reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Americans who received $35,000 in debt relief deserve it, but those who didn't go to college and are in debt are being financially crushed. They need help to get their lives back on track.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker explains how to dispute a charge on a Citibank credit card. Steps: log in to your Citibank credit card account, click on view transactions, scroll to the transaction you want to dispute and click on it, click on dispute charge, fill out the dispute form, submit it, and you are done. Remember to click on the submit dispute form.

Video Saved From X

reSee.it Video Transcript AI Summary
The CDC is accused of hiding crucial information, with a 148-page report on myocarditis after COVID-19 vaccination being completely redacted. Debt is a growing issue in the US, with credit scores dropping and interest rates rising. Done With Debt offers innovative debt relief strategies to help individuals struggling with debt. Michael Pearson from Done With Debt emphasizes the importance of seeking help and provides solutions to manage and settle debts effectively. For more information, visit done with debt.com.

Video Saved From X

reSee.it Video Transcript AI Summary
A senator questions a 23andMe representative about their data privacy policies, specifically regarding the sale of consumer data. The senator claims the company's privacy statement says they cannot share information without consent, yet they are selling it. The representative states customers can delete their data anytime, even after the sale. The senator points out that the deletion page went down after the sale announcement. The representative claims the issue was fixed and customers can now delete their data. However, the senator reads from 23andMe's privacy policy, which states the company retains genetic information, date of birth, and sex even after account deletion. The representative initially denies retaining genetic information, but then admits to retaining name, email address, and other data. The senator accuses the company of not allowing consumers to permanently delete their data and lying to them. The senator concludes that 23andMe controls consumer data and is violating its promises.

Video Saved From X

reSee.it Video Transcript AI Summary
"Ask for this and watch debt collectors disappear." "Debt collectors can talk tough until you ask for this one thing, the chain of custody." "The chain of custody is a paper trail that shows how your debt was legally transferred from one company to another with your full file, your contract, and all your details intact." "Who sold it, when they sold it, and for how much? They need to prove it." "Under the Fair Debt Collection Practices Act, you can request this when you ask for debt validation." "If they can't prove it, then that's your opportunity to dispute it with the credit reporting agencies and possibly get it deleted." "Just remember guys, there are laws in place and we need to exercise our rights and educate ourselves on these laws because we're not taught these things in school and it's done purposely."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that whether something was stolen is up to the Harris team to disclose. The Biden-Harris campaign can decide if the FBI can see what was stolen and whether Donald Trump, a competitor, can see what was taken. In some instances, the FBI can demand information. In other instances, they have to ask the owners of the information to provide it. The speaker confirms they can ask on behalf of others. The speaker concludes that the situation is "quite bad."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker advocates downsizing all assets and resources, especially for public figures who are fighting a public battle and have a social media presence. The key goal is to maintain anonymity by moving wealth into Bitcoin so others cannot know you have it. Keeping funds on centralized exchanges or in a nameable account makes them visible and traceable, which the speaker warns against. The recommended strategy is to transfer wealth into Bitcoin and ensure it remains untraceable by using cold storage in an air-gapped, multisignature wallet. The idea is that once funds are in Bitcoin, they effectively disappear from scrutiny and cannot be proven to belong to you if properly secured. To implement this, one should convert assets into Bitcoin and transfer them to a cold storage setup that uses air-gapped security and multisig authorization. The speaker emphasizes the risk of losing access by keeping assets in traditional, monitored locations; specifically, if you leave Bitcoin on a centralized exchange, it can be seen and tied to you. Finally, the speaker notes a harsh consequence: if you conduct this process and then lose the private keys, you lose all the Bitcoin. In other words, the method hinges on secure, private control of keys, and the trade-off is the possibility of total loss if the keys are misplaced.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that you must get your wealth out of the system and downsize all of your assets and resources, especially if you are a public figure and you have any presence on social media. The guidance is that if you’re fighting this “good fight” and you have a public presence online, you need to be downsizing your wealth and assets. The speaker stresses moving as much of your wealth into Bitcoin as possible, so that nobody knows you have it and there is no way to prove you possess it. Once it’s moved into Bitcoin, it’s described as “gone,” in the sense that it cannot be easily traced or proven in the same way as traditional holdings. The warning continues that you should avoid having Bitcoin on any centralized exchanges in a way that makes it obvious whose name is tied to the holdings. The explicit instruction is to get the money into Bitcoin and keep it off centralized exchanges where it can be seen in your name. After acquiring Bitcoin, the recommended setup is a cold storage air-gap multisig wallet. The speaker emphasizes that you should not leave Bitcoin in a system that can be easily accessed or monitored; instead, use cold storage that is air-gapped and protected by a multisignature scheme. The speaker describes the consequences of losing access to private keys: if you lose your private keys, you lose all your Bitcoin. The phrasing used is that you should “go on a boat ride and you fucking lose your private keys and it sucks,” underscoring the irreversible loss associated with losing keys. Overall, the message centers on aggressively relocating wealth into Bitcoin, prioritizing anonymity and security through cold storage and multisig setups, and recognizing the high risk of permanent loss if private keys are lost or compromised. The repeated emphasis is that you must get your wealth out of the system, stay light on your feet, and move assets into Bitcoin to maintain anonymity and reduce traceability.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript warns that redacting a PDF must be done correctly because otherwise hidden text behind the redaction can be copied and pasted into a text editor to reveal the original content. It cites the U.S. Department of Justice as having made this mistake with some Epstein files. The speaker references “one of the files from justice.gov” containing a redacted portion and demonstrates that the underlying text can be copied. They describe copying behind the redaction and pasting it into a Word document, illustrating how the original text becomes exposed.

Video Saved From X

reSee.it Video Transcript AI Summary
Ghost students are sophisticated thieves who steal money from the federal government by enrolling in schools using stolen identities, then disappearing with the funds. They sign up for federal loans, and often the debt is assigned to someone who doesn’t know they exist. US Department of Education assistant inspector general for investigation Jason Williams notes that victims can discover they’re responsible only after receiving notices from the department, a servicer, or the IRS for debts they don’t recognize. Williams emphasizes that open-enrollment community colleges are especially vulnerable because they admit almost all applicants. Some colleges report that more than a third of recent applicants are fake. In fraud schemes, individuals can be enrolled at two or three different schools at the same time and receive aid from all of them. The result is overwhelming confusion and financial exposure for real students and institutions. A real-world example involves Murat, a 58-year-old mayor of a suburban DC area and his teenage son, who were victims of identity theft through ghost student fraud. Someone had already beaten them to it, stealing their identities and signing both up for classes at community colleges nationwide. Murat noticed a high volume of activity, including many applications and loan applications. People can learn they’re victims in several ways, such as checking a credit report for unfamiliar accounts. The FTC’s Midwest region director, Jason Adler, recommends freezing credit online for free with the three major credit bureaus. For minors, a parent may need to initiate the freeze, and the bureaus will create a credit file for the minor and place the freeze. Eva Velasquez of the Identity Theft Resource Center adds that while credit freezes help, lenders and colleges also need stronger verification processes to prevent fraud. Velasquez also notes that while institutions want to facilitate easy enrollment, some friction in verification is necessary to confirm identity. The federal government reports scammers increasingly use artificial intelligence to broaden their reach and defeat fraud-detection controls, combining stolen core identity credentials (e.g., Social Security numbers, driver’s license numbers, names, dates of birth) with fake information (such as bank accounts) to access funds. Both the Identity Theft Resource Center and the FTC offer free help to fight identity theft, with resources linked in the program’s app and website. The Department of Education’s Inspector General reports the federal government has lost more than $350 million to ghost student scams, with more than 200 active investigations nationwide.

