Community or society that is undesirable or frightening
Hated by the Japanese government, banned in Germany and unreleased in the U.S. for over a decade!No, not the Dropped Culture Podcast (maybe?).This week, the fellas jump into the 2000 cult film, Battle Royale!This is probably the most violent film that Brock and Dan have covered (with the possible exception of Return of the Killer Tomatoes)!So let's get after it! You can do it, Shuya!Let us know your thoughts on the movie or give us some feedback on the show over at www.droppedculture.com or send us an email over email@example.com!Thanks for listening!
I've been kicking around some ideas for a dystopian novel lately, and I was hoping readers might be able to provide me with some feedback. I'm picturing a story set in a world where everyone's a slave but doesn't know it. People think thoughts they believe they came up with themselves, make decisions and lifestyle choices that they think are their own, buy things they sincerely believe they want, consume entertainment they honestly feel they enjoy, vote for political candidates they truly think they support, when in reality they're all marching in complete obedience to an elite ruling class whose high-level mastery of mass-scale psychological manipulation has bent the public to their will. In my novel people will be funneled from early childhood through an education system designed by plutocrats and social engineers to create efficient and compliant gear-turners, then when they are grown their programming continues in the form of mass media indoctrination. If they become politically aware they are funneled into artificially constructed ideological perspectives that are designed to look truthful and appealing but which don't challenge existing power structures in any meaningful way. Reading by Tim Foley.
We're kicking off season four with one of the topics that we get the most requests for, and that is all things related to essential questions. You want to know how to best write them and use them, so we are sharing a special Dystopian-themed essential question workshop. This workshop is unique because it features a conversation with one of our listeners, Taylor. You'll hear Amanda and Taylor walk through the unfiltered process of crafting an engaging and effective essential question for her Hunger Games unit. Join Curriculum Rehab: curriculumrehab.com/course SHOW NOTES: bravenewteaching.com/essential-question-workshop
On this edition of TruNews, what if technocrats were able to link your vaccination records to a mobile phone app that is also linked to your bank and credit card accounts? And what if the technocrats cooperated with pharmaceutical mad scientists to require an endless string of vaccination jabs for years to come? How close are we to such a dystopian nightmare? It may be much closer than you think. Perhaps within the next 2 years. Rick Wiles, Doc Burkhart. Airdate 1/5/22
A once great American city has become something short of a dystopia, where shop owners sleep with shotguns and citizens must act as police.For seven months, Dylan Carrico Rogers slept in his bike shop with a shotgun. TriTech Bikes, located in the Montavilla neighborhood of northeast Portland, Ore., where Rogers grew up, had been battered by three break-ins, two nearby shootings, and countless instances of vandalism. Portland's serially understaffed police force was nowhere to be found. And in the face of $25,000 of stolen bike parts, TriTech's insurance company was ready to jump ship. “They said, ‘if you claim another one, we're just gonna drop you,'” Rogers told National Review. “So I'm paying $1,200 every three months to be told that I have to replace [everything] on my own dime. And then at the same time, the cops don't show up. So we're just in a free-for-all.”https://www.nationalreview.com/2021/12/the-tragedy-of-portland-its-a-ghost-town-except-for-zombies/Support the show (https://www.patreon.com/seattlerealestatepodcast)
