Tor Did NOT Get Hacked, UP Smartphone Looks Like a Honeypot
ฝัง
- เผยแพร่เมื่อ 8 ก.ย. 2024
- In this video I discuss the recent false positive windows defender caused for the Tor browser, and the Unplugged Smartphone developed by Eric Prince and the developer of Pegasus spyware. It runs a proprietary version of Android as well as proprietary messaging, VPN, antivirus apps, and more. Due to the phones proprietary nature with software that you can't see the source code of, modify, and run as you want I would not recommend it.
My merch is available at
based.win/
Subscribe to me on Odysee.com
odysee.com/@Al...
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
"The Patriot Act was well intentioned"
I just about got blinded by the glow.
🤣
You're looking at it wrong. From your point of view (good for the citizens) it wasn't. From their perspective (Good for spying on citizens) It was a resounding success and lived up to it's intentions.
@@OmniDan26lmao
lmao
🤣🤣🤣🤣
Trust him bro. You don't trust the guy who made a way to hack phones and sold it to the glowies? Come on bro trust him bro
Once you work for the firm, you always work for the firm. Sure you can take time off, but you’re a member for life
@@MidlifeRenaissanceManYep. Even if your family has them, you cannot be trusted
Trust who? This guy? The hacker? I trust neither. All this guy has done is make assumptions about a phone he doesn't have. That's the point I was trying to make. He is guessing at best. There is no phone that is free from being spied on.
Lmao…. “Trust him bro”…. This guy sounds like a mouth piece for the nsa.
"Trust me bro.... you ain't got a choice!" Ha-ha-ha
as soon as he said yes to proprietary, he literally made it crystal clear that this is a honeypot
fun fact about Erik Prince, he is Betsy devos' younger brother and the founder of blackwater PMC
There is no security by obscurity
Saying anti-virus earlier was as bad. That's a sticking plaster, if you have confidence in your security you shouldn't need it.
Is it really self reflection? To me it reads like "oh I worked so so hard in the game it deteriorated my mental health and made me do mistakes, woe is me!" It's like he's trying to use that as an excuse, it's only 10% apology, 90% emotional manipulation by making himself look like a victim of the situation.
th-cam.com/video/aG5Y3c8NRho/w-d-xo.html.BREAKALAGE BITCH
Especially since CalyxOS and GrapheneOS are already fully viable complete privacy options, its so obvious his proprietary option is a full honeypot.
right wing grifters always try to sell you on some absolute shite like this anyways, nothing new
@@robyee3325 "the phone that protects your freedom"
if only the grapheneos developer wasn't such a bad person
@@_eyawho cares, you're not trying to be his friend, you're using his code
@@_eya If I have to only use software from good people, I would not be using the internet.
We're living in the 'Post-Trust' era.
I don't even trust myself, or my family.
Your family has been compromised. They are sending your information to the feds.
When you get to this level wtf is the point of anything? Might as well go to Sweden and make an appointment with a self delete booth.
@@w花bI too don’t trust myself or my family. I think I stubbed my toe when I should have turned on the light in the dark hallway. Or maybe that time I burned my canna butter through a hole in a container because I forgot to wait for it to cool.
And my ‘Mom’ always calls me asking me what I am doing and I don’t get it! What, is she an agent reporting my movements back to the glowiens? 👽
All I am saying is the tinfoil hat stays on. 🤡
@@w花bWho says?
You shouldn't put 100% trust into anyone, much less yourself. Intuition loves to lead us astray.
literally stopped the video to laugh for 5 minutes straight... "if you dont want to be spied on by this navy seal, black water, ex mossad, guy who hired the pegasus guy and now recently your new bestfriend..." maybe not that exact wording but Im literally dying from laughing so hard... thanks Kenny for being skeptical and prevent someone falling for something that has NOT be proven to be safe.... by hiding behind "proprietary" software... WHY NOT let the code be audited IF they ARE safe tho... just imagine Graphene OS changing policy from Open to Closed... people would run faster than the road runner the F away, as they should.
This phone glows brighter than the sun.
The Glider speaks the truth. Gamma +5
brighter than 3C 273
Can someone explain that to me? I want to understand the lingo, thankssss
@@kalef1234look up cia glow
@@kalef1234 It's slang originally coined by the schizophrenic programmer Terry A. Davis. His original term was "glow in the dark CIA s" but the term glowie has since been generalized to anyone associated with a federal agency in general and an intelligence agency specifically.
If you can't read the code, always assume the code is spying on you. And as someone who works/worked in the government he should know that...
He knows it
Even if you can read the code, it's frequently spying on you. The top contributor to the Xen hypervisor (used by AWS and GCP) was the NSA for a while.
Their are two sides of the argument. That also means that hackers can't access vulnerabilities. Again I am not defending closed source.
@@MODEST500well if hackers can find vunerabilities, security researchers can too. i would argue that open source makes it easier for the researchers to help fix it.
@@MODEST500 Decompilers are a thing. It may take lots of works, but they will figure out the specific lines of codes if there's motivation to do so.
"it's android based but it's all our code"
That's like saying "it's got an AMD CPU but it's all our hardware"
I wonder what moisturizer he uses, his skin is absolutely glowing!
It's a PLC based Stuxnet moisturizer
Uranium
he should use sodium and water as his moisturizer
Radium is brighter
Android is open source.
This only works with people who aren't tech savvy.
That phone would totally NOT send all your data directly to the NSA!
Just trust the guy who looks like a B-movie villain!
He acts the part too. Few men have as many war crimes under his belt.
If a phone is not made with a reprogramable FPGA on a risc-v architecture with a IMEI hopper I don't want it for privacy use.
@@interstellarsurfer what crimes??
Closed source: walk towards the exit
Rolled their own crypto: run towards the exit
Unvaxxed dating app: u wot m8
wot?
@@FJB2020 what
@@viainfindashorts wot means what?
@@FJB2020 i think so
The irony is that people who buy these phones need to pay 10$ a month just to be ' anonymous ' .However they'll pay that fee with their bank account . So those same monthly payments makes it rather convenient for law agencies to check the phone owner's identity trough that bank account.
Haha
Lmao, that's is SO on point😂😂🤣🤣
They aren't reading or seeing what's on your phone....the bank accounts another battle
@@blakeunage8058 No, I mean that the purchase of such a phone means 9 out of 10 times one wants to spend money to have dodgy conversations. So it's an indicator for further investigation. A contract only bring unwanted attentions
Guy who creates spyware sells a phone with spyware preinstalled. What a surprise 🤣
Thanks for 1k!
Pretty much google
Yea shocking.
@YAKUB_IHATEHUMANSsounds like copium in that instance.
How can we trust a person behind Pegasus that it’s really meant to be secure?
Hmm so it’s just a regular android phone?
@@quintrapnell3605still watching but im guessing with a bunch of closed source proprietary software?
"Offensive cyber virus" has the same vibe as "supercomputer-trained neural network artificial intelligence" in nvidia's recent marketing
What? Are you forgetting about all the defensive LAN viruses in the wild?
I'll do you one better: "Internet death machine" as 4chan was described
You forget that his security was trained by backpropagating quantum retro-encabulators
This is why we need to educate people instead of stomping on them because they never got tought how things actually work since all they know is because of ads and marketing.
Problem that economics system is not interested in it. It prevents milking. Stupid customer is good customer.
@@inevespace doesnt matter, its still failing, this socialistic version of "free markets" lol
I literally stopped the video to laugh for 5 minutes straight... "if you dont want to be spied on by this navy seal, black water, ex mossad, guy who hired the pegasus guy and now recently your new bestfriend..." maybe not that exact wording but Im literally dying from laughing so hard... thanks Kenny for being skeptical and prevent someone falling for something that has NOT be proven to be safe.... by hiding behind "proprietary" software... WHY NOT let the code be audited IF they ARE safe tho... just imagine Graphene OS changing policy from Open to Closed... people would run faster than the road runner the F away, as they should.
#trustmebro
@@specthegod Okay bro. I trust you to do weird stuff with my data.
