reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
This is a message from John McAfee, who is currently in a prison in Barcelona. He explains that he is inside a Faraday cage, which blocks all signals, and has an 8-channel scrambler for extra security. He describes himself as an escaped slave from a system that confines people to a 9 to 5 existence, controlled by the American Industrial Corporate Complex and the government. McAfee urges others to free themselves from this system, emphasizing that life is a beautiful mystery when liberated from control and deception. He asserts that he will continue to speak out and will not be found.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Vault 7 is the biggest intelligence leak ever, with less than 1% of the material published so far. It reveals that the CIA has created its own version of the NSA focused on hacking. They develop viruses and trojans to infiltrate people's devices and collect information for the CIA. This information can be used to falsely implicate someone in a crime. The CIA's budget has increased, giving them more power, and they now have their own drone fleet and hacker squad. Unlike the NSA, the CIA targets endpoints instead of intermediaries, bypassing encryption. If a phone is hacked, encryption becomes irrelevant as the information is gathered before or after encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that he is surrounded by a Faraday cage and an eight-channel scrambler to prevent signals from entering or leaving the room. He says he is doing this because he is an escaped slave to the system and has a loud voice. He believes people are slaves to the American industrial corporate complex and the government. He urges people to free themselves, not necessarily by speaking out, but for their own sake. He says life is a great mystery and a beautiful existence if one is free from those who control, propagandize, lie to, and deceive them. He asserts that everyone is looking for him, but he will not be found and will continue to speak.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Bitcoin was created by John McCarthy to catch criminals. It is centralized and every transaction can be seen. McCarthy also reveals that Moderna is involved in criminal activities. He emphasizes that Bitcoin is worthless and that Monero is the only currency that is actually used. He dismisses the idea of adding privacy features to Bitcoin, stating that it is old, slow, and cannot support smart contracts. He challenges anyone who believes Bitcoin is worth more than 5¢ to explain their reasoning.

Video Saved From X

reSee.it Video Transcript AI Summary
Netanyahu has declared war on American citizens, not with tanks, but with social media algorithms, data as the weapon, turning the Internet into the new battlefield. The Internet is the new battlefield, and Americans are in the crosshairs. The discussion claims the feds are aligning and social media is monitored, stating VPNs aren't protecting you. They've become a global dragnet for surveillance and blackmail. It argues Cape Technologies owns ExpressVPN, CyberGhost, and Private Internet Access; founded by Teddy Saghi, with Israeli military intelligence veterans behind it, linked to Pegasus and Celebrite, and that the VPN ecosystem is compromised by backdoors. ExpressVPN CTO Daniel Garrick, a man exposed as a spy for hire, is cited; Snowden criticized. The piece promotes vp.net, the trustless VPN built inside a secure enclave with zero data, military-grade encryption, and 100% American owned at vp.net/tpv for $5/month. It directs to bp.net/tpv.

Video Saved From X

reSee.it Video Transcript AI Summary
You no longer keep private files in a locked file cabinet in your basement. They are now on your laptop and in the cloud above us, not in a physical location.

Video Saved From X

reSee.it Video Transcript AI Summary
A “total reset” would mean resetting an entire person’s digital life. Once a foundational identity is in place, it would be interoperable across systems. The transcript describes biometric facial recognition as a legal identity: if a person’s face appears on a CCTV camera, that face is treated as the person’s legal identity, indicating the person’s presence. The transcript then compares this to actions in countries such as Russia, describing a draft system “random” and “a lottery.” If someone is selected, the person would be seen on CCTV cameras, and authorities would come “get you.” The speaker says they were not aware of that connection. The transcript frames losing biometric identity as more extreme than losing other identifiers. It contrasts losing a social security number or registration number with losing biometric identity, and states that it is unclear how biometric identity is “got back.” It then poses a trust question: if a privacy app were being funded by the US government, would that make people trust it more or less? It also criticizes Western surveillance framing as delivering “1984” and says the point of end-to-end encryption is undermined if a keyboard logs everything a person does. The transcript concludes with a call to secure devices—“do your phone and your laptop”—so the person can continue using Bitcoin “before they start verifying your age for that.”

