Last modification by Nathan- 54 there is
5G herd ban

healthy homeWhy artificial waves are the most damaging

Healthy home - Oct 16, 2023

According to Dr. Dimitris Panagopoulos.

   

This is one of many fallacious arguments often used by those who ignore the biological effects of artificial electromagnetic fields (EMFs) — and those who don't want the public to find out about them.

They claim that artificial EMFs are harmless because they are not strong enough to cause DNA breaks like ionizing radiation that can strip or donate electrons from atoms, such as radon, X-rays or gamma rays. Even the World Health Organization states that the only proven health effects of human-made non-ionizing radiation are heating from acute exposure to high levels of radiofrequency (RF) or nerve and muscle stimulation and the excitability of cells of the central nervous system by household EMF (50/60 Hz, also called extremely low frequency radiation — ELF).

However, thousands of peer-reviewed scientific studies have shown that chronic and/or acute exposure to ELF EMF from power lines and RF from wireless communications can be harmful because this artificial radiation has two unique and harmful properties not present in in nature, explained Greek biophysicist Dimitris J. Panagopoulos PhD during a European Parliament workshop on electrohypersensitivity, held in Brussels on April 13. They are polarized and coherent, he explained, and can therefore "produce constructive interference and amplify their intensity at certain locations, and also force any charged particles (e.g. mobile ions) in living cells/tissues to oscillate in parallel and in phase with them. Polarization and coherence explain why EMFs of ~0,1 mW/cm2 emitted by a cell phone are harmful, while solar EMFs of ~10 mW/cm2 (100 times stronger) are vital. »

read the article

Last modification by Nathan- 54 there is
ECH - encrypted web access

Digital DawnECH is becoming widespread and could help unblock blocked websites

Digital Dawn - Oct 12, 2023

Government attempts to block websites could be countered with this new tool.

   

The war against online censorship and surveillance has recently seen a tremendous development that could turn the tide in favor of freedom and privacy on the internet. Internet infrastructure titan Cloudflare has unveiled support for the Encrypted Client Hello (ECH) privacy feature, creating a sanctuary for free speech advocates and calling into question attempts to block sites already established.

For the uninitiated, as TorrentFreak reported, web blocking has been the entertainment industry's anti-piracy tool of choice for over a decade and a half. Used in over forty countries, this method involves Internet Service Providers (ISPs) blocking access to specific websites, often under a legal directive. After starting with rudimentary DNS blocks, the system has evolved, employing sophisticated Server Name Indication (SNI) eavesdropping techniques, or sometimes a mixture of the two. But it has also been used by governments to censor websites and block access to them.

However, the landscape has begun to change with the emergence of privacy-focused technologies, such as Encrypted DNS, that challenge these blocks. Today, the introduction of ECH is poised to revolutionize this field, rendering Internet Service Provider monitoring efforts virtually, if not completely, ineffective.

Simply put, ECH is an innovative privacy protocol designed to hide internet traffic and thwart surveillance efforts. Browser giants like Chrome, Firefox, and Edge have already given a nod to its implementation. However, for its potential to be fully exploited, websites must also integrate it. Cloudflare's decision to integrate ECH by default into all of its free plans, serving countless websites, represents a giant step toward widespread adoption...

read the article

Last modification by Nathan- 54 there is
CSAR Regulations

StrategikaCSAR Regulation: surveillance of our communications is now taking place in Brussels

Strategika - Sep 26, 2023

A little over a year ago, the European Commission proposed one of the worst digital texts ever thought up: the CSAR regulation, also called “Chat control”.

