TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked visitors to Jeffrey Epstein's island using cell phone data, revealing their movements from various locations to the island. The data showed visitors' origins in multiple US cities and other countries. Near Intelligence sources its data from advertising exchanges, which can be used for mass surveillance. While this data raises privacy concerns, individuals can protect themselves by using trusted apps, turning off location services, using ad blockers, or employing VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Apple has clarified that the iPhone is not taking pictures every 5 seconds, but rather scanning our faces using infrared technology to optimize face ID and emoji features. A video shared by a follower shows that baby monitors also emit infrared lights. It is clear that this scanning is happening, but the question is whether Apple has other motives behind it. To turn off this feature, go to settings, face ID, and passcode, and toggle the attention aware features. The speaker wonders where the data collected for analysis is being stored and what others think about it.

Video Saved From X

reSee.it Video Transcript AI Summary
To check if you're being tracked, dial *#62# on your phone. If you see any call forwarding options, you're being tracked. To disable this, dial ##002# on your phone. This erases all call forwardings. Like, share, and follow for more content like this. Translation: To check if you are being tracked, dial *#62# on your phone. If you see any call forwarding options, you are being tracked. To disable this, dial ##002# on your phone. This will erase all call forwardings. Like, share, and follow for more content like this.

Video Saved From X

reSee.it Video Transcript AI Summary
I have an iPhone. Does Google track my movement if I move to sit with my democrat friends? Google knows if I move, but it depends on the services I've opted into. Can you answer if Google knows I moved without more details?

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses AirPods and their potential use of brainwave data collection. They claim that at a World Economic Forum convention, it was explained how AirPods could be used to make people more productive and help authorities fight crime. The speaker says they posted in 2020 about patents for AirPods that scan brainwaves and pick up on vitals. They further claim that AirPods use microwave technology on the cortex, "cooking the brain" and causing memory loss. The speaker advises listeners to get rid of their AirPods.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received two messages from Apple stating their iPhone was targeted by a mercenary spyware attack. Initially skeptical, the speaker confirmed the messages' authenticity. Apple's message indicated the attack was likely due to the speaker's identity and activities, emphasizing the rarity and sophistication of such attacks, citing Pegasus as an example, and describing them as some of the most advanced digital threats. While uncertain if spyware was installed or who is responsible, the speaker believes the attack is an attempt at intimidation and silencing, possibly by a government, organization, or secret service. The speaker asserts they will not be intimidated or silenced.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker rejects Apple Watch and any smart tech, saying: "I would not put an Apple Watch on my body. I would not microwave myself with an Apple Watch or AirPods or any type of smart technology that they try to sell you." They claim the data is "being sold back to the government," it's "tracking and tracing you" and sold to "the medical system." They warn, "I wouldn’t purchase anything like that," and "I wouldn't even upgrade half your stuff. Now they got new Apple intelligence and all this other weird stuff. Just buy the older versions." They add, "That's all people have to do. You don't need any fancy technology to track your steps." "All you do is you go outside and you take steps." "Everyday I get up, I work out, I be active, I take care of myself, I spend time in nature." "In the book, Doctor John Nutt, Health and Light, he talked about when people would wear watches, it would make them weaker." "He actually also talked about fake clothes and fake lights which we just talked about a second ago."