@@propsekgamerprofile picture checks out
It's made and sold for a more trusting clientele. lol
Tor wasn't "hacked", but someone involved directly with the project in 2013 - or the host that stored the file for download had altered the security settings. This was on the instruction of law enforcement for Operation Onymous.
This guy is the most sane tech youtuber.
most based* tech youtuber
Frfr , he even touches grass daily
@corbinauriti7807spoke like a true redditor
@corbinauriti7807no one cares
@corbinauriti7807 We don't give a rat's ass what you're scared of.
>Uses Tor for privacy
>Also uses Windows which sends telemetry back to Bill Gates every time you try to uninstall Microsoft Edge
You can't have both.
Switched to the fat penguin os thanks to muta. it was the best choice I've ever made. hope more people stop using windows
I wish i could quit windows too
You're right on some level, however blocking incoming and outgoing net traffic on a domain or IP basis is trivial these days
Mammon.exe
@@star_ducki want to quit windows too, but i don't have storage to backup all my things and reinstall everything.
>Buy anti-spyware phone
>Open it up
>Spyware inside
Rule #7: Always be specific when you lie.
Rule #36: If it feels like you’re being played, you probably are.
Rule #3: Never believe what you are told. Double-check.
Rule #34: when all else fails, divert them with fap.
What book is this from?
NCIS. Agent Gibbs' rules
@@Jinnyfir 👍
@@IDvfyferengi rules of acquisition
I just looked into the phone a bit further and the CEO, the guy on that clip claims that phone includes IMEI spoofing to prevent being tracked which highly illegal and would mean that the wouldn't be legal in the US due to the phones not being FCC complaint. also I'm pretty sure that the original idea was closer to the freedom phone as the name that he originally planned on using was the "REDPILL PHONE" and yes it was stylized in all caps. also the phone has received backing from several silicon valley venture capital firms which I'd assume is why he renamed the phone.
Yeah I heard about the Red pill phone thing in an older news article about this phone but couldn't find an original source for it. I think the same article said they had a server hosting their software on a ship traveling around international waters in an undisclosed location connected to starlink satellite Internet to be extra super secure, but they still can't show us the source code.
The Q phone ???
@@MentalOutlaw security by obscurity is not real, it doesn't matter what they are doing with the source code it might as well be malware if we can't see it.
@@Entropy67especially considering Ghidra exists, it's not so easy everyone can reverse engineer software binaries now but anyone with a certain amount of knowledge can.
@@MentalOutlawYup, and it's a ship that they themselves built to be secure against outside forces trying to pick up on signals and data. The ship has a 10,000 qubit quantum computer on board, also built by them, none of the parts were made in China, all hand made quantum parts by tool man Joe here in a garage.
Their independent audit is a joke. A rubber stamp from pwc consultant that says "trust us we tested with secure standards"
Imagine overpaying for a honeypot when you could have some crisp open source OS on a pixel at 3/4 or less the cost.
Yup. Got a pinephone as my backup/hacker phone. Multiple OS's and I can pull the battery out and sim card. ;)
🤔 I wanna do this sometime. Any advice, recommendations, tutorials?
@@josephbrandenburg4373 Mental outlaw has a tutorial on installing Graphene OS. You need a Google Pixel phone for it, you can get a refurbed 6a for like $150 or less, or go for something better, whatever suits your needs.
That would be my first recommendation if you want something DIY, simple and with most of the perks. It's also cheap and a fun project, at the very least. I used my old Pixel 4 for it.
Good luck tho, there are a few solutions and they are pretty worthwhile if this is something you think you'll care about
@@Rock_Appreciator i guess you posted a link or something and yew tube boinked it
"One ought to design systems under the assumption that the enemy will immediately gain full familiarity with them" - Shannon's Maxim. Proprietary as security means worse security.
showing how to build your own android OS would be a good video
Absolutely this. It would also expose every hack company trying to sell you some "PatriotPhone" or something.
Being spied on by those phones is the least of your worries. You'll get lethal radiation poisoning within days from the intensity of the glow.
DEEPFAKE GETTING BETTER GOOD JOB MENTAL 🤖🔥🤖🔥🤖
💀💀💀
Need Libre podcast asap.
