Category Archives: New Science Discoveries

Graphene-based “neuromodulation” technology is REAL: Press release from INBRAIN Neuroelectronics describes brain controlling biocircuits using AI-powered graphene – NaturalNews.com

Image: Graphene-based “neuromodulation” technology is REAL: Press release from INBRAIN Neuroelectronics describes brain controlling biocircuits using AI-powered graphene

Source: Graphene-based “neuromodulation” technology is REAL: Press release from INBRAIN Neuroelectronics describes brain controlling biocircuits using AI-powered graphene – NaturalNews.com

With an increasing number of people becoming aware of graphene oxide being identified in covid vaccines, a company called INBRAIN Neuroelectronics demonstrates that graphene-based “neuromodulation” technology using AI-powered neuroelectronics is very real.

INBRAIN Neuroelectronics Secures $17 Million in Series A Funding for First AI-Powered Graphene-Brain Interface

Funding enables company to advance first-in-human studies for its flagship product, a less-invasive neuromodulation device for treating neurological conditions using artificial intelligence and graphene electrodes

To be clear, we are not in any way claiming that INBRAIN is involved in covid vaccines. Rather, they state their technology is being used, “for treating epilepsy and Parkinson’s disease.” The point of covering INBRAIN is to reveal that brain-controlling “biocircuits” based on graphene are, in fact, a very real technology.

So-called “fact-checkers” — which are nothing more than disinformation propaganda pushers — routinely claim that graphene isn’t found in vaccines and that graphene biocircuits are a conspiracy theory. INBRAIN Neuroelectronics shows that the fact checkers are lying.

In fact, as INBRAIN says in their own press release, they are, “aiming to establish the safety of graphene as the new standard of care for neurotechnology devices.”

They also describe graphene biocircuits as a kind of platform that can be upgraded:

Less invasive and more intelligent neuroelectronic technologies like ours could provide safer therapies that are upgradable and adaptive in real time…

If that sounds familiar, it’s probably because Moderna, creator of the mRNA covid vaccine, has described its technology as an “operating system” that can be updated and reprogrammed at any time, also.

At the INBRAIN Neuroelectronics website, the company describes itself thusly:

We are scientists, doctors, techies and humanity lovers, with the mission of building neuroelectronic interfaces to cure brain disorders. We use GRAPHENE, the thinnest material known to man to build the new generation of neural interfaces for brain restoration to help patients around the world.

It also quites Prof. A. Fasano, saying, “Graphene is the next big thing in bioengineering materials, which are pillar components to the next gen of electrotherapies in the steadily growing field of neuromodulation.”

The company highlights its technology as being able to “read” a person’s brain, detect specific neurological patterns, and then control that person’s neurology to alter their brain function. In their own words:

Our graphene-brain interfaces have the capability of reading at a resolution never seen before, as well as detecting therapy-specific biomarkers and triggering highly focal adaptive neuromodulation for increased outcomes in personalised neurological therapies.

Graphene is further described as, “Thinnest known material to perfectly adapt stimulation to targeted brain anatomy.”

Anyone saying that graphene isn’t being used to control human neurology is either wildly ignorant of the state of modern neuroscience or is deliberately lying to you.

To clarify yet again, we are not stating that INBRAIN Neuroelectronics is engaged in any sort of nefarious agenda, nor that they are involved in covid vaccines. As with every technology, graphene-based biocircuits can be used for both good or evil, depending on the ethics and motivations of those who control the technology. There are no doubt very positive applications for this tech, but as with most technologies that were once touted as empowering humanity — television, vaccines, the internet, nuclear power, robotics, etc. — they all end up in the hands of lunatic, genocidal globalists who wield them as weapons against humanity.

In other words, there is no technology that madmen won’t exploit to enslave humanity and increase their own power and control. Graphene biocircuits give power-hungry lunatics direct access to your brain, and according to many analysts (see below), vaccines provide the excuse to inject human victims with graphene-based substances that self-assemble into biocircuits in the human brain.