   

Displaying the objective of combating child sexual abuse, this proposal actually aims to create a unique tool for monitoring communications. As soon as this draft regulation was submitted, throughout Europe, associations and experts rose up against this initiative because it would amount to putting an end to the encryption of communications. Today, although the criticisms are even more numerous, discussions are progressing quickly in Brussels, suggesting that the text will be adopted very soon. In order to understand its issues and help strengthen mobilization, we return to the content of this regulation which could sign the end of all confidentiality of online exchanges.

read the article

Last modification by Nathan- 54 there is
There Will Be No More Night by Éléonore Weber

Réseau InternationalWhoever films kills

International Network - 24 Sep 2023

Documentary by Éléonore Weber: There will be no more night

   

There Will Be No More Night shows images that should not be seen. “These images are not made to be looked at.” No, these images are made to simply be, to exist because they must reflect the substance of an operation, a movement, a moment. There is no longer any boundary between reality and fiction because the image itself embodies the own vision of the one who sees and the one who acts.

We see what the pilot of the combat helicopter in which the camera is on board sees. She follows the pilot's movements, she films what he watches. Or rather, it is the extension of the pilot's eye, it gives him what he does not have: the possibility of seeing several kilometers, nyctalopia, thermal vision. But even beyond the technicality – this camera records, helps but also requires the pilot to constantly monitor – it is the relationship with the other that controls. The one who is looked at but doesn't know it. During the day, hundreds of meters or even kilometers from the target, the pilot can distinguish the gender, clothing, details of a car, or even what a group of children is playing. In Syria, in Iraq, in Afghanistan and in general wherever the army of a great military power imposes its force, this army sees, almost divinely, individuals live. Day and night: at night, they are as visible as during the day, but helicopters are only spotted by the rolling of their blades.

There will be no more night is the deaf cry of a war industry, of a growing technology, of an enjoyment of power: to see without being seen, to see the one who does not see us.

access the documentary

Last modification by Nathan- 54 there is
Wifi eyes

Digital DawnYour WiFi can see you

Digital Dawn - 21 Sep 2023

When police suspected Oregon resident Danny Kyllo of growing cannabis at his home, they went to his home with a thermal imaging device to scan him. They found “hot pockets” in the house, which allowed them to obtain a search warrant and arrest Kyllo.

   

Fortunately, a Supreme Court decision (5-4) ruled that the scanner constituted an illegal search under the Fourth Amendment, requiring a warrant that the police did not obtain.

A point for privacy, but the government is about to have a much more controversial and dangerous tool for monitoring what's going on inside your home.

Unlike the thermal camera, this device is already in your home – and you put it there.

How does it work?

WiFi consists of electromagnetic waves in the 2,4 and 5 GHz ranges. It's the same as the light you see, except it can penetrate walls thanks to its much longer wavelength. Much like light (and echolocation), these waves also reflect off various surfaces and, when correctly reconstructed, can be used to create an image.

read the article

Last modification by Nathan- 54 there is
Rumble Cloud

Digital DawnRumble Cloud enters beta phase

Digital Dawn - 12 Sep 2023

A challenger for Big Tech

   

In a bold push toward a free and open internet, Rumble – the growing video sharing platform – advanced its mission with the beta launch of Rumble Cloud, delivering ahead of the company's planned schedule, at heart of the cloud services market.

This Rumble milestone, launched today, forms the backbone of a new infrastructure highway designed to support the unfettered internet. It's a beacon for those left in the cold by Big Tech's censorship and questionable pricing tactics in the cloud services space.

Rumble focused on building a strong framework that could support the company's high-speed streaming and video business. The infrastructure now in place not only supports Rumble's comprehensive video needs, but also serves as a springboard to dive into the cloud services market, allowing it to compete with companies like Amazon and Google.

It will leverage available capacity and convert it into a cloud-based service that benefits a new customer base, allowing it to achieve economies of scale.

read the article

Last modification by Nathan- 54 there is
Captcha gone

Digital DawnAI: prove you're human

Digital Dawn - August 21, 2023

The era of captchas is officially over. AIs are now better than humans at solving “prove you are human” tests

   

Researchers have found that robots are surprisingly good at completing CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart), those annoying little puzzles designed – ironically – to verify that you are indeed a human being.

