It is so in past that any processes go unnoticed, until at any point the accumulated critical mass causes a abrupt qualitative leap. Further inventions and method facilities are constantly created, implemented and disseminated. Initially, all of them service the intent of their creators, until it turns out that a full bunch of these inventions taken together can service something else that will completely change society. An apparent example is the smartphone, which is simply a fusion of dozens of inventions in 1 tiny device.
However, this smartphone, which has become an almost inherent accessory of everyday life, is itself part of a larger system. This overriding is the strategy of universal surveillance and control built by globalist capitalism. Since the resulting strategy includes the elements of everyday life that have been in existence for any time and well-known, there are no informing signs, we do not announcement the process, we ignore the signs and mock conspiracy theorists erstwhile they dare point out the dangers. And erstwhile we figure out where this is going, it might be besides late.
Vladimir Lenin erstwhile stated that the communists would hang capitalists on a line that the capitalists themselves would sale to them. By selling the rope, capitalists would make any profit, at least temporarily. We have worse.
We buy electronic surveillance tools against us, which means we finance from our hard-earned money.
So we're the ones paying for the line that they're gonna hang us with, or that they're gonna restrain us with, our privacy and our freedom.
I'm certain there's a reservation here. Speaking of global capitalism, I am not making a message about the existence of any sinister hidden command center coordinating various actions to collect civilian rights and freedoms in Western countries. It is not essential and there is most likely no specified thing, although the WEF (World economical Forum) pretends to have this role, but it is simply a subject in a long-term analysis. However, I am saying that the dynamics of the functioning of large corporations is precisely that they aim to completely submit to everything they can control.
The fall of the Berlin Wall is celebrated as the symbolic beginning of the era of universal happiness of planet freedom. However, paradoxically, it opened the door to the planet totalitarian system. This is due to the fact that with the fall of the east Block, the brakes disappeared, which reduced the growth of transnational corporations and directed globalists to keep appearances. In the context of the east Bloc in the Western countries, average people were cared for and stupidities specified as human rights or freedom of speech. Now it's no longer needed.
Big corporations strive for unlimited growth, have no human feelings and act like psychopaths. Our data, our behaviors, our emotions, all our lives and our deaths, war and peace, everything can be converted into money and power. And that's all they do.
Also, large transnational organisations like the European Union after the short-term emergence of the early years become biurocratised piers. Bureaucracy has a tendency to grow indefinitely, this growth stimulates and justifies itself by creating fresh and increasingly absurd tasks. He besides has an irresistible tendency to control and subjugate everything. By creating the institutions of the European Union, associated states have created a monster that will consume and destruct them. Let us compare the fewer first treaties on the free movement of people and the free trade region with the present meticulous and intrusive regulation of all areas of the economy and life. Unchosen Eurocrats regulation us, multiplying further directives and striving for complete control over all and all. This is simply a subject on an extended book.
This time, let's take distant our freedom from us through the amenities and gadgets we're giving ourselves. any cannot aid buying fresh toys, another smartphone with even more features, LTE Internets, 5G, smartwatche, smart TV, fridge or air conditioner connected to the internet. For convenience, we turn on another functions on the phones that we may not need, but we do it just due to the fact that they are. And so the strategy includes another devices and software that we bought. In addition, we gladly share information with different service providers. And they're not crooks and dark organizations impersonating those known as how they like to inform us now. actual but undetected dangers lie in contact with these known, official, certified, supposedly "safe" suppliers.
Once on the radio, I heard a writer talk to the author of the book on threats of surveillance and espionage allegedly caused by the increasing popularity of Chinese electronic equipment, and in peculiar Xiaomi mobile phones. They both approached the subject with horror, handling and taking Chinese threat very seriously, but someway they did not convince me of their concerns. The more so that they absolutely ignored the threat much closer and rather real, a large watcher, to whom most voluntarily transmit practically all their data.
It's a Google company. Almost everyone uses his search engine, and many usage Android, the operating strategy on phones. Many besides usage Google Chrome browser, which is known for its reasonably free treatment of user data. Plus, applications: Gmail, Google Docs and various other, all their mass on Android phones. Our data is posted on Google Drive, Google translator translates our texts, etc. And here's the paradox.
He's robbing us and writing everything down, and we're afraid of Chinese equipment.
In addition, it is worth remembering that the mobile phones of Chinese manufacturers usage Android operating system, And that's Bogie.. It may confuse the MIUI cover from Xiaomi or EMUI from Huawei, but even the heavy changed strategy was checked and approved by Google, this company is yet the owner and ruler of the system. If the Chinese are doing something, it means that the Google company allows them to do it, just as they let Tadeusz Rydzyk to do the Church and subsequent Polish governments.
The fact that Google collects all the data of users without their cognition and consent was painfully convinced by Chinese dissidents, erstwhile the freedom-loving corp sold them entirely to the Chinese government.
The Communist organization of China and Google are like 2 sides of the same coin.
Google is not the only supplier of products or services with uncontrolled access to our data. Many generously share their data with the “social” portals of the Fecabook type, not taking into account that in the ellipse of closest friends they have in addition to the Fecabook itself, or Meta company respective more American agencies in 3 letters, and Meta company itself can besides sale them to anyone if it so wishes.
The Chinese threat is real, but it has a different character. For example, it concerns phones and computers of any production on which the user uses Tik Tok or installed its application. For example, the authoritative president of the Republic of Poland uses the service passionately. The question is, does he do it on a service equipment with state-of-the-art information? Furthermore, the de-mining operation of specified services occurs independently of the maker of equipment and the origin of financing its purchase. besides in the case of the U.S. Army, the Tik Tok app, monitoring the deployment of combat units on an ongoing basis, represents a greater spy threat than abroad agents. And here, as usual, the origin of information is the users themselves and their location.
The information we give ourselves joyfully to companies offering alleged social networking sites combined with those that they accumulate without our cognition and consent constitute a powerful weapon against us. In addition to our entries and photos, our location is recorded and, erstwhile we are active enthusiasts of modern technology, besides financial and wellness data.
We should realize that, contrary to different opinions, paying by telephone is not the same as paying by card. Recording on the card is simply a key that gives only limited access to our financial data in the bank, mostly does not even evidence transactions made. On the another hand, the telephone is included in the global network with a device that combines different functions that we have no control over. The separation of individual applications is illusory. Without our knowledge, the telephone can collect and transmit different data about us, integrating data of all kinds into a complete communicative about us and our customs, including our biometric data.
Maybe the following message to the head doubting the scale of the threat. In the end, the settlement was concluded at $1.4 billion, so there was a suit in the game for much higher amounts of money, it wasn't about trifles. The suit was filed by the lawyer General of the State of Texas, which is an ugly utmost right. Guess if our caring Union can do something like this in defence of its citizens, or will it quietly agree with Meta about sharing our data with EU services?
Texas lawyer General Ken Paxton made a deal with Meta (formerly known as Facebook) for $1.4 billion to end the company's practice of collecting and utilizing biometric data of millions of Texans without legal permission.
This settlement is the largest settlement always obtained as a consequence of a suit brought by 1 state. Moreover, this is the largest privacy settlement always obtained by the lawyer General, a clouding $390 million settlement a group of 40 states received in late 2022 from Google. This is the first suit and the first settlement obtained under the Texas State Act “Capture or usage of Biometric Identifier” Act and provides a informing to all companies active in practices violating Texans' rights to privacy.
"After a vigorous pursuit of justice for our citizens whose privacy rights have been violated by Meta face designation software, I am arrogant to announce that we have reached the largest settlement always obtained as a consequence of a suit brought by 1 state," Paxton lawyer General said. "This historical settlement shows our commitment to argue the world's largest technology companies and to hold them accountable for breaking the law and violating Texans' rights to privacy. Any misuse of confidential Texans data will meet with full legal force."
