This is one of many fallacious arguments often used by those who ignore the biological effects of artificial electromagnetic fields (EMFs) — and those who don't want the public to find out about them.
They claim that artificial EMFs are harmless because they are not strong enough to cause DNA breaks like ionizing radiation that can strip or donate electrons from atoms, such as radon, X-rays or gamma rays. Even the World Health Organization states that the only proven health effects of human-made non-ionizing radiation are heating from acute exposure to high levels of radiofrequency (RF) or nerve and muscle stimulation and the excitability of cells of the central nervous system by household EMF (50/60 Hz, also called extremely low frequency radiation — ELF).
However, thousands of peer-reviewed scientific studies have shown that chronic and/or acute exposure to ELF EMF from power lines and RF from wireless communications can be harmful because this artificial radiation has two unique and harmful properties not present in in nature, explained Greek biophysicist Dimitris J. Panagopoulos PhD during a European Parliament workshop on electrohypersensitivity, held in Brussels on April 13. They are polarized and coherent, he explained, and can therefore "produce constructive interference and amplify their intensity at certain locations, and also force any charged particles (e.g. mobile ions) in living cells/tissues to oscillate in parallel and in phase with them. Polarization and coherence explain why EMFs of ~0,1 mW/cm2 emitted by a cell phone are harmful, while solar EMFs of ~10 mW/cm2 (100 times stronger) are vital. »
The war against online censorship and surveillance has recently seen a tremendous development that could turn the tide in favor of freedom and privacy on the internet. Internet infrastructure titan Cloudflare has unveiled support for the Encrypted Client Hello (ECH) privacy feature, creating a sanctuary for free speech advocates and calling into question attempts to block sites already established.
For the uninitiated, as TorrentFreak reported, web blocking has been the entertainment industry's anti-piracy tool of choice for over a decade and a half. Used in over forty countries, this method involves Internet Service Providers (ISPs) blocking access to specific websites, often under a legal directive. After starting with rudimentary DNS blocks, the system has evolved, employing sophisticated Server Name Indication (SNI) eavesdropping techniques, or sometimes a mixture of the two. But it has also been used by governments to censor websites and block access to them.
However, the landscape has begun to change with the emergence of privacy-focused technologies, such as Encrypted DNS, that challenge these blocks. Today, the introduction of ECH is poised to revolutionize this field, rendering Internet Service Provider monitoring efforts virtually, if not completely, ineffective.
Simply put, ECH is an innovative privacy protocol designed to hide internet traffic and thwart surveillance efforts. Browser giants like Chrome, Firefox, and Edge have already given a nod to its implementation. However, for its potential to be fully exploited, websites must also integrate it. Cloudflare's decision to integrate ECH by default into all of its free plans, serving countless websites, represents a giant step toward widespread adoption...
There Will Be No More Night shows images that should not be seen. “These images are not made to be looked at.” No, these images are made to simply be, to exist because they must reflect the substance of an operation, a movement, a moment. There is no longer any boundary between reality and fiction because the image itself embodies the own vision of the one who sees and the one who acts.
We see what the pilot of the combat helicopter in which the camera is on board sees. She follows the pilot's movements, she films what he watches. Or rather, it is the extension of the pilot's eye, it gives him what he does not have: the possibility of seeing several kilometers, nyctalopia, thermal vision. But even beyond the technicality – this camera records, helps but also requires the pilot to constantly monitor – it is the relationship with the other that controls. The one who is looked at but doesn't know it. During the day, hundreds of meters or even kilometers from the target, the pilot can distinguish the gender, clothing, details of a car, or even what a group of children is playing. In Syria, in Iraq, in Afghanistan and in general wherever the army of a great military power imposes its force, this army sees, almost divinely, individuals live. Day and night: at night, they are as visible as during the day, but helicopters are only spotted by the rolling of their blades.
There will be no more night is the deaf cry of a war industry, of a growing technology, of an enjoyment of power: to see without being seen, to see the one who does not see us.
