Tor Did NOT Get Hacked, UP Smartphone Looks Like a Honeypot

Поделиться
HTML-код
  • Опубликовано: 1 окт 2023
  • In this video I discuss the recent false positive windows defender caused for the Tor browser, and the Unplugged Smartphone developed by Eric Prince and the developer of Pegasus spyware. It runs a proprietary version of Android as well as proprietary messaging, VPN, antivirus apps, and more. Due to the phones proprietary nature with software that you can't see the source code of, modify, and run as you want I would not recommend it.
    My merch is available at
    based.win/
    Subscribe to me on Odysee.com
    odysee.com/@AlphaNerd:8
    ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
    Monero
    45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
    Bitcoin
    3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
    Ethereum
    0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
    Litecoin
    MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
  • НаукаНаука

Комментарии • 953

  • @Shade_Tree_Mechanic
    @Shade_Tree_Mechanic 7 месяцев назад +1408

    "The Patriot Act was well intentioned"
    I just about got blinded by the glow.

    • @RipVanWhinkle
      @RipVanWhinkle 7 месяцев назад +26

      🤣

    • @OmniDan26
      @OmniDan26 7 месяцев назад +186

      You're looking at it wrong. From your point of view (good for the citizens) it wasn't. From their perspective (Good for spying on citizens) It was a resounding success and lived up to it's intentions.

    • @simonsemmler9804
      @simonsemmler9804 7 месяцев назад +20

      @@OmniDan26lmao

    • @fishsayhelo9872
      @fishsayhelo9872 7 месяцев назад +9

      lmao

    • @Sunil-dl9ep
      @Sunil-dl9ep 7 месяцев назад +6

      🤣🤣🤣🤣

  • @eduardoroth8207
    @eduardoroth8207 7 месяцев назад +1110

    as soon as he said yes to proprietary, he literally made it crystal clear that this is a honeypot

    • @mariomirabal4288
      @mariomirabal4288 7 месяцев назад +63

      fun fact about Erik Prince, he is Betsy devos' younger brother and the founder of blackwater PMC

    • @bbrainstormer2036
      @bbrainstormer2036 7 месяцев назад +64

      There is no security by obscurity

    • @ibex485
      @ibex485 7 месяцев назад +33

      Saying anti-virus earlier was as bad. That's a sticking plaster, if you have confidence in your security you shouldn't need it.

    • @groupCAP
      @groupCAP 7 месяцев назад +8

      Is it really self reflection? To me it reads like "oh I worked so so hard in the game it deteriorated my mental health and made me do mistakes, woe is me!" It's like he's trying to use that as an excuse, it's only 10% apology, 90% emotional manipulation by making himself look like a victim of the situation.

    • @groupCAP
      @groupCAP 7 месяцев назад +1

      ruclips.net/video/aG5Y3c8NRho/видео.html.BREAKALAGE BITCH

  • @panqueque445
    @panqueque445 7 месяцев назад +1092

    Trust him bro. You don't trust the guy who made a way to hack phones and sold it to the glowies? Come on bro trust him bro

    • @MidlifeRenaissanceMan
      @MidlifeRenaissanceMan 7 месяцев назад +100

      Once you work for the firm, you always work for the firm. Sure you can take time off, but you’re a member for life

    • @qud3913
      @qud3913 7 месяцев назад +13

      ​@@MidlifeRenaissanceManYep. Even if your family has them, you cannot be trusted

    • @MmmmyeahNO
      @MmmmyeahNO 6 месяцев назад +1

      Trust who? This guy? The hacker? I trust neither. All this guy has done is make assumptions about a phone he doesn't have. That's the point I was trying to make. He is guessing at best. There is no phone that is free from being spied on.

    • @I2AT
      @I2AT 2 месяца назад +1

      Lmao…. “Trust him bro”…. This guy sounds like a mouth piece for the nsa.

    • @BillAnt
      @BillAnt 2 месяца назад +1

      "Trust me bro.... you ain't got a choice!" Ha-ha-ha

  • @EmperorFeatherFlight
    @EmperorFeatherFlight 7 месяцев назад +1216

    Guy who creates spyware sells a phone with spyware preinstalled. What a surprise 🤣
    Thanks for 1k!

    • @takahashi5341
      @takahashi5341 7 месяцев назад +16

      Pretty much google

    • @vonweiss7149
      @vonweiss7149 7 месяцев назад +4

      Yea shocking.

    • @TVPInterpolation
      @TVPInterpolation 7 месяцев назад +49

      @@YAKUB_IHATEHUMANSsounds like copium in that instance.
      How can we trust a person behind Pegasus that it’s really meant to be secure?

    • @quintrapnell3605
      @quintrapnell3605 7 месяцев назад +4

      Hmm so it’s just a regular android phone?

    • @amir3515
      @amir3515 7 месяцев назад

      ​@@quintrapnell3605still watching but im guessing with a bunch of closed source proprietary software?

  • @bcn_clips
    @bcn_clips 7 месяцев назад +585

    Especially since CalyxOS and GrapheneOS are already fully viable complete privacy options, its so obvious his proprietary option is a full honeypot.

    • @Artyom_P
      @Artyom_P 7 месяцев назад +84

      right wing grifters always try to sell you on some absolute shite like this anyways, nothing new

    • @totallynotbluu
      @totallynotbluu 7 месяцев назад

      @@robyee3325 "the phone that protects your freedom"

    • @_eya
      @_eya 7 месяцев назад +20

      if only the grapheneos developer wasn't such a bad person

    • @JunkCCCP
      @JunkCCCP 7 месяцев назад +69

      ​@@_eyawho cares, you're not trying to be his friend, you're using his code

    • @RanEncounter
      @RanEncounter 7 месяцев назад +78

      ​@@_eya If I have to only use software from good people, I would not be using the internet.

  • @rootpotato
    @rootpotato 7 месяцев назад +186

    We're living in the 'Post-Trust' era.
    I don't even trust myself, or my family.

    • @thestig007
      @thestig007 7 месяцев назад

      Your family has been compromised. They are sending your information to the feds.

    • @holeefook3149
      @holeefook3149 7 месяцев назад +21

      When you get to this level wtf is the point of anything? Might as well go to Sweden and make an appointment with a self delete booth.

    • @twenty-fifth420
      @twenty-fifth420 7 месяцев назад

      @@whannabiI too don’t trust myself or my family. I think I stubbed my toe when I should have turned on the light in the dark hallway. Or maybe that time I burned my canna butter through a hole in a container because I forgot to wait for it to cool.
      And my ‘Mom’ always calls me asking me what I am doing and I don’t get it! What, is she an agent reporting my movements back to the glowiens? 👽
      All I am saying is the tinfoil hat stays on. 🤡

    • @clocked0
      @clocked0 7 месяцев назад +7

      ​@@whannabiWho says?
      You shouldn't put 100% trust into anyone, much less yourself. Intuition loves to lead us astray.

    • @groupCAP
      @groupCAP 7 месяцев назад +8

      literally stopped the video to laugh for 5 minutes straight... "if you dont want to be spied on by this navy seal, black water, ex mossad, guy who hired the pegasus guy and now recently your new bestfriend..." maybe not that exact wording but Im literally dying from laughing so hard... thanks Kenny for being skeptical and prevent someone falling for something that has NOT be proven to be safe.... by hiding behind "proprietary" software... WHY NOT let the code be audited IF they ARE safe tho... just imagine Graphene OS changing policy from Open to Closed... people would run faster than the road runner the F away, as they should.

  • @Hypnotically_Caucasian
    @Hypnotically_Caucasian 7 месяцев назад +633

    >Uses Tor for privacy
    >Also uses Windows which sends telemetry back to Bill Gates every time you try to uninstall Microsoft Edge
    You can't have both.

    • @Stripedspot
      @Stripedspot 7 месяцев назад +115

      Switched to the fat penguin os thanks to muta. it was the best choice I've ever made. hope more people stop using windows

    • @star_duck
      @star_duck 7 месяцев назад +50

      I wish i could quit windows too

    • @Doc4
      @Doc4 7 месяцев назад +22

      You're right on some level, however blocking incoming and outgoing net traffic on a domain or IP basis is trivial these days

    • @qlippoth13
      @qlippoth13 7 месяцев назад +5

      Mammon.exe

    • @Filipex13
      @Filipex13 7 месяцев назад +7

      ​@@star_ducki want to quit windows too, but i don't have storage to backup all my things and reinstall everything.

  • @skeleton_craftGaming
    @skeleton_craftGaming 7 месяцев назад +322

    If you can't read the code, always assume the code is spying on you. And as someone who works/worked in the government he should know that...

    • @cianroach
      @cianroach 7 месяцев назад +31

      He knows it

    • @rightwingsafetysquad9872
      @rightwingsafetysquad9872 7 месяцев назад +15

      Even if you can read the code, it's frequently spying on you. The top contributor to the Xen hypervisor (used by AWS and GCP) was the NSA for a while.

    • @MODEST500
      @MODEST500 7 месяцев назад +1

      Their are two sides of the argument. That also means that hackers can't access vulnerabilities. Again I am not defending closed source.

    • @bomberfish77
      @bomberfish77 7 месяцев назад

      @@MODEST500well if hackers can find vunerabilities, security researchers can too. i would argue that open source makes it easier for the researchers to help fix it.

    • @ThermalVoid
      @ThermalVoid 7 месяцев назад +3

      ​@@MODEST500 Decompilers are a thing. It may take lots of works, but they will figure out the specific lines of codes if there's motivation to do so.

  • @zaper2904
    @zaper2904 7 месяцев назад +318

    This phone glows brighter than the sun.

    • @Mr.Beauregarde
      @Mr.Beauregarde 7 месяцев назад +4

      The Glider speaks the truth. Gamma +5

    • @qlippoth13
      @qlippoth13 7 месяцев назад +6

      brighter than 3C 273

    • @kalef1234
      @kalef1234 7 месяцев назад +7

      Can someone explain that to me? I want to understand the lingo, thankssss

    • @yahirbear
      @yahirbear 7 месяцев назад

      @@kalef1234look up cia glow

    • @zaper2904
      @zaper2904 7 месяцев назад +26

      @@kalef1234 It's slang originally coined by the schizophrenic programmer Terry A. Davis. His original term was "glow in the dark CIA s" but the term glowie has since been generalized to anyone associated with a federal agency in general and an intelligence agency specifically.

  • @flioink
    @flioink 7 месяцев назад +292

    That phone would totally NOT send all your data directly to the NSA!
    Just trust the guy who looks like a B-movie villain!

    • @interstellarsurfer
      @interstellarsurfer 7 месяцев назад +37

      He acts the part too. Few men have as many war crimes under his belt.

    • @filthyfrankblack4067
      @filthyfrankblack4067 7 месяцев назад +3

      If a phone is not made with a reprogramable FPGA on a risc-v architecture with a IMEI hopper I don't want it for privacy use.

    • @FJB2020
      @FJB2020 Месяц назад

      @@interstellarsurfer what crimes??

  • @sirtra
    @sirtra 7 месяцев назад +146

    "it's android based but it's all our code"
    That's like saying "it's got an AMD CPU but it's all our hardware"
    I wonder what moisturizer he uses, his skin is absolutely glowing!

    • @qlippoth13
      @qlippoth13 7 месяцев назад +29

      It's a PLC based Stuxnet moisturizer

    • @blackwatch2516
      @blackwatch2516 7 месяцев назад +2

      Uranium

    • @indestructible247
      @indestructible247 7 месяцев назад +3

      he should use sodium and water as his moisturizer

    • @breakfast7595
      @breakfast7595 7 месяцев назад +3

      Radium is brighter

    • @Patrick-857
      @Patrick-857 7 месяцев назад +1

      Android is open source.
      This only works with people who aren't tech savvy.

  • @evilferris
    @evilferris 7 месяцев назад +116

    Closed source: walk towards the exit
    Rolled their own crypto: run towards the exit
    Unvaxxed dating app: u wot m8

  • @spiritualanarchist8162
    @spiritualanarchist8162 7 месяцев назад +90

    The irony is that people who buy these phones need to pay 10$ a month just to be ' anonymous ' .However they'll pay that fee with their bank account . So those same monthly payments makes it rather convenient for law agencies to check the phone owner's identity trough that bank account.

