TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2013, mobile devices are now the primary focus, with smartphones constantly emitting signals to cell towers even when idle. These signals contain unique identifiers like IMEI and IMSI, allowing tracking of a user's movements. Companies store this data for unknown purposes, leading to privacy concerns and mass surveillance through bulk collection.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: What about the public attitude held by millions of everyday Americans? All I've got on a computer is pictures of my family, CCTV cameras that are prevalent in a ton of American cities and overseas capitals. Those cameras are your friend if you're innocent and have nothing to hide. Speaker 1: Well, I'd say that's very much what the average Chinese citizen believed or perhaps even still to this day believes. But we see how these same technologies are being applied to create what they call the social credit system. If any of these family photos, if any of your activities online, if your purchases, if your associations, if your friends are in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms, and those algorithms are fueled by precisely the innocent data that our devices are creating all of the time constantly, invisibly, quietly right now. Our devices are casting all of these records that we do not see being created, that in aggregate seem very innocent. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information, what they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, they are stealing our power.

Video Saved From X

reSee.it Video Transcript AI Summary
If you're not paying for the product, congratulations. You are the product. Social media tracks you like a hawk. Search engines, they're not just answering your questions. They're selling you. Those free apps you love? Excavation. They're not tools. They're data vacuums sucking up every bit of information they can find. Every like, every scroll, every pause, that's value being extracted from you. You thought you were the user. Right? But guess what? You're the asset, the metric, the line item on a balance sheet. You're not just scrolling through your feed. You're monetized, packaged, and sold to the highest bidder. You're not just a participant. You're the product on the shelf waiting to be picked up and exploited. So next time you think you're getting something for free, remember, nothing is free. You're the one paying the price.

Video Saved From X

reSee.it Video Transcript AI Summary
I don't enable automatic connection, so it won't connect unless I give permission. However, it seems like mine is set to automatic. I usually turn off Wi-Fi when I'm not using it or when I'm on the move.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.

Video Saved From X

reSee.it Video Transcript AI Summary
Government installed remote control features on my Hyundai Kona EV without my consent during a MAPS upgrade. The new Blue Link software includes geofencing and geotiming capabilities, allowing them to set range and time limits remotely. Consent is required unless mandated by law. This raises concerns about privacy and control over my vehicle.

Video Saved From X

reSee.it Video Transcript AI Summary
Apple has clarified that the iPhone is not taking pictures every 5 seconds, but rather scanning our faces using infrared technology to optimize face ID and emoji features. A video shared by a follower shows that baby monitors also emit infrared lights. It is clear that this scanning is happening, but the question is whether Apple has other motives behind it. To turn off this feature, go to settings, face ID, and passcode, and toggle the attention aware features. The speaker wonders where the data collected for analysis is being stored and what others think about it.

Video Saved From X

reSee.it Video Transcript AI Summary
One speaker claims that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on your local computer without warning. The process, they say, starts when Windows updates to begin using OneDrive, but there is no plain-language opt-out warning. Gradually, it begins uploading everything on the computer to Microsoft servers, potentially tens of gigabytes, which may be noticed only if the connection is slow or metered. If you later search for how to stop it, you’ll find options to turn off OneDrive backup, but upon returning the next day you’ll find everything has been deleted from your local machine. The desktop is left with a single icon reading, “Where are my files?” When you click it, it tells you that all of your life’s work is now on Microsoft’s machine and was deleted from your machine without asking. The process continues: you’re forced to download all your files back to your machine, which can be a disaster on slow or metered connections due to the large volume of data. When you then try to delete the files from OneDrive, they delete from Microsoft servers and still remove the local copies, leaving you with nothing on your computer. The only way to delete files from Microsoft’s machine without also removing them locally is to follow a YouTube tutorial with detailed steps. To make OneDrive stop this behavior requires looking up the exact steps; there is no intuitive, plain-English option to opt out. The speaker asserts there is no explicit notice like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” If such an option existed in plain language, they claim, people would say no. The speaker argues that many people equate cloud storage with a backup, but OneDrive allegedly does not function as a back-up; instead, it secretly transfers the user’s files to their machine so that Microsoft’s machine becomes primary, and the user’s local machine is treated as temporary access. This allegedly slows down the computer because data is uploaded and downloaded to the cloud rather than read from or written to the local hard drive. In practice, if anything happens to a file on OneDrive’s machine, the file is deleted everywhere, because there is only the copy on their machine. Throughout, the speaker emphasizes that this behavior is not explained in plain language, is highly unintuitive, and could lead to accidental, widespread data loss. They conclude that it’s hard to believe this was allowed to go out the door or that nobody intervened.

Video Saved From X

reSee.it Video Transcript AI Summary
To check if you're being tracked, dial *#62# on your phone. If you see any call forwarding options, you're being tracked. To disable this, dial ##002# on your phone. This erases all call forwardings. Like, share, and follow for more content like this. Translation: To check if you are being tracked, dial *#62# on your phone. If you see any call forwarding options, you are being tracked. To disable this, dial ##002# on your phone. This will erase all call forwardings. Like, share, and follow for more content like this.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
We inform subscribers of inappropriate behavior and may take corrective action if our services are misused. This can include removing content, canceling posts, filtering transmissions, or suspending services. We reserve the right to remove any content that violates our terms. The NSA tracks cell phones globally, and Canadian mobile companies have questionable practices. Canadians should pay attention to new mobile contracts.

Video Saved From X

reSee.it Video Transcript AI Summary
T-Mobile is reportedly collecting extensive customer data through its partnership with OpenAI. CEO Mike Sievert recently discussed this collaboration in a Fireside Chat with Sam Altman, promoting the benefits of AI. However, customers should consider whether they want T-Mobile to profile their work performance, economic status, health, and personal preferences. Many may not trust T-Mobile to share their data with outside researchers or to enhance ad relevance using app data. Despite potential concerns, T-Mobile has enabled these data collection settings by default, requiring customers to manually disable them if they wish. Additionally, there are connections between Sam Altman and the World Economic Forum, which is often viewed with skepticism.

Video Saved From X

reSee.it Video Transcript AI Summary
I have an iPhone. Does Google track my movement if I move to sit with my democrat friends? Google knows if I move, but it depends on the services I've opted into. Can you answer if Google knows I moved without more details?

Video Saved From X

reSee.it Video Transcript AI Summary
Signal, a company, may be asked by the regulator Ofcom about the data they gather. Signal claims they don't collect data on people's messages. However, the concern is that the bill doesn't specify this and instead gives Ofcom the power to demand spyware downloads to check messages against a permissible database. This sets a precedent for authoritarian regimes and goes against the principles of a liberal democracy. It is seen as unprecedented and a negative shift in surveillance practices.

Video Saved From X

reSee.it Video Transcript AI Summary
Cell phones are constantly sending data back to companies, even in the middle of the night. This information is used to create profiles on users and can be sold to other companies. Big tech companies like Facebook and Google are major offenders in this data collection. This poses a threat to privacy and security, as the data can be used for manipulation and control. It is crucial for Congress, state attorney generals, and the public to be educated about this issue and take action to regulate and prevent this invasion of privacy. Visit doctorjonesnaturals.com to support the broadcast and access quality products.

Video Saved From X

reSee.it Video Transcript AI Summary
- "This is the Apple intelligence report." - "It exports everything that you do, including messages, every fifteen minutes by default." - "While you're at it, turn off everything for Apple advertising and analytics Now scroll to the top of that section and turn off allow apps to track." - "Under Apple intelligence and Siri, scroll all the way to the bottom." - "And if I were you, I would turn off Apple intelligence for now." - "If you haven't seen all the lawsuits and what's going on, it just doesn't seem safe, and you don't wanna be surveilled under any pretense." - "In the photos app, scroll all the way down to the bottom where you will see enhanced visual search." - "This is basically taking a sketch, an AI, duplication of every single one of your photos, to analyze them."

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
We are announcing the largest multistate privacy settlement in US history. Many of us have experienced targeted ads after browsing in stores, like seeing vacuum cleaner ads after looking at them in a store. Despite turning off location history and having it set to off by default, Google continued to collect precise location data. This was happening through another setting called web and app activity, which is enabled by default.

Video Saved From X

reSee.it Video Transcript AI Summary
Today we'll discuss the Apple AirPod patent, which reveals the data collected by the AirPods while in use. The question arises: where does this information go? Additionally, Apple phones have a fitness tracker that monitors steps, body motion, brainwaves, and more. It is advised to disable this feature. Interestingly, AirPods can be configured to provide health-related data like heart rate, blood pressure, and diet information. The concern is who is collecting this data and if it aligns with the narrative of Elon Musk's chip implantation. It seems the AirPods may be connected to this concept. What are your thoughts?

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked cell phones of visitors to Jeffrey Epstein's island, exposing their data online. Near Intelligence, linked to US defense contractors, meticulously monitored visitors' movements over 3 years. The data revealed locations in the US and other countries. Near Intelligence sources data from advertising exchanges, selling it for targeted ads and possibly to the military. This highlights the potential for mass surveillance through ad tech. While smartphone users can be tracked, steps like using trusted apps, disabling location services, and using VPNs can help protect privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
Apple's upcoming upgrade will integrate ChatGPT into every iPhone, enabling the collection and analysis of user data. A side-by-side test revealed that both Google and Apple phones transmit significant data dumps, around 50 megabytes, between 2 and 3 AM nightly, sharing user preferences and daily activities. By age 13, an average American child has had 72 million data points collected on them by big tech, tracked through a unique 32-digit advertising ID. This ID allows companies to monitor device locations for targeted advertising and sales. The goal of unplugged communication is to help people connect without surrendering their digital data to tech companies. Some individuals prefer to remain uninformed and compliant, while others seek to protect their privacy.

TED

How tech companies deceive you into giving up your data and privacy | Finn Lützow-Holm Myrstad
Guests: Finn Lützow-Holm Myrstad
reSee.it Podcast Summary
Kayla, a toy of the year, uses speech recognition and connects to the internet, raising privacy concerns as it collects personal data without proper consent. Despite being banned in Germany, it remained available elsewhere. An experiment revealed the difficulty of understanding app terms, taking nearly 32 hours to read. Companies exploit user data, leading to potential discrimination and manipulation. Change is needed through better regulations and prioritizing consumer privacy.

Coldfusion

Apple vs Facebook - The Great Privacy Fight
reSee.it Podcast Summary
In the early days of the internet, possibilities seemed endless, but corporate monopolies now exploit user data for profit. Apple has introduced features in iOS 14 and 14.5 that enhance user privacy by allowing users to see what data apps collect and to opt out of tracking. This directly challenges Facebook's business model, which relies on targeted advertising. Zuckerberg has expressed concern over potential impacts on small businesses and profitability. Apple's moves could set trends in user privacy, but the long-term effects on the internet remain uncertain.
View Full Interactive Feed