End-to-End Encryption (E2E) is Dead. Killed By New Tech.
ฝัง
- เผยแพร่เมื่อ 3 ธ.ค. 2024
- Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be invented as approaches using apps from Signal, Whatsapp, Telegram and others will no longer provide this safety. This is something the 3-Letter agencies have wanted for many years. And they have gotten their way.
-----------------------------------
Brax Virtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the platform to see the store. You will not be asked for personal information to sign up.
-----------------------------------
Merch Store
my-store-c37a5...
-----------------------------------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
Support this channel on Patreon! www.patreon.co...
Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise
bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing
whatthezuck.net Cybersecurity Reference
brax.me Privacy Focused Social Media - Open Source
Please follow me on
Odysee
odysee.com/$/i...
Rumble
rumble.com/c/r...
I can see old hardware becoming quite valuable. Don't throw away your old phones and PCs, put them into storage like they're vintage cars or art collections.
I wish that were the case because I have a huge amount of old hardware due to being a Linux user who does a lot of PC salvage and repair.
Unfortunately, if people turn away from these "snooping devices" (which they should do if they have at least half a brain) then the evil corporations will simply take the "snooping bits" out of the hardware, or find another more secretive way of snooping. In either case, they will just make new hardware and the lemmings will buy it.
@@terrydaktyllus1320 Since almost everything is online, whatever access the networks, or has mics and cameras, or any other active ability, it can transmit info, without consent or knowlege. Ammendments and Right are thrown out of the window, in the name of what ?
It is people who allow this to happen, and anything else.
All I use is old technology. With Linux, that is a plus.
There is no need to worry...
The United States will be switching
To digital currency after
Thanksgiving.
If the election is. Canceled in
November, encryption won't
Matter because WE will all be
Searching for food, water and shelter.
I am currently using a desktop computer I built from scratch over 12 years ago. I won't change as long as it still works. I have some older PCs, and I might stock up on some processors and memory in case I need them in the future. I don't use cellphones, tablets, or laptops, so I don't worry about them. If I need a laptop, I have an old one, old enough that it came with XP. I've already put Linux on it as dual boot for a try out. As soon as I can get straight with software, I'll switch the desktop to Linux. But I use some specialized software that I'd have to run under WINE or other emulator until the software gets ported or rewritten.
When a criminal watches what you do on your device, that's malware; when the manufacturer watches, that's "AI" and for your "safety".
What if the manufactures intent is criminal? 😮
@@ianmiles2505 That's the Joke !
Um, it's the same people. The best criminals now own you and all your offspring.
If the feds can do it so can any enterprising or well funded criminal or government agency. No door is exclusive.
@@skald8981Exactly, regardless of whether it was an inside job or not, the Pentagon, Google etc have been hacked this decade. So... Nothing better than offering all the information needed for someone to steal your identity, kidnap your children, blackmail you... All of that, for your safety of course
Suddenly the nerd in town who can solder together Frankenstein phones without NPUs becomes the FBI's most wanted.
The tricky part is not the hardware, but having a team skilled enough to maintain the firmware to prevent spying. Espionage is a constant game of cat and mouse.
Anyone blocking stuff will be automatically flagged and monitored more heavily that is the future
@@ObamaoZedongtruth, good input
Time for LoRa Meshes to spawn everywhere
lol a few months ago, i actually was looking up how to make a raspberry pi phone. would probably get me arrested
Who tf is even asking for these virtual "assistants," without the option to opt-in or opt-out?
Not consumers, not a single one.
No one.
The governments!
Nobody
The new windows 11 load turns it on by default. Total garbage. I recommend moving to linux.
"Sacrificing Liberty through Security, you deserve neither" - Benjamin Franklin
These choices aren't always available in other countries. Most similar quotes are made by US citizens and only applicable in the US, or maybe a small number of countries.
@@bltzcstrnx the old me would have said to give those people guns so they can take their country back. Now, looking at America, I don't think the guns are making a difference.
Our Forefathers would, long ago, stopped ignoring the Tyrants of both parties who comprise The Uniparty.
Wake up America. The DNC & RNC IS our version of The CCP!
❤
@@imagitu6409 Don't worry the guns are. Trying to take over the US as the US Army would be quite difficult. Just think of the David Karesh coumpound, there's definitely other weapons caches.
"Rangers detail arms cache
Hand grenades and more than 1 million rounds of ammunition have been pulled from the ashes of the Branch Davidian home, a court document says.
By The Associated Press
1 min. readView original
Hand grenades and more than 1 million rounds of ammunition have been pulled from the ashes of the Branch Davidian home, a court document says.
Evidence of a stockpiled arsenal seems to support claims by federal agents who tried to serve the religious sect with search and arrest warrants for illegal weapons.
The document, filed Friday in federal court, is the first public accounting of what Texas Rangers have found in the charred ruins of the Davidian compound.
The Rangers, who are heading the investigation into the cult’s 51-day standoff with authorities and its aftermath, collected almost 2,000 pieces of evidence by late last week, the document says. That number does not include bullet casings.
Assistant U.S. Attorney W. Ray Jahn wrote in his report that investigators have recovered 200 recognizable firearms, numerous gun parts and tools that could be used to manufacture automatic weapons.
“Initial and preliminary examination of these weapons indicate they included (semi-or fully-) automatic weapons and two .50- caliber weapons,” Jahn said,
The document did not make clear whether the guns were legal semiautomatic weapons or had been converted for automatic fire.
The gun battle Feb. 28 erupted when agents from the Bureau of Alcohol, Tobacco and Firearms attempted to arrest cult leader Vernon Howell. Four federal agents and six Branch Davidians were killed.
Investigators have removed 78 bodies from the burned-out compound site."
Yeah the issue is the people need the ability to make their own hardware.
The notion about guns made sense back when it was created. But it needs to be thought of more like. The people have to have the same tools as those in power else they cant fight back as effectively. And these its not just that people don't have tanks and jets they don't have the compute or the political power to fight back.
At this point, I assume any online communication to be compromised. Only my thoughts are not compromised. Yet.
Are you sure?
I'm pretty sure I know what you're thinking right about now 😁
So what actions will you therefore take after making such an assumption? It's not the problem that matters, it's how you mitigate it.
@@terrydaktyllus1320 I have eliminated it by not communicating anything of major importance online. I play the gray man on FB with photos of flowers and animals. I never "check in" or tell where I'm going or any of that crap. I have accounts on most social media, but I don't post on them. I have an account here, but have never posted a video. If they cancel me, I'll get another fake email and make a new account.
@@terrydaktyllus1320 Don't post online anything that may put you in danger.
Definitely 4th and 5th amendment violation .
The problem is either nothing will be done or it will take forever to get to the supreme court. Even then, Law Enforcement will still do it unless they loss qualified immunity and their actions render criminal and a judge and a prosecutor have some backbone.
The Constitution was shredded decades ago.
Perhaps you wouldn't be at such high risk of that violation if you didn't use your real name on here? The first thing Rob tells you to do in his content is use a number aliases across the Internet.
Not the only country in the world
Definitely 4th and 5th gen warfare too.
Wow! What an EYE-OPENING video! I've read some articles regarding NPU chips but they never mention the potential risk of breaching the user's privacy & security like bypassing End to end encryption. Yes, the future is bleak for privacy & personal security activists. One of the band aid-solutions is as some other users' comments for this video says "Hang on to your old hardware!". Yes, it will work but for a short time only. Later, your old device will stop working! My greatest concern is not only big companies and governments will be able to see everything we do but also all the HACKERS will as history has shown. Thank Rob for such an EXCELLENT job!
It's not the NPU. It's the OS. Just wanting to make that clear. Explained in the future
@@robbraxmantech Thank Rob for your clarification. My question is it must be the combination of both OS & the NPU, mustn't it? For example right now, my old computer has Windows but no NPU chip therefore, Windows can't scan the contents on my computer by using the features provided by the NPU. Is that right?
@@mauriciolee7349I think same
@@mauriciolee7349 NPU is not required, it just makes the client side scanning faster and more energy efficient
@@mauriciolee7349im pretty sure, they can see your local stored data. Do you trust them? they dont need an npu. the npu is a tool to make it easier and establish total con....l
The new co-pilot feature it turned on with new OS push. I went in an turned it off at work, this does indeed pull keystrokes etc... This is a violation or personal rights. I have to use windows at work, but all my machines at home are linux and open source encrypted. All big tech companies are slime.
100% agreed. Stay away from this. If you want to use llm. Just host it locally and block it from accessing the internet.
“If you want a vision of the future, imagine a boot stamping on a human face--forever.”
-George Orwell
With a little six pointed blue star of remphan on it.
triangle and eye stamp
If that face is an emperor then its a win.
Jack London
Instead of just sitting there thinking about violent acts, why not use that time better and go de-Google a phone or something? Then you actual do something proactive to fight against that future.
Words do nothing in this case.
"he who controls the exit nodes, controls the traffic."
LOL- Exactly
@@ethiesm1 the 7th sense is a great book on this topic
Who controls the future now, controls the past.
But this woulnt be the exit, this is worse this is behind the entry node.
We are doomed - MF DOOM
DON'T PANIC, We still have stupid Australian politicians making stupid laws
Then don't live in Australia.
Australians are like Canadians
@@Patos619 We don't have a right to arm's. Kirribilli would have been captured if we were well armed.
-Australian politicians-
American feds
@@terrydaktyllus1320 the people who can are leaving, while immigrants are coming in, the talented are leaving for better living standards.
When I talk to this about my clients, they just don't seem to care. They said: yes it's been like that for long time. It's like they accepted it. It make me so angry.
Sheeps will be sheeps.
it is hard to fight life 24/7 - worn down - with no relief in sight
I see several people commenting about the "sheep" who are defeatists and who give up citing that "it's no use".
I agree with your frustration. But also consider how the opposition has demoralized people like us and our attempts. As somebody who is very privacy conscious, it can be exhausting when, after all, the opposition is constantly innovating and evolving to overcome our best privacy measures.
To put it another way, Jason Bourne is one heck of a character who makes for one hell of a movie. Could you imagine if you were Jason Bourne and had to maintain that same level of intensity for every waking (and technically sleeping) moment of your life? It's not sustainable. At least not when you factor in all the other stressors and rigors of life.
1. Make a living
2. Pay all the bills as inflation continues to eat away at your spending power.
3. Look after your kids and/or other dependent family members.
4. Feed yourself and those dependents high-quality food (at a time where you are actively being poisoned by low-quality, contaminated, or adulterated food). A whole other rabbit hole to dive down (in addition to the privacy rabbit hole) as it becomes more difficult to identify "good food" to buy.
5. Acquire a living space that will allow you to grow at least some of your own food.
6. Learn how to grow your own food.
7. Become more self sufficient.
Again, I am not proposing being a defeatist, but it is quite an undertaking as you can see how quickly life becomes a chain reaction of rabbit holes if we choose to go against the grain and still thrive.
I despise when people just shrugged when you talk about this intrusion.
They will when they been placed under arrest.
Normies do not like privacy. It implies additional effort and less convenience.
We love privacy in Europe. It's technically a protected human right over here.
@@lunaqueerThis video shows that is not entirely the case. EU governments are also taking part in this surveillance.
@@lunaqueerAre you being sarcastic? Because if not you have a lot to learn.
The reason why it is called the 'mainstream'. It is very strong current and takes almost everyone God knows where.
@@ShamanKish nice one.
Rob, don't worry about being called a fearmonger, you are like the watchmen on the wall. You call out if you see danger, what people do with it, is their responsibility. But if you stop calling no one will see the danger.
I will, because I go looking for danger myself. You can call me "The Danger Man".
Back in the day, the main advice was "never trust the cloud", now its "never trust closed source AI running locally"
It is still The Cloud, though a lot of AI processing goes on at The Edge, halfway between the user and The Cloud.
@@terrydaktyllus1320 Any of it is on someone else's hard drives. I keep everything I want to own on my own equipment where it's safe and sound, and where it will never cease to exist.
@@bite-sizedshorts9635 " Any of it is on someone else's hard drives."
Sorry, what is on someone else's hard drives? I wasn't aware that I had addressed this question to you - I was speaking to the original poster. You wait your turn.
"I keep everything I want to own on my own equipment where it's safe and sound, and where it will never cease to exist."
I didn't ask for your autobiography. Why is any of that of any interest to me? I have 42 years with computers, by the way, which beats your 40+ years. So run along, junior.
@@bite-sizedshorts9635 PS. Why don't you sort out your TH-cam channel first, instead of questioning me? Where are the "shorts - entertaining short format videos on many subjects" on your channel? I see no content on there. Have they "ceased to exist"? Did you really keep them "safe and sound", junior?
@@terrydaktyllus1320I am starting to believe that you're an AI.
In the EU the chat control law is still in the making, it wasn't completely rejected.
imagine that
EU legislation is never rejected. If the Parliament refuse to pass it, it just goes back to the Commission for revision and then back to the Parliament. Keeps going until the commission gets bored, they get the objections sorted, pay off the right people or the make up of the Parliament changes sufficiently to pass. The rate at which the EU parliament makes and passes laws means nobody can properly read them and look into them.
It's much like the old Soviet, where they're really a rubber stamp part of the system to make the people feel represented.
That's not right the EU Cord rould it unlawfull in any way shape or form just some stupid conservatives still try to pass that law that the can't Pass because it's against human rights
So thats why Apple has been bricking my old hardware with intentionally bloated, resource heavy software updates. I always thought it was just money, now its obvious its money AND power.
They do for many years, I remember about 15 years ago,back then, they sold Time-machine modules with built-in hard drives, you could choose from several sizes, I can remember deliberately choosing the smallest one with the thought of putting in a larger hard drive later.
That worked but shortly afterwards they had a firmware update for this, unsuspectingly I downloaded it, and you guessed it, then the whole time-machine module stopped working.
Promoting every time to download the latest OS, resulting in certain programmes no longer working. It drives you crazy.
It isn’t Apple though. It’s the government (people who think they know better than you) forcing them to do it.
Control
@@TwisterTornadodid you try to question the status quo
@@patrickpafarnis5798 Well that is wha tthe whole OCLP Community is working to prevent. I quite like my old-skool macs running Sonoma
I see a lot of old laptops running TAILS externally will be a thing in the near future.
I agree.
Can't they still monitor and do screen shots of that though?
No it’s not running on the system it’s outside on a usb. U unplug it’s all gone. You never actually boot the PCs operating system. Now they can track your movement and then look for devices such as cell phones in same proximity to determine who u r and maybe some servers that are registering traffic based on your habits. But u can still be anonymous if you really want however it’s going to require more due diligence on your part.
@@ashtonb32 ok got it! Thanks for explaining it!
Kodachi
This feels a lot like the scares that happened when TPM burst into the scene under the guise of easier encrypted shopping or whatever, and suddenly it became a requirement for Windows. In order to keep selling new motherboards, the manufacturers put switches in the BIOS to completely disable the things by default. They effectively neutered the TPM threat in order to keep their customers. Can we hope that manufacturers will make the right call again and disable NPU devices that nobody wants?
You need to break things down a little better.
When an OS "supports" a piece of hardware, like TPM or an NPU chip, it simply provides a "driver" that allows a userspace application to access and user that device. It's the application, not the OS, that does nefarious things with chip - therefore you only use applications you can trust, which essentially means using Open Source applications.
Intel Management Engine (IME) is a classic example of this concept. In theory, IME could be used to gain access to a computer, but there have been no real world reports of that actually happening - mainly because the deployment of "defence in depth" would stop it being used and you would need to install an application that could "talk" to the IME anyway.
@@terrydaktyllus1320 I had to skip some of the video due to the content bloating so unsure if I missed the explanation but from what I heard there was no explanation to explain how NPUs have or will have a back door. If hardware based back doors were covertly mandated by gov for "western" manufacturers, the concerns raised here would already be reality with existing hardware to access the OS. I welcome any comments to enlighten me
@@terrydaktyllus1320 The idea is that the OS won't just support NPU capability. The idea is that the OS with monitor every action and analyze it on the device and will send the potentially problematic stuff to the local authorities or something like that.
@@cyclemoto8744 A backdoor is always detectable because it puts packets over the network that can by sniffed and analysed - even if encryption stops the contents of packets being analysed, the metadata shows you where it's going to and what protocol it's using.
A piece of hardware relies on possibly three components - a driver, maybe custom firmware, and the an application to use that hardware. If the driver and application are Open Source, then nefarious activity can be checked. Custom closed firmware can't be checked but you can trace packets going over the network - so I would say the risk of any actual back doors being present in Open Source is extremely low.
@@ivailogeimara I am not sure what point you are making or answering here. The chances of that happening on Open Source software are near zero, because someone would see that it is happening.
Imagine the kind of personality required to WANT to peer into the lives of other people, for literally even the most mundane tidbit of info. SMH.
They want to peer into the lives of other people because it makes them money to do so - and money drives everything.
Pretty much any totalitarian government loves this. Look how china controls every aspect of its citizens' lives
Cambridge Analytica
@@terrydaktyllus1320Its not just money. It’s control. They think you pose a risk, and wish to make sure you can never do what they don’t want, and wish to take away the freedoms and liberty you have for that purpose. On the presumption of guilt, you are being surveilled, and on the presumption of guilt your right to self determination is being set aside. Some think because they have nothing to hide, it doesn’t matter.
The truth is, they have a right to be free from the observance and scrutiny of others if they wish it. If they are willing to do what is necessary to get it. Especially pertaining to their property, papers, and effects. Especially in their home. Every free man does. They don’t want or care to address it’s theft. They also want that power to use on others. And they don’t realize that everyone has something to hide from someone.