In February 2022, lawyer General Paxton sued Meta for illegally capturing biometric data of millions of Texans without obtaining their informed consent, as required by Texas State law. Specifically, Meta's data collection violated the Texas State Act "Capture or usage of Biometric Identifier" Act ("CUBI") and the Deceptive Trade Practices Act. Paxton's lawyer General gave precedence to bringing large technology companies to account, launching respective historical initiatives, including antitrust lawsuits and aggressive enforcement of privacy laws.
However, of course, the biggest surveillance device is so common that the invisible Microsoft. It is so apparent that the tendering systems of different countries known for their large revolutionary anti-monopolitic vigilance, erstwhile purchasing software, are blind and do not request the presentation of alternatives, although specified ones exist. alternate software is cheaper, frequently safer and better quality. So what? The always vigilant public procurement strategy of the European Union has not yet opposed anyone who intends to buy Windows and its Office. Here the maker is simply the default, so there is no doubt.
Operating systems, office packages or Microsoft browser treat user data as their own, and they have deliberately programmed back inputs. respective countries saw the threat, stopping utilizing Microsoft products in public administration. Similarly, many institutions in different countries have resigned, including the United States. Officially, the reasons are supposedly of an economical nature, but national agencies and the U.S. Department of defence in another situations are not peculiarly cost-effective.
It is crucial that various U.S. safety agencies like Linux as an operating system. The incomplete list of organization Linux users is on Wikipedia website List of Linux adopters. It mainly contains information about countries and institutions that have changed operating systems comparatively recently. It lacks agencies specified as NSA, which practically avoided Microsoft products from the very beginning, utilizing Linux or BSD. The NSA task known as SELINux (Security Enhanced Linux) has been made public and serves to improve the safety of various Linux distributions worldwide. How to read on the website https://selinux.pl/
Although SELinux was to be strictly technological in nature, the designation he had encountered caused this technology to become highly popular in applicable applications. Currently, most Linux distributions already usage this technology or are adapted to usage it. Each of us is able to usage this technology, providing your computer with more safety from unauthorized access from the outside.
SELINux is simply a transparent set of rules for configuring and hardening the strategy to defend it from external access. It protects our system, but it would be very naive to think that it is perfect and protects 100% from all possible attacks. (Also before the NSA until they replace all competent staff there with others persons, but in accordance with the rule of non-discrimination and diversity, they will be able to circumvent our safeguards.
Every safety can be bypassed, especially erstwhile users are gratuitous. The bestseller of his time was a book by celebrated hacker Kevin Mitnick titled The Art of Trick. Subtitle I broke people, not passwords. Explains everything. possibly in the case of people, it's called fracture is an exaggeration. Mitnick, alternatively of struggling with the system, obtained information from careless people who were rather willingly, without opposition and without reflection shared it. As with service providers, most social media users, smartphones and smart watches share.
The wide audience is not informed about the threats and capabilities of operating systems, and the average user does not even consider a possible change. Already centuries ago, marketing replaced reliable information by suppliers and independent reasoning among customers. For this reason, alternate operating systems and software have long been effectively demonized so that they do not only spoil the interests of a legitimate corporation. In particular, we hear of the large difficulties allegedly associated with the installation and usage of another operating systems.
The fact is that presently independent Linux or BSD installation is not more hard than Windows installation. Furthermore, most users usage the strategy installed by the supplier of equipment or company IT. The ease of usage depends on the installed software, which in many cases is virtually no different. Moreover, any non-Microsoft software, specified as the Libre Office office package, can besides be installed under Windows to see for yourself if it's so difficult.
Computers and smartphones don't end. However, let us stick to gadgets that belong to our individual surroundings and which we supply ourselves. For example, the new-fashioned smartwatch offers the following features:
* Oh, my God * Improved Bluetooth connectivity with everything that has it;
* Oh, my God * anticipation to make and receive telephone calls – of course!
* Oh, my God * The anticipation of utilizing AI support to guarantee smoother integration with intelligent home and another connected devices. And the devil knows what else.
