Big Tech is already gathering all sorts of your information. In China that controlled future is already here and the rest of the world is heading towards this Orwellian distopia. The full article can be seen here World Council for Health article : 12 Crucial Steps to Protect Yourself from the Tech Elite, However the following additional 4 suggestions are also worth considering:

  1. Get educated on what sovereignty means, what are your sovereign rights as a living man or woman, understand “the system”, how it works against you and what to do about it. Suggestions: The Sovereign Project live, book The System” by Peter Stone
  2. Replace your computer operating system with LINUX – it’s free and there are all the basic apps which work with images and video as well as microsoft documents and spreadsheets, email, internet etc. There are many videos online about how to switch to LINUX. (also see No 3)
  3. Get a de-googled phone or laptop; Suggested Supplier The Activists Toolbox
  4. Consider Buying at least a small amount of gold/silver and crypto – at least some BitCoin (and/or Ethereum). Store these assets securely yourself. For Crypto – be sure to deposit it in an off-line physical wallet device, which keeps it private and anonymous ( such as Ledger or Trezor). Keep this small device secure in a sealed metal tin (faraday cage).

Here’s what WCH suggests you need to do now to help protect yourself:

  1. Start using email services that protect your privacy ­– Use email services like Protonmail or Vivaldi that emphasize privacy. Google’s Gmail service is not “free.” In return, you provide them data that will be used to build a marketing profile of you and will be fed into their AI systems. I had previously recommended Tutanota but there are circulating rumors that its employees read user emails so I’d wait and see before endorsing it.
  2. Stop using Google or Bing to do web searches and use one of the following alternatives: Brave SearchMetagerGhosteryQwantMojeekDuckDuckGo, or StartPage. Comparing and contrasting these would take an article in and of itself and you should take the time to research the differences. DuckDuckGo is probably the most mainstream out of the above list, but lately, they have developed closer ties to Microsoft and are using more search results from Bing which has greater amounts of censorship. I’m not saying to stop using it but just to be aware and maintain caution.
  3. Stop browsing the web using Google Chrome or Microsoft Edge – Neither Google nor Microsoft cares about your privacy. Instead, take the time to install and use a more secure alternative like OperaWaterfoxBraveEpic, or the grand-daddy of browser privacy, Tor Browser. Note Brave is built upon the open-source version of the Chrome browser called Chromium. Some caution is warranted as it is still possible for Google to place “backdoors” that may inadvertently be incorporated into Brave.
  4. Prefer RumbleOdysee, or Bitchute for watching videos, and install Adblocker when watching on YouTube. They are alternative video-sharing sites to Youtube. However, they have yet to match Youtube’s breadth and quality of content. At the least, you should use Brave browser plus install the Adblocker extension to block those annoying ads. Note Google is taking steps to crack down on Adblocker so this may or may not work in the future.
  5. Ditch any cloud storage solution without zero-knowledge encryption – Sorry Google Drive, Microsoft cloud storage, Amazon Drive, and Apple iCloud, but you don’t make the privacy cut. These services still allow Big Tech to look at and audit your content. Instead, opt for a service that has zero-knowledge encryption in which the company cannot look at your content. There are numerous providers listed in this article, but some examples are SyncIcedrive, and Tresorit.
  6. Ditch non-secure photo-sharing services and opt for one with privacy built-in – Using Google Photos, Instagram, Facebook, Flickr, and the cadre of mainstream photo-sharing services exposes you to Big Tech holding your photos hostage. Instead, use a photo-sharing service that emphasizes privacy, like Smugmug or Cryptee.
  7. Opt to use secure video-conferencing that safeguards privacy – Many of us who have gotten used to using Zoom for video-conferencing were disappointed by the recent announcement that Zoom will now start feeding your data to AI. Instead, use privacy-oriented videoconferencing like Jitsi and Whereby.
  8. Stop using your Google and Facebook IDs for signing into other websites – The more we rely upon centralized web identification for signing onto websites, the more dependent we become. You do not want to get locked out of essential websites if Google decides to cancel your account. Instead, create individual accounts for all websites.
  9. Stop using Amazon and order directly from providers or buy locally ­­– Many of us have become reliant upon shopping on Amazon for our goods, and this makes us dependent on a central provider. Instead, order directly from the websites of providers, say Walmart.com, Target.com, or BarnesandNoble.com, or better yet, aim to support brick-and-mortar businesses.
  10. Aim to use cash whenever you can ­­– Credit card companies track our spending usage and use that data to feed into their AI systems or sell your info to third-party marketing companies. Cash is king in that it cannot be tracked. Aim to use it whenever you can to support brick-and-mortar businesses.
  11. Store local copies of all your data on multiple external hard drives – You should keep all copies of your data and photos on local external hard drives. It’s easy to purchase terabyte-sized storage from Seagate and back up all your data. It is essential you keep multiple copies for redundancy.
  12. Think decentralization and redundancy for all your usages – The Navy Seal dictum “One is none, two is one” applies here. If you only have one of something (say email, photo storage, video-conferencing solution, local external storage, etc.), then you are unprotected in terms of failure. You need multiple copies of everything. I like to have at least three copies of any important data.

You may find the above daunting. You might be thinking, “Where do I start?” I’d advise to start small. Just pick something on the list above and just look into it. You can install the tool or read about how the tool helps protect your privacy better than the “mainstream” equivalent. Then, slowly switch your usage over to the new tool.

By implementing the above solutions, you can drastically reduce your reliance upon Big Tech and protect yourself from their efforts at coercion as they roll out their social credit system. By taking this time now and learning how these systems work, you can increase your level of freedom and protect your identity, assets, and security.

Views: 31