reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2013, mobile devices are now the primary focus, with smartphones constantly emitting signals to cell towers even when idle. These signals contain unique identifiers like IMEI and IMSI, allowing tracking of a user's movements. Companies store this data for unknown purposes, leading to privacy concerns and mass surveillance through bulk collection.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
A founder's group at Peking University developed source code for typing Chinese characters, which was seized by the Chinese intelligence bureau. They inserted a backdoor into apps that allow Chinese typing, potentially compromising them for surveillance by the Chinese Communist Party and military. WeChat is just one of many apps that could be used for this purpose. While not everyone will be targeted, the CCP has the resources to monitor US cell phones, especially if they believe someone can be of assistance to them.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states their interactions with the NSA are very limited, adding the NSA is not an agency that works with you directly. Speaker 0 mentions reading in newspapers about their phone being penetrated with Pegasus, but has no idea if it's true, stating this is the only source of information they have about themselves personally. Speaker 0 assumes by default that the devices they use are compromised and has very limited faith in platforms developed in the US from a security standpoint and privacy standpoint.

Video Saved From X

reSee.it Video Transcript AI Summary
Cell phones are constantly sending data back to companies, even in the middle of the night. This information is used to create profiles on users and can be sold to other companies. Big tech companies like Facebook and Google are major offenders in this data collection. This poses a threat to privacy and security, as the data can be used for manipulation and control. It is crucial for Congress, state attorney generals, and the public to be educated about this issue and take action to regulate and prevent this invasion of privacy. Visit doctorjonesnaturals.com to support the broadcast and access quality products.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received two messages from Apple stating their iPhone was targeted by a mercenary spyware attack. Initially skeptical, the speaker confirmed the messages' authenticity. Apple's message indicated the attack was likely due to the speaker's identity and activities, emphasizing the rarity and sophistication of such attacks, citing Pegasus as an example, and describing them as some of the most advanced digital threats. While uncertain if spyware was installed or who is responsible, the speaker believes the attack is an attempt at intimidation and silencing, possibly by a government, organization, or secret service. The speaker asserts they will not be intimidated or silenced.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that 99% of phones worldwide are being tracked by governments through push notifications. The US government allegedly has a gag order on the two largest phone companies to keep this information hidden. Senator Ron Wyden states that foreign governments have reached out to Google and Apple for push notification data. These notifications, which appear on the screen, are sent from the app to a cloud server and then to the phone. The governments are requesting this data from Google and Apple, potentially including text information, metadata, and location details. The speaker suggests that the lack of coverage on this issue may be due to the influence of advertising and algorithms controlled by Apple and Google.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus spyware, developed by an Israeli firm called the NSO Group, can get into your phone even if you don't click. It's called no click malware because you don't have to click a a link to get it, and it can detect when it's draining your battery and then pause itself so you don't know that it's there. Mexican cartels have the spyware that the Israeli government uses to spy on Palestinians, and now Mexico can use it on Americans. It can get into your phone, see everything you do, and do what's called a room tap, gather sounds and snapshots in and around the room using the phone's microphone and video camera. It can deny targets access to certain websites and applications and grab screenshots off their phone. It captures calls, texts, emails, contacts, calendar, location, Facebook, WhatsApp, and Skype. It costs 500,000 per install for iPhones and Androids.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes smart meters as more than just electricity meters, asserting they function as personal surveillance devices. They claim smart meters sense when devices are turned on or off, measure watt usage (even for small devices like an electric toothbrush), and transmit that data wirelessly through neighbors’ meters to the power company. The data allegedly records electric consumption every minute, stored forever on computers the public cannot access, revealing when someone is home, asleep, on vacation, hosting visitors, using lamps or tools, running a business from home, or bootlegging energy off the grid. The speaker asserts this creates a vivid profile of private living patterns and indicates at-home presence on the night of a murder. The speaker contends this is not electrical metering but personal surveillance—a warrantless search daily. They claim personal life information travels from the meter to the power company, to the government, police, and insurance companies, and to anyone who partners with the power company to access it. The speaker further asserts that even without a direct data-sharing agreement, information can be intercepted via the wireless signal from the meter, because smart meters are radio transmitters. They identify a one-watt radio station licensed by the FCC as the transmitter sending all electrical life details to a data center. Examples are given of authorities in Ohio, Texas, and British Columbia using smart meter data to pinpoint marijuana grow houses, enforce business licenses, and punish private home activities, implying surveillance beyond what residents accept. The claim is made that the power company can sell personal life data to anyone, and that unusual power usage patterns can be used as probable cause to raid a home