The Agenda: Their Vision, Your Future examines the digital prison which awaits us if we do not push back right now. How your food, energy, money, travel and even your access to the internet could be limited and controlled; how financial power is strangling democracy and how global institutions like the World Health Organisation are commandeered to champion ideological and fiscal objectives.
https://www.youtube.com/watch?v=ZFHHOBiUrkg
guidingwhispers2d
The world's biggest polluter: the US military.
Earth's Greatest Enemy is a new documentary film investigating the Pentagon's catastrophic toll on the planet–from carbon emissions, to toxic dumping, to habitat destruction and more, while highlighting the struggles against it. This will be the first ever piece of media that puts every facet of the Pentagon's pollution together into one indictment.
https://www.youtube.com/watch?v=YykTD3EOjVE
guidingwhispers2d
CLONED MEAT
could soon be available in Canadian grocery stores without special labelling, as Health Canada has lifted restrictions on meat from cloned cattle and pigs, deeming it no longer a "novel food." This decision means that such meat can be commercialized without consumer notification or labelling, following a safety assessment based on international scientific opinions. The policy update aligns the regulation of cloned meat with conventional meat products, but meat from other cloned animals like goats and sheep remains classified as novel. The change has been met with concerns over transparency and consumer choice, with critics arguing that Canadians are not being adequately informed about this significant shift in food regulation.
https://nationalpost.com/life/food/cloned-meat
guidingwhispers2d
KLEPTOCRACY: RULE BY THIEVES
A kleptocracy is literally “rule by thieves.” It is a form of government in which a network of ruling elites “steal public funds for their own private gain using public institutions.”
https://tippinsights.com/rule-by-thieves-the-police-state-becomes-a-pay-to-play-shadow-government/?ref=biztoc.com
guidingwhispers3d
The Dark Side of Facial Recognition Technology: Understanding the Risks
Facial recognition technology is often touted as a convenient and efficient way to identify individuals in public spaces. However, this technology has far-reaching implications that can compromise personal security and data protection. Here's how it works:
AI-powered facial recognition systems analyze individual facial features, such as eyes, nose, mouth, and jawline, to create a unique identifier.
These identifiers are often trained on vast amounts of data from various sources, including: Public records (e.g., driver's licenses, passports),
Social media profiles, Surveillance footage, Customer databases and more.
As you interact with these systems, your behavior becomes a valuable data point for building a behavioral profile. This can include time of day and location, emotions and expressions, Posture and gait, Interactions with other people or objects.
Since AI only recognizes patterns, it's essential to understand that your every interaction becomes a building block for a behavioral profile. This means that even if you're not identified by facial recognition, your behavior can still be used to create a de facto identity. A combination of your facial features and behavior can create a unique identifier. AI may infer sensitive information about you, such as age, sex, occupation, or interests.
Consider this: leave your smartphone at home or even better, ditch it altogether. I'm not joking. When combined with your phone number, your smartphone essentially becomes a digital ID and a surveillance device, all in one. It's like carrying a tracking bug in your pocket, and unfortunately, you're at a disadvantage when it comes to protecting your privacy. So, why not give it a try and see how liberating it feels to be truly offline? You will survive.
guidingwhispers3d
Did you know that Proton VPN is free to use on Android? Without an account? Here is what you need to know.
Most free VPN services should not be used, as they may limit security and privacy, may offer slow speeds or unreliable connections, or offer poor customer service. Proton VPN offers the same high standard for guests. While some features are limited, it is not security or privacy that is.
https://www.ghacks.net/2025/06/18/proton-vpn-is-free-to-use-on-android-without-an-account-here-is-what-you-need-to-know/
guidingwhispers3d
AI's Fascist Undercurrents: A Growing Threat
In today's AI-driven world, critics Aline Blankertz and Rainer MĂĽhlhoff warn of hidden antidemocratic ideologies. They argue that fascist tendencies are infiltrating daily life, shaping debates and technological progress. Once confined to science fiction, concepts like thought control and superintelligences are now at the forefront, pushed by tech entrepreneurs who market AI as a societal cure-all. The authors urge vigilance, calling for recognition and resistance against these ideologies.
Defining Digital Faschismus
Blankertz and MĂĽhlhoff define fascism as using violence to destroy democratic institutions. They see AI as a powerful tool in this process, capable of life-altering decisions, such as at EU borders. Uncritical acceptance of AI as progress plays into the hands of those who view it as a political power tool.
Silicon Valley's Role
The radical Alt-Right movement, known as the "Dark Enlightenment," advocates for a CEO-led state. This ideology gains traction through figures like Peter Thiel, who supports libertarian views and opposes democracy. Thiel's influence extends to US politics, including his support for J. D. Vance.
Transhumanism and Beyond
Ideologies like transhumanism and effective altruism are influential in the tech world. Promoted by figures like Nick Bostrom and Julian Huxley, these ideologies are seen as having fascist roots. Longtermism, which considers the ethical significance of future generations, is linked to debates about AI and superintelligence.
European Influence and Regulation
These ideologies are gaining traction in Europe, with the Effective Altruism movement present in German universities. Institutions like the Future of Life Institute, supported by Elon Musk and Vitalik Buterin, are active in Europe. Blankertz and MĂĽhlhoff advocate for stricter KI regulation, urging society to decide the form of KI it wants, rather than leaving it to KI companies.
( re:publica 25 )
guidingwhispers3d
SURVIVAL MANUAL
The "Survival Manual" on F-Droid is an open-source application designed to provide users with essential information and guidance on survival skills and emergency preparedness. F-Droid is a platform that hosts free and open-source Android applications, emphasizing privacy and user control.
"Survival Manual" includes content like:
Basic first aid procedures
Shelter building tips
Fire starting techniques
Food and water sourcing
Navigation skills
Emergency signaling methods
Tips for various survival scenarios
Visit F-Droid's website for the Survival Manual.
https://f-droid.org/packages/org.ligi.survivalmanual/
guidingwhispers3d
PrivacySpy
Most people don't have the patience to read privacy policies. But privacy is important, and we shouldn't just trust that products are treating our data right. PrivacySpy uses a consistent rubric to grade privacy policies on a ten-point scale.
PrivacySpy makes privacy policies more convenient and accessible for those who simply don't have the time—or patience—to read full privacy policies themselves. Privacy policies should be more than just a box to check; they are fundamental to ensuring data transparency and allowing users to make informed choices.
https://privacyspy.org/directory/
guidingwhispers3d
A story that seems to have come out of an espionage thriller is gaining ground on the web.
Over the past two decades, India has dominated the software industry. As a result, Gulf nations and Iran have heavily relied on Indian software and programmers.
After a Mossad infiltration in Iran and subsequent investigations with China and Russia, it was revealed that Indian programmers had been in contact with India via Elon Musk's Starlink. Arrests and interrogations uncovered a shocking truth:
Most Indian software in Iran is actually Israeli, embedded with backdoors that transmit real-time data to Israel. This includes sensitive information like civil registries, passport data, airport systems, and more.
Even more concerning, this software disrupts military devices and enables remote control operations.
The same software is used in the Gulf States—UAE, Saudi Arabia, Qatar, and Kuwait. This means entry and exit points for anyone entering these countries, including Egyptians, are being monitored and shared with Israel.
Iran has exposed this, and the revelation is causing a major crisis in these nations. A massive fallout with India is imminent, with full details expected in the coming days.
https://news-pravda.com/world/2025/06/28/1476790.html