Media is too big
VIEW IN TELEGRAM
What Epstein's Emails Reveal About Privacy and Power
After missing the deadline for the Epstein Transparency Act, the DOJ released an additional 3M pages of Epstein emails and documents, many heavily redacted. Another 2.5M documents will remain unreleased, supposedly to protect victims.
The full dataset is on the Justice Department website, and researchers are already repackaging it with AI tools to make it searchable. I used some of those tools to dig into what these files reveal about how elites behave behind closed doors, and how arrogance shows up in the details.
Epstein and associates operated brazenly through Gmail and Yahoo, using attachments and file transfers while also maintaining serious infrastructure across multiple properties.
Do not let this drain your power. Expect little from the system. Focus on personal accountability and building a life that does not feed the abusive systems that make crimes like this possible.
πͺ§ Read the full article on Substack
π² Discover real privacy at Above
After missing the deadline for the Epstein Transparency Act, the DOJ released an additional 3M pages of Epstein emails and documents, many heavily redacted. Another 2.5M documents will remain unreleased, supposedly to protect victims.
The full dataset is on the Justice Department website, and researchers are already repackaging it with AI tools to make it searchable. I used some of those tools to dig into what these files reveal about how elites behave behind closed doors, and how arrogance shows up in the details.
Epstein and associates operated brazenly through Gmail and Yahoo, using attachments and file transfers while also maintaining serious infrastructure across multiple properties.
Do not let this drain your power. Expect little from the system. Focus on personal accountability and building a life that does not feed the abusive systems that make crimes like this possible.
πͺ§ Read the full article on Substack
π² Discover real privacy at Above
β€9π6
Forwarded from /g/βs Tech Memes
β’ dude drops $2000 on a DJI robot vacuum like a lunatic
β’ refuses to use the normal app like a peasant
β’ Sammy Azdoufal fires up Claude to crack the API so he can drive it with an xbox controller
β’ Claude delivers the goods
β’ pulls an auth token from their servers, connects successfully
β’ except the system thinks he controls 7000 vacuums
β’ checks again
β’ yep, seven thousand
β’ DJI built authentication with zero device ownership verification
β’ any valid token works for any unit on the planet
β’ Sammy now has eyes inside homes across 24 countries
β’ live vacuum camera feeds everywhere
β’ full floor plans from the mapping data
β’ some guy in germany eating cereal at 3am, unaware his roomba is snitching
β’ one API call away from being the most informed burglar in history
β’ all he wanted was to steer his vacuum with a joystick
β’ does the right thing and reports it
β’ DJI fixes it in two days
β’ back to normal life with his stupidly expensive floor cleaner
β’ IoT companies stay undefeated at shipping garbage security
β’ refuses to use the normal app like a peasant
β’ Sammy Azdoufal fires up Claude to crack the API so he can drive it with an xbox controller
β’ Claude delivers the goods
β’ pulls an auth token from their servers, connects successfully
β’ except the system thinks he controls 7000 vacuums
β’ checks again
β’ yep, seven thousand
β’ DJI built authentication with zero device ownership verification
β’ any valid token works for any unit on the planet
β’ Sammy now has eyes inside homes across 24 countries
β’ live vacuum camera feeds everywhere
β’ full floor plans from the mapping data
β’ some guy in germany eating cereal at 3am, unaware his roomba is snitching
β’ one API call away from being the most informed burglar in history
β’ all he wanted was to steer his vacuum with a joystick
β’ does the right thing and reports it
β’ DJI fixes it in two days
β’ back to normal life with his stupidly expensive floor cleaner
β’ IoT companies stay undefeated at shipping garbage security
π₯9π€£5π€―4β€3π3
Media is too big
VIEW IN TELEGRAM
β‘οΈHow Is AI Deployed?
In the webinar, I get into exactly how AI is actually deployed. Thereβs a training phase where models learn on huge datasets, and then thereβs the inference phaseβthatβs where you and I actually use the AI. One big misconception is that you canβt run AI without massive environmental costs. While the way big tech does it is often pretty reckless, there are ways to do it more responsibly.
