Technological Revolution

Elon Musk calls for one-day voting on paper ballots with no voting machines

Submitted by Freedomman on Fri, 10/25/2024 - 12:51

HARRISBURG, Pennsylvania (PNN) - October 20, 2024 - Elon Musk delivered remarks at a town hall on Sunday in Harrisburg, Pennsylvania, where he called out the rigging of our elections and called for elections with “paper ballots in person with ID.”

Attorney warns his voice was cloned by AI in phone scam that nearly tricked his dad out of $35k

Submitted by Freedomman on Fri, 10/25/2024 - 12:28

BOCA RATON, Florida (PNN) - October 13, 2024 - An attorney has issued a warning over an elaborate AI voice-cloning scam that nearly fooled his dad into handing over $35,000.

Safe alternatives to iPhones and Google Androids that don't track you

Submitted by Freedomman on Thu, 10/17/2024 - 15:11

There are many alternatives to privacy invading iPhones and Google Androids and the vast majority of the population does not know about any of these. We will show you the different options including Linux Phones and De-Googled Phones, and the variety of alternative OS options instead of iOS and a Google Android. Some of these options are stark compared to a normie phone but a great number are actually very usable and do not require you to be a caveman. Rob Braxman reports.

See video

Hackers make robot vacuums go rogue inside houses

Submitted by Freedomman on Thu, 10/17/2024 - 15:02

Ecovacs devices hurl racial slurs at US customers.

MINNEAPOLIS, Minnesota (PNN) - October 14, 2024 - Those robot vacuums are handy devices - until they allow strangers to watch your family, hurl racial slurs and torment the dog. ABC News of Australia reports that hackers gained control of Chinese-made Ecovacs Deebot X2s in the homes of Fascist Police States of Amerika customers. It's not clear how many devices were compromised, but the outlet rounds up examples from Minnesota, Los Angeles and El Paso, Texas.

A VPN is useless against these kinds of Internet ID threats

Submitted by Freedomman on Thu, 09/26/2024 - 12:57

Tracking people is now like rocket science. In the old days, just recording the IP address (which you can protect with a VPN) was good enough. Now the head butting between privacy believers and Big Tech continues and I will describe the many other threats that can identify you even when you hide your IP address. These are all threats in the Application Layer (OSI Layer 7) so this cannot be protected in the usual ways. There are solutions! But it requires discipline and understanding of what can be done by the opposition. Rob Braxman reports.

See video

Separating fact from fiction: how VPNs really work

Submitted by Freedomman on Thu, 09/19/2024 - 14:27

As a VPN Service Provider, I can tell you the truth about VPNs. They are not the end-all. They do not protect everything, and they can be vulnerable if you don't understand the limitations. This is a particularly important discussion for people in Brazil who are now threatened with a $9000 daily fine for using a VPN. Can you get caught if you use it? What can the government see? What does it really protect? Are there substitutes like iCloud Private Relay or other alternatives? VPNs are banned in other countries like China and Saudi Arabia. Can you use them anyway?

See video

Growth strategist exposes Google search manipulation for Kamala campaign

Submitted by Freedomman on Thu, 09/19/2024 - 14:14

SAN FRANCISCO, Kalifornia (PNN) - September 10, 2024 - O’Keefe Media Group on Monday released undercover video of a Google Growth Strategist exposing Google’s search engine manipulation for Communist pretender Kamala Harris’s campaign.

SQL Injections are scary (hacking tutorial for beginners)

Submitted by Freedomman on Thu, 08/29/2024 - 11:06

In this video, we’re learning one of the oldest yet most dangerous Hacking Techniques out there - SQL Injection. Despite SQL Injections being over 20 years old, they still rank number 3 on the OWASP Top 10 List… why? Even fortune 500 companies are still vulnerable to these attacks. In this video, NetworkChuck will show you how to run an SQL Injection attack. Running a basic SQL Injection attack is pretty easy but will often become more complex with trickier targets.

See video

Commentary: Fake images are everywhere now, here’s how to spot them

Submitted by Freedomman on Thu, 08/22/2024 - 14:16

by Andria Pressel

August 15, 2024 - As artificial intelligence (AI) continues to develop, it’s getting harder and harder to tell the difference between real photographs and AI-generated images.

AI can create everything from stunning landscapes to lifelike portraits in a matter of moments - and at first glance, they may appear perfectly legitimate.

In this age of misinformation, how can you discern if the images you’re seeing are real or fabricated?

Huge underground reservoir holds three times as much water as Earth’s oceans

Submitted by Freedomman on Fri, 08/16/2024 - 07:44

LONDON, England (PNN) - June 13, 2024 - Earth is a jewel of the solar system, painted blue by the vast oceans that hold the majority of our planet’s water - or so we thought. Most of Earth’s water, according to a new study, may actually be locked in a reservoir 400 miles underground.

Syndicate content