TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims to have evidence that Dominion voting systems were created to manipulate election results in Venezuela and were then used internationally, including in the United States. They allege that the machines were funded by Venezuela, Cuba, and China, and that some governors and secretaries of state had financial interests in the Dominion systems. The speaker believes that even if the states certify the votes, the fraud will be exposed and the votes will be set aside. They claim that President Trump won the election by a landslide and that there needs to be a criminal investigation into the alleged fraud, which they believe will affect millions of voters. They also accuse Silicon Valley, big tech companies, social media companies, and media companies of being involved in organizing and conducting the fraud.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims the alleged creator of Bitcoin, Santoshi, denied inventing the technology in an interview. The speaker suggests three-letter agencies are involved and gave Bitcoin a rebellious persona. The speaker questions how Santoshi obtained the technology and infrastructure, arguing that anyone opposing the system is "taken out," referencing JFK, Gaddafi, Jackson, and Lincoln. They propose Bitcoin may have a backdoor and that Google possesses technology to decrypt the 256-bit encryption used by cryptocurrencies. The speaker notes Google's technology emerged in 2012, before the cryptocurrency boom.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 expresses opposition to cryptocurrency. Speaker 1 mentions that Jamie, who supports blockchain, helped launch JPMorganCoin. They explain that JPMorgan created its own blockchain protocol based on Ethereum, allowing private transactions. Speaker 0 suggests that the only use case for blockchain is criminal activity. Speaker 2 states that JPMorgan was involved in Ethereum from the beginning and played a major role in the Enterprise Ethereum Alliance. Speaker 0 comments on shutting down blockchain if they were the government. Speaker 3 compares the Mt. Gox scandal to Bernie Madoff's Ponzi scheme, where JPMorgan was involved. JPMorgan account holders sued the bank and recovered over $2 billion, but no executives went to jail.

Video Saved From X

reSee.it Video Transcript AI Summary
Steven Narioff, a former adviser to Vitalik Buterin and the Ethereum Foundation, recently shared a recording exposing issues in Ethereum's financial management, the unworkability of the white paper, and the need for Gavin Wood to fix it. The recording also highlighted problems with the internal structure, including unclear roles and disconnected teams. Surprisingly, it revealed that Vitalik Buterin, often regarded as a genius, is just a human like everyone else.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims the individual credited with inventing Bitcoin, Santoshi, denied creating the technology in an interview. The speaker suggests three-letter agencies are actually behind Bitcoin and cryptocurrency, giving it a false origin story of a rebel fighting the system. They question how Santoshi would have acquired the necessary technology and infrastructure, given the fate of historical figures who opposed the system. The speaker implies Bitcoin may have a backdoor and notes Google possesses decryption technology developed before the cryptocurrency boom, suggesting this is not coincidental.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker believes votes were manipulated electronically in favor of Joe Biden, citing TV reports of votes switching from Trump to Biden. In one instance, 12,000 votes shifted, and in another, 20,000. Trump's numbers decreased by the exact amount that Biden's increased. The speaker believes the Dominion Company represents foreign interference because it is a Canadian company storing records in Germany and Spain. The speaker claims the CIA was involved, using servers in Germany for political operations. These servers were seized by US forces with German help and are now in the hands of the FBI. The speaker notes that in Europe, the CIA operates under the jurisdiction of the military.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker accuses someone of insider trading, suggesting that it is evident from their disclosures. They mention that the person receives classified briefings as a member of a committee, and it would be easy for a competent FBI officer to investigate their trading and communication. The speaker questions how the person became a committee member and made trades just before a stock hike. They emphasize that it was not luck but a well-informed trade.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the NSA created SHA-256, the algorithmic procedure behind Bitcoin, and that despite skepticism, they found a 1996 paper titled "How to Make a Mint: The Cryptography of Anonymous Electronic Cash." The paper is said to have been written in 1996 by the NSA. The author is named Tasoki Akamoto, which the speaker notes sounds like Satoshi Nakamoto, the credited author of the Bitcoin white paper published in 2008.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous Dow hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet controlled during the ICO is directly involved, along with several other individuals. The speaker believes that blockchain analysis can provide evidence to support this claim. They mention one specific wallet that communicated with the hacker's wallet and an individual at the Ethereum Foundation who set up the contract for the hack. The speaker concludes that there is more evidence to support their theory.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses election fraud in Chicago, explaining that there are three levels of fraud: precinct level, mid level, and the highest level involving the Chicago Board of Election. They believe that corrupt individuals can manipulate the central tabulator, which is not connected to the internet, by running algorithms. The speaker mentions a lawsuit filed in 2016 that resulted in three key individuals leaving their positions at the Chicago Board of Elections. They recount a recount experience that they believe was fraudulent, with votes being manipulated in favor of Hillary Clinton. Overall, the speaker expresses their belief in the existence of a fraudulent scheme in Chicago elections.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the lack of transparency and conflicts of interest in Ethereum. They mention that there is little information about who is involved and how they are funded. They speculate about the roles of certain individuals, including Drew Lubin and Vitalik Buterin. They also mention that ConsenSys, an organization associated with Ethereum, received funding from various sources, including the Saudi government and JPMorgan. They question whether the Ethereum Foundation is run for the benefit of its users or for the benefit of a few individuals. They criticize the lack of transparency and accountability within the foundation.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous DAO hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet controlled by the ICO is directly involved, along with several other individuals. The speaker believes that the evidence can be found on the blockchain itself, such as wallet connections and communication between parties involved. They state that there is more evidence supporting their claim, but they do not provide further details.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker explains that "the space ... wasn't held correctly" and admits, "I screwed up because I should have agreed to get our teams up immediately," opting to "let him have his day in court" and remain neutral. He says, "They know all these coins are Ponzi schemes" and notes that "Stu always had an answer immediately." He calls it "the kill shot" and presents a "cash out wallet, AGBZ. 8GBZB" where "three people on the team [are] cashing out to this wallet." He claims "Here's Stu Peters from the main wallet that he would never sell a penny goes to the side wallet here, AGZB," and identifies "the donation wallet" as "JCJE" while saying "donation wallet" again. He reports "$77,249.76 withdrawn" and says "drain liquidity from J Proof." He asserts "three different team members are using that wallet" and calls it "irrefutable proof" and ends with "Spread the word."