    • @Disspearing
      @Disspearing 7 месяцев назад +2

      Haha

    • @AakashKumar-tn6yh
      @AakashKumar-tn6yh 7 месяцев назад +2

      Lmao, that's is SO on point😂😂🤣🤣

    • @blakeunage8058
      @blakeunage8058 2 месяца назад

      They aren't reading or seeing what's on your phone....the bank accounts another battle

    • @spiritualanarchist8162
      @spiritualanarchist8162 2 месяца назад

      @@blakeunage8058 No, I mean that the purchase of such a phone means 9 out of 10 times one wants to spend money to have dodgy conversations. So it's an indicator for further investigation. A contract only bring unwanted attentions

  • @bckends_
    @bckends_ 7 месяцев назад +181

    "Offensive cyber virus" has the same vibe as "supercomputer-trained neural network artificial intelligence" in nvidia's recent marketing

    • @MrFreeGman
      @MrFreeGman 7 месяцев назад +17

      What? Are you forgetting about all the defensive LAN viruses in the wild?

    • @tentacledood5784
      @tentacledood5784 7 месяцев назад +4

      I'll do you one better: "Internet death machine" as 4chan was described

    • @zbubby1202
      @zbubby1202 2 месяца назад +1

      You forget that his security was trained by backpropagating quantum retro-encabulators

  • @DanielKarnole-fs3hm
    @DanielKarnole-fs3hm 7 месяцев назад +199

    This guy is the most sane tech youtuber.

    • @bluebay0
      @bluebay0 7 месяцев назад +37

      most based* tech youtuber

    • @UrbanistBlooms
      @UrbanistBlooms 7 месяцев назад

      I'm scared that I don't understand where he lies on the political compass. Like perfect libertarian center

    • @smasher.
      @smasher. 7 месяцев назад +19

      Frfr , he even touches grass daily

    • @smasher.
      @smasher. 7 месяцев назад +45

      ​@@UrbanistBloomsspoke like a true redditor

    • @ninocraft1
      @ninocraft1 7 месяцев назад +18

      ​@@UrbanistBloomsno one cares

  • @Splarkszter
    @Splarkszter 7 месяцев назад +119

    This is why we need to educate people instead of stomping on them because they never got tought how things actually work since all they know is because of ads and marketing.

    • @inevespace
      @inevespace 7 месяцев назад +5

      Problem that economics system is not interested in it. It prevents milking. Stupid customer is good customer.

    • @nwerd7584
      @nwerd7584 7 месяцев назад

      @@inevespace doesnt matter, its still failing, this socialistic version of "free markets" lol

  • @specthegod
    @specthegod 7 месяцев назад +207

    I literally stopped the video to laugh for 5 minutes straight... "if you dont want to be spied on by this navy seal, black water, ex mossad, guy who hired the pegasus guy and now recently your new bestfriend..." maybe not that exact wording but Im literally dying from laughing so hard... thanks Kenny for being skeptical and prevent someone falling for something that has NOT be proven to be safe.... by hiding behind "proprietary" software... WHY NOT let the code be audited IF they ARE safe tho... just imagine Graphene OS changing policy from Open to Closed... people would run faster than the road runner the F away, as they should.

    • @specthegod
      @specthegod 7 месяцев назад +8

      #trustmebro

    • @propsekgamer
      @propsekgamer 7 месяцев назад +4

      @@specthegod Okay bro. I trust you to do weird stuff with my data.

    • @electric26
      @electric26 7 месяцев назад +1

      ​@@propsekgamerprofile picture checks out

    • @BillAnt
      @BillAnt 2 месяца назад

      It's made and sold for a more trusting clientele. lol

  • @BenitoF2009
    @BenitoF2009 7 месяцев назад +214

    Rule #7: Always be specific when you lie.
    Rule #36: If it feels like you’re being played, you probably are.
    Rule #3: Never believe what you are told. Double-check.

    • @qlippoth13
      @qlippoth13 7 месяцев назад

      Rule #34: when all else fails, divert them with fap.

    • @IDvfy
      @IDvfy 7 месяцев назад +1

      What book is this from?

    • @Jinnyfir
      @Jinnyfir 7 месяцев назад +30

      NCIS. Agent Gibbs' rules

    • @BenitoF2009
      @BenitoF2009 7 месяцев назад +3

      @@Jinnyfir 👍

    • @MikeTsBees
      @MikeTsBees 7 месяцев назад

      ​@@IDvfyferengi rules of acquisition

  • @cheesium238
    @cheesium238 7 месяцев назад +67

    "Boomer mercenary glowie repacks Android on a phone and slaps 'proprietary' as a feature. "

  • @JAM35_
    @JAM35_ 7 месяцев назад +70

    I just looked into the phone a bit further and the CEO, the guy on that clip claims that phone includes IMEI spoofing to prevent being tracked which highly illegal and would mean that the wouldn't be legal in the US due to the phones not being FCC complaint. also I'm pretty sure that the original idea was closer to the freedom phone as the name that he originally planned on using was the "REDPILL PHONE" and yes it was stylized in all caps. also the phone has received backing from several silicon valley venture capital firms which I'd assume is why he renamed the phone.

    • @MentalOutlaw
      @MentalOutlaw  7 месяцев назад +56

      Yeah I heard about the Red pill phone thing in an older news article about this phone but couldn't find an original source for it. I think the same article said they had a server hosting their software on a ship traveling around international waters in an undisclosed location connected to starlink satellite Internet to be extra super secure, but they still can't show us the source code.

    • @MidlifeRenaissanceMan
      @MidlifeRenaissanceMan 7 месяцев назад +4

      The Q phone ???

    • @Entropy67
      @Entropy67 7 месяцев назад +24

      @@MentalOutlaw security by obscurity is not real, it doesn't matter what they are doing with the source code it might as well be malware if we can't see it.

    • @xXx_Regulus_xXx
      @xXx_Regulus_xXx 7 месяцев назад

      ​@@Entropy67especially considering Ghidra exists, it's not so easy everyone can reverse engineer software binaries now but anyone with a certain amount of knowledge can.