* Oh, my God * informing about sitting lifestyle – informs erstwhile to sit little and decision more.
* Oh, my God * Monitors heart rate, blood pressure, blood oxygen levels and reportedly contains a laser that can execute an ECG of the user – monitoring your wellness around the clock, 7 days a week, it supposedly saves lives;
* Oh, yeah * Step counter;
* Oh, my God * Dream manager – go to sleep and wake up at the optimal time for yourself, he will tell you;
Of course, the fact that the device is not full autonomous, so supposedly for our convenience it connects to the phone, makes it another part of the data collection network about us. Full integration That password explains everything. All the data on us and our behaviour combined with biometric data.
Unless smartwatch is yet to be bought or used, the smartphone will shortly become mandatory. There may not be a legal work to have it, but we can't do many things without it. Already respective cities in Poland, including Warsaw, are trying to quit physical tickets. Ultimately, buying a ticket will require having an appropriate application. We will not buy a one-time ticket without scanning the QR code in the car or bus. Of course, only electronic and name-only payment, despite the fact that cash inactive remains legal tender in Poland and is reportedly not required to legitimize in order to travel by public transport. Before that, however, without protests, we granted the city's authorities the right to decide which of the state regulations allowed for the traffic of cars could enter the city and which could not. Let us not be surprised, then, that now the totalitarian president of Warsaw will decide how and what we are allowed to pay for the journey.
A akin trend can be observed on the railway, which eliminates physical ticket offices at the stations. In this way, transport service providers for their own purposes and comfort restrict our rights to free movement and privacy. You can't usage the cash, you gotta buy a name ticket online and show the ID to the conductor on the train. The constitution and laws supposedly warrant us our rights and specified restrictions in the legal form would not have passed through Parliament. Meanwhile, they can be effectively implemented through business plans and regulations of railways or urban transport and no 1 sees the problem. Civil rights defenders, where are you?!
Another smart gadget has 2 goals. The first goal is to collect data about us. At the moment, smart, smart-climater or smart-fridge request not send them anywhere else, but this anticipation has been created and can be activated immediately where it has not yet happened. individual will decide that you should save energy and that the study on the operation of your household appliances has caused discontent. Also, ticket purchases combined with another data on your activity can origin a reprimand for overburdening the planet with a carbon footprint. It will begin with embarrassment and reprimand, but what it can stand in the way of actively preventing reprehensible actions.
The large increase in abrupt heart cases after "vaccinating" alternatively of causing investigation into causes and seeking remedies, which could lead to the implementation of investigations and punishment of those most affected in the countries, served as an excuse for the expanding introduction of telemedicine. shortly specified smartwatche can become mandatory for selected groups of people. You don't want to be watched, unfortunately, medicine can't aid you, your choice. This is all for the common good and the protection of life at risk. Surveillance alternatively of treatment.
It is rather apparent and logical, if the illness was treated by a method of taking distant freedom and civilian rights, post-vaccine injuries will be cured by spying and surveillance.
The second goal of smart gadgets and the net of things is to take independency and remove work from the individual and hand it over to large Brother. Smart gadgets (phone, media counter, TV, monitoring, watch, etc.) are essential for the establishment of "smart cities" and, in fact, the smart world. That's what the large remainder is all about. They are advertised and put people under the impression of making life easier, expanding its safety and ensuring greater control over it.
It's rather the opposite. The right to privacy and self-decision is essential to anyone who wants to take work for his own life. alleged intelligent technologies take that right. People seem not to realize that the more intelligent technologies they let their lives, the more they quit their freedom and become prisoners of a spider web in which they yet renounce their individuality and all aspects of freedom of choice. Sometimes only in order to keep the appearance of freedom we will be able to carefully choose between the unvarying many varieties of the same product, of course following the assistant's advice in the smartphone.
Thank you for reading Substack Jack. Subscribe for free to receive fresh posts and support my work.
Memes I generated here. https://imgflip.com/mememegenerator
while images utilizing AI on NightCafe https://creator.nightcafe.studio/