#TBOT: Take Back Our Tech – Telegram
#TBOT: Take Back Our Tech
7.54K subscribers
508 photos
468 videos
3 files
1.47K links
Let's use technology that doesn't use us.

Official Blog:
https://takebackourtech.org

TBOT Show:
https://tbot.substack.com
Download Telegram
⚡️5 Startling Technology Leaks from Julian Assange's Wikileaks
@takebackourtech

Today a judgement was passed in Julian Assange’s extradition case, although it drags the case on and gives the possibility for a final rejection. If this happens, Assange will spend up to 175 years in a US maximum security prison.

His crime? Publishing classified documents which corroborated war crimes, covert surveillance programs, and torture. We pray for his release, and we will never forget how Assange and Wikileaks illuminated public awareness of these shadowy programs so we could begin to protect ourselves.

Follow Taylor Hudak for coverage on the Assange Trial.
Follow the #TBOT Telegram Channel
Follow the #TBOT substack.

In honor of Julian Assange, here are 5 published Wikileaks that expanded our awareness on technology surveillance.

1. The Location of 100 Amazon Data Centers

Amazon, the largest cloud computing provider in the world is also one of the largest cloud providers for government and military. They wouldn’t be doing their jobs if they weren’t protecting the locations of their data centers, unforunately for them - they didn’t see Wikileaks coming. In 2018, Wikileaks published a highly confidential document that listed the IP addresses of one-hundred data centers.

No, there’s no creepy looking Amazon badge on these buildings - these buildings were operated under front companies. The names of these front companies were leaked along with addresses, contact emails, and directions - and a map of their locations.

What secrets lie behind the walls of these unassuming buildings?

https://wikileaks.org/amazon-atlas

2. ELSA, Locating Windows Computers Through WiFi

Leaked in 2017 as part of the Vault 7 CIA hacking tools, ELSA is a geo-location malware project that can detect the location of Windows devices. Once ELSA has infected a target computer, it takes a list of available WiFi access points and cross-references these access points with public geo-location databases supplied by Google or Microsoft. Based on the signal strength it can calculate the position of the device which can be exfiltrated later.

#TBOT Tip: Don’t use Windows. Learn to love Linux.

3. No Isolated Network Is Safe, Brutal Kangaroo

Brutal Kangaroo, also a part of the Vault 7 tools was used to target closed ‘air-gapped’ networks that are not connected to to the outside world. Brutal Kangaroo is deployed using a thumbdrive, and can spread through use of the thumbdrive on other computers. Eventually, controlled computers begin communicating directly with each other to exchange data.

#TBOT Tip: Be watchful over your devices. No external USBs, avoid having USBs delivered.

4. Is your local router a FlyTrap?

CheryBlossom, another tool from Vault 7 is used to capture wireless network devices like wireless routers. Routers can be compromised over the internet through a firmware upgrade, at which point the router becomes a FlyTrap and acts as an ‘Man-In-The-Middle’, manipulating the internet traffic passing through it. It can scan for email addresses, chats, MAC addresses of devices, and VoIP numbers.

#TBOT Tip: Run a VPN on each device to encrypt internet traffic before it reaches a network.

5. Scribbles: Hidden watermarks in printed documents

A tool that has likely been used to catch whistleblowers, Scribbles is yet another Vault 7 project that embeds beacons into Microsoft Office documents. When a whistleblower prints the documents and releases them, the watermark can be restored to discover the source of the leak. Alternative softwares like OpenOffice or LibreOffice made this watermark visible to the target, and it was recommended to make the watermark match the document.

Readers may be reminded of the NSA’s case against whistlerblower Reality Leigh Winner, a former Air Force Linguist who worked for the NSA and sent a printed document to be published at The Intercept. Certain printers use microdots to identify the printer, date and time of printing.

Be careful what you print!
Please open Telegram to view this post
VIEW IN TELEGRAM
👍14🔥4👏1
The discoveries above are a mere drop in the ocean of Wikileaks content that are now known to the world. Please keep in mind that most of the leaks are closed to a decade old. Simply following the tips or avoiding the software mentioned doesn’t guarantee safety from these attacks, or attacks like them. Our advice is to avoid mass surveillance by avoiding proprietary software.

In this short post we kept it focused to technology and left out the disgusting mechanations of the war machine. If you’d like to learn more, we highly encourage you to research Wikileaks and Julian Assange.

Although we must peer into the shadows, the world is better off with this knowledge. Bless those brave enough to speak up and may God protect them all.

✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
👍13🔥7
Forwarded from The Free Thought Project
🎙 NEW PODCAST ~ In this compelling episode of the Free Thought Project Podcast, Jason and Matt welcome Karl Wuckert, a stalwart advocate for liberty, founder of "The Liberated Man," and "Sovereign Society," and a voice for militant peaceful activism.

Full Episode: https://open.spotify.com/episode/6oCvBZz7XKSt3D3HGqLaUP?go=1&sp_cid=acd989500c55c6dd41a712c5e8b1a023

More Info: https://thefreethoughtproject.com/podcast/podcast-karl-wuckert-disobedience-militant-non-violence-the-path-to-a-sovereign-society

SPONSOR: 📱📲 The Above Phone is the combination of secure hardware and free & open-source software, alongside privacy services and accessories to make it the best end-to-end privacy respecting solution available!

Learn More About the Above Phone: https://abovephone.com/?above=thefreethoughtproject

#TheFreeThoughtProject #AbovePhone
7👍6
Forwarded from Libreware
Safe Space (A safe space for your digital valuables.)

Safe space is an app that creates a separate place on your android device to store valuable files. This storage location is not visible to other apps and is encrypted by the system by default.

Features:
* Store files in a secure storage location that is not visible to other apps and is secured by device encryption and system authentication (Biometric and PIN/Pattern/Password)
* Open Images, Audio, Video, PDF documents and plain text documents
* Create simple text notes without leaving the app
* Dark and light mode
* ability to copy and move files
* Import from and export files to external storage without storage permissions
* Completely offline with no telemetry and data collection

https://f-droid.org/packages/org.privacymatters.safespace

#cloud #Android #Security #Privacy
#EncryptedFiles
🔥10👍8👏51
Hey peeps, I'm creating a list of powerful content creators fighting the good fight and spreading solutions in Europe. this doesn't have to be related to technology

Do y'all know anyone? Who should I follow?

Please let me know. Send a comment to our chat.

@takebackourtech_chat
Support independent shows like this one! who's at the top of #thepyramidofpower
There's Still Time to Invest in the Final Episodes of the Pyramid of Power Series!

Friends,

Derrick Broze here, checking in after a trip to Atlanta for the Next Steps Conference. It was another beautiful weekend spending time with people who are focused on - what comes next? What are we doing to promote solutions for the many problems facing humanity?

As you likely know, solutions are an essential part of my work. In fact, even with my journalism I make an effort to promote solutions. I see it as a combo approach - educate people about the problems, and then, help lead them to practical solutions we can implement in our lives.

This is actually one of the reasons I decided to produce my 17-part documentary series, The Pyramid of Power. So far, we have released 13 episodes with factual information about the control grid, and, of course, solutions for those problems!

We are currently working on Chapter 14: The False Flag Deception, and I can't wait to share it!


But to do that, I need your help!

In case you forgot, we are still crowdfunding to
finish The Pyramid of Power docu-series!

Once this series is done we can use it as a tool to wake people up for years to come. I have already seen how powerful the series is in educating and empowering people regarding the truths of our world.

If you can afford it, I am humbly asking you to please consider donating $5, 10, 25, or 100 to the campaign so we can finish it. 

Thanks for the support.

Remember,

You Are Powerful. You Are Beautiful. You Are Free.

P.S. - see my interview with new editor Stef to get to know him and hear our vision for the final 4 episodes!
4👍2
⚡️Ross Ulbricht's 40th Birthday - Twitter Space
@takebackourtech

Ross Ulbricht's birthday was 4 days ago and a Twitter space was organized to commemorate Ross and discuss the case.

Silkroad changed the world by showing that it was possible to have exchange outside of the control of governments.

For this feat, Ross was given double life prison sentences.

Learn more about the case on this replay - my friends Kenny Palurintano, Derrick Broze, John Bush, and Sterlin Lujan all give their thoughts along with several other freedom-minded people.

https://odysee.com/@SilkRoadOnSOL:a/freeross-40th-birthday-space:6

#FreeRoss

✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
Please open Telegram to view this post
VIEW IN TELEGRAM
15👍2👏1
Audio
A meaningful jam for your Sunday from Illuminati Congo ft Sterlin Lujan! Jam this

#FreeRoss
👍2
Forwarded from The Daily Psyop
Thomas Massie: There are 3 places we end up:

1) Steer our government away from economic collapse.


2) Economic collapse, and then:

a. renaissance,
b. totalitarianism, or
c. national divorce


3) Slow devolution into Chinese style communism and central control. No one remembers freedom.

Slow devolution (3) is most likely and terrifying.

Rapid devolution via an economic crash (2)b is next most likely.

Restoring our country without a crash (1) seems unlikely.

Unfortunately, liberty’s slim chance of survival might be outcomes (2)a and (2)c.

It might be possible that people who value liberty can preserve it by using technology to outrun and front-run government.

Technology enables things that governments fear and want to control:

sound money,
privacy,
communication,
access to information,
decentralized energy,
AI…

[Follow
@takebackourtech for a good tech-focused telegram channel]

🔗SOURCE ➡️ Rep. Thomas Massie

Follow us on
Minds / X / Substack

Follow ➡️ @PsyopDaily
👍83🔥2
Media is too big
VIEW IN TELEGRAM
Selling XMR for Cash in Mexico without ID or a Bank

Friends,

Check out this short video I put together showing you how I sell Monero (XMR) for cash (pesos) when I need it. I do this without using a bank account, showing ID, or other KYC measures.

Learn more tips like this by purchasing my How to Build Your Own Private Parallel Economy Course here!
🔥16👍8
⚡️PREVIEW: Food Forest Technology
@takebackourtech

Today I hung out with the Jim Gale of food forest abundance and took a tour of his property in St. Cloud, Florida. We talked about how the community manages to stay completely off-grid for water, power, and delicious nutritious food.

I will upload this in the next week or two, make sure you are signed up to our mailing list. :)

✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
13👏12👍5
Forwarded from Solutions Only, Please
How to Opt Out of TSA Facial Recognition scanners

Simply say: "I'd like to opt out."

If they don't know what you're talking about, ask for a supervisor.

It's in their own codes/regulations, because every time they injure our rights, they have to give us a remedy... even if they hide it.

This notice should be clearly visible at every chekpoint, however, many people are reporting that it's either hidden or nowhere to be seen at all.

Know what your rights are. Stand on your square, but don't be a dick.

Be kind, but firm.
👍25👏84👎1😡1