reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker questions if the truth is being hidden again, mentioning a global Microsoft update causing issues. They share a hypothetical scenario involving a friend in India affected by a cyber attack, not an update. The friend mentions a cryptocurrency loss and doubts the information's availability on Google. The speaker expresses skepticism towards media and government transparency, suggesting the truth may surface on TikTok eventually.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims Windows includes a piece of malware called OneDrive that will spontaneously delete all files off your computer, not from OneDrive but from your local machine. They say, “OneDrive will spontaneously delete all of the files off of your computer,” and that “all of my photos and videos of my family, all of my work files, everything is gone.” - They assert there is no warning, no confirmation button, and no pop-up before this happens. It “will start doing it” during a Windows update that begins using OneDrive, with “no plain language warning to opt out.” - OneDrive allegedly quietly uploads everything on the computer to Microsoft servers, and users may notice only when OneDrive warns that it’s running out of space. The user then looks up how to stop it and “you will get onto your computer the next day to find everything is gone.” - After deletion, the desktop shows a single icon that says, “where are my files?” They say many people thought they had been hit by ransomware or a virus. - When the user tries to recover, they are forced to download all the files back to the machine, which can take a long time on slow or metered Internet connections. - If the user then deletes the files from the local computer and also from OneDrive, the files are deleted from the computer again with “no warning, with no pop up, without anything.” - The only way to delete the files off the machine without also deleting them from OneDrive is to follow a YouTube tutorial with detailed steps, because there is no intuitive way in the menus. They emphasize there is no plain English explanation like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” - The speaker argues that many people assume cloud storage is a backup, but OneDrive “secretly transfers your machine to their machine so that their machine is the primary. Those files are the copy of the files.” When you work on the local machine, it is treated as temporary access to those files. This slows the machine because it writes and reads data to the cloud rather than the hard drive. - Practically, if anything happens to the file on OneDrive’s machine, it’s deleted everywhere because it’s now only on their machine, and you are only allowed to temporarily access it. The speaker notes this is “very intuitive” to accidentally delete everything, and questions how this was allowed to go out the door. - The concluding point: when OneDrive says it’s full and you delete things to free up space, it deletes them from your machine too, which the speaker finds unbelievable.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 has a USB drive with 90-95 Gigabytes of data, possibly containing around 4,000 videos of varying quality. The data is organized into "videos" and "photos" folders. There is no passcode on the drive. Speaker 1 states his wife is an idiot with technology and wouldn't know about the drive's contents.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 expresses a strong warning against working with Sam Altman and OpenAI, stating they would never collaborate with them as a developer. They emphasize that this is a warning and note that others may clip the remark. The speaker asserts that OpenAI is studying how developers use the API and points out that Altman and the company are “studying it,” implying ongoing scrutiny of API usage. They describe Sam Altman as someone who has “been around the block,” claiming the speaker has known him since “loop.” The speaker characterizes Altman as “incredibly savvy” and asserts that Altman “wants every bit of revenue from the ecosystem” and “isn’t taking no prisoners.” According to the speaker, Altman intends to study how developers are using the API and believes Altman has “the right to do” so. The speaker then pivots to a broader narrative about Altman’s perceived philosophy, stating that Altman “comes from the Zuckerberg School of Business,” which, in the speaker’s claim, is defined as giving naive people access to tools, studying them, and, “like the Borg,” stealing every innovation they have. The speaker claims Zuckerberg adopted this approach from Bill Gates and Microsoft. The narrative continues with Microsoft’s historical pattern: Microsoft had a platform and operating system, allowed third-party developers to create software such as Lotus 1-2-3, and later produced Microsoft Excel. The speaker also mentions that Microsoft allowed creation of WordPerfect and WordStar, and then built Microsoft Word. The speaker interjects “RIP,” signaling a judgment about that progression. The speaker asserts that Microsoft was “more than happy” to have a broad developer community attending their conferences, showcasing work and receiving awards, explicitly stating they are talking about Microsoft in this context. The parallels are drawn to Facebook, with the speaker claiming Zuckerberg did the same thing with Facebook’s platform, suggesting a similar dynamic of platform growth through external developers and partners. The narrative closes with a mention of Zynga as a significant partner within Zuckerberg’s ecosystem and ends with the assertion that the approach then shifted, implying a change in strategy or emphasis after the initial period.

