Rob Braxman Tech
Rob Braxman Tech
  • Видео 703
  • Просмотров 26 866 567
End-to-End Encryption (E2E) is Dead. Killed By New Tech.
Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be invented as approaches using apps from Signal, Whatsapp, Telegram and others will no longer provide this safety. This is something the 3-Letter agencies have wanted for many years. And they have gotten their way.
-----------------------------------
Brax Virtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the platform to see the store. You will not be asked for personal information to sign up.
-----------------------------------
Merch Store
my-store-c37a50.creator-spring.com/
-----------------------------------
I'm the Internet Pr...
Просмотров: 208 409

Видео

Microsoft's Secret Plan to Dominate Tech and You Again!
Просмотров 63 тыс.День назад
There are clues from Microsoft's latest moves on Windows 11 that reveal what Microsoft is really up to. Do you really believe Microsoft released features like Windows Recall Screenshots and Keylogging because of user demand? Or Microsoft is releasing these in spite of the lack of demand for a different reason. Yes there is a different reason. These new features are the precursor to a kind of AI...
CoPilot+ PCs, Windows Recall, Keylogging Privacy Invasions!
Просмотров 27 тыс.14 дней назад
Microsoft made some recent changes to Windows 11 which abuses privacy in multiple ways. But remember that Microsoft is not alone. The move to break our privacy with AI is something the competion started with first. Now they're playing catch up but doing so in the most aggressive way with the help of OpenAI. Is Apple Doing Client-Side Scanning? ruclips.net/video/WTGY4kJRXu0/видео.html Brax Virtu...
Using Phones Without SIM cards? Check out the Privacy Benefits.
Просмотров 67 тыс.21 день назад
00:00 Intro 01:20 Structure of the PSTN 06:21 How it Works 10:59 Advantages of No-SIM Card 15:27 Options for Getting Internet Access Did you know that you can actually use phones without SIM cards? In some cases you don't even need an actual phone to make calls. You don't need to completely disconnect from the phone network but yet you can wipe yourself from the grid while still keeping a long ...
Brax Virtual Phone Setup Instructions
Просмотров 8 тыс.28 дней назад
This video demonstrates how to set up your Brax Virtual Phone service. Brax Virtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the platform to see the store. You will not be asked for personal information to sign up. Merch Store my-store-c37a50.creator-spring.com/ I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to edu...
Is Apple Doing Client-Side Scanning on Your Devices?
Просмотров 17 тыс.Месяц назад
We need an answer and this video will give you one. There are conflicting answers on the Interwebs about whether or not Apple is scanning your device content. Previously you heard that Apple was scanning phones for CSAM content and then Apple suspended that project. But in a Louis Rossmann Video, it showed that images triggered some communication with Apple. Then other researchers said that was...
De-Googled Phones Have Superpowers! Why They're a Necessary Tool for Privacy
Просмотров 124 тыс.Месяц назад
I will explain what differentiates a standard or what I call a Normie phone from these specialized phones called De-Googled phones. By their name, you can see that Google is removed. But that is not about removing a few apps. Neither can you de-Google an iPhone. So learn the differences and then understand why De-Googled phones are a necessity if you want to option to not be watched. Brax Virtu...
Slave AI Cameras Monitoring Us Everywhere? Big Brother's 1984 Finally Complete
Просмотров 26 тыс.Месяц назад
There's a new technology present in most new model phones and iPhones since iPhone X that presents a more complicated kind of privacy problem. This is where devices can act as slave robots to do the bidding of an external party someone other than the owner of the device. This can then be used to perform a deeper level of surveillance which may be impossible to escape when fully activated. Brax ...
How to Disappear: Advanced Tech Techniques
Просмотров 78 тыс.Месяц назад
Some people want to disappear mostly because of fear for their safety. But as you will find out, disappearing requires planning. And the irony is that in order to successfully disappear, you must have a plan that you contrive beforehand, well ahead of the time that you'd ever think of disappearing. In this video, we will show you a different thought process. You will think through the approache...
Which Devices Will Survive a Putin Tactical EMP Strike?
Просмотров 118 тыс.2 месяца назад
