TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2013, mobile devices are now the primary focus, with smartphones constantly emitting signals to cell towers even when idle. These signals contain unique identifiers like IMEI and IMSI, allowing tracking of a user's movements. Companies store this data for unknown purposes, leading to privacy concerns and mass surveillance through bulk collection.

Video Saved From X

reSee.it Video Transcript AI Summary
The centralization of information on computers means that archives, like The Guardian's, are only accessible online. Due to copyright laws, these archives are not copied to other internet locations. When something is removed from these archives, it is gone forever, leaving no trace. This situation gives control over the past to those who control internet servers, influencing our perception of ourselves and the laws we create in society.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: What about the public attitude held by millions of everyday Americans? All I've got on a computer is pictures of my family, CCTV cameras that are prevalent in a ton of American cities and overseas capitals. Those cameras are your friend if you're innocent and have nothing to hide. Speaker 1: Well, I'd say that's very much what the average Chinese citizen believed or perhaps even still to this day believes. But we see how these same technologies are being applied to create what they call the social credit system. If any of these family photos, if any of your activities online, if your purchases, if your associations, if your friends are in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms, and those algorithms are fueled by precisely the innocent data that our devices are creating all of the time constantly, invisibly, quietly right now. Our devices are casting all of these records that we do not see being created, that in aggregate seem very innocent. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information, what they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, they are stealing our power.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims Windows includes a piece of malware called OneDrive that will spontaneously delete all files off your computer, not from OneDrive but from your local machine. They say, “OneDrive will spontaneously delete all of the files off of your computer,” and that “all of my photos and videos of my family, all of my work files, everything is gone.” - They assert there is no warning, no confirmation button, and no pop-up before this happens. It “will start doing it” during a Windows update that begins using OneDrive, with “no plain language warning to opt out.” - OneDrive allegedly quietly uploads everything on the computer to Microsoft servers, and users may notice only when OneDrive warns that it’s running out of space. The user then looks up how to stop it and “you will get onto your computer the next day to find everything is gone.” - After deletion, the desktop shows a single icon that says, “where are my files?” They say many people thought they had been hit by ransomware or a virus. - When the user tries to recover, they are forced to download all the files back to the machine, which can take a long time on slow or metered Internet connections. - If the user then deletes the files from the local computer and also from OneDrive, the files are deleted from the computer again with “no warning, with no pop up, without anything.” - The only way to delete the files off the machine without also deleting them from OneDrive is to follow a YouTube tutorial with detailed steps, because there is no intuitive way in the menus. They emphasize there is no plain English explanation like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” - The speaker argues that many people assume cloud storage is a backup, but OneDrive “secretly transfers your machine to their machine so that their machine is the primary. Those files are the copy of the files.” When you work on the local machine, it is treated as temporary access to those files. This slows the machine because it writes and reads data to the cloud rather than the hard drive. - Practically, if anything happens to the file on OneDrive’s machine, it’s deleted everywhere because it’s now only on their machine, and you are only allowed to temporarily access it. The speaker notes this is “very intuitive” to accidentally delete everything, and questions how this was allowed to go out the door. - The concluding point: when OneDrive says it’s full and you delete things to free up space, it deletes them from your machine too, which the speaker finds unbelievable.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed to be closed systems without internet connectivity or external devices. Dominion, the company mentioned, does not have any remote access to the equipment or machines. No one has access to the information on the machines remotely.

Video Saved From X

reSee.it Video Transcript AI Summary
Governments lack the incentive to adapt and improve because they can't fail like private sector organizations. The technology revolution has transformed private sector organizations, but government organizations have not fully adapted. Government financial systems are decades old. It is claimed that $2.3 trillion in transactions cannot be tracked. Information cannot be shared within a single building because it's stored on dozens of different, inaccessible, and incompatible technological systems.

