TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
23andMe is mentioned, prompting a warning against using their services due to data selling practices. It is claimed that 23andMe sells user data to other entities, including Russia. Nathaniel Johnson, a policy advisor for the U.S. Department of the Treasury, is introduced. The claim is made that 23andMe's contract contains a clause allowing them to share information with shareholders, some of whom are pharmaceutical companies based in other countries. These foreign pharmaceutical companies are allegedly owned by entities such as the Ministry of Defense in Russia or are based in China.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked visitors to Jeffrey Epstein's island using cell phone data, revealing their movements from various locations to the island. The data showed visitors' origins in multiple US cities and other countries. Near Intelligence sources its data from advertising exchanges, which can be used for mass surveillance. While this data raises privacy concerns, individuals can protect themselves by using trusted apps, turning off location services, using ad blockers, or employing VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Authentix, an Israeli verification company with ties to controversial Israeli cyber firms, has a history of military surveillance. Its parent company, ICTS International, has been linked to security lapses at airports, including 9/11. Authentix uses facial recognition technology developed by Unit 8200 for espionage. Concerns arise over data security and ethical practices of these companies.

Video Saved From X

reSee.it Video Transcript AI Summary
An Israeli intelligence-founded company, First Health Infrastructure, partnered with CISA to protect critical infrastructure in the US, including hospitals, dams, water systems, and nuclear reactors. This foreign entity's access to vital American systems raises concerns about national security and the extent of Israeli influence.

Video Saved From X

reSee.it Video Transcript AI Summary
The digital ID provides government the ability to track, analyze, predict, and control a person's private activities. It is the antithesis of individual freedom and will not require an implantable chip as many have feared for decades. Evidence clearly shows that biometrics such as fingerprints and facial scans will do the job much more efficiently. And the aftermath of the COVID lockdown shows us how it will be deployed. During the COVID era, governments said that masks were recommended, while private companies said no mask, no entry. And the public overwhelmingly complied, but not with an overreaching government. They complied with the grocery store to buy food, the airlines to travel, and their own banks to access money. Looking back, it is quite clear. The COVID lockdowns provided an opportunity to beta test digital ID compliance through private company mandates and helps normalize the use of QR scans and facial pics for entry into private businesses. And it proved to be a success. Now we are seeing the same techniques being used with the rollout of the digital ID. The gold standard for biometric regulation was written in 2008 as the Illinois Biometric Information Privacy Act and is being replicated all over The United States. It mandates that private entities obtain written consent before collecting biometrics, disclose their policies, and destroy data after a set period. And most importantly, it exempts government entities entirely, allowing state and federal government to collect and utilize biometric data while passing the liability to private corporations. These laws have been met with over a thousand class action lawsuits since 2015, which resulted in the standardization of consent prompts in apps and services, such as a firm's biometric consent, which now states by clicking accept or proceeding, you consent to collection of biometric data. Click a button and you're in the new system. If government were to mandate the digital ID, it would predictably ignite mass protest. We can see this happening today in The UK. The United States will avoid this by utilizing the private sector in what appears to be voluntary action. The FBI's Clearview AI has harvested over 30,000,000,000 faces from social media. And because Clearview is technically a private company, the FBI has access to all this without the need for asking. In over 43 states, the Department of Motor Vehicles have sold driver's license photos to private firms who resold to local police for facial recognition. The government doesn't need to mandate biometric ID, which would most likely be considered a violation of American rights. And so it outsources the mandate to private companies who are legally required to get consent, while the government is free to collect and utilize this data under legal immunity. Just like the COVID era, you will be free to give consent. But if you choose not to, you will have to leave the reservation and find a way to fend for yourself. Greg Reiss reporting. The Reiss report is now fully funded by my Substack subscribers. Subscribe today and support my work at gregreese.substack.com.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 says essential digital infrastructure must be secure and sovereign: "one of the most important things is not to put the digital infrastructure in place and make sure it is secure. And often, it needs to be sovereign." Data centers must be in our countries due to privacy: "Data centers, because of the privacy requirements around the data, need to be in our countries or they're not terribly useful. They need to be in our countries, but they also need to be secure." They foresee a passwordless future: "This is the last year you will ever log on to an Oracle system with a password." "By the middle of this year, I'm quite certain you are Tony Blair." Security will rely on biometrics: "The security system, we have biometric logins. The computer recognizes you." "There's no reason to enter a password. In fact, passwords are too easily stolen." They warn about ransomware: "The data centers and data is being taken hostage all over the world." "The ransomware business is a very, very good business." And a preemptive approach: "not after the data is stolen, but before the data is stolen. We can make sure that we're using the latest security technology, and it is going to be biometrics assisted by AI to make sure that you are, in fact, Tony Blair, and I'm sure you are."

