Buy yourself a shackle! is the latest in security
Are you tired of the same boring old accessories? You want to show everyone that you're really connected? Well, don't look any further! We present you the smart shackle -…
The growing trend of censorship in the digital age: the alarming use of online violence as a pretext for repression
The exploitation of "online violence" as a justification for censorship and surveillance is a worrying development that deserves serious attention. The expansion of cybervigilance and the measurement of digital identity,…
Biometrics is more useful for phishing than for preventing it
Governments show facial recognition and digital identity as the ultimate protection against identity theft and unauthorized access. However, "security" problems actually lie in databases and computer systems. This highlights that…
The digital identification scheme: a path to the digital gulag
Mandatory digital identification is not about safety or efficiency; it's about control. It is about creating a society where personal freedom is sacrificed for the illusion of security, where vigilance…
Climate TRACE - A digital panopticon for monitoring and control
Climate TRACE - A digital panopticon for monitoring and control A detailed global map of greenhouse gases, capable of identifying emissions in individual farms and factories. With the precision of…
Chaos Is Useful for Enforcing Digital Domination
The so-called "progress" promoted by these institutions is a facade that hides a relentless push towards digital totalitarianism. It aims to destroy the cultural fabric, destabilize society and make people…
AI surveillance to "predict" crimes
AI-driven surveillance systems are increasingly being used to solve "security" problems These systems, developed in collaboration with AI companies, seek to identify "problematic behaviors" and alert law enforcement forces allegedly…
DeepSeek was transferring personal information
DeepSeek shared user data with companies in China and the United States without obtaining explicit consent. Chinese technology companies prioritize compliance with CCP directives over user privacy.
The expansion of QR codes has normalized tracking and the erosion of privacy.
The widespread adoption of QR codes is a calculated move by institutions to extend their reach into every facet of our lives, cloaked as a benefit, but fundamentally serving as…