CLAIM: Covid vaccines contain high levels of graphene oxide, which is self-assembled into biocircuits by harvesting elements (such as iron) from human blood

As reported by Orwell.city, a group called La Quinta Columna has analyzed covid vaccines and has found that 98% to 99% of the non-liquid mass in the vaccine appears to be graphene oxide. Ricardo Delgado, speaking for La Quinta Columna, says:

A phenomenon that for a long time was denied, but today has been already proved. There are millions of videos of people going around the world.  Videos about this phenomenon of, let’s call it ‘pseudo-magnetism acquired after inoculation’, but it can also be acquired through other ways.  So, once we conducted that basic epidemiological study, we started to wonder what materials or nanomaterials can cause magnetism in the body. And not only magnetism, but that could act as energy capacitors, because I have also measured in a multimeter an important charge…

This is a phenomenon of electromagnetic induction in the metal that adheres near the inoculation area.  In addition, we have found that the magnetism then moves towards the head. And this is very important.  Surely for the purpose they may seek.  In addition, a potential difference is measured with a multimeter: the person becomes a superconductor.  That is, it emits and receives signals.  And when we found the materials that can cause this type of alterations in the body, we began to talk about graphene.  We suspected it was graphene oxide since it had all the characteristics that magnetized people expressed after inoculation.

Graphene is toxic, it is a chemical, a toxic chemical agent.  Introduced in the organism in large quantities, it causes thrombi. It causes blood clots.  We have all the scientific articles to back it up. It causes post inflammatory syndrome, it causes alteration of the immune system.  And when the redox balance is broken, in the sense that there is less of the body’s own reserve glutathione  than an introduced toxicant such as graphene oxide, it generates a collapse of the immune system and a cytokine storm.  In other words, something very similar to the fashionable disease, isn’t it?

See the video here:

Brighteon.com/eaff4c87-eb1d-4abd-9f6e-6edeebe6fe59

Elon Musk Just Announced Starlink Will Go Global in Five Weeks also Neuralink, which seeks to unite the human brain with computers

Elon Musk Just Announced That Starlink Will Go Global in Five Weeks

Source: Elon Musk Just Announced Starlink Will Go Global in Five Weeks

Today, during a keynote speech Elon Musk gave at the Mobile World Congress (MWC) in Barcelona, the SpaceX CEO announced a major update on the rollout timeline for his low-Earth orbit high-speed broadband internet service, Starlink.

“In August we should have global connectivity in everywhere except the poles,” Musk said during the MWC keynote. This means that the launch is nearly ready, and it’s coming at least one month sooner than we thought. Last week, company President Gwynne Shotwell stated that Starlink would go global this September, but it seems the deadline has just moved up a few weeks.

Elon Musk’s SpaceX aims to lower the terminal cost for Starlink installation

“You can think of Starlink as filling in the gaps between 5G and fiber,” added Musk, “really getting to the most difficult to reach three or five percent” of people in need of high-speed broadband internet. “We’ll have 500,000 users within 12 months. It’s growing rapidly, and we’re continuing to [roll out] the user terminal.”

But how affordable is it for individuals? Getting a Starlink dish will cost about $500. And Musk noted that monthly subscriptions will be “the same price all over the world,” excluding taxes. “We’re taking into account exchange rates […] it’s about $100 per month,” he said.

Musk also made it clear that the company is losing money on the terminal as of writing, and SpaceX is working on next-gen terminals that can offer the same service at a lower cost.

“We’d like to reduce the cost of the terminal from $500 to $200 or $350 or something like that,” added Musk. “Our customers will very often live in remote regions. Sometimes they’re up in a cabin up in the mountain that doesn’t even have electricity!” So SpaceX is designing the system so it doesn’t need a lot of maintenance, and it is intended to go online in just five minutes. “You should [be able to] point it at the sky and plug it in,” he said.

As an interesting aside, Musk noted that Starlink satellites orbit Earth at around 500 km, whereas geosynchronous satellites are at about 35,000 km.

Musk also spoke about the potential for partnerships with mobile operators. “We have two quite significant partnerships that — with major country telcos (telecommunications companies), and we are in discussions with others,” Musk said. “This is helpful because a number of countries have requirements that — in order to receive a 5G license, you also have to provide rural coverage. So sometimes urban customers end up subsidizing rural customers.”