Video Saved From X

reSee.it Video Transcript AI Summary
The UAE is positioned at the forefront of using AI in government. The conversation highlights the importance of building basic digital infrastructure—cloud services, data centers, and digital identity—as a foundation for an effective digital system. Speaker 1 emphasizes that securing this digital infrastructure is crucial. He predicts a passwordless future, stating that this could be the last year you log on to an Oracle system with a password. He describes biometric logins where the computer recognizes the user, can verify identity through voice, and may prompt for a fingerprint on the return key. He argues there is no reason to enter a password because passwords are too easily stolen. The approach involves using the latest security technology, with biometrics assisted by AI to ensure authentication. He concludes that this will verify identity, even asserting that the system can make sure that the user is, in fact, Tony Blair.

Video Saved From X

reSee.it Video Transcript AI Summary
TikTok poses a significant threat as it can access private data on your phone, including keystrokes. This means sensitive information like usernames and passwords for banking can be obtained. Unlike other social media platforms, TikTok goes beyond collecting data for advertising purposes. The Chinese Communist Party (CCP) has ulterior motives, aiming to harm the American people. In the event of a conflict, the data collected from American consumers will be used against them and their communities.

Video Saved From X

reSee.it Video Transcript AI Summary
A speaker discusses India's nationwide digital ID system, Aadhaar, and chip away at the assurances given by officials who praised its rollout. The speaker notes that about a week or so earlier, Kirstjarma met with Prime Minister Modi and top officials in India to extol the benefits of digital ID, highlighting Aadhaar and claiming a fabulous nationwide rollout. The speaker then presents a troubling counterpoint: cybercriminals are claiming they have stolen the entire Aadhaar database—describing it as the database of 815,000,000 people with details such as names, addresses, identity confirmations, bank details, and more. According to these claims, the criminals are currently selling the entire database for $80,000 at a time. The speaker acknowledges uncertainty about verification but states that this story is circulating and raises questions about security. The core concern is about how secure the system will be when every facet of a person’s life could be held in one place: passport, driving license, NHS records, criminal records, bank details, every transaction, gas and electricity bills, travel records, flight records, car tax, council tax, and any arrest or hospital appointment information. The speaker asks whether we can trust the people running these systems to keep data secure, given the frequency of data breaches and data thefts, including several large incidents in the past year in the country. The concern is framed as a general warning about the viability of a centralized digital ID system that aggregates extensive personal information, and how well it would function in practice if it were compromised. A specific anecdotal point is raised: India’s example is cited as a real-world instance of the system’s security challenges, with the speaker encouraging listeners to look up the incident. The speaker notes that Star Lord was out in India holding up India as an example of how well the system could work, referencing a perceived contrast between the praise and the security breach claim. The segment closes with a skeptical modulo—“Right, Kia. We believe you.”—casting doubt on official assurances. In summary, the speaker highlights a purported massive data breach claim against India’s Aadhaar system, questions the security of a centralized digital identity that consolidates extensive personal data, and contrasts official praise with concerns about data vulnerability and trust in those who manage such systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Cell phones are constantly sending data back to companies, even in the middle of the night. This information is used to create profiles on users and can be sold to other companies. Big tech companies like Facebook and Google are major offenders in this data collection. This poses a threat to privacy and security, as the data can be used for manipulation and control. It is crucial for Congress, state attorney generals, and the public to be educated about this issue and take action to regulate and prevent this invasion of privacy. Visit doctorjonesnaturals.com to support the broadcast and access quality products.

Video Saved From X

reSee.it Video Transcript AI Summary
Apple has released a digital ID for identification and US passports. Reports say they will be merging their biometric security with encrypted ID storage and plans to replace physical IDs across airports, apps, and businesses. This is said to be used at over 250 TSA checkpoints across domestic airports for identity verification. The speaker mentions one of the richest men on earth, Larry Ellison, who owns TikTok and Oracle and is a big fan of digital IDs. It seems like one big master plan between all the big tech companies. Microsoft dealing with OpenAI, OpenAI dealing with NVIDIA, NVIDIA dealing with Oracle, xAI dealing with NVIDIA, and OpenAI just did a $38,000,000,000 deal with Amazon for cloud storage. So the question is, what are they really planning? Could it be that they're following in the footsteps of China's Skynet, tied to digital IDs, a social credit score, and an AI surveillance system that they actually wanna put on the moon. Skynet. Why does this sound familiar? That's because it's the same name as the killer artificial intelligence in Terminator, Skynet. I'll say it once and I'll say it again, it's always in the movies. Make sure you guys go to my YouTube, Maverick Approach, I do more breakdowns on this, but let me know what you guys think about all this down below.

Video Saved From X

reSee.it Video Transcript AI Summary
23andMe is mentioned, prompting a warning against using their services due to data selling practices. It is claimed that 23andMe sells user data to other entities, including Russia. Nathaniel Johnson, a policy advisor for the U.S. Department of the Treasury, is introduced. The claim is made that 23andMe's contract includes a clause allowing them to share information with shareholders, some of whom are pharmaceutical companies based in other countries. These foreign pharmaceutical companies are allegedly owned by entities like the Ministry of Defense in Russia or are based in China.

Video Saved From X

reSee.it Video Transcript AI Summary
Palantir is allegedly in partnership with the Netanyahu syndicate and the breakaways. The government pays Palantir massive amounts of money through contracts. A new sole-source ICE contract is on the way to Palantir. Palantir has Treasury, IRS, and Social Security data, and will soon have all ICE data. Trump wants to privatize Freddie and Fannie, but Palantir will underwrite all the packages, giving them all housing data. HHS is organizing all public and private health data, which is assumed to be going to Palantir as well. This data is being managed and privatized into AI. After XAI announced a partnership with Palantir, the government gave Palantir additional contracts. An income verification service suddenly had complete data on 100% of Americans after Doge got Treasury, Social Security, and IRS data. The ICE contract allows tracking immigrants' locations in real-time through Palantir back to ICE. The primary thing going on is building a complete biometric surveillance of the entire population.

Video Saved From X

reSee.it Video Transcript AI Summary
Leaked audio reveals that ByteDance employees in China accessed American user data in 2021 after Project Texas began. This raises concerns because if ByteDance, which is subject to CCP control, can access American user data, they can potentially hand it over to the CCP, regardless of what TikTok claims.

Video Saved From X

reSee.it Video Transcript AI Summary
Be careful when taking selfies as your fingerprints can be extracted from high-quality photos using advanced algorithms. Hackers can misuse your fingerprints to unlock your phone, access sensitive information, or commit cybercrimes like bank fraud. Protect your privacy by avoiding showing your fingertips clearly in photos and using filters to blur sensitive areas. Stay vigilant against emerging threats and be cautious about what you share online to prevent biometric fraud. Check your social media feed for risky images and take proactive steps to safeguard your identity. Stay safe and mindful when posting online. Translated: Be cautious when taking selfies as your fingerprints can be extracted from photos, posing privacy risks. Protect yourself by avoiding showing fingertips clearly and using filters to blur sensitive areas. Stay vigilant against emerging threats to prevent biometric fraud. Check your social media for risky images and take steps to safeguard your identity. Stay safe and mindful online.

Video Saved From X

reSee.it Video Transcript AI Summary
More than 1 billion people lack verifiable IDs, hindering access to services. A digital identity system using blockchain and biometrics offers secure, efficient identity management. Users control data sharing, improving privacy. The system is adaptable and interoperable, enhancing background checks. Critics warn of potential enslavement through mandatory digital IDs. The push for digital IDs is seen as a step towards ultimate control and surveillance. Awareness and resistance are urged to prevent widespread adoption.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
Elon Musk's partner's company, Axis Authentic, will verify blue ticks on social media like Twitter. The company, founded by Israeli intelligence officers, will collect data like passports and selfies. This raises concerns about potential misuse by Israeli intelligence services, posing a threat to users' privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum's recent white paper emphasizes the need for global governance and digital identity verification in the evolving Internet and metaverse. It highlights the urgency for collaborative frameworks to manage the complexities of future technologies like AI, blockchain, and biometrics. The paper warns of potential online harms, such as cyberbullying and privacy violations, and advocates for digital identification to ensure accountability in online interactions. It suggests that biometric sensors will play a crucial role in linking users' online activities to their real-life identities, raising concerns about privacy and control. The document concludes with a disclaimer that its findings do not necessarily reflect the views of the WEF or its members.

Video Saved From X

reSee.it Video Transcript AI Summary
Digital ID: what could possibly go wrong? The transcript recalls Kirstyama’s recent visit to India to meet Modi and top officials, promoting India’s nationwide digital ID system called Aadhaar. It then presents a provocative claim: cyber criminals are reportedly saying they have stolen the entire Aadhaar database—815,000,000 people's details, including names, addresses, identity confirmations, bank details, and more—and are allegedly selling the database for $80,000 at a time. It notes uncertainty about verification but says the story is circulating. The speaker emphasizes concerns about security and the practicality of such a system: if every aspect of a person’s life—passport, driving license, NHS records, criminal record, bank details, all transactions, bills, travel and flight records, vehicle taxes, council taxes, hospital appointments, arrest records, and other personal data—are stored in one place, how safe and secure can it be? The question is raised of whether the people running these systems can be trusted to protect data, given ongoing data breaches and thefts, including several large incidents in the past year within the country. There’s a rhetorical comparison to India’s example, suggesting that this is a test case for the security of a highly centralized digital ID system. The speaker notes that StarMove had previously used India as an example of how well such a system could work, implying skepticism about that portrayal with the closing line, “The ironic thing is that StarMove was just out there holding them up as an example of how well the system could work. Yeah. Right, Kia. We believe you.” Key points: - Aadhaar is India’s nationwide digital ID system. - Alleged theft of 815,000,000 Aadhaar records, with claims of selling the data in chunks for $80,000; verification of this claim is uncertain. - The aggregation of extensive personal data in one system raises concerns about security and trust in the guardians of the data. - Data breaches are frequent, including notable incidents in the past year. - The India example is presented as a cautionary reference, contrasting with prior praise from StarMove.

The Megyn Kelly Show

Dems' "Dark Brandon" Scare Tactics, And AI Facial Recognition Tech, with Jesse Kelly & Kashmir Hill
Guests: Jesse Kelly, Kashmir Hill
reSee.it Podcast Summary
Megyn Kelly opens the show discussing a recent bipartisan effort in New Hampshire, where twelve Democratic lawmakers joined Republicans to pass a bill banning gender-affirming surgeries for minors. She expresses concern over the implications of such surgeries and praises the Democrats who crossed the aisle. The conversation shifts to the political landscape, highlighting Joe Biden's 2024 campaign strategy, which focuses on attacking Donald Trump rather than promoting his own record. Jesse Kelly joins the discussion, emphasizing the effectiveness of this strategy despite his disdain for it. They discuss the challenges Trump faces, including legal issues and the media's portrayal of him, which may hinder his chances in the upcoming election. Kelly expresses skepticism about the optimism surrounding Trump's potential victory, citing the systemic efforts to undermine him. The conversation touches on the left's tactics of using social shame to silence dissent and the dangers of labeling individuals based on race or ideology. The hosts then shift to the recent firing of Claudine Gay from Harvard, discussing the implications of her removal and the reactions from various political factions. They note that while some view it as a victory for the right, others see it as a loss for diversity and representation. The discussion highlights the complexities of race and politics in America, particularly regarding the Democratic Party's reliance on the black vote. Kashmir Hill, a journalist specializing in technology and privacy, joins to discuss her book on Clearview AI, a facial recognition company. Hill explains how the technology works and its implications for privacy, particularly for vulnerable populations like domestic violence victims. She shares her experiences investigating the company, including its secretive nature and the ethical concerns surrounding its use of facial recognition technology. The conversation delves into the potential for misuse of such technology, including its application in law enforcement and the risks of wrongful arrests based on facial recognition matches. Hill emphasizes the need for individuals to be aware of their digital footprint and the importance of privacy protections. They conclude by discussing the broader societal implications of facial recognition technology and the need for vigilance in protecting personal privacy in an increasingly surveilled world.

a16z Podcast

a16z Podcast | Securing Infrastructure and Enterprise Services
Guests: Frederic Kerrest, Brad Peterson, Dominic Shine
reSee.it Podcast Summary
In this a16z podcast episode, Okta CEO Frederic Kerrest, News Corp CIO Dominic Shine, and NASDAQ CIO Brad Peterson discuss securing infrastructure across mobile and IoT. Shine emphasizes the need for journalists to access systems anytime, anywhere, while remaining vigilant against potential cyber threats, especially during politically sensitive times. Peterson highlights the transformative potential of blockchain for exchanges, advocating for a shift towards distributed record-keeping to enhance efficiency and reduce costs. Both executives stress the importance of balancing innovation with security, particularly as organizations expand their mobile capabilities. They acknowledge recent security breaches as wake-up calls, urging collaboration with partners to mitigate risks. The conversation also touches on the evolving landscape of financial services, emphasizing the need for robust security measures and the importance of monitoring vendor security standards. Overall, the discussion underscores the critical intersection of technology, security, and operational efficiency in today's digital landscape.

