Main

"I remove this CHIP from phone before using it!" Edward Snowden

"I Remove This Mysterious Tiny Chip Before Using The Phone!" πŸ—£ Speaker: Edward Snowden Welcome to BrainStation Channel! ✍️ Be more knowledgeable! Find here answers to questions you've never asked. πŸ”” Kindly hit the SUBSCRIBE button and ring the BELL! πŸ‘₯ Don't keep this valuable information to yourself, share it with a friend! βœ‰οΈ If you have any questions, business inquiries, etc. please reach out to us via email: contactbrainstation@gmail.com __________ πŸ“Ή We hold commercial licenses for all the material featured in this video, except for certain segments used under the principles of fair use and edited by us. Our videos do not negatively affect the original works, and they serve an educational purpose. πŸ“š Our research, despite being conducted to the best of our ability, may still contain mistakes. As a result, we cannot guarantee the veracity of the information presented in our videos. We kindly request that you use caution when taking the information as fact. πŸ’¬πŸ€ We expect viewers to maintain friendly and respectful behavior in the comments section of our videos. BrainStation "I Remove This Mysterious Tiny Chip Before Using The Phone!" Edward Snowden

BrainStation

3 years ago

Once your phone is hacked, what is in their hands is not simply your device. It is your future. They're selling our future. They're selling our past. They are selling our history, our identity. And ultimately, they are stealing our power. The screen may be off as it's sitting on your desk, but the device is talking all of the time. The question we have to ask is, who is it talking to? If I get a smartphone and I need to use a phone, I actually open it up before I use it. Anything you can do on t
hat device. The attacker in this case, the government can do. Before 2013. If you said there's a system that's watching everything you do, the government is collecting records of every phone call in the United States. Even for those people who are not suspected of any crime, it was a conspiracy. Yes, there were some people who believed it was happening. Yes, there were academics who could say this was technically possible. The world of 2013. We suspected some suspected that this was happening th
e world after 2013. We know that is happening. The distance between speculation and fact is everything in a democracy. We have now had the first European regulations that are trying to limit the amount of data that can be collected secretly and used against populations broadly. And we have also seen the basic structure of the Internet itself change in response to this understanding that that the network path that all of our communications cross, when you request a website, when you send a text m
essage, when you read an email. For so long those communications have been electronically naked or unencrypted. Before 2013, more than half the world's Internet communications were unencrypted. Now far more than half are measured by just Web traffic from one of the world's leading browsers, the Google Chrome browser. The entire world has changed in the last few years. It hasn't gone far enough. The problems still exist, and in some ways they've gotten worse. But we have made progress that would
not have been possible if we didn't know what was going on. Hacking has increasingly become what governments consider a legitimate investigative tool. They use the same methods and techniques as criminal hackers. And what this means is they will try to remotely take over your device once they do this, by detecting a vulnerability in the software that your device runs, such as Apple's iOS or Microsoft Windows, they can craft a special kind of attack code called an exploit. They then launch this e
xploit at the vulnerability on your device, which allows them to take total control of that device. Anything you can do on that device, the attacker in this case, the government can do, they can read your email, they can collect every document, They can look at your contact book, they can turn the location services on. They can see anything that is on that phone instantly and send it back home to the mothership. They can do the same with laptops. The other prong that we forget so frequently is t
hat in many cases they don't need to hack our devices. They can simply ask Google for a copy of our email box because Google saves a copy of that. Everything that you ever typed into that search box. Google has a copy of every private message that you've sent on Facebook, every link that you've clicked, everything that you've liked they keep a permanent record of. And all of these things are available not just to these companies, but to our governments as they are increasingly deputized as sort
of miniature arms of government. What about enabling your microphone camera? If you can do it, they can do it. It is trivial to remotely turn on your microphone or to to activate your camera so long as you have systems level access. If you had hacked someone's device remotely, anything they can do, you can do. They can look up your nose, right? They can record what's in the room. The screen may be off as it's sitting on your desk, but the device is talking all of the time. The question we have t
o ask is who is it talking to? Even if your phone is not hacked right now, you look at it, it's just sitting there on the charger. It is talking tens or hundreds or thousands of times a minute to any number of different companies who have apps installed on your phone. It looks like it's off. It looks like it's just sitting there, but it is constantly chattering. And unfortunately, like pollution, we have not created the tools that are necessary for ordinary people to be able to see this activity
. And it is the invisibility of it that makes it so popular in common and attractive for these companies. Because if you do not realize they're collecting this data from you, this very private and personal data, there's no way you're going to object to it once your phone is hacked. What is in their hands is not simply your device, it is your future. But we see how these same technologies are being applied to create what they call the social credit system. If any of your activities online, if you
're purchases, if your associations, if your friends or in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets, you're no longer able to board an airplane. You may not be able to get a. Passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programed and decided by algorithms, and those algorithms are fuel
ed by precisely the innocent data that our devices are creating all of the time, constantly, invisibly, quietly. Right now, our devices are casting all of these records that we do not see being created that in aggregate seem very innocent. You were at Starbucks at this time. You went to the hospital afterwards. You spent a long time at the hospital. After you left the hospital, you made a phone call. You made a phone call to your mother. You talked to her until the middle of the night. The hospi
tal was an oncology clinic. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately, it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling
is not information. What they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity. And ultimately they are stealing our power and making our stories work for them. If I get a smartphone and I need to use a phone, I actually open it up before I use it, I perform a kind of surgery on it to physically disorder or sort of melt the metal connections that hold the microphone on the phone. And I physically take this off. I remove the camer
a for the phone and then I close it back up, I seal it up. And then if I need to make a phone call, I will attach an external microphone on it. And this is just so if the phone is sitting there and I'm not making a call, it cannot hear me. Now, this is extreme. Most people do not need this. But for me it's about being able to trust our technology. My phone could still be hacked, my laptop could still be hacked. And just as I told you before. The same principles applied to me. If it is hacked, th
ey can do anything to the device that I can do. So my trust in technology is limited.