If youβre interested in how we can deploy AI locally and ethically, tune into our recent webinar: Empowerment with Ethical, Local, and Private AI.
π±Explore tools built with autonomy in mind at Above
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
In the webinar, I get into exactly how AI is actually deployed. Thereβs a training phase where models learn on huge datasets, and then thereβs the inference phaseβthatβs where you and I actually use the AI. One big misconception is that you canβt run AI without massive environmental costs. While the way big tech does it is often pretty reckless, there are ways to do it more responsibly.
If youβre interested in how we can deploy AI locally and ethically, tune into our recent webinar: Empowerment with Ethical, Local, and Private AI.
π±Explore tools built with autonomy in mind at Above
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
π₯2π2π1
Forwarded from Jason Bassler
Google Glass wasnβt a failure, it was a test balloon. They just waited a decade until society was distracted, addicted, and desensitized enough to roll out the real version.
Support my work: https://linktr.ee/Jebassler
Support my work: https://linktr.ee/Jebassler
β€3π€¬2π1
Media is too big
VIEW IN TELEGRAM
ICEβs Clearview AI Contract
CBP just awarded a fresh contract to Clearview AI, a company notorious for scraping massive amounts of images from social media and racking up privacy violations worldwide.
This new deal would let border officers identify travelers simply by taking their picture, and it is slated to go live in September 2026. It also builds on a previous $3.75M ICE contract that was marketed as a way to identify βICE protestors.β
The message is clear. Opposing surveillance can make you a target. In practice, a single selfie can be enough to match your face to public profiles and flag you as a person of interest.
What you can do: treat photos as sacred, avoid auto cloud uploads, shrink your public footprint, and consider de googled phones like Above Phone.
πͺ§ Read the full article on Substack
π² Take back your privacy with Above
CBP just awarded a fresh contract to Clearview AI, a company notorious for scraping massive amounts of images from social media and racking up privacy violations worldwide.
This new deal would let border officers identify travelers simply by taking their picture, and it is slated to go live in September 2026. It also builds on a previous $3.75M ICE contract that was marketed as a way to identify βICE protestors.β
The message is clear. Opposing surveillance can make you a target. In practice, a single selfie can be enough to match your face to public profiles and flag you as a person of interest.
What you can do: treat photos as sacred, avoid auto cloud uploads, shrink your public footprint, and consider de googled phones like Above Phone.
πͺ§ Read the full article on Substack
π² Take back your privacy with Above
π3β€2π€¬2π2π₯1
Media is too big
VIEW IN TELEGRAM
Flock Γ Ring Pull the Plug After Super Bowl Backlash
Ring and Flock Safety just cancelled their planned integration after public backlash tied to Ringβs Super Bowl messaging and the fear of total neighborhood surveillance.
Ringβs statement is classic doublespeak. They say the integration would have taken more time and resources than expected, and they stress it never launched, so no Ring customer videos were sent to Flock. Notice the wording. They say customer videos, not footage or data.
The bigger point is this. Ring already has law enforcement request pipelines, and Ring already works with other police tech companies. The plan was to bridge massive surveillance networks together and sell it as βcommunity safety.β
The backlash matters because it shows public pressure still works. These companies will keep testing the limits, and the only real boundary is what people refuse to accept.
πͺ§ Read the full article on Substack
π² If youβre ready to cut off the data supply, check out Above
Ring and Flock Safety just cancelled their planned integration after public backlash tied to Ringβs Super Bowl messaging and the fear of total neighborhood surveillance.
Ringβs statement is classic doublespeak. They say the integration would have taken more time and resources than expected, and they stress it never launched, so no Ring customer videos were sent to Flock. Notice the wording. They say customer videos, not footage or data.
The bigger point is this. Ring already has law enforcement request pipelines, and Ring already works with other police tech companies. The plan was to bridge massive surveillance networks together and sell it as βcommunity safety.β
The backlash matters because it shows public pressure still works. These companies will keep testing the limits, and the only real boundary is what people refuse to accept.
