Feeds:
Posts
Comments

Archive for the ‘technology’ Category


‘Just like Eve who was lured into taking a bite out of the forbidden apple in the Garden of Eden, many people today are enamored with the idea of chomping down on anything that tech giant Apple throws their way. This includes so-called “next level” technologies like the one the Apple is currently working on and soon to unveil, known as “augmented reality.” A.R. will reportedly allow users to basically live in a fake world filled with superimposed images of things that don’t actually exist.

At the recent 2017 Worldwide Developers Conference (W.W.D.C.), Apple C.E.O. Tim Cook was brimming with excitement over the prospect of coaxing even more unsuspecting victims into his company’s latest technological snare. Speaking about A.R., Cook told the media that he is “so excited about it” that he literally wants to “yell out and scream.”

Whether gleefully naive or even demonic, Cook’s guttural response to A.R.’s release is particularly bizarre, especially when considering that it serves no real purpose other than to erase yet another element of humanity from the social sphere. ‘

Read more: Apple set to destroy reality and ensnare ‘tech hipsters’ into augmented worlds that disconnect people from reality

Read Full Post »


By: Tom Chatham

The recent cyber attack on computers worldwide is just the latest wakeup call to the future we are blindly building for ourselves. The vast majority of humanity embraces technology like it is their next breath of air. Without it, they feel like they will die.

Technology is a double edged sword that we wield that must be handled with care less we cut off one of our own limbs. Technology allows us to be more productive and work faster than without it but as we embrace more technology to relieve us of many manual tasks we must not let it rule our very existence.

MORE HERE

Read Full Post »


No matter whom we elect, we get the same thing:

Endless war. Terror. Gender bending. Why is this?
 
Our “leaders” are all Rothschild flunkies. The Rothschilds are cabalists (Satanists.) 
They have a monopoly over the creation of the medium of exchange, credit  & currency. They produce these coupons from nothing, something our government could do itself, interest-and-debt-free. Alas, our “money” is just chips in their digital casino. They can
void these chips any time they want. 
 

Their agenda is to protect their money monopoly by extending it into a monopoly over everything – power, knowledge, culture, religion — by reengineering humanity to serve them. This requires the breakdown of nation, race, religion (God) and family (gender).  This is why Western nations are flooded by migrants. Why Communist and LGBT values are foisted on children. Why universities have been neutered. Why corporations and banks promote migration and homosexuality.  Why the foreign policy of the West is bent on destroying any resistance (Russia, Syria, Yemen, Iran, Korea.) Society is satanically possessed. Freemasonry and organized Jewry are their instruments. Why do so few “pundits”  get this? The process of human reengineering has advanced to the point where society is an accomplice in its own destruction.

See more at: https://www.henrymakow.com/what_is_communism.html#sthash.szGQq61L.dpuf

===================================

Puritan's Pride Quality Vitamins

Read Full Post »


Apple forbids consumers from taking their iPhones to third parties for repair, and sometimes even bricks phones as punishment. But Australia has said that’s not cool and is suing the tech behemoth. Or, to put it in Australian, “yeah nah mate, garn git fucked.”

Australia’s consumer watchdog agency, the Competition and Consumer Commission, announced early this morning that it’s suing Apple for refusing to service iPhones and iPads that have been bricked by software updates. Bricking a device means that it’s been rendered completely unusable—about as good for making things like telephone calls and Snappy Chats™ and Twitter Tweets™ as a brick.

MORE HERE

Read Full Post »


(ANTIMEDIA) Sweden — Craving more of a science fiction-style existence? Perhaps you should seek a job with one of the companies at Epicenter, an employment hub in Sweden.

The Associated Press reported Monday that companies there have begun implanting microchips in their employees, marking the first time the practice has been used on a broad scale.

MORE HERE

Read Full Post »


Yesterday we reported that an international group of hackers claim they have breached Apple’s iCloud user database and stolen 300 million usernames and passwords. The group has threatened to initiate a widespread factory reset on April 7th, 2017, potentially wiping out data on tens of millions of iPhones and iCloud accounts should Apple fail to pay a ransom.

But that breach by nefarious hackers, while serious, is nothing compared to what your trusted operating system provider may be doing on your personal computer.

According to a recent report, if you are a Windows 10 user then every single keystroke you have ever typed on your computer may have been logged and sent to Microsoft.

MORE HERE

Read Full Post »


‘If you thought that your search engine history was private, think again. It’s not. Or, at least, it may not be, depending on whether or not you’re under police investigation.

According to The Free Thought Project, a court in Minnesota has recently ruled that an entire city’s search history should be made available to police, an Orwellian first as far as anyone can tell. It may well mark the beginning of the end of Internet freedom.

Cops in Edina, Minn., were granted a warrant that requires search giant Google to provide search history information and the names of everyone in the city who utilized specific search terms between Dec. 1, 2016, and Jan. 7, 2017.’