Many of you know the basics of EMP's where your electronic devices will be wiped out and you will be back in the 1800's. But actually if you understand the technical details of an EMP, you might be surprised to find out that some devices will survive. This will make sense when you understand things like the frequencies of the pulse and the resonance of devices. Plus there are ways to be a prepp...
Skynet 2024: The Infrastructure is Complete!
Просмотров 248 тыс.2 месяца назад
The last piece in the infrastructure that allows the operation of Skynet is now in place just announced a week ago. With this piece the advent of wireless peer to peer command and control of devices and robotics now become possible in full, with a range to affect all of the world. There's a Secret Network - Skynet 2.0 (more detailed explanation of BLE) ruclips.net/video/K6HCgBzhibU/видео.html T...
Are there eSIM Hidden Dangers?
Просмотров 79 тыс.2 месяца назад
Some new phones like the iPhone comes only with an eSIM option. No physical SIM cards. Does this matter? Isn't it more convenient when a SIM card does not have to be inserted? This may be a direction we are going into that may prove to be a dangerous move for privacy. Brax Virtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the platform to see t...
Why Use Virtual Machines for Privacy and Security? Not Obvious! Top 6 List!
Просмотров 83 тыс.2 месяца назад
Some may already know that there are cybersecurity benefits to using a virtual machine. But less known are the privacy benefits. There are threats that can't be solved unless you use a virtual machine for example, it may be the only solution against Facebook. BraxVirtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the platform to see the store. ...
Age Verification is a Trick with a Different Intent than What You Think
Просмотров 15 тыс.2 месяца назад
Once again, another group is fired up about "Child Safety" issues. This time related to doing age verification on porn sites. But though the well meaning people who push this do not know this, they are just being manipulated by the real players who have a different agenda. The agenda is always about beating encryption, and population control. De-Googled Phones, BraxVirtual Phone, BytzVPN, BraxM...
I Evaded the Call Surveillance on the Phone Network! I'll Show You How
Просмотров 70 тыс.3 месяца назад
I found a way to evade the PSTN surveillance infrastructure when making a phone call. Just a little foresight and a little tech and a solution is at hand. This prior video defines the problem. The Surveillance Nuts and Bolts of the Phone Network ruclips.net/video/o-1DXElkH2g/видео.html Brax Virtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the...
The Surveillance Nuts and Bolts of the Phone Network
Просмотров 21 тыс.3 месяца назад
The Surveillance Nuts and Bolts of the Phone Network
When Do You Hide Your Phone Numbers? You Need to Know This!
Просмотров 19 тыс.3 месяца назад
When Do You Hide Your Phone Numbers? You Need to Know This!
I Solved the Phone Number Privacy Problem!
Просмотров 86 тыс.3 месяца назад
I Solved the Phone Number Privacy Problem!
How to Be Invisible on the Internet. 10 Identifiers to Eliminate
Просмотров 94 тыс.4 месяца назад
How to Be Invisible on the Internet. 10 Identifiers to Eliminate
What is Neuralink Really For?
Просмотров 95 тыс.4 месяца назад
What is Neuralink Really For?
AI Will Deliver UTOPIA They Say! Will It Be an Amazing World!? (Tongue in Cheek)
Просмотров 11 тыс.4 месяца назад
AI Will Deliver UTOPIA They Say! Will It Be an Amazing World!? (Tongue in Cheek)
REVEALED! Your Secret Power Over Google
Просмотров 44 тыс.4 месяца назад
REVEALED! Your Secret Power Over Google
Every. Click. Tracked. Recorded.
Просмотров 46 тыс.5 месяцев назад
Every. Click. Tracked. Recorded.
You Do Not Want to Be on This List! 4 Tips to Remember
Просмотров 406 тыс.5 месяцев назад
You Do Not Want to Be on This List! 4 Tips to Remember
My Life is None of Your Business! Leave Me Alone!
Просмотров 18 тыс.5 месяцев назад
My Life is None of Your Business! Leave Me Alone!
We LOST More of Our Privacy in 2023. A Bad Year: Year Review
Просмотров 12 тыс.5 месяцев назад
We LOST More of Our Privacy in 2023. A Bad Year: Year Review
How to Evade Digital Surveillance - Two Techniques that Work!
Просмотров 233 тыс.5 месяцев назад
How to Evade Digital Surveillance - Two Techniques that Work!
Mass Surveillance Methods: Cybersecurity Primer
Просмотров 14 тыс.6 месяцев назад
Mass Surveillance Methods: Cybersecurity Primer
My Solution to Fix the Screwed Up Internet Encryption
Просмотров 8 тыс.6 месяцев назад
My Solution to Fix the Screwed Up Internet Encryption
Web Encryption is now FICTION. But there's LetsEncrypt...
Просмотров 41 тыс.6 месяцев назад
Web Encryption is now FICTION. But there's LetsEncrypt...

