reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Facial recognition will be used to unlock your digital identity, which is going to be a tool of control for the agendas that are coming down the pipeline. Elements of that control are already with us. Alexa, good morning. Good morning. You are never alone in your home, and this is why. All your devices at home and all smart appliances, they are all connected on a wireless network. Many of these devices will have cameras, many will have microphones, and so they are monitoring everything all the time. Your smart appliances are communicating with the smart meter and sending it real time usage data. If there is a Ring camera also in your home, a mesh network is formed and all your devices are being tracked within the home, its location, its usage and all the data is going to Amazon's servers. When you leave your home, all modern vehicles are connected to the Internet, so your automobile is being tracked all the time. When you are going under a string of smart LED poles and smart LED lights on the highway and in the streets of your towns and cities, those form a wireless network and are tracking your vehicle. They are tracking all the devices on you from smartphones to smartwatches when you're walking on the streets. So data is being collected twenty four seven continuously on every human being whenever you are within these wireless networks. Speaker 1: And it's obviously not good for health also because of all the electromagnetic radiation. Speaker 0: In the long term, the plan is to pretty much lock up humanity in smart cities, which is kind of a super set of a fifteen minute city. Speaker 1: They've sold all the state and local governments and countries that smart cities are about sustainability and the good of the city. But in reality, the language from the UN and WEF and their white papers is all inverted. So their monitoring is really about limiting mobility and no car ownership. Right? Surveillance control via LED grid is why the smart lighting is death. Water management is about water rationing. Noise pollution is about speed surveillance. Traffic monitoring is about limiting mobility. And then, of course, energy conservation is all about rationing heat, electricity, and gasoline. Another concept one should be familiar with is called geofencing, and that's think of it as an invisible fence around you where you cannot go beyond a certain point, and that'll be related to your face recognition, digital identity, and access control. Your smart contracts, Softbrick can turn off your digital currency beyond a certain point from your house. Our world has been turned into a digital panopticon. Speaker 0: That means you can be monitored, analyzed, managed and monetized.

Video Saved From X

reSee.it Video Transcript AI Summary
I am concerned about the upcoming election because this voting machine, used in 18 states, can be easily accessed by anyone. I will demonstrate how it can be done in less than 2 minutes without any tools. By opening the machine, removing the card reader and unplugging it, then picking the lock with a ballpoint pen, I gain admin access. I encounter a few error messages, but by clicking Cancel and okay, I bypass them and gain full admin control.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: What about the public attitude held by millions of everyday Americans? All I've got on a computer is pictures of my family, CCTV cameras that are prevalent in a ton of American cities and overseas capitals. Those cameras are your friend if you're innocent and have nothing to hide. Speaker 1: Well, I'd say that's very much what the average Chinese citizen believed or perhaps even still to this day believes. But we see how these same technologies are being applied to create what they call the social credit system. If any of these family photos, if any of your activities online, if your purchases, if your associations, if your friends are in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms, and those algorithms are fueled by precisely the innocent data that our devices are creating all of the time constantly, invisibly, quietly right now. Our devices are casting all of these records that we do not see being created, that in aggregate seem very innocent. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information, what they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, they are stealing our power.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: It has come to my attention that there are several flock cameras installed around our town. My resources count over 30 of them, and I have graphics showing where they are. I’d like to be passed around to the guests here tonight so they can see where these cameras are. These cameras utilize AI to track you and your family when you’re out in public. They run by a company Palantir. This company claims that they just record movement of vehicles and they will reduce the crime rate to zero. However, people much more educated than I on these cameras have proven this to be false when speaking to their city councils. They do not monitor where you drive, but they also monitor where you walk, what you do, what you say, what’s on your phone when you walk by, and they spy on you all the time. Today, I walked around and I noticed the one down by the bridge was pointed towards the courtyard and the field, not towards any roads. So why would it be pointed towards the river, not towards the streets if it’s just to monitor vehicles? Also, in order to bring the crime rate down to zero, they would need to be able to predict crime before it happens, and I think that that is a slippery slope. Some cities are discussing adding this AI to police body cameras, which would be constantly monitored by an AI, which would make a judgment call about releasing drones also controlled by this AI. Again, I see it as a very slippery slope along with the military drones that we’ve seen used over in Iran and in Ukraine. That is not my biggest problem with these though. The owner of Palantir, Peter Thiel, is a man mentioned in the Epstein files over 2,200 times, making him the fourth most mentioned individual in the files. He accepted $40,000,000 that we know about from Epstein. The victims of Epstein and Jalane Maxwell were human sex trafficked, reported almost all members consisting of high profile and ultra wealthy individuals, and they witnessed murders, ritual sacrifice, and cannibalism of infants. That being the consumption of human flesh and blood. They used code words for their victims like pizza, jerky, and grape soda. I have a hard time believing that any human being could do something so evil. This is something that I would be told in a story about vampires. And I don’t know about you, but I think that vampires are meant for campfires. They are supposed to be a mythological being, and they’re not supposed to be real and definitely should not be in charge of the security and safety of our city. I believe that any decent person would say no to giving up their safety and security to someone with such little value of a human life, let alone a potential ultra wealthy pedophilic vampire in the Epstein files. So the gazebo is right here. Right? So I’m trying to capture this area where we have people hanging out.

