This entry details the UP Phone (Version 2) by Unplugged, a privacy-hardened smartphone recommended by former CIA officer Jason Hanson. It highlights features like a physical battery kill switch, firmware-level firewall, built-in VPN, and extensive SD card support, positioning it as a secure alternative for users prioritizing digital privacy over mainstream convenience. The phone's zero data collection, as verified by Raxis Cybersecurity, is a key differentiator.
This video features Jason Hanson, a former CIA Officer and security consultant, detailing his personal experiences with data breaches and offering practical advice for personal security. He emphasizes that even individuals with high-level security clearances are vulnerable to large-scale hacks. Hanson provides three key strategies to mitigate risks: freezing credit with major bureaus, using data removal services like DeleteMe, and employing a VPN on public Wi-Fi.
This guide, presented by former CIA Officer Jason Hanson, outlines five essential strategies for enhancing online privacy and security. It emphasizes the use of VPNs, privacy-focused browsers, virtual payment cards, encrypted messaging, and credit freezes to protect personal information from tracking and identity theft.
This guide, presented by former CIA Officer Jason Hanson, outlines five key strategies for enhancing personal privacy and digital security while remaining at home. It emphasizes masking physical location through legal structures like LLCs, securing online activity with VPNs, avoiding social media, using less traceable communication devices, and employing digital monitoring services to protect against identity theft.
This video explores the concerning possibility that foreign governments, specifically China and Israel, may be acquiring VPN companies to spy on users. The discussion highlights that individuals concerned with privacy or handling sensitive information are prime targets for such surveillance. It suggests that using a VPN purchased from a country with potential surveillance interests could be a significant security risk.
This entry details the UP Phone by Unplugged, a privacy-focused smartphone reviewed by former CIA officer Jason Hanson. It highlights features designed to prevent tracking and protect user data, such as a physical battery kill switch, a Duress PIN, a firmware firewall, and built-in VPN. The phone runs on a stripped-down Android-based OS (Unplugged OS) and supports local storage expansion via SD card.
This guide details transitioning to a privacy-focused 'Ghost Phone' by de-Googling a Google Pixel with GrapheneOS, as explained by John Lovell and Sean from Mark37. It covers the benefits of open-source software, secure app usage, data migration strategies, and network compatibility, emphasizing enhanced digital preparedness.
This video explains how the ATF tracks online searches for firearms and ammunition, citing published data on 'National Firearms Commerce Tracking.' The ATF reportedly uses this data to identify trends, potential threats, and items to ban or regulate, correlating search popularity with enforcement actions. The speaker suggests using VPNs to protect online privacy during such searches.
This video discusses how the ATF tracks online searches related to firearms and ammunition, citing published data on 'National Firearms Commerce Tracking.' The speaker explains that this data, derived from Google searches and YouTube views, helps the ATF identify trends and potential threats, influencing their regulatory actions. The video suggests using VPNs to mitigate this tracking.
This video introduces a series focused on electronic invisibility and virtual privacy, taught by an SF veteran. While not a typical "gun channel" topic, the content is presented as essential knowledge for "capable citizens" in the current political and military climate. The instructor emphasizes that this knowledge is a crucial form of armament. The series aims to equip viewers with "open source" techniques to combat electronic surveillance, drawing parallels to the need to "arm ourselves" with information. This is Part 1, with future segments to be released monthly.
This video discusses a significant data breach at Guns.com, where leaked consumer and administrative data, including physical addresses and hashed passwords, appeared on the dark web. The speaker emphasizes the severe risks of reusing passwords and highlights the importance of robust cybersecurity practices for gun owners. Recommendations include changing email and bank passwords, using password managers like LastPass, enabling multi-factor authentication, and considering VPN usage for enhanced online privacy.
This video analyzes a case of domestic abuse thwarted by a bystander in the Czech Republic. It highlights the risks of intervening in domestic violence situations and suggests OC spray as a safer alternative to physical confrontation. The analysis emphasizes victim self-defense strategies and the legal implications of aggravated assault.
Gun Laws by State
Read firearms regulations for all 50 states + D.C.
Find Gun Dealers
Search licensed FFL dealers near you.