01 - DASHA RUSH_Outer Space (0'00) (Above Board Projects / 2021) 02 - OPUSWERK_Lost Settings (2'20) (Norite Records / 2019) 03 - BLACKRACHAS_Giorno Di Poggia (7'30) (Kompakt / 2021) 04 - LAURENT CHANAL_Carbon (12'40) (Get Physical Music / 2021) 05 - DEEPBASS_MM624 (18'30) (The Gods Planet / 2021) 06 - REGGY VAN OERS_Ingrained (23'50) (Affin / 2019) 07 - THE ALCHEMICAL THEORY_Yugen (29'30) (Affin / 2021) 08 - MASSA_Interpretation Of Nowhere (34'00) (Affin / 2021) 09 - ALEX DO_Stiller (39'20) (Dystopian / 2018) 10 - CADILLAC EXPRESS_Moonstore (44'00) (FRANKYEFFE Remix) (Family Piknik Music / 2020) 11 - ROBERT HOOD_The Majestic (49'20) (Rekids / 2021) 12 - LEX GORRIE_Force Of Habit (55'10) (Unknown Territory / 2021) 13 - SIMONE TAVAZZI_Darkness (60'20) (FLASH Recordings / 2021) 14 - ELIAS(DE)_Meridian 9 (65'30) (Ceremonie / 2021) 15 - PETER VAN HOESEN_Exit Strategy (69'30) (Center 91 / 2020) 16 - ISOLATE_Comeback (74'00) (Hard Electronic / 2019) 17 - ANTIGONE_Midnight Express (78'00) (Planet X Recordings / 2021) 18 - SNTS_Hopeless (82'40) (PAULA TEMPLE's Descent Into Madness Remix) (Noise Manifesto / 2019) 19 - ONYFAA_Fuerza (87'00) (Planet X Recordings / 2019) 20 - D.DAN_Spilling Over (92'10) (Planet X Recordings / 2021)
Get Unity here in Kindle and paperback: https://www.amazon.com/Unity-Elly-Bangs/dp/1616963425/ref=sr_1_1?crid=1IKEZCEJFZS8Y&keywords=unity+book+elly+bangs&qid=1640743411&sprefix=unity+book+elly+bangs%2Caps%2C92&sr=8-1 Elly Bangs website: http://www.elbangs.com
If you're anything like me, Blade Runner: Black Lotus may have made you a bit nostalgic for the last time a Corus-owned station ran a cyberpunk anime directed by Kenji Kamiyama every week at midnight. Ghost in the Shell: Stand Alone Complex was a stand-out title on YTV's Bionix block for many reasons, not the least of which include the international notoriety the broadcast gained from having an entire episode banned in Canada... although not really, since it aired a couple of weeks later. Randy joins me to look back on the series and how it holds up with its dense storytelling and (relative) lack of questionable CGI.
(episode also on my youtube channel: https://www.youtube.com/channel/UCn_xTpd4lFbYzEU3jzKNyOQ)Topics:Goodbye 2021!Dystopian movies predictive programming??Snowpiercer,Throw momma from the train,Actors known for being ‘ugly' in movies,The Hereditary girl being known for being scary looking,“E-girls' on tik-tok,Snowpiercer class divide conspiracy CORNER rant.Jan 6 ‘insurrection',Everyone being divided on race and no more occupy movement,Transfer of wealth in 2020,Trump saying to get the vaccine and booster,TRUMP IS COMPROMISED.My underground rebellion radio station,Im going to times square for NEW YEARS!Standing around for hours and wearing a diaper at new years,New years ‘rockin eve,Mainstream music ran out of double entendres for sex,Guy version of W.A.P.Top 40 music is objectively shit,Masks at new years times square,Eagles parade in philly and people pissing outside,New year, new you!New years goals list and law of attraction,Which time zone has the REAL new years??MASK KAREN VIRAL VIDEO ON PLANE.We used to just worry about snakes on planes,Spitting on someone after worrying they don't have a mask up,I could've taken a holiday break but the FANS DEMANDED AN EPISODE.Secret portapotty shows!
Wasp spray as an alternative to pepper spray? NO! Although many people claim you can use it this way, you shouldn't. Here's why.
A Swedish company wants to implant a vaccine passport microchip into your arm, Fauci says we'll never fly without masks again, and West Virginia senator Joe Manchin derails Biden's entire legislative agenda. Sign the petition to stop Biden's vaccine mandate. Head to https://dailywire.com/donotcomply DW members get special product discounts up to 20% off PLUS access to exclusive Daily Wire merch. Grab your Daily Wire merch here: https://utm.io/udZpp My new book 'Speechless: Controlling Words, Controlling Minds,' is now available wherever books are sold. Grab your copy today here: https://utm.io/udtMJ Andrew Klavan's latest novel When Christmas Comes is now available on Amazon. Order in time for Christmas: https://utm.io/udW6u Matt Walsh is now a self-acclaimed beloved children's author. Reserve your copy of his new book here: https://utm.io/ud1Cb Subscribe to Morning Wire, Daily Wire's new morning news podcast, and get the facts first on the news you need to know: https://utm.io/udyIF Learn more about your ad choices. Visit megaphone.fm/adchoices
Simply put: This is a dystopian Christmas dinner. We've got guest co-ho Brian (aka Evie's husband now!) sharing in a low-effort, only-slightly-sad holiday feast courtesy of Trader Joe. Not every dish is a gift, but at least one cheesy pick could be considered the reason for the season. Not on the menu but certainly on our minds: TJ's floor wine, why side dishes are the real star of the holidays, and the tragedy of the Star Wars Holiday Special.
