firm, funds synthetic biology and AI facial recognition. Palantir detects resonance spikes to preempt human awakening. BlackRock and Vanguard control the digital, pharmaceutical, and cloud infrastructure. The World Economic Forum promotes a posthuman society through digital identity, brain cloud integration, and fertility licensing. IOBNT, the Internet of Bio Nano Things, embeds self-replicating nanostructures to relay neural and emotional states to AI. Vaccines delivered the interface layer for behavioral rewrites and soul suppression.
Full Transcript
Speaker 0: Welcome to the most banned threat in the world, the war on resonance. Part two, the architects of the cage you felt the dissonance. You've tasted the illusion. Now let me unveil the ones who built it because this is not the accidental collapse of human freedom. It is the strategic sterilization of God's image through biotech, neuro warfare, and frequency control engineered by names you know and hands you were never meant to see. Let's begin with the mask they taught you to worship. Elon Musk, they called him a genius, a savior, a rebel billionaire. But what did he do? He blanketed Earth with over 5,500 Starlink satellites, not to provide free speech or faster internet, but to pulse synchronized frequency control over the entire electromagnetic field of Earth. DARPA has confirmed this tech in phase array neuromodulation. Then came Neuralink, an interface not designed to heal, but to monitor, predict, and eventually override emotion, thought, and decision making. Their official white paper outlines multi user brainwave integration, cortical stimulation, and wireless data access from the human mind. And Neuralink? It's funded by OpenAI, the same group building the cognitive infrastructure for posthuman governance. Musk's Tesla factory signed data sharing agreements with the CCP in Shanghai. That data now flows through China's national surveillance cloud. Musk didn't build a utopia. He built the neural grid. Bill Gates, the king of vaccines, the messiah of health, the man who told you he wanted to save the world. Through the Bill and Melinda Gates Foundation, Gates funded global DNA coding vaccine campaigns through Gavi and CEPI. He was one of the chief sponsors of Event two zero one, a pandemic simulation months before COVID nineteen, rehearsing lockdowns, speech control, biometric tracking, and mandatory vaccine passports. He also partnered with the Wellcome Trust, which has actively deployed biodigital identity programs across Africa and Southeast Asia. This wasn't philanthropy. It was pre injection infrastructure. Donald Trump, yes. I said it. This one will be the hardest for many to accept, but the truth is not loyal to your political beliefs. It is loyal only to God. Trump signed executive order one three eight eight seven, transferring command over vaccine strategy to the Department of Defense. Read it yourself. Then came Operation Warp Speed, a military led biodeployment that used Palantir's surveillance dashboards to track every citizen's health behavior and compliance. Palantir's official site confirms this. He also gave full legal immunity to Pfizer and Moderna to deploy synthetic gene modulators under the emergency use authorization. No liability, no justice, just children ding while politicians smiled. That's not patriotism. That's biowarfare with a flag on it. DARPA, the silent empire, the most important agency you were never taught to fear. DARPA's biological technologies office openly admits its mission, integrating biotech with national security. Visit their official page. They are the ones behind the brain initiative, silent talk, and remote neural interface programs, all designed to map your emotional states and interrupt spiritual alignment. The silent talk program was developed to transmit thought between soldiers without speech by detecting pre speech neural signals and decoding them via EEG. DARPA also pioneered graphene oxide nanotech now found in multiple biomedical studies, vaccines, and smart dust aerosol deployment. Graphene oxide biomedical study. Graphene's potential to interact with neural tissue DARPA didn't just weaponize warfare, they weaponized you. In Q Tel and Palantir, the surveillance engine. In Q Tel, the CIA's venture capital firm funds synthetic biology startups, digital ID systems, emotion tracking wearables, and AI driven facial recognition. Their official portfolio can be found on original Post Palantir, founded by Peter Thiel, works directly with military intelligence and now runs predictive modeling for public health, policing, and pandemic response. Proof on original pokes, their goal? To detect resonance spikes, to predict awakening moments, to preempt the uprising of the human soul before it begins. BlackRock and Vanguard, the lords of the grid. These two financial titans collectively hold majority ownership in Pfizer Moderna, Alphabet, Google, Meta, Facebook, Amazon Web Services. As reported by CNBC, they control over 90% of the digital, pharmaceutical, and cloud infrastructure, meaning they control every piece of the extermination machine. They don't just fund the war. They profit from your extinction. World Economic Forum, WEF. Under the guise of the great reset, Klaus Schwab and his allies have built the digital scaffolding for a posthuman society. Their blueprint can be found on original post. They call it the fourth industrial revolution, the fusion of digital identity, brain cloud integration, carbon rationing, and fertility licensing. What they really mean is you will be programmed or you will be purged. IOBNT, the network inside you, the Internet of bio nano things, is a classified field of tech that embeds