101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

500
active users

#thehatedone

0 posts0 participants0 posts today

🇬🇧 The UK: A Dystopian Nightmare? 🚨

The United Kingdom is not just facing economic decline; it’s increasing surveillance and a government that prioritizes power over the people, civil liberties and freedom of expression are at serious risk.

In January 2025, a secret order was issued, demanding Apple create a backdoor to access encrypted content of users worldwide. This alarming move allows the UK government to bypass essential privacy protections, putting every Apple user at risk—regardless of where they live.

Explor this critical issue: The United Kingdom Is a Dystopian S*!THOLE! youtu.be/WIA46Xh7kR8 or invidious.privacyredirect.com/ 📹

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Here are some creators that keep me entertained and informed. I'll mention them if they're on the Fediverse.

They might not be for everyone, but it is what I enjoy:
- @Audibleanarchist: youtube.com/channel/UCaO1QA8QL
- Bernadette Banner: youtube.com/channel/UCSHtaUm-F
- Buddhism in English: youtube.com/channel/UCRtAu8OVY
- @distrotube: youtube.com/channel/UCVls1GmFK
- DoubleBlindMag: youtube.com/channel/UCEDYpQft_
- Eric Parker: youtube.com/channel/UCqP87_tOq
- Hugh Jeffreys: youtube.com/channel/UCQDhxkSxZ
- InfinitelyGalactic: youtube.com/channel/UC3jSNmKWY
- Louis Rossmann: youtube.com/channel/UCl2mFZoRq
- @luke: youtube.com/channel/UC2eYFnH61
- Lyn Saga: youtube.com/channel/UCX7NS4P5M
- Magollon: youtube.com/channel/UCIGS6mihf
- @marketkag: youtube.com/channel/UCcf12G_5i
- Matt Rose: youtube.com/channel/UCsQ9n37qj
- Mental Outlaw: youtube.com/channel/UC7YOGHUfC
- Michael MJD: youtube.com/channel/UCS-WzPVpA
- Naomi Brockwell: youtube.com/channel/UCSuHzQ3Gr
- Seytonic: youtube.com/channel/UCW6xlqxSY
- The Hated One: youtube.com/channel/UCjr2bPAyP
- The Modern Hippie Podcast: youtube.com/channel/UCTMlXvFNb
- Undine Almani: youtube.com/channel/UCGc7D1dcb
- @notthebee: youtube.com/channel/UCsnGwSIHy
- Zero Budget Production: youtube.com/channel/UCfsMC2nwK

Is my channel getting PSYOP'ed?
The Hated One new Video:
- inv.nadeko.net/watch?v=u8hpNl7
#usenet news.novabbs.org/computers/art
My opinion: I agree with this video 100% everyone interested in security/privacy should take a look and watch it #HackerCulture #Security #Hackers #survillancecapitalism #surveillance #control #brainwash #TheHatedOne

The Hated One | InvidiousIs my channel getting PSYOP'ed?Are the feds trolling my channel? Support my work: https://www.patreon.com/thehatedone This will be a different video than I normally make. Every now and then, something happens on my channel that is so weird I literally have to stop everything I am doing and address it. All of a sudden, my privacy videos are getting flooded with trolls commenting the same defeatist position – no matter what you do you will never have privacy. They are usually posted extremely quickly, usually within minutes of me publishing my video. They instantly become one of the top comments in each video’s comment section. They are always broad general statements on the topic without discussing or critiquing any particular point I make in my videos, conveniently hiding the fact that they have never watched my video. If this was one of those investment scams, I would just ban these accounts as spam and move on. But these accounts aren’t promoting anyone in particular. So what is going on? My channel has always been about offering solutions. I do highlight problems, yes, but then I promote reasonable things anyone can do, such as using Signal, GrapheneOS or privacy preserving alternatives. So where is all of this trolling coming from? I think I have the answer. I think I know who this benefits and who this is targeting. So let me show you what I am talking about. This is where I first noticed something was off – my video on the most private phone. I was hoping to start a fruitful debate on how we should evaluate what makes a phone more private than the other and I pit all popular options against each other. Instead of that being the highlight of the comment section, it’s this: “2 cups and a bit of string. Attach a 3rd string if you want a conference call.” Notice how this comment doesn’t contribute anything of substance about how I compare iPhone with Google Pixel, or stock Android with Android forks… It’s a funny comment. But it’s a defeatist comment. Because the implication suggests that nothing modern can be reasonably private. So the most private phone is just as bad as the least private phone. Which is blatant disinformation. SOURCES AN OVERVIEW OF PSYCHOLOGICAL OPERATIONS (PSYOP): https://apps.dtic.mil/sti/pdfs/ADA302389.pdf Active Measures: Russia’s Covert Geopolitical Operations: https://www.marshallcenter.org/en/publications/security-insights/active-measures-russias-covert-geopolitical-operations-0 Active measures. Russia’s key export: https://web.archive.org/web/20210801150359/https://www.osw.waw.pl/sites/default/files/pw_64_ang_active-measures_net_0.pdf U.S. says Russian bot farm used AI to impersonate Americans: https://www.npr.org/2024/07/09/g-s1-9010/russia-bot-farm-ai-disinformation Global guide to state-sponsored trolling: https://www.bloomberg.com/features/2018-government-sponsored-cyber-militia-cookbook/ Automated sectarianism and pro-Saudi propaganda on Twitter: https://exposingtheinvisible.org/resources/automated-sectarianism/ Governments in 30 countries are paying 'keyboard armies' to spread propaganda, report says: https://www.telegraph.co.uk/technology/2017/11/14/governments-30-countries-pay-keyboard-armies-spread-propaganda/ Freedom on the net 2024 – The Struggle for Trust Online: https://freedomhouse.org/sites/default/files/2024-10/FREEDOM-ON-THE-NET-2024-DIGITAL-BOOKLET.pdf Mexican Botnet Dirty Wars: https://media.ccc.de/v/camp2015-6795-mexican_botnet_dirty_wars Vietnam has 10,000-strong ‘cyber troop’: general): https://www.reuters.com/article/world/vietnam-unveils-10000-strong-cyber-unit-to-combat-wrong-views-idUSKBN1EK0XB/ Revealed: rightwing firm posed as leftist group on Facebook to divide Democrats: https://www.theguardian.com/technology/2021/jun/11/facebook-ads-turning-point-usa-rally-forge Credits Music by @co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

