TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Vault 7 is the biggest intelligence leak ever, with less than 1% of the material published so far. It reveals that the CIA has created its own version of the NSA focused on hacking. They develop viruses and trojans to infiltrate people's devices and collect information for the CIA. This information can be used to falsely implicate someone in a crime. The CIA's budget has increased, giving them more power, and they now have their own drone fleet and hacker squad. Unlike the NSA, the CIA targets endpoints instead of intermediaries, bypassing encryption. If a phone is hacked, encryption becomes irrelevant as the information is gathered before or after encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
Last month, CISA disclosed that their systems were hacked due to vulnerabilities in Ivanti products. The compromised systems contained sensitive data on security assessments for government networks and chemical facilities. This breach poses a significant threat to national security, as hackers now have access to critical information. Despite warnings and patches, CISA failed to update their systems in time, leading to the compromise. The impact of this breach could extend to other government agencies and organizations, putting citizens and infrastructure at risk.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims Windows includes a piece of malware called OneDrive that will spontaneously delete all files off your computer, not from OneDrive but from your local machine. They say, “OneDrive will spontaneously delete all of the files off of your computer,” and that “all of my photos and videos of my family, all of my work files, everything is gone.” - They assert there is no warning, no confirmation button, and no pop-up before this happens. It “will start doing it” during a Windows update that begins using OneDrive, with “no plain language warning to opt out.” - OneDrive allegedly quietly uploads everything on the computer to Microsoft servers, and users may notice only when OneDrive warns that it’s running out of space. The user then looks up how to stop it and “you will get onto your computer the next day to find everything is gone.” - After deletion, the desktop shows a single icon that says, “where are my files?” They say many people thought they had been hit by ransomware or a virus. - When the user tries to recover, they are forced to download all the files back to the machine, which can take a long time on slow or metered Internet connections. - If the user then deletes the files from the local computer and also from OneDrive, the files are deleted from the computer again with “no warning, with no pop up, without anything.” - The only way to delete the files off the machine without also deleting them from OneDrive is to follow a YouTube tutorial with detailed steps, because there is no intuitive way in the menus. They emphasize there is no plain English explanation like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” - The speaker argues that many people assume cloud storage is a backup, but OneDrive “secretly transfers your machine to their machine so that their machine is the primary. Those files are the copy of the files.” When you work on the local machine, it is treated as temporary access to those files. This slows the machine because it writes and reads data to the cloud rather than the hard drive. - Practically, if anything happens to the file on OneDrive’s machine, it’s deleted everywhere because it’s now only on their machine, and you are only allowed to temporarily access it. The speaker notes this is “very intuitive” to accidentally delete everything, and questions how this was allowed to go out the door. - The concluding point: when OneDrive says it’s full and you delete things to free up space, it deletes them from your machine too, which the speaker finds unbelievable.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's military have breached critical US services, aiming to disrupt systems like the Texas power grid. Targets include a Hawaii water utility, a West Coast port, and an oil pipeline. The goal is to weaken US power projection in Asia or create chaos to influence decision-making during a crisis. The People's Liberation Army has infiltrated around 24 computer systems in the past year.

Video Saved From X

reSee.it Video Transcript AI Summary
China's cyber program is the largest in the world, surpassing all major nations combined, and has stolen vast amounts of American personal and corporate data. Beyond cyber theft, a significant concern is the Chinese government's positioning within American civilian critical infrastructure, allowing them to potentially cause harm at their discretion. They have already embedded malware in essential systems, including water treatment plants, transportation networks, the energy sector, the electric grid, natural gas pipelines, and telecommunications. This threat poses a serious risk to national security.

Video Saved From X

reSee.it Video Transcript AI Summary
OneDrive on Windows allegedly behaves like malware by spontaneously deleting all files from your local machine without warning or confirmation. The speaker claims that after a Windows update begins using OneDrive, there is no plain-language warning to opt out, and it starts uploading everything on the computer to Microsoft servers. Some users notice this when a slow or metered Internet connection causes large uploads, or when OneDrive warns that it is running out of space. According to the speaker, once the process starts, all data on the local computer is uploaded to Microsoft servers and appears on the desktop as an icon labeled “Where are my files?” The message suggests that all of your life’s work has been deleted from the local machine “without ever asking you.” The user may then be forced to download the files back to the local computer, which can be extremely slow on slow or metered connections, requiring many gigabytes to be re-downloaded. After the user downloads the data again, they may choose to delete it from OneDrive. However, deleting files from OneDrive results in the same files being deleted from the local machine, again with no warning or pop-up. The only way to delete the files from OneDrive without removing them from the local machine, the speaker claims, is to follow a YouTube tutorial with detailed steps; options to prevent this are buried in menus and do not state in plain English what they do. The speaker contends that OneDrive is not a traditional cloud backup but secretly makes the user’s machine secondary to OneDrive’s machine, with the cloud copy being the primary. When working on the local machine, the system is treated as temporarily accessing the cloud copy rather than using local storage. This allegedly slows down the machine since data must be uploaded and downloaded to the cloud rather than read from and written to the hard drive. The claim is that at no point does OneDrive explain in plain language that it intends to take everything on the computer and put it on Microsoft’s machine instead. The speaker emphasizes that this is unintuitive and easy to accidentally delete everything, and questions why such behavior was allowed to go forward without intervention. The core concern is that OneDrive’s behavior makes the cloud copy the authoritative version, with local data being secondary, and no clear, explicit warning about this transition.