    • @daxramdac7194
      @daxramdac7194 7 месяцев назад +3

      ​@@MentalOutlawYup, and it's a ship that they themselves built to be secure against outside forces trying to pick up on signals and data. The ship has a 10,000 qubit quantum computer on board, also built by them, none of the parts were made in China, all hand made quantum parts by tool man Joe here in a garage.

  • @GrimReaping
    @GrimReaping 7 месяцев назад +15

    >Buy anti-spyware phone
    >Open it up
    >Spyware inside

  • @EA-dl6sg
    @EA-dl6sg 7 месяцев назад +52

    showing how to build your own android OS would be a good video

    • @PiterburgCowboy
      @PiterburgCowboy 7 месяцев назад +19

      Absolutely this. It would also expose every hack company trying to sell you some "PatriotPhone" or something.

  • @Freethinker-vj4ut
    @Freethinker-vj4ut 7 месяцев назад +57

    Need Libre podcast asap.

  • @Rock_Appreciator
    @Rock_Appreciator 7 месяцев назад +58

    Imagine overpaying for a honeypot when you could have some crisp open source OS on a pixel at 3/4 or less the cost.

    • @ryshellso526
      @ryshellso526 7 месяцев назад +5

      Yup. Got a pinephone as my backup/hacker phone. Multiple OS's and I can pull the battery out and sim card. ;)

    • @josephbrandenburg4373
      @josephbrandenburg4373 6 месяцев назад +1

      🤔 I wanna do this sometime. Any advice, recommendations, tutorials?

    • @Rock_Appreciator
      @Rock_Appreciator 6 месяцев назад

      @@josephbrandenburg4373 Mental outlaw has a tutorial on installing Graphene OS. You need a Google Pixel phone for it, you can get a refurbed 6a for like $150 or less, or go for something better, whatever suits your needs.
      That would be my first recommendation if you want something DIY, simple and with most of the perks. It's also cheap and a fun project, at the very least. I used my old Pixel 4 for it.

    • @Rock_Appreciator
      @Rock_Appreciator 6 месяцев назад +1

      Good luck tho, there are a few solutions and they are pretty worthwhile if this is something you think you'll care about

    • @josephbrandenburg4373
      @josephbrandenburg4373 6 месяцев назад +2

      @@Rock_Appreciator i guess you posted a link or something and yew tube boinked it

  • @marcogenovesi8570
    @marcogenovesi8570 7 месяцев назад +31

    Ah yes, this is only the 3rd or the 4th "totally not a honeypot" phone, I'm sure this will not be revealed as a honeypot like the others

    • @rolandzfolyfe8360
      @rolandzfolyfe8360 7 месяцев назад +6

      It's actually 100d chess darwinian criminal opsec training; if you catch all the dumb ones the rest will learn eventually

    • @JJFX-
      @JJFX- 7 месяцев назад

      Did that freedom phone nonsense turn out to be malicious as far as we know? It seemed like it was just some scheme by a silicon valley used car salesman to upsell a lazy android bundle as something special. I certainly wouldn't trust them but it didn't seem like they'd put the effort in to do more than that even if they wanted to.

  • @TheAtariSan
    @TheAtariSan 7 месяцев назад +44

    Debian iso was flagged by defender yesterday... My friend told me when he tried to download it.

    • @gyrgamer8936
      @gyrgamer8936 7 месяцев назад +42

      Microsoft probably doesn't want you to leave the big tech ecosystem. Anyways, always verify the iso.

    • @Gottrolledbythebest485
      @Gottrolledbythebest485 7 месяцев назад

      You all have no clue how big this new cyber warfare threats are . Govts probably trying to nip problem actors in the butt before they emerge …

    • @runed0s86
      @runed0s86 7 месяцев назад

      Comcast sent out piracy notices for people downloading Ubuntu with a torrent 😂

  • @ivanperez5142
    @ivanperez5142 7 месяцев назад +33

    Their independent audit is a joke. A rubber stamp from pwc consultant that says "trust us we tested with secure standards"

  • @tomaplatz
    @tomaplatz 7 месяцев назад +110

    DEEPFAKE GETTING BETTER GOOD JOB MENTAL 🤖🔥🤖🔥🤖

  • @thestig007
    @thestig007 7 месяцев назад +57

    I see you're trying to get sound treatment for that room. An area rug would do wonders. Also, those triangular foam pieces are more for Bass. Acoustic panels are better for midrange / high range sound reflecting off of flat surfaces.

    • @MentalOutlaw
      @MentalOutlaw  7 месяцев назад +40

      I'm probably just gonna end up making my own from Rockwool next time I go to home Depot

    • @qlippoth13
      @qlippoth13 7 месяцев назад +17

      @@MentalOutlaw Learn about mycology before spinning your own. Aflatoxins are much more common than the healthscare system would have us believe. Source: Trust me bro and also Cardiac Aspergilloma.

    • @phitsf5475
      @phitsf5475 7 месяцев назад +27

      Just make a fort under your favorite cushions and blankets. Great acoustics, comfy, totally invisible to ghosts and monsters

    • @illsmackudown
      @illsmackudown 7 месяцев назад +4

      @@MentalOutlaw Put your jerseys up the wall

    • @runed0s86
      @runed0s86 7 месяцев назад +2

      ​@@MentalOutlawYou can buy eggs in bulk and use the foam that they come in. It performs almost the same as those fancy foam panels!

  • @Vanlifecrisis
    @Vanlifecrisis 7 месяцев назад +165

    We got this new phone. We promise its not a government honeypot. BTW, its great for the unvaccinated and maga supporters. Don't tread on me! 2A! lol

    • @big_red_machine3547
      @big_red_machine3547 7 месяцев назад +6

      They’ll be handing them out for free to all of those guys at rallies, plus drug dealers etc etc hahaha

    • @williambrasky3891
      @williambrasky3891 7 месяцев назад

      Of course it’s great for them, they’re the exact sort of sucker who pays $1000 for the privilege and buys the shit a guy like Erik fucking Prince is selling. If you know anything about Prince, you know exactly what this is, a low effort Freedom Phone 2.0 for the guy who goes to gun shows. If you don’t know anything about Erik Prince, his “reputation,” or how he got that reputation, I suggest you look into it. Anyone willing to have him on their show isn’t a serious person. Anyone willing to let Prince come on their show so he can hawk products to their audience isn’t a trustworthy person, much less a reliable source of information. He’s not just an incompetent clown. He’s an evil, incompetent clown. A guy who frequently elicits moral objections among mercenaries ain’t a guy you want to do business with.