for growing marijuana or running a computer server without a license. The speaker describes this level of surveillance as “about as big brother as it gets,” with utility workers going door-to-door to install meters. They express a personal opinion that smart meters should be removed from homes, arguing that power companies cannot claim the right to install surveillance devices on residences. They equate smart meters with wiretapping and note wiretapping is illegal in all U.S. states and federal territories. The speaker asserts that allowing a smart meter is tantamount to walking around with a constant webcam on one’s head and accuses the industry of relying on implied consent—the idea that permission is granted if the utility can change the meter, even if residents don’t understand the scope of what’s happening. As a practical step, the speaker advises telling utilities not to change the meter, noting that older meters were billed successfully. They claim to have sent a certified letter denying installation of a smart meter and mention a copy of their letter is available in the video’s description for viewers to adapt. They state post office certified mail is used to obtain a receipt. The speaker concludes that if the meters are installed on every house in America, it would cease to be America.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee states that encrypted systems like ProtonMail and Signal offer no privacy because smartphones are surveillance devices. Malware can be easily planted via websites like Pornhub, watching inputs before encryption and reading outputs after encryption. Encryption is old technology marketed as safe but is now worthless. McAfee uses Gmail because Google requires a subpoena to release information and their lawyers have 30 days to review it, which is enough time for him to change his email. He changes his email every 15 days. He believes people are being sold a false sense of security with encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces the concept: with this hack, your TV can watch you, as the TV is turned into a device that can monitor your surroundings while you watch. Speaker 1 explains how this is possible: by abusing the smart TV platform’s browser to gain access to the camera built into the TV. With a small amount of extra code, the camera can be turned on within the browser. This is designed so that viewers can see the camera feed, and it can run invisibly behind the web page you are looking at. Speaker 0 emphasizes the practical implication: you could be sitting in one place, such as watching TV from your bedroom, while someone elsewhere—potentially anywhere in the world—views the image of you watching. Speaker 1 confirms this scenario with an example: a person could be on a laptop in a cafe in Paris, and as long as they have a network connection, they could access your TV and the camera feed. Speaker 2 highlights a particularly alarming aspect: there is no indication that the camera is on, and there is no LED light to signal activity. As a result, the camera could be watching you without your knowledge. Speaker 0 asks what defines a smart TV and why it is attractive as a target for hackers. Speaker 2 responds by reframing the smart TV as a computer: it is not just a television, but a device that includes a web browser and runs Linux. Speaker 1 points to a more dangerous possibility: when people use smart TVs for activities like online banking, attackers could translate a legitimate bank address into a different IP address leading to a site controlled by the attacker, creating a phishing-like scenario where a user enters a username and password that goes to the attacker instead of the bank. Speaker 0 conveys Samsung’s response in a CNN Money statement: Samsung says it takes consumer privacy very seriously. They offer a hardware countermeasure by enabling the camera to be turned into the bezel of the TV so that the lens is covered or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when smart TV features are not in use. As an additional precaution, Samsung recommends customers use encrypted wireless access points when using connected devices.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that facial recognition will be used to unlock your digital identity, which will be a tool of control for upcoming agendas. Speaker 1 notes that elements of this control are already with us, citing Alexa as an example. Speaker 0 contends you are never alone in your home, because all devices and smart appliances are connected on a wireless network, many with cameras and microphones, monitoring everything all the time. Smart appliances communicate with the smart meter, sending real-time usage data. If a Ring camera is in the home, a mesh network is formed and all devices are being tracked within the home, including location and usage, with data going to Amazon’s servers. Speaker 1 adds that when you leave your home, modern vehicles are connected to the Internet and tracked continually. On the streets, smart LED poles and smart LED lights form a wireless network that track your vehicle. They claim data is collected 24/7 continuously on every human being within these wireless networks. Speaker 0 asserts this is not good for health due to electromagnetic radiation. Speaker 0 further states that in the long term the plan is to lock up humanity in smart cities, a super set of a fifteen minute city. Speaker 1 says they’ve sold smart cities to state and local governments and countries as about sustainability and the city’s good, but claims the language from the UN and WEF and their white papers is inverted. The monitoring is described as about limiting mobility and no car ownership. Surveillance via LED grid is described as why smart lighting is death. Water management is about water rationing; noise pollution about speed surveillance; traffic monitoring about limiting mobility; energy conservation about rationing heat, electricity, and gasoline. Speaker 0 explains geofencing as an invisible fence around you where you cannot go beyond a certain point, related to face recognition, digital identity, and access control. Speaker 1 mentions that smart contracts can enable Softbrick to turn off your digital currency beyond a certain point from your house. The world is described as turned into a digital panopticon. Speaker 0 concludes that this means you can be monitored, analyzed, managed, and monetized.

