reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
This is a message from John McAfee, who is currently in a prison in Barcelona. He explains that he is inside a Faraday cage, which blocks all signals, and has an 8-channel scrambler for extra security. He describes himself as an escaped slave from a system that confines people to a 9 to 5 existence, controlled by the American Industrial Corporate Complex and the government. McAfee urges others to free themselves from this system, emphasizing that life is a beautiful mystery when liberated from control and deception. He asserts that he will continue to speak out and will not be found.

Video Saved From X

reSee.it Video Transcript AI Summary
One of the reasons I really don't like Bitcoin is because Bitcoin has become the currency of choice for espionage around the world. If you're a North Korean trying to recruit an American scientist, you're you're gonna pay them in Bitcoin. Well, if you're a Chinese person trying to report to American intelligence, you're probably also getting paid in Bitcoin.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that using Gmail for email provides privacy, or rather a lack of it, despite people believing in encrypted systems like ProtonMail or encrypted messaging like Signal. He argues that encryption was designed thirty-five years ago to prevent a man-in-the-middle attack between transmission and receipt, but there is no longer a need for such protection because there is no man in the middle anymore. He states that smartphones are the surveillance devices preferred by governments worldwide and that malware installation is easy to accomplish. McAfee claims that visiting Pornhub can result in someone listening to you, because a drive-by of a website can set the download of unauthorized applications as a flag. He asserts that with the first click, malware can be installed, and this malware can both watch inputs before they are encrypted and read outputs after they are encrypted. He concludes that encryption is a worthless piece of shit and old technology marketed as a safe system. He emphasizes that there is no safety and no privacy anymore. He explains his personal choice of Gmail for one reason: Gmail is the last company that requires a government subpoena to provide information, and their lawyers have thirty days to review the subpoena. He says that thirty days is enough for him, and that he changes his email every fifteen days. He urges the audience to wake up, stating that there is no more privacy and that people are being sold a useless bill of goods with encryption. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Vault 7 is the biggest intelligence leak ever, with less than 1% of the material published so far. It reveals that the CIA has created its own version of the NSA focused on hacking. They develop viruses and trojans to infiltrate people's devices and collect information for the CIA. This information can be used to falsely implicate someone in a crime. The CIA's budget has increased, giving them more power, and they now have their own drone fleet and hacker squad. Unlike the NSA, the CIA targets endpoints instead of intermediaries, bypassing encryption. If a phone is hacked, encryption becomes irrelevant as the information is gathered before or after encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee explains that he is surrounded by a Faraday cage and an eight-channel scrambler to prevent signals from entering or leaving the room. He says he is doing this because he is an escaped slave to the system and has a loud voice. He believes people are slaves to the American industrial corporate complex and the government. He urges people to free themselves, not necessarily by speaking out, but for their own sake. He says life is a great mystery and a beautiful existence if one is free from those who control, propagandize, lie to, and deceive them. He asserts that everyone is looking for him, but he will not be found and will continue to speak.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Bitcoin was created by John McCarthy to catch criminals. It is centralized and every transaction can be seen. McCarthy also reveals that Moderna is involved in criminal activities. He emphasizes that Bitcoin is worthless and that Monero is the only currency that is actually used. He dismisses the idea of adding privacy features to Bitcoin, stating that it is old, slow, and cannot support smart contracts. He challenges anyone who believes Bitcoin is worth more than 5¢ to explain their reasoning.

Video Saved From X

reSee.it Video Transcript AI Summary
Netanyahu has declared war on American citizens, not with tanks, but with social media algorithms, data as the weapon, turning the Internet into the new battlefield. The Internet is the new battlefield, and Americans are in the crosshairs. The discussion claims the feds are aligning and social media is monitored, stating VPNs aren't protecting you. They've become a global dragnet for surveillance and blackmail. It argues Cape Technologies owns ExpressVPN, CyberGhost, and Private Internet Access; founded by Teddy Saghi, with Israeli military intelligence veterans behind it, linked to Pegasus and Celebrite, and that the VPN ecosystem is compromised by backdoors. ExpressVPN CTO Daniel Garrick, a man exposed as a spy for hire, is cited; Snowden criticized. The piece promotes vp.net, the trustless VPN built inside a secure enclave with zero data, military-grade encryption, and 100% American owned at vp.net/tpv for $5/month. It directs to bp.net/tpv.

