Select Page

There seems to be a pattern. The Pegasus exploit, Simjacker exploit and SS7 exploit are all very similar. This is all conjecture (though a well thought one). Could there be a backdoor on our phones? And if there is one, where would it be? In this video, I tell you where I think it could be if it existed. ———————————– I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email. I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator. Support this channel on Patreon! https://www.patreon.com/user?u=17858353 Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform) https://brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise https://bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing https://whatthezuck.net Cybersecurity Reference https://brax.me Privacy Focused Social Media – Open Source My GPG Public Key https://brax.me/f/rob_braxme_public.asc/T4AZ5ea27dc817c903.67892248 Please follow me on Odysee! (Previously LBRY)
https://odysee.com/$/invite/@RobBraxmanTech:6