Video Saved From X

reSee.it Video Transcript AI Summary
They have complete access to your device and can manipulate it as they please. Although you technically own the device because you paid for it, corporations and governments are gaining more control over it. We are living in a world where we bear the burden of work, taxes, and expenses, yet our ownership diminishes. The previous generation is acutely aware of this reality.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.

Video Saved From X

reSee.it Video Transcript AI Summary
Google recently auto-installed on Android 9+ a component called Android System Safety Core, which sparked panic because its purpose wasn’t clearly explained. The transcript outlines the following points: Google says the component is for sensitive content warnings and, generally, “performs classification of media to help users detect unwanted content.” It then presents contrasting views from self-described experts. The GrapheneOS maintainers published a post on X stating that SafetyCore “doesn’t provide client side scanning and is mainly designed to offer on device machine learning models that can be used by other applications to classify content as spam, scam, or malware.” The speaker, however, rejects this explanation as “the biggest pack of lies from Shields of Big Tech that lay claim to cybersecurity knowledge,” asserting that the feature is clearly about client-side scanning. The speaker claims that the true purpose is client-side scanning, and that any justification portraying it as a benign feature is false. They express frustration with what they describe as widespread misinformation intended to reassure users that they have nothing to worry about. They insist there is a lot to worry about, emphasizing that Safety Core is, in their view, about client-side scanning and is being framed as a feature users have always needed. The speaker contends that they had anticipated the module “for a long time,” suggesting it was inevitable and tying it to a broader concept they call the “see what you see technology,” which they say is directly connected to AI. They argue that this module completes a circle by bringing all of big tech into client-side scanning. Finally, the speaker warns that to understand how this impacts users, one should stay attentive, implying that the development will have significant and widespread effects.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee argues that privacy is gone even with encrypted systems. He states: “If you think you have any privacy whatsoever with an encrypted system, whether it's an email system like ProtonMail or an encrypted messaging system like Signal, you have no fucking privacy.” He claims encryption was designed thirty five years ago to prevent a man in the middle attack, between transmission and receipt, but asserts “There’s no man in the middle anymore. We don’t need them.” He contends that the smartphone is the surveillance device preferred by every government on the fucking planet, and asserts: “How easy it is to plant malware.” McAfee describes the vulnerability by referencing adult sites: “Go on Pornhub. If you’ve been on Pornhub, someone is now listening to you.” He explains that a drive-by of a website sets the download unauthorized applications flag, and with the first click, malware is installed that does two things: “watching your inputs before they're encrypted and transmitting them, and reading the outputs after they are fucking encrypted.” He maintains that encryption is a worthless piece of shit, old technology that is being marketed as a safe system, and asserts: “There is no safety anymore. There is no privacy.” He explains his own use of Gmail: “I use Gmail for one reason. The last company that requires this fucking subpoena from the government in order to give them your information.” He notes that lawyers have “thirty fucking days to review the subpoena,” and claims: “Thirty days is enough for me. I change my fucking email every fifteen days.” He exhorts listeners to wake up, insisting: “You have no more privacy.” McAfee concludes that people are being sold a bill of goods, which is worthless with encryption, and thanks listeners: “Thank you for listening.”

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.
View Full Interactive Feed