TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The centralization of information on computers means that archives, like The Guardian's, are only accessible online. Due to copyright laws, these archives are not copied to other internet locations. When something is removed from these archives, it is gone forever, leaving no trace. This situation gives control over the past to those who control internet servers, influencing our perception of ourselves and the laws we create in society.

Video Saved From X

reSee.it Video Transcript AI Summary
I believe the privacy of people in this country is being violated. Elon Musk and Trump are taking all of our private information, and we have no idea what information they possess.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: What about the public attitude held by millions of everyday Americans? All I've got on a computer is pictures of my family, CCTV cameras that are prevalent in a ton of American cities and overseas capitals. Those cameras are your friend if you're innocent and have nothing to hide. Speaker 1: Well, I'd say that's very much what the average Chinese citizen believed or perhaps even still to this day believes. But we see how these same technologies are being applied to create what they call the social credit system. If any of these family photos, if any of your activities online, if your purchases, if your associations, if your friends are in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms, and those algorithms are fueled by precisely the innocent data that our devices are creating all of the time constantly, invisibly, quietly right now. Our devices are casting all of these records that we do not see being created, that in aggregate seem very innocent. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information, what they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, they are stealing our power.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
I believe the privacy of the people in this country is being violated. Elon Musk and Donald Trump are taking all of our private information, and we have no idea what information they possess. We don't know the extent of their knowledge about our personal lives.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims Windows includes a piece of malware called OneDrive that will spontaneously delete all files off your computer, not from OneDrive but from your local machine. They say, “OneDrive will spontaneously delete all of the files off of your computer,” and that “all of my photos and videos of my family, all of my work files, everything is gone.” - They assert there is no warning, no confirmation button, and no pop-up before this happens. It “will start doing it” during a Windows update that begins using OneDrive, with “no plain language warning to opt out.” - OneDrive allegedly quietly uploads everything on the computer to Microsoft servers, and users may notice only when OneDrive warns that it’s running out of space. The user then looks up how to stop it and “you will get onto your computer the next day to find everything is gone.” - After deletion, the desktop shows a single icon that says, “where are my files?” They say many people thought they had been hit by ransomware or a virus. - When the user tries to recover, they are forced to download all the files back to the machine, which can take a long time on slow or metered Internet connections. - If the user then deletes the files from the local computer and also from OneDrive, the files are deleted from the computer again with “no warning, with no pop up, without anything.” - The only way to delete the files off the machine without also deleting them from OneDrive is to follow a YouTube tutorial with detailed steps, because there is no intuitive way in the menus. They emphasize there is no plain English explanation like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” - The speaker argues that many people assume cloud storage is a backup, but OneDrive “secretly transfers your machine to their machine so that their machine is the primary. Those files are the copy of the files.” When you work on the local machine, it is treated as temporary access to those files. This slows the machine because it writes and reads data to the cloud rather than the hard drive. - Practically, if anything happens to the file on OneDrive’s machine, it’s deleted everywhere because it’s now only on their machine, and you are only allowed to temporarily access it. The speaker notes this is “very intuitive” to accidentally delete everything, and questions how this was allowed to go out the door. - The concluding point: when OneDrive says it’s full and you delete things to free up space, it deletes them from your machine too, which the speaker finds unbelievable.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. Excavation. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. So go ahead. Keep scrolling. Keep searching. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
OneDrive on Windows allegedly behaves like malware by spontaneously deleting all files from your local machine without warning or confirmation. The speaker claims that after a Windows update begins using OneDrive, there is no plain-language warning to opt out, and it starts uploading everything on the computer to Microsoft servers. Some users notice this when a slow or metered Internet connection causes large uploads, or when OneDrive warns that it is running out of space. According to the speaker, once the process starts, all data on the local computer is uploaded to Microsoft servers and appears on the desktop as an icon labeled “Where are my files?” The message suggests that all of your life’s work has been deleted from the local machine “without ever asking you.” The user may then be forced to download the files back to the local computer, which can be extremely slow on slow or metered connections, requiring many gigabytes to be re-downloaded. After the user downloads the data again, they may choose to delete it from OneDrive. However, deleting files from OneDrive results in the same files being deleted from the local machine, again with no warning or pop-up. The only way to delete the files from OneDrive without removing them from the local machine, the speaker claims, is to follow a YouTube tutorial with detailed steps; options to prevent this are buried in menus and do not state in plain English what they do. The speaker contends that OneDrive is not a traditional cloud backup but secretly makes the user’s machine secondary to OneDrive’s machine, with the cloud copy being the primary. When working on the local machine, the system is treated as temporarily accessing the cloud copy rather than using local storage. This allegedly slows down the machine since data must be uploaded and downloaded to the cloud rather than read from and written to the hard drive. The claim is that at no point does OneDrive explain in plain language that it intends to take everything on the computer and put it on Microsoft’s machine instead. The speaker emphasizes that this is unintuitive and easy to accidentally delete everything, and questions why such behavior was allowed to go forward without intervention. The core concern is that OneDrive’s behavior makes the cloud copy the authoritative version, with local data being secondary, and no clear, explicit warning about this transition.

Video Saved From X

reSee.it Video Transcript AI Summary
Our financial systems are antiquated. We're unable to track trillions of dollars in transactions. Information sharing is severely limited by outdated and incompatible technological systems.

