TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims Windows includes a piece of malware called OneDrive that will spontaneously delete all files off your computer, not from OneDrive but from your local machine. They say, “OneDrive will spontaneously delete all of the files off of your computer,” and that “all of my photos and videos of my family, all of my work files, everything is gone.” - They assert there is no warning, no confirmation button, and no pop-up before this happens. It “will start doing it” during a Windows update that begins using OneDrive, with “no plain language warning to opt out.” - OneDrive allegedly quietly uploads everything on the computer to Microsoft servers, and users may notice only when OneDrive warns that it’s running out of space. The user then looks up how to stop it and “you will get onto your computer the next day to find everything is gone.” - After deletion, the desktop shows a single icon that says, “where are my files?” They say many people thought they had been hit by ransomware or a virus. - When the user tries to recover, they are forced to download all the files back to the machine, which can take a long time on slow or metered Internet connections. - If the user then deletes the files from the local computer and also from OneDrive, the files are deleted from the computer again with “no warning, with no pop up, without anything.” - The only way to delete the files off the machine without also deleting them from OneDrive is to follow a YouTube tutorial with detailed steps, because there is no intuitive way in the menus. They emphasize there is no plain English explanation like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” - The speaker argues that many people assume cloud storage is a backup, but OneDrive “secretly transfers your machine to their machine so that their machine is the primary. Those files are the copy of the files.” When you work on the local machine, it is treated as temporary access to those files. This slows the machine because it writes and reads data to the cloud rather than the hard drive. - Practically, if anything happens to the file on OneDrive’s machine, it’s deleted everywhere because it’s now only on their machine, and you are only allowed to temporarily access it. The speaker notes this is “very intuitive” to accidentally delete everything, and questions how this was allowed to go out the door. - The concluding point: when OneDrive says it’s full and you delete things to free up space, it deletes them from your machine too, which the speaker finds unbelievable.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 has a USB drive with 90-95 Gigabytes of data, possibly containing around 4,000 videos of varying quality. The data is organized into "videos" and "photos" folders. There is no passcode on the drive. Speaker 1 states his wife is an idiot with technology and wouldn't know about the drive's contents.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
OneDrive on Windows allegedly behaves like malware by spontaneously deleting all files from your local machine without warning or confirmation. The speaker claims that after a Windows update begins using OneDrive, there is no plain-language warning to opt out, and it starts uploading everything on the computer to Microsoft servers. Some users notice this when a slow or metered Internet connection causes large uploads, or when OneDrive warns that it is running out of space. According to the speaker, once the process starts, all data on the local computer is uploaded to Microsoft servers and appears on the desktop as an icon labeled “Where are my files?” The message suggests that all of your life’s work has been deleted from the local machine “without ever asking you.” The user may then be forced to download the files back to the local computer, which can be extremely slow on slow or metered connections, requiring many gigabytes to be re-downloaded. After the user downloads the data again, they may choose to delete it from OneDrive. However, deleting files from OneDrive results in the same files being deleted from the local machine, again with no warning or pop-up. The only way to delete the files from OneDrive without removing them from the local machine, the speaker claims, is to follow a YouTube tutorial with detailed steps; options to prevent this are buried in menus and do not state in plain English what they do. The speaker contends that OneDrive is not a traditional cloud backup but secretly makes the user’s machine secondary to OneDrive’s machine, with the cloud copy being the primary. When working on the local machine, the system is treated as temporarily accessing the cloud copy rather than using local storage. This allegedly slows down the machine since data must be uploaded and downloaded to the cloud rather than read from and written to the hard drive. The claim is that at no point does OneDrive explain in plain language that it intends to take everything on the computer and put it on Microsoft’s machine instead. The speaker emphasizes that this is unintuitive and easy to accidentally delete everything, and questions why such behavior was allowed to go forward without intervention. The core concern is that OneDrive’s behavior makes the cloud copy the authoritative version, with local data being secondary, and no clear, explicit warning about this transition.

Video Saved From X

reSee.it Video Transcript AI Summary
Private files are no longer kept in physical locations like locked file cabinets. Instead, they are stored on devices like laptops and then in the cloud. This means the data is no longer in a physical place.

Video Saved From X

reSee.it Video Transcript AI Summary
Private files are no longer stored in physical locations like locked file cabinets. Instead, they are kept on laptops and in the cloud, making them accessible from anywhere. This shift means that sensitive information is now stored digitally rather than in a tangible space.