Ah yes, this is only the 3rd or the 4th "totally not a honeypot" phone, I'm sure this will not be revealed as a honeypot like the others
It's actually 100d chess darwinian criminal opsec training; if you catch all the dumb ones the rest will learn eventually
Did that freedom phone nonsense turn out to be malicious as far as we know? It seemed like it was just some scheme by a silicon valley used car salesman to upsell a lazy android bundle as something special. I certainly wouldn't trust them but it didn't seem like they'd put the effort in to do more than that even if they wanted to.
We got this new phone. We promise its not a government honeypot. BTW, its great for the unvaccinated and maga supporters. Don't tread on me! 2A! lol
They’ll be handing them out for free to all of those guys at rallies, plus drug dealers etc etc hahaha
Of course it’s great for them, they’re the exact sort of sucker who pays $1000 for the privilege and buys the shit a guy like Erik fucking Prince is selling. If you know anything about Prince, you know exactly what this is, a low effort Freedom Phone 2.0 for the guy who goes to gun shows. If you don’t know anything about Erik Prince, his “reputation,” or how he got that reputation, I suggest you look into it. Anyone willing to have him on their show isn’t a serious person. Anyone willing to let Prince come on their show so he can hawk products to their audience isn’t a trustworthy person, much less a reliable source of information. He’s not just an incompetent clown. He’s an evil, incompetent clown. A guy who frequently elicits moral objections among mercenaries ain’t a guy you want to do business with.
finally a phone for the real citizens of the US!
😂
Also remember to water The tree of liberty, fellow patriots
Lmao don't act like the government gives a fuck about either of those 2 groups
>Don't trust big tech
>"The PATRIOT Act was well intentioned"
50,000 roentgens of radiation from that glow
Debian iso was flagged by defender yesterday... My friend told me when he tried to download it.
Microsoft probably doesn't want you to leave the big tech ecosystem. Anyways, always verify the iso.
You all have no clue how big this new cyber warfare threats are . Govts probably trying to nip problem actors in the butt before they emerge …
Comcast sent out piracy notices for people downloading Ubuntu with a torrent 😂
I see you're trying to get sound treatment for that room. An area rug would do wonders. Also, those triangular foam pieces are more for Bass. Acoustic panels are better for midrange / high range sound reflecting off of flat surfaces.
I'm probably just gonna end up making my own from Rockwool next time I go to home Depot
@@MentalOutlaw Learn about mycology before spinning your own. Aflatoxins are much more common than the healthscare system would have us believe. Source: Trust me bro and also Cardiac Aspergilloma.
Just make a fort under your favorite cushions and blankets. Great acoustics, comfy, totally invisible to ghosts and monsters
@@MentalOutlaw Put your jerseys up the wall
@@MentalOutlawYou can buy eggs in bulk and use the foam that they come in. It performs almost the same as those fancy foam panels!
What I hear is that some of the TOR exit nodes that are compromised as well as many of the "Markets."
It's been that way for some time. Anyone can run an exit node.
The point of multiple relays is no one knows both ends. Potentially compromised if one operator controls enough nodes. And from exit node to endpoint should still be encrypted.
You absolutely need to expect exit nodes to be hostile. Not that long ago, exit nodes were downgrading connections to market sites from HTTPS to plaintext HTTP and rewriting cryptocurrency addresses in the traffic to addresses they controlled. End-to-end encryption is as critical over Tor as any other transport.
"Boomer mercenary glowie repacks Android on a phone and slaps 'proprietary' as a feature. "
The Trust Me BrOS
With an LGBTFO meet up app
Underrated comment fr
The dude can't stop rubbing his hands together. I wonder who could be behind this?
Just a happy merchant selling his wares.
Hey guise, let's cool it with the personal opinions about a group of people who have been historically blamed for things that nobody is allow to talk about. I mean just because images of "Gendarmerie seizes historical Torah in Turkey’s Mus" seem to indicate something, it's nothing we need to concern ourselves with.
@@interstellarsurfer🎩👃
You've been putting out bangers recently keep it up!
@KGBMajorValeriP your profile screams delusional communist, but it's not a problem
He looks like a fed
yea defiantly.