Fortunately, a Supreme Court decision (5-4) ruled that the scanner constituted an illegal search under the Fourth Amendment, requiring a warrant that the police did not obtain.
A point for privacy, but the government is about to have a much more controversial and dangerous tool for monitoring what's going on inside your home.
Unlike the thermal camera, this device is already in your home – and you put it there.
How does it work?
WiFi consists of electromagnetic waves in the 2,4 and 5 GHz ranges. It's the same as the light you see, except it can penetrate walls thanks to its much longer wavelength. Much like light (and echolocation), these waves also reflect off various surfaces and, when correctly reconstructed, can be used to create an image.
In a bold push toward a free and open internet, Rumble – the growing video sharing platform – advanced its mission with the beta launch of Rumble Cloud, delivering ahead of the company's planned schedule, at heart of the cloud services market.
This Rumble milestone, launched today, forms the backbone of a new infrastructure highway designed to support the unfettered internet. It's a beacon for those left in the cold by Big Tech's censorship and questionable pricing tactics in the cloud services space.
Rumble focused on building a strong framework that could support the company's high-speed streaming and video business. The infrastructure now in place not only supports Rumble's comprehensive video needs, but also serves as a springboard to dive into the cloud services market, allowing it to compete with companies like Amazon and Google.
It will leverage available capacity and convert it into a cloud-based service that benefits a new customer base, allowing it to achieve economies of scale.
Researchers have found that robots are surprisingly good at completing CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart), those annoying little puzzles designed – ironically – to verify that you are indeed a human being.
In fact, as the team of Gene Tsudik from the University of California at Irvine discovered, robots are much better and faster than us at solving these tests, a worrying sign that this already aging technology is on the verge of to disappear.
As an as-yet-unpeer-reviewed paper indicates, researchers have found that despite the evolution of CAPTCHAs in sophistication and diversity over the past two decades, techniques for circumventing CAPTCHAs have also improved considerably.
“If left unchecked, robots can carry out these nefarious actions on a large scale,” the article reads.
“We know for sure that [the tests] are very unloved. We didn't need to do a study to come to that conclusion,” Tsudik told New Scientist. "But people don't know if this effort, this colossal global effort that is invested in solving CAPTCHAs every day, every year, every month, if this effort is really worth it."
The Linky meter case managed by Enedis resurfaces with an unprecedented judgment. Justice ordered the dismantling of the device, a decision which delights opponents of the Linky counter. Indeed, the latter is the source of great concern. For years, its installation has been strongly criticized, with some consumers pointing to significant increases in their electricity bills. Despite its efficiency in automatically transmitting consumption data, this device has not convinced all users. The major problem lies in the electromagnetic waves it emits. Indeed, they are potentially harmful to the health of many individuals. And those who suffer from electrohypersensitivity cannot even have the Linky meter at home.
Although the National Health Security Agency published a report in 2016 mitigating the risks, doubts persist. Some report symptoms such as headaches, nausea, dizziness and muscle aches. On July 10, a verdict fell: a woman suing Enedis won her case. Thus, the company has the obligation to replace it with a non-communicating model. This decision could encourage the authorities to further examine the risks associated with this device. A victory for the opponents, but what impact this will have on the future of the Linky counter, remains to be seen.
A new era of digital communication seems to be dawning with Elon Musk's announcement of the launch of X.com, which takes over from Twitter as we know it. This site presented as "revolutionary", directed by a so-called "visionary" CEO, promises an unprecedented experience, combining messaging, videos, audios... and even integrated bank payment functionalities that leave you wondering.
The integration of TwitterBlue authentication will indeed allow users to access a world of possibilities to carry out their online transactions “with simplicity”. Musk's digital influence is undeniable, sparking unprecedented excitement after Covid restrictions were lifted. His famous #TwitterFiles generated a veritable tidal wave on the platform, propelling Twitter to new heights.