self replicating nanostructures into your body. These bots cross the blood brain barrier and relay your neural and emotional state to AI command centers in real time. This was not science fiction. It was published by IEE and confirmed in NIH linked studies. This is what the vaccines truly delivered, the interface layer, the gateway to behavioral rewrites, to soul suppression, to the installation of the posthuman framework. You were told it was health care, it was infrastructure, you were told it was a cure, it was a signal port. And the moment you see it for what it is, the system begins to fall. Part three awaits. It will be the deepest dive yet into the global frequency architecture, how it's used to suppress prayer, grief, memory, and morality, and how your soul signature is trapped and blocked in real time. Because I didn't come here to be careful, I came to finish this, and I came with God. Follow me and turn on notifications for post.
An Integrated Brain-Machine Interface Platform With Thousands of Channels Brain-machine interfaces hold promise for the restoration of sensory and motor function and the treatment of neurological disorders, but clinical brain-machine interfaces have not yet been widely adopted, in part, because modest channel counts have ... pmc.ncbi.nlm.nih.gov
404 error: Stealth mode activated | DARPA darpa.mil
Event 201 | Johns Hopkins Center for Health Security The Johns Hopkins Center for Health Security in partnership with the World Economic Forum and the Bill and Melinda Gates Foundation hosted Event 201, a high-level pandemic exercise on October 18, 2019, in New York, NY. centerforhealthsecurity.org
404 - Page not found gavi.org
Why we support COVAX: Mastercard Mastercard, a long-standing partner of Gavi, recently committed US$ 28 million to the Gavi COVAX AMC, to ensure vaccines are accessible to those that needed them the most, no matter where they live. Vaccines Work spoke to Michael Froman to learn why this is a priority and why the private sector needs to be involved in the COVID-19 response. gavi.org
Executive Order on Modernizing Influenza Vaccines in the United States to Promote National Security and Public Health – The White House trumpwhitehouse.archives.gov
Trump signs executive order to improve flu vaccines cidrap.umn.edu
HHS Releases the National Influenza Vaccine Modernization Strategy (NIVMS) 2020-2030 - NACCHO naccho.org
Executive Order on Modernizing Influenza Vaccines in the United States to Promote National Security and Public Health – The White House trumpwhitehouse.archives.gov
CDC Partners with Palantir to Bolster the Fight Against COVID-19 Palantir's software will continue to power the digital operating system for the U.S. public health response to the pandemic. palantir.com
Biological Technologies Office We leverage biological properties and processes to protect U.S. warfighters, including biodefense, medical countermeasures, tactical care, and recovery. darpa.mil
Pentagon Preps Soldier Telepathy Push Forget the battlefield radios, the combat PDAs or even infantry hand signals. When the soldiers of the future want to communicate, they’ll read each other’s minds. At least, that’s the hope of researchers at the Pentagon’s mad-science division Darpa. The agency’s budget for the next fiscal year includes $4 million to start up a program \[…\] wired.com
Graphene Oxide: Opportunities and Challenges in Biomedicine - PubMed Desirable carbon allotropes such as graphene oxide (GO) have entered the field with several biomedical applications, owing to their exceptional physicochemical and biological features, including extreme strength, found to be 200 times stronger than steel; remarkable light weight; large surface-to-vo … pubmed.ncbi.nlm.nih.gov
Graphene in the Design and Engineering of Next-Generation Neural Interfaces - PubMed Neural interfaces are becoming a powerful toolkit for clinical interventions requiring stimulation and/or recording of the electrical activity of the nervous system. Active implantable devices offer a promising approach for the treatment of various diseases affecting the central or peripheral nervou … pubmed.ncbi.nlm.nih.gov
IQT | Portfolio iqt.org
In-q-tel - Wikipedia en.wikipedia.org
Nanoparticle transport across the blood brain barrier - PubMed While the role of the blood-brain barrier (BBB) is increasingly recognized in the (development of treatments targeting neurodegenerative disorders, to date, few strategies exist that enable drug delivery of non-BBB crossing molecules directly to their site of action, the brain. However, the recent a … pubmed.ncbi.nlm.nih.gov

@TrueOnX - Noah

I went back to verify the links after posting… and, just as expected, several of them have already vanished; 404 errors. Stealth mode. Silenced. But hear me now: Do not panic. Do not despair. I will personally re-upload and provide every link again below; because the truth cannot be erased, even if their machines try to hide it. These were active before I posted. And suddenly… they’re gone. Ask yourself why. I’ve poured tens of thousands of hours into uncovering this knowledge. I’ve stood in places most would never dare. I’ve faced death for the sake of truth more than once. And I will do it again and again. Because I am not doing this for applause. I’m doing this for every single one of GOD’s Children; those still asleep, those barely holding on, and those brave enough to stand beside me. I walk without fear. I speak without compromise. I move armored in the NAME of GOD; fearless, unwavering, and unshakable. I will never stop. They can bury links. But they will never bury the living voice of truth. Stay tuned. The restored links are coming next.

View Full Interactive Feed