"We wouldnt build pacemakers that could be hacked" "Dude trust us bro" "Governments surely wouldnt want control over the lives of their citizens"
while talking about specs (~22m into the video), you state that the cpu may be more secure than google or exynos chips because its using arm cores, I believe the cpu listed there is the mediatek dimensity 8050 (same specs), furthermore both google and exynos base their chips off arm cores
That phone is a whole beehive 💀
Luke Smith always keeps us up to date! Thank you Luke Smith for doing everything for the community! ❤
Luke Smith is here to deliver smiles
he's a clown, but his linux and tor takes are good.
@@yeetyeet7070elaborate?
Is he still simping for eastern orthodox Christianity?
@@CarrotConsumer he's simping for a terrorist
you kind of gloss over this in the video but graphene OS is actually going to be one of the most secure options you can find because you can have a fully trusted software stack
Secure from trusted isn't exactly a logical conclusion. Although most secure is synonymous with unsecure, so perhaps you're technically accurate.
@@Mr.Beauregarde he means you can enroll your own signing keys in the bootloader on the phone so it only boots your firmware. It's just another layer of defence
@@marcogenovesi8570Is there anything actually stopping somebody from doing this with Calyx?
mental outlaw lowkey mocking windows users by saying "the gov didn't hack tor" despite the gov spying on them as is regardless
Lol they just set up the relay servers .
They managed to get that domain in 2023, impressive. That must not have been cheap.
The Glowiest Glowie To Ever Glow Glowlingly, Glowed Again? I am SHOCKED, SHOCKED I tell you.
What a funny coincidence. I re installed Tor today because I have a new Set Up and it immediately flagged Tor and I was slightly confused and just tapped yeah wanna keep it
Your mistake was your choice of OS
I happened to recently compile tor and obfs4proxy from source a couple of days ago, those dont get flagged at all.
Must just be a windows thing, and not every release.
TOR was made by naval research laboratory, aka if the NSA ever wanted to find you on it they could, it was never a question of if it was possible as it was possible since the inception of TOR, rather it was a question of how much resources ie compute they wanted to allocate to figuring out who you were aka are you an important enough target to allocate X amount of $$ to compute to get the job done, that’s it. Anyone trying to say anything else doesn’t know what they are talking about and needs to read up on mathematics, cryptography and physics and fill in the gaps in the right places aka know what current technology is and what advances have been made in certain fields of mathematics or rather lack of published papers after certain dates, like its truly not hard to piece it together…. Just like with the building of the atomic bomb, all of sudden America just stops publishing papers on XYZ it wasn’t that hard for any other country to figure out what the US was doing during that time… same thing can be done with today’s technologies races…. Cheers
@@metatron5199the source code is open source. You’ll be able to see if the NSA is fucking with you if they could. But they can’t unless they use a deanonomymising tor exit node or if you visit a domain that they control which has malware on it.
@@metatron5199 it was made by the government. clearly, it glows in the dark and SPIES on you, whether or not it is open source!
The idea that his CTO is the creator of the pegasus malware but that he just wanted to do a support service. If we believe that, which we shouldn't, but if we do anyway, their CTO found a zero click exploit and intended to publish it to the public without informing the vendors, to provide it support. That is like finding a gas leak in a house and deciding to lit the fire because the people might want some marshmallows.
Who the hell would buy a "privacy phone" from the founder of a private militia that commits war crimes?
Ackshually..... Private militia does "war" on the behalf of governments.
"It's a private company, it can do whatever they want" was invented during Nuremberg trials. :D
The bit about him creating phones for the pacemakers is very interesting to me. I have a pacemaker and in the past the company (Abott) sent me some random Samsung phone locked down to only access the app that connects to my pacemaker. Now I have it on an app on my iphone (which I regret and I’m planning on switching back at some point) so this is something I need to look more into lol. Ironically the pacemaker was part of what got me into cybersecurity. Want to make sure no one can hack my heart
Well, at the point of him saying "propietary" my trust went from 1% to 0%
Tbh if you are being very privacy oriented… there should be no AV and def dont run windows…
Or just don't use a computer.