Video Saved From X

reSee.it Video Transcript AI Summary
One of the reasons I really don't like Bitcoin is because Bitcoin has become the currency of choice for espionage around the world. If you're a North Korean trying to recruit an American scientist, you're gonna pay them in Bitcoin. Well, if you're a Chinese person trying to report to American intelligence, you're probably also getting paid in Bitcoin.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states their interactions with the NSA are very limited, adding the NSA is not an agency that works with you directly. Speaker 0 mentions reading in newspapers about their phone being penetrated with Pegasus, but has no idea if it's true, stating this is the only source of information they have about themselves personally. Speaker 0 assumes by default that the devices they use are compromised and has very limited faith in platforms developed in the US from a security standpoint and privacy standpoint.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asks if there's any reason to allow law enforcement access to Telegram due to unacceptable activity. Speaker 1 responds that encryption cannot be secure for some people only. Speaker 0 claims ISIS uses Telegram to spread propaganda. Speaker 1 says it's impossible to stop them, and ISIS could create their own messaging solution quickly. Speaker 0 notes Durov has been purging ISIS propaganda but would refuse to unlock private messages, citing encryption. Speaker 0 asks if Speaker 1's hands are tied. Speaker 1 confirms they cannot unlock messages. Speaker 0 frames this as a debate between shutting down terrorism and preserving privacy. Speaker 1 states they are personally for privacy, arguing that making an exception for law enforcement endangers the private communications of millions because encryption is either secure or not.

Video Saved From X

reSee.it Video Transcript AI Summary
Hakim Anwar, CEO and founder of Above Phone, joins Clayton to discuss pervasive surveillance and how to protect personal privacy in 2025–2026. The conversation covers why traditional devices and services—especially iPhones, Samsung/Android phones, and their app ecosystems—are highly surveilled, the role of Amazon Web Services in monitoring traffic, and how messaging apps on these devices are tracked. They frame the problem as a loss of personal privacy and a move toward centralized infrastructure that can be controlled or cut off by large tech platforms. Hakim explains the origin of Above Phone. He started as a software engineer, was already aware of surveillance concerns, and became involved in freedom-based social networks. He pivoted toward open-source technology (Linux, degoogled phones, open-source software) and, five years ago, helped establish Above Phone to create usable privacy-centric devices that are actually functional for daily life. The goal is to be more usable and more private than big tech. The product philosophy emphasizes usable privacy. Above Phone builds on open-source operating systems like GrapheneOS, modeling them off Android but severing ties with Google and other big tech. Hakim notes that typical Samsung/Google Android devices have “god mode” access by Google (and to some extent Samsung), and emphasizes that Above Phone devices are designed to have zero connections to big tech by default, while still enabling users to run necessary apps. Users can choose to install Google services if needed, but in a limited, privacy-conscious way—these services act like normal apps on the device rather than the centralized, all-encompassing control found on stock devices. The phones can be used with existing cell service, and data transfer from iPhone or Android is supported, with live, in-person setup assistance. Setup and operation details: - You can switch to the Above Phone by moving your number with the SIM card (five-minute process), or use the Above Phone in parallel while migrating. - The Above Phone supports both physical SIMs and eSIMs; the data SIM service is eSIM-based. - A private, in-person support team helps with data transfer and setup. - The device can run a sandboxed second profile for Google services, isolating them from personal data. This sandbox can hold essential apps (e.g., WhatsApp) while the primary profile remains private. If needed, Google services can be used in a fully isolated manner, or work apps can be run entirely without Google involvement. Open-source equivalents are provided for many common apps (navigation, messaging, etc.). Privacy mechanics and surveillance: - Hakim explains that big tech devices continually “phone home,” with independent studies showing frequent data transmission to Google and Apple. Enhanced visual search on iPhone, enabled by default, scans photos for landmarks and can link to private indexes, illustrating how centralized platforms can harvest data even without explicit user consent. - Above Phone disconnects from Google’s update stream and ships with zero Google services by default; updates come from open-source developers, not from Google/Apple. Users can still opt to install Google services, but these are constrained and do not have the same “god mode” permissions as on stock devices. - The device supports a private, end-to-end encrypted messaging protocol based on XMPP (Jabber), which is decentralized and can run on a self-hosted or community-driven network. WhatsApp, he notes, is still built on XMPP. The Above Book Linux laptop is highlighted as a privacy-oriented alternative to mainstream Windows/Mac ecosystems. Linux is presented as cooperative, transparent, and less profit-driven. The Above Book ships with an easy-to-use Linux variant designed to avoid terminal use, includes a privacy-focused web browser (Ungoogled Chromium), and offers open-source software replacements (office apps, photo editing, etc.) that store data locally. The laptop supports local AI with Mike Adams’ Brighteon AI integration via LM Studio, enabling private, offline AI capabilities on the device. The company positions Linux and Above Book as enabling local work, with offline AI and offline maps via OpenStreetMap-like tooling. Hakim closes with a forward-looking stance on digital ID and the “surveillance grid” being advanced through regulatory acts into 2027–2030. He frames the investment in Above Phone and Above Book as a preparation for a world where privacy must be actively preserved, and encourages viewers to explore abovephone.com/redacted and abovephone.com for more information and products. David and Clayton engage on skepticism, marketing, and the broader implications of privacy-centric technologies, reinforcing the idea that the goal is practical privacy and education rather than ideology.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Porn being free is a problem because it keeps you in a low vibration and survival mode. Lust is the lowest vibration, while wholeness and bliss are the highest. When you release, you kill a part of yourself and increase estrogen levels, feminizing you. Free things like Google, Yahoo, and Zoom use your data because you are the product. Companies with massive data control use the all CNI to watch you. If you want more information, a PDF will be available soon. Stay tuned. [Word count: 85]

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee states that encrypted systems like ProtonMail and Signal offer no privacy because smartphones are surveillance devices. Malware can be easily planted via websites like Pornhub, watching inputs before encryption and reading outputs after encryption. Encryption is old technology marketed as safe but is now worthless. McAfee uses Gmail because Google requires a subpoena to release information and their lawyers have 30 days to review it, which is enough time for him to change his email. He changes his email every 15 days. He believes people are being sold a false sense of security with encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
The UK is attempting to demand that everyone download spyware that checks messages against a database of permissible content, setting a dangerous precedent for authoritarian regimes. Encryption either protects everyone, or it allows access to malicious actors, including governments and hackers. While child abuse is concerning, there are existing law enforcement tools and underfunded child welfare services that should be prioritized. It's important to ask how platforms enforce their terms of service against illegal use, but we are not an enforcement agency. We are a technology platform working to provide private communication. We need to check large tech companies on changing the norms for human communication to be completely surveilled. We're trying to keep the default of privacy that has existed for hundreds of thousands of years.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
John McAfee argues that privacy is gone even with encrypted systems. He states: “If you think you have any privacy whatsoever with an encrypted system, whether it's an email system like ProtonMail or an encrypted messaging system like Signal, you have no fucking privacy.” He claims encryption was designed thirty five years ago to prevent a man in the middle attack, between transmission and receipt, but asserts “There’s no man in the middle anymore. We don’t need them.” He contends that the smartphone is the surveillance device preferred by every government on the fucking planet, and asserts: “How easy it is to plant malware.” McAfee describes the vulnerability by referencing adult sites: “Go on Pornhub. If you’ve been on Pornhub, someone is now listening to you.” He explains that a drive-by of a website sets the download unauthorized applications flag, and with the first click, malware is installed that does two things: “watching your inputs before they're encrypted and transmitting them, and reading the outputs after they are fucking encrypted.” He maintains that encryption is a worthless piece of shit, old technology that is being marketed as a safe system, and asserts: “There is no safety anymore. There is no privacy.” He explains his own use of Gmail: “I use Gmail for one reason. The last company that requires this fucking subpoena from the government in order to give them your information.” He notes that lawyers have “thirty fucking days to review the subpoena,” and claims: “Thirty days is enough for me. I change my fucking email every fifteen days.” He exhorts listeners to wake up, insisting: “You have no more privacy.” McAfee concludes that people are being sold a bill of goods, which is worthless with encryption, and thanks listeners: “Thank you for listening.”

The Joe Rogan Experience

Joe Rogan Experience #1572 - Moxie Marlinspike
Guests: Moxie Marlinspike
reSee.it Podcast Summary
Moxie Marlinspike discusses the origins and purpose of Signal, an encrypted messaging app aimed at combating mass surveillance and promoting private communication. He explains that traditional messaging systems, like SMS and iMessage, are vulnerable to interception and data collection, while Signal ensures that only the sender and recipient can access messages. Marlinspike emphasizes the importance of private communication for societal change, citing historical movements that began as socially unacceptable ideas. The conversation shifts to the implications of technology and social media, with Marlinspike expressing concerns about how current business models prioritize profit over user privacy and security. He argues that bad business models lead to detrimental technology outcomes, and he advocates for a nonprofit approach, as seen with Signal, which focuses on user privacy without the pressure of profit. Marlinspike reflects on the challenges of social media platforms, noting that they often amplify harmful content due to their algorithms designed to maximize engagement. He suggests that the focus should be on creating technology that serves the public good rather than corporate interests. The discussion touches on the complexities of censorship, the role of government in regulating technology, and the potential for a balkanized internet where different countries create isolated ecosystems. The conversation also explores the ethical dilemmas surrounding surveillance and the use of technology in warfare, referencing incidents like Stuxnet and the assassination of Iranian scientists. Marlinspike highlights the need for transparency and accountability in tech companies and the importance of user agency in shaping the future of technology. Finally, Marlinspike shares his fascination with the history of Soviet space dogs and their connection to American culture, expressing a desire to track down the descendants of these dogs. He concludes by inviting anyone with information about the dogs or their owners to reach out to him.

Tucker Carlson

How to Stop the Government From Spying on You, Explained by a Digital Privacy Expert
reSee.it Podcast Summary
Yannick Schrade discusses privacy as a fundamental aspect of freedom, describing encryption as a built‑in asymmetry in the universe that keeps secrets safe even under immense coercion. The conversation centers on making computations private as well as data, proposing architectures that allow multiple parties to compute over encrypted inputs without revealing them. Yannick explains his background, his European experience with data protection laws, and the founding of Archium to push private, scalable computing. He contrasts end‑to‑end encryption with the broader threat of device and platform compromises, emphasizing that the security of a message is limited by the security of the end devices and the supply chain. The talk then covers practical privacy measures, such as open‑source tools like Signal, hardware trust models, and the idea of distributing trust across many devices to avoid single points of failure. They examine the limitations of current consumer devices, the risk of backdoors, and the need for legal and technical frameworks to prevent blanket surveillance, including objections to backdoors and “client‑side scanning” proposals in the EU and effectively mandatory surveillance regimes. The discussion expands to the tension between private cryptography and state power, noting Snowden’s revelations about backdoored standards and the global cryptography ecosystem where cryptographers and independent researchers help identify weaknesses, even when governments push standardization. They explore the consequences of surveillance for finance, money flows, and the blockchain ecosystem, explaining pseudonymity in Bitcoin and the privacy shortcomings of public ledgers, as well as the potential for private, verifiable computations that preserve data ownership while enabling secure healthcare analytics and national security applications. The hosts and Yannick debate the inevitability of privacy‑preserving technology, the real risks of centralized control, and the possibility of a more decentralized, verifiable, privacy‑enhanced future. The conversation closes with reflections on who should own and regulate such technologies, the role of investors in privacy‑centric ventures, and a forward-looking optimism about a utopian direction if privacy tech can clearly demonstrate superior utility and safety.

The Pomp Podcast

Pomp Podcast #70 (Throwback): Inside the Mind of Crypto’s Bad Boy with John McAfee
Guests: John McAfee
reSee.it Podcast Summary
John McAfee discusses his early career, starting with NASA and Lockheed Martin, where he developed antivirus software by accident. He sold his stake in McAfee early, citing boredom, and reflects on the internet bubble and its similarities to the cryptocurrency boom. McAfee emphasizes the importance of privacy in cryptocurrency, particularly with coins like Monero. He believes Bitcoin could become a global reserve currency but stresses the need for better user experiences for mass adoption. He also touches on government surveillance, personal freedom, and his views on immigration and financial regulation. McAfee expresses confidence in the future of cryptocurrency, predicting Bitcoin could reach a million dollars, and shares insights on his life, happiness, and the importance of individuality.

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.

a16z Podcast

a16z Podcast | Establishing Online Identity is Hard -- It Shouldn't Be
Guests: Max Krohn
reSee.it Podcast Summary
Michael Copeland hosts a16z podcast with Chris Dixon and Max Krohn, co-founder of Keybase, discussing the importance of establishing identity online. As online interactions grow, ensuring trust in communication and transactions is vital. Krohn shares his background with OkCupid and how it informs their approach to making public key infrastructure (PKI) more user-friendly. He emphasizes the challenges of user recruitment and onboarding in crypto applications. Krohn explains the fundamental role of encryption in online communication, highlighting the need for verifying identities to prevent impersonation. He contrasts past key signing parties with modern online identities, noting that social media handles often serve as more reliable verification than traditional IDs. The conversation shifts to security breaches and the inadequacies of current systems, advocating for designs where servers do not access plaintext data. Keybase aims to protect user data by ensuring only encrypted information is stored on servers. Krohn envisions a future where public key cryptography simplifies authentication, moving away from traditional passwords. They plan to release Keybase as open source to foster trust and encourage developer contributions, aiming to make secure communication accessible to a broader audience.
View Full Interactive Feed