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states their interactions with the NSA are very limited, adding the NSA is not an agency that works with you directly. Speaker 0 mentions reading in newspapers about their phone being penetrated with Pegasus, but has no idea if it's true, stating this is the only source of information they have about themselves personally. Speaker 0 assumes by default that the devices they use are compromised and has very limited faith in platforms developed in the US from a security standpoint and privacy standpoint.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asks if there's any reason to allow law enforcement access to Telegram due to unacceptable activity. Speaker 1 responds that encryption cannot be secure for some people only. Speaker 0 claims ISIS uses Telegram to spread propaganda. Speaker 1 says it's impossible to stop them, and ISIS could create their own messaging solution quickly. Speaker 0 notes Durov has been purging ISIS propaganda but would refuse to unlock private messages, citing encryption. Speaker 0 asks if Speaker 1's hands are tied. Speaker 1 confirms they cannot unlock messages. Speaker 0 frames this as a debate between shutting down terrorism and preserving privacy. Speaker 1 states they are personally for privacy, arguing that making an exception for law enforcement endangers the private communications of millions because encryption is either secure or not.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes smart meters as more than just electricity meters, asserting they function as personal surveillance devices. They claim smart meters sense when devices are turned on or off, measure watt usage (even for small devices like an electric toothbrush), and transmit that data wirelessly through neighbors’ meters to the power company. The data allegedly records electric consumption every minute, stored forever on computers the public cannot access, revealing when someone is home, asleep, on vacation, hosting visitors, using lamps or tools, running a business from home, or bootlegging energy off the grid. The speaker asserts this creates a vivid profile of private living patterns and indicates at-home presence on the night of a murder. The speaker contends this is not electrical metering but personal surveillance—a warrantless search daily. They claim personal life information travels from the meter to the power company, to the government, police, and insurance companies, and to anyone who partners with the power company to access it. The speaker further asserts that even without a direct data-sharing agreement, information can be intercepted via the wireless signal from the meter, because smart meters are radio transmitters. They identify a one-watt radio station licensed by the FCC as the transmitter sending all electrical life details to a data center. Examples are given of authorities in Ohio, Texas, and British Columbia using smart meter data to pinpoint marijuana grow houses, enforce business licenses, and punish private home activities, implying surveillance beyond what residents accept. The claim is made that the power company can sell personal life data to anyone, and that unusual power usage patterns can be used as probable cause to raid a home for growing marijuana or running a computer server without a license. The speaker describes this level of surveillance as “about as big brother as it gets,” with utility workers going door-to-door to install meters. They express a personal opinion that smart meters should be removed from homes, arguing that power companies cannot claim the right to install surveillance devices on residences. They equate smart meters with wiretapping and note wiretapping is illegal in all U.S. states and federal territories. The speaker asserts that allowing a smart meter is tantamount to walking around with a constant webcam on one’s head and accuses the industry of relying on implied consent—the idea that permission is granted if the utility can change the meter, even if residents don’t understand the scope of what’s happening. As a practical step, the speaker advises telling utilities not to change the meter, noting that older meters were billed successfully. They claim to have sent a certified letter denying installation of a smart meter and mention a copy of their letter is available in the video’s description for viewers to adapt. They state post office certified mail is used to obtain a receipt. The speaker concludes that if the meters are installed on every house in America, it would cease to be America.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee states that encrypted systems like ProtonMail and Signal offer no privacy because smartphones are surveillance devices. Malware can be easily planted via websites like Pornhub, watching inputs before encryption and reading outputs after encryption. Encryption is old technology marketed as safe but is now worthless. McAfee uses Gmail because Google requires a subpoena to release information and their lawyers have 30 days to review it, which is enough time for him to change his email. He changes his email every 15 days. He believes people are being sold a false sense of security with encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee states that encrypted systems like ProtonMail and Signal do not provide privacy. Encryption was designed to prevent man-in-the-middle attacks, which are no longer relevant because smartphones are surveillance devices. Malware can be easily planted on your device through websites like Pornhub, allowing monitoring of inputs before encryption and outputs after encryption. McAfee claims encryption is worthless and outdated technology marketed as a safe system. He uses Gmail because Google requires a subpoena to release information and their lawyers have 30 days to review it, which is enough time for him. He changes his email every 15 days. He believes people have no privacy and are being sold a false sense of security with encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
