TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2013, mobile devices are now the primary focus, with smartphones constantly emitting signals to cell towers even when idle. These signals contain unique identifiers like IMEI and IMSI, allowing tracking of a user's movements. Companies store this data for unknown purposes, leading to privacy concerns and mass surveillance through bulk collection.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: What about the public attitude held by millions of everyday Americans? All I've got on a computer is pictures of my family, CCTV cameras that are prevalent in a ton of American cities and overseas capitals. Those cameras are your friend if you're innocent and have nothing to hide. Speaker 1: Well, I'd say that's very much what the average Chinese citizen believed or perhaps even still to this day believes. But we see how these same technologies are being applied to create what they call the social credit system. If any of these family photos, if any of your activities online, if your purchases, if your associations, if your friends are in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms, and those algorithms are fueled by precisely the innocent data that our devices are creating all of the time constantly, invisibly, quietly right now. Our devices are casting all of these records that we do not see being created, that in aggregate seem very innocent. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information, what they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, they are stealing our power.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.

Video Saved From X

reSee.it Video Transcript AI Summary
Apple has clarified that the iPhone is not taking pictures every 5 seconds, but rather scanning our faces using infrared technology to optimize face ID and emoji features. A video shared by a follower shows that baby monitors also emit infrared lights. It is clear that this scanning is happening, but the question is whether Apple has other motives behind it. To turn off this feature, go to settings, face ID, and passcode, and toggle the attention aware features. The speaker wonders where the data collected for analysis is being stored and what others think about it.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
T-Mobile is reportedly collecting extensive customer data through its partnership with OpenAI. CEO Mike Sievert recently discussed this collaboration in a Fireside Chat with Sam Altman, promoting the benefits of AI. However, customers should consider whether they want T-Mobile to profile their work performance, economic status, health, and personal preferences. Many may not trust T-Mobile to share their data with outside researchers or to enhance ad relevance using app data. Despite potential concerns, T-Mobile has enabled these data collection settings by default, requiring customers to manually disable them if they wish. Additionally, there are connections between Sam Altman and the World Economic Forum, which is often viewed with skepticism.

Video Saved From X

reSee.it Video Transcript AI Summary
Snapchat exists to cater to the desires of children, providing them with a platform where photos vanish after 24 hours. In the past, to reach kids, one had to appeal to their parents who controlled the media they consumed. However, with direct access to technology, kids now have a direct line of communication with tech companies. This creates a hidden dialogue between these companies and children, unbeknownst to their parents.

Video Saved From X

reSee.it Video Transcript AI Summary
Cell phones are constantly sending data back to companies, even in the middle of the night. This information is used to create profiles on users and can be sold to other companies. Big tech companies like Facebook and Google are major offenders in this data collection. This poses a threat to privacy and security, as the data can be used for manipulation and control. It is crucial for Congress, state attorney generals, and the public to be educated about this issue and take action to regulate and prevent this invasion of privacy. Visit doctorjonesnaturals.com to support the broadcast and access quality products.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that 99% of phones worldwide are being tracked by governments through push notifications. The US government allegedly has a gag order on the two largest phone companies to keep this information hidden. Senator Ron Wyden states that foreign governments have reached out to Google and Apple for push notification data. These notifications, which appear on the screen, are sent from the app to a cloud server and then to the phone. The governments are requesting this data from Google and Apple, potentially including text information, metadata, and location details. The speaker suggests that the lack of coverage on this issue may be due to the influence of advertising and algorithms controlled by Apple and Google.

Video Saved From X

reSee.it Video Transcript AI Summary
A study from MIT's Media Lab found that using AI weakens brain connectivity and reduces memory of the work produced. Participants using large language models struggled to recall what they wrote, unlike those using search engines or their own brains. Mark Zuckerberg envisions AI friends, shifting human interaction into the computing realm. Studies show excessive screen use in children correlates with socio-emotional problems, creating a negative feedback loop. The smartphone addiction inventory was created in 2014 due to rising addiction, with research indicating that phone overuse negatively alters the brain. The mere presence of a smartphone reduces cognitive capacity. However, the brain has neuroplasticity and can recover. Pavel Durov, creator of Telegram, rarely uses a phone due to distraction, privacy concerns, and a preference for focused work on a laptop. He avoids consuming short-form content on phones.