Read more: Everything you search for on Google is now easily obtained by police

Read Full Post »


‘Hats off and plaudits to the mayors and managers of the following Ohio cities: Bexley, Canal Winchester, Columbus, Dublin, Delaware, Gahanna, Grandview Heights, Grove City, Hilliard, New Albany, Pickerington, Powell, Reynoldsburg, Upper Arlington, Westerville, Whitehall and Worthington for the legal actions they took to stop “wireless companies to place facilities, including towers up to 50 feet high and equipment of 28 cubic feet (the size of a small refrigerator), in the local public right-of-way.” [1] Those towers and equipment would roll out and implement 5G Wi-Fi, which allegedly was unlawfully signed into Ohio law December 19, 2016 – as alleged in the lawsuit – to become effective March 21, 2017!

Seems like Ohio, its governor and SB331 went the exact way Pennsylvania’s governor and HB2200/Act 129 did in rolling out AMI Smart Meters, i.e., ramrod illegal implementation by state agencies. Why are both those laws illegal?’

Read more: Seventeen Ohio Cities File Lawsuit To Stop 5G Cell Towers Everywhere

Read Full Post »


‘A new malicious application tries to disguise itself as the Google Chrome browser to fool victims into entering their payment card details. The app is still active at the time of writing and sends collected user details to an AOL email address.

Discovered today by MalwareHunter, this application goes above and beyond of what other card stealers have attempted, most of which are half-baked efforts, often easy to recognize as malicious applications thanks to their quirky graphics and misaligned designs.

This app, named “Betaling – Google Chrome.exe”, tries to pass as the Google Chrome browser and does a good job at it. Betaling uses the standard Chrome icon and window layout, complete with an address bar, and even an HTTPS lock icon to trick users they’re on a real website.’

Read more: Credit Card Stealer Disguises as Google Chrome Browser

Read Full Post »


McAfee specifically pointed to the following key arguments in the Grizzly Steppe report:

  1. Russian language was found in the malware – which would make them borderline retarded.
  2. A Cyrillic (Russian language) keyboard was used to create the malware.
  3. The compiler (piece of software that finalizes the malware) time stamped the malware during Russian business hours.
  4. IP address pointed to Russia – again, they’d have to be fairly new at hacking to do something like that.

All of which are the hallmarks of a 15 year old kid acting alone, or a poorly fabricated body of evidence.

MORE HERE W/VIDEO


Support us, Help Cover Equipment and Hosting Costs. We accept donations of any amount through PayPal. Our competition is the major mainstream media giants.

DONATE NOW

…………………………………………………

Read Full Post »


 

  • A nationwide customs computer outage caused nightmare lines for travelers at major airports in New York, Houston, Atlanta and Miami
  • People were flying on the US public holiday and were stuck in queues for up to two hours
  • Twitter users questioned whether there had been a cyber attack but US Customs and Border Protection said there is no evidence that the computer malfunction signified hacking

 

On one of the busiest travel days of the year, many airplane passengers were trapped in hours-long lines because of a nationwide customs computer outage.

Major airports in New York, Houston, Atlanta and Miami were affected by these delays on the US public holiday. There were also long lines in Boston’s Logan Airport and Los Angeles International Airport.

The traveling snafu caused delays ranging from 30 minutes to two hours and hundreds of people got off flights and into motionless queues.

 

Crowds were packed at Miami International Airport because of the customs glitch

Crowds were packed at Miami International Airport because of the customs glitch

Read Full Post »


‘A bill meant to help those with developmental disabilities would allow government agencies to locate people with tracking devices, which has some concerned the measure gives the federal government too much authority and power…

…The legislation would permit the Justice Department to award grants to law enforcement agencies and non-profits for training and tracking devices to find individuals with autism or seniors with Alzheimer’s who have wandered away…

…The bill has garnered the support of Democrats who say it would promote public safety and address the critical need of being able to locate these individuals.

However, some are concerned the measure goes too far. The bill’s original language authorized the Attorney General to insert tracking chips into individuals involuntarily.’

Read more: Bill Would Allow Government to Locate People With Tracking Devices

Read Full Post »


‘Tooling around the Internet. This is literally the least amount of effort one could exert to make the world a better place. Seriously – unless you can feed people while watching TV, there is nothing less you can possibly do to plant trees and improve the world.

So, allow us to introduce Ecosia – the search engine that plants trees for every Web search you conduct.

It’s not like someone is out on the field waiting for one more person’s search in order to plop another tree in the ground. Oh no, that would be just weird. Ecosia has partnered with other companies that will plant the trees. We hope!

According to the homepage, over 5 million trees have been planted.’

Read more: This Search Engine Plants A Tree Every Time You Search

Read Full Post »


 

Read Full Post »


Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to an intelligence agency’s request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

It is not known what information intelligence officials were looking for, only that they wanted Yahoo to search for a set of characters. That could mean a phrase in an email or an attachment, said the sources, who did not want to be identified.

Reuters was unable to determine what data Yahoo may have handed over, if any, and if intelligence officials had approached other email providers besides Yahoo with this kind of request.

MORE HERE

Read Full Post »

Older Posts »

%d bloggers like this: