Saturday

Dark Secrets of an Esoteric Order: The Temple of the Shattered Mirror

Tower to the People: Tesla's Dream at Wardenclyffe

The Trump Bloodline - ROBERT SEPEHR

Pete Davidson Presents: Bret Ernst Uncaged | FULL SPECIAL (2024)

Insane Stories from the Early Days of MTV

Joe Rogan Experience LEGEND Eddie Bravo Goes NUCLEAR With Coach Colin

Watching Talk Tuah - 6 HRS CONDENSED INTO 3.5 HRS OF PURE COMEDY GOLD!

Esoteric Religion of the Aryan Magi - ROBERT SEPEHR

the Most Disturbing Moments In TV History

The Awfully Failed Intervention of an Unreachable Comedian

When Rude Interviewers Get Destroyed By Bill Burr

The New Surveillance Tool on Your Machine

The New Surveillance Tool on Your Machine: A Detailed Outline

I. Introduction (0:00 - 0:15) * A. Hook: New iPhones, Pixels, and Windows computers with AI present a "horrible paradigm" for device use. * B. Thesis: AI integration in devices will lead to unprecedented surveillance and erosion of privacy. * C. Scope: The impact will be as significant as the advent of social media.

II. The AI Surveillance Apparatus (0:16 - 2:31) * A. Pervasive Surveillance (0:16 - 1:15) * 1. AI (Apple Intelligence, Windows Copilot, Google Gemini) will learn user's thoughts, habits, preferences, beliefs, and politics. * 2. Devices will constantly watch and listen to users. * 3. This will have far-reaching consequences for privacy and security. * B. Inefficacy of Privacy Solutions (1:16 - 1:47) * 1. Encrypted apps and other privacy measures will be rendered ineffective. * 2. Hiding thoughts from governments and Big Tech will be impossible. * 3. AI surveillance will become a powerful tool of control. * C. Security Risks (1:48 - 2:31) * 1. Hackers will target AI-equipped devices as they hold a treasure trove of personal data. * 2. This poses a significant threat to privacy and security.

III. The Mechanism of AI Surveillance (2:32 - 6:45) * A. User Dependency (2:32 - 3:46) * 1. Users will be encouraged to become dependent on their AI devices and record all their activities. * 2. Current marketing hype focuses on shallow benefits (better photos, remembering past actions) to entice users. * 3. The true purpose is to gather extensive data about users over time. * B. Data Collection Methods (3:47 - 5:33) * 1. Windows Recall: Takes screenshots, logs keystrokes, capturing conversations, passwords, and secrets. * 2. Apple Intelligence: Captures information about all media, uses sensors to track activities, eye movements, location, and nearby devices. * 3. Always-on microphones: Enables constant listening and transcription of conversations. * C. Comprehensive Data Recording (5:34 - 6:45) * 1. AI records patterns of life: sleep, social interactions, conversations, entertainment, work, and movements. * 2. Data recording is continuous and outside user control; past events cannot be deleted.

IV. Data Storage and Processing (6:46 - 8:44) * A. AI-Driven Efficiency (6:46 - 7:28) * 1. Data is not stored in raw form; AI analyzes and summarizes it. * 2. Concerns about storage space are mitigated by AI's ability to condense information. * B. AI Transcription (7:29 - 8:03) * 1. AI transcribes visual and sensory information into text, similar to court transcribers. * 2. This textual data accurately represents the user's life and is stored efficiently. * C. Uncontrollable Transcription (8:04 - 8:44) * 1. Users cannot control the AI transcriber or stop data accumulation. * 2. The device becomes a comprehensive and permanent vault of the user's life information.

V. Centralization of Risk and Vulnerability (8:45 - 10:41) * A. Centralized Data Vault (8:45 - 9:32) * 1. Shift from distributed data storage to a single device containing all personal information. * 2. Analogy: Carrying all your money as cash, increasing vulnerability to theft. * B. Attractive Target (9:33 - 10:09) * 1. The device becomes a valuable target for hackers, governments, and anyone seeking to manipulate the user. * 2. Big Tech likely stores backups of this data on their servers, which are also vulnerable. * C. Increased Hacking Risks (10:10 - 10:41) * 1. Hacking an AI-powered device will have far more severe consequences due to the wealth of data. * 2. Example: Hacking the President's computer would expose everything.

VI. The End of Encryption and the Fifth Amendment (10:42 - 12:44) * A. Encryption Bypassed (10:42 - 11:24) * 1. End-to-end encryption, used in apps like Signal, WhatsApp, and Telegram, becomes obsolete. * 2. AI's ability to read keystrokes and screen content renders encryption useless. * B. Government Surveillance Enabled (11:25 - 12:08) * 1. AI surveillance fulfills the long-held desire of intelligence agencies to scan content pre-encryption. * C. Erosion of the Fifth Amendment (12:09 - 12:44) * 1. The right to remain silent, a key element of the Fifth Amendment, is undermined. * 2. The device becomes a "snitch," unable to remain silent even if the user chooses to.