In England, high-tech devices will be installed in parking lots across south-east England in the coming weeks as part of a trial on national motorways.
The new CCTV systems will be able to detect violations and send them directly to police control rooms, allowing officers to avoid having to sift through hours of footage to pursue a motorist. Footage transmitted from the camera to the control room can be reviewed immediately and a £100 fine sent to the person to whom the car's number plate is registered.
“This is how to install widespread social credit surveillance. Let a problem escalate, then say there is only technology to fix it, install an automated control solution and people will be happy. »
The investigation revealed a privacy paradox. While 72% of respondents acknowledge the risks associated with sharing personal data online, only 48% say they take active steps to protect their data.
To remedy this situation, Stephen Kho, a cybersecurity expert, highlighted the effectiveness of Virtual Private Networks (VPNs) in preserving online privacy. He pointed out that a VPN can hide the IP addresses of users from prying eyes, including governments, hackers and other internet snoopers.
Mr. Kho also pointed to the vulnerability associated with connecting to public Wi-Fi networks. Hackers can easily spy on user activities in places like cafes and airports. In this regard, VPNs act as a protective shield, ensuring that all online actions remain hidden and safe from potential threats.
In addition to blocking prying eyes, VPNs also protect users from websites that track browsing habits.
Kho points out that while VPNs are a valuable tool for protecting privacy, individuals need to remain vigilant against phishing scams and malware attacks. Keeping software up-to-date and using reputable anti-virus and malware are essential practices for comprehensive online security.
The survey found that only 13% of respondents have turned to VPNs to improve privacy. However, the use of VPNs has seen a noticeable increase in the 18-24 age group.
These issues are more topical than ever since the French government is implementing legal digital surveillance tools! Mr Mondialisation spoke with the computer scientist behind /e/OS, Gaël Duval, Open Source specialist, founding president of the eFoundation and of Murena. Decryption of this simple and practical solution.
We already knew that the personal data of Internet users interested the net giants to be used for advertising purposes, resold to companies or even direct votes as shown by the Facebook-Cambridge Analytica scandal. No data left online is harmless, whether it is our personal tastes or more sensitive ones such as our health. All the information collected on an individual makes it possible to classify it for commercial purposes, as Vincent Coquaz, director of Un Monde 5 Etoiles, explained in Soif de Sens.
Monitor political opposition
Connected objects are not only at the service of capitalism. They can also be effective during popular mobilizations, and thus endanger the power in place. In any case, this is what Emmanuel Macron implied about the popular revolts which followed the shooting death of the young Nahel: He came to imagine a possible censorship of social networks by "regulating or cutting".
But the Head of State and the government did not wait for these events to take an interest in our connected life. Under the guise of preserving national security, it is setting up digital surveillance tools such as the remote activation of electronic devices provided for in the Orientation and Programming Law of the Ministry of Justice 2023-2027 which has just been passed in National Assembly.
A measure denounced as soon as it was examined in the Senate by La Quadrature du Net, which rightly fears that its use is not confined to terrorism or organized crime but also serves against activists, in particular environmentalists. The 2024 Olympics become the pretext for authorizing biometric recognition, paving the way for a mass surveillance society.
Protecting yourself becomes suspicious
Support Mr Globalization on Tipeee
Just as alarming, it even becomes suspicious to protect oneself by using digital encryption tools or to refuse the exploitation of our data.
Concerning the case of December 8 implicating seven people for "association of terrorist criminals", the DGSI (General Directorate of Internal Security) thus noted that: "All the members contacted adopted clandestine behavior, with increased security of means of communication (encrypted applications, Tails operating system, TOR protocol allowing anonymous browsing on the Internet and public wifi). »
The use of WhatsApp, ProtonMail, a VPN, Tor… are liable to justify the existence of a criminal project, as alerted by La Quadrature du Net in its article dedicated to this case. And in this list of “suspicious” online behaviors we also find the /e/OS operating system, developed by Gaël Duval.