Contents Pages by Subject

Hacking, Cyber Security

Subject Photo
Article Image

https://www.youtube.com, Rob Braxman Tech

This video is a comprehensive explanation of the threats to a phone, either from hackers, governments, or other state-sponsored or state-funded parties. This goes into the specific threats and the known vulnerabilities of phones from the security sid

Article Image

https://www.youtube.com, Rob Braxman Tech

The solution to a safe phone is to avoid production phones like the iPhones, Samsungs, and Google Pixels. Instead what you need is to change to Open Source Operating systems. These phones have no AI and no spyware. No 24/7 location tracking. Invisibl

Article Image

https://www.zerohedge.com, by Tyler Durden

"Volt Typhoon" is the name assigned by U.S. cybersecurity officials to a state-sponsored cyber operation linked to the Chinese Communist Party that has quietly penetrated critical infrastructure networks across the U.S., apparently with the aim of un

AzureStandard