Video Saved From X

reSee.it Video Transcript AI Summary
When you sign a promissory note or bill of exchange, you're essentially providing cash equivalent, allowing banks to use it as collateral. Your house or car is not collateral; the signed note is. By not claiming your assets, you unknowingly agree to pay more than necessary. If facing foreclosure, take action by claiming the deed of trust and the note, asserting your rights. The banks only have authority if you don’t claim your assets. Educate yourself on the legal process and don’t expect free help; take responsibility for your situation. Stand up for your rights and learn how to navigate the system effectively.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes a strategy for people having problems with law enforcement: file a Freedom of Information Act request with the county manager for any communique regarding your name, including emails or any entries in the NCIC system or state bureau of investigation records mentioning you. Send the request to the county manager or assistant county manager stating, under the Freedom of Information Act, you're requesting any communique regarding your name. The response should be a file dump showing what the FBI has entered, or what’s in the NCIC system about you. If you find false information, request its correction. If they ignore you, you sue them in federal court. The NCIC national database is governed by the FBI, and it’s a federal crime to use the NCIC system to submit false information. Lawyers may downplay it as casual talk, but it’s described as a very serious offense; most false NCIC-entry cases are settled quickly and quietly to avoid public scrutiny. Speaker 0 advises to file a FOIA request for any communication regarding your name, with the county, the state bureau of investigation, and NCIC systems. When you receive it, examine for false information and request corrections; if there’s no response within days (ten suggested), you sue. This is presented as a federal crime and a violation of federal law and state statutes. The speaker mentions ongoing litigation in Cherokee County, North Carolina against the sheriff and others for false NCIC entries, and urges people nationwide to pursue accountability, citing a personal grievance with Dustin Smith, a candidate for sheriff in Cherokee County, including an alleged incident where his wife faced an arrest warrant for second-degree trespass after being told there were civil papers to pick up, leading to property removal and stolen items, with the trespass charges later dropped and expunged. The discussion pivots to the founders: the last resort is emphasized, citing The Federalist Papers number 28 by Alexander Hamilton, about when representatives betray constituents and the people have no recourse other than self-defense. The Declaration of Independence is cited about abuses and usurpations, the right to alter or abolish a destructive government, and the right to revolution and to keep and bear arms. The Second Amendment is described as not just about hunting or self-defense but about securing freedom; the government cannot tell people what guns to have to resist tyranny, and peaceful gun ownership includes machine guns in the context of a right to bear arms, with peaceful not equaling harmless. Speaker 0 concludes by urging viewers to use FOIA to obtain documentation, pursue lawsuits for false information, and notes that public servants’ communications are not private, including text messages and emails, and that defamation per se laws can apply. The goal is to hold public servants accountable; a 10% turnout of suing viewers could deter abuse, and the speaker emphasizes willingness to go to trial rather than settle, even at personal cost. Speaker 1 ends with the words “Spark. Spark. Spark. Spark.”

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the national debt and how it has grown over the years. They question who the debt is owed to and how it is being paid back. They explain how the Federal Reserve controls the money supply and manipulates the economy. The speaker also highlights the impact of debt on individuals and society, urging listeners to break free from the cycle of debt. They emphasize the need to be aware of the system and make conscious financial decisions.

Video Saved From X

reSee.it Video Transcript AI Summary
France must pay the $20 million debt installment to us as promised, with no legal justification for not doing so. While there is no international mechanism to enforce debt collection, it is often more practical for creditors to negotiate with defaulting entities, such as important corporations. The same approach should be taken with France, rather than resorting to force or reprisals.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes smart meters as more than just electricity meters, asserting they function as personal surveillance devices. They claim smart meters sense when devices are turned on or off, measure watt usage (even for small devices like an electric toothbrush), and transmit that data wirelessly through neighbors’ meters to the power company. The data allegedly records electric consumption every minute, stored forever on computers the public cannot access, revealing when someone is home, asleep, on vacation, hosting visitors, using lamps or tools, running a business from home, or bootlegging energy off the grid. The speaker asserts this creates a vivid profile of private living patterns and indicates at-home presence on the night of a murder. The speaker contends this is not electrical metering but personal surveillance—a warrantless search daily. They claim personal life information travels from the meter to the power company, to the government, police, and insurance companies, and to anyone who partners with the power company to access it. The speaker further asserts that even without a direct data-sharing agreement, information can be intercepted via the wireless signal from the meter, because smart meters are radio transmitters. They identify a one-watt radio station licensed by the FCC as the transmitter sending all electrical life details to a data center. Examples are given of authorities in Ohio, Texas, and British Columbia using smart meter data to pinpoint marijuana grow houses, enforce business licenses, and punish private home activities, implying surveillance beyond what residents accept. The claim is made that the power company can sell personal life data to anyone, and that unusual power usage patterns can be used as probable cause to raid a home for growing marijuana or running a computer server without a license. The speaker describes this level of surveillance as “about as big brother as it gets,” with utility workers going door-to-door to install meters. They express a personal opinion that smart meters should be removed from homes, arguing that power companies cannot claim the right to install surveillance devices on residences. They equate smart meters with wiretapping and note wiretapping is illegal in all U.S. states and federal territories. The speaker asserts that allowing a smart meter is tantamount to walking around with a constant webcam on one’s head and accuses the industry of relying on implied consent—the idea that permission is granted if the utility can change the meter, even if residents don’t understand the scope of what’s happening. As a practical step, the speaker advises telling utilities not to change the meter, noting that older meters were billed successfully. They claim to have sent a certified letter denying installation of a smart meter and mention a copy of their letter is available in the video’s description for viewers to adapt. They state post office certified mail is used to obtain a receipt. The speaker concludes that if the meters are installed on every house in America, it would cease to be America.

Video Saved From X

reSee.it Video Transcript AI Summary
I called Garland Riggs, an 80-year-old with 31,073 donations made under his address. He denies donating to ActBlue. Riggs suspects someone is using his information. He agrees to look into it.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker urges rapid downsizing of wealth and assets, especially for anyone who will have a public presence or an active social media profile. The core instruction is to get wealth out of the traditional system and keep it on a minimal, flexible footing so a person can stay “light on your feet” as they fight this good fight. The emphasis is placed on anonymity and mobility: if you have public visibility and your assets are traceable, you are vulnerable. A central recommendation is to move wealth into Bitcoin and to do so in a way that makes it effectively invisible to others. The speaker asserts that once wealth is converted into Bitcoin, “it's in Bitcoin. Right? So nobody knows you have it. Nobody can fucking prove that you got it.” The concern is exposure through centralized avenues: “it's on a centralized exchange in an area where they can obviously see that it's in your name.” The implication is that public names and on-chain records can reveal ownership and make one a target. To protect anonymity, the speaker prescribes using cold storage, an air-gapped multisig wallet setup. The process involves transferring funds into a secure Bitcoin storage solution that is not connected to the internet or any easily traceable accounts. The description suggests creating a robust, private system that resists easy attribution or retrieval by others. The narrative uses a stark metaphor about risk and loss: you might “go on a boat ride and you fucking lose your private keys and it sucks. You lost all your Bitcoin. Oh, well.” This underscores the consequence of losing access credentials in a highly secure storage arrangement—the assets could be irretrievable. Overall, the message centers on two intertwined ideas: (1) reduce and compartmentalize wealth to maintain mobility and privacy, especially for public figures, and (2) use Bitcoin and advanced storage methods (cold storage, air-gapped multisig) to keep wealth hidden from prying eyes, with the acknowledgement that missteps (like losing private keys) result in total loss. The speaker repeats the imperative: “Gotta get your fucking wealth out of the system,” reinforcing the urgency of downscaling and re-holding wealth in a way that minimizes exposure.

Video Saved From X

reSee.it Video Transcript AI Summary
Fight Voter Fraud, active in 49 states, provides free data on double-registered voters, some of whom have voted in multiple states. Voter rolls are described as a mess, with examples cited, including one individual who allegedly voted three times in North Carolina and Florida. The speaker advocates for law enforcement to prosecute egregious cases of double voting. The organization claims to have perfected methods for identifying double-registered voters, double voters, and instances of deceased individuals voting. They also address the issue of "illegals" voting. The speaker highlights a situation in Georgia where election board members verified ballot reconciliation, a process of matching voters to ballots. Democrats are allegedly suing these individuals, and the speaker suggests this is because the reconciliation rule prevents them from cheating.

Video Saved From X

reSee.it Video Transcript AI Summary
Don't trust, verify. In the next 5-10 years, deepfakes will make it hard to distinguish real from fake. Shift your mindset to verify things through experience and intuition. Devices are affecting our brain connections, so rely on personal verification.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Was essentially trying to do. He was essentially trying to figure out how to navigate this to keep the It can change the way you live. It can Speaker 0: Was essentially trying to do. He was essentially trying to figure out how to navigate this to keep the It can change the way you live. It can Speaker 0: Was essentially trying to do. He was essentially trying to figure out how to navigate this to keep the It can change the way you live. It can Speaker 0: Was essentially trying to do. He was essentially trying to figure out how to navigate this to keep the It can change the way you live. It can

Video Saved From X

reSee.it Video Transcript AI Summary
The video provides a comprehensive overview of Admiralty Law, the concept of a straw man, and power dynamics between individuals and debt collectors or police officers. It emphasizes the importance of understanding the distinction between lawful and legal, as well as the manipulation of language within the legal system. The creation of money through promissory notes and the role of taxation are explored. Viewers are urged to be aware of their rights and not blindly consent to authority. The video also discusses interactions with law enforcement, highlighting individuals' rights to refuse personal information unless driving or suspected of a crime, and the legality of filming police officers in public. It emphasizes that debt collectors have no power unless individuals give it to them through contracts or agreements. Strategies for dealing with debt collectors and bailiffs are provided, including sending template letters and fee schedules, demanding proof of contracts and signed warrants. The importance of knowing one's rights and not allowing unauthorized entry onto one's property is emphasized. The video concludes by urging individuals to educate themselves about the system, work together for a fairer reality, and take action to prevent further erosion of freedoms.

Video Saved From X

reSee.it Video Transcript AI Summary
You are not your legal fiction, which is a corporation created at birth. The government uses this legal entity to impose rules and contracts on you. To avoid unwittingly entering into contracts, always rebut any demands or fines by stating "I do not consent." Remember, common law only applies if harm is caused. Everything else is contractual and can be challenged. Stick to the script and protect your rights.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses recent changes in how Palantir is used to track Americans’ financial information and the potential impact on privacy, in the context of a legislative vote scheduled for the week of April 13. Key points: - Palantir’s Foundry platform, described as Palantir’s civilian platform, has been inside the IRS since 2017. It connects databases containing bank statements, IRS filings, and financial transactions to identify patterns for investigations. It has helped investigators by finding patterns they might miss. - The IRS has paid Palantir more than $200 million for this work. Historically, the use of Foundry was limited to cases that were already open, with investigators having a formal reason to look and an active investigation. - In December 2024, the IRS paid Palantir $1.8 million to build a tool called SNAP, standing for the selection and analytic platform. SNAP is described as taking the human out of the equation, scoring every American taxpayer and generating a ranked list of who the government should target next for audits, collections, and criminal investigations. - In the following months, the IRS paid Palantir an additional $2.25 million to expand SNAP. SNAP reportedly will pull transaction data from platforms like Venmo, Etsy, Depop, and Cash App. The threshold for reporting on these platforms reportedly dropped to $600 this year, expanding the scope of potentially flagged activities (including small-scale transactions such as selling a used couch or freelance dog walking). - There is concern about legality. In June 2025, ten members of Congress wrote to Palantir’s CEO suggesting the program likely violates the Privacy Act of 1974 and federal tax privacy laws, which limit tax information use to tax-related purposes. The IRS’s top lawyer reportedly agreed but was removed from the position two days after making that statement. - Two short-term actions are proposed: 1) Remove oneself from data broker databases to shrink the government’s data footprint, since it can access real-time location data, phone numbers, and spending habits through third-party data brokers without warrants. California residents can use privacy.california.gov/drop to send deletion requests to over 500 data brokers; the service is described as quick (about five minutes). Non-Californians can use services like Incogni or DeleteMe, with caveats about due diligence and potential fees. 2) Contact Rick Crawford, chair of the House Intelligence Committee, to push for warrant protections in FISA reauthorization. The vote is scheduled for the week of April 13. Crawford’s DC office number is (202) 225-4076, and the speaker demonstrates making a call to advocate for warrant requirements. The speaker emphasizes that if the legislation passes without protections, broader discussions about compliance and oversight will be necessary, and encourages viewers to begin by removing data footprints and calling Crawford.

