reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the use of sock puppets on Twitter and Facebook, as well as defensive and offensive tactics employed by anti-disinformation operatives. They mention techniques like doxxing and deception, and the use of merchandise sites to gather information. The speaker also talks about checking potentially malicious content sites, takedowns, and ensuring machine security.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2022, as Director of Information Security at The Intercept, the speaker wrote articles critical of Elon Musk's takeover of Twitter, including his purging of leftist accounts and reinstatement of neo-Nazis and anti-vaxxers. Subsequently, Musk permanently suspended the speaker's account, then reinstated it after a poll, but demanded deletion of a tweet. Instead, the speaker quit Twitter for a year. The speaker now works with a collective that makes open-source security and privacy software, including Syd.social, an app to delete data from X and migrate tweets to Blue Sky. The speaker is also involved in Tesla Takedown, a nonviolent movement aiming to devalue Tesla stock and force Musk to sell shares to cover his Twitter debt. The goal is to trigger a Tesla stock "death spiral."

Video Saved From X

reSee.it Video Transcript AI Summary
The disinformation industry distorts reality with online propaganda. Hanan's team boasts about past successes, with tools like AIMS to weaponize social media. Their bots are sophisticated, appearing human with multiple platform accounts. They create fake personas for various purposes. The team claims to have worked in countries worldwide and can hack Telegram and Gmail. Hanan exploits vulnerabilities in the global signaling system, SS7.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
In China, a method is described for making social media posts appear to generate widespread attention. The technique involves flipping a switch and having one monitor display a collage of many phone screens at once. The setup is built from ordinary smartphones, and assembling it is portrayed as easier than one might expect. The process begins by stripping the phones down to their circuit boards, after which the components are gathered in a single location. The boards are then connected to power and internet access. With the appropriate software, this arrangement can operate a large number of phones simultaneously. Once running, the system is capable of controlling dozens of phones at the same time. This multi-phone control enables the creation of multiple accounts and the artificial boosting of engagement metrics. In practice, the setup can be used to inflate activity on social media by generating more likes and follows than would occur naturally. The description emphasizes that the trick relies on a coordinated, large-scale use of decoupled devices—reconfigured and networked together—to simulate genuine user behavior across many accounts. The core claim is that the combination of hardware (a network of converted smartphones) and software (that coordinates and automates actions across the devices) can mimic organic activity and amplify posts. The technique is framed as an efficient way to amplify reach, leveraging the visual effect of many screens and the automation potential of software to manage numerous accounts in parallel. The discussion highlights that the setup makes it possible to run dozens of phones at once, implying scalability and ease of deployment beyond a small pilot. Overall, the described approach centers on transforming standard smartphones into a coordinated, scalable system for artificial engagement, enabling the rapid creation of multiple accounts and the systematic boosting of likes and followers on social media posts. The emphasis is on the practical steps to repurpose ordinary devices, the centralized hardware arrangement, and the software-driven control that drives mass-like activity.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 delivers a rapid-fire set of bragging lines about wealth, fashion, and success: “Go see my eyes red on my demons,” “My postie racks up just to motivate my niggas,” “Rappers need a stylist bad, but I ain't use a stylist yet,” “I signed a million dollar contracts in my box to steal a text,” “Wake up, check my bank account, phone numbers in there, bitch. I'm blessed,” and references to private jets, being fresh off the press, sipping drinks with lines, a tinted eye, a moving piece, and owning a new bulletproof Cadillac. He notes money, private flights, and the ability to charge for Instagram content, while cutting off a girl who didn’t pick up. The tone centers on opulent lifestyle, independence, and status. Speaker 1 shifts to a hostile, accusatory monologue: “All over the place, guys. Jack Kosoviak, Gabe Hoffman, Mike Cernovich, Laura Loomer.” He claims Gabe Hoffman “is running humps on people” and calls him a “bad guy.” He says he looks like he’s seen a ghost and that someone close to him was there to infiltrate him, describing these people as “really fucking bad” and stating they are “evil,” including claims of them being “unregistered foreign agents.” He asserts he will be watching everything they do and declares ongoing surveillance and vigilance: “I will be watching. Everything you do, I’m gonna be watching.” Speaker 2 notes a logistical detail: “Hell yeah. On my way back to the site to get my burner phone so I can use my ghost accounts…” indicating plans to obtain a burner phone for anonymous or modified online activity. Speaker 3 adds a blunt, explicit line about using “ghost accounts” for actions, saying, “can use my ghost accounts to fuck,” reinforcing the theme of covert or deceptive online activity. Overall, the transcript juxtaposes an ostentatious wealth/aspirational rap persona (Speaker 0) with a conspiratorial, accusatory stance toward specific public figures (Speaker 1), and mentions of circumventing scrutiny or anonymity online (Speaker 2 and Speaker 3). The named individuals identified by Speaker 1 are Jack Kosoviak, Gabe Hoffman, Mike Cernovich, and Laura Loomer.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker advocates downsizing all assets and resources, especially for public figures who are fighting a public battle and have a social media presence. The key goal is to maintain anonymity by moving wealth into Bitcoin so others cannot know you have it. Keeping funds on centralized exchanges or in a nameable account makes them visible and traceable, which the speaker warns against. The recommended strategy is to transfer wealth into Bitcoin and ensure it remains untraceable by using cold storage in an air-gapped, multisignature wallet. The idea is that once funds are in Bitcoin, they effectively disappear from scrutiny and cannot be proven to belong to you if properly secured. To implement this, one should convert assets into Bitcoin and transfer them to a cold storage setup that uses air-gapped security and multisig authorization. The speaker emphasizes the risk of losing access by keeping assets in traditional, monitored locations; specifically, if you leave Bitcoin on a centralized exchange, it can be seen and tied to you. Finally, the speaker notes a harsh consequence: if you conduct this process and then lose the private keys, you lose all the Bitcoin. In other words, the method hinges on secure, private control of keys, and the trade-off is the possibility of total loss if the keys are misplaced.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker talks about the importance of security and the tools that can help in the process. They mention compartmentalization as a way to separate personal and work life. They also emphasize the use of a persona as a disguise for research purposes. The goal is to lock down information to contain any potential impact. If something goes wrong, only the persona would be compromised. Overall, the speaker finds this topic very interesting.