The UK is attempting to demand that everyone download spyware that checks messages against a database of permissible content, setting a dangerous precedent for authoritarian regimes. Encryption either protects everyone, or it allows access to malicious actors, including governments and hackers. While child abuse is concerning, there are existing law enforcement tools and underfunded child welfare services that should be prioritized. It's important to ask how platforms enforce their terms of service against illegal use, but we are not an enforcement agency. We are a technology platform working to provide private communication. We need to check large tech companies on changing the norms for human communication to be completely surveilled. We're trying to keep the default of privacy that has existed for hundreds of thousands of years.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that facial recognition will be used to unlock your digital identity, which will be a tool of control for upcoming agendas. Speaker 1 notes that elements of this control are already with us, citing Alexa as an example. Speaker 0 contends you are never alone in your home, because all devices and smart appliances are connected on a wireless network, many with cameras and microphones, monitoring everything all the time. Smart appliances communicate with the smart meter, sending real-time usage data. If a Ring camera is in the home, a mesh network is formed and all devices are being tracked within the home, including location and usage, with data going to Amazon’s servers. Speaker 1 adds that when you leave your home, modern vehicles are connected to the Internet and tracked continually. On the streets, smart LED poles and smart LED lights form a wireless network that track your vehicle. They claim data is collected 24/7 continuously on every human being within these wireless networks. Speaker 0 asserts this is not good for health due to electromagnetic radiation. Speaker 0 further states that in the long term the plan is to lock up humanity in smart cities, a super set of a fifteen minute city. Speaker 1 says they’ve sold smart cities to state and local governments and countries as about sustainability and the city’s good, but claims the language from the UN and WEF and their white papers is inverted. The monitoring is described as about limiting mobility and no car ownership. Surveillance via LED grid is described as why smart lighting is death. Water management is about water rationing; noise pollution about speed surveillance; traffic monitoring about limiting mobility; energy conservation about rationing heat, electricity, and gasoline. Speaker 0 explains geofencing as an invisible fence around you where you cannot go beyond a certain point, related to face recognition, digital identity, and access control. Speaker 1 mentions that smart contracts can enable Softbrick to turn off your digital currency beyond a certain point from your house. The world is described as turned into a digital panopticon. Speaker 0 concludes that this means you can be monitored, analyzed, managed, and monetized.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 expresses intense anger toward the Trump administration, saying: "I give a fuck about any fucking person in the Trump administration being upset with giving them oh, how dare you?" They claim others have "no fucking idea to list the bodies that we have" and suggest that if they were serial killers, it would be like "Mal or something." They urge everyone to become emotionally detached from their online personas and to create burner accounts to "unmask all of these traders" and to impose the "threat of IRL consequences" because people use anonymity to act behind privilege. They state that Twitter should no longer be a safe place for these individuals and propose that someone should interrupt leadership by saying, "yeah, boss. I I can't do this anymore." They argue the government should consider the impact on families: "My kids and my address just fucking wound up on this platform. How the fuck did they find out who I am?" They insist that every time those people log in, they need to have "second fucking thoughts" and be terrified. They assert that "Security clearances don't mean a goddamn thing to me" and declare, "I guarantee you I'm 10 times smarter than you and your fucking best bet." Speaker 1 interjects: "Back the up, juicy." Speaker 2 responds with distress: "I'm not a Spit on me again." They request to be kept away from the person and say, "This guy's intimidating me. He's pushing me." They ask, "Where's your vehicle?" and answer, "It's in the garage." They further ask, "Hey. What is your name? Are you working for the hotel?" and Speaker 0 says, "I'm working. Tell me. Are" before the scene cuts off. Overall, the excerpt presents a heated monologue urging aggressive online accountability and real-world consequences for certain individuals operating under anonymity, followed by interruptions that reveal a tense confrontation involving intimidation, personal threat concerns, and questions about a vehicle and employment.

