Support independent research and analysis by joining my Patreon page:
https://www.patreon.com/thehatedone
When the US intelligence tells you anything, there's a 50-50 chance the opposite might be correct. The US government is seeking moral redemption. After decades of telling us that we should trust it with backdoors into our communications, it finally backfired spectacularly. Just as the privacy advocates have always been saying – that you can't have encryption badckoor just for the good guys.
"For months or longer", Chinese government hackers held access inside US internet service and telecommunication providers collecting all of our browser histories, phone data and much more. This of course is a major national security risk.
As any high-ranking politician, journalist or a random citizen, could be held at ransom for all the dirt the Chinese government now holds on each AT&T and Verizon customer. We'll probably see a major spike in support for Chinese policies as all the naughty secrets of key elites and individuals will be held for blackmail or it might "accidentally" leak to the press.
That's how serious this is. So now the US government is officially endorsing end-to-end encryption and private communication. But... that's a bit hyperbolic. Only one agency – the Cybersecurity and Infrastructure Security Agency, endorses it.
Encryption backdoor that only the "good" guys can access, does not exist. One man's backdoor is another man's vulnerability. That came out wrong. Or did it?
So CISA has issued a privacy and security tutorial for all Americans to adopt. And it contains a lot of points about which I have lots to say. I already talked about the Signal recommendation. I can talk about more if you are interested, so let me know in the comments.
But there was one recommendation that I did not expect to see. It goes against something that I've been recommending on my channel for a long time. It's about using a personal VPN, or Virtual Private Network.
SOURCES [references available in the transcript]
[0]
https://www.eff.org/deeplinks/2024/10/salt-typhoon-hack-shows-theres-no-security-backdoor-thats-only-good-guys
[1]
https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b
[2]
https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf
[3]
https://www.fbi.gov/about/mission/lawful-access
[4]
https://www.foxnews.com/tech/massive-free-vpn-data-breach-exposes-360-million-records
[5]
https://www.techradar.com/pro/vpn/over-25-billion-free-android-vpn-users-at-risk-of-data-leaks
[6]
https://www.cnet.com/tech/services-and-software/3-companies-control-many-big-name-vpns-what-you-need-to-know/
[7]
https://www.zdnet.com/article/trust-but-verify-an-in-depth-analysis-of-expressvpns-terrible-horrible-no-good-very-bad-week/
[8]
https://www.cnet.com/tech/services-and-software/what-is-kape-technologies-what-you-need-to-know-about-the-parent-company-of-cyberghost-vpn/
[9]
https://www.usatoday.com/story/tech/news/2017/04/04/isps-can-now-collect-and-sell-your-data-what-know-internet-privacy/100015356/
[10]
https://arstechnica.com/information-technology/2017/03/how-isps-can-sell-your-web-history-and-how-to-stop-them/
[11]
https://harvardlawreview.org/blog/2018/06/future-proofing-the-fourth-amendment/
[12]
https://www.cloudflare.com/learning/ssl/what-is-https/
[13]
https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/what-is-vpn.html
[14]
https://mullvad.net/en/blog/we-have-successfully-completed-our-migration-to-ram-only-vpn-infrastructure
[15]
https://gizmodo.com/vpn-mullvad-search-warrant-data-it-doesnt-collect-1850358717
[16]
https://www.wired.com/story/the-grand-tor/
[17]
https://orbot.app/en/about/
Follow me:
https://twitter.com/The_HatedOne_
https://www.reddit.com/r/thehatedone/
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.