Free Republic
Browse · Search
General/Chat
Topics · Post Article

From the video:

Now they can observe what you're doing with Microsoft Recall and Copilot. Control. The next step is to lock you out via policy if they want to shut you down.

This is debanking 2.0. In case you forgot, let me remind you. In the UK, Nigel Farage was debanked for politics. In Canada, truckers were frozen out of their bank accounts.

In China, if you have low social scores, you have no access to WeChat, which is their primary payment method. Now this new sophisticated infrastructure exists in the West.

Not so crazy to use Linux anymore, is it?

1 posted on 11/03/2025 6:15:04 PM PST by E. Pluribus Unum
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first previous 1-2021-25 last
To: E. Pluribus Unum

BTT watching this later!


45 posted on 11/03/2025 10:07:43 PM PST by Theophilus (covfefe)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: E. Pluribus Unum

This guy is good! I have seen a few of his videos. He developed and sells smartphone that cannot track you, that cannot phone home to google n others. I believe it uses a unique Linux OS.

I will never buy an “AI ready” Windows 11 computer that has a neural AI chip on board. Though maybe for a Linux one.


46 posted on 11/03/2025 10:07:48 PM PST by dennisw (There is no limit to human stupidity )
[ Post Reply | Private Reply | To 1 | View Replies ]

To: E. Pluribus Unum

How will all this affect my VIC-20?


58 posted on 11/04/2025 2:37:37 AM PST by Highest Authority (DemonRats are pure EVIL)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: E. Pluribus Unum

OMFG PLEASE stop posting this FUD! I work in cryptography, and this entire video and article is complete nonsense!

Trusted Platform Modules are cryptographic subsystems. They exist to perform complex cryptographic operations in a secured environment with very few, controlled APIs. They're not spying on you. They have no mechanism to spy. They're used for performing cryptography based around hashes that are unique to the chip itself.

Can they be used to identify a system? Yes, if the OPERATING SYSTEM is configured to do so. They are being used by Microsoft to reduce piracy and to perform cryptographic operations locally on the system to reduce integrity-based attacks (Man-in-the-middle). They are used by BitLocker to encrypt the hard drive. This means if the hard drive is ever stolen or you take it out to upgrade it and forget to wipe it, the data on it is unreadable. Their primary purpose in cybersecurity is to help prevent advanced malware from completely taking over your system without your knowledge, and I can tell you with 100% certainty, there is commodity malware out there that absolutely does this!

This is at best misinformation. At worst, this is a fear tactic. TPMs have been in laptops, INCLUDING APPLE DEVICES, for decades. The technology is not new. This is FUD as ragebait against Microsoft, and you all should be ashamed for propagating this nonsense!

63 posted on 11/04/2025 3:15:37 PM PST by rarestia (“A nation which can prefer disgrace to danger is prepared for a master, and deserves one.” -Hamilton)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: E. Pluribus Unum
Not so crazy to use Linux anymore, is it?

Kicked Microsoft out of my home 10+ years ago and never looked back.

WinBLOWS is one nasty, stinky, pile of shiznit of an OS and no longer allowed in my home.

70 posted on 11/05/2025 7:36:29 PM PST by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first previous 1-2021-25 last

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson