Most of what they teach about the Bill of Rights completely skips over much of its real history. From the reason the Federalists opposed it, to James Madison’s flip-flop, and the totally ignored preamble - on this episode, I’ve got 5 key - and mostly hidden - truths that just might change the way you view the Bill of Rights. Michael Boldin reports.
Five hidden truths about the Bill of Rights that they never teach
Did 60 Minutes commit fraud in its Kamala interview?
Political forces aligned with President Donald J. Trump are screaming "foul!" over CBS News' 60 minutes program seemingly editing out the "word salad" answers given by Communist Democrat Party presidential candidate Kamala Harris in her interview this week. Is it just good editing? Biased editing? Fraud? Patriot Dr. Ron Paul reports.
Safe alternatives to iPhones and Google Androids that don't track you
There are many alternatives to privacy invading iPhones and Google Androids and the vast majority of the population does not know about any of these. We will show you the different options including Linux Phones and De-Googled Phones, and the variety of alternative OS options instead of iOS and a Google Android. Some of these options are stark compared to a normie phone but a great number are actually very usable and do not require you to be a caveman. Rob Braxman reports.
Outlaw FEMA thugs cannot stop this community from rebuilding
The Fascist Police States of Amerika is staffed by disgusting criminals who steal everything that people own and destroy the lives of people because they are fundamentally evil. People have come together to help those who have been harmed by Hurricane Helene, while FEMA and other government thugs have done everything they can think of to obstruct such efforts. Militia are reportedly standing against the disgusting FEMA pig thugs. Death threats have been issued against the FEMA thugs.
Australian journalist speaks about the diseased Left Communists
Sky News host Rita Panahi presents a clear-headed exposé of the trust about the Fascist Police States of Amerika Communist pretender Vice President Kamala Harris in her own words promoting and supporting the dismantling of the Supreme Court, lying about President Donald J.
A VPN is useless against these kinds of Internet ID threats
Tracking people is now like rocket science. In the old days, just recording the IP address (which you can protect with a VPN) was good enough. Now the head butting between privacy believers and Big Tech continues and I will describe the many other threats that can identify you even when you hide your IP address. These are all threats in the Application Layer (OSI Layer 7) so this cannot be protected in the usual ways. There are solutions! But it requires discipline and understanding of what can be done by the opposition. Rob Braxman reports.
Separating fact from fiction: how VPNs really work
As a VPN Service Provider, I can tell you the truth about VPNs. They are not the end-all. They do not protect everything, and they can be vulnerable if you don't understand the limitations. This is a particularly important discussion for people in Brazil who are now threatened with a $9000 daily fine for using a VPN. Can you get caught if you use it? What can the government see? What does it really protect? Are there substitutes like iCloud Private Relay or other alternatives? VPNs are banned in other countries like China and Saudi Arabia. Can you use them anyway?
"The World is a Corporation" (Network, 1976)
This film clip from the 1976 movie Network describes clearly that our world has become an economic corporate force that rules everything. This eerie presentation portends a future in which freedom and individual rights are relegated to the trash heap of materialism and corporate profits. This is an important reminder of the global destruction that we all face if we refuse to stand up and demand - forcibly - a better world.
SQL Injections are scary (hacking tutorial for beginners)
In this video, we’re learning one of the oldest yet most dangerous Hacking Techniques out there - SQL Injection. Despite SQL Injections being over 20 years old, they still rank number 3 on the OWASP Top 10 List… why? Even fortune 500 companies are still vulnerable to these attacks. In this video, NetworkChuck will show you how to run an SQL Injection attack. Running a basic SQL Injection attack is pretty easy but will often become more complex with trickier targets.