Why I don't use a SIM card and neither should you by #thehatedone

inv.nadeko.net/watch?v=4Dei2bu

Bckp.:

youtu.be/4Dei2buz1X0

The Hated One | InvidiousWhy I don't use a SIM card and neither should youSIM cards are dangerous. So I don't use them. Support my work: https://www.patreon.com/thehatedone I don’t actually use a SIM card. And I mean no SIM at all. No physical card, no eSIM. My methods of going about my digital life are very unconventional. This is not what regular people do. But because of my many years of privacy research and investigations, to me, it was completely normal. I understand the privacy implications of using a SIM. But to the uninitiated, not using a SIM for data and texts is out of this world. For friends and family, I use end-to-end encrypted messaging apps – for me that’s mostly Signa and Matrix. But even the freaking Facebook Messenger is encrypted now. There is no excuse to use unencrypted communication today and cell communication should get deprecated. For the rare instance when I need a phone number, usually for ancient services like a bank or the government, I do have a dumb phone that’s off all the time and is only on when I need to make a call or when I am expecting a text or a call. I also have a Faraday bag for when I am feeling extra cautious. For data, well.. I don’t use data. I use public WiFi when possible and when not, I download some offline entertainment when needed for longer routes. Usually getting a WiFi is not a problem as they are ubiquitous in every city – be it a coffee shop or a shopping mall. So this is why I don’t use a SIM and how I go about my life without it. The more people know about this the more secure we all get so share this video with those you care about in your life. SOURCES [references available in the transcript] [0] https://www.zeit.de/datenschutz/malte-spitz-vorratsdaten [1] https://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz [2] https://www.qualcomm.com/videos/5g-multi-cell-positioning-ota-demonstration [3] https://www.ericsson.com/en/blog/2018/11/lte-positioning-and-rtk-precision-down-to-the-centimeter [4] https://www.cisa.gov/sites/default/files/publications/19_0731_cisa_5th-generation-mobile-networks-overview_0.pdf [5] https://www.nokia.com/thought-leadership/articles/privacy-challenges-security-solutions-5g-networks/ [6] https://www.wired.com/story/5g-security-stingray-surveillance/ [7] https://www.wired.com/story/5g-more-secure-4g-except-when-not/ [8] https://harvardlawreview.org/print/vol-134/geofence-warrants-and-the-fourth-amendment/ [9] https://www.newyorker.com/news/news-desk/what-your-cell-phone-cant-tell-the-police [10] https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html [11] https://docs.fcc.gov/public/attachments/DOC-402213A1.pdf [12] https://www.engadget.com/fcc-fines-americas-largest-wireless-carriers-200-million-for-selling-customer-location-data-121246900.html [13] https://transition.fcc.gov/pshs/911/Apps%20Wrkshp%202015/911_Help_SMS_WhitePaper0515.pdf [14] https://threatpost.com/torpedo-privacy-4g-5g/142174/ [15] https://www.wired.com/story/torpedo-4g-5g-network-attack-stingray/ [16] https://www.ndss-symposium.org/ndss-paper/privacy-attacks-to-the-4g-and-5g-cellular-paging-protocols-using-side-channel-information/ [17] https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google CREDITS Music by https://www.youtube.com/@co.agmusic Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

#SignalMessenger continues to move along a #dark path.

First they integrated a #ShitCoin behind the back's of their users, which is a major issue regarding #Trust. If you were not aware of this, here is a great video overview by #TheHatedOne
bitchute.com/video/tJoO2uWrX1M

They still require a phone number to use their platform - like HELLO? Seriously?