SpaceX’s Starship orbital flight launch site will be ready in the next months

“With Falcon 9 we achieved the most efficient reusability for any rocket to date,” said Musk. Some rockets are slated to fly 20 or even 30 times. “When you look at the cost of the rocket, you’ve got 60% of the cost in the first stage, and about 10% in the faring,” Musk explained. “So this is really a very good number for a rocket,” he added, referencing the forthcoming Starlink prototype’s space missions in comparison to Saturn V rockets. “It’s about 3.5 to 1 ratio of oxygen to fuel […] instead of helium with the Falcon 9.” Helium is expensive, so the cost of propellant for Starship will be comparable to the cost of a Falcon 9, but with full reusability, Musk explained.

The cost of reusing a Starship will cost a little less than $2 million, said Musk during the keynote. The Starship will also see orbital refueling primarily with oxygen. It’s “the first system that will be capable of building a base on the moon, and a city on Mars.”

“We’re hoping to do our first orbital launch attempt [for Starship] in the next few months,” said Musk. He also said the Starship’s orbital launch site will be ready in the next month or so. “SpaceX is trying to extend the scope of consciousness beyond Earth, and Tesla is trying to ensure that life is good on Earth in terms of sustainable energy,” he added, summarizing his intentions with his companies. “That future includes expanding the scope and scale of consciousness. We don’t really know what the answers are, or what questions to ask.”

It’s not an exaggeration to say that Elon Musk’s companies are changing the face of modern society. From Tesla’s all-electric vehicles (most recently the refurbished Model S Plaid), which is surpassing legacy automakers’ EV supercars, to SpaceX’s threshold-breaking Starship prototype flights, and the rapidly expanding Starlink network — his tech empire is evolving.

Ultimately, his companies are changing our infrastructure and the way we travel. They have even almost single-handily made private spaceflight and reusable rockets a reality. And of course, there is also Neuralink, which seeks to unite the human brain with computers. It sounds unbelievable. However, given his track record, if anyone can really make it happen, it’s Elon Musk.

That said, with legal disputes in the U.S. and abroad, and in a world experiencing an industrial and social bottleneck following the COVID-19 crisis, it’s probably going to be a bumpy ride.

 

Pegasus project turns spotlight on spyware firm NSO’s ties to Israeli state | Israel | The Guardian

The NSO Group chief executive, Shalev Hulio

Source: Pegasus project turns spotlight on spyware firm NSO’s ties to Israeli state | Israel | The Guardian

Disclosures about political figures put Israel under increasing pressure over extent of surveillance

 in Washington,  in Jerusalem and  in Budapest

Back in 2017, few would have disputed that Israel and Saudi Arabia were regional foes. Officially, the countries had no diplomatic ties. Yet for a small group of Israeli businesspeople attending secret meetings with Saudi officials in Vienna, Cyprus and Riyadh that summer, there were signs relations were warming.

The businesspeople represented NSO Group. Their mission was to sell the Saudis NSO’s weapons–grade spyware system, Pegasus.

According to a person who attended the meeting in June 2017 in Cyprus, a senior Saudi intelligence official was “amazed” by what he saw. After a lengthy and technical discussion, the Saudi spy, who had brought a new iPhone, was shown how Pegasus could infect the phone and then be used to remotely operate its camera.

“You don’t need to understand the language to see they were amazed and excited and that they saw what they needed to,” the person said.

NSO Group had been given explicit permission by the Israeli government to try to sell the homegrown hacking tools to the Saudis. It was a classified arrangement and resulted in the sale later being sealed in Riyadh in a deal reportedly worth at least $55m.

“In Israel there is a strong political movement to make diplomacy through business,” said the person, speaking on the condition of anonymity. “Business first, diplomacy later. When you make a deal together, it opens a lot of doors to diplomacy.”

It is common for governments to help companies export their products. NSO, after all, employs former Israeli cyber-intelligence officials and retains links to the defence ministry.

Quick Guide

What is in the Pegasus project data?

Show

But revelations about how repressive states such as Saudi Arabia, the United Arab Emirates, Azerbaijan and others have used NSO’s technology to target human rights lawyers, activists and journalists raise questions for Israel and have put the issue under fresh scrutiny.

The disclosures threaten to put diplomatic pressure on Israel, amid questions over whether it is using the licensing of NSO’s spyware for political leverage – and allowing the software to be sold to undemocratic countries that are likely to misuse it.