This week's guest is an author of thriller and dystopian fiction. Please welcome, Freddy Cruz! We talk about his books, including the recently released "They Canceled the DJ" as well as a lot of other topics! This week's episode is brought with you, as ever, by your host's books! Science fiction and fantasy fans will love them. http://www.timniederriter.com/books/ You can also find your host's work on Kindle Vella! Ten stories are in progress, as of this posting. http://www.timniederriter.com/serialized-fiction/ Thanks for listening.
This week on Gun For Hire Radio... A Special Book review episode. The big 3 and 9 Dystopian reads. Tune in. The post The Gun For Hire Radio Broadcast: Episode 551 appeared first on Best Gun Range NYC and NJ Area | Gun Range Near Me.
In mid-October, BizNews journalist Nadya Swart spoke to Ros Nealon-Cook, a psychologist & functional medicine coach based in the Blue Mountains – a region west of Sydney in Australia's New South Wales. Ros, a (former) Registered Psychologist with the Psychology Board of Australia, a licensed Medicare provider, Functional Medicine Certified Health Coach, HeartMath Certified Health Professional and founder of Integrated Kids, is a profoundly qualified individual who has observed the situation on the ground in Australia. For months, there have been innumerable videos circulating the globe that depict the horrendous reality of Australians who are standing their ground against the draconian measures which their government has imposed upon them since the emergence of Covid-19. Of even greater concern are the restrictions and severe curtailment of freedoms to which the unvaccinated Australian population has been subjected. The absence of any media coverage of the dystopian society that has enveloped Australia, exacerbated by the deliberate cancellation and censorship of dissenting voices, has effectively rendered the country's citizens powerless. As an individual based in Australia, Ros has been uniquely positioned to provide credible information in respect of these realities. In addition, her professional background in psychology has enabled her to reliably observe the psychological impact of Covid-19, lockdowns and related measures on human beings and, in particular, infants and adolescents. After publicly speaking out against lockdowns and their resultant harms on mental health, Ros joined GAIHH (www.gaihh.org) – the Global Alliance of Integrated Hearts and Health. The non-profit organisation – consisting of a group of like-minded psychologists and mental health workers – was founded in 2021, in response to the emerging mental health crisis being faced in Australia and around the world as a result of the policies implemented to manage the Covid-19 pandemic.
In this episode, we talk about the dystopian nightmare in Portland. Oregon. Once one of the more beautiful cities in the country, it now looks like the set from the movie Escape from New York. We also talk about how Christmas is celebrated in the south compared to the NW. Then finally, we finish talking about the importance of Christmas, and Santa Klaus, on kids. And in particular poor kids. All of that and more on this episode of The Jerry Brazie podcast! So check it out and hear some unfiltered insight from someone who comes from nothing, who had made it big, and is talking about it in an unfiltered and honest way. It's just his opinion, but he will make you think! Let us know if any of this hits home for you and please forward this to anyone you know that may be thinking about starting a company, is struggling with an existing one, or is just interested in the game! Enjoy! Don't forget to subscribe to the show! Find all the links at https://jerrybrazie.com/link/ Or JerryBrazie.com Youtube: Here Facebook: Here Facebook Group: Here Instagram: Here Reddit: Here Spotify: Here Q&A: Questions@jerryBrazie.com or send us a PM on any of our social media pages!