Video Saved From X

reSee.it Video Transcript AI Summary
One speaker claims that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on your local computer without warning. The process, they say, starts when Windows updates to begin using OneDrive, but there is no plain-language opt-out warning. Gradually, it begins uploading everything on the computer to Microsoft servers, potentially tens of gigabytes, which may be noticed only if the connection is slow or metered. If you later search for how to stop it, you’ll find options to turn off OneDrive backup, but upon returning the next day you’ll find everything has been deleted from your local machine. The desktop is left with a single icon reading, “Where are my files?” When you click it, it tells you that all of your life’s work is now on Microsoft’s machine and was deleted from your machine without asking. The process continues: you’re forced to download all your files back to your machine, which can be a disaster on slow or metered connections due to the large volume of data. When you then try to delete the files from OneDrive, they delete from Microsoft servers and still remove the local copies, leaving you with nothing on your computer. The only way to delete files from Microsoft’s machine without also removing them locally is to follow a YouTube tutorial with detailed steps. To make OneDrive stop this behavior requires looking up the exact steps; there is no intuitive, plain-English option to opt out. The speaker asserts there is no explicit notice like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” If such an option existed in plain language, they claim, people would say no. The speaker argues that many people equate cloud storage with a backup, but OneDrive allegedly does not function as a back-up; instead, it secretly transfers the user’s files to their machine so that Microsoft’s machine becomes primary, and the user’s local machine is treated as temporary access. This allegedly slows down the computer because data is uploaded and downloaded to the cloud rather than read from or written to the local hard drive. In practice, if anything happens to a file on OneDrive’s machine, the file is deleted everywhere, because there is only the copy on their machine. Throughout, the speaker emphasizes that this behavior is not explained in plain language, is highly unintuitive, and could lead to accidental, widespread data loss. They conclude that it’s hard to believe this was allowed to go out the door or that nobody intervened.

Video Saved From X

reSee.it Video Transcript AI Summary
China's hacking program, deemed the world's largest by the FBI, has resulted in the theft of more personal and business data from Americans than any other country. However, the Chinese Communist Party (CCP) has gone further by targeting American critical infrastructure. Intelligence and cybersecurity agencies have uncovered CCP's hacking activities, which aim to disable and destroy vital infrastructure in the event of a conflict, such as one concerning Taiwan. This cyber warfare strategy can be likened to placing bombs on American bridges, water treatment facilities, and power plants.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially causing chaos and affecting decision-making. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels possess Pegasus spyware, developed by the Israeli firm NSO Group, which can infiltrate phones without requiring users to click any links. This "no-click malware" can access data before encryption, including calls, texts, emails, location, and social media. It can also activate the phone's camera and microphone for surveillance and take screenshots, all while conserving battery life to remain undetected. NSO requires approval from the Israeli Ministry of Defense for each sale. Mexico has had this software since at least 2016. Initially, NSO claimed it helped capture El Chapo, but it was also used against journalists and those opposing government corruption. Cartels are now allegedly teaming up, armed with military-grade weapons and narco drones, viewing the U.S. government as a common enemy. They could use Pegasus for blackmail or to plant evidence on phones. Striking cartels inside Mexico is complicated because the cartels have infiltrated the Mexican government, and military officials admit uncertainty about winning the war on drugs.

Video Saved From X

reSee.it Video Transcript AI Summary
This is an attempt to provide Chinese options in crisis or conflict. We need to remove them from critical infrastructures and remain vigilant. This is a persistent threat that requires daily operation, offensive and defensive capabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational hub of Dominion. This office, staffed by Chinese nationals, manipulates election results using virtual machines created within the election equipment. The manipulation is done through software, leaving no trace unless a detailed forensic audit is conducted. This process involves using Huawei servers, linking back to China. For more information, visit Stolen Elections Facts for documentation.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels reportedly have Pegasus, the spyware used by Israel’s NSO Group to spy on Palestinians, and Mexico could use it on Americans. It can enter a phone and expose everything—calls, texts, emails, contacts, calendar, location, and app data—without the user clicking a link. It can perform a room tap using the device’s microphone and camera, deny access to sites and apps, and capture screenshots. Pegasus is described as no-click malware that pauses itself when battery drain is detected. It was developed by the Israeli firm NSO Group (not the Israeli government), and Israel’s Ministry of Defense must sign off on each sale. NSO has marketed it to Mexico and the UAE, with potential expansion to Europe and the Middle East; the cost is about 500,000 per install for iPhone and Android. A 2017 journalist killing and three Mexican agencies’ involvement were reported; it’s difficult to defend against since you don’t need to click.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus spyware, developed by an Israeli firm called the NSO Group, can get into your phone even if you don't click. It's called no click malware because you don't have to click a a link to get it, and it can detect when it's draining your battery and then pause itself so you don't know that it's there. Mexican cartels have the spyware that the Israeli government uses to spy on Palestinians, and now Mexico can use it on Americans. It can get into your phone, see everything you do, and do what's called a room tap, gather sounds and snapshots in and around the room using the phone's microphone and video camera. It can deny targets access to certain websites and applications and grab screenshots off their phone. It captures calls, texts, emails, contacts, calendar, location, Facebook, WhatsApp, and Skype. It costs 500,000 per install for iPhones and Androids.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces the concept: with this hack, your TV can watch you, as the TV is turned into a device that can monitor your surroundings while you watch. Speaker 1 explains how this is possible: by abusing the smart TV platform’s browser to gain access to the camera built into the TV. With a small amount of extra code, the camera can be turned on within the browser. This is designed so that viewers can see the camera feed, and it can run invisibly behind the web page you are looking at. Speaker 0 emphasizes the practical implication: you could be sitting in one place, such as watching TV from your bedroom, while someone elsewhere—potentially anywhere in the world—views the image of you watching. Speaker 1 confirms this scenario with an example: a person could be on a laptop in a cafe in Paris, and as long as they have a network connection, they could access your TV and the camera feed. Speaker 2 highlights a particularly alarming aspect: there is no indication that the camera is on, and there is no LED light to signal activity. As a result, the camera could be watching you without your knowledge. Speaker 0 asks what defines a smart TV and why it is attractive as a target for hackers. Speaker 2 responds by reframing the smart TV as a computer: it is not just a television, but a device that includes a web browser and runs Linux. Speaker 1 points to a more dangerous possibility: when people use smart TVs for activities like online banking, attackers could translate a legitimate bank address into a different IP address leading to a site controlled by the attacker, creating a phishing-like scenario where a user enters a username and password that goes to the attacker instead of the bank. Speaker 0 conveys Samsung’s response in a CNN Money statement: Samsung says it takes consumer privacy very seriously. They offer a hardware countermeasure by enabling the camera to be turned into the bezel of the TV so that the lens is covered or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when smart TV features are not in use. As an additional precaution, Samsung recommends customers use encrypted wireless access points when using connected devices.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the public is being deceived about election security. They argue that while individual voting machines may not be connected to the internet, state and county databases are. They allege that votes are stored on a server in Frankfurt, Germany, and that the election software used in 28 states may be infected with malware called Q Snatch. Cybersecurity investigators suggest that this malware could allow hackers to manipulate votes in election databases nationwide. The cofounder of Allied Security Operations supports these claims, stating that the malware collects credentials and enables changes to be made to votes at various stages of the election process. The speaker suggests that this could explain the malicious activities observed during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
Our technology teams discovered a concerning issue with connected devices at a polling location. Despite the devices not supposed to have Wi-Fi, they were found to be communicating in real time, both receiving and sending data. This should never happen, and we have documented the incident. We cannot disclose the location, but we have confirmed it in multiple places. There are three types of machines involved: a scanner, a ballot marking device, and a polling pad. The communication is happening through the polling pad, which is used for checking everything. This access could potentially allow someone to manipulate and modify the data being exchanged in the system.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities allow for manipulation. Just before elections, a supposed "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational center of Dominion. This office, staffed by Chinese nationals, allows them to log into U.S. election machines and alter results. They use virtual machines to manipulate data without leaving traces. After the manipulation, they collapse the virtual server, making detection difficult unless a thorough forensic audit is conducted. This entire operation relies on Huawei equipment, linking back to China. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, either to prevent American power projection in Asia or to cause chaos within the US. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

The Why Files

Stuxnet | The Computer Virus That Caused World War 3
reSee.it Podcast Summary
In 2010, the Stuxnet virus was discovered, infecting control systems globally, specifically targeting Iran's Natanz uranium enrichment facility. Stuxnet was unprecedented, containing four zero-day exploits and sophisticated coding that allowed it to evade detection. It disrupted Siemens PLCs controlling centrifuges, causing over a thousand to fail, significantly hindering Iran's nuclear program. Stuxnet was believed to be a state-sponsored cyber weapon developed by the U.S. and Israel. In retaliation, Iran built a hacker group that attacked global financial systems and Saudi Aramco. The U.S. developed Nitro Zeus, a more advanced cyber weapon, ready to disrupt Iranian infrastructure if needed. The ongoing cyber warfare raises concerns about global security and the potential misuse of such technologies.
View Full Interactive Feed