There are important things that you probably don’t know or realize about the SIM card in your device. Especially if you care about security and privacy, you should know that using a secure device with a secure and privacy-oriented operating system and applications, still make you vulnerable when there’s a SIM card installed in the device. Read more ⟶
Shulamit Aloni, an Israeli politician and once Minister of Education, was interviewed by Amy Goodman of DemocracyNow many years ago. Goodman asked her: Often when there is dissent expressed in the United States against policies of the Israeli government, people here are called antisemitic. Read more ⟶
Lessons to learn from the Linux Foundation
The Linux Foundation published their annual report for 2025, and it’s clear from that report that much of the funds that they receive do not go to the development of the Linux kernel, as many people would probably expect. From their own report, of about $311,343,021, only $8,410,114 actually got spent on the Linux Kernel Project. Read more ⟶
Taking somebody’s money without permission is stealing, unless you work for the IRS; then it’s taxation. Killing people en masse is homicidal mania, unless you work for the Army; then it’s National Defense. Spying on your neighbors is invasion of privacy, unless you work for the FBI; then it’s National Security. Running a whorehouse makes you a pimp and poisoning people makes you a murderer, unless you work for the CIA; then it’s counterintelligence. Robert Anton Wilson
Watch out for hackers and spies during work
A while back I blogged about how the criminal US Government has spies in major (tech) companies. It was clear from that post that if you work at Big Tech companies or companies doing any kind of sensitive work, some of your co-workers are probably connected to 3-letter agencies such as the NSA, CIA and even Mossad. These days the problem is only getting worse; let’s take a look at some examples. Read more ⟶
The aim of public education is not to spread enlightenment at all. It is simply to reduce as many individuals as possible to the same safe level. To breed and train a standardized citizenry. To put down dissent and originality. H.L. Mencken
Dead Horse Theory
I found the Dead Horse Theory meme in my collection and wanted to share it here to remind myself and everyone else about the important lesson that it teaches. You’ll probably immediately recognize all the politicians and bureaucrats of the world in this and the stupidity that is common in governments. Read more ⟶
The State calls its own violence law, but that of the individual, crime. Max Stirner
Ex-CIA officer John Kiriakou on the CIA’s hacking capabilities
Ex-CIA officer John Kiriakou, citing the 2017 Vault 7 leaks, says that phones, cars, TVs and laptops are not as private as we assume. There was a dramatic leak in 2017 that the CIA came to call the Vault 7 disclosures — gigabytes worth of documents leaked by a CIA technology engineer. What he told us was that the CIA can intercept anything from anyone. Read more ⟶
Porsche immobilized thousands of Russian-registered & internet-connected vehicles
Here’s from Wionews, “Why hundreds of Porsches were mysteriously immobilised across Russia” (December 4th 2025): Porsche owners across Russia have reported that their fancy sports car has become undrivable or ‘bricked’. Drivers in Moscow, Krasnodar and other cities have reported engine shutdown, fuel delivery blockades. Rolf, Russia’s largest dealership group, has reported the largest service request spike last week. Read more ⟶
How printouts and photos can deanonymize you
Think printing a letter keeps you anonymous? Think again. Your printer is actually a snitch. Most color laser printers secretly add invisible yellow dots on every page, called the Machine Identification Code (MIC). This hidden code includes the printer’s serial number and the exact date and time the page was printed. You can’t see these dots, but the authorities can detect them using a special blue light. Read more ⟶
Berlin: Police can secretly enter homes for state trojan installation
Here’s from Heise Online, “Berlin: Police can secretly enter homes for state trojan installation” (December 25th, 2025): To collect data from IT systems, investigators in Berlin can secretly search suspects’ rooms. This is in a Police Act amendment. Read more ⟶
It’s estimated 2,500 children are kidnapped and murdered in this country every year. Americans, for the most part, are oblivious to what’s really going on behind the scenes.
I retired from the FBI March 1979. At that time, I was in charge of the FBI Los Angeles Division. I had more than 700 personnel under my command. And in that particular instance, they were taking children out of foster homes, orphanages, Boys Town. These are two-, three-, and four-year-old children before they entered kindergarten. In addition, the children claimed that they were flown into the mountains where they were involved with adults in robes, black robes, chanting, candles. They talked about the brown babies who were cut up, actually sacrificed, and flying them to Washington, D.C., for sex orgies with prominent people, including congressmen, senators, and certain people in the White House.
And the reason the congressmen and the senators vote for these stupid bills is because many of them have been set up and framed through sex and drugs. Ted Gunderson
On the FBI and France framing GrapheneOS
The FBI conducted a sting operation in Europe by creating its own supposedly ‘secure’ phone and messaging platform. The operating system incorporated portions of GrapheneOS and was aggressively promoted as GrapheneOS or as being based on it. There are lessons to learn from this. Read more ⟶
I’m not on LinkedIn anymore
I haven’t been on LinkedIn for over a year now. My account was permanently ‘restricted’ (banned) on or around September 11th 2024 for what LinkedIn claims is “hateful speech”. At the time, I shared a lot of videos and re-posted other people’s posts on LinkedIn about the genocide by Israhell that is currently still ongoing in Palestine. Read more ⟶
Lawsuit about WhatsApp security
Attaullah Baig, WhatsApp’s former head of security, has filed a whistleblower lawsuit alleging that Facebook deliberately failed to fix a bunch of security flaws, in violation of its 2019 settlement agreement with the Federal Trade Commission. Read more ⟶
US court orders spyware company NSO to stop targeting WhatsApp
Here’s from Reuters (October 18th, 2025): WASHINGTON, Oct 18 (Reuters) – A U.S. court has ordered Israel’s NSO Group to stop targeting Meta Platforms’ (META.O), opens new tab WhatsApp messaging service, a development the spyware company warned could put it out of business. Read more ⟶
How your personal information can be used against you
Many people don’t realize how the information being collected about them can ultimately be turned against them, putting them at a disadvantage. Even when it comes to trivial or seemingly innocent information, you can’t even begin to imagine how that information might be used against you in unexpected, indirect, or creative ways. Read more ⟶
The cause in the most of cases, that induces the negro to run away from service, is as much a disease of the mind as any other species of mental alienation, and much more curable, as a general rule. With the advantages of proper medical advice, strictly followed, this troublesome practice that many negroes have of running away, can be almost entirely prevented, although the slaves be located on the borders of a free state, within a stone’s throw of the abolitionists. Samuel Cartwright
WhatsApp is spyware; Stop using it
The Chief Administrative Officer (CAO) of the U.S. House of Representatives informed staff on Monday, June 23th 2025 that they are not allowed to use WhatsApp. They may not download the app on their smartphones or desktop computers and must remove it from their devices if it’s already installed. The CAO cited a lack of transparency regarding WhatsApp’s privacy and security as the reason for the ban. Read more ⟶