Video Saved From X

reSee.it Video Transcript AI Summary
Hakim Anwar, CEO and founder of Above Phone, joins Clayton to discuss pervasive surveillance and how to protect personal privacy in 2025–2026. The conversation covers why traditional devices and services—especially iPhones, Samsung/Android phones, and their app ecosystems—are highly surveilled, the role of Amazon Web Services in monitoring traffic, and how messaging apps on these devices are tracked. They frame the problem as a loss of personal privacy and a move toward centralized infrastructure that can be controlled or cut off by large tech platforms. Hakim explains the origin of Above Phone. He started as a software engineer, was already aware of surveillance concerns, and became involved in freedom-based social networks. He pivoted toward open-source technology (Linux, degoogled phones, open-source software) and, five years ago, helped establish Above Phone to create usable privacy-centric devices that are actually functional for daily life. The goal is to be more usable and more private than big tech. The product philosophy emphasizes usable privacy. Above Phone builds on open-source operating systems like GrapheneOS, modeling them off Android but severing ties with Google and other big tech. Hakim notes that typical Samsung/Google Android devices have “god mode” access by Google (and to some extent Samsung), and emphasizes that Above Phone devices are designed to have zero connections to big tech by default, while still enabling users to run necessary apps. Users can choose to install Google services if needed, but in a limited, privacy-conscious way—these services act like normal apps on the device rather than the centralized, all-encompassing control found on stock devices. The phones can be used with existing cell service, and data transfer from iPhone or Android is supported, with live, in-person setup assistance. Setup and operation details: - You can switch to the Above Phone by moving your number with the SIM card (five-minute process), or use the Above Phone in parallel while migrating. - The Above Phone supports both physical SIMs and eSIMs; the data SIM service is eSIM-based. - A private, in-person support team helps with data transfer and setup. - The device can run a sandboxed second profile for Google services, isolating them from personal data. This sandbox can hold essential apps (e.g., WhatsApp) while the primary profile remains private. If needed, Google services can be used in a fully isolated manner, or work apps can be run entirely without Google involvement. Open-source equivalents are provided for many common apps (navigation, messaging, etc.). Privacy mechanics and surveillance: - Hakim explains that big tech devices continually “phone home,” with independent studies showing frequent data transmission to Google and Apple. Enhanced visual search on iPhone, enabled by default, scans photos for landmarks and can link to private indexes, illustrating how centralized platforms can harvest data even without explicit user consent. - Above Phone disconnects from Google’s update stream and ships with zero Google services by default; updates come from open-source developers, not from Google/Apple. Users can still opt to install Google services, but these are constrained and do not have the same “god mode” permissions as on stock devices. - The device supports a private, end-to-end encrypted messaging protocol based on XMPP (Jabber), which is decentralized and can run on a self-hosted or community-driven network. WhatsApp, he notes, is still built on XMPP. The Above Book Linux laptop is highlighted as a privacy-oriented alternative to mainstream Windows/Mac ecosystems. Linux is presented as cooperative, transparent, and less profit-driven. The Above Book ships with an easy-to-use Linux variant designed to avoid terminal use, includes a privacy-focused web browser (Ungoogled Chromium), and offers open-source software replacements (office apps, photo editing, etc.) that store data locally. The laptop supports local AI with Mike Adams’ Brighteon AI integration via LM Studio, enabling private, offline AI capabilities on the device. The company positions Linux and Above Book as enabling local work, with offline AI and offline maps via OpenStreetMap-like tooling. Hakim closes with a forward-looking stance on digital ID and the “surveillance grid” being advanced through regulatory acts into 2027–2030. He frames the investment in Above Phone and Above Book as a preparation for a world where privacy must be actively preserved, and encourages viewers to explore abovephone.com/redacted and abovephone.com for more information and products. David and Clayton engage on skepticism, marketing, and the broader implications of privacy-centric technologies, reinforcing the idea that the goal is practical privacy and education rather than ideology.

Video Saved From X

reSee.it Video Transcript AI Summary
- "This is the Apple intelligence report." - "It exports everything that you do, including messages, every fifteen minutes by default." - "While you're at it, turn off everything for Apple advertising and analytics Now scroll to the top of that section and turn off allow apps to track." - "Under Apple intelligence and Siri, scroll all the way to the bottom." - "And if I were you, I would turn off Apple intelligence for now." - "If you haven't seen all the lawsuits and what's going on, it just doesn't seem safe, and you don't wanna be surveilled under any pretense." - "In the photos app, scroll all the way down to the bottom where you will see enhanced visual search." - "This is basically taking a sketch, an AI, duplication of every single one of your photos, to analyze them."

Video Saved From X

reSee.it Video Transcript AI Summary
Do you want T Mobile to track your work performance, financial situation, health, personal preferences, and movements? Do you trust them to share your data with researchers or to personalize ads using your app data? Would you like to help T Mobile improve their products by sharing your data? Many of you likely answered no to these questions. However, T Mobile has automatically enabled these settings on all accounts, and you must manually disable them if you do not wish to participate.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
Today we'll discuss the Apple AirPod patent, which reveals the data collected by the AirPods while in use. The question arises: where does this information go? Additionally, Apple phones have a fitness tracker that monitors steps, body motion, brainwaves, and more. It is advised to disable this feature. Interestingly, AirPods can be configured to provide health-related data like heart rate, blood pressure, and diet information. The concern is who is collecting this data and if it aligns with the narrative of Elon Musk's chip implantation. It seems the AirPods may be connected to this concept. What are your thoughts?