    • @hacchung
      @hacchung 7 месяцев назад +7

      finally a phone for the real citizens of the US!

    • @oz_jones
      @oz_jones 7 месяцев назад +4

      😂
      Also remember to water The tree of liberty, fellow patriots

    • @dekumutant
      @dekumutant 7 месяцев назад +3

      Lmao don't act like the government gives a fuck about either of those 2 groups

  • @thestig007
    @thestig007 7 месяцев назад +19

    The dude can't stop rubbing his hands together. I wonder who could be behind this?

    • @interstellarsurfer
      @interstellarsurfer 7 месяцев назад +14

      Just a happy merchant selling his wares.

    • @qlippoth13
      @qlippoth13 7 месяцев назад

      Hey guise, let's cool it with the personal opinions about a group of people who have been historically blamed for things that nobody is allow to talk about. I mean just because images of "Gendarmerie seizes historical Torah in Turkey’s Mus" seem to indicate something, it's nothing we need to concern ourselves with.

    • @assmonkey9202
      @assmonkey9202 7 месяцев назад

      @@interstellarsurfer🎩👃

  • @exoZelia
    @exoZelia 7 месяцев назад +27

    "One ought to design systems under the assumption that the enemy will immediately gain full familiarity with them" - Shannon's Maxim. Proprietary as security means worse security.

  • @jaimeortega4940
    @jaimeortega4940 7 месяцев назад +24

    What I hear is that some of the TOR exit nodes that are compromised as well as many of the "Markets."

    • @thestig007
      @thestig007 7 месяцев назад +10

      It's been that way for some time. Anyone can run an exit node.

    • @hanelyp1
      @hanelyp1 7 месяцев назад

      The point of multiple relays is no one knows both ends. Potentially compromised if one operator controls enough nodes. And from exit node to endpoint should still be encrypted.

    • @timewave02012
      @timewave02012 7 месяцев назад +5

      You absolutely need to expect exit nodes to be hostile. Not that long ago, exit nodes were downgrading connections to market sites from HTTPS to plaintext HTTP and rewriting cryptocurrency addresses in the traffic to addresses they controlled. End-to-end encryption is as critical over Tor as any other transport.

  • @JamesWilson01
    @JamesWilson01 7 месяцев назад +67

    Being spied on by those phones is the least of your worries. You'll get lethal radiation poisoning within days from the intensity of the glow.

  • @diffpizza
    @diffpizza 7 месяцев назад +27

    The Trust Me BrOS

    • @qlippoth13
      @qlippoth13 7 месяцев назад +2

      With an LGBTFO meet up app

    • @rattmcpossum
      @rattmcpossum Месяц назад

      Underrated comment fr

  • @floppij5572
    @floppij5572 7 месяцев назад +13

    He looks like a fed

    • @apersimmon
      @apersimmon 7 месяцев назад

      yea defiantly.

  • @toilet_cleaner_man
    @toilet_cleaner_man 7 месяцев назад +7

    >Don't trust big tech
    >"The PATRIOT Act was well intentioned"
    50,000 roentgens of radiation from that glow

  • @littlejam5984
    @littlejam5984 7 месяцев назад +30

    What a funny coincidence. I re installed Tor today because I have a new Set Up and it immediately flagged Tor and I was slightly confused and just tapped yeah wanna keep it

    • @Mr.Beauregarde
      @Mr.Beauregarde 7 месяцев назад +17

      Your mistake was your choice of OS

    • @obscenity
      @obscenity 7 месяцев назад

      I happened to recently compile tor and obfs4proxy from source a couple of days ago, those dont get flagged at all.
      Must just be a windows thing, and not every release.

    • @metatron5199
      @metatron5199 7 месяцев назад +8

      TOR was made by naval research laboratory, aka if the NSA ever wanted to find you on it they could, it was never a question of if it was possible as it was possible since the inception of TOR, rather it was a question of how much resources ie compute they wanted to allocate to figuring out who you were aka are you an important enough target to allocate X amount of $$ to compute to get the job done, that’s it. Anyone trying to say anything else doesn’t know what they are talking about and needs to read up on mathematics, cryptography and physics and fill in the gaps in the right places aka know what current technology is and what advances have been made in certain fields of mathematics or rather lack of published papers after certain dates, like its truly not hard to piece it together…. Just like with the building of the atomic bomb, all of sudden America just stops publishing papers on XYZ it wasn’t that hard for any other country to figure out what the US was doing during that time… same thing can be done with today’s technologies races…. Cheers

    • @xxXKogasaWe3dL0rd420Xxx
      @xxXKogasaWe3dL0rd420Xxx 7 месяцев назад

      @@metatron5199the source code is open source. You’ll be able to see if the NSA is fucking with you if they could. But they can’t unless they use a deanonomymising tor exit node or if you visit a domain that they control which has malware on it.

    • @indestructible247
      @indestructible247 7 месяцев назад

      @@metatron5199 it was made by the government. clearly, it glows in the dark and SPIES on you, whether or not it is open source!

  • @Tobaganner
    @Tobaganner 7 месяцев назад +18

    while talking about specs (~22m into the video), you state that the cpu may be more secure than google or exynos chips because its using arm cores, I believe the cpu listed there is the mediatek dimensity 8050 (same specs), furthermore both google and exynos base their chips off arm cores

  • @RealMasonFoxworth
    @RealMasonFoxworth 7 месяцев назад +32

    You've been putting out bangers recently keep it up!

    • @indestructible247
      @indestructible247 7 месяцев назад

      @@KGBMajorValeriP your profile screams delusional communist, but it's not a problem

  • @killitgameing658
    @killitgameing658 7 месяцев назад +30

    you kind of gloss over this in the video but graphene OS is actually going to be one of the most secure options you can find because you can have a fully trusted software stack

    • @Mr.Beauregarde
      @Mr.Beauregarde 7 месяцев назад +4

      Secure from trusted isn't exactly a logical conclusion. Although most secure is synonymous with unsecure, so perhaps you're technically accurate.