Comments

@BrainStationChannel

If you liked the video, leave a comment here and don't forget to SUBSCRIBE and press the bell icon to get notified!βœ…βœ…βœ…

@ZarkWiffle

He removes the microphone and camera. You're welcome

@ZOANOM

I can't tell you how many times I've discussed some obscure product or activity, only to have ads for it show up within minutes. It's creepy AF.

@djlclopez128

Yesterday I randomly mentioned to my husband that Linkin Park is kind of a depressing band and I told him some of the lyrics I could recite. This was because I just so happened to randomly remember having a CD of theirs when I was in high school. (Haven't thought about or talked about Linkin Park for several years) An hour later I got a bunch of recommended products that all had Linkin Park on them on....TEMU. Yesterday my husband brought up the old Tomb Raider games I used to play. Again, I haven't thought about or played Tomb Raider for several years....lo and behold, my husband got tons of video recommendations on YOUTUBE for Tomb Raider playthroughs. It's disgusting. And people want to line up for a vaccine because the government tells them to? πŸ˜’

@bangcallahan

I worked for a publicly traded company in 2012 that "required us" to run their productivity app. (It was a tracking app that monitored our meta data including screen usage and all other apps) I was able to get around this by getting a windows phone that didn't support this app.

@Indian-girl09

Edward has stood up for mankind. Now it’s time for mankind to stand up for Edward

@KeyClavis

I used to work for a cell company. I was told that if I had a smartphone, that I would be required to have my work email on my phone. Because of this, I chose to use a crappy little flip phone. It made calls. That's it. People would tell me, "I messaged this cool video to you. What did you think?" and I would say. "I have a flip phone. I couldn't have watched it even if I had gotten it.". Managers would say "I emailed you on Saturday, why didn't you respond?" and I would say, "I have a flip phone, no email. Also, you don't pay me to work Saturdays". I've since left that company, after 6 years, but I still refuse to get a smartphone. I don't want the leash or to rely on this little piece of hardware. ...and unlike everyone else I know, I can still find my way to an unknown address without using Google. If I can't get my "internet fix", I'm fine. I'll read a book, or go for a walk, or work in the garden, or any of a thousand other things. NOT having a smartphone keeps me sane.

@r3tri3ution_z3nith_point_z6

Its been happening since 2003. I found this out first hand using candybar phones way back then. I remember going down the rabbit hole of triangulation and what was possible on cdma,gsm networks. Thats when we discovered you could literally clone phones if you had access to the network. So we obtained access. Not to create a criminal enterprise but to identify those who already had them. What we found out was that "they" were the gov. Then we discovered that some very unsavory characters working in the intel programs were in charge of that. They still are. "They" are senators.

@jaywalker3087

As I live in the UK, I'd just like to say "Hi" to GCHQ!!

@Stam_the_344_

Now the government knows I liked this video.

@miketee2444

Several years ago my young daughter had a question about types of steel. I went into a talk about Metallurgy. This is such a random and obscure topic that when I looked at my phone the next morning I knew it listened to everything. Every bit of information bombarding me was geared towards this conversation.

@tacticalnewfie2922

My trust in technology is limited as well Ed, thanks for the update! πŸ’ͺπŸ‘Œ

@Anmobgoccult20

Of this man one can say either supreme good or nothing! The good he has done has opened the eyes of most of the masses in the world, excluding us consecrated ones! bow and respect from old BG!!!

@burtpanzer

With unfathomable courage, Ed sacrificed everything he had for 300 million people he never met, most of whom don't care or don't think he's a hero because the news didn't want them to. He may even regret having devoted great efforts for those who failed to see it's importance.

@leaf16nut

My grade 8 teacher, in ~2005, said we were all being spied on and everything we did online was being collected, we kind of believed him but were too young to understand the ramifications.. Amazing how 8 years later everything he said was correct and I now know just how scary it is that it’s happening.

@conrad5231

ive been saying this for a long time i use a tracker blocker and its scary how many thousands it blockd daily me and my wife had private conversations about things we might buy next thing our phones pinged adds with exactly that stuff we talked about .... it gets worse i found security cameras placed over open topped changing stalls at supermarkets and cloths shops ...now i couldn't tell if they were pointed but still people dont realise the government and big business cant be trusted one iota ...

@marcoalvarado6793

The problem is that we forget what is the purpose of the device we are using. Before we had the "phone" to make calls, but they were in a public network that somebody could tap, inside or outside legal practices. But we also have our "camera", that was private until we carried the picture rolls to the store to be processed, or a mechanical typewriter, that produced private originals that were our secrets until somebody was able to arrive to them physically. And all these "damages" were complex, difficult, requiring big investments on spying technology or practice. But today, we put everything in the same basket, and we are trying to do everything together, even when it is not necessarily to do so. And the result is that our self have been compromised, to a level that we already forgot how to live without being in the hands of others. Go to check how many are installing their servers in the cloud, and how many have trained personnel that can take care of your secrets. It is not a bad idea to remember how to be individuals.

@ArgosySpecOps

Once they eliminated the ability to remove your battery I knew we were all in trouble.

@marcusdbowden

Ever wonder why we can no longer remove our phone batteries on any of the newer modern devices?

@stelleratorsuprise8185

There was once a YT video telling people to remove a certain chip on their smart phones, most people who did it later realized they had damaged the NFC chip for wireless payment. But the easiest way avoiding tracking is to leave your phone at home, switching it off might help too.