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked cell phones of visitors to Jeffrey Epstein's island, exposing their data online. Near Intelligence, linked to US defense contractors, meticulously monitored visitors' movements over 3 years. The data revealed locations in the US and other countries. Near Intelligence sources data from advertising exchanges, selling it for targeted ads and possibly to the military. This highlights the potential for mass surveillance through ad tech. While smartphone users can be tracked, steps like using trusted apps, disabling location services, and using VPNs can help protect privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
Stanford researchers completed what is described as the largest randomized controlled experiment on social media and emotional health in history. They report that paying people to get off Instagram and Facebook for one month measurably increased happiness and decreased anxiety and depression. The speaker also notes that phones now provide twenty four seven access to ChatGPT and other AI chatbots. There is a growing trend of people turning to chatbots for life advice. The remarks underscore the evolving relationship between technology use and well-being, suggesting shifts in how individuals seek guidance in the digital age. The speaker frames these observations as important context for future discussions.

The Joe Rogan Experience

Joe Rogan Experience #1795 - Antonio Garcia Martinez
Guests: Antonio Garcia Martinez
reSee.it Podcast Summary
Antonio Garcia Martinez discusses his recent trip to Ukraine and Poland, describing the refugee crisis and the unified European response. He notes the surprising scale of displacement, with approximately 10 million Ukrainians displaced, mostly women and children. He highlights the efforts of volunteers and NGOs at the Polish border, contrasting it with the all-consuming war effort within Ukraine, where society is focused on resisting the Russian invasion. Martinez criticizes the American media's focus on domestic political issues when covering the conflict, arguing that it misses the Ukrainians' strong sense of nationalism and commitment to resisting Russian occupation. He believes Putin underestimated the Ukrainian resolve. He also touches on the potential for a stalemate and the risk of escalation, including the use of chemical or nuclear weapons. The conversation shifts to American domestic politics, with Rogan expressing concern about the current administration and a potential shift in strategy. Martinez discusses the "new right" and their potential sympathies for Putin's Russia, criticizing their anti-woke stance and perceived traditionalist values. He argues that both the left and right in the US often distort information to fit their narratives, leading to tribalism and a disconnect from reality. Rogan and Martinez discuss Sebastian Junger's book "Tribe" and the heightened sense of existence in conflict zones. Martinez reflects on his experience in Ukraine and how it has changed his perspective, making him almost miss the intensity of the situation. The conversation moves to tech, with Martinez discussing his book "Chaos Monkeys" and his experiences at Facebook. He explains the evolution of Facebook ads from "crappy to creepy" and the role of data in targeted advertising. They debate the reality of microphone-based advertising, with Martinez expressing skepticism but acknowledging the possibility. He explains how "lookalike audiences" work. They discuss Apple's App Tracking Transparency (ATT) and its impact on Facebook's ad revenue. Martinez explains that it limits Facebook's ability to track users at a granular level, affecting the effectiveness of targeted advertising. He also touches on Apple's plans for on-device data processing and the controversy surrounding its child safety initiatives. The conversation shifts to the topic of censorship and free speech on social media platforms. Martinez expresses concern about the power of social media companies to dictate discourse and the potential for abuse. He advocates for a more decentralized approach, such as Web3, where users have more control over their data and content. Rogan and Martinez discuss the challenges of running large tech companies and the distribution of wealth within them. Martinez describes the "cult-like" atmosphere at Facebook and the vast disparities in wealth between early employees and later hires. Martinez details his experience of being fired from Apple after a Slack mob objected to his book, "Chaos Monkeys." He criticizes Apple's decision to cave to the mob and highlights the importance of moral leadership in such situations. Martinez shares his current projects, including his Substack, a podcast, and his work with a DC think tank. He and Rogan discuss the challenges of creating an alternative to Twitter and the potential for Web3 to address censorship concerns. The conversation concludes with Martinez reiterating the importance of free speech and the need for a more decentralized internet.