A recent transparency report released by NSO Group acknowledged the company was “closely regulated” by export control authorities in Israel. The Defense Export Controls Agency (DECA) within the Israeli defence ministry “strictly restricts” the licensing of some surveillance products based on its own analysis of potential customers from a human rights perspective, the company said, and had rejected NSO requests for export licences “in quite a few cases”.

Moreover, NSO was also subject to an “in-depth” regulatory review by Israel on top of its own “robust internal framework”.

The Azerbaijani president, Ilham Aliyev, who in 2016 praised Benjamin Netanyahu for Israel’s close cooperation with Baku on defence industries
The Azerbaijani president, Ilham Aliyev, who in 2016 praised Benjamin Netanyahu for Israel’s close cooperation with Baku on defence industries. Photograph: Roman Ismayilov/EPA

Within NSO, the process Israel uses to assess whether countries can be sold the technology is considered a “state secret”. A person familiar with the process said officials in both Israel’s national security council and prime minister’s office had been known to give their input.

In the case of Saudi Arabia, sources familiar with the matter said the kingdom was temporarily cut off from using Pegasus in 2018, for several months, following the murder of Jamal Khashoggi, but was allowed to begin using the spyware again in 2019 following the intervention of the Israeli government.

It is unclear why the Israeli government urged NSO to reconnect the surveillance tool for Riyadh.

However, the 10 countries that the forensic analysis for the Pegasus project suggests have actually been abusing the technology all enjoy trade relations with Israel or have diplomatic ties with the country that have been improving markedly in recent years.

In two NSO client countries, India and Hungary, it appears governments began using the company’s technology as or after their respective prime ministers met the then Israeli prime minister, Benjamin Netanyahu, in high-profile encounters intended to boost trade and security cooperation. It is understood no countries that are considered enemies of Israel – such as Turkey – have been allowed to buy NSO’s wares.

Benjamin Netanyahu, left, and the Hungarian prime minister, Viktor Orbán at a signing ceremony in Budapest in 2017
Benjamin Netanyahu, left, and Viktor Orbán meeting in Budapest in 2017. Photograph: Balázs Mohai/AP

“Markets dictate what works, I don’t dictate … the only place I have actually intervened … is cybersecurity,” Netanyahu said in a press conference in Hungary in 2017 as he stood next to the country’s prime minister, Viktor Orbán.

What remains unclear is whether Israel’s intelligence agencies might have special privileges with NSO, such as access to surveillance material gathered using its spyware. One person close to the company, who asked to remain anonymous, said it was a frequent topic of speculation. Asked whether Israel could access intelligence gathered by NSO clients, they replied: “The Americans think so.”

That view was supported by current and former US intelligence officials, who told the Washington Post, a partner in the Pegasus project, that there was a presumption that Israel had some access – via a “backdoor” – to intelligence unearthed via such surveillance tools.

John Scott-Railton, a senior researcher at the Citizen Lab at the University of Toronto, said he believed it would be “irresponsible” for a state to allow the large-scale distribution of a powerful surveillance tool such as Pegasus without being able to keep an eye on what was being done with it.

He said court records had revealed that NSO used servers that were not always located on the premises of the client. “What that means is there’s the potential for visibility. And it would be crazy for them [the Israelis] not to have visibility,” he said.

NSO strongly denied that Israel had any access to its customers’ systems.

“NSO Group is a private company. It is not a ‘tool of Israeli diplomacy’; it is not a backdoor for Israeli intelligence; and it does not take direction from any government leader,” NSO’s lawyer said.

In a statement, the Israeli Ministry of Defense said Israel marketed and exported cyber products in accordance with its 2007 Defense Export Control Act and that policy decisions take “national security and strategic considerations” into account, which include adherence to international arrangements.

Q&A

What is the Pegasus project?

Show

“As a matter of policy, the state of Israel approves the export of cyber products exclusively to governmental entities, for lawful use, and only for the purpose of preventing and investigating crime and counter-terrorism, under end-use/end-user certificates provided by the acquiring government,” the ministry said.

It said “appropriate measures” were taken in cases where exported items are used in violation of export licences.

The ministry added: “Israel does not have access to the information gathered by NSO’s clients.”

For Israel, few clients whom it has approved to use Pegasus have been as problematic as Saudi. Weeks ago, NSO cut the kingdom off once more, following allegations that Saudi had used Pegasus to hack dozens of Al Jazeera journalists.