    • @marcogenovesi8570
      @marcogenovesi8570 7 месяцев назад +14

      @@Mr.Beauregarde he means you can enroll your own signing keys in the bootloader on the phone so it only boots your firmware. It's just another layer of defence

    • @clocked0
      @clocked0 7 месяцев назад

      ​@@marcogenovesi8570Is there anything actually stopping somebody from doing this with Calyx?

  • @tartas1995
    @tartas1995 7 месяцев назад +6

    The idea that his CTO is the creator of the pegasus malware but that he just wanted to do a support service. If we believe that, which we shouldn't, but if we do anyway, their CTO found a zero click exploit and intended to publish it to the public without informing the vendors, to provide it support. That is like finding a gas leak in a house and deciding to lit the fire because the people might want some marshmallows.

  • @D3YZ
    @D3YZ 7 месяцев назад +67

    Luke Smith always keeps us up to date! Thank you Luke Smith for doing everything for the community! ❤

    • @yippyo
      @yippyo 7 месяцев назад +5

      Luke Smith is here to deliver smiles

    • @yeetyeet7070
      @yeetyeet7070 7 месяцев назад +4

      he's a clown, but his linux and tor takes are good.

    • @novocaine2300
      @novocaine2300 7 месяцев назад

      ​@@yeetyeet7070elaborate?

    • @CarrotConsumer
      @CarrotConsumer 7 месяцев назад +6

      Is he still simping for eastern orthodox Christianity?

    • @indestructible247
      @indestructible247 7 месяцев назад

      @@CarrotConsumer he's simping for a terrorist

  • @ponywithnoname
    @ponywithnoname 7 месяцев назад +17

    mental outlaw lowkey mocking windows users by saying "the gov didn't hack tor" despite the gov spying on them as is regardless

  • @gyrgamer8936
    @gyrgamer8936 7 месяцев назад +9

    That phone is a whole beehive 💀

  • @AnesuC
    @AnesuC 7 месяцев назад +8

    They managed to get that domain in 2023, impressive. That must not have been cheap.

    • @angleisthebest
      @angleisthebest 7 месяцев назад +1

      You don't say. They wouldn't exactly be short on cash if they can afford to be working with the Pegasus boys.

  • @Ultrajamz
    @Ultrajamz 7 месяцев назад +9

    Tbh if you are being very privacy oriented… there should be no AV and def dont run windows…

    • @thestig007
      @thestig007 7 месяцев назад +3

      Or just don't use a computer.

    • @John_Doe856
      @John_Doe856 7 месяцев назад

      ​@@thestig007Dunno dude, using proprietary software and trying to maintain privacy at the same time seems really dumb to me, as was explained in the video

    • @qlippoth13
      @qlippoth13 7 месяцев назад

      @@thestig007 That's Industrial Society and Its Future tier right there.

  • @snudget
    @snudget 7 месяцев назад +6

    Well, at the point of him saying "propietary" my trust went from 1% to 0%

  • @indestructible247
    @indestructible247 7 месяцев назад +22

    Who the hell would buy a "privacy phone" from the founder of a private militia that commits war crimes?

    • @woldemunster9244
      @woldemunster9244 7 месяцев назад +4

      Ackshually..... Private militia does "war" on the behalf of governments.
      "It's a private company, it can do whatever they want" was invented during Nuremberg trials. :D

  • @hirogochitomayto7018
    @hirogochitomayto7018 7 месяцев назад +5

    My bioluminescence radar is going nuts, I mean I'm seeing levels never registered before

  • @Nope_handlesaretrash
    @Nope_handlesaretrash 7 месяцев назад +6

    The Glowiest Glowie To Ever Glow Glowlingly, Glowed Again? I am SHOCKED, SHOCKED I tell you.

  • @that_is_not_me
    @that_is_not_me 7 месяцев назад +7

    This is going to be ANOM but instead of the cops doing it, it will be a private company charging them to access the data.

  • @Danominator
    @Danominator 7 месяцев назад +5

    Probably just another subtle way Microsoft tries to force people to use Edge.
    Edge sucks btw lol

  • @maridiancrest243
    @maridiancrest243 7 месяцев назад +4

    "We wouldnt build pacemakers that could be hacked" "Dude trust us bro" "Governments surely wouldnt want control over the lives of their citizens"

  • @bobbyjohnson116
    @bobbyjohnson116 7 месяцев назад +5

    It's $949 for a Chinese clone phone with all proprietary firmware software all redflags

  • @user-tf5fi6rk4s
    @user-tf5fi6rk4s 7 месяцев назад

    Great video as usually. Please never stop puplition this educational / infomational videos. Great job.

  • @0xCAFEF00D
    @0xCAFEF00D 7 месяцев назад +3

    Remember the attack on the Linux kernel by that US university?
    They didn't catch those patches and they know the codebase.
    If Tor devs were compromised you can be certain that the patch that does it will be an attack like that. It does not make any sense to be blatant when you're attacking Tor when the entire point is to get access to the continuous use of that service.

  • @MorpheusTO
    @MorpheusTO 7 месяцев назад +5

    Classic case of: Solution Looking For a Problem.

  • @Quik-wk5sh
    @Quik-wk5sh 7 месяцев назад +22

    "Do you love free speech but hate free software"
    Laughing so hard right now

  • @user-bf3ip4zf7y
    @user-bf3ip4zf7y 7 месяцев назад +4

    This guy had a strange speech pattern and body language for someone being honest. Hes holding back something major. A few dupers delight smirks too. Wouldn't use this phone in a million years.

  • @RT-qd8yl
    @RT-qd8yl 7 месяцев назад +8

    I just want a couple hours of Kenny ripping on Erik Prince

  • @neptindeniels1570
    @neptindeniels1570 7 месяцев назад +5

    Tor hasn’t worked for me for the last 3 days, I still couldn’t understand what was going on, I used different bridges, etc. It didn’t even occur to me that Windows Defender blocked it until I looked at it myself, and usually it reports that it’s blocking something, but here it’s just a block and no notification, thanks for saying.

  • @KP-sg9fm
    @KP-sg9fm 7 месяцев назад +4

    MO is FED confirmed NOD

    • @qlippoth13
      @qlippoth13 7 месяцев назад

      Egads man, you may be on to something! I will up the ante with the vague inference he may be a German National Pigeon Society operative, commissioning all German Pigeons to spy for the Nazis.