πͺ§ Read the full article on Substack
π² If youβre ready to cut off the data supply, check out Above
π9β€6π€¬2
Media is too big
VIEW IN TELEGRAM
Fungal Computing with Mushrooms
What if electronics did not have to be toxic and permanent. Researchers are testing common store bought mushrooms as bioelectronics, exploring fungal computing and memristor like behavior.
Why it matters: the world generates a staggering amount of e waste, and recycling is still difficult because of toxic materials like lead and cadmium. If bio based components prove viable, we could see electronics that are more biodegradable and less harmful from the start.
It is early research, but the direction is exciting. Less waste, less toxicity, and a new path for computing that does not rely on mining and endless disposability.
πͺ§ Read the full article on Substack
π² Get privacy gear
What if electronics did not have to be toxic and permanent. Researchers are testing common store bought mushrooms as bioelectronics, exploring fungal computing and memristor like behavior.
Why it matters: the world generates a staggering amount of e waste, and recycling is still difficult because of toxic materials like lead and cadmium. If bio based components prove viable, we could see electronics that are more biodegradable and less harmful from the start.
It is early research, but the direction is exciting. Less waste, less toxicity, and a new path for computing that does not rely on mining and endless disposability.
πͺ§ Read the full article on Substack
π² Get privacy gear
β€5π2π2
Forwarded from The Corbett Report
Aaron Day joins us today to discuss "The Hijacking of Bitcoin," his detailed and well-documented breakdown of how and why Epstein hijacked bitcoin.
via The Corbett Report https://ift.tt/qX1Rxda
via The Corbett Report https://ift.tt/qX1Rxda
The Corbett Report
Interview 2005 - How Epstein Hijacked Bitcoin with Aaron Day | The Corbett Report
Aaron Day joins us today to discuss "The Hijacking of Bitcoin," his detailed and well-documented breakdown of how and why Epstein hijacked bitcoin.
π₯7π2β€1π1
Today is an important day to pray for peace in your heart. Let it fill up, overflow, and bathe the planet.
May the conflict in Iran end as quickly as it began. Please protect us, our loved ones, and the innocent in this turbulent time.
May the conflict in Iran end as quickly as it began. Please protect us, our loved ones, and the innocent in this turbulent time.
β€36β€βπ₯5π4π3
This media is not supported in your browser
VIEW IN TELEGRAM
π Want alternative news? Check out these channels π’
#TBOT is now part of GeopoliticsLive, a collection of channels covering geopolitics, politics, global news, economy, and more. All English speaking! Stay informed.
Whether you're seeking in-depth analysis, breaking news, or expert insights, our catalog has got you covered.
π ADD CHANNELS
#TBOT is now part of GeopoliticsLive, a collection of channels covering geopolitics, politics, global news, economy, and more. All English speaking! Stay informed.
Whether you're seeking in-depth analysis, breaking news, or expert insights, our catalog has got you covered.
π ADD CHANNELS
β€3
Media is too big
VIEW IN TELEGRAM
Hidden Signs Your Phone Is Compromised
When your phone is compromised, your private data is quietly sent to someone not authorized. Sure, big tech already collects data, but here weβre talking about a third party siphoning your info without your consent. If youβve had concerns about your phone, in this webinar I share how you can check.
πͺ§ Watch the full webinar
π² Protect yourself, check out Aboveβs ecosystem
When your phone is compromised, your private data is quietly sent to someone not authorized. Sure, big tech already collects data, but here weβre talking about a third party siphoning your info without your consent. If youβve had concerns about your phone, in this webinar I share how you can check.