Video Saved From X

reSee.it Video Transcript AI Summary
"You ever see a webcam with tape over it? Cute, right? But here's the twist. It's not always the camera you need to worry about. Some smart TVs, monitors, even LED lights come equipped with hidden sensors. Not to see you, but to watch your patterns. They track light changes, reflections, even your breathing rate, all in the name of optimizing your experience. That Silicon Valley's way of saying they're studying you like a lab rat. And that dead pixel in the corner of your screen might not be dead at all. It's just biding its time, waiting to gather data on your every move. So next time you settle in for a binge watch, remember, you might not be the only one watching. Welcome to the age of surveillance, where even the seemingly innocuous can be a window into your life."

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker says this is probably the creepiest bulb here at Ace Hardware. - The Smart WiFi bulb works with Alexa and Google Home, activates with your voice, and syncs up to your Google Home and your Alexa, giving a George Orwell 1984 vibe. - The speaker explains this is why they stick to incandescent bulbs, noting that incandescent bulbs don’t steal your information or watch you.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript discusses LED lights and a supposed IoT (Internet of Things) capability. It states that on 04/09/2019, Target confirmed they had provided Internet of Things lighting. IoT lighting means everything is connected and data can be collected from ongoing activities. The example given is that if you walk into Target with your phone, the lights will sync up to your phone to obtain data about what you’re purchasing and what you’re doing. The narration links this event to the period just before 2020, suggesting it occurred prior to the surge in shopping and alleged shortages that year. The speaker then asserts that these LED lights have microscopic cameras in them so they can watch people from every angle. The claim is that other stores, such as Whole Foods, are using similar technology in price tags that can scan and see who is buying items to collect data. The main takeaway presented is that if you bring LED lights into your home, the same type of technology claimed to be in these stores could be in the LED lights you bring into your house.

