Masked Attacks on Free Speech
Posted onThis podcast has to do with this yet another back door being used to infringe upon the God-given rights of American citizens to speak freely.
This podcast has to do with this yet another back door being used to infringe upon the God-given rights of American citizens to speak freely.
Companies have gone from trying to prevent people from being kidnapped or exposed to pornography to trying to keep them from encountering unwelcome ideas or potentially offensive speech.
The US Constitution on Free Speech, The Department of Homeland Security’s Disinformation Governance Board, tech platform “independent” fact checkers, and the rise of censorship
The DHS publishes a bulletin defining political opinion as terrorism.
As integrated enemies of America work to destroy the Constitution and the God given rights of citizens, people (such as clergy) look for sources to awaken and educate our members. Some align with anonymous groups. The podcast beseeches the lister (especially clergy) to beware. Enemies of America coopt anonymous groups to plant false flags and then move to close down churches and synagogues
Papers around the world carried news yesterday of SpaceX technology in beta testing that could bypass censors in totalitarian regimes.
Academic freedom means subjecting ideas to fearless criticism; only then can mere assertion be distinguished from tested knowledge.
Diversity of opinion is under sever attack. Public figures who dare to express personal views (not approved by Woke-fascists) inevitably will be faced with two options for response immediately prior to being destroyed and removed. In this three minute video, Tucker Carlson explains these two options.
The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.