πͺ§ Watch the full webinar
π² Protect yourself, check out Aboveβs ecosystem
π7π₯1
Forwarded from Perseus Verlag
This media is not supported in your browser
VIEW IN TELEGRAM
NATO will have combat cyborg cockroaches
SWARM Biotactics control live insects via bioelectronic neural interfaces, equipping them with sensors and AI β allowing coordinated swarm movement
Footage: SWARM Biotactics
SWARM Biotactics control live insects via bioelectronic neural interfaces, equipping them with sensors and AI β allowing coordinated swarm movement
Footage: SWARM Biotactics
β€5πΎ3π±2π€1π1
Media is too big
VIEW IN TELEGRAM
Cell Service Problems: More Than You Think
From lack of privacy to centralized control, traditional cell networks are filled with issues. And SIM swapping is a rising threat. If youβre using your phone number for second-factor authentication, your bank account could be at risk. Weβre breaking down what you need to know.
π Watch the full webinar here
π² Take back control of your digital life with Above
From lack of privacy to centralized control, traditional cell networks are filled with issues. And SIM swapping is a rising threat. If youβre using your phone number for second-factor authentication, your bank account could be at risk. Weβre breaking down what you need to know.
π Watch the full webinar here
π² Take back control of your digital life with Above
β€3π2
Media is too big
VIEW IN TELEGRAM
Exploring Open-Source Navigation
From ancient maps on mammoth tusks to modern-day digital globes, maps have shaped civilizations. Today, open-source navigation empowers us to reclaim control over our location data. Dive into the history and the future of mapping with us!
π Watch the full webinar here
π Explore Above
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
From ancient maps on mammoth tusks to modern-day digital globes, maps have shaped civilizations. Today, open-source navigation empowers us to reclaim control over our location data. Dive into the history and the future of mapping with us!
π Watch the full webinar here
π Explore Above
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
π3π3β€1π₯1
Building for digital sovereignty isn't just about codeβit's about grit. Iβm joining Richard Grove for VIP Summit 5 to share the "untold stories" of the crashes and obstacles we faced while building Above Phone, and how we turned those setbacks into a mission for freedom.
π Saturday, March 7th @ 12 PM ET π Register now!
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
π Saturday, March 7th @ 12 PM ET π Register now!
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
π5π₯3
Media is too big
VIEW IN TELEGRAM
New Pipe: Stream Without Being Watched
Curious about a YouTube experience without the trackers? In our Mindful Media webinar, we get into NewPipe on Above Phone, an open-source wrapper that lets you stream, download, and even play in the background without feeding the data beast.
π Watch the full webinar here
π± Get your privacy gear
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
Curious about a YouTube experience without the trackers? In our Mindful Media webinar, we get into NewPipe on Above Phone, an open-source wrapper that lets you stream, download, and even play in the background without feeding the data beast.
π Watch the full webinar here
π± Get your privacy gear
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
π7π₯2β€1
Media is too big
VIEW IN TELEGRAM
Securing Your Digital Identity
In this webinar, we dive into the importance of sovereign security. Learn from real-life stories about the dangers of insecure password storage and discover how to protect your digital life.
π Watch the full webinar
π Learn more about digital sovereignty here
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
In this webinar, we dive into the importance of sovereign security. Learn from real-life stories about the dangers of insecure password storage and discover how to protect your digital life.
π Watch the full webinar
π Learn more about digital sovereignty here
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
π1π₯1π1π1
Building a private alternative to big tech hasn't been a straight line. There has been pressure, obstacles, and moments where we wondered if the whole thing would survive.
This Saturday at VIP Summit 5, I am sitting down with Richard Grove to talk about the crashes we hit while building Above Phone and how we turned those moments into fuel for a bigger mission.
π Saturday, March 7th, 2026 at 12 PM ET π Register now!
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
This Saturday at VIP Summit 5, I am sitting down with Richard Grove to talk about the crashes we hit while building Above Phone and how we turned those moments into fuel for a bigger mission.
π Saturday, March 7th, 2026 at 12 PM ET π Register now!
β
π«Ά @takebackourtech
π© WEBSITE & NEWSLETTER | π₯ VIDEOS| XMPP | SUBSTACK
π₯3β€1π1