There is a digital prison that is enveloping all of us. None of us, in our right minds, would consent to building our own prisons. But that is what we are, in fact, doing.
In my prior posts: Blade Runners and How to Avoid and Eliminate the Beast System’s SMART Technology, I primarily wrote about what must be done to liberate our public spaces from the grip of Technocracy. This post is about what we can do to curb enslavement, manipulation and mind control from Artificial Intelligence with regards to our personal electronic devices.
When I talk to people about surveillance, internet privacy, Artificial Intelligence and similar topics, I get a couple of standard responses:
"I presume that THEY (the government and corporations) are tracking everything we do on the Internet. So there is no point in trying to be private about anything online."
Or...
"I have nothing to hide. I am not doing anything illegal."
The first statement indicates that the person expressing such a belief does not understand how the technology works. The functioning of computers and phones is a mystery to them, and they underestimate their own personal power in the face of the current capabilities of corporations and government.
The second statement demonstrates a misunderstanding about the nature of the threat. Those of a New Age persuasion with this perspective might additionally express that "if we are coming from a place of love, we will be protected." I have met plenty of kind, good-hearted and loving people that were tricked into taking the Covid jabs. I personally have friends and family who were sickened, harmed, or killed by the vaccines. Those who commit genocide don't care if you are a good parent or a saint in your community.
Most people are familiar with the history about the requirement of Jewish people to wear a Jewish Badge in Nazi Germany. The government used the badge not only to stigmatize and humiliate Jews but also to segregate them and to watch and control their movements. The badge also facilitated deportation to ghettos and concentration camps.
The Jews that wore these badges probably did so thinking that they had nothing to hide. They were not criminals...
The equivalent to those who wore the Jewish Badge in Germany, are today, in this digital age, the people that use the Internet and cell phones, without awareness of the consequences. They are the people who use Big Tech platforms. They do their internet searches on search engines like Google and Bing. They use email accounts from Google, Hotmail, Yahoo!, and Outlook for personal matters. They use browsers like Chrome for general use. They post on Meta (Facebook, WhatsApp, Instagram) or have a Google or Facebook ID. They use operating systems like Apple OS, Microsoft Windows, and Google Android. They use Google Chromebooks. They do video calls on Skype and Zoom. They install ChatGPT on their devices. These are the people who have decided to wear the digital Jewish Badge in our modern technological era.
A Google company named Jigsaw has partnered up with a firm called Moonshot to map you, based on your beliefs. The have a variety of programs intending to influence your beliefs and limit social discourse. They have produced detailed maps that locate people, to their household, who are anti-vaxx, for example. Why do you think they have a catalog of people who are anti-vaxx? What do they intend to do with that information?
If you disagree with government policy or the Woke agenda, home-school your children, believe in God, or watch "conspiracy theory" videos, you are likely identified within a cohort in the Google map database. Based solely on your internet searches, you may be labeled a “Domestic Violent Extremist”. You may be classified as a threat, even though you have done nothing illegal. This is the criminalization of thinking, curiosity, and asking questions outside of what government/corporations consider acceptable behavior. And Google is not the only entity profiling you based on your beliefs.
See this video about the profiling maps:
Operation Covid was not the last attack on humanity. The ignorant and naive who do nothing to protect their privacy will have their fate determined by algorithm. Will such a fate be similar to the fate of those who died in the holocaust? Those who forget history are doomed to repeat it...
Why is Big Tech going to such great lengths to compile massive amounts of data on each of us? Why do we voluntarily give our data to them on a daily basis? When the Jews willingly wore stars on their clothing, did they not realize that they were then marked for extermination?
For those who intend to protect their freedom and survive, I recommend the following videos by privacy expert, Rob Braxman.
End-to-End Encryption (E2E) is Dead. Killed By New Tech
A video about how Apple, Microsoft and Google have transformed their software and hardware, in recent years, to build the ultimate surveillance system.
Slave AI Cameras Monitoring Us Everywhere? Big Brother's 1984 Finally Complete
Client-side scanning for universal surveillance through our personal devices.