VII. Remote Control and Manipulation (12:45 - 18:00) * A. Accessing the AI (12:45 - 13:28) * 1. The AI can be accessed and controlled remotely. * 2. This is achieved by "acing the brains of the machine," commanding the AI to respond to inquiries. * B. Technical Capabilities (13:29 - 14:54) * 1. Continuous telemetry exists between devices and OS makers (Apple, Microsoft, Google). * 2. AI architecture relies on both local processing and cloud-based AI servers (OpenAI). * C. Historical Precedents (14:55 - 16:45) * 1. Apple's previous announcement about CSAM scanning demonstrates their ability and willingness to scan device content. * 2. Google's recording of location history, even when location services are off, further illustrates this point. * D. Potential for Abuse (16:46 - 18:00) * 1. Companies can secretly scan devices without user knowledge or consent. * 2. This creates a dangerous tool for suppressing speech and manipulating individuals.

VIII. Loss of Control and the Rise of Linux (18:01 - 20:35) * A. Forced Compliance (18:01 - 18:40) * 1. Users can be forced to hand over their devices for examination, as already happens at borders. * B. Irreversible Recording (18:41 - 19:16) * 1. Users have limited control over the information stored on their devices. * 2. AI records everything, even deleted apps and conversations. * C. The Linux Alternative (19:17 - 20:35) * 1. Linux-based devices offer a safe haven from AI surveillance. * 2. The speaker uses Linux computers and an open-source phone to protect their privacy. * 3. Linux devices do not have AI snitches and offer greater control over data.

IX. Call to Action and Privacy Solutions (20:36 - 21:57) * A. Caution and Awareness (20:36 - 21:15) * 1. Users are urged to be cautious about using Windows and other AI-powered devices for personal activities. * 2. These devices are essentially owned by Big Tech and rented to governments. * B. Privacy Community and Solutions (21:16 - 21:57) * 1. Promotion of the Bra 3 privacy phone and the BraMe app as privacy-focused alternatives. * 2. BraMe offers a store with privacy products like Bra Virtual Fone, Bmail, and BVPN.

X. Conclusion * A. Summary: The integration of AI in new devices marks a significant shift towards mass surveillance and the erosion of privacy. Users will lose control over their data, encryption will be bypassed, and the right to remain silent will be undermined.




COUNTRY SONG SO GOOD!!!

Magical Systems List

Magical Systems: A Comprehensive List

Below is a categorized list of various magical systems, both historical and modern. Click on the colorful name of each system to learn more via its Wikipedia page or official website.

Ancient Mediterranean and Near Eastern Systems

Medieval and Renaissance Systems

Modern Western Esoteric Systems

Indigenous Shamanic Systems

Eastern Traditions

African/Diaspora Systems

Divinatory Systems

Ai Map/wiki

Technology & AI
Artificial Intelligence
Machine Learning
Neural Networks
AI in Art & Creativity
AI in Healthcare
AI in Business
AI & Consciousness
Robotics
Singularity
Transhumanism
Future of Technology
AI Ethics

map of the esoteric

Esotericism Mind Map Exploring the Vast World of Esotericism Esotericism, often shrouded in mystery and intrigue, encompasses a wide array of spiritual and philosophical traditions that seek to delve into the hidden knowledge and deeper meanings of existence. It's a journey of self-discovery, spiritual growth, and the exploration of the interconnectedness of all things. This mind map offers a glimpse into the vast landscape of esotericism, highlighting some of its major branches and key concepts. From Western traditions like Hermeticism and Kabbalah to Eastern philosophies like Hinduism and Taoism, each path offers unique insights and practices for those seeking a deeper understanding of themselves and the universe. Whether you're drawn to the symbolism of alchemy, the mystical teachings of Gnosticism, or the transformative practices of yoga and meditation, esotericism invites you to embark on a journey of exploration and self-discovery. It's a path that encourages questioning, critical thinking, and direct personal experience, ultimately leading to a greater sense of meaning, purpose, and connection to the world around us.

Jeffrey Epsteins Little Black Book Unredacted

PostsOfTheYeer

INTERESTORNADO

INTERESTORNADO
Michael's Interests
Esotericism & Spirituality
Technology & Futurism
Culture & Theories
Creative Pursuits
Hermeticism
Artificial Intelligence
Mythology
YouTube
Tarot
AI Art
Mystery Schools
Music Production
The Singularity
YouTube Content Creation
Songwriting
Futurism
Flat Earth
Archivist
Sci-Fi
Conspiracy Theory/Truth Movement
Simulation Theory
Holographic Universe
Alternate History
Jewish Mysticism
Gnosticism
Google/Alphabet
Moonshots
Algorithmicism/Rhyme Poetics
"In the dance of stars and symbols, the universe whispers secrets only the heart can decode. Embrace the mystery, for within it lies the magic of infinite possibility."


"a mystery permitted of these substances towards any tangible recognition instrument within extreme preeminent & quantifiable utilization qualia visual"- GeminiCool

* Notic

The majority of content used in videos is licensed by our partners. We may use third-party material when its usage of it falls under the Fair Use legal doctrine. If you are the legal content owner of any content we used on the channel and would like to remove it, we gladly will resolve your problem. ✅ Fair Use Disclaimer 1. The videos have no negative impact on the original works. 2. The videos we make are used for educational purposes. 3. The videos are transformative in nature. 4. We use only the audio component and tiny pieces of video footage, only if it's necessary. This video features materials protected by the Fair Use guidelines of Section 107 of the Copyright Act. All rights are reserved to the copyright owners.