This Past Weekend

Joe Rogan | This Past Weekend w/ Theo Von #403
Guests: Joe Rogan
reSee.it Podcast Summary
Theo announces the Rat Tour dates: October 12 in Wichita, October 13 in Omaha, and October 14 in Denver. Tickets go on sale Wednesday, August 10 at 10 a.m. local time with the pre-sale code “rat king,” and general sale Friday, August 12 with no code. Tickets are available at theovonne.com/tour, described as trusted links to avoid untrustworthy sites. He also mentions new Be Good to Yourself teas in summertime colors such as banana and salmon at theovonstore.com. Today's guest is Joe Rogan, a linchpin in the mixed martial arts world, UFC commentator, and host of the Joe Rogan Experience. He says his new hour of stand-up is the best comedy he’s done. The conversation moves to his commitment to building a real home for live comedy: he’s in Austin, the Cap City club has closed, and buying a club became a way to shape a space where comedians feel respected and supported; the permits and liquor-license process can be lengthy, but the goal is an amazing environment for comedy and a home for performers. They discuss reception in the city and the realities of launching a venue, including how long permits take and the challenges of running a liquor license and live performance. The talk drifts into offbeat anecdotes about New Orleans horse antics, Bay to Breakers in San Francisco, and other wild diversions, punctuating the relaxed, improvisational vibe of the show. The dialogue shifts to current events and technology. They reference leaked Turkish or American media coverage about TikTok and data privacy, including leaked internal TikTok audio that suggested U.S. user data had been accessed from China, and a report that leaked excerpts discussed invasions of privacy through the app’s terms of service, including microphone access. They note TikTok has an Austin office and discuss the addictive nature of social media, possible regulatory actions, and the broader concerns about data security and national sovereignty. Throughout, Rogan reflects on fame and its impact, emphasizing that rising tides lift all boats and that helping fellow comedians benefits the art form. He notes the competitive landscape in combat sports, contrasting UFC’s established brand with newer, Saudi-financed live golf experiments and One Championship as alternatives for fighters. He also talks about personal balance, pace, and continuing to pursue multiple interests, including stand-up, UFC commentary, and other ventures. The interview closes with Rogan sharing thoughts on regret, failure, and learning from mistakes, drawing on his martial-arts background to emphasize resilience and growth. He thanks Theo for the conversation and signs off.

Unlimited Hangout

Stopping the Surveillance State with Derrick Broze
Guests: Derrick Broze
reSee.it Podcast Summary
The discussion links the ongoing COVID-19 crisis to a broader expansion of the US surveillance state, highlighting biometrics, mass digitalization, and AI as accelerants. The guests outline how facial recognition and related technologies are being deployed by both public agencies and private contractors, expanding the reach of surveillance across everyday life. Clearview AI is described as a private company building a large facial‑recognition database shared with law enforcement. Its CEO cites a 26% increase in police use and a growing roster of clients, with about a quarter of US police departments already using the tech. The company faces lawsuits in Illinois under the Biometric Information Privacy Act, and the broader context includes NYT attention and debates about privacy, consent, and public awareness. Broze argues biometrics extend beyond faces to gait and other traits, and he notes real‑world concerns from a store in Mexico employing camera‑based temperature checks that could also store face prints. The conversation then ties this to Peter Thiel’s network, including Palantir, Oculus founder Palmer Luckey, and Moldbug/Curtis Yarvin, suggesting a pervasive influence on surveillance and security programs. Broze connects Palantir’s post‑Trump expansion with broader neocon and technocratic circles, arguing these networks shape defense, intelligence, and domestic security policies. On border security, the speakers describe Trump’s push for a biometric, “smart” wall comprising facial-recognition cameras, license-plate readers, drones, and even DNA collection. They discuss expanded border‑patrol powers to seize devices and inspect them, the concept of a constitution‑free zone extending inland (roughly 100 miles), and the involvement of foreign contractors like Elbit Systems. Biden’s continuity is anticipated, with biometric expansion continuing. The dialogue shifts to social media data, biometric scraping, and predictive analytics, noting MITRE’s capability to extract fingerprints from images and the growth of Clearview‑style databases. They reference social-credit‑style effects already appearing, including a 32% figure from a Kaspersky report about social media affecting loans or jobs. Broze’s book How to Opt Out of the Technocratic State anchors the Solutions segment, drawing on Konkin’s Agorism and counter-economics. He describes “exit and build” and “hold down the fort” as paths to resilience, plus a warning that apathy is death. The Greater Reset and a forthcoming 14‑part documentary, The Pyramid of Power, are cited as efforts to surface practical solutions—growing food, alternative currencies, digital defensibility, and local organizing via freedom cells. The hosts emphasize tangible steps in a world of pervasive surveillance and expanding biotech infrastructure, urging active, solution‑oriented resistance.
View Full Interactive Feed