Video Saved From X

reSee.it Video Transcript AI Summary
Apple has released a digital ID for identification and US passports. Reports say they will be merging their biometric security with encrypted ID storage and plans to replace physical IDs across airports, apps, and businesses. This is said to be used at over 250 TSA checkpoints across domestic airports for identity verification. The speaker mentions one of the richest men on earth, Larry Ellison, who owns TikTok and Oracle and is a big fan of digital IDs. It seems like one big master plan between all the big tech companies. Microsoft dealing with OpenAI, OpenAI dealing with NVIDIA, NVIDIA dealing with Oracle, xAI dealing with NVIDIA, and OpenAI just did a $38,000,000,000 deal with Amazon for cloud storage. So the question is, what are they really planning? Could it be that they're following in the footsteps of China's Skynet, tied to digital IDs, a social credit score, and an AI surveillance system that they actually wanna put on the moon. Skynet. Why does this sound familiar? That's because it's the same name as the killer artificial intelligence in Terminator, Skynet. I'll say it once and I'll say it again, it's always in the movies. Make sure you guys go to my YouTube, Maverick Approach, I do more breakdowns on this, but let me know what you guys think about all this down below.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the breadth and invasiveness of data that can be accessed from a person’s phone, highlighting how such information can be retrieved and used in investigations. They enumerate the various types of data that can be obtained: call logs, chats, cookies, device notifications, emails, instant messages, and passwords. They note that deleted conversations on encrypted apps like WhatsApp and Signal can also be accessible, as well as Millie’s deleted web browsing history. The speakers emphasize that contact information for everyone the person has spoken to, and the locations of all their calls, can be seen. They point out that information about other people’s phone numbers can be accessed, and they ask whether those people’s messages to the person can be seen, with the answer being yes. The police can obtain information about people the person has contacted, not only in relation to any arrest that might have occurred but also concerning individuals who may have contacted the person securely (for example, through Signal) about work. The speakers express that the most worrying aspect is that this kind of data access can happen at the time of arrest, even when charges are never brought, and that it can also apply to witnesses and victims. They argue that there appears to be little clarity about deletion, implying that the police can effectively do what they want when they obtain someone’s phone, which they describe as a scary amount of information. Despite the fear, they also acknowledge that this data is extremely useful for the police in investigations. A central concern raised is the current lack of a required warrant to obtain any of this information. They argue that there should be a degree of checks and balances to determine whether it is proportionate to access such data in a given case, stating that in some cases it may not be necessary to access a person’s phone. Overall, the discussion highlights a tension between the usefulness of comprehensive digital data for investigative purposes and the potential for overreach or abuse in the absence of warrants or robust safeguards.

Video Saved From X

reSee.it Video Transcript AI Summary
Hakim Anwar, CEO and founder of Above Phone, joins Clayton to discuss pervasive surveillance and how to protect personal privacy in 2025–2026. The conversation covers why traditional devices and services—especially iPhones, Samsung/Android phones, and their app ecosystems—are highly surveilled, the role of Amazon Web Services in monitoring traffic, and how messaging apps on these devices are tracked. They frame the problem as a loss of personal privacy and a move toward centralized infrastructure that can be controlled or cut off by large tech platforms. Hakim explains the origin of Above Phone. He started as a software engineer, was already aware of surveillance concerns, and became involved in freedom-based social networks. He pivoted toward open-source technology (Linux, degoogled phones, open-source software) and, five years ago, helped establish Above Phone to create usable privacy-centric devices that are actually functional for daily life. The goal is to be more usable and more private than big tech. The product philosophy emphasizes usable privacy. Above Phone builds on open-source operating systems like GrapheneOS, modeling them off Android but severing ties with Google and other big tech. Hakim notes that typical Samsung/Google Android devices have “god mode” access by Google (and to some extent Samsung), and emphasizes that Above Phone devices are designed to have zero connections to big tech by default, while still enabling users to run necessary apps. Users can choose to install Google services if needed, but in a limited, privacy-conscious way—these services act like normal apps on the device rather than the centralized, all-encompassing control found on stock devices. The phones can be used with existing cell service, and data transfer from iPhone or Android is supported, with live, in-person setup assistance. Setup and operation details: - You can switch to the Above Phone by moving your number with the SIM card (five-minute process), or use the Above Phone in parallel while migrating. - The Above Phone supports both physical SIMs and eSIMs; the data SIM service is eSIM-based. - A private, in-person support team helps with data transfer and setup. - The device can run a sandboxed second profile for Google services, isolating them from personal data. This sandbox can hold essential apps (e.g., WhatsApp) while the primary profile remains private. If needed, Google services can be used in a fully isolated manner, or work apps can be run entirely without Google involvement. Open-source equivalents are provided for many common apps (navigation, messaging, etc.). Privacy mechanics and surveillance: - Hakim explains that big tech devices continually “phone home,” with independent studies showing frequent data transmission to Google and Apple. Enhanced visual search on iPhone, enabled by default, scans photos for landmarks and can link to private indexes, illustrating how centralized platforms can harvest data even without explicit user consent. - Above Phone disconnects from Google’s update stream and ships with zero Google services by default; updates come from open-source developers, not from Google/Apple. Users can still opt to install Google services, but these are constrained and do not have the same “god mode” permissions as on stock devices. - The device supports a private, end-to-end encrypted messaging protocol based on XMPP (Jabber), which is decentralized and can run on a self-hosted or community-driven network. WhatsApp, he notes, is still built on XMPP. The Above Book Linux laptop is highlighted as a privacy-oriented alternative to mainstream Windows/Mac ecosystems. Linux is presented as cooperative, transparent, and less profit-driven. The Above Book ships with an easy-to-use Linux variant designed to avoid terminal use, includes a privacy-focused web browser (Ungoogled Chromium), and offers open-source software replacements (office apps, photo editing, etc.) that store data locally. The laptop supports local AI with Mike Adams’ Brighteon AI integration via LM Studio, enabling private, offline AI capabilities on the device. The company positions Linux and Above Book as enabling local work, with offline AI and offline maps via OpenStreetMap-like tooling. Hakim closes with a forward-looking stance on digital ID and the “surveillance grid” being advanced through regulatory acts into 2027–2030. He frames the investment in Above Phone and Above Book as a preparation for a world where privacy must be actively preserved, and encourages viewers to explore abovephone.com/redacted and abovephone.com for more information and products. David and Clayton engage on skepticism, marketing, and the broader implications of privacy-centric technologies, reinforcing the idea that the goal is practical privacy and education rather than ideology.