Video Saved From X

reSee.it Video Transcript AI Summary
One speaker claims that Windows includes a piece of malware called OneDrive that will spontaneously delete all files on your local computer without warning. The process, they say, starts when Windows updates to begin using OneDrive, but there is no plain-language opt-out warning. Gradually, it begins uploading everything on the computer to Microsoft servers, potentially tens of gigabytes, which may be noticed only if the connection is slow or metered. If you later search for how to stop it, you’ll find options to turn off OneDrive backup, but upon returning the next day you’ll find everything has been deleted from your local machine. The desktop is left with a single icon reading, “Where are my files?” When you click it, it tells you that all of your life’s work is now on Microsoft’s machine and was deleted from your machine without asking. The process continues: you’re forced to download all your files back to your machine, which can be a disaster on slow or metered connections due to the large volume of data. When you then try to delete the files from OneDrive, they delete from Microsoft servers and still remove the local copies, leaving you with nothing on your computer. The only way to delete files from Microsoft’s machine without also removing them locally is to follow a YouTube tutorial with detailed steps. To make OneDrive stop this behavior requires looking up the exact steps; there is no intuitive, plain-English option to opt out. The speaker asserts there is no explicit notice like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” If such an option existed in plain language, they claim, people would say no. The speaker argues that many people equate cloud storage with a backup, but OneDrive allegedly does not function as a back-up; instead, it secretly transfers the user’s files to their machine so that Microsoft’s machine becomes primary, and the user’s local machine is treated as temporary access. This allegedly slows down the computer because data is uploaded and downloaded to the cloud rather than read from or written to the local hard drive. In practice, if anything happens to a file on OneDrive’s machine, the file is deleted everywhere, because there is only the copy on their machine. Throughout, the speaker emphasizes that this behavior is not explained in plain language, is highly unintuitive, and could lead to accidental, widespread data loss. They conclude that it’s hard to believe this was allowed to go out the door or that nobody intervened.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without any Internet connectivity or external access. They are not meant to connect to the outside world in any way. Is there any remote access to the information on the equipment or within the machines? No, there is no remote access. Does anyone have access, to the best of your knowledge? No, no one has access.

Video Saved From X

reSee.it Video Transcript AI Summary
Private files are no longer kept in physical locations like locked file cabinets. Instead, they are stored on devices like laptops and then in the cloud. This means the data is no longer in a physical place.

Video Saved From X

reSee.it Video Transcript AI Summary
Private files are no longer stored in physical locations like locked file cabinets. Instead, they are kept on laptops and in the cloud, making them accessible from anywhere. This shift means that sensitive information is now stored digitally rather than in a tangible space.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 says essential digital infrastructure must be secure and sovereign: "one of the most important things is not to put the digital infrastructure in place and make sure it is secure. And often, it needs to be sovereign." Data centers must be in our countries due to privacy: "Data centers, because of the privacy requirements around the data, need to be in our countries or they're not terribly useful. They need to be in our countries, but they also need to be secure." They foresee a passwordless future: "This is the last year you will ever log on to an Oracle system with a password." "By the middle of this year, I'm quite certain you are Tony Blair." Security will rely on biometrics: "The security system, we have biometric logins. The computer recognizes you." "There's no reason to enter a password. In fact, passwords are too easily stolen." They warn about ransomware: "The data centers and data is being taken hostage all over the world." "The ransomware business is a very, very good business." And a preemptive approach: "not after the data is stolen, but before the data is stolen. We can make sure that we're using the latest security technology, and it is going to be biometrics assisted by AI to make sure that you are, in fact, Tony Blair, and I'm sure you are."

Video Saved From X

reSee.it Video Transcript AI Summary
We discussed the tension between being open and transparent while also protecting ourselves. We agreed to be open and transparent for everything that happened 90 days ago and before, as it's all gone. It's similar to how cryptocurrencies work, where there is no trail if you don't want it.

Video Saved From X

reSee.it Video Transcript AI Summary
Think you deleted your data? That's cute. The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
We discovered something in the MRI room—a laptop that we will analyze. We also found a computer that seems to have been used extensively in the MRI room.

Video Saved From X

reSee.it Video Transcript AI Summary
Our financial systems are outdated, making it difficult to track trillions of dollars in transactions. Additionally, the lack of compatibility between different technological systems prevents us from sharing information within this building.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
They have complete access to your device and can manipulate it as they please. Although you technically own the device because you paid for it, corporations and governments are gaining more control over it. We are living in a world where we bear the burden of work, taxes, and expenses, yet our ownership diminishes. The previous generation is acutely aware of this reality.

Video Saved From X

reSee.it Video Transcript AI Summary
Think you deleted your data? That's cute. The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. Excavation. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. So go ahead. Keep scrolling. Keep searching. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
In this new world, we must embrace complete transparency. Everything will be transparent, and we need to adapt and behave accordingly. It is becoming integrated into our lives. If we have nothing to hide, there is no need to be afraid.

a16z Podcast

a16z Podcast | The $200 PC in the Enterprise
Guests: Benedict Evans, Steven Sinofsky
reSee.it Podcast Summary
In this episode, Benedict Evans and Steven Sinofsky discuss the evolution of tech devices in enterprises, particularly the transition from PCs to mobile platforms and the implications of the S curve leveling out. They reflect on the historical resilience of mainframes, noting that IBM thrived for 20 years post-PC disruption, suggesting that PCs may also experience a long tail of profitability despite reduced innovation. The conversation highlights the shift to browser-based applications in enterprises, with many workers now relying on web interfaces rather than traditional Windows apps. They explore the potential for low-cost devices, like Chromebooks, to replace PCs in environments where only browser access is needed. The discussion emphasizes the growing importance of mobile applications and the need for IT to adapt to changing user demands while managing costs effectively. Ultimately, they predict a future where many office tasks are performed through browsers and mobile devices, reshaping the landscape of enterprise computing.
View Full Interactive Feed