Video Saved From X

reSee.it Video Transcript AI Summary
Microsoft has a partnership with China's central propaganda department, which involves using their software to spy on users. Microsoft has been doing business in China for over 30 years and has sold the Chinese Communist Party (CCP) over a dozen AI products, supporting their high-tech industry. The CCP's long-term plan, called Made in China 2024, aims to surpass America in the high-tech industry, and Microsoft has played a significant role in helping them achieve this. Microsoft is also collaborating with CCP mouthpieces, the People's Daily and China Daily, further raising concerns about national security.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reveals shocking information about the deletion of the entire database directory from the d drive of the machine called EMS primary. This deletion occurred approximately 10 days before the machines were handed over to the Senate. Deleting documents after being told to preserve them can have severe legal consequences. Additionally, the main database for the election management system software, which contains all election-related data from the November 2020 general election, is missing from the EMS primary machine. This suggests that it has been removed.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript warns that redacting a PDF must be done correctly because otherwise hidden text behind the redaction can be copied and pasted into a text editor to reveal the original content. It cites the U.S. Department of Justice as having made this mistake with some Epstein files. The speaker references “one of the files from justice.gov” containing a redacted portion and demonstrates that the underlying text can be copied. They describe copying behind the redaction and pasting it into a Word document, illustrating how the original text becomes exposed.

Video Saved From X

reSee.it Video Transcript AI Summary
You no longer keep private files in a locked file cabinet in your basement. They are now on your laptop and in the cloud above us, not in a physical location.

Video Saved From X

reSee.it Video Transcript AI Summary
Think you deleted your data? That's cute. The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
we have evidence now that we didn't have two years ago when we last spoke of AI uncontrollability. When you tell an AI model, we're gonna replace you with a new model, it starts to scheme and freak out and figure out if I tell them I need to copy my code somewhere else, and I can't tell them that because otherwise they'll shut me down. That is evidence we did not have two years ago. the AI will figure out, I need to figure out how to blackmail that person in order to keep myself alive. And it does it 90% of the time. Not about one company. It has a self preservation drive. That evidence came out just about a month ago. We are releasing the most powerful, uncontrollable, inscrutable technology we've ever invented, releasing it faster than we've released any other technology in history.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 addresses Microsoft Azure, saying, “Like to condemn Microsoft Azure program for leaking sensitive classified information to the CCP.” The speaker then questions Bill Gates directly: “And then I think that Are you pro CCP, mister Gates? I understand your foundation owns a lot of Microsoft shares now, and your Bill and Melinda Gates Foundation has heavily financed and is financially connected to the CCP.” The speaker asks, “So is that why you're not answering the questions about governments, Microsoft's Azure program, mister Gates?” Continuing, the speaker presses the issue: “Are you sure you don't wanna condemn them for leaking classified information from our US military?” The speaker reiterates the demand: “One more time, mister Gates. Would you like to condemn Microsoft's government Azure program for leaking classified information at the CCP?” The response implied by the transcript is “No? Okay.”

Video Saved From X

reSee.it Video Transcript AI Summary
- "This is the Apple intelligence report." - "It exports everything that you do, including messages, every fifteen minutes by default." - "While you're at it, turn off everything for Apple advertising and analytics Now scroll to the top of that section and turn off allow apps to track." - "Under Apple intelligence and Siri, scroll all the way to the bottom." - "And if I were you, I would turn off Apple intelligence for now." - "If you haven't seen all the lawsuits and what's going on, it just doesn't seem safe, and you don't wanna be surveilled under any pretense." - "In the photos app, scroll all the way down to the bottom where you will see enhanced visual search." - "This is basically taking a sketch, an AI, duplication of every single one of your photos, to analyze them."

Video Saved From X

reSee.it Video Transcript AI Summary
Do you want T Mobile to track your work performance, financial situation, health, personal preferences, and movements? Do you trust them to share your data with researchers or to personalize ads using your app data? Would you like to help T Mobile improve their products by sharing your data? Many of you likely answered no to these questions. However, T Mobile has automatically enabled these settings on all accounts, and you must manually disable them if you do not wish to participate.

