reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Tech companies are spending a lot of money to improve their public image. The speaker believes we live in a surveillance state, with the government and corporate players monitoring almost everything in real time. Emails published by Al Jazeera show a close relationship between Google executives and the NSA. Journalist Glenn Greenwald says there is little division between the private sector and the NSA or Pentagon when it comes to national security. The NSA has awarded large contracts to private contractors to solve the intelligence problem of the digital age. A former NSA executive reveals that a less expensive in-house surveillance program was replaced by a more costly one developed by a private contractor. The speaker highlights the disregard for existing solutions and the decision to outsource rather than create a solution in-house.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 acknowledges that intelligence sharing between the U.S. and Israel is not total and that allies spy on each other, including domestically. Speaker 1, identifying as conservative, says this is expected because people act in their rational self-interest. Speaker 0 asks if it is in America's interest for Israel to spy on the U.S., including on the president. Speaker 1 responds that the close alliance with Israel provides huge benefits to the U.S. Speaker 0 presses on the issue of spying, asking why an American lawmaker wouldn't tell a client state that spying on the U.S. is not allowed. Speaker 0 expresses that it is weird not to say that, but Speaker 1 seems unable to.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reveals that the NSA, the largest intelligence agency in the Biden administration, had been reading their private emails. They express shock at the government's spying and criticize the lack of outrage in Washington. The speaker shares that their emails were leaked to media outlets to portray them as a disloyal American and a Russian operative. They highlight the hypocrisy of demonizing Putin while the Chinese government gains control over the country. The speaker emphasizes that the NSA illegally unmasked them, violating the law that protects the identities of American citizens. They call for accountability from the NSA director, Paul Nakasone, and the Director of National Intelligence, April Haines. The speaker concludes by stating the importance of preventing unaccountable spy agencies from discrediting individuals through leaked emails.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received two messages from Apple stating their iPhone was targeted by a mercenary spyware attack. Initially skeptical, the speaker confirmed the messages' authenticity. Apple's message indicated the attack was likely due to the speaker's identity and activities, emphasizing the rarity and sophistication of such attacks, citing Pegasus as an example, and describing them as some of the most advanced digital threats. While uncertain if spyware was installed or who is responsible, the speaker believes the attack is an attempt at intimidation and silencing, possibly by a government, organization, or secret service. The speaker asserts they will not be intimidated or silenced.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that 99% of phones worldwide are being tracked by governments through push notifications. The US government allegedly has a gag order on the two largest phone companies to keep this information hidden. Senator Ron Wyden states that foreign governments have reached out to Google and Apple for push notification data. These notifications, which appear on the screen, are sent from the app to a cloud server and then to the phone. The governments are requesting this data from Google and Apple, potentially including text information, metadata, and location details. The speaker suggests that the lack of coverage on this issue may be due to the influence of advertising and algorithms controlled by Apple and Google.