Whether it’s the time you ate an entire tub of icecream while crying. Or are actually a dissident to entrenched criminal element of government. Or merely strategizing to get a better deal for your business or employment. All of that is protected, on the assumption that the things you want to done with a lower least, will be pursued most vigorously by some. And by the least capable of using it appropriately.
It’s a good assumption.
@@terrydaktyllus1320 I'm talking about the personality it would take to do that - to even think it.
There is no scaremongering. The only use for this is total surveillance and control.
Follow you in around 5 years...
...must say.
YOU ARE STILL THE BEST ROB.
Do not change pls.
🙏🏼
then there's the freak possibility whereby the AI "takes over" your accounts, buying/selling stocks/bonds/options within your brokerage/bank account, cancelling all your relevant accs, etc.....or impersonating you to send illegal contents online so the 3 letter agency can charge you w/ a crime you never committed...
ugh... u made it so much worse than i realized. yup, hard times a coming. lets stick together and prep for the incoming nightmare
Yes, it's called "identity theft" and Rob's videos show you how to minimise the possibility of it. Do you people actually watch his videos?
@@TwisterTornado This isn't a discussion about me, sonny. Do try to keep up and stay on topic, there's a good chap.
Now, I believe we were talking about computers, privacy and encryption. In your own time then, my little privacy expert....
@@TwisterTornado Your current obsession over a complete stranger on the Internet is one step away from cyber-stalking. Seek help. Discussion closed.
@@terrydaktyllus1320 Yes, we've watched, and at least I am safe and have never been bothered by any type of electronic attacks in the 40+ years I've been using computers at home, including the last 30+ years since the internet was available to me. It's good that you know a few of the buzz words, but I doubt you have the knowledge and intelligence to do more than spout the words.
The AI won't just record, it'll make editorial decisions on whether you can even send your wrongthink. Want to make a problematic post, "Sorry, Dave, I can't do that."
They already delete your comments on YT.
the noose is tightening
Yes, for people like yourself who I suspect just type "dramatic" comments here without ever putting time and effort into making those changes that "keeps the noose as loose as possible".
new noose is good noose. American made hemp rope will not let you down. Hang in there!
@@terrydaktyllus1320 which clue gave it away that this guy doesnt try to change things? weird assumption just from that statement, pessimistic worldview, i tend to fall for it here and there too
@@harmonyinchaos6381 I've been here a long time, I've learned good things from Rob and can confirm the stuff he recommends works because I go try it myself in my own lab and in my real life. I don't just sit on my backside and talk about it.
Unfortunately, a lot of people in this group are what we say in a colloquialism where I am "all mouth but no trousers".
Anyway, I'm sure he's a big enough person to speak up for himself - though I am pleased he appears to have made a new Internet friend today who can act as his spokesperson. I wish you and he a very long and fruitful friendship together.
@@terrydaktyllus1320 We don't even know the names of the people at the very top of the evil control pyramid.
Normies and their stupidity through not wanting to think for themselves.
and digital money...they will love it....just🐑🐑🐑
Every bit of information you know has been given to you, there is no thinking "for themselves". It depends whether people believe the goal of these technologies is to harm them and most people don't.
Normies? Language of a person who thinks he's better than other people. You're not.
the problem is they think they are.
Us "Normies" aren't stupid, we are just ignorant to what is going on our devices. Most of us aren't software engineers that know how it all works. Most of us are too busy running our businesses, families and life to do all this research ourselves. Thank goodness for Rob Braxman to "awaken" us to what goes on behind our screens.
the open air digital prison is almost absolute now
And it can result in a virtual prison, w/o physical walls
High time to switch to Linux.
.... and Linux phones.
High time to just godark n switch off😋
What about open source Android (like Lineage)
"High time to switch to Linux.": It does NOT help if the Linux runs on a machine with NPU.
@@mpmpm That doesn't make any sense. NPU is just additional hardware alongside the CPU and the GPU.
Let me sum up everything in this video = Your phone, computer and vehicle are now your jailer keeping you in prison.
Welcome to hell
Purgatory
No doubt you are correct and thank you for breaking it down and keeping up.
Funny his OS list didn't include Linux.
Auto screen capture isn't new, apple was busted by accident last year by a tiktocker who demonstrated this and how they accidentally discovered this, the only thing this effects is possibly steganography. Only a idiot would trust either apple or Microsoft so they get what they get for trusting organisations that rip people off and make them pay to do it. If you tape up the cameras and modify the microphone by external micro clip ons for both microphone and speakers then and by then using the old ways of encryption they haven't got a dam thing, it also doesn't hurt to use the old flip phone to limit government intrusions as much as possible.
Old flip phones wont work on the mobile networks we use today right?
@@SmartfoolGB depends. Country and the amount they invest in the telecommunications sector but companies are bringing them back as they're cheaper to make and people are getting sick of being addicted to smartphones.
@@SmartfoolGB3G has been shut down in the USA so you would have to get a relatively new one
@@SmartfoolGB how secure you think those old signal/phones would be bro..
@@searealOG Very secure - the fact that they have limited functionality, tiny embedded OSes and very little data stored on them would make them very secure.
Thank you for still being comprehendible at x2 speed. Such a timesaver!
“This is the most exciting times in the world” seems eerily similar to Mao Tse Dong’s ominous, “May you live in interesting times”.
He never said that. It dates to an English writer in 1936.
I thought it was Chinese curse
@@bite-sizedshorts9635 As Aristotle said, “Let’s not let the facts get in the way of a good story” 🤣
Sounds like they have been getting our messages by reading the “notifications” for a while now
That's another opening and I've mentioned that in the past
They are building a digital panopticon.
it's been set long ago
Exactly what Adobe has been caught wanting to do with new terms change, to scan all uploaded images to their cloud for training ai and consumer safety. The game has started. Jumanji
And I'm supposed to be a conspiracy theorist. LOL. No theory here!