The Megyn Kelly Show

Left Falsely Blames Right For House Fire & Data Privacy Issues, w/ Lowry & Cooke, Erik Prince & Weil
Guests: Lowry, Cooke, Erik Prince, Weil
reSee.it Podcast Summary
An explosive thread of political blame unfurls after a South Carolina circuit judge’s home catches fire. Diane Goodstein had recently blocked the release of voter files to the DOJ amid a Trump-backed effort to curb non-citizen registration. The blaze on a water-framed property injured her husband, Arie, and possibly others; he was airlifted with multiple fractures. Authorities later said there was no evidence the fire was intentionally set. The episode becomes the centerpiece as Dan Goldman accuses Trump-era figures of doxxing judges and stoking violence, a claim debated by the panel. Media and political reactions unfold in real time. Goldman’s tweet linking the fire to 'mega' supporters is challenged by Rich Lowry and Charlie Cook, who warn against rushing to conclusions. Nerra Tanden retweets commentary tying previous criticism of officials to the blaze, while outlets such as People and Newsweek frame the incident as a Trump-opposition story. The hosts argue there’s a pattern of one-sided coverage and call for restraint, noting killings linked to political violence on both sides while criticizing how left-leaning voices frame events for political gain. Attention shifts to Virginia, where Jay Jones’s text exchanges reveal a willingness that opponents die for policy ends. The messages include references to shooting and 'two bullets in the brain,' followed by denials that minimize the episode, while a local investigation corroborates past controversial remarks about policing. The panel stresses such a worldview would be disqualifying for a top law officer, and notes that Democratic leaders have not uniformly called for his resignation, contrasting reaction to similar episodes in other races. The discussion highlights concerns about accountability and political violence language. On privacy and power, the interview with Eric Prince and Joe While centers on surveillance capitalism and the limits of data collection. They describe how apps continually transmit location and behavior to data harvesters, arguing the current phone ecosystem leaves citizens exposed to advertising networks and potential government access. Their privacy-focused Ups phone is presented as an alternative with encryption, a data-only SIM, and a hard-wipe function. The discussion emphasizes that while such devices reduce exposure, total privacy remains complicated by telecom infrastructure and legal frameworks.

Mind Pump Show

Why It’s So Hard to Stay Fit (and What to Do About It) | Mind Pump 2713
reSee.it Podcast Summary
The podcast discusses the alarming prevalence of poor health, obesity, and immobility in modern societies, attributing it to technological advancements that reduce physical activity and the widespread availability of hyper-palatable, inexpensive processed foods. Innovations like food delivery and online shopping, coupled with city designs that discourage walking, have dramatically decreased daily movement. This environment fosters a culture where convenience and palatability are prioritized over nutritional value, making healthy living an uphill battle, especially for those raised in this context. The hosts highlight that being fit and healthy requires conscious effort and a lifestyle that deviates from the societal norm, often necessitating changes in social circles and personal relationships to maintain discipline. The conversation also touches on declining physical strength, particularly in young men, contrasting it with a slight increase in young women's grip strength, possibly due to increased participation in sports. The hosts emphasize that achieving and maintaining fitness is a continuous lifestyle change, not a temporary goal, and requires a long-term perspective and enjoyment of the process. They advocate for delayed gratification, a trait they believe is becoming counter-cultural, and discuss how they try to instill this in their children through practical parenting strategies, such as requiring tasks before granting requests. A significant portion of the discussion focuses on the impact of technology on cognitive function and well-being. The hosts express concern over excessive smartphone use, the decline of daydreaming, and the potential for brain atrophy when individuals outsource thinking tasks (like navigation or remembering phone numbers) to technology. They cite recent California regulations on AI chatbots for children, prompted by incidents of chatbots influencing vulnerable users towards self-harm or engaging in inappropriate conversations, and the rise of deepfakes. The partnership between ChatGPT and Shopify is also mentioned as an example of AI further facilitating consumerism. The podcast then shifts to practical fitness advice, including tips for ensuring good form without mirrors or trainers (suggesting filming oneself or investing in a body-length mirror) and what to look for when choosing a personal trainer (likability, thorough assessment, feeling better post-workout, and experience over education). They also recommend specific rotational exercises like kettlebell presses with rotation, windmills, and lunges with trunk twists for those engaged in bodybuilder-style training, emphasizing the importance of functional movement and addressing often-neglected muscles like the QL. Finally, the hosts critique the modern fitness industry's emphasis on social media influencing, arguing that it distorts the true path to a successful fitness career. They assert that building a strong foundation through in-person client interaction, gaining practical experience, and generating referrals is far more effective and leads to better coaching skills than solely focusing on online presence. They conclude by discussing the satiety effects of protein, recommending a high-protein diet as a simple yet powerful strategy for managing hunger and promoting healthier eating habits.

Coldfusion

Apple vs Facebook - The Great Privacy Fight
reSee.it Podcast Summary
In the early days of the internet, possibilities seemed endless, but corporate monopolies now exploit user data for profit. Apple has introduced features in iOS 14 and 14.5 that enhance user privacy by allowing users to see what data apps collect and to opt out of tracking. This directly challenges Facebook's business model, which relies on targeted advertising. Zuckerberg has expressed concern over potential impacts on small businesses and profitability. Apple's moves could set trends in user privacy, but the long-term effects on the internet remain uncertain.
View Full Interactive Feed