Saudi Arabia declined to comment.

 

Ep. 1565 What is Pegasus? – The Dan Bongino Show

Pegasus can infect a phone through ‘zero-click’ attacks, which do not require any interaction from the phone’s owner to succeed.

Source: Ep. 1565 What is Pegasus? – The Dan Bongino Show

What is Pegasus? This is the biggest story of the day. In this episode, I discuss the troubling revelations about this new surveillance tool.

What is Pegasus spyware and how does it hack phones?

Pegasus can infect a phone through ‘zero-click’ attacks, which do not require any interaction from the phone’s owner to succeed. Composite: AFP via Getty

NSO Group software can record your calls, copy your messages and secretly film you

 and 
Sun 18 Jul 2021 12.00 EDT

It is the name for perhaps the most powerful piece of spyware ever developed – certainly by a private company. Once it has wormed its way on to your phone, without you noticing, it can turn it into a 24-hour surveillance device. It can copy messages you send or receive, harvest your photos and record your calls. It might secretly film you through your phone’s camera, or activate the microphone to record your conversations. It can potentially pinpoint where you are, where you’ve been, and who you’ve met.

Pegasus is the hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones running either iOS or Android operating systems.

The earliest version of Pegasus discovered, which was captured by researchers in 2016, infected phones through what is called spear-phishing – text messages or emails that trick a target into clicking on a malicious link.

Quick Guide

What is in the Pegasus project data?

What is in the data leak?

The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software. The data also contains the time and date that numbers were selected, or entered on to a system. Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian. More than 80 journalists have worked together over several months as part of the Pegasus project. Amnesty’s Security Lab, a technical partner on the project, did the forensic analyses.

What does the leak indicate?

The consortium believes the data indicates the potential targets NSO’s government clients identified in advance of possible surveillance. While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company’s signature surveillance tool, or whether any attempt succeeded. The presence in the data of a very small number of landlines and US numbers, which NSO says are “technically impossible” to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus. However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity – in some cases as little as a few seconds.

What did forensic analysis reveal?

Amnesty examined 67 smartphones where attacks were suspected. Of those, 23 were successfully infected and 14 showed signs of attempted penetration. For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty’s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

Amnesty shared “backup copies” of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection. Citizen Lab also conducted a peer review of Amnesty’s forensic methods, and found them to be sound.

Which NSO clients were selecting numbers?

While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number. NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them. By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates. Citizen Lab has also found evidence of all 10 being clients of NSO.

What does NSO Group say?

You can read NSO Group’s full statement here. The company has always said it does not have access to the data of its customers’ targets. Through its lawyers, NSO said the consortium had made “incorrect assumptions” about which clients use the company’s technology. It said the 50,000 number was “exaggerated” and the list could not be a list of numbers “targeted by governments using Pegasus”. The lawyers said NSO had reason to believe the list accessed by the consortium “is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes”. After further questions, the lawyers said the consortium was basing its findings “on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers’ targets of Pegasus or any other NSO products … we still do not see any correlation of these lists to anything related to use of NSO Group technologies”.

What is HLR lookup data?

The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks. Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts. Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone. The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries. It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons – unrelated to Pegasus – for conducting HLR lookups via an NSO system.

Since then, however, NSO’s attack capabilities have become more advanced. Pegasus infections can be achieved through so-called “zero-click” attacks, which do not require any interaction from the phone’s owner in order to succeed. These will often exploit “zero-day” vulnerabilities, which are flaws or bugs in an operating system that the mobile phone’s manufacturer does not yet know about and so has not been able to fix.

In 2019 WhatsApp revealed that NSO’s software had been used to send malware to more than 1,400 phones by exploiting a zero-day vulnerability. Simply by placing a WhatsApp call to a target device, malicious Pegasus code could be installed on the phone, even if the target never answered the call. More recently NSO has begun exploiting vulnerabilities in Apple’s iMessage software, giving it backdoor access to hundreds of millions of iPhones. Apple says it is continually updating its software to prevent such attacks.

Technical understanding of Pegasus, and how to find the evidential breadcrumbs it leaves on a phone after a successful infection, has been improved by research conducted by Claudio Guarnieri, who runs Amnesty International’s Berlin-based Security Lab.