Thank you so much for this legitimate public service announcement, Rob. The effort and energy you put into these video is of great value in the moment and historically. The way the world is going is extremely sad / tragic / dismal / nauseating, to put it as mildly as possible. The first contraceptive to the worst-case-scenario birth of an utterly disgusting and un-liveable future is awareness.... and you are on the home-front of defence. Thank you again.
You are truly one of a kind Brax.
And in the digit world, you are nothing short of the superhero everyone needs but most have no clue they need you.
It's frustrated to be surrounded by people who just don't care. My husband is one of them. Thinks I'm silly and "paranoid". I don't understand why most people are happy to sell their privacy for a little bit of convenience.
It helps me to not be surprised anymore.
Thank you so much for uncovering this and starting public discussion on privacy and security, Rob! God bless you
You were right. Using both Matrix and Ejabberd since 2 years. Nice video!
That doesn't help if NPU scans what's on your device. Both image and text.
An NPU literally does nothing unless software is directing it. Just like a GPU. It is your responsibility as a buyer to make sure invasive code isn't being executed on the NPU.
Incredible that anyone still uses Windows or Apple. I'm a low-info comp user and even I've been using Linux for years. P.s. never owned a smart-phone. We need to make this a fashion for freedom.
Incredible that people who buy computers preloaded with Windows use Windows? That's silly. Why would anyone pay the Windows tax and then delete it for another operating system?
I am also usual user. At first Windows was just better. It was more beautiful, work good, have programs written for it. Since Windows XP it was all downhill, they look crappier every new version, have stuff that you don't need... Apple was trickier. It was advertised heavily. So I was curious. But when I heard they had hellish IP protection. So basically you can't just download and upload files from computer to smartphone without dances. So I thought apple was crappy. Android was much better. Then I get interested into digital drawing and was advertised on ipad drawing application. So I bought old ipad on low price and used it to draw. You mostly can't do anything else on this device. Then I stopped drawing and it just gathers dust somewhere
What do you mean by low-info? Just that you don't do a lot of advanced things on your computer? The only drawback with Linux is a lot of software doesn't (natively) run on it. I do a fair bit of media creation, music especially, Linux would greatly limit my choices of software.
It's easy, Linux simply never was better, it always had more problems and was quite hard to use without having to solve some problems all the time. It sadly didn't change to this day...
I don't think Linux will save you from this crap. Unless you deliberately use old hardware, your new pc will have an NPU and it will do its work regardless of which OS is running, it will simply bypass the OS and will 'phone home' independently. You could try to get hardware from trusted parties who say they won't put an NPU in their products, but will companies like that really be allowed to operate? If the law requires an NPU with every device, it will be extremely difficult to circumvent it.
I’m a senior level Information Security professional with many years of experience and I can’t find anything to disagree with. This looks like a very credible risk.
The nightmare keeps going... Send your asteroid, oh Lord !
"Or just educate the masses into installing Linux and de-Googled Android, Oh Great Cthulhu!"
@@terrydaktyllus1320 The problem with de-Googled Android is that no carriers (that I've tried) allows those phones on their network! I've tried Verizon, AT&T, T-Mobile, and Cricket Wireless. None of them allow it. Supposedly Patriot Mobile does, but they use Verizon and T-mobile towers and Verizon doesn't work well here plus our monthly bill would be 3x the price I'm currently paying. I can't afford that.
Bigger than an asteroid. It will be Mother Russia, who brings back all the US Democracy.
Really? Life is no longer worth living? You need to get out of your basement and get a life.
@@Michael_Lak That's not what that means, it means this person wants Christ to come and fulfill Revelation. Christians want humanity to stop suffering and stop the harms we do to each other. That's all. I pray Christ comes soon. It doesn't mean my life isn't worth living.
Easy - Don't buy devices that do this, patch devices that already do it, and create open source patches to patch operating systems to protect the people. Any OS doing this would be suicide.
Dont forget to do the physical - rfkill before the encryption and decryption. A chip that on activation break the line before the information packets get to the board.
Linux on self-built machines is the way of the future.
I can see these software updates on older phones no longer working to force you to purchase one of their new surveillance on you phones.
Don't be over concerned about updating older phones. If you're not a State target, it will be fine.
I wouldn't get "updates" on anything, not a phone, computer, TV, or anything else. If the machine is doing what you want, there should be no reason to change it.
@@robbraxmantechif you are a State target...?
Great video. I think we have to sensitise everybody in the world about tecnological surveillance. Thank you so much for your effort.
Thanks Rob, your information is always apreciated.
I understand the points you are making and agree with them, but there is a point where we become fatigued dodging all the security nightmares companies are posing. If there is not a major new alternatives it is almost impossible to keep on going around these "traps"
For some it is possible, however, it is very rare for an entire local network of people to exist who are all dedicated enough to security to uniformly adopt these measures to the extent necessary. That is the big cruz of it all; you can be a security wizard but if your normie friends all think you are crazy, or they are simply too lazy, your own efforts will be completely futile.
Going into a room and physically searching people and confiscating their electronics may soon be the only way to ensure security of any kind.
@@tackytrooper "For some it is possible, however, it is very rare for an entire local network of people to exist who are all dedicated enough to security to uniformly adopt these measures to the extent necessary." It's called open-source. Group effort for the common good.
@@brodriguez11000 Ahhh no the people want their pleasures until it is their turn on Carousel, a reference to an old movie.
You've been warning us for a long time Rob. Thank you for filling in the gaps on this topic. This is a real problem.
Thanks!
It is interesting you mentioned screen shots. That is what Microsoft wants to have every 5 seconds or so and they expect you to give up a lot of space for them too. It is that Recall thing that Microsoft wants to have on the computers.
Shit.
Glenn Beck went over the neural processing unit. Maybe more people will hear about this and a push will be made to demand a change or have alternatives offered. The police state is heavily involved in this push with their public-private partnerships with big tech.
The NPU itself isn't a problem. The NPU could be present on Linux with no bad effect. The OS is the one that loads the neural model. In fact it could be done without an NPU but because of performance, Microsoft, Apple, and Google choose to do AI work only on computer with an NPU or GPU.