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 discusses the origins of Bitcoin and raises a provocative claim about who may have created it. The assertion begins with the question: Was Bitcoin created by the CIA? And, given early involvement in mining, could the speaker be in the CIA as well? The speaker then presents a line of reasoning based on what they learned about the Bitcoin source code. They state that it was created by somebody in the NSA, and they support this claim with what they describe as evidence found in the randomizer. The speaker notes that there are many methods that are certified to be free of backdoors, and these methods are stated to have been checked and rechecked and certified as backdoor-free. In contrast, Satoshi did not use any of these certified methods. Instead, Satoshi chose an obscure method that wasn’t certified, which led many developers to scratch their heads. The discussion then references Snowden and his release of information indicating that the NSA had backdoors to all the certified randomizers. According to the speaker, with enough data, the NSA could reproduce the random number that a user actually chose. This leads to the implication that the NSA could break codes and effectively break securities, including “getting your Bitcoin.” The speaker emphasizes that Satoshi chose the one randomizer that did not have a backdoor, and they question how that would be possible. The closing questions reflect skepticism about the likelihood of such a choice being lucky, with the speaker stating, “Did he get lucky? I don’t think so.” In summary, the speaker presents a chain of claims linking Bitcoin’s creation to the NSA, arguing that certified randomizers reportedly free of backdoors exist, that Snowden revealed NSA backdoors in those certified methods, and that Satoshi’s selection of an uncertified randomizer supposedly avoided backdoors. This leads to the concluding suggestion that Satoshi’s choice was not a matter of luck, prompting the final question about whether luck played a role.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous Dow hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet controlled by the ICO is directly involved, with multiple people implicated. The speaker emphasizes the ability to prove this through on-chain analysis, pointing out instances where wallets connected to certain individuals communicated with the hacker's wallet and set up the hack. They state that there is more evidence supporting their claim.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the famous Dow hack was actually an inside job orchestrated by members of the Ethereum Foundation. They suggest that the Bitcoin wallet controlled by the ICO is directly involved and that multiple people must have been part of it. The speaker believes that blockchain analysis can prove this, mentioning a wallet connected to an individual that communicated with the hacker's wallet and another individual setting up the hack. They state that there is more evidence to support their claim.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the hacking of the DNC and mentions someone named Seth who allegedly provided information. However, the speaker does not reveal their sources. They believe that the files were not hacked by Russia but rather leaked from within the building. The speaker mentions Bill Binney, a former NSA officer, who supposedly demonstrated this. They also mention that lies about the hacking led to tensions with Russia. The speaker admits to initially dismissing the conspiracy theories surrounding the issue but later realized the truth. They express frustration with the lack of transparency and understanding surrounding certain actions and question the motives behind them.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on email leaks and allegations of hacking connected to a political context. One speaker notes that “one hour later, WikiLeaks starts dropping my emails,” suggesting a link between the leaks and his own communications. The group references those emails being public and questions about what might have been coincidental, with lines like “Just get lost into the public. One could say that there might those things might not have been a coincidence” and mentions “those things” that may or may not have been intended to surface. Two days after the initial events, the speaker recounts that “the FBI contacted me, the first thing the agent said to me was, I don’t know if you’re aware, but your email account had might have been hacked.” He confirms awareness of the hacking, stating “I said yes,” and recalls a demand that he change how he is addressed, with references to being told, “From now on, you won’t call me your father,” and “I you will call me your father,” coupled with the assertion “You think you hide shit, don’t you? Just get lost.” The dialogue shifts to broader implications: other campaign officials’ emails were divulged earlier than October 7, and the speakers discuss uncertainty about what exactly had been compromised, noting “there was a document that appeared to come from my account” and realizing “they had the contents of my email account.” The last time one speaker talked to the FBI is mentioned in the context of these disclosures. A separate thread introduces media narratives, with a speaker asking, “Media is telling you the entire story is a hoax or fake news. But what does that even mean?” and stating, “I spent the last month investigating. So what exactly is Pizzagate? And are there any actual facts to support the story?” There is a sense of frustration about interpretation and evidence, captured in the line, “They’re hearing what they wanna hear. They’re not really listening to what I’m telling them.” The transcript ends with a brief aside from another speaker, “What’s that?” indicating confusion or a request for clarification, tied to the ongoing discussion about the emails, hacks, and the Pizzagate inquiry.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the public is being deceived about election security. They argue that while individual voting machines may not be connected to the internet, state and county databases are. They allege that votes are stored on a server in Frankfurt, Germany, and that the election software used in 28 states may be infected with malware called Q Snatch. Cybersecurity investigators suggest that this malware could allow hackers to manipulate votes in election databases nationwide. The cofounder of Allied Security Operations supports these claims, stating that the malware collects credentials and enables changes to be made to votes at various stages of the election process. The speaker suggests that this could explain the malicious activities observed during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
Weed through a complete searchable database of 26,000 files related to Jeffrey Epstein. The speaker has spent hours and hours examining these files and will spend the coming days giving an inside look at them. A taste of the range of materials includes bizarre emails where Epstein is suspiciously dumping lists of names, including Bill Clinton, Donald Trump, Prince Andrew, and Woody Allen. There are emails over the years in which Epstein works with outside consultants to scrub Google search results and essentially bleach the Internet of bad press, claiming they can provide reinforcement from sites like Harvard and other publications they influence to meet Epstein’s needs. In another email, Epstein and Larry Summers, the former Harvard president and board member for OpenAI, are emailing about an article involving Donald Trump and Bill Clinton. Epstein mysteriously says he has some great stories after just coming back from a week of “Jeffrey style” meetings. There are also many emails related to Trump. Despite Trump’s public claim that the whole affair is a scam—with arrows pointing to the Democrats—the files show that he is mentioned in these emails more than anyone else. The speaker invites audiences to follow along as these files are examined and to work to hold everyone involved accountable.