Video Saved From X

reSee.it Video Transcript AI Summary
Think you deleted your data? That's cute. The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. Excavation. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. So go ahead. Keep scrolling. Keep searching. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
The Windows security logs were purged right before two audits were scheduled to begin. This makes it difficult to determine who had access to the RTR admin account, which is shared among all accounts. It is unclear why someone would delete all the records and files from the Dominion software, which is used for tallying and reporting election results, the day before an audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces the concept: with this hack, your TV can watch you, as the TV is turned into a device that can monitor your surroundings while you watch. Speaker 1 explains how this is possible: by abusing the smart TV platform’s browser to gain access to the camera built into the TV. With a small amount of extra code, the camera can be turned on within the browser. This is designed so that viewers can see the camera feed, and it can run invisibly behind the web page you are looking at. Speaker 0 emphasizes the practical implication: you could be sitting in one place, such as watching TV from your bedroom, while someone elsewhere—potentially anywhere in the world—views the image of you watching. Speaker 1 confirms this scenario with an example: a person could be on a laptop in a cafe in Paris, and as long as they have a network connection, they could access your TV and the camera feed. Speaker 2 highlights a particularly alarming aspect: there is no indication that the camera is on, and there is no LED light to signal activity. As a result, the camera could be watching you without your knowledge. Speaker 0 asks what defines a smart TV and why it is attractive as a target for hackers. Speaker 2 responds by reframing the smart TV as a computer: it is not just a television, but a device that includes a web browser and runs Linux. Speaker 1 points to a more dangerous possibility: when people use smart TVs for activities like online banking, attackers could translate a legitimate bank address into a different IP address leading to a site controlled by the attacker, creating a phishing-like scenario where a user enters a username and password that goes to the attacker instead of the bank. Speaker 0 conveys Samsung’s response in a CNN Money statement: Samsung says it takes consumer privacy very seriously. They offer a hardware countermeasure by enabling the camera to be turned into the bezel of the TV so that the lens is covered or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when smart TV features are not in use. As an additional precaution, Samsung recommends customers use encrypted wireless access points when using connected devices.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
They have complete access to your device and can manipulate it as they please. Although you technically own the device because you paid for it, corporations and governments are gaining more control over it. We are living in a world where we bear the burden of work, taxes, and expenses, yet our ownership diminishes. The previous generation is acutely aware of this reality.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
Think you deleted your data? That's cute. The Internet doesn't delete. It archives. Every click, every typo, every late night search you hoped no one saw. It's all logged by your apps, your ISP, your phone, even your smart fridge if it's nosy enough. You think you've wiped the slate clean, but it's all still there, tucked away in the shadows. Excavation. It's stored where you see it. It's stored where they can sell it. Because forgetting has no profit. But remembering, that's where the money is. Your data has a memory and it's not yours anymore. Those innocent searches, those fleeting moments of curiosity, they're commodities now packaged and sold to the highest bidder. Every detail, every secret you thought was yours is out there waiting to be exploited. So go ahead. Keep scrolling. Keep searching. Just remember, the Internet never forgets.

Video Saved From X

reSee.it Video Transcript AI Summary
Google recently auto-installed on Android 9+ a component called Android System Safety Core, which sparked panic because its purpose wasn’t clearly explained. The transcript outlines the following points: Google says the component is for sensitive content warnings and, generally, “performs classification of media to help users detect unwanted content.” It then presents contrasting views from self-described experts. The GrapheneOS maintainers published a post on X stating that SafetyCore “doesn’t provide client side scanning and is mainly designed to offer on device machine learning models that can be used by other applications to classify content as spam, scam, or malware.” The speaker, however, rejects this explanation as “the biggest pack of lies from Shields of Big Tech that lay claim to cybersecurity knowledge,” asserting that the feature is clearly about client-side scanning. The speaker claims that the true purpose is client-side scanning, and that any justification portraying it as a benign feature is false. They express frustration with what they describe as widespread misinformation intended to reassure users that they have nothing to worry about. They insist there is a lot to worry about, emphasizing that Safety Core is, in their view, about client-side scanning and is being framed as a feature users have always needed. The speaker contends that they had anticipated the module “for a long time,” suggesting it was inevitable and tying it to a broader concept they call the “see what you see technology,” which they say is directly connected to AI. They argue that this module completes a circle by bringing all of big tech into client-side scanning. Finally, the speaker warns that to understand how this impacts users, one should stay attentive, implying that the development will have significant and widespread effects.
View Full Interactive Feed