The Joe Rogan Experience

Joe Rogan Experience #1572 - Moxie Marlinspike
Guests: Moxie Marlinspike
reSee.it Podcast Summary
Moxie Marlinspike discusses the origins and purpose of Signal, an encrypted messaging app aimed at combating mass surveillance and promoting private communication. He explains that traditional messaging systems, like SMS and iMessage, are vulnerable to interception and data collection, while Signal ensures that only the sender and recipient can access messages. Marlinspike emphasizes the importance of private communication for societal change, citing historical movements that began as socially unacceptable ideas. The conversation shifts to the implications of technology and social media, with Marlinspike expressing concerns about how current business models prioritize profit over user privacy and security. He argues that bad business models lead to detrimental technology outcomes, and he advocates for a nonprofit approach, as seen with Signal, which focuses on user privacy without the pressure of profit. Marlinspike reflects on the challenges of social media platforms, noting that they often amplify harmful content due to their algorithms designed to maximize engagement. He suggests that the focus should be on creating technology that serves the public good rather than corporate interests. The discussion touches on the complexities of censorship, the role of government in regulating technology, and the potential for a balkanized internet where different countries create isolated ecosystems. The conversation also explores the ethical dilemmas surrounding surveillance and the use of technology in warfare, referencing incidents like Stuxnet and the assassination of Iranian scientists. Marlinspike highlights the need for transparency and accountability in tech companies and the importance of user agency in shaping the future of technology. Finally, Marlinspike shares his fascination with the history of Soviet space dogs and their connection to American culture, expressing a desire to track down the descendants of these dogs. He concludes by inviting anyone with information about the dogs or their owners to reach out to him.

Tucker Carlson

How to Stop the Government From Spying on You, Explained by a Digital Privacy Expert
reSee.it Podcast Summary
Yannick Schrade discusses privacy as a fundamental aspect of freedom, describing encryption as a built‑in asymmetry in the universe that keeps secrets safe even under immense coercion. The conversation centers on making computations private as well as data, proposing architectures that allow multiple parties to compute over encrypted inputs without revealing them. Yannick explains his background, his European experience with data protection laws, and the founding of Archium to push private, scalable computing. He contrasts end‑to‑end encryption with the broader threat of device and platform compromises, emphasizing that the security of a message is limited by the security of the end devices and the supply chain. The talk then covers practical privacy measures, such as open‑source tools like Signal, hardware trust models, and the idea of distributing trust across many devices to avoid single points of failure. They examine the limitations of current consumer devices, the risk of backdoors, and the need for legal and technical frameworks to prevent blanket surveillance, including objections to backdoors and “client‑side scanning” proposals in the EU and effectively mandatory surveillance regimes. The discussion expands to the tension between private cryptography and state power, noting Snowden’s revelations about backdoored standards and the global cryptography ecosystem where cryptographers and independent researchers help identify weaknesses, even when governments push standardization. They explore the consequences of surveillance for finance, money flows, and the blockchain ecosystem, explaining pseudonymity in Bitcoin and the privacy shortcomings of public ledgers, as well as the potential for private, verifiable computations that preserve data ownership while enabling secure healthcare analytics and national security applications. The hosts and Yannick debate the inevitability of privacy‑preserving technology, the real risks of centralized control, and the possibility of a more decentralized, verifiable, privacy‑enhanced future. The conversation closes with reflections on who should own and regulate such technologies, the role of investors in privacy‑centric ventures, and a forward-looking optimism about a utopian direction if privacy tech can clearly demonstrate superior utility and safety.

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.
View Full Interactive Feed