Video Saved From X

reSee.it Video Transcript AI Summary
To check if you're being tracked, dial *#62# on your phone. If you see any call forwarding options, you're being tracked. To disable this, dial ##002# on your phone. This erases all call forwardings. Like, share, and follow for more content like this. Translation: To check if you are being tracked, dial *#62# on your phone. If you see any call forwarding options, you are being tracked. To disable this, dial ##002# on your phone. This will erase all call forwardings. Like, share, and follow for more content like this.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that you must get your wealth out of the system and downsize all of your assets and resources, especially if you are a public figure and you have any presence on social media. The guidance is that if you’re fighting this “good fight” and you have a public presence online, you need to be downsizing your wealth and assets. The speaker stresses moving as much of your wealth into Bitcoin as possible, so that nobody knows you have it and there is no way to prove you possess it. Once it’s moved into Bitcoin, it’s described as “gone,” in the sense that it cannot be easily traced or proven in the same way as traditional holdings. The warning continues that you should avoid having Bitcoin on any centralized exchanges in a way that makes it obvious whose name is tied to the holdings. The explicit instruction is to get the money into Bitcoin and keep it off centralized exchanges where it can be seen in your name. After acquiring Bitcoin, the recommended setup is a cold storage air-gap multisig wallet. The speaker emphasizes that you should not leave Bitcoin in a system that can be easily accessed or monitored; instead, use cold storage that is air-gapped and protected by a multisignature scheme. The speaker describes the consequences of losing access to private keys: if you lose your private keys, you lose all your Bitcoin. The phrasing used is that you should “go on a boat ride and you fucking lose your private keys and it sucks,” underscoring the irreversible loss associated with losing keys. Overall, the message centers on aggressively relocating wealth into Bitcoin, prioritizing anonymity and security through cold storage and multisig setups, and recognizing the high risk of permanent loss if private keys are lost or compromised. The repeated emphasis is that you must get your wealth out of the system, stay light on your feet, and move assets into Bitcoin to maintain anonymity and reduce traceability.