And more recently we have more #Censorship lined up via the #SignalFoundation
city-journal.org/article/signa

Why are people still relying on this application??? ^_^

Replied in thread

@eloquence #SignalMessenger is moving along a dark path.

First they integrated a shitcoin behind the back's of their users, which is a major issue regarding #Trust. If you were not aware of this, here is a great video overview by #TheHatedOne
bitchute.com/video/tJoO2uWrX1M

And more recently we have more #Censorship lined up via the #SignalFoundation
city-journal.org/article/signa

InvidiousThe Huawei Backdoor ConspiracyDid intelligence operatives install backdoor into Huawei products? Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Huawei is the world’s largest manufacturer of telecommunications equipment and one of the top smartphone makers in the globe. The Huawei empire now sells products or carries the traffic of Internet users in 170 countries. And for over a decade, the Shenzen giant faced and dismissed accusations that they have pwned billions of users on behalf of the authoritarian Chinese government. Whether or not there is a Huawei backdoor must be thoroughly scrutinized before any conclusion can be made. Hard evidence is scarce. This is an analysis of all major accusations and allegations of backdoor planted into Huawei products. Sources 1. https://www.bloomberg.com/news/articles/2021-12-16/chinese-spies-accused-of-using-huawei-in-secret-australian-telecom-hack 2. https://www.statista.com/chart/16827/huawei-revenue-and-smartphone-market-share/ 3. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html 1. 3b https://www.forbes.com/companies/huawei/ 4. https://www.latimes.com/business/la-na-pol-trump-huawei-ban-20190515-story.html 5. https://www.techrepublic.com/article/evidence-of-backdoors-in-huawei-equipment-collapse-under-light-scrutiny/ 6. https://web.archive.org/web/20140423215024/http://www.afr.com/p/national/transcript_interview_with_former_KnS7JDIrw73GWlljxA7vdK 7. https://www.techrepublic.com/article/us-intelligence-chiefs-say-huawei-zte-products-pose-national-security-risk/ 8. https://www.latimes.com/business/technology/story/2020-02-12/huawei-equipment-has-backdoor-for-spying-white-house-claims 9. https://arstechnica.com/tech-policy/2020/02/us-gave-allies-evidence-that-huawei-can-snoop-on-phone-networks-wsj-says/ 10. https://www.wsj.com/articles/u-s-officials-say-huawei-can-covertly-access-telecom-networks-11581452256 11. https://www.reuters.com/article/us-at-t-huawei-tech-exclusive/exclusive-u-s-lawmakers-urge-att-to-cut-commercial-ties-with-huawei-sources-idUSKBN1F50GV 12. https://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html 13. https://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html 14. https://www.microsoft.com/security/blog/2019/03/25/from-alert-to-driver-vulnerability-microsoft-defender-atp-investigation-unearths-privilege-escalation-flaw/ 15. https://www.bbc.com/news/technology-47800000 16. https://www.theepochtimes.com/microsoft-finds-backdoor-in-huawei-laptops-that-could-give-hackers-access_2863926.html 17. https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/ 18. https://www.nytimes.com/2019/01/11/world/europe/poland-china-huawei-spy.html 19. https://www.nytimes.com/2019/01/26/us/politics/huawei-china-us-5g-technology.html 20. https://www.nytimes.com/2019/01/12/world/asia/huawei-wang-weijing-poland.html 21. https://www.tomshardware.com/news/cisco-backdoor-hardcoded-accounts-software,37480.html 22. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3372669 23. https://www.washingtonpost.com/world/2021/12/14/huawei-surveillance-china/ 24. https://www.washingtonpost.com/context/huawei-surveillance-voice-recording-analysis/b6523eb9-c55f-436e-bd8f-b3f1aa35b36d/?itid=lk_interstitial_manual_27 25. https://www.washingtonpost.com/context/huawei-surveillance-location-tracking/ce666144-f027-4405-9702-27e317893f56/?itid=lk_interstitial_manual_46 26. https://www.washingtonpost.com/context/huawei-surveillance-xinjiang-surveillance/c7b9de8a-920a-4380-a3ff-5420abf8c594/?itid=lk_interstitial_manual_55 27. https://www.washingtonpost.com/context/huawei-surveillance-prison-and-detention-center-monitoring/2661eb99-270e-4d9d-8fd9-2e7857f6e95d/?itid=lk_interstitial_manual_35 28. https://www.engadget.com/2019-12-26-huawei-denies-75-billion-china-aid-report.html 29. https://www.wired.com/story/law-expert-chinese-government-cant-force-huawei-make-backdoors/ Further reading https://www.bloomberg.com/news/articles/2019-04-30/vodafone-found-hidden-backdoors-in-huawei-equipment https://www.zdnet.com/article/huawei-denies-existence-of-backdoors-in-vodafone-networking-equipment-brands-them-technical-flaws/ https://www.theguardian.com/technology/2019/apr/30/alleged-huawei-router-backdoor-is-standard-networking-tool-says-firm https://www.lawfareblog.com/risk-analysis-huawei-5g Credits Music by: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
