Select Page

We explore the new organizations I call Offensive Data Mining companies. In the last video, I introduced you to the machinations of Jigsaw (Alphabet) and their partner Moonshot CVE. This time I expose the bigger problem of many companies and entities actively engaged in manipulating and exploiting information for power. We will analyze what techniques are used by these offensive and mercenary data companies. They sell their capabilities for money. Or for military applications. Corporate and Government. Is there a way to beat them? We will study how they approach the influence of the masses and see if an aware person can be tricked. Jigsaw
Moonshot CVE Information on Palantir ———————————– I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email. I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator. Support this channel on Patreon! Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform) Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise Premium VPN with Pi-Hole, Cloud-Based TOR Routing Cybersecurity Reference Privacy Focused Social Media – Open Source My GPG Public Key Please follow me on Odysee! (Previously LBRY)$/invite/@RobBraxmanTech:6