In fact, as the team of Gene Tsudik from the University of California at Irvine discovered, robots are much better and faster than us at solving these tests, a worrying sign that this already aging technology is on the verge of to disappear.

As an as-yet-unpeer-reviewed paper indicates, researchers have found that despite the evolution of CAPTCHAs in sophistication and diversity over the past two decades, techniques for circumventing CAPTCHAs have also improved considerably.

“If left unchecked, robots can carry out these nefarious actions on a large scale,” the article reads.

“We know for sure that [the tests] are very unloved. We didn't need to do a study to come to that conclusion,” Tsudik told New Scientist. "But people don't know if this effort, this colossal global effort that is invested in solving CAPTCHAs every day, every year, every month, if this effort is really worth it."

read the article

Last modification by Nathan- 54 there is
Linky failure

Gendarme ProfessionThe failure of the Linky meter: Enedis forced to return to the old model

Gendarme profession - August 13, 2023

From the start, the Linky meter has been a problem for some households. It is therefore not surprising that justice took the lead on his case, justice forces Enedis to return to the old model.

   

The Linky meter case managed by Enedis resurfaces with an unprecedented judgment. Justice ordered the dismantling of the device, a decision which delights opponents of the Linky counter. Indeed, the latter is the source of great concern. For years, its installation has been strongly criticized, with some consumers pointing to significant increases in their electricity bills. Despite its efficiency in automatically transmitting consumption data, this device has not convinced all users. The major problem lies in the electromagnetic waves it emits. Indeed, they are potentially harmful to the health of many individuals. And those who suffer from electrohypersensitivity cannot even have the Linky meter at home.

Although the National Health Security Agency published a report in 2016 mitigating the risks, doubts persist. Some report symptoms such as headaches, nausea, dizziness and muscle aches. On July 10, a verdict fell: a woman suing Enedis won her case. Thus, the company has the obligation to replace it with a non-communicating model. This decision could encourage the authorities to further examine the risks associated with this device. A victory for the opponents, but what impact this will have on the future of the Linky counter, remains to be seen.

read the article

Last modification by Nathan- 54 there is
xcom

The Media in 4-4-2Elon Musk: X.com, an all-in-one application

The Media in 4-4-2 - July 26, 2023

Elon Musk aspires to create a WeChat-like model with X.com, an all-in-one app

   

A new era of digital communication seems to be dawning with Elon Musk's announcement of the launch of X.com, which takes over from Twitter as we know it. This site presented as "revolutionary", directed by a so-called "visionary" CEO, promises an unprecedented experience, combining messaging, videos, audios... and even integrated bank payment functionalities that leave you wondering.

The integration of TwitterBlue authentication will indeed allow users to access a world of possibilities to carry out their online transactions “with simplicity”. Musk's digital influence is undeniable, sparking unprecedented excitement after Covid restrictions were lifted. His famous #TwitterFiles generated a veritable tidal wave on the platform, propelling Twitter to new heights.

read the article

Last modification by Nathan- 54 there is
AI and widespread surveillance

The Media in 4-4-2AI and Generalized Surveillance

The Media in 4-4-2 - July 21, 2023

England is installing real-time infringement detection systems.

   

In England, high-tech devices will be installed in parking lots across south-east England in the coming weeks as part of a trial on national motorways.

The new CCTV systems will be able to detect violations and send them directly to police control rooms, allowing officers to avoid having to sift through hours of footage to pursue a motorist. Footage transmitted from the camera to the control room can be reviewed immediately and a £100 fine sent to the person to whom the car's number plate is registered.

“This is how to install widespread social credit surveillance. Let a problem escalate, then say there is only technology to fix it, install an automated control solution and people will be happy. »

Momotchi

read the article

Last modification by Nathan- 54 there is
France-VPN

Réseau InternationalSurvey: The use of VPNs remains too low in France

International Network - Jul 14, 2023

A recent survey by data protection leaders Qwant, Proton, Olvid and Murena has provided valuable insights into the perception of personal data privacy among the French population.

   

The investigation revealed a privacy paradox. While 72% of respondents acknowledge the risks associated with sharing personal data online, only 48% say they take active steps to protect their data.

To remedy this situation, Stephen Kho, a cybersecurity expert, highlighted the effectiveness of Virtual Private Networks (VPNs) in preserving online privacy. He pointed out that a VPN can hide the IP addresses of users from prying eyes, including governments, hackers and other internet snoopers.

Mr. Kho also pointed to the vulnerability associated with connecting to public Wi-Fi networks. Hackers can easily spy on user activities in places like cafes and airports. In this regard, VPNs act as a protective shield, ensuring that all online actions remain hidden and safe from potential threats.

In addition to blocking prying eyes, VPNs also protect users from websites that track browsing habits.

Kho points out that while VPNs are a valuable tool for protecting privacy, individuals need to remain vigilant against phishing scams and malware attacks. Keeping software up-to-date and using reputable anti-virus and malware are essential practices for comprehensive online security.

The survey found that only 13% of respondents have turned to VPNs to improve privacy. However, the use of VPNs has seen a noticeable increase in the 18-24 age group.

read the article

Last modification by Nathan- 54 there is
thwart surveillance of your privacy

Mr GlobalizationThis solution allows you to thwart the surveillance of your private life

Mr Globalization - Jul 13, 2023

In 2018, we introduced you to "Eelo", now called "/e/OS", a smartphone operating system designed to protect our personal data and privacy from the appetite of GAFAM.

   

These issues are more topical than ever since the French government is implementing legal digital surveillance tools! Mr Mondialisation spoke with the computer scientist behind /e/OS, Gaël Duval, Open Source specialist, founding president of the eFoundation and of Murena. Decryption of this simple and practical solution.

We already knew that the personal data of Internet users interested the net giants to be used for advertising purposes, resold to companies or even direct votes as shown by the Facebook-Cambridge Analytica scandal. No data left online is harmless, whether it is our personal tastes or more sensitive ones such as our health. All the information collected on an individual makes it possible to classify it for commercial purposes, as Vincent Coquaz, director of Un Monde 5 Etoiles, explained in Soif de Sens.

Monitor political opposition

Connected objects are not only at the service of capitalism. They can also be effective during popular mobilizations, and thus endanger the power in place. In any case, this is what Emmanuel Macron implied about the popular revolts which followed the shooting death of the young Nahel: He came to imagine a possible censorship of social networks by "regulating or cutting".

But the Head of State and the government did not wait for these events to take an interest in our connected life. Under the guise of preserving national security, it is setting up digital surveillance tools such as the remote activation of electronic devices provided for in the Orientation and Programming Law of the Ministry of Justice 2023-2027 which has just been passed in National Assembly.

A measure denounced as soon as it was examined in the Senate by La Quadrature du Net, which rightly fears that its use is not confined to terrorism or organized crime but also serves against activists, in particular environmentalists. The 2024 Olympics become the pretext for authorizing biometric recognition, paving the way for a mass surveillance society.
Protecting yourself becomes suspicious
Support Mr Globalization on Tipeee

Just as alarming, it even becomes suspicious to protect oneself by using digital encryption tools or to refuse the exploitation of our data.

Concerning the case of December 8 implicating seven people for "association of terrorist criminals", the DGSI (General Directorate of Internal Security) thus noted that: "All the members contacted adopted clandestine behavior, with increased security of means of communication (encrypted applications, Tails operating system, TOR protocol allowing anonymous browsing on the Internet and public wifi). »

The use of WhatsApp, ProtonMail, a VPN, Tor… are liable to justify the existence of a criminal project, as alerted by La Quadrature du Net in its article dedicated to this case. And in this list of “suspicious” online behaviors we also find the /e/OS operating system, developed by Gaël Duval.

read the article