Video Saved From X

reSee.it Video Transcript AI Summary
OneDrive on Windows allegedly behaves like malware by spontaneously deleting all files from your local machine without warning or confirmation. The speaker claims that after a Windows update begins using OneDrive, there is no plain-language warning to opt out, and it starts uploading everything on the computer to Microsoft servers. Some users notice this when a slow or metered Internet connection causes large uploads, or when OneDrive warns that it is running out of space. According to the speaker, once the process starts, all data on the local computer is uploaded to Microsoft servers and appears on the desktop as an icon labeled “Where are my files?” The message suggests that all of your life’s work has been deleted from the local machine “without ever asking you.” The user may then be forced to download the files back to the local computer, which can be extremely slow on slow or metered connections, requiring many gigabytes to be re-downloaded. After the user downloads the data again, they may choose to delete it from OneDrive. However, deleting files from OneDrive results in the same files being deleted from the local machine, again with no warning or pop-up. The only way to delete the files from OneDrive without removing them from the local machine, the speaker claims, is to follow a YouTube tutorial with detailed steps; options to prevent this are buried in menus and do not state in plain English what they do. The speaker contends that OneDrive is not a traditional cloud backup but secretly makes the user’s machine secondary to OneDrive’s machine, with the cloud copy being the primary. When working on the local machine, the system is treated as temporarily accessing the cloud copy rather than using local storage. This allegedly slows down the machine since data must be uploaded and downloaded to the cloud rather than read from and written to the hard drive. The claim is that at no point does OneDrive explain in plain language that it intends to take everything on the computer and put it on Microsoft’s machine instead. The speaker emphasizes that this is unintuitive and easy to accidentally delete everything, and questions why such behavior was allowed to go forward without intervention. The core concern is that OneDrive’s behavior makes the cloud copy the authoritative version, with local data being secondary, and no clear, explicit warning about this transition.

Video Saved From X

reSee.it Video Transcript AI Summary
One speaker claims that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on your local computer without warning. The process, they say, starts when Windows updates to begin using OneDrive, but there is no plain-language opt-out warning. Gradually, it begins uploading everything on the computer to Microsoft servers, potentially tens of gigabytes, which may be noticed only if the connection is slow or metered. If you later search for how to stop it, you’ll find options to turn off OneDrive backup, but upon returning the next day you’ll find everything has been deleted from your local machine. The desktop is left with a single icon reading, “Where are my files?” When you click it, it tells you that all of your life’s work is now on Microsoft’s machine and was deleted from your machine without asking. The process continues: you’re forced to download all your files back to your machine, which can be a disaster on slow or metered connections due to the large volume of data. When you then try to delete the files from OneDrive, they delete from Microsoft servers and still remove the local copies, leaving you with nothing on your computer. The only way to delete files from Microsoft’s machine without also removing them locally is to follow a YouTube tutorial with detailed steps. To make OneDrive stop this behavior requires looking up the exact steps; there is no intuitive, plain-English option to opt out. The speaker asserts there is no explicit notice like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” If such an option existed in plain language, they claim, people would say no. The speaker argues that many people equate cloud storage with a backup, but OneDrive allegedly does not function as a back-up; instead, it secretly transfers the user’s files to their machine so that Microsoft’s machine becomes primary, and the user’s local machine is treated as temporary access. This allegedly slows down the computer because data is uploaded and downloaded to the cloud rather than read from or written to the local hard drive. In practice, if anything happens to a file on OneDrive’s machine, the file is deleted everywhere, because there is only the copy on their machine. Throughout, the speaker emphasizes that this behavior is not explained in plain language, is highly unintuitive, and could lead to accidental, widespread data loss. They conclude that it’s hard to believe this was allowed to go out the door or that nobody intervened.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the issue of Windows security logs being purged right before two audits were set to begin. They highlight the difficulty in determining who had access to the RTR admin account, which is shared among all accounts. The speaker questions why someone would delete all the results and records from the Dominion software, which is used for tallying and reporting election results, just before an audit. They mention that the deletion was successful and affected files on the NAS directory where election images and details were stored. Overall, the speaker emphasizes the lack of accountability and the need to understand the motives behind this action.

Video Saved From X

reSee.it Video Transcript AI Summary
Private files are no longer kept in physical locations like locked file cabinets. Instead, they are stored on devices like laptops and then in the cloud. This means the data is no longer in a physical place.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reveals shocking information about the deletion of the entire database directory from the d drive of the machine called EMS primary. This deletion occurred approximately 10 days before the machines were handed over to the Senate. Deleting documents after being told to preserve them can have severe legal consequences. Additionally, the main database for the election management system software, which contains all election-related data from the November 2020 general election, is missing from the EMS primary machine. This suggests that it has been removed.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript warns that redacting a PDF must be done correctly because otherwise hidden text behind the redaction can be copied and pasted into a text editor to reveal the original content. It cites the U.S. Department of Justice as having made this mistake with some Epstein files. The speaker references “one of the files from justice.gov” containing a redacted portion and demonstrates that the underlying text can be copied. They describe copying behind the redaction and pasting it into a Word document, illustrating how the original text becomes exposed.