Skynet 2024: The Infrastructure is Complete!
Machine-to-machine communication (such as cellphone to cellphone) using mesh networks outside of the Internet.
Meta Data. An Extremely Important Privacy Threat. Cant Be Ignored!
Why encryption is not enough.
Watching those videos might just shock you into action.
8 Steps to take back control of your data
without having to:
a) go live in a cave without technology (this option is looking better by the day) or
b) becoming a hacker.
1. Switch to a Linux operating system. This is the first and probably the most important step to remove a lot of spyware from your computer.
Be a Subversive with Linux! We are under Attack!
2. Use a VPN. A Virtual Private Network (VPN) is an encrypted connection over the internet that creates a secure, private network between a device (such as a computer or mobile device) and a remote server owned by a VPN provider.
VPN INSIDER'S MYTH-BUSTING! Separating Fact from Fiction: How VPNs Really Work
What a VPN can do for you.
A VPN is Useless Against These Kinds of Internet ID Threats
Device identification beyond the protection of a VPN and how to circumvent it.
3. Move as much of your communications as possible to a private encrypted messaging app (not WhatsApp) instead of using email, normal phone calls or texting.
Best and Worst Encrypted Messaging Apps (7 Apps Ranked)
Session Private Messenger - Really Understands Privacy!
4. Practice phone number isolation.
Two Factor Authentication (2FA). The SCAM of the Century
5. Practice email isolation.
Email Destroyed Our Privacy - 15 Solutions!
What's Wrong with Signal, Whatsapp, Telegram, Protonmail, Tutanota?
6. Practice browser isolation.
What Browser to Use? About Browser Isolation
7. Get off of Meta, Google, and other Big Tech platforms.
Do You Want to Tether Your Life to Google? How to Resist
8. Switch from Big Tech platforms and apps to free open source software (FOSS).
You can search for app/software alternatives here: https://alternativeto.net/
Specify open-source when filtering search results.
You can also see Privacy Guides' recommendations: https://www.privacyguides.org/en/tools/
The New World Order is Here
Globally governments are pushing hard to implement a universal surveillance and control system based on the Chinese model. Your data that you let them capture determines your social credit score. Your social credit score will determine your access to travel, your money, schooling, education, etc. Artificial Intelligence is being utilized to manipulate voting, polarize society and change your beliefs. As the precision of AI is refined, it becomes indistinguishable from our own thinking, as more and more people adopt ideas implanted by machine algorithms as their own. The perception management evident in the Covid reality schism will only deepen. With tyranny closing in, there are more important priorities than mere convenience.
In the coming years, as those who seek to control us shift from mostly data collection to adding more aggressive manipulation and restrictions, one of the most practical ways to avoid the centralized control of people is to separate our data from our identity and refuse to use platforms that participate in surveillance capitalism.
By the time the implementation of your/our fate begins, it will likely be too late to limit what they know about you. They will have completed your profile and know exactly where to find you. Once we are in this phase, they will be executing a plan that you will be subject to. Taking privacy precautions at this point will probably be of marginal benefit.
You have already sewn the star on your jacket. Are you willing to rip it off? Or will you choose to do nothing until you find yourself in a cattle car with others rumbling down the tracks to your final destination?
Read more of the…
TECHNOCRACY SERIES
Do Surveillance Cameras Control Crime?
Surveillance Cameras in Vilcabamba
How do we Take Responsibility for our own Security?
How to Avoid and Eliminate the Beast System’s SMART Technology
The Next Holocaust: Brought to YOU by Big Tech (this article)
We could only hope that there intentions are as accommodating as auschwitz, with swimming pools, band practice, movie theater, and maternity ward.
Our lives already resemble those work camps in many ways.
Unfortunately, they likely have a plan that resembles the holodomor where orders of magnitude more die. The recent DOD disclosure authorizing use of deadly military force domestically by solider and drone is concerning for this path if the power does go out first.
On the bright side, preparing for the SKS and dystopian regulations both require the same actions, selfsuficiency.