Video Saved From X

reSee.it Video Transcript AI Summary
On November 2nd, the speaker will reveal how former T-Mobile CEO John Legere allegedly collaborated with DJs Steve Aoki and Blau on an NFT scheme. This venture purportedly generated millions for them. The speaker highlights the statistic that 95% of all NFTs are now worthless. The speaker suggests a disparity where wealthy individuals profited while middle-class individuals incurred losses.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the NSA created SHA-256, the algorithmic procedure behind Bitcoin. While browsing Twitter, they found a 1996 paper titled “How to Make a Mint, the Cryptography of Anonymous Electronic Cash,” which they state was written in 1996 by the NSA. They note that the author of that 1996 paper about electronic cash was Tasoki Akamoto, which they say sounds like Satoshi Nakamoto, the credited author for the Bitcoin paper in 2008.

Video Saved From X

reSee.it Video Transcript AI Summary
I will provide a high-level overview of Ethereum as a technology and its organizational structure, including the IPO. Despite legal concerns about the IPO being an illegal securities offer, the speaker believes their colleagues have handled the situation well. The director of a division within the corporation, Bill Hingham, gave a speech regarding this matter. The speaker speculates that the speech may have been related to a potential legal issue with the IPO.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims to have evidence that Dominion voting systems were created to manipulate election results in Venezuela and were then used internationally, including in the US. They allege that the machines were funded by Venezuela, Cuba, and China. The speaker also suggests that some governors and secretaries of state may have financial interests in the Dominion systems. They believe that even if the states certify the votes, the fraud will be exposed and the votes set aside. The speaker asserts that President Trump won the election by a landslide and that there is irrefutable evidence of voter fraud. They call for a criminal investigation and accuse Silicon Valley, big tech companies, social media companies, and media companies of being involved. The speaker ends by saying they will "release the kraken."

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.
View Full Interactive Feed