Video Saved From X

reSee.it Video Transcript AI Summary
You no longer keep private files in a locked file cabinet in your basement. They are now on your laptop and in the cloud above us, not in a physical location.

Video Saved From X

reSee.it Video Transcript AI Summary
Think you deleted your data? That's cute. The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on the user’s local computer without warning or confirmation. They assert that after Windows updates, OneDrive starts automatically and quietly uploads everything on the computer to Microsoft servers, sometimes noticeable only when the user is on a slow or metered connection and sees a large upload, or when OneDrive warns that it is running out of space. When users attempt to stop it by turning off OneDrive backup, they allegedly find that all their local files have been deleted, and their desktop shows a single icon that says, “Where are my files?” The speaker states that many people assume they have been hit by ransomware or a virus because of the sudden loss of data, and when they click the icon, they are told that all of their life’s work is now on Microsoft’s machine, and that Microsoft helpedfully deleted it from the user’s machine without ever asking. They claim users are then forced to download all of their data back to their machine, which can be a massive, time-consuming process on slow or metered connections. Furthermore, they argue that when users try to delete the files from OneDrive, the files are deleted from Microsoft servers and then also deleted from the user’s computer again, with no warning or confirmation. The only way to delete the files from Microsoft’s machine without removing them from the local machine, according to the speaker, is to follow a YouTube tutorial with detailed steps. The speaker emphasizes that there is no plain-language option to opt out, and that OneDrive’s options are buried in menus and do not clearly explain that the service takes everything on the computer and makes their machine secondary to OneDrive. The speaker contends this behavior is not intuitive by design and that it is easy to accidentally delete everything, especially when OneDrive indicates it is full and prompts deletion that also removes files from the local machine. They conclude by expressing disbelief that this was allowed to be released and that no one stepped in to stop it.

Video Saved From X

reSee.it Video Transcript AI Summary
- "This is the Apple intelligence report." - "It exports everything that you do, including messages, every fifteen minutes by default." - "While you're at it, turn off everything for Apple advertising and analytics Now scroll to the top of that section and turn off allow apps to track." - "Under Apple intelligence and Siri, scroll all the way to the bottom." - "And if I were you, I would turn off Apple intelligence for now." - "If you haven't seen all the lawsuits and what's going on, it just doesn't seem safe, and you don't wanna be surveilled under any pretense." - "In the photos app, scroll all the way down to the bottom where you will see enhanced visual search." - "This is basically taking a sketch, an AI, duplication of every single one of your photos, to analyze them."

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript centers on a filmmaker's project, This is Digital ID, a documentary exploring what’s unfolding with digital ID in the UK and what it could mean globally for humanity. The project traces the roots of national ID cards in the UK, what is currently being introduced, and the potential future implications. The filmmaker explains that the documentary names specific individuals and delves into the agenda behind digital ID, with footage from protests in London and interviews or appearances from figures such as David Icke and past MPs. The plan began as a low-budget YouTube project filmed on an iPhone, then evolved into a proper documentary intended for broader distribution on platforms like Amazon and Apple TV. The filmmaker describes re-shooting segments, recording with a camera, and gathering on-the-ground footage at digital ID protests to capture public sentiment about its future. A series of bizarre disruptions followed during production. After exporting initial footage, the filmmaker’s hard drive would not read the next day, losing the hard-won edits and the original iPhone footage. Fortunately, footage remained on memory cards, but the setback forced a restart. Believing it a sign to proceed more carefully, a second two-terabyte drive was used, and the editing began with a rough cut, color grading, and sound work. Soon, however, the drive failed in a way that caused data to disappear despite reconnecting cables. A third four-terabyte drive was ordered, but after days of work, the information was lost again. The filmmaker notes the unlikely sequence of three hard-drive failures within a short span and wonders if someone might be trying to stop the release, given broader concerns about freedom of speech in the UK. In response, the filmmaker recovered at least one drive, albeit at considerable cost, and implemented new safeguards: multiple copies stored on external hard drives not connected to the internet, plus distributed backups sent to trusted individuals around the world. The documentary This Is Digital ID is promised to be released soon, with the filmmaker asserting that the project reveals what happens if one says yes to digital ID and how one might never be able to say no to the government again, not just for the current government but future ones as well. The transcript includes brief excerpts from others: Speaker 1 contends that saying yes to digital ID implies you’ll probably never be able to say no to the government again, and not just this government but future governments you don’t know who’ll be there; Speaker 0 notes a protest outside BBC Broadcasting House; Speaker 2 urges global audiences to rise up and that it’s time for the lion to act.

