Tech Companies and Keyboards: They Even Know Your Deleted Messages.

In an era dominated by digital communication, the concept of privacy is becoming increasingly elusive. Many users believe that deleting a message means removing it from existence, which conveys a false sense of security. However, the reality is far more complex, as tech companies have the means to store and analyze deleted messages. In this blog post, we delve into the mechanisms that allow tech companies to access every word you type on your keyboard and the implications for user privacy.

Continue ReadingTech Companies and Keyboards: They Even Know Your Deleted Messages.

What should you look for in the most secure routers?

The answer is simple, you need an encrypted router. Your router connects you to the Internet. Given the increasing number of cyber threats, protecting our home networks is no longer a luxury, but a necessity. An encrypted router is one of the most crucial lines of defense between your devices and countless online threats. Some routers are not secure at all, while those that are offer varying levels of security and privacy. That’s why it’s so important to choose a secure router. Let’s find out how.

Continue ReadingWhat should you look for in the most secure routers?

Insider Knowledge: Deciphering the Constitutional ‘Protection’ Development in Germany

Germany, known for its commitment to democratic principles, has recently experienced a significant development in its security infrastructure. This change revolves around the constitutional protection and raises critical questions about the country's evolution into a surveillance state. In this lecture, we will closely examine these recent changes and their implications for the nation.

Continue ReadingInsider Knowledge: Deciphering the Constitutional ‘Protection’ Development in Germany

We Are All Suspects Until Proven Otherwise

In the words of the European Union, the spread of images and videos of child sexual abuse, which has dramatically increased with the development of the digital world, creates "solutions" where monitoring all our digital activities becomes acceptable. Even though the harm experienced by the victims is infinite and offenders have found new ways through digital services to access children and exploit providers of hosting or interpersonal communication services, our privacy and intimacy remain a fundamental human right.

Continue ReadingWe Are All Suspects Until Proven Otherwise

The Secrets of Smart Spy Clothing Uncovered

Smart clothing or spy clothing? It's not enough that we collect data from our phone, our computer, our router, our medical history, our license plate, our financial records, and our school systems. Now, clothing companies and the U.S. government are investing resources in the development of "smart clothing". Learn more here.

Continue ReadingThe Secrets of Smart Spy Clothing Uncovered

Iris Scanning for Money: Would You Do It?

For some time now, a phenomenon has been appearing in squares and public places in Argentina and other Latin American cities: long lines of people waiting to have their iris scanned with a silver-colored sphere on a tripod. This is the Worldcoin project, an initiative by Sam Altman, the owner of OpenAI, the company that developed ChatGPT, which offers money (cryptocurrencies or dollars) in exchange for allowing your eye to be scanned.

Continue ReadingIris Scanning for Money: Would You Do It?

Someone is Watching Us from Above

Since the 1950s, the Space Surveillance Network has been working to gather electro-optical, passive radio frequency (RF), and radar sensors that can monitor citizens around the world using satellite information and a variety of methods and technologies. Now, they are new players in space and are working with governments to track you more than ever. Find out how here.

Continue ReadingSomeone is Watching Us from Above

Free Yourself: Building a Business Beyond Social Media

Big tech platforms are as crucial today as mail, bank loans, telephony, and other essential services, around which businesses structure their operations. Here I explain to you what big tech dependency means, and also how you can escape the rabbit hole. Why? In the last decade, many content-driven businesses have fully entered the digital world. This shift has inevitably tied them to platforms managed by tech companies or made them dependent on large tech corporations.

Continue ReadingFree Yourself: Building a Business Beyond Social Media