Video Saved From X

reSee.it Video Transcript AI Summary
Taking on the intelligence community is incredibly risky. They have numerous ways to retaliate. Even a shrewd businessman would be foolish to antagonize them. I've heard they're extremely angry about how they've been treated and spoken about. I don't know exactly what they might do if provoked, but it's a dangerous game to play.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels reportedly have Pegasus, the spyware used by Israel’s NSO Group to spy on Palestinians, and Mexico could use it on Americans. It can enter a phone and expose everything—calls, texts, emails, contacts, calendar, location, and app data—without the user clicking a link. It can perform a room tap using the device’s microphone and camera, deny access to sites and apps, and capture screenshots. Pegasus is described as no-click malware that pauses itself when battery drain is detected. It was developed by the Israeli firm NSO Group (not the Israeli government), and Israel’s Ministry of Defense must sign off on each sale. NSO has marketed it to Mexico and the UAE, with potential expansion to Europe and the Middle East; the cost is about 500,000 per install for iPhone and Android. A 2017 journalist killing and three Mexican agencies’ involvement were reported; it’s difficult to defend against since you don’t need to click.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on fears of evolving toward a biometric surveillance state driven by predictive algorithms. Speaker 0 argues that the plan resembles a transition to mass surveillance on everybody, drawing on observations from a recent trip to China where some aspects were acceptable but others were not, and contrasts that with potential consequences in the speakers’ own country—specifically, “without the nice trains and without the free healthcare.” The core concern is the creation of a biometric surveillance framework that uses predictive analytics to monitor and control people. A key point raised is a new report that highlights contracts with Palantir, the data analytics company, which would “create data profiles of Americans to surveil and harass them.” This claim emphasizes the potential domestic use of technologies and methodologies that have been associated with counterterrorism efforts abroad. The discussion frames this as evidence that the United States could be adopting similar surveillance capabilities at home. Speaker 1 responds with a blend of agreement and critical tone, underscoring the perceived inevitability of this trajectory and hinting at the burdens of being right about such developments, including the intellectual burden of grappling with the math and ontology behind these systems. The exchange suggests that Palantir’s role is to “disrupt and make our the institutions we partner with the very best in the world” and to be prepared to “scare enemies and on occasion kill them.” This is presented as part of Palantir’s stated mission, with Speaker 1 affirming a sense of inevitability about the path forward. Speaker 0 further reframes the issue by stating that “the enemy is literally the American people,” expressing alarm at the idea that the same company tracking terrorists abroad would “now be tracking us at home.” They note posting on social media that this development should be very alarming, highlighting the notion that the entity responsible for foreign surveillance might be extending its reach domestically. Overall, the dialogue juxtaposes concerns about a domestic biometric surveillance state—enabled by predictive algorithms and proprietary data profiling by Palantir—with ethical and political anxieties about the implications for civil liberties, accountability, and the potential normalization of surveillance within the United States. The conversation dismisses no specific claims but emphasizes the perceived transformation of surveillance capabilities from foreign counterterrorism into internal population monitoring.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states they did not trust Israelis, "not as far as I could throw them," and that the CIA doesn't allow Israelis into headquarters because they would bring gifts containing listening devices. According to the speaker, 100% of the gifts from Israelis had bugs in them, even at a safe house in Virginia. The speaker claims that 100% of their colleagues didn't trust Mossad. In contrast, the speaker trusted the British the most because their national interests are closely aligned.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 discusses the origins of Bitcoin and raises a provocative claim about who may have created it. The assertion begins with the question: Was Bitcoin created by the CIA? And, given early involvement in mining, could the speaker be in the CIA as well? The speaker then presents a line of reasoning based on what they learned about the Bitcoin source code. They state that it was created by somebody in the NSA, and they support this claim with what they describe as evidence found in the randomizer. The speaker notes that there are many methods that are certified to be free of backdoors, and these methods are stated to have been checked and rechecked and certified as backdoor-free. In contrast, Satoshi did not use any of these certified methods. Instead, Satoshi chose an obscure method that wasn’t certified, which led many developers to scratch their heads. The discussion then references Snowden and his release of information indicating that the NSA had backdoors to all the certified randomizers. According to the speaker, with enough data, the NSA could reproduce the random number that a user actually chose. This leads to the implication that the NSA could break codes and effectively break securities, including “getting your Bitcoin.” The speaker emphasizes that Satoshi chose the one randomizer that did not have a backdoor, and they question how that would be possible. The closing questions reflect skepticism about the likelihood of such a choice being lucky, with the speaker stating, “Did he get lucky? I don’t think so.” In summary, the speaker presents a chain of claims linking Bitcoin’s creation to the NSA, arguing that certified randomizers reportedly free of backdoors exist, that Snowden revealed NSA backdoors in those certified methods, and that Satoshi’s selection of an uncertified randomizer supposedly avoided backdoors. This leads to the concluding suggestion that Satoshi’s choice was not a matter of luck, prompting the final question about whether luck played a role.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: I’m a little pissed at the New York Times, honestly. But since you’re listening, I believe in your mission. When you write a technically completely illiterate article, you lose a lot of credibility if people are technical. That article about us being a surveillance thing is like where it’s all implied, what we do. The problem is you lose credibility with anyone who goes on the thing. That’s damaging for our democracy. Speaker 1: ask you this. And I’ll Speaker 0: look left and right. One thing I would say to people in the audience: you know you’re a lot of you think I’m right. And you know your spouse, your relative, your child, the person at work would be horrified if they knew it. You better speak up, because everyone who thinks I’m a ridiculous fascist, they’re speaking up. They write about it every day. If you do not speak up, the people who are disagreeing with me or think I’m stupid a lot, I disagree with myself. So, you have to speak up. And you cannot blame the far left, far right idiots. When they speak up for their views, do you speak up for your views? Where? Do you tell your colleague, I bet you at The New York Times a lot of people read that article about us and were ashamed. Did you go to your editor and say, how can you write something that’s technically illiterate? The guy might be a fascist, but this is technically illiterate. Okay. Speaker 1: Let me ask you different question. Speaker 0: Did you or didn’t you? Because I’m the only one speaking up. You’re gonna get a world of technical illiteracy on the right, on the left, and in the middle. Speaker 1: Alex, help me with this. A lot of Speaker 0: people

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a US visit, an engineer working for Telegram was allegedly approached by cybersecurity agents attempting a secret hire. The agents were interested in Telegram's open-source libraries and tried persuading the engineer to integrate specific open-source tools that the speaker believes would function as backdoors, potentially enabling government surveillance of Telegram users. The speaker also recounts personal experiences of being met by FBI agents at US airports and visited at their residence. They believe the FBI's interest was in gathering details about Telegram and establishing a relationship to better control the platform. While acknowledging the agents were doing their job, the speaker suggests this level of scrutiny made the US a less-than-ideal environment for running a privacy-focused social media platform.

Video Saved From X

reSee.it Video Transcript AI Summary
I was surprised to learn that someone had hacked into my Signal account. It turns out it was the NSA, as they admitted it when they contacted me. They knew about my plans to visit Putin, which I hadn't shared with anyone, not even my family. When I asked how they knew, they explained that they had accessed my text messages with the person I was communicating with. I was shocked by this invasion of privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a visit to the US, an engineer working for Telegram was allegedly approached by cybersecurity officers or agents who attempted to secretly hire him. The speaker believes the US government wanted to hire the engineer, not necessarily to write code or break into Telegram directly, but to learn about open-source libraries integrated into the Telegram app. The speaker alleges they tried to persuade the engineer to integrate specific open-source tools into Telegram's code, which the speaker believes would function as backdoors. These backdoors, according to the speaker, would potentially allow the US government, or any government, to spy on Telegram users.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 advises against using 23andMe because they allegedly sell user information. Speaker 1 claims this data is sold not only to the US but also potentially to other countries, including Russia. Speaker 1 suggests some pharmaceutical companies that purchase this data are based in countries like Russia and may be owned by entities such as the Ministry of Defense.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.
View Full Interactive Feed