  • @oleg94
    @oleg94 7 месяцев назад +4

    that guy gives me 99.99% a glowie vibe. I would not trust, trust me guy. this is absolutely a FBI / CIA back door. DO NOT BUY THIS. But funny for them, nobody has the money to spend so much on a new phone from an Unknown company lol anybody would spent that kind of money of a legit company haha

  • @MicahThomason
    @MicahThomason 7 месяцев назад +3

    The guy's body language screams deception.

  • @Gbennett1425
    @Gbennett1425 6 месяцев назад +2

    Glowing brighter than the unmatched power of the sun

  • @Sage-ig9hk
    @Sage-ig9hk 4 месяца назад +1

    The bit about him creating phones for the pacemakers is very interesting to me. I have a pacemaker and in the past the company (Abott) sent me some random Samsung phone locked down to only access the app that connects to my pacemaker. Now I have it on an app on my iphone (which I regret and I’m planning on switching back at some point) so this is something I need to look more into lol. Ironically the pacemaker was part of what got me into cybersecurity. Want to make sure no one can hack my heart

  • @TechnologyGeek862
    @TechnologyGeek862 7 месяцев назад +4

    No wonder they can talk with signal with their messaging app. Their FAQ says that they use matrix so they just using bridge to enable that. FOSS in spyware package sounds about right.

  • @gasplanet4341
    @gasplanet4341 7 месяцев назад +6

    Ai model looking clean

  • @crackthefoundation_
    @crackthefoundation_ 7 месяцев назад

    I like your level of detail but these are the only videos I watch on 1.75 speed, don't do the typical youtube cuts but.. yeah
    Thanks for the content

  • @jimc12
    @jimc12 5 дней назад

    I appreciate your time reviewing this phone. I would like to see a follow-up. Most people opening their eyes and waking up to what is going on are concerned. We do not know how to de google a phone, read code, access an onion server to browse the dark web or reprogram a phone and write our codes. Eric Prince is not a fanboy of government agencies, especially the Department of State. With all this being said, what are we supposed to do? Aside from myself, my whole family doesn’t have the time or the knowledge to do what you and most of your subs can do.

  • @HikingFeral
    @HikingFeral 7 месяцев назад +6

    I spend 99 percent of my time in Linux but I need to use Windows for University. A lot of the programs they use run like rubbish in a VM and Wine etc. If I wanted to ensure privacy and use Tor I would certainly not be running it in Windows. Do they not realize the point of Tor is completely lost when running it in Windows? I can't wait for the day I can delete my Windows drive but for now it can stay air gapped and used when absolutely essential to my work.

  • @ibex485
    @ibex485 7 месяцев назад +3

    I hope someone has already asked them for the source code for their open source-derived 'proprietary' operating system, to see if they are complying with its license.
    Everything he says about supply chain and proprietary screams 'I don't know what I'm talking about'. The interviewer unwittingly hits the mark when he responds with 'incredible', these claims have no credibility at all.

  • @zehph
    @zehph 6 месяцев назад

    One good use of LLMs would be a tool to make sense of code changes for people with no coding experience nor familiarity with projects with a massive code base like Thor, people could send code snippets and get a response if it is actually a threat for their privacy and or security.
    Maybe some based dev could use one of the Open Source models to train into looking specifically privacy invasion or attempted deanonymization for the users.

  • @psychosomatiqueofficial
    @psychosomatiqueofficial 7 месяцев назад +1

    The website even reads like theyre copsplaining something to you. Like theyre saying a whole lot of words but the words have absolutely no meaning and skirt around the entire premise of the situation.

  • @Zam432F
    @Zam432F 7 месяцев назад +4

    Just give me a phone with no camera at all. With a microphone that I can either physically and or digitally mute. A phone that doesn’t spy on me and collect data/track me.
    A smart phone that’s actually smart and innovative. With new tech hardware and software. A hardy, tough phone than can take a beating. A more ergonomic shaped phone. Not every phone has to be a thin rectangle.
    I have so many cool ideas….
    A phone that was designed to fit my hand like a glove, a phone that does what all the basics, but that is not too basic, like a dumb phone. A phone that doesn't emit anything harmful. A phone with a screen/display that doesn't negatively affect your eyes.
    Most phones are literally the same. A thin rectangle with a camera and a touchscreen. They all use the same handful of OSs/software. Literally no hardware innovation.
    just like other industries, the mega corpos like apple, samsung, etc. are all owned by the same ppl, the globohomos looking to do whatever evil thing it is they are doing.
    Wheres the creativity? wheres the innovation??
    It's almost impossible to compete in the phone sector. will you create your own chips? they wont allow you to. What network will your phone connect to? they wont let you connect.
    Free ppl arent allowed to compete in certain industries, this is one of them. Just try and make a competitor, theyll find a way to stop you. If we allow them....

  • @guyblack9729
    @guyblack9729 7 месяцев назад +3

    The $10/month to guarantee data privacy sounds like a protection fee

  • @emmettturner9452
    @emmettturner9452 7 месяцев назад +1

    I get about 20 scam calls from India every day. I’ve begun answering their pitch with one of my own asking if the dude will help me avoid US sanctions against Russia by using his country’s neutral relationship to make some “serious money.” They always hang up.
    You think the NSA is listening? Maybe they’ll get tired of all these false positives and take out the scam callers.

  • @Cookiekeks
    @Cookiekeks 7 месяцев назад

    13:31 it is, Signal changes keys every message. Well it's a bit more complicated than that but it does change keys every message

  • @ronslayton5270
    @ronslayton5270 7 месяцев назад +3

    >Glow Prince: "nah bruh, you don't need signal - we have our own proprietary app for that. Trust me, bro - we'll never sell your info like we sold our bodies when I was still fighting age"

  • @glass7923
    @glass7923 7 месяцев назад +4

    In an ideal world, shouldn't all software be open-source to ensure safety through transparency?

  • @nanut1203
    @nanut1203 7 месяцев назад +1

    Thanks for that, I was kinda worried

  • @mdellertson
    @mdellertson 6 месяцев назад +1

    Let’s not forget that Apple now has a “feature”, which enables machine learning to analyze the screen buffer (aka screenshot of everything displayed on the screen) unencrypted. So, they can read all sensitive data.