Video Saved From X

reSee.it Video Transcript AI Summary
Apple has clarified that the iPhone is not taking pictures every 5 seconds, but rather scanning our faces using infrared technology to optimize face ID and emoji features. A video shared by a follower shows that baby monitors also emit infrared lights. It is clear that this scanning is happening, but the question is whether Apple has other motives behind it. To turn off this feature, go to settings, face ID, and passcode, and toggle the attention aware features. The speaker wonders where the data collected for analysis is being stored and what others think about it.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speakers discuss the risks associated with modems in voting machines. They highlight concerns about hacking and the potential for cheating in future elections. ES&S, a voting machine manufacturer, claims that their modems are separated from the public internet by firewalls. However, last summer, ES&S voting systems were found online in some precincts across 11 states. Cellular modems are commonly used to transmit election results, but this introduces vulnerabilities. Intruders can intercept data between the cell tower and voting machines, allowing them to alter votes and software. Despite claims that voting machines are not connected to the internet, many new machines have wireless modems for faster result uploads, raising concerns about their security during elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
In the video, Speaker 0 explains that LED lights are being pushed aggressively, even given away for free, because they will connect everything in the Internet of Things. These LED lights can be connected to a cellphone, a tablet, all home appliances, the thermostat, cars, the garage, and more, allowing monitoring and data collection from these devices. They can also be used to turn off devices based on climate reasons and other factors, meaning you are connected up to the Internet of Things. What’s interesting, according to the speaker, is that these LED lights “ping a lot of microwave radiation,” which will be demonstrated in the next video. The speaker describes using a TriField EMF tester to check the radiation coming off the LED lights and shows results labeled as “off the charts.” The claim is that by bringing these lights into the home, microwave radiation is being pinged into the house. The speaker asserts that this microwave radiation can impact health, listing effects on the heart, brain, eyes, skin, and other organs. The LED lights’ capability to connect to the Internet of Things is highlighted again as part of this scenario. The video then notes a claim about a 2016 announcement from the AMA, stating that LED lights can increase the risk of cataracts and eye degeneration, implying long-term harm to eyesight while allegedly promoting environmental aims. In summary, the narrator claims: - LED lights are being pushed and given away because they enable the Internet of Things, connecting to smartphones, tablets, home appliances, thermostats, cars, and garages for monitoring and control. - These LEDs allegedly “ping a lot of microwave radiation,” detectable with an EMF tester, described as “off the charts.” - The radiation entering the home is claimed to impact health, including the heart, brain, eyes, skin, and other organs, in addition to enabling IoT connectivity. - The speaker cites a 2016 AMA statement asserting that LED lights can increase the risk of cataracts and eye degeneration.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
To reduce the risk of iPhone hacking, the speaker advises changing three settings. First, access the Wi-Fi settings, tap the "i" next to your network, and ensure "Private Wi-Fi Address" is set to rotating, not fixed. A fixed address makes the phone vulnerable. Second, in Wi-Fi settings, turn off "Ask to Join Networks." This prevents unauthorized access. Finally, in Settings under General, then AirPlay & Handoff, set "Automatically AirPlay to TVs" to "Never" (or "Ask"). Leaving it on automatic creates an open path for hackers, especially on public networks.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes smart meters as more than just electricity meters, asserting they function as personal surveillance devices. They claim smart meters sense when devices are turned on or off, measure watt usage (even for small devices like an electric toothbrush), and transmit that data wirelessly through neighbors’ meters to the power company. The data allegedly records electric consumption every minute, stored forever on computers the public cannot access, revealing when someone is home, asleep, on vacation, hosting visitors, using lamps or tools, running a business from home, or bootlegging energy off the grid. The speaker asserts this creates a vivid profile of private living patterns and indicates at-home presence on the night of a murder. The speaker contends this is not electrical metering but personal surveillance—a warrantless search daily. They claim personal life information travels from the meter to the power company, to the government, police, and insurance companies, and to anyone who partners with the power company to access it. The speaker further asserts that even without a direct data-sharing agreement, information can be intercepted via the wireless signal from the meter, because smart meters are radio transmitters. They identify a one-watt radio station licensed by the FCC as the transmitter sending all electrical life details to a data center. Examples are given of authorities in Ohio, Texas, and British Columbia using smart meter data to pinpoint marijuana grow houses, enforce business licenses, and punish private home activities, implying surveillance beyond what residents accept. The claim is made that the power company can sell personal life data to anyone, and that unusual power usage patterns can be used as probable cause to raid a home for growing marijuana or running a computer server without a license. The speaker describes this level of surveillance as “about as big brother as it gets,” with utility workers going door-to-door to install meters. They express a personal opinion that smart meters should be removed from homes, arguing that power companies cannot claim the right to install surveillance devices on residences. They equate smart meters with wiretapping and note wiretapping is illegal in all U.S. states and federal territories. The speaker asserts that allowing a smart meter is tantamount to walking around with a constant webcam on one’s head and accuses the industry of relying on implied consent—the idea that permission is granted if the utility can change the meter, even if residents don’t understand the scope of what’s happening. As a practical step, the speaker advises telling utilities not to change the meter, noting that older meters were billed successfully. They claim to have sent a certified letter denying installation of a smart meter and mention a copy of their letter is available in the video’s description for viewers to adapt. They state post office certified mail is used to obtain a receipt. The speaker concludes that if the meters are installed on every house in America, it would cease to be America.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that facial recognition will be used to unlock a digital identity and will serve as a tool of control for upcoming agendas. They claim that elements of this control already exist and describe a highly connected home environment: all devices and smart appliances are on a wireless network, many have cameras and microphones, and they monitor everything continuously. Smart appliances communicate with the smart meter and send real-time usage data. If a Ring camera is present, a mesh network forms and all devices are tracked within the home, with location and usage data sent to Amazon’s servers. When leaving home, modern vehicles are connected to the Internet and tracked constantly. On highways and in cities, smart LED poles and lights form a wireless network that tracks vehicles and all devices (phones, smartwatches) people carry, enabling continuous data collection on every person within these wireless networks. Speaker 1 notes that this is obviously not good for health due to electromagnetic radiation. Speaker 0 continues by stating that the long-term plan is to lock humanity into smart cities, described as a superset of a fifteen-minute city. They claim governments have been sold on smart cities as promoting sustainability and the common good, but quote language from the UN and the World Economic Forum (WEF) as inverted. In this view, surveillance is used to limit mobility and reduce car ownership. They describe surveillance via an LED grid as essential to smart lighting and view it as harmful. They extend this to water management, which they say is about water rationing; noise pollution as speed surveillance; traffic monitoring as mobility restriction; and energy conservation as rationing heat, electricity, and gasoline. The speakers introduce the concept of geofencing as an invisible boundary that people cannot cross, tied to facial recognition, digital identity, and access control. They mention smart contracts and a mechanism called Softbrick that can disable digital currency beyond a point from a person’s house. They summarize their view by stating that the world has become a digital panopticon, enabling monitoring, analysis, management, and monetization of people.

Video Saved From X

reSee.it Video Transcript AI Summary
Some smart TVs, monitors, even LED lights come equipped with hidden sensors. Not to see you, but to watch your patterns. They track light changes, reflections, even your breathing rate, all in the name of optimizing your experience. That Silicon Valley's way of saying they're studying you like a lab rat. And that dead pixel in the corner of your screen might not be dead at all. It's just biding its time, waiting to gather data on your every move. They call it progress, but really, you're the beta test in this grand experiment. So next time you settle in for a binge watch, remember, you might not be the only one watching. Welcome to the age of surveillance, where even the seemingly innocuous can be a window into your life.

Video Saved From X

reSee.it Video Transcript AI Summary
A computer science professor explains how a voting machine can be easily manipulated by gaining physical access to it. By connecting a computer to the machine's serial port, one can rewrite the code and control the election results. The professor also highlights the lack of security measures on these machines, making them vulnerable to hacking. Another expert shares their experience of being left alone with voting machines after an election, emphasizing how easily someone could insert malware into them. The central count scanner discussed is widely used in America for counting ballots. The speakers mention the ease of obtaining the machine's software from a Russian server and the numerous individuals who have access to the machines, including potential adversaries. They conclude that the multitude of possible hacks and entry points make it unlikely that someone isn't taking advantage of these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that facial recognition will be used to unlock your digital identity, which will be a tool of control for upcoming agendas. Speaker 1 notes that elements of this control are already with us, citing Alexa as an example. Speaker 0 contends you are never alone in your home, because all devices and smart appliances are connected on a wireless network, many with cameras and microphones, monitoring everything all the time. Smart appliances communicate with the smart meter, sending real-time usage data. If a Ring camera is in the home, a mesh network is formed and all devices are being tracked within the home, including location and usage, with data going to Amazon’s servers. Speaker 1 adds that when you leave your home, modern vehicles are connected to the Internet and tracked continually. On the streets, smart LED poles and smart LED lights form a wireless network that track your vehicle. They claim data is collected 24/7 continuously on every human being within these wireless networks. Speaker 0 asserts this is not good for health due to electromagnetic radiation. Speaker 0 further states that in the long term the plan is to lock up humanity in smart cities, a super set of a fifteen minute city. Speaker 1 says they’ve sold smart cities to state and local governments and countries as about sustainability and the city’s good, but claims the language from the UN and WEF and their white papers is inverted. The monitoring is described as about limiting mobility and no car ownership. Surveillance via LED grid is described as why smart lighting is death. Water management is about water rationing; noise pollution about speed surveillance; traffic monitoring about limiting mobility; energy conservation about rationing heat, electricity, and gasoline. Speaker 0 explains geofencing as an invisible fence around you where you cannot go beyond a certain point, related to face recognition, digital identity, and access control. Speaker 1 mentions that smart contracts can enable Softbrick to turn off your digital currency beyond a certain point from your house. The world is described as turned into a digital panopticon. Speaker 0 concludes that this means you can be monitored, analyzed, managed, and monetized.

Video Saved From X

reSee.it Video Transcript AI Summary
Our technology teams discovered a concerning issue with connected devices at a polling location. Despite the devices not supposed to have Wi-Fi, they were found to be communicating in real time, both receiving and sending data. This should never happen, and we have documented the incident. We cannot disclose the location, but we have confirmed it in multiple places. There are three types of machines involved: a scanner, a ballot marking device, and a polling pad. The communication is happening through the polling pad, which is used for checking everything. This access could potentially allow someone to manipulate and modify the data being exchanged in the system.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

TED

What your smart devices know (and share) about you | Kashmir Hill and Surya Mattu
Guests: Kashmir Hill, Surya Mattu
reSee.it Podcast Summary
Kashmir Hill and Surya Mattu explored the implications of smart home devices, installing 18 Internet-connected gadgets in Kashmir's apartment. They discovered that these devices constantly communicate with manufacturers, often sharing personal data. The Amazon Echo was particularly active, pinging servers every three minutes. Despite the convenience promised, Kashmir found the experience frustrating, with complex commands and multiple apps. Ultimately, they highlighted the need for companies to prioritize user privacy in device design, as consumers often become the product.
View Full Interactive Feed