InvidiousBecome Untraceable - How To Create An Anonymous Identity | TutorialBecome untraceable by creating anonymous identities. This is how it's done. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone The Internet is a giant network of privately owned spaces open to public, where every participant knows the exact identity and location of one another and where corporate stalking is a perfectly legitimate business model. If you are not okay with automated decisions being made about your every move, you should consider creating an anonymous identity. Anonymity is the most powerful mitigation strategy on a publicly observable network such as the Internet. It is the most direct path towards privacy. This guide will tell you exactly what you need to know and do in order to create and maintain your very own anonymous identity. The Internet is a privacy nightmare because every action is by default identifiable and linkable. That means actions always lead to a unique location and/or account on the network and actions can built a profile over time. Linkability and identifiability are your biggest privacy and anonymity threats on the Internet. For maximum anonymity, both of these threats need to be mitigated to the fullest extent possible. Our first step with any service will be to dissociate our account details from our personal information. The second step is to compartmentalize our anonymous identities so that they are isolated from our personal identities. Dissociation and isolation of your anonymous identities are not the only steps to keep your anonymity. Be extremely cautious of what types of data you submit to these services while using them. Always think of the linkability and identifiability threats when using these accounts. PRIVACY THREAT MODELING https://www.threatmodelingmanifesto.org/ LINDDUN strategy for threat modeling https://www.linddun.org/post/keys-to-successful-privacy-threat-modeling https://www.linddun.org/linddun https://www.linddun.org/_files/ugd/cc602e_cf7e4c6b1d894bdaabc3094c48b26869.pdf https://www.linddun.org/go-getting-started Linkability https://www.linddun.org/linkability Identifiability https://www.linddun.org/identifiability-1 Mitigation strategies https://www.linddun.org/mitigation-strategies-and-solutions RECOMMENDED TOOLS KeepassXC https://keepassxc.org/ Bitwarden https://bitwarden.com/ FIDO security keys https://fidoalliance.org/what-is-fido/ GrapheneOS https://grapheneos.org/ Orbot https://orbot.app/ Tor Browser https://www.torproject.org/ Tutanota https://tutanota.com/ ProtonMail https://proton.me/ Briar https://briarproject.org/ OnionShare https://onionshare.org/ Wire https://wire.com/en/ Matrix/Element https://element.io/ How to anonymously install applications https://www.privacyguides.org/android/#obtaining-applications Aurora Open Source Software https://auroraoss.com/ How to obtain an anonymous burner phone - The Intercept https://www.youtube.com/watch?v=r4gqRYkA9KE How to obtain an anonymous burner phone - The Hated One https://www.youtube.com/watch?v=vMJH-UJyENs NEWS SOURCES Google location tracking https://www.wsj.com/articles/states-file-new-suits-against-google-over-location-tracking-11643037890 Chainalysis https://www.coindesk.com/business/2022/08/04/chainalysis-estimates-2b-stolen-from-cross-chain-bridge-hacks-this-year/ Credits Music by: https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
InvidiousHere's How They Built The Most Secure Phone On The PlanetThe champion of privacy and security is an open source mobile operating system built by a non-profit. This is how GrapheneOS built the most secure phone on the planet. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone GrapheneOS: https://twitter.com/GrapheneOS https://github.com/GrapheneOS https://grapheneos.org/donate Gabe (guest on the podcast): https://twitter.com/flawedworlddev https://github.com/flawedworld A secure mobile operating system is built on top of a complicated software stack whose every single building block is isolated to enforce the strict security policy. All system components and processes, third party apps and services are separated from one another in a multi-party consent of developers, users and the platform itself. This is known as an Application Sandbox and it is how Android designed its architecture. GrapheneOS is a non-profit security research project that focuses on hardening privacy and security features of the operating system while maintaining usability at the same time. GrapheneOS adds to Android’s defense in depth by protecting against exploits abusing unknown vulnerabilities, so called 0day exploits. These exploits are being sold legally by malware brokers for millions of dollars because crafting them requires a high set of skills and experience. GrapheneOS has made such a vast number of improvements it would be impossible to cover them in one video. Many of GrapheneOS’s enhancements have been adopted by the mainstream Android itself. The research project maintains an extensive documentation on all the important features many of which were missed out by this video. Sources: [0] https://source.android.com/security/authentication [1] https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/ [2] https://en.wikipedia.org/wiki/WannaCry_ransomware_attack [3] https://arxiv.org/pdf/1904.05572.pdf [4] https://tribune.com.pk/story/1423609/shadow-brokers-threaten-release-windows-10-hacking-tools [5] https://www.wired.com/story/new-mac-ransomware-thiefquest-evilquest/ [6] https://www.zdnet.com/article/this-sneaky-ransomware-is-now-targeting-linux-servers-too/ [7] https://www.zerodium.com/program.html [8] https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/ [9] https://source.android.com/devices/architecture [10] https://source.android.com/security/overview [11] https://developer.android.com/guide/platform/ [12] https://source.android.com/security/features [13] https://source.android.com/security/app-sandbox [3] https://arxiv.org/pdf/1904.05572.pdf [14] https://developer.android.com/training/articles/keystore [15] https://blog.google/products/pixel/introducing-google-tensor/ [16] https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html [15] https://blog.google/products/pixel/introducing-google-tensor/ [17] https://safety.google/intl/en_us/pixel/ [18] https://grapheneos.org/faq#encryption [19] https://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html [20] https://www.yahoo.com/gma/san-bernardino-shooters-apple-id-passcode-changed-while-234003785--abc-news-topstories.html [21] https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/ [22] https://source.android.com/security/verifiedboot [23] https://source.android.com/security/verifiedboot/device-state [24] https://source.android.com/security/verifiedboot/boot-flow [25] https://grapheneos.org/features#auditor [26] https://attestation.app/about [27] https://grapheneos.org/features#exploit-protection [28] https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/view#gid=0 [29] https://source.android.com/devices/tech/config/filesystem [30] https://source.android.com/security/selinux/concepts [31] https://source.android.com/security/selinux/ [32] https://grapheneos.org/features#improved-sandboxing [33] https://grapheneos.org/usage#sandboxed-google-play [34] https://grapheneos.org/faq#hardware-identifiers [35] https://grapheneos.org/features#closed-device-identifier-leaks [36] https://grapheneos.org/features#wifi-privacy [37] https://grapheneos.org/features#network-permission-toggle [38] https://grapheneos.org/features#sensors-permission-toggle [39] https://grapheneos.org/features#exploit-mitigations [40] https://grapheneos.org/features#attack-surface-reduction [41] https://grapheneos.org/usage#exec-spawning [42] https://github.com/GrapheneOS/hardened_malloc Credits Music by: White Bat Audio, CO.AG Music, Infraction, Yuzzy Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
InvidiousExclusive Interview With A GrapheneOS DeveloperThis is an exclusive interview with Gabe, a developer and a security researcher at GrapheneOS. GrapheneOS is a non-profit research project focused on developing the most secure production-ready operating system in the world. It has been recommended by Edward Snowden and is renowned among the security community for its industry leading achievements. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Follow GrapheneOS: https://twitter.com/GrapheneOS https://github.com/GrapheneOS https://grapheneos.org/donate Follow Gabe https://twitter.com/flawedworlddev https://github.com/flawedworld Timestamps: 00:00:00 Thanking Gabe for coming on again for the first time 00:00:31 What is GrapheneOS? 00:02:11 How GrapheneOS improves privacy and security 00:03:22 Why Pixel devices? 00:05:13 Explaining Titan M security chip 00:06:43 Resistance to brute force attacks 00:07:51 Insider Attack Resistance 00:10:36 GrapheneOS preserves Verified Boot 00:15:21 How GrapheneOS made Android more secure for billions 00:21:41 GrapheneOS ecosystem is growing 00:24:36 Talking about optimistic cahnges coming in the near future 00:35:53 Some of the best privacy and security features of GrapheneOS 00:45:00 Hardened Memory Allocator 00:47:03 How much more secure is GrapheneOS than Android? 00:51:59 GrapheneOS resellers 00:53:40 Removing microphones, cameras, sensors and Faraday bags 01:02:46 Future roadmap 01:09:05 Sandboxed Google Play 01:12:13 GrapheneOS is an anonymous phone - Hardware Identifiers 01:17:21 Need for an up-to-date device 01:32:18 Closing remarks and where to follow GrapheneOS Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
InvidiousMy Phone Is Anonymous NowI needed to anonymize my phone. This how I did it. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone I can’t trust anyone with my data. When I use a phone with a Google Account or Apple ID, these companies are by default going to be collect unique hardware identifiers, my location information and app usage data without possibility to opt out. If I want to use a phone I need to choose one that is going to allow me to use it completely anonymously and let me be in control of all of my data. I want to a phone that maintains Android’s security model and keeps the best security practices for security updates. GrapheneOS has a far-reaching number of substantial improvements that altogether make up for the most secure mobile operating system for the end user. Because I want to keep this device as anonymous as possible, I do not even insert a SIM card at all and use the phone as a WiFi-only device. To protect my IP address, I use Orbot to route my traffic through Tor. Sources [1a] https://www.phoenixnewtimes.com/news/google-geofence-location-data-avondale-wrongful-arrest-molina-gaeta-11426374 [1b] https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html [2]a https://www.abc15.com/news/region-west-valley/avondale/valley-man-suing-avondale-police-for-false-arrest [2b] https://azcentral.com/story/news/local/southwest-valley/2019/07/31/jorge-luis-molina-says-avondale-police-used-google-data-wrongfully-arrest-him-murder-joe-knight/1873878001/ [3] https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data [4] https://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining [5] https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html [6] https://www.wired.com/story/geofence-warrants-google/ [7] https://www.fastcompany.com/90452990/this-unsettling-practice-turns-your-phone-into-a-tracking-device-for-the-government [8] https://harvardlawreview.org/2021/05/geofence-warrants-and-the-fourth-amendment/ [9] https://transparencyreport.google.com/user-data/overview [10] https://www.apple.com/legal/transparency/us.html [11] https://www.apple.com/legal/transparency/ [12] https://apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not [13] https://www.apple.com/legal/privacy/data/en/apple-id/ [14] https://arxiv.org/pdf/1904.05572.pdf [15] https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/ [16a] https://grapheneos.org/usage#sandboxed-google-play [16b] https://source.android.com/ [17] https://grapheneos.org/features [18] https://grapheneos.org/faq#supported-devices [19] https://grapheneos.org/install [20] https://grapheneos.org/features#privacy-by-default [21] https://grapheneos.org/faq#hardware-identifiers [22] https://source.android.com/devices/tech/config/device-identifiers [23] https://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracy [24] https://theintercept.com/2015/02/19/great-sim-heist/ [25] https://grapheneos.org/features#wifi-privacy [24] https://theintercept.com/2015/02/19/great-sim-heist/ [25] https://grapheneos.org/features#wifi-privacy [26] https://guardianproject.info/apps/org.torproject.android/ [27] https://support.torproject.org/about/ [28] https://tb-manual.torproject.org/bridges/ [29] https://medium.com/supplyframe-hardware/bluetooth-indoor-positioning-and-asset-tracking-solutions-8c78cae0a03 [30] https://grapheneos.org/features#network-permission-toggle [31] https://grapheneos.org/features#sensors-permission-toggle [32] https://caslab.csl.yale.edu/publications/matyunin2018zeropermission.pdf [33] https://www.zdnet.com/article/hundreds-of-apps-are-using-ultrasonic-sounds-to-track-your-ad-habits/ [34] https://support.apple.com/en-us/HT204053 [35] https://support.google.com/accounts/answer/27441?hl=en [36] https://grapheneos.org/features#improved-user-profiles [16] https://grapheneos.org/usage#sandboxed-google-play [37] https://source.android.com/security/encryption/file-based [38] https://grapheneos.org/faq#encryption [39] https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html [40] https://www.nytimes.com/2018/06/04/technology/facebook-device-partnerships.html [41a] https://www.reuters.com/article/google-apple-int/google-to-stop-using-apple-tool-to-track-iphone-users-avoiding-new-pop-up-warning-idUSKBN29W1VM [41b] https://9to5google.com/2021/06/02/android-personalized-ads-opt-out/ [42] https://www.wsj.com/articles/you-give-apps-sensitive-personal-information-then-they-tell-facebook-11550851636 [43] https://www.cnet.com/tech/services-and-software/facebook-receives-personal-info-like-your-heart-rate-from-popular-apps/ Credits Music by: White Bat Audio
InvidiousThe Splinternet | This Is How The Internet DiesSupport independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Many academics are sounding alarms that the death of the unified global Internet is already happening. More and more countries are voicing their desire for digital sovereignty and techno-isolationism. Experts are worried this cyber-balkanization is creating a multi-verse of national Internets and corporate walled gardens that they refer to as the Splintertnet. If Internet can be understood as a worldwide network of all networks, Splinternet would be the opposite of that. It is when nations stop participating in the ICANN consensus and begin assigning their own IP addresses. It is also when governments setup nationwide firewalls to restrict free flow of information to and from the country. Both of these trends are already well on their way to create the world’s first Splinternet. Sources [0] https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-computer-networking.html [1] https://www.icann.org/resources/pages/effect-2012-02-25-en [2] https://www.icann.org/resources/pages/what-2012-02-25-en [3] https://techonomy.com/welcome-to-the-splinternet/ [4] https://www.economist.com/briefing/2010/09/02/a-virtual-counter-revolution [5] https://www.technologyreview.com/2022/03/17/1047352/russia-splinternet-risk/ [6] https://edition.cnn.com/2022/03/03/tech/ukraine-russia-internet-icann/index.html [7] https://www.bloomberg.com/news/articles/2022-03-10/russia-internet-isolation-accelerates-after-ukraine-invasion [8] https://fortune.com/2022/03/22/russia-war-ukraine-great-firewall-splinternet-internet/ [9] https://www.reuters.com/technology/russia-disconnected-global-internet-tests-rbc-daily-2021-07-22/ [10] https://www.reuters.com/article/amazon-cloud-idUSN1E7A727Q20111109 [11] https://www.statista.com/topics/4418/amazon-web-services/ [12] https://www.statista.com/statistics/216573/worldwide-market-share-of-search-engines/ [13] https://about.facebook.com/meta [14] https://www.nytimes.com/2019/04/27/technology/apple-screen-time-trackers.html [15] https://techcrunch.com/2021/03/04/apples-app-store-is-now-also-under-antitrust-scrutiny-in-the-uk/ [16] https://www.theverge.com/2019/10/9/20907228/apple-quartz-app-store-china-removal-hong-kong-protests-censorship [17] https://www.nytimes.com/2017/01/04/business/media/new-york-times-apps-apple-china.html? [18] https://www.reuters.com/business/oracle-says-it-has-suspended-all-operations-russia-2022-03-02/ [19] https://finance.yahoo.com/news/russian-splinternet-014035581.html [20] https://www.theguardian.com/technology/2017/may/22/social-media-election-facebook-filter-bubbles [21] https://qz.com/1194566/google-is-finally-admitting-it-has-a-filter-bubble-problem/ [22] https://www.washingtonpost.com/world/asia_pacific/the-walls-are-closing-in-chinafinds-new-ways-to-tighten-internet-controls/2017/09/26/2e0d3562-9ee6-11e7-b2a7-bc70b6f98089_story.html [23] https://techcrunch.com/2019/03/13/the-splinternet-is-already-here/ [24] https://www.ft.com/content/ba94c2bc-6e27-11ea-9bca-bf503995cd6f Peer-to-peer services Briar: https://briarproject.org/ Cwtch: https://cwtch.im/ Credits Music by: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

#Important# Message, Mobile OS #Security, Bitcoin, Listener Questions | Closed Ntwrk w/ The Hated One | by #thehatedone

yewtu.be/watch?v=ECb-MtshGrM

Alt. link.:

youtube-nocookie.com/embed/ECb

InvidiousImportant Message, Mobile OS Security, Bitcoin, Listener Questions | Closed Ntwrk w/ The Hated OneSupport independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps 00:00:00 Important message about our funding and business model 00:19:09 We need the freedom to point out the flaws in any product 00:25:54 Privacy is always evolving 00:28:26 Taking listener questions 00:30:00 Why is GrapheneOS so much more secure than other operating systems? 00:39:58 The Hated One and Closed Ntwrk Spar on disagreement over Android privacy 00:55:10 Why GrapheneOS is the most secure OS 01:04:20 Closed Ntwrk explains the difference between CalyxOS and GrapheneOS 01:12:20 Listener question 01:33:10 The Hated One and Closed Ntwrk go to war with each other over blockchain and cryptocurrency 01:57:00 Closed Ntwrk defends blockchain decentralization 02:26:08 The Hated One doesn't believe blockchain is the solution. 02:45:50 Explaining why Odysee doesn't solve the problem of centralized platforms 02:56:50 We should strive towards a permissionless system without blockchain 03:02:00 Closed Ntwrk calls The Hated one's bullshit on Lightening Network 03:16:50 The Hated One admits he is full of shit 03:26:40 We will return Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
InvidiousYouTube Has Blacklisted My ChannelYouTube is refusing to suggest my content to my subscribers and wider audiences. This can't go on. If you value my videos, please support my independent work on: https://www.patreon.com/thehatedone I have never trusted YouTube. I have always considered it a necessary evil for this channel. YouTube search function is used more often than any other search engine except for Google itself. YouTube is unavoidable. And this happened because YouTube used to be better than the alternative – the cable TV. Today, YouTube has been corrupted and commercialized to the point it’s becoming worse than TV. All videos are riddled with ads and half of those videos are ads themselves. Either sponsored, or affiliated, creators looking for ways to make easy money online. YouTube is a multi-tier system. You see, if you want to make it big on YouTube, you have to play by the rules written by the algorithm. Because MrBeast’s formula is so successful, every channel now has to emulate it. Whether it fits the content or not. The algorithm learned this is the only content that works right now. So every YouTuber under the sun is doing it. There is no integrity. Every YouTube video now has to be a shocking and outrageous clickbait. The dick-sucking facial expressions are totally ubiquitous now. An anecdotal evidence: Here’s a personal finance channel that adopted the cock-throating technique and gets tons of views because of it. Here’s another personal finance channel that didn’t adopt the technique and didn’t get the views because of it. The line between entertainment and education is gone. It has been erased by the YouTube algorithm. Every video has to be a sensation. Anything short of that will fail. On average, I dedicate anywhere between 5 – 10 hours of work for every minute of my videos. 5 – 10 hours of extensive research, scripting, recording and editing. Most of my videos barely earn $100 or $200. I let you do that math. So small creators cannot rely on YouTube ads for their revenue. That’s nothing new. Just take sponsorship money and sign up for affiliate programs. But that’s the problem with over-commercialization of Internet content. Just consider what my content is. A lot of my videos are recommending tools and services for people to use to protect their anonymity, privacy and security. In many cases, their safety and even lives may depend on the integrity of this information. Signing up for commercial services means now I’d have to craft my recommendations around the profit incentive of my sponsors. Which is exactly what’s happening to creators that fall down this route. Now they will tell you that corporate influence is not tainting their recommendations. But unless they are inhumanely immune to incentives, that’s just not the case. Would you trust a journalist that takes money from big oil to talk about a war in the Middle East? Or the energy industry? You wouldn’t. So why is it okay for YouTubers to take money from companies they are supposed to be the most critical of? If I want to criticize the big tech, government surveillance and failure of authority; if I want to make recommendations on what people should do to protect themselves from unjust overreach by corporations and states, then viewers should be the ones that hold me accountable. YouTube is killing my channel. So what are my choices? Right now I only have about a 170 patrons. That’s not enough to cover a professional editor for high quality video production. But with 500 patrons, I could hire a part-time editor to not only increase the quality of my videos but also make them more frequently. With 1,000 patrons, I could go out into the field with a small crew and produce full-length documentary features. This is the ultimate goal of this channel. This is the only solution I can make peace with. It’s when you, my audience, step up to produce my content. You can sign up for my Patreon-only podcast with a private RSS feed to listen to up to two episodes a week. If you stick with me for three months or longer, you’ll be sent a piece of merch designed by me as form of gratitude for your loyalty. Currently I make stickers, mugs, hoodies and shirts. I am even considering experimenting with Briar and Cwtch for group chats and forums for my highest tier Patrons. So this is my special plea to all of you. If you want this content to exist, if you want me to keep making more videos, become a producer of The Hated One channel. Become my patron at patreon.com/thehatedone The fate of this channel is in your hands. Credits Music by: White Bat Audio: https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