Video Saved From X

reSee.it Video Transcript AI Summary
Do you want T Mobile to track your work performance, financial situation, health, personal preferences, and movements? Do you trust them to share your data with researchers or to personalize ads using your app data? Would you like to help T Mobile improve their products by sharing your data? Many of you likely answered no to these questions. However, T Mobile has automatically enabled these settings on all accounts, and you must manually disable them if you do not wish to participate.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
We've discovered that Apple's voice-to-text feature exhibits some strange behavior. When you use voice note to text and say the word "racist," the text displays an odd visual glitch. It seems like a deliberate form of subliminal programming, similar to other instances where tech companies manipulate information, like Google did after Trump got shot, or how headlines mislead users with false information. This isn't isolated; others can replicate it on their iPhones, too. We'll be going live at 11AM Central to discuss this further and provide HD screenshots. Follow me at RealAuctions for more updates.

Video Saved From X

reSee.it Video Transcript AI Summary
To reduce the risk of iPhone hacking, the speaker advises changing three settings. First, access the Wi-Fi settings, tap the "i" next to your network, and ensure "Private Wi-Fi Address" is set to rotating, not fixed. A fixed address makes the phone vulnerable. Second, in Wi-Fi settings, turn off "Ask to Join Networks." This prevents unauthorized access. Finally, in Settings under General, then AirPlay & Handoff, set "Automatically AirPlay to TVs" to "Never" (or "Ask"). Leaving it on automatic creates an open path for hackers, especially on public networks.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
Today we'll discuss the Apple AirPod patent, which reveals the data collected by the AirPods while in use. The question arises: where does this information go? Additionally, Apple phones have a fitness tracker that monitors steps, body motion, brainwaves, and more. It is advised to disable this feature. Interestingly, AirPods can be configured to provide health-related data like heart rate, blood pressure, and diet information. The concern is who is collecting this data and if it aligns with the narrative of Elon Musk's chip implantation. It seems the AirPods may be connected to this concept. What are your thoughts?