Video Saved From X

reSee.it Video Transcript AI Summary
OneDrive on Windows allegedly behaves like malware by spontaneously deleting all files from your local machine without warning or confirmation. The speaker claims that after a Windows update begins using OneDrive, there is no plain-language warning to opt out, and it starts uploading everything on the computer to Microsoft servers. Some users notice this when a slow or metered Internet connection causes large uploads, or when OneDrive warns that it is running out of space. According to the speaker, once the process starts, all data on the local computer is uploaded to Microsoft servers and appears on the desktop as an icon labeled “Where are my files?” The message suggests that all of your life’s work has been deleted from the local machine “without ever asking you.” The user may then be forced to download the files back to the local computer, which can be extremely slow on slow or metered connections, requiring many gigabytes to be re-downloaded. After the user downloads the data again, they may choose to delete it from OneDrive. However, deleting files from OneDrive results in the same files being deleted from the local machine, again with no warning or pop-up. The only way to delete the files from OneDrive without removing them from the local machine, the speaker claims, is to follow a YouTube tutorial with detailed steps; options to prevent this are buried in menus and do not state in plain English what they do. The speaker contends that OneDrive is not a traditional cloud backup but secretly makes the user’s machine secondary to OneDrive’s machine, with the cloud copy being the primary. When working on the local machine, the system is treated as temporarily accessing the cloud copy rather than using local storage. This allegedly slows down the machine since data must be uploaded and downloaded to the cloud rather than read from and written to the hard drive. The claim is that at no point does OneDrive explain in plain language that it intends to take everything on the computer and put it on Microsoft’s machine instead. The speaker emphasizes that this is unintuitive and easy to accidentally delete everything, and questions why such behavior was allowed to go forward without intervention. The core concern is that OneDrive’s behavior makes the cloud copy the authoritative version, with local data being secondary, and no clear, explicit warning about this transition.

Video Saved From X

reSee.it Video Transcript AI Summary
Our financial systems are antiquated. We're unable to track trillions of dollars in transactions. Information sharing is severely limited by outdated and incompatible technological systems.

Video Saved From X

reSee.it Video Transcript AI Summary
One speaker claims that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on your local computer without warning. The process, they say, starts when Windows updates to begin using OneDrive, but there is no plain-language opt-out warning. Gradually, it begins uploading everything on the computer to Microsoft servers, potentially tens of gigabytes, which may be noticed only if the connection is slow or metered. If you later search for how to stop it, you’ll find options to turn off OneDrive backup, but upon returning the next day you’ll find everything has been deleted from your local machine. The desktop is left with a single icon reading, “Where are my files?” When you click it, it tells you that all of your life’s work is now on Microsoft’s machine and was deleted from your machine without asking. The process continues: you’re forced to download all your files back to your machine, which can be a disaster on slow or metered connections due to the large volume of data. When you then try to delete the files from OneDrive, they delete from Microsoft servers and still remove the local copies, leaving you with nothing on your computer. The only way to delete files from Microsoft’s machine without also removing them locally is to follow a YouTube tutorial with detailed steps. To make OneDrive stop this behavior requires looking up the exact steps; there is no intuitive, plain-English option to opt out. The speaker asserts there is no explicit notice like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” If such an option existed in plain language, they claim, people would say no. The speaker argues that many people equate cloud storage with a backup, but OneDrive allegedly does not function as a back-up; instead, it secretly transfers the user’s files to their machine so that Microsoft’s machine becomes primary, and the user’s local machine is treated as temporary access. This allegedly slows down the computer because data is uploaded and downloaded to the cloud rather than read from or written to the local hard drive. In practice, if anything happens to a file on OneDrive’s machine, the file is deleted everywhere, because there is only the copy on their machine. Throughout, the speaker emphasizes that this behavior is not explained in plain language, is highly unintuitive, and could lead to accidental, widespread data loss. They conclude that it’s hard to believe this was allowed to go out the door or that nobody intervened.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without any Internet connectivity or external access. They are not meant to connect to the outside world in any way. Is there any remote access to the information on the equipment or within the machines? No, there is no remote access. Does anyone have access, to the best of your knowledge? No, no one has access.

Video Saved From X

reSee.it Video Transcript AI Summary
Private files are no longer stored in physical locations like locked file cabinets. Instead, they are kept on laptops and in the cloud, making them accessible from anywhere. This shift means that sensitive information is now stored digitally rather than in a tangible space.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 says essential digital infrastructure must be secure and sovereign: "one of the most important things is not to put the digital infrastructure in place and make sure it is secure. And often, it needs to be sovereign." Data centers must be in our countries due to privacy: "Data centers, because of the privacy requirements around the data, need to be in our countries or they're not terribly useful. They need to be in our countries, but they also need to be secure." They foresee a passwordless future: "This is the last year you will ever log on to an Oracle system with a password." "By the middle of this year, I'm quite certain you are Tony Blair." Security will rely on biometrics: "The security system, we have biometric logins. The computer recognizes you." "There's no reason to enter a password. In fact, passwords are too easily stolen." They warn about ransomware: "The data centers and data is being taken hostage all over the world." "The ransomware business is a very, very good business." And a preemptive approach: "not after the data is stolen, but before the data is stolen. We can make sure that we're using the latest security technology, and it is going to be biometrics assisted by AI to make sure that you are, in fact, Tony Blair, and I'm sure you are."