InvidiousHow To be Anonymous In A Protest | Burner Phone TutorialIf you want to attend a protest, you have to become unidentifiable. This is how you do it. Become a producer of independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Police now have the ability to harass protesters with arrests, threats and coercion all the way back to their homes and offices. Attending a protest with a phone will now tell the police exactly who are you, who you communicate with and where you live. Your phone has four main radio signals, all of which can compromise your security: • Cellular radio – is your phone’s most revealing data point. Your SIM card has a unique IMSI number that is broadcast indiscriminately into all directions. The police can capture this number with so called IMSI catchers, find your real phone number and even intercept your calls and SMS texts. • WiFi – is the second most common data point. Police can setup a rogue hotspot to trick your phone into connecting to it without you noticing and they can start monitoring your traffic in real time. • Police can also use Bluetooth beacons to catch your phone’s unique identifier. They could also try to exploit known Bluetooth vulnerabilities to attack your device with malicious payload. • GPS is broadly used for precise locations services, but this one is the safest data point. Your phone is only a receiver of GPS signals and doesn’t transmit any information. Your phone may, however, store GPS coordinates, which may be revealed to the police if they capture and unlock your phone. Surveillance is the best tool to silence dissent. This is why if you care about your cause, you are going to have to care about protecting the identity of you and your fellow protesters. Your goal must be to become unidentifiable. What follows is a comprehensive guide to become anonymous in the street. The goal is extreme anonymity and no middle-ground compromises. This guide will be split into two parts – Digital security, and physical security. Make sure to follow and understand every step in both of these parts as they are both equally required to remain anonymous. Sources EFF's guide on attending a protest: https://ssd.eff.org/en/module/attending-protest IMSI Catchers: https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks - Stingrays: https://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/ - https://www.wired.com/2014/06/feds-told-cops-to-deceive-courts-about-stingray/ How to prepare your phone for a protest: https://themarkup.org/ask-the-markup/2020/06/04/how-do-i-prepare-my-phone-for-a-protest Protest privacy - photos: https://themarkup.org/ask-the-markup/2020/03/12/photos-privacy Burner Phone tutorial by The Intercept: https://theintercept.com/2020/06/15/protest-tech-safety-burner-phone/ Rogue WIFI hotspots: https://www.forbes.com/sites/andygreenberg/2011/07/28/flying-drone-can-crack-wifi-networks-snoop-on-cell-phones/ Dataminers spy on social media: https://theintercept.com/2020/07/09/twitter-dataminr-police-spy-surveillance-black-lives-matter-protests/ Anonymous Twitter account: https://theintercept.com/2017/02/20/how-to-run-a-rogue-government-twitter-account-with-an-anonymous-email-address-and-a-burner-phone/ Facial recognition in Hong Kong protest: https://www.nytimes.com/2019/07/26/technology/hong-kong-protests-facial-recognition-surveillance.html List of all apps and services mentioned (no affiliation) GrapheneOS: https://grapheneos.org/ - Download: https://grapheneos.org/releases - Install: https://grapheneos.org/install F-Droid: https://f-droid.org/ Orbot: https://guardianproject.info/apps/org.torproject.android/ Tor Browser: https://www.torproject.org/ Aurora Store: https://f-droid.org/en/packages/com.aurora.store KeepassDX: https://github.com/Kunzisoft/KeePassDX Tutanota: https://tutanota.com/ Protonmail: https://protonmail.com/ SimpleLogin: https://simplelogin.io/ Aegis Authenticator: https://getaegis.app/ Signal: https://signal.org/ Briar: https://briarproject.org/ Wire: https://wire.com/en/ Anonymous Twitter: https://twitter3e4tixl4xyajtrzo62zg5vztmjuricljdp2c5kshju4avyoid.onion/ Scrambled Exif: https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/ ImagePipe: https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/ ObscuraCam: https://guardianproject.info/apps/obscuracam/ OsmAnd: https://osmand.net/ Credits Music By: White Bat Audio https://www.youtube.com/c/WhiteBatAudio Follow me: https://twitter.com/The_HatedOne_ https://www.reddit.com/r/thehatedone/ The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.