Video Saved From X

reSee.it Video Transcript AI Summary
Disguises can be used to maintain anonymity. Dyeing hair and wearing different clothes are options. Masks are useful for disguises. Creativity is also helpful. Keeping a change of clothes in a backpack is a good idea. For example, if wearing a white shirt, a blue sweatshirt can be put on if things get chaotic. Having such items readily available is beneficial.

Video Saved From X

reSee.it Video Transcript AI Summary
This phone is not a nostalgia product, but a gadget for hacking, independence, and anonymity. It is compact and lightweight, weighing only three ounces.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker advises federal government employees to leak information to journalists from mainstream press outlets like ProPublica and Politico. They suggest using Signal to communicate and recommend saving emails and recording meetings. The speaker also suggests writing poorly to make the administration look bad. Whistleblower protections are discussed, and the speaker acknowledges the risk involved in their actions. They mention the possibility of finding another job and suggest passing on information to a colleague with a higher risk threshold. The importance of finding ethical journalists who will protect sources is emphasized.

Video Saved From X

reSee.it Video Transcript AI Summary
In China, a method to make social media posts go viral involves a setup of many smartphones. The process uses regular phones stripped down to their circuit boards, which are gathered together and connected to power and the internet. With the right software, this arrangement can run and control dozens of phones simultaneously. Using this system, one can create multiple accounts and artificially boost likes and follows.

Video Saved From X

reSee.it Video Transcript AI Summary
The dialogue centers on accusations and revelations about political operatives and influence campaigns. Key points include: - A list of individuals named as problematic figures: Jack Kosobiak, Gabe Hoffman, Mike Cernovich, and Laura Loomer. Gabe Hoffman is described as “running hops on people” and as “a bad guy,” with a claim that these people are “evil” and unregistered foreign agents that the speaker will be watching closely. - A claim of infiltration and surveillance: one speaker asserts that someone close to them was likely there to infiltrate, and that “these people” attempted to set up someone they know and love, with the speaker vowing to monitor everything they do. - Allegations of role in broader disruptive actions: one speaker says, “We conduct riots and color revolutions and, you know, steal elections, and we overthrow governments we don't like. And I was part of that.” - The origin of operational concepts: one speaker mentions IIA, describing it as social media psychological warfare that began in 2007. - A sense of punitive consequence and manipulation: another speaker states that “they’re all being punished because they thought that what those important people told them was gonna happen,” and recalls being present during a plan to trash the capital, noting a lack of preparedness and security knowledge. - Reactions to claims about being controlled: one speaker says it pisses them off that others claim they’re being handled, with another agreeing that such claims have been heard before. - A warning tone about danger and preparation: one speaker warns that it is “very dangerous” that people are out there giving others hope, describing “a storm coming like nothing you have ever seen,” and asserting that not a single person is prepared for it. - Personal and on-site context: there are mentions of returning to a site to get a burner phone and use ghost accounts, and of attempting to coordinate around Breva, indicating ongoing, weaponized online activity and counter-movement tactics. Overall, the speakers blend accusations of manipulation and clandestine influence with admissions of involvement in disruptive actions, interspersed with warnings of impending upheaval and calls for vigilance.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker urges rapid downsizing of wealth and assets, especially for anyone who will have a public presence or an active social media profile. The core instruction is to get wealth out of the traditional system and keep it on a minimal, flexible footing so a person can stay “light on your feet” as they fight this good fight. The emphasis is placed on anonymity and mobility: if you have public visibility and your assets are traceable, you are vulnerable. A central recommendation is to move wealth into Bitcoin and to do so in a way that makes it effectively invisible to others. The speaker asserts that once wealth is converted into Bitcoin, “it's in Bitcoin. Right? So nobody knows you have it. Nobody can fucking prove that you got it.” The concern is exposure through centralized avenues: “it's on a centralized exchange in an area where they can obviously see that it's in your name.” The implication is that public names and on-chain records can reveal ownership and make one a target. To protect anonymity, the speaker prescribes using cold storage, an air-gapped multisig wallet setup. The process involves transferring funds into a secure Bitcoin storage solution that is not connected to the internet or any easily traceable accounts. The description suggests creating a robust, private system that resists easy attribution or retrieval by others. The narrative uses a stark metaphor about risk and loss: you might “go on a boat ride and you fucking lose your private keys and it sucks. You lost all your Bitcoin. Oh, well.” This underscores the consequence of losing access credentials in a highly secure storage arrangement—the assets could be irretrievable. Overall, the message centers on two intertwined ideas: (1) reduce and compartmentalize wealth to maintain mobility and privacy, especially for public figures, and (2) use Bitcoin and advanced storage methods (cold storage, air-gapped multisig) to keep wealth hidden from prying eyes, with the acknowledgement that missteps (like losing private keys) result in total loss. The speaker repeats the imperative: “Gotta get your fucking wealth out of the system,” reinforcing the urgency of downscaling and re-holding wealth in a way that minimizes exposure.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee states that encrypted systems like ProtonMail and Signal do not provide privacy. Encryption was designed to prevent man-in-the-middle attacks, which are no longer relevant because smartphones are surveillance devices. Malware can be easily planted on your device through websites like Pornhub, allowing monitoring of inputs before encryption and outputs after encryption. McAfee claims encryption is worthless and outdated technology marketed as a safe system. He uses Gmail because Google requires a subpoena to release information and their lawyers have 30 days to review it, which is enough time for him. He changes his email every 15 days. He believes people have no privacy and are being sold a false sense of security with encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the activities of a group called CTIL (Cyber Threat Intelligence League) and their efforts to combat misinformation and disinformation on social media platforms. The whistleblower reveals that CTIL used Python code to scrape records from Twitter and tracked incidents of disinformation. They also worked on counter messaging, encouraging mask-wearing, and building an amplification network. The speaker mentions that some CTIL members took extreme measures to conceal their identities. The group's activities received little attention until now, but Wired published an article about CTIL, highlighting their work against misinformation. The speaker concludes by mentioning the upcoming testimony to Congress and refers to Matt Taibbi's perspective on the matter.

