reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker questions if the truth is being hidden again, mentioning a global Microsoft update causing issues. They share a hypothetical scenario involving a friend in India affected by a cyber attack, not an update. The friend mentions a cryptocurrency loss and doubts the information's availability on Google. The speaker expresses skepticism towards media and government transparency, suggesting the truth may surface on TikTok eventually.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
First Speaker argues that Microsoft provided services and access to data, including Palestinian data, which allowed Israel to set up systems to mass target and mass kill Palestinians. They mention an application called "Where is Daddy?" that allows the army to randomly track people and reach them when they are with their families in order to inflict the most harm, describing it as brutal. They state agreement with this view and emphasize the importance of understanding that this represents the end of humanity and the civilization people have pretended to belong to. They claim Israel has the most sophisticated military in the region and has known exactly what it is doing for two years. They assert that many soldiers are breaking down and suicide rates are increasing among young Israelis who have served in the army, noting they are older than teenagers and have been turned by indoctrination into willing executioners of a genocide. They call for intervention by people who love Israel to save what remains of Israel. First Speaker contends that the biggest harm is being done by those outside of Israel who defend the regime. They describe the regime as having imposed a military dictatorship for decades on Palestinians in the West Bank and Jerusalem, and until 2005 in Gaza, and claim this regime also extends to some Israelis who are part of the system. They argue that brutality toward others undermines one's own humanity. Second Speaker agrees and seeks clarification, asking if there is an app, possibly by an American company, called "Where's Daddy" that allows the Israeli government to murder men in front of their children. They reference the prior statements and want confirmation of that claim. First Speaker responds that Israel has developed not just a system but an automatized system to decide targets through a computing system, and that data has been provided by technology. They reiterate that this is part of a broader system of targeting.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims Windows includes a piece of malware called OneDrive that will spontaneously delete all files off your computer, not from OneDrive but from your local machine. They say, “OneDrive will spontaneously delete all of the files off of your computer,” and that “all of my photos and videos of my family, all of my work files, everything is gone.” - They assert there is no warning, no confirmation button, and no pop-up before this happens. It “will start doing it” during a Windows update that begins using OneDrive, with “no plain language warning to opt out.” - OneDrive allegedly quietly uploads everything on the computer to Microsoft servers, and users may notice only when OneDrive warns that it’s running out of space. The user then looks up how to stop it and “you will get onto your computer the next day to find everything is gone.” - After deletion, the desktop shows a single icon that says, “where are my files?” They say many people thought they had been hit by ransomware or a virus. - When the user tries to recover, they are forced to download all the files back to the machine, which can take a long time on slow or metered Internet connections. - If the user then deletes the files from the local computer and also from OneDrive, the files are deleted from the computer again with “no warning, with no pop up, without anything.” - The only way to delete the files off the machine without also deleting them from OneDrive is to follow a YouTube tutorial with detailed steps, because there is no intuitive way in the menus. They emphasize there is no plain English explanation like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” - The speaker argues that many people assume cloud storage is a backup, but OneDrive “secretly transfers your machine to their machine so that their machine is the primary. Those files are the copy of the files.” When you work on the local machine, it is treated as temporary access to those files. This slows the machine because it writes and reads data to the cloud rather than the hard drive. - Practically, if anything happens to the file on OneDrive’s machine, it’s deleted everywhere because it’s now only on their machine, and you are only allowed to temporarily access it. The speaker notes this is “very intuitive” to accidentally delete everything, and questions how this was allowed to go out the door. - The concluding point: when OneDrive says it’s full and you delete things to free up space, it deletes them from your machine too, which the speaker finds unbelievable.

Video Saved From X

reSee.it Video Transcript AI Summary
A senator questions a 23andMe representative about their data privacy policies, specifically regarding the sale of consumer data. The senator claims the company's privacy statement says they cannot share information without consent, yet they are selling it. The representative states customers can delete their data anytime, even after the sale. The senator points out that the deletion page went down after the sale announcement. The representative claims the issue was fixed and customers can now delete their data. However, the senator reads from 23andMe's privacy policy, which states the company retains genetic information, date of birth, and sex even after account deletion. The representative initially denies retaining genetic information, but then admits to retaining name, email address, and other data. The senator accuses the company of not allowing consumers to permanently delete their data and lying to them. The senator concludes that 23andMe controls consumer data and is violating its promises.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 has a USB drive with 90-95 Gigabytes of data, possibly containing around 4,000 videos of varying quality. The data is organized into "videos" and "photos" folders. There is no passcode on the drive. Speaker 1 states his wife is an idiot with technology and wouldn't know about the drive's contents.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 expresses a strong warning against working with Sam Altman and OpenAI, stating they would never collaborate with them as a developer. They emphasize that this is a warning and note that others may clip the remark. The speaker asserts that OpenAI is studying how developers use the API and points out that Altman and the company are “studying it,” implying ongoing scrutiny of API usage. They describe Sam Altman as someone who has “been around the block,” claiming the speaker has known him since “loop.” The speaker characterizes Altman as “incredibly savvy” and asserts that Altman “wants every bit of revenue from the ecosystem” and “isn’t taking no prisoners.” According to the speaker, Altman intends to study how developers are using the API and believes Altman has “the right to do” so. The speaker then pivots to a broader narrative about Altman’s perceived philosophy, stating that Altman “comes from the Zuckerberg School of Business,” which, in the speaker’s claim, is defined as giving naive people access to tools, studying them, and, “like the Borg,” stealing every innovation they have. The speaker claims Zuckerberg adopted this approach from Bill Gates and Microsoft. The narrative continues with Microsoft’s historical pattern: Microsoft had a platform and operating system, allowed third-party developers to create software such as Lotus 1-2-3, and later produced Microsoft Excel. The speaker also mentions that Microsoft allowed creation of WordPerfect and WordStar, and then built Microsoft Word. The speaker interjects “RIP,” signaling a judgment about that progression. The speaker asserts that Microsoft was “more than happy” to have a broad developer community attending their conferences, showcasing work and receiving awards, explicitly stating they are talking about Microsoft in this context. The parallels are drawn to Facebook, with the speaker claiming Zuckerberg did the same thing with Facebook’s platform, suggesting a similar dynamic of platform growth through external developers and partners. The narrative closes with a mention of Zynga as a significant partner within Zuckerberg’s ecosystem and ends with the assertion that the approach then shifted, implying a change in strategy or emphasis after the initial period.

Video Saved From X

reSee.it Video Transcript AI Summary
OneDrive on Windows allegedly behaves like malware by spontaneously deleting all files from your local machine without warning or confirmation. The speaker claims that after a Windows update begins using OneDrive, there is no plain-language warning to opt out, and it starts uploading everything on the computer to Microsoft servers. Some users notice this when a slow or metered Internet connection causes large uploads, or when OneDrive warns that it is running out of space. According to the speaker, once the process starts, all data on the local computer is uploaded to Microsoft servers and appears on the desktop as an icon labeled “Where are my files?” The message suggests that all of your life’s work has been deleted from the local machine “without ever asking you.” The user may then be forced to download the files back to the local computer, which can be extremely slow on slow or metered connections, requiring many gigabytes to be re-downloaded. After the user downloads the data again, they may choose to delete it from OneDrive. However, deleting files from OneDrive results in the same files being deleted from the local machine, again with no warning or pop-up. The only way to delete the files from OneDrive without removing them from the local machine, the speaker claims, is to follow a YouTube tutorial with detailed steps; options to prevent this are buried in menus and do not state in plain English what they do. The speaker contends that OneDrive is not a traditional cloud backup but secretly makes the user’s machine secondary to OneDrive’s machine, with the cloud copy being the primary. When working on the local machine, the system is treated as temporarily accessing the cloud copy rather than using local storage. This allegedly slows down the machine since data must be uploaded and downloaded to the cloud rather than read from and written to the hard drive. The claim is that at no point does OneDrive explain in plain language that it intends to take everything on the computer and put it on Microsoft’s machine instead. The speaker emphasizes that this is unintuitive and easy to accidentally delete everything, and questions why such behavior was allowed to go forward without intervention. The core concern is that OneDrive’s behavior makes the cloud copy the authoritative version, with local data being secondary, and no clear, explicit warning about this transition.

Video Saved From X

reSee.it Video Transcript AI Summary
One speaker claims that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on your local computer without warning. The process, they say, starts when Windows updates to begin using OneDrive, but there is no plain-language opt-out warning. Gradually, it begins uploading everything on the computer to Microsoft servers, potentially tens of gigabytes, which may be noticed only if the connection is slow or metered. If you later search for how to stop it, you’ll find options to turn off OneDrive backup, but upon returning the next day you’ll find everything has been deleted from your local machine. The desktop is left with a single icon reading, “Where are my files?” When you click it, it tells you that all of your life’s work is now on Microsoft’s machine and was deleted from your machine without asking. The process continues: you’re forced to download all your files back to your machine, which can be a disaster on slow or metered connections due to the large volume of data. When you then try to delete the files from OneDrive, they delete from Microsoft servers and still remove the local copies, leaving you with nothing on your computer. The only way to delete files from Microsoft’s machine without also removing them locally is to follow a YouTube tutorial with detailed steps. To make OneDrive stop this behavior requires looking up the exact steps; there is no intuitive, plain-English option to opt out. The speaker asserts there is no explicit notice like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” If such an option existed in plain language, they claim, people would say no. The speaker argues that many people equate cloud storage with a backup, but OneDrive allegedly does not function as a back-up; instead, it secretly transfers the user’s files to their machine so that Microsoft’s machine becomes primary, and the user’s local machine is treated as temporary access. This allegedly slows down the computer because data is uploaded and downloaded to the cloud rather than read from or written to the local hard drive. In practice, if anything happens to a file on OneDrive’s machine, the file is deleted everywhere, because there is only the copy on their machine. Throughout, the speaker emphasizes that this behavior is not explained in plain language, is highly unintuitive, and could lead to accidental, widespread data loss. They conclude that it’s hard to believe this was allowed to go out the door or that nobody intervened.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the issue of Windows security logs being purged right before two audits were set to begin. They highlight the difficulty in determining who had access to the RTR admin account, which is shared among all accounts. The speaker questions why someone would delete all the results and records from the Dominion software, which is used for tallying and reporting election results, just before an audit. They mention that the deletion was successful and affected files on the NAS directory where election images and details were stored. Overall, the speaker emphasizes the lack of accountability and the need to understand the motives behind this action.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reveals shocking information about the deletion of the entire database directory from the d drive of the machine called EMS primary. This deletion occurred approximately 10 days before the machines were handed over to the Senate. Deleting documents after being told to preserve them can have severe legal consequences. Additionally, the main database for the election management system software, which contains all election-related data from the November 2020 general election, is missing from the EMS primary machine. This suggests that it has been removed.

Video Saved From X

reSee.it Video Transcript AI Summary
You no longer keep private files in a locked file cabinet in your basement. They are now on your laptop and in the cloud above us, not in a physical location.

Video Saved From X

reSee.it Video Transcript AI Summary
Think you deleted your data? That's cute. The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received two messages from Apple stating their iPhone was targeted by a mercenary spyware attack. Initially skeptical, the speaker confirmed the messages' authenticity. Apple's message indicated the attack was likely due to the speaker's identity and activities, emphasizing the rarity and sophistication of such attacks, citing Pegasus as an example, and describing them as some of the most advanced digital threats. While uncertain if spyware was installed or who is responsible, the speaker believes the attack is an attempt at intimidation and silencing, possibly by a government, organization, or secret service. The speaker asserts they will not be intimidated or silenced.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 addresses Microsoft Azure, saying, “Like to condemn Microsoft Azure program for leaking sensitive classified information to the CCP.” The speaker then questions Bill Gates directly: “And then I think that Are you pro CCP, mister Gates? I understand your foundation owns a lot of Microsoft shares now, and your Bill and Melinda Gates Foundation has heavily financed and is financially connected to the CCP.” The speaker asks, “So is that why you're not answering the questions about governments, Microsoft's Azure program, mister Gates?” Continuing, the speaker presses the issue: “Are you sure you don't wanna condemn them for leaking classified information from our US military?” The speaker reiterates the demand: “One more time, mister Gates. Would you like to condemn Microsoft's government Azure program for leaking classified information at the CCP?” The response implied by the transcript is “No? Okay.”

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
The Windows security logs were purged right before two audits were scheduled to begin. This makes it difficult to determine who had access to the RTR admin account, which is shared among all accounts. It is unclear why someone would delete all the records and files from the Dominion software, which is used for tallying and reporting election results, the day before an audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asserts that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on the user's local computer without warning, confirmation, or any prompt to opt out. They describe a process where, during a Windows update, OneDrive starts automatically, begins uploading everything on the computer to Microsoft servers, and then the user may be alerted that the system is running out of space. When the user attempts to turn off OneDrive backup, they find that all local files have already been deleted, and only a desktop icon with the message “Where are my files?” remains. The user explains that many people who encounter this assume they have been hit by ransomware or a virus, because OneDrive provides a message claiming that “all of your life’s work is now on our machine” while having deleted it from the user’s machine without asking. To restore files, users are forced to download the many gigabytes back onto their machine, which is particularly burdensome for those on slow or metered connections. When users attempt to delete files from OneDrive, the system deletes them from Microsoft servers and also from the local computer again, without warning. The only way to delete files from their machine without removing them from Microsoft servers is to follow a YouTube tutorial detailing specific steps. The speaker emphasizes that there is no intuitive way to stop OneDrive from doing this; the options to disable it are buried in menus and do not clearly explain what they do. There is no plain English explanation that OneDrive will take everything on the computer and put it on Microsoft’s machine. The issue is described as widespread enough that people are familiar with cloud storage, but OneDrive is framed as the cloud making the machine’s files primary, with the local machine acting only as temporary access. As a result, if anything happens to the file on OneDrive’s machine, it is deleted everywhere because there is no independent copy. The speaker notes that this behavior slows down the machine, since data is uploaded and downloaded to the cloud rather than written to or read from the local hard drive. They question how this was allowed to be released and why no one intervened to stop it, expressing disbelief at the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces the concept: with this hack, your TV can watch you, as the TV is turned into a device that can monitor your surroundings while you watch. Speaker 1 explains how this is possible: by abusing the smart TV platform’s browser to gain access to the camera built into the TV. With a small amount of extra code, the camera can be turned on within the browser. This is designed so that viewers can see the camera feed, and it can run invisibly behind the web page you are looking at. Speaker 0 emphasizes the practical implication: you could be sitting in one place, such as watching TV from your bedroom, while someone elsewhere—potentially anywhere in the world—views the image of you watching. Speaker 1 confirms this scenario with an example: a person could be on a laptop in a cafe in Paris, and as long as they have a network connection, they could access your TV and the camera feed. Speaker 2 highlights a particularly alarming aspect: there is no indication that the camera is on, and there is no LED light to signal activity. As a result, the camera could be watching you without your knowledge. Speaker 0 asks what defines a smart TV and why it is attractive as a target for hackers. Speaker 2 responds by reframing the smart TV as a computer: it is not just a television, but a device that includes a web browser and runs Linux. Speaker 1 points to a more dangerous possibility: when people use smart TVs for activities like online banking, attackers could translate a legitimate bank address into a different IP address leading to a site controlled by the attacker, creating a phishing-like scenario where a user enters a username and password that goes to the attacker instead of the bank. Speaker 0 conveys Samsung’s response in a CNN Money statement: Samsung says it takes consumer privacy very seriously. They offer a hardware countermeasure by enabling the camera to be turned into the bezel of the TV so that the lens is covered or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when smart TV features are not in use. As an additional precaution, Samsung recommends customers use encrypted wireless access points when using connected devices.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about log files on two screens. One screen shows hundreds of log files from 2019 until May 22, 2021. The other screen only has three years of log files, which have mysteriously disappeared. It is mentioned that when a Dominion employee came in, the log files vanished. These files record all access to a specific machine. It is also mentioned that Dominion sent people around the country for software updates during that time. Some participants confirm this information.

Video Saved From X

reSee.it Video Transcript AI Summary
They have complete access to your device and can manipulate it as they please. Although you technically own the device because you paid for it, corporations and governments are gaining more control over it. We are living in a world where we bear the burden of work, taxes, and expenses, yet our ownership diminishes. The previous generation is acutely aware of this reality.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the public is being deceived about election security. They argue that while individual voting machines may not be connected to the internet, state and county databases are. They allege that votes are stored on a server in Frankfurt, Germany, and that the election software used in 28 states may be infected with malware called Q Snatch. Cybersecurity investigators suggest that this malware could allow hackers to manipulate votes in election databases nationwide. The cofounder of Allied Security Operations supports these claims, stating that the malware collects credentials and enables changes to be made to votes at various stages of the election process. The speaker suggests that this could explain the malicious activities observed during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
Google recently auto-installed on Android 9+ a component called Android System Safety Core, which sparked panic because its purpose wasn’t clearly explained. The transcript outlines the following points: Google says the component is for sensitive content warnings and, generally, “performs classification of media to help users detect unwanted content.” It then presents contrasting views from self-described experts. The GrapheneOS maintainers published a post on X stating that SafetyCore “doesn’t provide client side scanning and is mainly designed to offer on device machine learning models that can be used by other applications to classify content as spam, scam, or malware.” The speaker, however, rejects this explanation as “the biggest pack of lies from Shields of Big Tech that lay claim to cybersecurity knowledge,” asserting that the feature is clearly about client-side scanning. The speaker claims that the true purpose is client-side scanning, and that any justification portraying it as a benign feature is false. They express frustration with what they describe as widespread misinformation intended to reassure users that they have nothing to worry about. They insist there is a lot to worry about, emphasizing that Safety Core is, in their view, about client-side scanning and is being framed as a feature users have always needed. The speaker contends that they had anticipated the module “for a long time,” suggesting it was inevitable and tying it to a broader concept they call the “see what you see technology,” which they say is directly connected to AI. They argue that this module completes a circle by bringing all of big tech into client-side scanning. Finally, the speaker warns that to understand how this impacts users, one should stay attentive, implying that the development will have significant and widespread effects.
View Full Interactive Feed