Комментарии

  • @listen2meokidoki264
    @listen2meokidoki264 12 минут назад

    If Rob says at 03:40minutes that THEY know who is using each phone number then how do scammers work the phone system, unless it is with THEIR consent? Why is it only NDIVIDUALS (on RUclips) who actually do call scammers and turn the tables.

  • @petro7621
    @petro7621 24 минуты назад

    Perhaps replace the phone with a tablet that doesn’t have a baseband modem?

  • @spx730
    @spx730 34 минуты назад

    uhhhh so basic hidden keylogging available for decades on both pc and smartphone doesn't bother you?

  • @chadkerwin4719
    @chadkerwin4719 34 минуты назад

    Sir, I'm of the opinion that those still locked up because of Jan,6 is actually a crime. They shouldn't be there. However, none of them had any business being there. At all. It's foreign soil as far as Amerixans are concerned. But that brings me to my next point. I would submit that 99% of those you're trying to teach a d to reach, do not have a right to privacy. Don't get me wrong, I believe what most Americans, and just good people in general believe, we all have rights, that none of us want trampled. But, what do you think the leagal reason is that they are still there. How are those politicians getting away with this? Well, I would bet that every single American that's locked up there, and just about every single one in your audience, Whether they think of themselves as American or mot, has, at some point, claimed to be a U.S. citizen. U.S. citizens do not have any access to any constitutional guarantees. They most certainly do not have the right to privacy. Do you know why? Because multiple times, by thier own hand, under penalty of perjury, they claimed to be something (much) less than an American. They have claimed to be property. The only rights they may claim are the one's their owner's give them. I'll bet they didn't give them a right to privacy. As an example..."Therefore, the U.S. citizens residing in one of the states of the union, are classified as property and franchises of the federal government as an individual entity." Wheeling Steel Corp v Fox, 298 U.S. 193, 80 L.Ed. 1143, 56 S.Ct. 773 As another example "The right to trial by jury in civil cases, guaranteed by the 7th Amendment...and the right to bear arms guaranteed by the 2nd Amendment...have been distinctly held not to be privileges and immunities of citizens of the United States guaranteed by the 14th Amendment...and in effect the same decision was made in respect of the guarantee against prosecution, except by indictment of a grand jury, contained in the 5th Amendment...and the right to be confronted with witnesses, contained in the 6th Amendment, it was held that the indictment, made indispensable by the 5th Amendment, and trial by jury guaranteed by the 6th Amendment were not privileges and immunities of citizens of the United States,as those words were used in the 14th Amendment. We conclude, therefore, that the excemption from compulsory self-incrimination is not a privilege or immunity of National citizenship guaranteed by this clause of the 14th Amendment." Twining vs New Jersey, 211 US 78, 98-99 Notice the phrase "As those words were used." But very telling was how "U.S." was spelled at the end of my examples. It isn't a typo. So one may ask themselves what does that all mean? It means exactly what I said it meant. 99% of Americsns are slaves, who "volunteered" to be slaves. Agsin, slaves do not have a right to privacy, or any other. Those that choose it, won't care why you try to teach them, and for the rest it will do them no good. It actually will probably harm those that follow your advice and wisdom. Until they fix something much more foundational first. I've tried to tell anyone that would listen how to fix it. I did for myself, but that doesn't matter. They think they have a grip on their life. It doesn't matter that they do not. They can't hear. Which honestly is crushing to think, but it is a fact. Maybe, as smart as you are, you can verify what I've said, and then figure that out for them too. But I wouldn't bet on it.

  • @jamescpalmer
    @jamescpalmer 59 минут назад

    Easy - Don't buy devices that do this, patch devices that already do it, and create open source patches to patch operating systems to protect the people. Any OS doing this would be suicide.

  • @relaxationstation7374
    @relaxationstation7374 Час назад

    We desperately need a video about "The Bloatware Scam" that phone makers are using to electronically stuff your device with totally useless sofeware to take up 97% of your storage space and force you to buy more storage space in the cloud, thereby unfairly enriching themselves.

  • @jnagarya519
    @jnagarya519 2 часа назад

    Birth certificates are "ID cards". And there are constructive reasons such individual identifications. Criminals oppose it, of course. Snowdon is a criminal and traitor -- that's why he's voluntarily living under the Putin dictatorship. Michael Cohen was not wiretapped. But his phone records were obtained by means of subpoena, and his electronic devices were also seized, also under subpoena.

  • @syrus3k
    @syrus3k 2 часа назад

    Privacy is a joke while you're not really in control of your device. For a start with software like WhatsApp you're just assuming they're telling the truth that is e2e. Secondly how do you know for sure Google isn't complacent? The only secure thing to do is run open source software, and by the sounds of it on open source hardware. The issue is you can either accept it and use modern stuff or not and fall by the wayside.

  • @deadonentry
    @deadonentry 3 часа назад

    its kind of stupid u need to sign up with email adresse to get a brax email

  • @FredPilcher
    @FredPilcher 5 часов назад

    Using crApple or Windwoes is its own punoshment.

  • @CompactFlesh
    @CompactFlesh 6 часов назад

    this video is brought to you by GOOGLE

  • @yurydmorales
    @yurydmorales 6 часов назад

    00:00🤖 The user starts by asking if viewers are familiar with OpenAI and its developments like ChatGPT and GPT-4, highlighting Microsoft's massive investment in OpenAI. 01:32📈 Microsoft is positioning itself with tools like Windows Copilot to dominate the tech sector, introducing features like Windows Recall and Key Logging in Windows 11. 05:37💼 Windows Recall not only captures screenshots but integrates an NPU chip in new devices like the Snapdragon X Elite for local image processing and facial recognition. 07:27🔍 "Key logging" in Windows 11 records all user actions, forming a detailed history that Microsoft can use for AI like Copilot, which operates from central servers, not locally. 10:03🖥 NPUs in PCs allow Microsoft to analyze data locally without sending it to external servers, enhancing functions like object identification and emotion recognition in images. 12:01🤔 The purpose of features like Windows Recall and Key Logging is to create a detailed profile of the user for AI like Copilot, which can influence user interactions and decisions. 15:00⚠ Integrating AI into Windows could allow Microsoft to have deep control over user information and actions, raising concerns about privacy and ethical use of data. 18:27🔒 There is a need to protect privacy in the face of increasing control by large tech companies like Microsoft, promoting tools like Bra Virtual Phone and Bra Mail to avoid tracking. 20:54🛡 Consideration is urged for alternatives outside the Microsoft ecosystem due to the privacy and data control implications of its new features.

  • @LonGin-gp2cr
    @LonGin-gp2cr 6 часов назад

    Can build a phone like John mcgaffy? The ghost phone was going to be a Huge breakthrough in cell phone technology. And the government killed him. Best channel on the Internet.

  • @amadeuszgggg
    @amadeuszgggg 6 часов назад

    Is Fairphone 5 secure ? it has clear android and removable parts.. Could someone help me check that ?

  • @gerhardbotha7336
    @gerhardbotha7336 6 часов назад

    Main grid transformers can survive voltage surges like described. It is common to apply a test pulse of up to 1 million volts on transformer windings during QA testing. A Faraday cage with emergency devices at home will help I am sure

  • @yurydmorales
    @yurydmorales 6 часов назад

    00:03🤖 Long-term technological trends are influenced by powerful entities like surveillance agencies. 00:39🔍 By late 2024, new devices will scan all content pre-encryption, compromising security and privacy. 02:12🛡 Introduction of NPU chips in all new devices by 2024 marks a significant shift towards ending end-to-end encryption. 03:15💼 Operating systems like iOS, Mac OS, Windows, and Android will integrate these NPUs, enabling advanced image processing and local content analysis. 04:18🔐 Infrastructure for pre-encryption content scanning is set, pending external command and control implementation. 06:32🚨 Widespread adoption of these devices will compromise communication security in apps like Signal, Telegram, and WhatsApp, impacting privacy significantly. 08:02💬 Proposed solution involves using validated hardware and offline encrypted communication systems to evade continuous surveillance on conventional devices. 10:17🔍 Current options like Linux for avoiding NPU surveillance may not ensure complete security due to varied device usage among contacts. 11:23🛡 Proposed solution involves offline encrypted communication using validated hardware to bypass surveillance on mainstream devices. 13:37💬 Difficulty in adopting complex solutions may lead many to accept surveillance in daily digital interactions despite privacy risks. 15:02🚨 Existing infrastructure allows NPUs to analyze local device content, with potential for external control to enhance surveillance capabilities. 16:10🔐 Microsoft's Windows 11 introduces extensive screenshot and key logging capabilities, integrated with NPUs for comprehensive content analysis. 17:01📉 Despite resistance, increasing integration of NPUs in devices signals a shift towards pervasive surveillance in digital communication. 18:25🚨 Potential future implications include AI surveillance expanding beyond devices to physical spaces, enhancing monitoring capabilities significantly. 19:11🔐 Efforts to mitigate surveillance include community-building for privacy awareness and development of privacy-focused tools and services.

