We examine typical approaches to mass surveillance as I imagine they would be implemented by any country. This is broken out in 3 separate areas of surveillance: Web traffic, Email, and Notifications. Rob Braxman reports.
Mass surveillance methods: cybersecurity primer
Tesla robot attacks engineer at factory!
AUSTIN, Texas (PNN) - December 26, 2023 - A Tesla engineer was attacked by a robot during a brutal and bloody malfunction at the company’s Giga Texas factory near Austin.
Two witnesses watched in horror as their fellow employee was attacked by the machine designed to grab and move freshly cast aluminum car parts.
Scientists claim they have had a 20-minute conversation with a whale
Say it could pave the way for conversations with aliens.
JUNEAU, Alaska (PNN) - December 18, 2023 - It might sound like a scene out of Avatar: The Way of Water.
But scientists claim it's now possible to have a conversation with a whale, following a 20-minute chat with a humpback whale in Southeast Alaska.
Solution to fix screwed-up Internet encryption
Web Encryption (HTTPS/TLS) no longer guarantees us any security or privacy because of the abuse by various stakeholders of the Public Key Infrastructure. Anyone currently can call himself or herself a Root Certificate Authority and intercept Internet traffic and strip away the encryption. In this video, I make a proposal that if implemented would eliminate the risk of a Man-In-The-Middle and "Make the Internet Great Again" (reducing mass surveillance). Rob Braxman reports.
New jetpack that can fly at the speed of a car goes on sale next year
PALO ALTO, Kalifornia (PNN) - December 13, 2023 - A new jetpack product called Jetson ONE made
its inaugural flight in the Fascist Police States of Amerika this week, and the company behind it says that it expects to begin deliveries to customers in 2024.
Incredible dangers to privacy in browsers
Most people do not realize the privacy risks in browsers and spend their time thinking about which browser is better. It's time for you to understand the flaws in every single browser and this has a significant effect on your privacy and security. Rob Braxman reports.
Programming failure in voting machines leads to election chaos
What you read and what the computer reads are two different things.
EASTON, Pennsylvania (PNN) - November 8, 2023 - A human programming error in a series of voting machines used this week in a Pennsylvania county has left chaos behind - and confirmed what many who have watched suspicious results trotted out in recent elections as absolute truth feared: electronic voting machines are susceptible to major errors.
Privacy attacks may be defeated by moving to Linux
Our basic expectation of private conversations using End-to-End Encryption is under attack. The Fascist United Kingdom just passed the Online Safety Bill and its intent is to bypass encryption via client side scanning. But we can fight back with Linux. Let me explain how. Rob Braxman reports.
Commentary: Reality is escaping out the back door
by Patrick Wood
September 27, 2023 - There’s a big word that you can add to your vocabulary: Simulacrum. It is a hard word around which to wrap your head, but one you are not too likely to forget. Indeed, you should not forget it!
How to build your own Faraday cage
This video shows three ways that you can build cheap but effective Faraday cages. These could help you protect important electronics from an EMP (electromagnetic pulse).