Who is Glenn Beck and why should I care? Seriously, I've never heard of him.
@@terrydaktyllus1320 Glenn Lee Beck is an American conservative political commentator, radio host, entrepreneur, and television producer. He is the CEO, founder, and owner of Mercury Radio Arts, the parent company of his television and radio network TheBlaze. - wikipedia
@@terrydaktyllus1320 Have you ever heard of Google?
@@robbraxmantech I thought one of the functions of the NPU was to act independently to process data inside on its own and not rely on a server or a internet connection to feed back and forth from a centralized data center? So, it has the capability to independently suppress and censor information without outside commands and shape incoming data to the user. A police chip under the disguise of a helpful processor that speeds things up by doing front end data crunching. Big brother inside all devices.
Brilliant insight. You thought of the implications of all this new tech way back last decade.
Appreciate what you're trying to do. These big tech companies are getting out of hand. Privacy should be a right not a privilege.
The Patriot Act is the gift which keeps on giving.
the E2EE is still encrypted with a local NPU and/or hardware encryption, thats the beauty of it, without the hardware, the dataset is useless. is it possible to build a backdoor (or discover a side attack), yes. just like caching memory, pc's are vulnerable and have their own set of design flaws. once a device is trusted it can become a weakpoint, esp when you have root access and can disable things. then you can transfer the dataset and analyse it raw. more worrisome are the LLM's that are still in training and beta, those lack typically encryption completely or rely on weak software keys.
`True that'. I have a similar saying, "If a nuclear exchange is possible, given enough time -- it will happen".
Comfort and Convenience is the real religion in the USA
Everywhere sadly. And majority of people will just sign their rights away for the smallest bit of convenience. Things need to become dire before an average person will notice the jail cell built around them.
@@Caellyan They still won't care.
So true😉
“Unfortunately you’re only safe with Linux to Linux communication” ok then … Linux it is. Now is the time to promote Linux more than ever
I am an EU citizen living in Australia for about 6 years now, can confirm it is baaaaad here when it comes to any kind of privacy. Some states like NSW and Victoria are worse than others but on the federal level it's horrible, and people don't even realize they have 0 right to privacy in their own country.
Thanks for sharing this. You were right, again.
One time cypher pads and the cyphers make that null and moot, they're going to just get the letters and numbers, so they can do what they want, if you value encryption make your own cypher and one time cypher pads that can be flash burnt or dissolved, it may be slower with information exchange but it's mathematically impossible to crack hence why the 3 letter organisations still openly broadcast over radio for assassinations and other operations around the world with one time cypher pads because they're Mathematically impossible to crack, not one message by these organisations has ever been cracked by using a simple piece of paper and a pencil. Just send the message in code and they still will be safe. For every $5 million spent, there's a 5 cent way around it.
Have you taken your medication today?
And perhaps take the simple steps of not using the proprietary operating systems that force you to go into "James Bond mode" with some nonsense about "cypher pads".
Just start by installing Linux or FreeBSD on your PC-like systems, and de-Googled Android on your mobile devices.
...and, in your case, make sure you keep taking the tablets!
@@terrydaktyllus1320 lol ad hominem attacks don't bother me, and depending on your job it's required.... Duhhhh, it's not James bond, it's companies value security and have protocols for information exchange about their new beta testing, and considering corporate espionage is a growing business especially from China it's necessary, so have fun with that, lol big swing no ding,😂🤣
@@treesaremadeofwood2145 I stopped painting little faces around words that I write when I got to age seven and first learned joined-up writing. Just saying, I'd be inclined to take you a bit more seriously if you didn't write like a teenager who is still learning English language in school.
@@terrydaktyllus1320 like I said ad hominem attacks don't bother me, if words affect you than that says more about you than me but you have fun with that champ 😉😘😂🤣
I've heard about those but aren't they kind of limited in scope because the decryption key has to already be pre given?
And since the key can only be used once and then immediately discarded that means you would have to give a bunch of keys are in advance and then know which one to use for the transmission
Must have been around 2007 or so when I remember hearing about the 'Personal Area Network' concept that you described here. I wouldn't mind having a device that was just a 5G modem in my pocket tethered to a secure 'phone' to provide communications and camera so long as it isn't running anything from the big tech companies. The problem, as always, is one of getting everyone else to adopt the new method, hardware/software. After using LineageOS and now e/OS exclusively for over a year I am just shy of making a convert out of my wife... how am I supposed to get my parents, brothers, best friend, and anyone else to join in?
Why don't you just buy a Raspberry Pi, connect it to a battery, install Linux on it and go from there? You can use it as a wi-fi access point with RADIUS to provide authorization and authentication to chosen endpoints - and if you need to network a few of them, just use VPN tunnels between them.
It took me about 30 seconds to think up that solution for you - the technology that lets you achieve your end result already exists.
Wouldn't matter if your still using existing cellular infrastructure. That's been fully compromised since the day it was invented. And signal capture is the other shoe dropping on that idea even if somehow you ran your own cell infrastructure. It doesn't matter who's network you use. They all ultimately use the same network to get THEIR bandwidth, and every one of those at the head of the lines are ran by those you'd want private communication from. Hard place rock
It's unbelievably frustrating because if you are too persistent, then they just think you are a paranoid conspiracy theorist. Basically, they are asleep, lazy, and uncurious and there's not much you can do about that.
Recommend a good distro?
@@notyouraveragegoldenpotato If you can encrypt your data on a device where there is no client side scanning and it is using a robust algorithm then sending it over the "compromised" networks should be fine assuming "they" don't have back doors to decrypt the data. This assumes you trust the black-box chips like the baseband modem in your device and its proprietary RTOS to not be spying on the memory of the device through the bus regardless of the top level OS running on the CPU. I don't, really, which is why I would like a device with a modem and a device for messaging that only connects when it needs to send encrypted chunks of data. Doing anything else on their networks like browsing the web, well, of course that is inherently insecure because the architecture of the web is insecure by default.
