Hopeful blow to Big Tech Despots
Posted onPapers around the world carried news yesterday of SpaceX technology in beta testing that could bypass censors in totalitarian regimes.
Papers around the world carried news yesterday of SpaceX technology in beta testing that could bypass censors in totalitarian regimes.
Google altered its algorithm in order to ensure that negative stories from the establishment media about former Present Donald Trump
the Whitehouse pressures private corporations to censor speech, and deny U.S. citizens God-given rights gauranteed in the U.S. Constitution
It is now clear that as the avalanche of “wokeness” and national self-hate has crashed over the restraining walls of the American mythos, one pillar of traditional American democracy after another has fallen. (Conrad Black)
Kendi “advocates racial discimination as a cure for past racial discimination…”
Kendi argues that all people fit into only two categories, activists working to destroy systemic racism or, “if you are not an activist, … you are a racist.”
Corporations are increasingly picking political sides in the battle between liberty and tyranny. Join the movement to inform and activate citizens to resist the growing threat of corporate tyranny.
On March 29, journalist Glenn Greenwald assembled a scathing assault on powerful corporate media entitled Journalists Attack the Powerless, Then Self-Victimize to Bar Criticisms of Themselves
Relying on selfies, social media posts, location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing, government agents are compiling a massive data trove on anyone and everyone who may have been anywhere in the vicinity of the Capitol on January 6, 2021.
Relying on selfies, social media posts, location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing, government agents are compiling a massive data trove on anyone and everyone who may have been anywhere in the vicinity of the Capitol on January 6, 2021.
The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.