Two Factor Authentication is a Big Tech Scam! You Must Resist!
You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big tech finds you. Are you wondering how they do this? That is what will be revealed.
You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big tech finds you. Are you wondering how they do this? That is what will be revealed.
You may think you’re protecting a computer with a VPN, Location turned off and various privacy strategies, but without awareness of all your devices, Google and other Big tech could be spying on all your devices at once, validating information among them like IP addresses and locations.
Google is also running perpetual little programs that do telemetry for Google even while devices are not in use. Information mismatches between devices (because of VPN use for example) can be auto-corrected based on matching devices with historical records that cannot be erased.
There are many many tricks and we are not aware of them, you will think you have privacy but in reality you won’t. You need to understand what’s involved and your knowledge needs to be brought up a notch.
Using a Virtual Machine, we will test out 9 Linux Distros and see how they fare with user friendliness and ease of use. Could grandma use them? We will test out Ubuntu, Elementary OS, Fedora, Manjaro, Ubuntu Mate, MX Linux, Linux Mint, Pop! OS, and Zorin.
Should you Switch to Linux? We will discuss how Linux is made and how its organization actually influences its privacy features. I will discuss the structure of Linux and why it can get complex because of fragmentation of the community. But in spite of that, it is worth a serious look and perhaps a serious commitment.
This is NOT an Anti-Vax video. Vaccination Card Checks at restaurants here in Los Angeles truly a zucked up affair? What is the purpose and who does it benefit? Why do something that invades privacy?
Let’s do a deep dive on the elements of Windows 11 that impact on privacy. We’ll discuss Microsoft ID, Location, OneDrive, Online Speech Recognition, Telemetry, App Security. How does Windows 11 stack up? Is it better than MacOS privacy wise? How about when compared against Android and Linux?
I was faced with the decision of buying an Apple Macbook with an M1 chip but had to balance it against the privacy risks of Apple products. In order to properly weigh these risks, each one of us must truly understand the full extent of the Apple privacy risk, which in some cases surpasses Google.
Find out exactly what disgusting things Apple does and why it’s hard to justify supporting them and their fake mantra that iPhone is Privacy.
A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley company, talks about why he turned his back on black hat hacking for the greater good.
Some types of insurances cover theft and Breakins. In this article Allstate talks about the different insurances that can help.
Spy Cameras are getting smaller and harder to detect each year. Do you know what to look for so your private moments are not being broadcast over the internet.