  • @CompactFlesh
    @CompactFlesh 6 часов назад

    what if no one wants these devices any more?

  • @thecsslife
    @thecsslife 6 часов назад

    Each day it looks like AI has a much darker side…

  • @BinaryAdventure
    @BinaryAdventure 8 часов назад

    Rob this could be defeated legally because if 2 parties are messaging or sending photos, and one does not have the NPU, the NPU of party A will violate the privacy rights of party B when party B has not agreed to the terms of having the NPU and its functionality. This will be the way to push back on this.

  • @tomvanalst8533
    @tomvanalst8533 8 часов назад

    during my days (90's to retirement recently), as network engineer and network admin, the situation you outline so clearly is evident during expo's and conference's. The Apple phones flood the networks phoning home, followed by the androids. Thanks for posting this video to bring it to public awareness, I would have been fired for talking about this subject years ago. My job was to make things work, period. PS, AT&T was the biggest culprit.

  • @wesandy22
    @wesandy22 8 часов назад

    Why use Putin’s name?.. Next time keep the politics out of these great discussions.... just saying.

  • @phyrtiv
    @phyrtiv 8 часов назад

    The evolution of the violation and invasion of privacy keeps surprising me And it surprises me even more how people don't attack back against this tirany

  • @canadianwildlifeservice8883
    @canadianwildlifeservice8883 9 часов назад

    Hopefully the 4th amendment will prevent this from ever happening in the U.S. Artificial intelligence is not above the law and not some sort of law enforcement!

  • @psfgtech
    @psfgtech 11 часов назад

    Linux/ Fedora

  • @mohl-bodell2948
    @mohl-bodell2948 11 часов назад

    How are they going to keep running AI on everything you do on your phone all the time without killing your battery?

  • @richchase3140
    @richchase3140 12 часов назад

    Yeah. That's true.

  • @johnmorrison3465
    @johnmorrison3465 12 часов назад

    can you use a wi-fi only device with a google app to set up a passkey?

  • @techfan7808
    @techfan7808 12 часов назад

    Rob, this is a bit problematic explanation. E2e is not dead, but rendered useless on systems with ai, recall, and an enabled npu. Demand Foss on your devices, use old phones. Use unlinked Google phones with changeable Sim.

    • @robbraxmantech
      @robbraxmantech 12 часов назад

      You cannot be sure anymore since the persons you're talking to are on non-secure devices. As I said, we have to design a new way here, one that verifies the hardware.

    • @techfan7808
      @techfan7808 9 часов назад

      @@robbraxmantech seriously? With e2e we've always had to trust the person on the other end. And expect that person is intelligent and knowledgeable. E2e hasn't been broken. We need to demand sensible tech laws and vote for companies with our pocketbooks. I see your point, which is valid, however the conclusion is distorted and misleading. Many people trust you to deliver an accurate view of the challenges facing society. Do better.

  • @nigelliam153
    @nigelliam153 13 часов назад

    So can someone set up a business selling de googled phones? Seems like it would be a big seller.

  • @trixer230
    @trixer230 13 часов назад

    Can you explain to me mathematically as well as using the pcs you mentions schematics to prove your theory? Cause someone who codes for these things on a daily basis you are kind of wrong really, most of these chips outputs are encrypted and with a network sensor like pfsense you can see that none of that data is leaving your computer. This whole video is just a fear mongering video for AI, I can't find any facts here, or mathematical proof. It's not embedded the way you think it is, do you understand how much computing power it would take to completely scan your screen over over and over? You are kind of silly. Just lots of fear mongering. Be afraid of AI it's spying on you and watching you. For those of you who want to know how much BS this dude is spitting out, should read the book called "Reading the minds of AI" and you will figure out that its not as easy as this dude thinks.

    • @robbraxmantech
      @robbraxmantech 12 часов назад

      You're missing the point I think. In any case, in 2 wednesdays, I will explain it in code.

  • @jaimedpcaus1
    @jaimedpcaus1 13 часов назад

    Wow. Excellent report. I wonder if there will be companies/pioneers that will create solutions to not allow this kind of surveillance.

    • @robbraxmantech
      @robbraxmantech 12 часов назад

      Of course they will. I could make one too. The problem is if the normies would use it.