Brilliant and scary at the same time! Thank you for sharing.
I swear to you, often when I've talked on the phone (iPhone), sometime after, the same subject I discussed on the phone showed up in my TH-cam feed.. Very creepy.
Thank you, btw, for this crucial information.
I hope a company in the future will profit off of privacy. profiting off of the surveillance of the modern world. Using linux for there laptops/desktops and if they sell phones as well. Having no NPU, or any other AI crap. luckily people on Linux are safe for now, but in the future who knows. It is a time to be alive for sure, and it sucks that the US government is turning into china day by day. I bet china loves all this AI stuff, easier surveillance poor Chinese citizens having to deal with this shit. Guess the US is next sadly :(
Are Linux users safe though? Don't forget about closed-source processors.
China has their own AI. AI news from China are "amazing": guys have military robots dogs, AI teachers, AI doctors...
@kotenoklelu3471HAHAHAHA😂
Is this not against the 4th amendment?
You think they care?
@@udaysingh9_11 Absolutely not, unfortunately.
It doesn't apply because of the third party doctrine. It's not your data.
No. The Constitution restricts the goverment, not private parties, i.e. Apple, Microsoft, etc.
@@closednetwork Not how *EU* Sees it, but Innovation is dead in US Anyway.
You’re so on point with your observation that the majority of people will not want to engage in the extra step for E2E encryption!
Folks are way too coddled by conveniences in this post-lockdown era. Worse than pre-2020!
We’re at the point where we can order groceries that’ll get delivered right at our doorstep. Fast food, other items, same-day delivery services, on-demand streaming, all has led to people being complacent, lazy and unwilling to put in effort into things like security.
Try getting a high schooler (much less an Adult) today to go for a walk in a state park! Nigh impossible.
We’re doomed as a civilization, but, as always there’ll be the few who’ll wait out the darkness.
As a wonderful line from one of my favourite movies, The Crow, “It can’t rain all the time.”
Hi, Rob. Thank you. I am new to your channel, and will be here with you to receive your insights and methods.
We live in a world of violence and deception.
Is the state on the side of the law abiding citizen?
Or is the state an agent provacateur?
Does the state need to know what is on our minds to protect us from criminal gangs?
Or are the criminal gangs black flag mercenaries who make us passive sheep. Are we robbed by corrupt politicians?
And if we are reformers, are we thwarted by a combination of white collar and black pajama criminals?
Who can say?
Who can watch the watchers?
What do we do to fully protect ourselves?
as a radio ham, I used to buy scrap radio electronics from a guy who scrapped all the UKs secret stuff, he had to demill most stuff, his scrapyard pallets told you exactly what they used to do before the advent of the internet, it was mostly radio related in mountains of high value scrap.
Even though there are definite invasions of our privacy all around us, the main thing to keep in mind is that we still can empower and educate ourselves as individuals and limit our exposure to privacy invasions by making ourselves hard targets.
As with anything, if you're an easy target of opportunity, you're just asking to be messed with.
I rather enjoy Naomi Brockwell's work in this regard.
The answer is to adapt and move along with the times, instead of choosing to throw your hands up and succumb to being left behind.
Absolutely and well said. You have to decide for yourself what the threats are first and then decide how you will mitigate them - and you need to be realistic about it.
For example, if you're a tax paying citizen in a First World country with a bank account, mortgage and credit cards, there is not a lot you can do to conceal yourself from your government anyway.
But you can restrict what data evil corporations try to take from you, that is an easier problem to start addressing - as per Rob's videos.
Time running out
I said it once.... I'll say it again..... Privacy is Dead and it's Not coming back....so sad 😢
I am sorry your privacy is dead, may it rest in peace. Mine is very much alive and healthy, thanks for asking.
Oh, please feel free not to repeat it. I got your point (a rather silly one) the first time.
Not if you talk in person or pass paper messages in person. The government has zero idea what happens on devices not connected to the internet ever. Everyone should get some computers that don't even contain the possibility of connecting. None of the desktops I own have wireless cards. Only one has a NIC so I can get on the internet with a direct cable.
What!? How is privacy gone!? Did they invent an AI that breaks SHA-256? NO, unless you buy a stupid product with an NPU chip, YOURE FINE! Assuming you already have good opsec of course
@@compsigh9275 He said it's less to do with the NPU chip and more to do with the OS.
@@compsigh9275Uhm you mean aes 256? Sha 256 is a one way hashing algorithm 😅
What about Samsung devices? Anyone know if they have a NPU chip being installed in their newer phones yet?
First time I've seen you... keep up the good work kind stranger ❤
Think ima just keep my s10😂
The Stasi would be Proud. East Germans could only DREAM of this technology
Skynet is back on track
(Terminator music 🎶)
I am starting to study cybersecurity, and sadly to say, there is a mechanism so called " Remote Access ", in which I believe the Big Tech has it, on our devices. ( What we buy is not ours )
Always use an old separate 586 computer to write and encrypt your message, do it in a Faraday bag, and never connect online with that old computer. Transfer your encrypted message via usb memory stick for sending out. Do not trust any encryption key unless you personally exchange keys at a key party.
The only use for a Faraday bag is that it looks nice if the colour of it matches your shoes when you carry it as a fashion accessory when going out to dinner.
nope. I trust only my old good soviet calculator
@crnknstn Then use a device without an AI chip. Or use one with an AI chip running Open Source software that you know isn't "phoning home" your personal data.
Hardware is only as good as the software running it.
Easy. What's the next problem you'd like me to solve for you?
@crnknstn "Your old device can be infected with regular code, no need for an AI chip."
Which device are you talking about? Please be specific. Give me some real world examples.
" Old device has old security, no connection to the internet so no way to update the security."
Nonsense, let me give you a real world example. I have a very old PCMCIA wifi card that only has drivers up to and including Windows XP. Even if I ran Windows XP, it would be useless because it only supports WEP authentication onto the access point, where the world has moved on to WPA2.