Video Saved From X

reSee.it Video Transcript AI Summary
Election machines are not connected to the Internet. Certification processes, beginning at the federal level, mandate that election systems operate in a closed, air-gapped system with no Internet connection.

Video Saved From X

reSee.it Video Transcript AI Summary
You no longer keep private files in a locked file cabinet in your basement. They are now on your laptop and in the cloud above us, not in a physical location.

Video Saved From X

reSee.it Video Transcript AI Summary
We discussed the tension between being open and transparent while also protecting ourselves. We agreed to be open and transparent for everything that happened 90 days ago and before, as it's all gone. It's similar to how cryptocurrencies work, where there is no trail if you don't want it.

Video Saved From X

reSee.it Video Transcript AI Summary
We discovered something in the MRI room—a laptop that we will analyze. We also found a computer that seems to have been used extensively in the MRI room.

Video Saved From X

reSee.it Video Transcript AI Summary
Our financial systems are outdated, making it difficult to track trillions of dollars in transactions. Additionally, the lack of compatibility between different technological systems prevents us from sharing information within this building.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 visited a mine used for storing physical media, specifically filing cabinets dating back to the 1960s, containing retirement paperwork. The speaker questions why paper is still used in 2025, showing an example of a retiree's case folder, which is compiled by hand and moved through the mine. Speaker 1 adds that the retirement process can take over six months due to the manual compilation and storage of paper documents, with calculations also done by hand. Speaker 0 states that the paperwork is extensive and difficult to process. They are implementing modern software to bring the retirement process online, and currently have 25 retirees going through an entirely online retirement process for the first time.

Video Saved From X

reSee.it Video Transcript AI Summary
A new statute was proposed to make it a misdemeanor to knowingly take classified information from secure systems. Our investigation also looked into possible computer intrusions by nation states or hostile actors. It's important to note that Secretary Clinton used multiple servers and administrators during her time at the state department.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without internet connectivity or external connections. Dominion does not have remote access to information or the machines themselves. No one has access to the machines to the best of the speaker's knowledge.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without internet connectivity or external connections. Dominion does not have remote access to information or the machines themselves. No one has access to the machines to the best of the speaker's knowledge.

Video Saved From X

reSee.it Video Transcript AI Summary
They have complete access to your device and can manipulate it as they please. Although you technically own the device because you paid for it, corporations and governments are gaining more control over it. We are living in a world where we bear the burden of work, taxes, and expenses, yet our ownership diminishes. The previous generation is acutely aware of this reality.

The Pomp Podcast

Pomp Podcast #390: Ben Golub on Decentralized Computing & Storage
Guests: Ben Golub
reSee.it Podcast Summary
Ben Golub, who grew up in Cupertino, California, has a diverse background in startups and technology. He began his career in demography and rural health in Africa before transitioning to Silicon Valley, where he worked for Verisign and led several startups, including Plaxo and Docker. Docker revolutionized code deployment by introducing containerization, allowing for efficient code management and distribution. Golub now serves as executive chair of Storage, a decentralized storage network that aims to disrupt the centralized cloud storage market dominated by major players like Amazon and Google. He highlights the inefficiencies of centralized storage, where 90% of the market is controlled by a few companies, leading to stagnant prices. Storage utilizes unused disk space from various operators worldwide, creating a decentralized network that enhances privacy, security, and cost-effectiveness. The platform allows users to store data securely, splitting files into encrypted pieces distributed across multiple drives. Golub emphasizes the importance of providing a seamless experience for customers, enabling them to transition from traditional storage solutions without significant changes to their operations. He believes that decentralization is the future of computing, offering a viable alternative to centralized providers.

a16z Podcast

a16z Podcast | The $200 PC in the Enterprise
Guests: Benedict Evans, Steven Sinofsky
reSee.it Podcast Summary
In this episode, Benedict Evans and Steven Sinofsky discuss the evolution of tech devices in enterprises, particularly the transition from PCs to mobile platforms and the implications of the S curve leveling out. They reflect on the historical resilience of mainframes, noting that IBM thrived for 20 years post-PC disruption, suggesting that PCs may also experience a long tail of profitability despite reduced innovation. The conversation highlights the shift to browser-based applications in enterprises, with many workers now relying on web interfaces rather than traditional Windows apps. They explore the potential for low-cost devices, like Chromebooks, to replace PCs in environments where only browser access is needed. The discussion emphasizes the growing importance of mobile applications and the need for IT to adapt to changing user demands while managing costs effectively. Ultimately, they predict a future where many office tasks are performed through browsers and mobile devices, reshaping the landscape of enterprise computing.
View Full Interactive Feed