  • @xxz4655
    @xxz4655 14 часов назад

    thankyou sir you are the greatest of all times, for informing everyone :)

  • @hago7568
    @hago7568 15 часов назад

    This AI-shit snuffed the fun out off programming and computers for me tbh. Remember the 90ies when we marveled over the cool stuff that the demo scene managed to cramp into 4k files... 😢

  • @jamesgichuru167
    @jamesgichuru167 15 часов назад

    Question: how does this affect de-googled phones running secure messaging apps?

    • @robbraxmantech
      @robbraxmantech 14 часов назад

      de-Googled (AOSP) and Linux themselves are both safe. But the problem is that people you're communicating with are not

    • @jamesgichuru167
      @jamesgichuru167 10 часов назад

      Thank you! For everything you do!

  • @7Mindovermatter1
    @7Mindovermatter1 16 часов назад

    you guy are acting like you HAve to buy all the crappy new tech like the good stuff we used to use is no longer valid , upgrades are not so much upgrades anymore

  • @JuggaloNY
    @JuggaloNY 16 часов назад

    If you used a standard Android Google phone but took the SIM out of it, Share the data from the DE-Googled phone. Could/would that defeat the purpose point blank? Or is there a workaround for so? Maybe you could text on the Google phone somehow 🤔 or better yet? Messaging via Signal, etc Instill achieve no tracking or minimal? Say you want to use Google Maps, for instance. But listen to music on the DE-Google phone? Also, are you aware that there is an extra on Samsung that goes beyond airplane mode and shuts down "all features" Also, if the Normie Android Google phone is off or on, with or without a SIM, couldn't that be tracked? Or maybe it needs to have a SIM, but I thought it didn't matter if the phone was shut off. Isn't there another battery that keeps things kind of running? Or is this all fugazi info? Please let me know. 🙏 Ho, anyone who knows and would take the time to answer would be much appreciated. P.S. What OS besides graphing does anyone suggest for achieving the abilities between the two phones without them being tracked laid out above? Thx!

  • @learningisbliss1143
    @learningisbliss1143 16 часов назад

    Would using Linux as a virtual machine on Windows get around the problem?

  • @andrewf.7813
    @andrewf.7813 16 часов назад

    🙏🙏🙏

  • @zannemairiwoods528
    @zannemairiwoods528 16 часов назад

    Do you think Duck Duck go is a safer web browser ?

  • @ig_foobar
    @ig_foobar 17 часов назад

    Bill Gates is the single most evil person ever to walk the face of the earth. More evil than Mao, Hitler, Obama, and Stalin.

  • @nopenope9945
    @nopenope9945 17 часов назад

    The question I have is that we have batteries on all our stuff. It's not just the data transfer that is huge, it's the sheer electrical requirement to send that data. Would we not notice our battery draining super fast and be irritated with that?

  • @WyckedEntertainment
    @WyckedEntertainment 17 часов назад

    thank you Rob. you know why.

  • @prhasn
    @prhasn 17 часов назад

    Do not use Apple. 90% of problem solved.

  • @Nextliar
    @Nextliar 18 часов назад

    I use hardware or 2012-15 so no AI chips

  • @terendemal6789
    @terendemal6789 18 часов назад

    We’re achieving Technocracy

  • @micpom8460
    @micpom8460 18 часов назад

    Untrust M$ Win certificates to block their data harvesting

    • @robbraxmantech
      @robbraxmantech 14 часов назад

      But every OS update restores it. I did this myself!

  • @luv2travel2000
    @luv2travel2000 18 часов назад

    Hi Rob. Is Session better than S i g n a l ?

  • @leathan7
    @leathan7 18 часов назад

    E2E is never gunna be dead good sir. Monero be better and better as time goes on :)

  • @zannemairiwoods528
    @zannemairiwoods528 18 часов назад

    You are brilliant at this as your years of work on these technical issues is obvious however as much as I would love to have your Brax phone service ,my expertise is falling way short of understanding !!! The concept is amazing therefore , can you do a series of beginners tutorials ? My question is ,does my having a regular device and using You Tube have any derogatory effects on my behind tracked ? Thank you 👍

  • @kareno7848
    @kareno7848 19 часов назад

    Couldn't find you on Twitter. Had a very strange experience yesterday. I was in a certain city. My phone is always in a faraday bag. This city is maybe 40 miles from a nuclear power plant. My radio was off. I was driving home and radio came on and there was this high pitched staticky very loud noise from my speakers. I looked, and saw the radio was on so I turned it off. No dice. I finally pulled over, shut off the engine and restarted and it stopped. Today I turn on the radio and everything is fine. Was I attacked?