However, under Linux, the driver fully supports WPA2 authentication and I can run all the usual encyption over the connection.
In simple terms, you're wrong. It's the software that ultimately determines how usable old hardware is.
"The sophisticated modern device can pretty much guess your next move, make up some code that will pass through an old OS with ease."
That statement means nothing, I've no idea what you're talking about.
But run along now, you need to get me some real world examples of devices that have been infected with "regular code".
@crnknstn "Your old device can be infected with regular code, no need for an AI chip."
Give me a few real world examples of that. Show me you've done research on this.
"Old device has old security, no connection to the internet so no way to update the security."
A piece of hardware is only as good as the software or firmware driving it. I have a very old PCMCIA wifi card that isn't supported under Windows but works fine in Linux, and with the latest kernel and secure transmission methods. Your statement is incorrect.
"The sophisticated modern device can pretty much guess your next move, make up some code that will pass through an old OS with ease."
I have no idea what that statement means.
Each day it looks like AI has a much darker side…
Thanks Rob for this interesting topic, regarding Intel and AMD chips, they started to include the NPU in their chips a generation ago; in the case of Intel from its Meteor Lake architecture with an NPU of 11 TOPS, and in the case of AMD from its Zen4 architecture in the 7000 series with 10 TOPS and 8000 series with 16 TOPS of processing. However, Microsoft asked them to have a processing level of at least 40 TOPS in their new generations of chips for Windows Recall to work well.
Regards.
This is why radio and one time pads are still King.
Thanks Rob! 👍 Sharing.
I turned on Advanced data protection on my iCloud account. It hands over the encryption keys to me so Apple (allegedly) can no longer access my iCloud data. They deleted the keys on their servers, to the point that if I lose my decrypt key, all my iCloud content would be inaccessible. I’d like you to look into this to see what you think?
If they actually delete your keys then that is good... but I would not trust Apple to delete my keys.
When your future self commits a crime and the authorities want your iCloud content, you will find out😂
@@peterkoch3777 😂😂 find out the hard way
And you trust apple to have actually deleted them? Or to not have access to the content?
@@peterkoch3777lol true
This is not a new problem. If the underlying OS is compromised, you don't need AI to run intelligence.
indeed. It's a massive escalation of a pre-existing problem. Which is to say, still very much a problem.
The problem is that people accept it, they consent to AI survillance codenamed Copilot, or whatever. People want this software scanning all their shit for some stupid new features provided by such software
"This is not a new problem.": It IS a new problem, because now it is ALSO in the hardware!
Terrifying! Thank you for the info so we can do our best to be safe...
@Garys Economics Bravo mate. That was a clear and concise explanation of the status quo.
Will keep raising awareness. You keep going, your efforts are greatly appreciated.
Hacker groups need to break into private information of decision makers and publish that online, even for non-illegal stuff. They don't seem to care about other people, but maybe if they are the victims...
*Hackers* been protecting the ecosystem for a while now.
*Nation-state Hacker* ones on the other hand are a different story - Entirely.
And what if those bad actors obtain nuclear access codes or can shut down power stations? How does your theory work then?
Thanks Robert!
Technology will have us all, in the end, even those who would use it to control us will be under the tech monitoring thumb. 73
That's why we need to get away from some of the technology. I have offline electronics, a huge library of books, and the largest library of audio recordings in my area. I can turn off the landline phone and internet any day and be fine. I did fine before any of it existed, and I will again.
Technology also cures and treats cancer, stops people dying in car crashes and lets a lifeboat locate a sinking ship to save its crew. So what's your point?
Facebook guy have his camera taped.
You are greatly appreciated! Love from Canada!
This is an excellent video. I hope a lot of people put some serious thought into what all this means...
I would suggest that we all start holding onto our old electronics ie: phones, tablets & laptops etc. I have a strange feeling we will be needing them more than ever with the way things are going. Our future is headed in quite a dangerous direction and we're headed there fast!
Peace be amongst us all✌🏼
And everyone thinks their Bitcoin is safe.
No, I don't think Bitcoin is safe - that's therefore not everyone and therefore your statement is false.
I do think Bitcoin is ultimately a Ponzi scheme and I personally have nothing to do with it.
I know right. Hilarious to me.
Bitcoin is the biggest pyramid scam of the century
only if the other party accepts your coin, otherwise worthless
@@erkinalp "safety" and "value" are two different concepts.
We’re going to need to find out how to spay and neuter our machines 😂😆🤣
Linux and de-Googled Android. You're welcome, you can thank me later.
Or just keep using old ones. My current desktop is over 12 years old and works fine. I built it myself from scratch, so I know exactly what's in it. I have a UPS and surge protector and leave the computer on 24/7, so I don't stress anything. I also have backup computers.
@@terrydaktyllus1320 I don't use a cellphone/tracking device at all. It's nice not having to worry about any of it.
@@bite-sizedshorts9635 "I don't use a cellphone/tracking device at all. It's nice not having to worry about any of it."
Bully for you, but why do keep insisting on giving me your autobiography?
We've already established that I know more than you, junior, because I have 42 years in computers but you have 40+ years in them - and you wasted some of those pranking your boss when I just "buckled down" and did my job.
If only one could open up their phone and remove that chip
It isn't the chip itself. It's the AI agent that's the issue. The chip is just used to run the AI model quickly. The AI agent is in memory
@robbraxmantech so even a device without an NPU will have this AI agent as part of software updates/upgrades?
So the AI agent can still (try) to do its thing, but only bevable to do so slowly?
Thanks for the video. Great information. Just one quick comment on your environment - the frequently changing picture on your computer screen ended up being very distracting. It might be better to either turn it off or set it to change much less frequently. It probably doesn't bother many people - I just found it detracted from the video due to distracting me every 10-15 seconds by the end of the video...
Then make a smaller size 'window' of your damn browser and adjust it so you can only see him , numbnuts ....
Thanks for the detailed breakdown Rob. Times are getting scarier and scarier by the minute.