  • @darkguardian1314
    @darkguardian1314 7 месяцев назад +3

    All this is hanging on the fact he was a Navy SEAL and survived Hell Week.
    Doesn’t make him a tech expert or an elite hacker.
    I was in the Marines, but that doesn’t translate that I’m the next Tony Stark or have thousands of connections with shady government officials in the NSA…😂
    Secure is such a relative term.
    I call BS on Erik Prince.
    He fell into disgrace after his unit mercs went rogue during combat escorts shooting civilians with immunity.
    Scott Helvenston was a reality show Navy SEAL (Combat Missions - one season) killed and strung on a bridge working for Prince.
    You can also see some SEAL work out vids on RUclips by Scott before he deployed.
    RIP Scott Helvenston
    Semper Fi

  • @yay8507
    @yay8507 7 месяцев назад +7

    Just got home and theres a MentalOutlaw vid??? Nice 👍

  • @MrSomethingdark
    @MrSomethingdark 7 месяцев назад

    Thanks for the video but I have to say that that's a great classic Habsburg beard. Go for it!

  • @xyomga
    @xyomga 2 месяца назад

    Thank you for the breakdown of this network jargon. I would have totally trusted this guy just because I don't have the technical know-how. Now I'm just going to de-Google my phone

  • @wildexploit
    @wildexploit 7 месяцев назад +4

    That phone smells like a honey pot.

  • @interstellarsurfer
    @interstellarsurfer 7 месяцев назад +6

    UP phone is a honeypot for pay-triots.

    • @goiterlanternbase
      @goiterlanternbase 7 месяцев назад

      It is much better than this😏
      Probably the phone itself is no less secure than any other device in its vicinity🤣

    • @The_One_0_0
      @The_One_0_0 2 месяца назад

      ​@@goiterlanternbaseyea fr no function is really secure its just how far do you want to take it

  • @whatseedee9744
    @whatseedee9744 7 месяцев назад

    Thanks MO, keep up the great work.

  • @Takeda0x64
    @Takeda0x64 7 месяцев назад +1

    Your RUclips really growing up, don't stop grinding

  • @buddylee6203
    @buddylee6203 7 месяцев назад +5

    Lol running tor on windows

    • @qlippoth13
      @qlippoth13 7 месяцев назад

      Also lol, running Goldschlag code. Try not to hate me for that, I can't seem to stop playing where's Walderman.

  • @goofballbiscuits3647
    @goofballbiscuits3647 7 месяцев назад +1

    They have a secure messaging system that absolutely
    *GLOWS*
    *IN*
    *THE*
    *DARK*

  • @AndersHass
    @AndersHass 7 месяцев назад

    22:00 Those are standard ARM processors that other manufactures like Qualcomm and Google use for their own SoCs.
    They are also based on ARMv8-A, where I the latest one is ARMv9.2-A. For ARMv8-A the high end is X1, so they did cheap out on just having a higher clocked A78 instead of an X1. X4 was just announced with ARMv9.2-A so the option to use X2 or X3 was also there but then they had to be on ARMv9-A instead of ARMv8-A (so they have to use something else than A78 and A55 as lower powered processors).
    I am not sure how well it matters how good the lenses for the cameras they are using. The main thing that has improved phone cameras are software which I don't think any open source exist for the level that Apple, Google, Samsung etc. provide.
    But overall the phone is higher spec than other phones branding themselves as privacy/security focused.
    I do wonder what the GPU is, probably ARM's own (where I believe Qualcomm uses their own instead of ARM).

  • @nicksjacku9750
    @nicksjacku9750 7 месяцев назад +4

    Its a honeypot phone

  • @XBruceXD
    @XBruceXD 7 месяцев назад +4

    TempleOS phone is what I use.

    • @qlippoth13
      @qlippoth13 7 месяцев назад +1

      great minds think alike

    • @MentalOutlaw
      @MentalOutlaw  7 месяцев назад +5

      Only lets you put God in your contacts

    • @XBruceXD
      @XBruceXD 7 месяцев назад

      ​@@MentalOutlawDo we really need a phone to have God as a contact? I just want the glowies out of my phone.

  • @smylemusicproductions8897
    @smylemusicproductions8897 7 месяцев назад

    "Our factories are located in Vietnam, Taiwan and Indonesia."
    Love it.

  • @jonathanrealman8415
    @jonathanrealman8415 7 месяцев назад +1

    Might as well get this phone and save on my electricity bill, it glows bright enough to keep my house lit.

  • @shephusted2714
    @shephusted2714 7 месяцев назад +3

    tor is already hacked through exit nodes - no hacking of tor browser needed

    • @sloppyfloppy79
      @sloppyfloppy79 7 месяцев назад +1

      Exit nodes only know where the request is going, not it's origin. You need an entry node to match time/date stamps otherwise it's a random request from somewhere in the world.

    • @shephusted2714
      @shephusted2714 7 месяцев назад

      ​@@sloppyfloppy79 source sophos says: Bad exit nodes are entirely possible then, and bad news if they exist, but how do we find them?
      Chloe set up a fake website with a Bitcoin theme, downloaded a complete list of exit nodes and then logged in to the honeypot site multiple times via Tor, using a different exit node and a unique password each time.
      Crucially the usernames and passwords were sent over regular HTTP rather than encrypted HTTPS so that when Tor’s layers of encryption were peeled back they were visible in the stream of traffic.
      If the login attempts had gone unobserved and unabused then the total number of website visits and log in attempts recorded by the honeypot should have matched the number performed by Chloe exactly.
      They didn’t.
      After a month of testing there were over 600 unexplained page visits, 12 failed log-in attempts and 16 successful ones that hadn’t come from Chloe.
      The passwords were not stored anywhere and were far too difficult to guess so if they were indeed stolen, they were stolen by somebody snooping on-the-wire.
      Anyone can set up an exit node and because it’s the place where traffic is decrypted, anyone who runs an exit node can read the traffic passing through it.

  • @mark8200
    @mark8200 7 месяцев назад +5

    This guy glows so bright i have to look away