Philion

The Buy Now Pay Later Scam
reSee.it Podcast Summary
BNPL is a short-term financing option from Affirm, Afterpay, and others that lets you buy today and pay in installments, often advertised as '0% interest' and 'interest-free' if you pay on time. It is described here as a modernized layaway: you get the product now, pay off the balance over several payments, and the merchant is paid upfront. The video traces explosive growth—from about $2 billion in 2019 to $24.2 billion in 2021, with a projection to $122 billion in 2025—and notes BNPL is integrated at checkout on many e-commerce sites. It emphasizes checkout psychology: pain of paying, temporal discounting, urgency, and bright button colors designed to nudge purchases. Three cultural shifts fuel BNPL's rise: a move from cash to financing even for small purchases; influencer-driven 'social money' experiences; and a post-pandemic spending rebound dubbed revenge spending. Merchants profit from merchant fees (4-6%), late fees, and data harvested from checkout behavior sold to brands. Alarming stats cited: in 2022, 63% of BNPL borrowers had more than one loan; 69% were already in debt on another credit card; 28% were aged 18–24. The speaker argues BNPL targets those with weak financial literacy and makes debt stacking easy. Consumer guidance: never spend more than you have; treat BNPL like cash in your checking account; avoid financing weekly expenses to prevent debt spirals. If you use BNPL, be aware of data sharing and merchant costs; otherwise use traditional cards cautiously, or BNPL selectively to manage cash while it earns interest. The underlying claim is that BNPL systems aim to boost sales and merchant profits, while leaving users exposed; awareness and disciplined spending are essential to avoid getting trapped in debt.

The Pomp Podcast

Bitcoin OG Explains How To Keep An Open Mind | Erik Voorhees | Pomp Podcast #583
Guests: Erik Voorhees
reSee.it Podcast Summary
Erik Voorhees discusses ShapeShift's transformation from a centralized exchange to a decentralized platform, eliminating KYC requirements and allowing users to trade directly against decentralized protocols. This shift was motivated by a desire to avoid unethical surveillance while complying with regulations. Users now maintain control of their assets through various wallets, trading directly with decentralized liquidity pools, including Bitcoin via Thorchain. Voorhees emphasizes the importance of decentralized finance (DeFi) and its potential to disrupt traditional banking systems. He believes that Bitcoin and other blockchain ecosystems can coexist, enhancing financial privacy and decentralization. The response from users has been overwhelmingly positive, with many expressing excitement about the return of ShapeShift's original model. Voorhees highlights the need for the crypto community to unite against common adversaries, such as state control over money. He encourages users to embrace self-custody and the benefits of decentralized finance, positioning ShapeShift as a platform that prioritizes user sovereignty and privacy.
View Full Interactive Feed