Video Saved From X

reSee.it Video Transcript AI Summary
We introduce photographic memory on the PC through recall, a semantic search tool that recreates past moments. Windows takes screenshots for generative AI processing, making all data searchable, including photos. Despite potential privacy concerns, this feature is only available on the edge and operates locally.

Video Saved From X

reSee.it Video Transcript AI Summary
The Windows security logs were purged right before two audits were scheduled to begin. This makes it difficult to determine who had access to the RTR admin account, which is shared among all accounts. It is unclear why someone would delete all the records and files from the Dominion software, which is used for tallying and reporting election results, the day before an audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces the concept: with this hack, your TV can watch you, as the TV is turned into a device that can monitor your surroundings while you watch. Speaker 1 explains how this is possible: by abusing the smart TV platform’s browser to gain access to the camera built into the TV. With a small amount of extra code, the camera can be turned on within the browser. This is designed so that viewers can see the camera feed, and it can run invisibly behind the web page you are looking at. Speaker 0 emphasizes the practical implication: you could be sitting in one place, such as watching TV from your bedroom, while someone elsewhere—potentially anywhere in the world—views the image of you watching. Speaker 1 confirms this scenario with an example: a person could be on a laptop in a cafe in Paris, and as long as they have a network connection, they could access your TV and the camera feed. Speaker 2 highlights a particularly alarming aspect: there is no indication that the camera is on, and there is no LED light to signal activity. As a result, the camera could be watching you without your knowledge. Speaker 0 asks what defines a smart TV and why it is attractive as a target for hackers. Speaker 2 responds by reframing the smart TV as a computer: it is not just a television, but a device that includes a web browser and runs Linux. Speaker 1 points to a more dangerous possibility: when people use smart TVs for activities like online banking, attackers could translate a legitimate bank address into a different IP address leading to a site controlled by the attacker, creating a phishing-like scenario where a user enters a username and password that goes to the attacker instead of the bank. Speaker 0 conveys Samsung’s response in a CNN Money statement: Samsung says it takes consumer privacy very seriously. They offer a hardware countermeasure by enabling the camera to be turned into the bezel of the TV so that the lens is covered or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when smart TV features are not in use. As an additional precaution, Samsung recommends customers use encrypted wireless access points when using connected devices.

Video Saved From X

reSee.it Video Transcript AI Summary
Your computer is infected with frozen viruses, causing your window to be blocked and affecting Microsoft Servers. Please call support immediately. Do not shut down or restart your computer, as this may spread the viruses further and result in data loss.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about log files on two screens. One screen shows hundreds of log files from 2019 until May 22, 2021. The other screen only has three years of log files, which have mysteriously disappeared. It is mentioned that when a Dominion employee came in, the log files vanished. These files record all access to a specific machine. It is also mentioned that Dominion sent people around the country for software updates during that time. Some participants confirm this information.

Video Saved From X

reSee.it Video Transcript AI Summary
They have complete access to your device and can manipulate it as they please. Although you technically own the device because you paid for it, corporations and governments are gaining more control over it. We are living in a world where we bear the burden of work, taxes, and expenses, yet our ownership diminishes. The previous generation is acutely aware of this reality.

Video Saved From X

reSee.it Video Transcript AI Summary
Google recently auto-installed on Android 9+ a component called Android System Safety Core, which sparked panic because its purpose wasn’t clearly explained. The transcript outlines the following points: Google says the component is for sensitive content warnings and, generally, “performs classification of media to help users detect unwanted content.” It then presents contrasting views from self-described experts. The GrapheneOS maintainers published a post on X stating that SafetyCore “doesn’t provide client side scanning and is mainly designed to offer on device machine learning models that can be used by other applications to classify content as spam, scam, or malware.” The speaker, however, rejects this explanation as “the biggest pack of lies from Shields of Big Tech that lay claim to cybersecurity knowledge,” asserting that the feature is clearly about client-side scanning. The speaker claims that the true purpose is client-side scanning, and that any justification portraying it as a benign feature is false. They express frustration with what they describe as widespread misinformation intended to reassure users that they have nothing to worry about. They insist there is a lot to worry about, emphasizing that Safety Core is, in their view, about client-side scanning and is being framed as a feature users have always needed. The speaker contends that they had anticipated the module “for a long time,” suggesting it was inevitable and tying it to a broader concept they call the “see what you see technology,” which they say is directly connected to AI. They argue that this module completes a circle by bringing all of big tech into client-side scanning. Finally, the speaker warns that to understand how this impacts users, one should stay attentive, implying that the development will have significant and widespread effects.
View Full Interactive Feed