Public Life, Media, and Cancel Culture

Posted on

Diversity of opinion is under sever attack. Public figures who dare to express personal views (not approved by Woke-fascists) inevitably will be faced with two options for response immediately prior to being destroyed and removed. In this three minute video, Tucker Carlson explains these two options.

‘Equity’ Policy Results in Firing of 2 Veteran Educators for Refusing to Do ‘Wakanda Salute’

Posted on

The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.

Author Bill Gertz on China and his most recent work, Deceiving the Sky

Posted on

The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.

Planned Parenthood: “Transgender identifying kids are cash cows”

Posted on

The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.

Extreme totalitarian, censorship plan openly floated by Microsoft joined by major software corporations

Posted on

The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.