@@thestig007Dunno dude, using proprietary software and trying to maintain privacy at the same time seems really dumb to me, as was explained in the video
@@thestig007 That's Industrial Society and Its Future tier right there.
My bioluminescence radar is going nuts, I mean I'm seeing levels never registered before
This is going to be ANOM but instead of the cops doing it, it will be a private company charging them to access the data.
Classic case of: Solution Looking For a Problem.
It's $949 for a Chinese clone phone with all proprietary firmware software all redflags
The only free machine in this world has to be Stallman's laptop, lol
imagine the smell
Probably just another subtle way Microsoft tries to force people to use Edge.
Edge sucks btw lol
The $10/month to guarantee data privacy sounds like a protection fee
Idk why people say “it’s open source so you can trust it because you can audit the code” like the vast majority of people can read that specific language and know what they’re even looking at. It’s still a highly specialized skill that even people who can read the code could miss it
Remember the attack on the Linux kernel by that US university?
They didn't catch those patches and they know the codebase.
If Tor devs were compromised you can be certain that the patch that does it will be an attack like that. It does not make any sense to be blatant when you're attacking Tor when the entire point is to get access to the continuous use of that service.
I just want a couple hours of Kenny ripping on Erik Prince
Tor hasn’t worked for me for the last 3 days, I still couldn’t understand what was going on, I used different bridges, etc. It didn’t even occur to me that Windows Defender blocked it until I looked at it myself, and usually it reports that it’s blocking something, but here it’s just a block and no notification, thanks for saying.
You did such a great breakdown!
As a security guy, gave me a McaFee selling antiviral kind of feel.
This guy had a strange speech pattern and body language for someone being honest. Hes holding back something major. A few dupers delight smirks too. Wouldn't use this phone in a million years.
Glowing brighter than the unmatched power of the sun
MO is FED confirmed NOD
Egads man, you may be on to something! I will up the ante with the vague inference he may be a German National Pigeon Society operative, commissioning all German Pigeons to spy for the Nazis.
Thanks for the in-depth analysis on this phone, you made some valid warnings. Making the Android software proprietary is a big no-sell point.
In an ideal world, shouldn't all software be open-source to ensure safety through transparency?
The guy's body language screams deception.
Ai model looking clean
Might as well get this phone and save on my electricity bill, it glows bright enough to keep my house lit.
No wonder they can talk with signal with their messaging app. Their FAQ says that they use matrix so they just using bridge to enable that. FOSS in spyware package sounds about right.
What do u mean??
Just got home and theres a MentalOutlaw vid??? Nice 👍
Its a honeypot phone
that guy gives me 99.99% a glowie vibe. I would not trust, trust me guy. this is absolutely a FBI / CIA back door. DO NOT BUY THIS. But funny for them, nobody has the money to spend so much on a new phone from an Unknown company lol anybody would spent that kind of money of a legit company haha
Care to share your thoughts on Veilid?
That phone smells like a honey pot.
🐽
What a wild crossover seeing Shawn Ryan podcast on here
Just give me a phone with no camera at all. With a microphone that I can either physically and or digitally mute. A phone that doesn’t spy on me and collect data/track me.
A smart phone that’s actually smart and innovative. With new tech hardware and software. A hardy, tough phone than can take a beating. A more ergonomic shaped phone. Not every phone has to be a thin rectangle.
I have so many cool ideas….
A phone that was designed to fit my hand like a glove, a phone that does what all the basics, but that is not too basic, like a dumb phone. A phone that doesn't emit anything harmful. A phone with a screen/display that doesn't negatively affect your eyes.
Most phones are literally the same. A thin rectangle with a camera and a touchscreen. They all use the same handful of OSs/software. Literally no hardware innovation.
just like other industries, the mega corpos like apple, samsung, etc. are all owned by the same ppl, the globohomos looking to do whatever evil thing it is they are doing.
Wheres the creativity? wheres the innovation??
It's almost impossible to compete in the phone sector. will you create your own chips? they wont allow you to. What network will your phone connect to? they wont let you connect.
Free ppl arent allowed to compete in certain industries, this is one of them. Just try and make a competitor, theyll find a way to stop you. If we allow them....