“Things are becoming a lot more complicated for the targets to notice,” said Guarnieri, who explained that NSO clients had largely abandoned suspicious SMS messages for more subtle zero-click attacks.

Pegasus: the spyware technology that threatens democracy – video
04:55
Pegasus: the spyware technology that threatens democracy – video

For companies such as NSO, exploiting software that is either installed on devices by default, such as iMessage, or is very widely used, such as WhatsApp, is especially attractive, because it dramatically increases the number of mobile phones Pegasus can successfully attack.

As the technical partner of the Pegasus project, an international consortium of media organisations including the Guardian, Amnesty’s lab has discovered traces of successful attacks by Pegasus customers on iPhones running up-to-date versions of Apple’s iOS. The attacks were carried out as recently as July 2021.

Forensic analysis of the phones of victims has also identified evidence suggesting NSO’s constant search for weaknesses may have expanded to other commonplace apps. In some of the cases analysed by Guarnieri and his team, peculiar network traffic relating to Apple’s Photos and Music apps can be seen at the times of the infections, suggesting NSO may have begun leveraging new vulnerabilities.

Where neither spear-phishing nor zero-click attacks succeed, Pegasus can also be installed over a wireless transceiver located near a target, or, according to an NSO brochure, simply manually installed if an agent can steal the target’s phone.

Once installed on a phone, Pegasus can harvest more or less any information or extract any file. SMS messages, address books, call history, calendars, emails and internet browsing histories can all be exfiltrated.

“When an iPhone is compromised, it’s done in such a way that allows the attacker to obtain so-called root privileges, or administrative privileges, on the device,” said Guarnieri. “Pegasus can do more than what the owner of the device can do.”

Lawyers for NSO claimed that Amnesty International’s technical report was conjecture, describing it as “a compilation of speculative and baseless assumptions”. However, they did not dispute any of its specific findings or conclusions.

NSO has invested substantial effort in making its software difficult to detect and Pegasus infections are now very hard to identify. Security researchers suspect more recent versions of Pegasus only ever inhabit the phone’s temporary memory, rather than its hard drive, meaning that once the phone is powered down virtually all trace of the software vanishes.

One of the most significant challenges that Pegasus presents to journalists and human rights defenders is the fact that the software exploits undiscovered vulnerabilities, meaning even the most security-conscious mobile phone user cannot prevent an attack.

“This is a question that gets asked to me pretty much every time we do forensics with somebody: ‘What can I do to stop this happening again?’” said Guarnieri. “The real honest answer is nothing.”

Testimony From A Real Clone – best news here

 

Source: Testimony From A Real Clone – best news here

Testimony From A Real Clone

A variety of topics from around the internet. Some videos are mine but most are not. If I re-post a video from someone else I will try to cite them and may or may not offer a link to their channel. Most anything I would like to share with you already exists in a video that indeed would most likely be better than I could make from scratch covering the same subject. I don’t always agree with 100% of what I might post. I gave up looking for tailored fit to anything in our off the rack world. I also know that even with the vast amount of research and understanding I have, I really know very little. However, most know much less than that.

It has been my experience that the smarter someone thinks they are, the more ignorant and narrow minded they are. How do i know this? I used to be smart at one time also. It was quite an awakening to find out that I really knew almost nothing.

The topics are things I believe, understand (or I am trying to understand) and focus on getting out the truth or at least a better version than is offered from the mainstream vendors of garbage for the mind.

I am very passionate about our children and humanity and the terrible things being done to both. I am not anti or pro anything. I am not prejudice, I distrust and despise equally. I am not political, it is a complete waste of time. I do not vote as I do not care to encourage criminals. If you are waiting on any one human besides yourself to save you then you are already lost.

I have a wonderful relationship with our creator and get upset with our creator from time to time. However I am sure I upset creation on a daily basis so it seems to work out.

 

See for Yourself the World of Clones & How You Can Tell the Difference! – Must See Video | Science and Technology | Before It’s News

Source: See for Yourself the World of Clones & How You Can Tell the Difference! – Must See Video | Science and Technology | Before It’s News

Tuesday, January 26, 2021

The world of cloning really does exist. People actually believe that humans like Hillary Clinton, Bill Clinton and Tom Hanks are still alive without realizing that the future is now and that everything they are seeing is a lie.