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked cell phones of visitors to Jeffrey Epstein's island, exposing their data online. Near Intelligence, linked to US defense contractors, meticulously monitored visitors' movements over 3 years. The data revealed locations in the US and other countries. Near Intelligence sources data from advertising exchanges, selling it for targeted ads and possibly to the military. This highlights the potential for mass surveillance through ad tech. While smartphone users can be tracked, steps like using trusted apps, disabling location services, and using VPNs can help protect privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that the control grid arrived in America via Apple, stating they worked for Apple for seventeen years and still hold stock, so they find no joy in revealing this. They claim there are no good guys here and argue that we need to shut it down while we can. They state that Apple just rolled out digital ID integration and acknowledge it sounds convenient, but warn that every convenience has a price. According to them, once identity goes digital, it becomes programmable, and once programmable, it becomes controllable. They contend that individuals are handing over their entire identity wrapped in a product, a file that can easily be deleted. If one does not comply, access is lost; if opinions are not liked, accounts are frozen. They claim that stepping out of line results in travel restrictions, bank transfer blocks, and loss of benefits. They insist this is not speculation and that it is already live. Examples are offered to illustrate the claim: Thailand has programmable digital currency; Europe introduced biometric wallets; Canada froze accounts during protests; China is described as having started the pilot and now in full production mode with a live social credit system. They assert that China is secretly building the infrastructure at a global level right now, not through laws or force, but through updates and convenience. They claim that in Vietnam, 86,000,000 bank accounts were deleted because people wouldn’t agree to a digital ID. Concerning the European Union, they state that by 2027, large cash payments will be outlawed, forcing people onto digital rails that can be controlled. They describe this as just the on ramp, arguing that freedom becomes conditional when identity is controlled by a corporation or a government that can revoke it with a keystroke. They describe the arrival of dystopia as occurring not with tanks or force, but with app updates or convenience. They conclude by urging listeners to pay attention and push back while they still can. The message ends with an appeal to “Let’s go,” emphasizing urgency to resist the rollout of digital identity and programmable control embedded in convenient updates and services.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.

Video Saved From X

reSee.it Video Transcript AI Summary
Apple's upcoming upgrade will integrate ChatGPT into every iPhone, enabling the collection and analysis of user data. A side-by-side test revealed that both Google and Apple phones transmit significant data dumps, around 50 megabytes, between 2 and 3 AM nightly, sharing user preferences and daily activities. By age 13, an average American child has had 72 million data points collected on them by big tech, tracked through a unique 32-digit advertising ID. This ID allows companies to monitor device locations for targeted advertising and sales. The goal of unplugged communication is to help people connect without surrendering their digital data to tech companies. Some individuals prefer to remain uninformed and compliant, while others seek to protect their privacy.

Coldfusion

Apple’s AI Disaster - A Rare Failure
reSee.it Podcast Summary
In recent years, Apple software has faced significant issues, with reports of bugs and incomplete features. The introduction of Apple Intelligence, touted as the company's AI solution, has been criticized for failing to deliver on promises, leading to multiple class action lawsuits for false advertising. Internal chaos within Apple's AI division, including infighting and leadership changes, has hindered progress. Key features showcased in demos were staged and not functional, raising concerns about Apple's ability to compete in the AI space. While competitors like Google and Samsung have advanced their AI capabilities, Apple has struggled with Siri's development and internal mismanagement. The company plans to roll out new features for Siri in fall 2025, but skepticism remains about their effectiveness.

Coldfusion

Apple vs Facebook - The Great Privacy Fight
reSee.it Podcast Summary
In the early days of the internet, possibilities seemed endless, but corporate monopolies now exploit user data for profit. Apple has introduced features in iOS 14 and 14.5 that enhance user privacy by allowing users to see what data apps collect and to opt out of tracking. This directly challenges Facebook's business model, which relies on targeted advertising. Zuckerberg has expressed concern over potential impacts on small businesses and profitability. Apple's moves could set trends in user privacy, but the long-term effects on the internet remain uncertain.
View Full Interactive Feed