This phone’s going to need your SSN to unlock and your latest search history to reset your password!
I spend 99 percent of my time in Linux but I need to use Windows for University. A lot of the programs they use run like rubbish in a VM and Wine etc. If I wanted to ensure privacy and use Tor I would certainly not be running it in Windows. Do they not realize the point of Tor is completely lost when running it in Windows? I can't wait for the day I can delete my Windows drive but for now it can stay air gapped and used when absolutely essential to my work.
It depends who you're hiding from I guess.
Circumvent region-blocking?
6:17 "It's android based but it's all our code."
This kind of reminds me of "60% of the time, it works every time."
Like, it's all your code, except for the android code?
>Glow Prince: "nah bruh, you don't need signal - we have our own proprietary app for that. Trust me, bro - we'll never sell your info like we sold our bodies when I was still fighting age"
Let’s not forget that Apple now has a “feature”, which enables machine learning to analyze the screen buffer (aka screenshot of everything displayed on the screen) unencrypted. So, they can read all sensitive data.
I hope someone has already asked them for the source code for their open source-derived 'proprietary' operating system, to see if they are complying with its license.
Everything he says about supply chain and proprietary screams 'I don't know what I'm talking about'. The interviewer unwittingly hits the mark when he responds with 'incredible', these claims have no credibility at all.
They have a secure messaging system that absolutely
*GLOWS*
*IN*
*THE*
*DARK*
Onion
The website even reads like theyre copsplaining something to you. Like theyre saying a whole lot of words but the words have absolutely no meaning and skirt around the entire premise of the situation.
UP phone is a honeypot for pay-triots.
It is much better than this😏
Probably the phone itself is no less secure than any other device in its vicinity🤣
@@goiterlanternbaseyea fr no function is really secure its just how far do you want to take it
"It's an offensive cyber virus, used for hacking phones."
"Ok 😐"
Lol running tor on windows
Also lol, running Goldschlag code. Try not to hate me for that, I can't seem to stop playing where's Walderman.
Signal removed it because some countries wanted to regulate sms very weirdly... so to comply, signal just removed it entirely....
Explain how "weirdly"
This guy glows so bright i have to look away
I appreciate your time reviewing this phone. I would like to see a follow-up. Most people opening their eyes and waking up to what is going on are concerned. We do not know how to de google a phone, read code, access an onion server to browse the dark web or reprogram a phone and write our codes. Eric Prince is not a fanboy of government agencies, especially the Department of State. With all this being said, what are we supposed to do? Aside from myself, my whole family doesn’t have the time or the knowledge to do what you and most of your subs can do.
"What are we supposed to do" wanna know how to de Google your phone? Look up custom roms and learn wanna learn about the dark web look up tor and have fun trusting these sketchy snake oil salesmen will just get you scammed you don't need any coding expirence for anything I've just mentioned just need to spend 5 to 10 minutes on TH-cam and you can do it can't want to br lazy then act shocked when you get scammed tho honestly if your paying for a whole phone just cuz you don't know how to access tor you shouldn't use tor it won't end well just stick to a basic pager and try not to get any smartphone tbh
All this is hanging on the fact he was a Navy SEAL and survived Hell Week.
Doesn’t make him a tech expert or an elite hacker.
I was in the Marines, but that doesn’t translate that I’m the next Tony Stark or have thousands of connections with shady government officials in the NSA…😂
Secure is such a relative term.
I call BS on Erik Prince.
He fell into disgrace after his unit mercs went rogue during combat escorts shooting civilians with immunity.
Scott Helvenston was a reality show Navy SEAL (Combat Missions - one season) killed and strung on a bridge working for Prince.
You can also see some SEAL work out vids on TH-cam by Scott before he deployed.
RIP Scott Helvenston
Semper Fi
I've been waiting for a decent Linux phone but it seems we may still be a year or two away from something worth buying.
erik "trust me bro i ran a mercenary group that murdered civilians" prince
Your TH-cam really growing up, don't stop grinding
KENNY do a video on the current state of Linux phones.
Check out the big brain on enermaxstephens1501