Video Saved From X

reSee.it Video Transcript AI Summary
"keep your phone out of reach and off." "Now remember information itself is a distraction and your phone is arguably the number one source for incoming information." "To avoid that then turn off all notifications." "Then keep the phone in a cupboard, the other room or the car that way it won't gnaw at your attention." "Lastly you want as few gadgets, sources of distraction as possible." "Ideally you don't have a phone, a TV, and a tablet in sight so instead we want to simplify." "We want to just get rid of these things." "Here's a helpful way to remember this heuristic. Have less to ignore so you can focus more."

Video Saved From X

reSee.it Video Transcript AI Summary
Don't trust, verify. In the next 5-10 years, deepfakes will make it hard to distinguish real from fake. Shift your mindset to verify things through experience and intuition. Devices are affecting our brain connections, so rely on personal verification.

Video Saved From X

reSee.it Video Transcript AI Summary
For secure cell phone usage, follow these tips: If you need to contact someone in Europe, set your phone to German language and use only German apps, sending voice messages instead of typing. Avoid Chinese language and apps, regardless of the phone you use. In the UK, buy a phone there and communicate in English, again using voice messages instead of typing. Avoid connecting to WiFi and keep each phone in a separate location with different language settings. To ensure safety, periodically switch to new phones and discard the old ones.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker introduces antennasearch.com to find cell phone towers near homes and suggests switching cell phones to LTE instead of 5G to boycott a system that is allegedly poisoning people. The speaker claims safety tests are inadequate and that the rapid rollout of 5G since 2020 is causing radio wave sickness, which was allegedly removed from medical books in the 1920s. Symptoms of radio wave sickness purportedly include fevers, chills, shortness of breath, fatigue, headaches, loss of smell, insomnia, pain in the chest, dizziness, muscle pain, hypertension, strokes, and thyroid issues. The speaker states that cell phone tower companies are immune to lawsuits and references a 1971 US Navy document that supposedly acknowledged the damages of this technology. The speaker eliminated WiFi, Bluetooth, and smart meters and now uses a wired internet connection.

Video Saved From X

reSee.it Video Transcript AI Summary
Signal is recommended for secure communications. For organizing, relationship-building with press and officials, and sharing information, Blue Sky is suggested as an alternative to Twitter and Facebook, which are not trusted due to their ownership. Blue Sky is considered more independent and less likely to be taken over by harmful elements. Signal is preferred for private communications, while Blue Sky is better for coordinating between groups.

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.
View Full Interactive Feed