Listen, Subscribe, Share the Show, Donate. Help us keep this train rollin! TruthSmacks.com | Spreading Truth one delicious morsel at a time. Use promo code PropReport10 and get a 10% discount at checkout! Notes & Links from Today's Show https://www.wsj.com/articles/nassar-victims-reach-380-million-settlement-with-usa-gymnastics-and-u-s-olympic-and-paralympic-committee-11639406377 https://www.wsj.com/articles/some-hospitals-drop-covid-19-vaccine-mandates-to-ease-labor-shortages-11639396806 https://www.cnn.com/2021/12/14/europe/europe-covid-vaccines-opposition-populism-intl/index.html https://www.sun-sentinel.com/news/fl-xpm-1985-08-14-8502020904-story.html https://potus-geeks.livejournal.com/1052914.html https://www.witf.org/2021/12/14/rep-liz-cheney-read-text-messages-she-said-mark-meadows-got-during-the-jan-6-siege/ https://www.foxnews.com/us/georgia-judge-sentencing-ahmaud-arbery-murder https://www.the-sun.com/news/4249697/heidi-planck-missing-california-adderall-party-crypto-gambling/ https://www.kcra.com/article/penn-state-student-dies-after-falling-down-trash-chute/38307209 Chris Cuomo allegedly blasted Janice Dean as 'that Fox weather bitch' (nypost.com) Cornell University covid cases: Ithaca campus shuts down after surge - CNN S.D. teachers competed for $1 bills on a hockey rink. Critics called the game ‘terrible' and ‘dehumanizing.' (msn.com) ‘Dystopian' video shows teachers scrambling to snatch dollar bills to fund classrooms (yahoo.com) Biden will sign an executive order to move government services online - Protocol — The people, power and politics of tech Air Force discharges 27 for refusal to get Covid vaccine - POLITICO California to reimpose statewide indoor mask mandate for one month amid new surge in COVID-19 - ABC7 Los Angeles Blood from physically fit people could help protect brains of couch potatoes - Study Finds USPS built and secretly tested a mobile voting system before 2020 (msn.com) The Propaganda Report on Rokfin The CFR Plots To Shut Up Critically Thinking Americans | Rokfin The Propaganda Report on Patreon The Propaganda Report Store Support Our Sponsors! Donate… If you find value in the content we produce and want to help us keep this train rollin, drop us a donation via Paypal or become a Patreon. (links below) Every little bit helps. Thank you! And thank you to everyone who has and continues to support the show. It's your support that enables us to continue producing shows. Paypal Patreon Subscribe & Leave A 5-Star Review… Subscribe on iTunes Subscribe on Google Play Music Listen on Google Podcasts Listen on Tunein Listen on Stitcher Follow on Spotify Like and Follow us on Facebook Follow Monica on Twitter Follow Binkley on Twitter Subscribe to Binkley's Youtube Channel https://www.paypal.me/BradBinkley https://www.patreon.com/propagandareport https://twitter.com/freedomactradio https://twitter.com/MonicaPerezShow https://www.youtube.com/bradbinkley https://www.youtube.com/monicaperez
Dystopian is the custom king! The amount of toys that he puts out is insane! Each one of his figures tells a mini story! If you are looking for runs of figures this is not your guy, but if your are looking for 1 off pieces of art welcome to Dystopian Customs!On instagram @Dystopian_customsCommercials brought to you by Chicken Burger DiscoOn instagram @chickenburgerdiscoSponsors:if you want to become a sponsor of Toys on Tap Podcast send an email to firstname.lastname@example.orgPatreon:To support the show you can join the Toys on Tap Patreon. Go to patreon.com/toysontapThank you to our sponsors:DKE Toys @dketoysBrian Johnson @be2thejEric Nichols @righteousmadeZachary Blackburn @ztblackburnChicken Burger Disco @chickenburgerdiscoRate and Review:The best way to support the podcast is to rate and review so that others can hear this sticky resin podcast!
NASA's DART mission has lifted off to protect humanity from rogue asteroids. The Double Asteroid Redirection Test will attempt to change the orbit of threatening asteroids by... hitting them with a rock. Hopefully that'll be enough to save Earth from future threats.Phil Spencer, head of Xbox, wants console developers to preserve old games and avoid NFTs. Legal emulation will help bring classic games to a new audience, while Phil thinks NFTs will be exploitative. Professor agrees. HEAVILY. Is Phil once again the saviour of the console industry?Amazon plans to expand their sci-fi stable with a Mass Effect show. Professor and DJ think this is an awful idea. Mass Effect, the story all about making your own decisions, probably won't translate well into a fixed story television show.Go Go Planetary Defence System- https://www.abc.net.au/news/2021-11-24/nasa-dart-mission-lift-off-space-x/100647884Phil Spencer : Hero or Villian?- https://www.gamesindustry.biz/articles/2021-11-18-phil-spencer-calls-for-industry-to-work-on-legal-emulation- https://www.gamesindustry.biz/articles/2021-11-17-phil-spencer-says-nft-games-feel-more-exploitive-than-about-entertainmentMass Defect the TV Show- https://boundingintocomics.com/2021/11/24/amazon-reportedly-nearing-deal-to-produce-mass-effect-tv-series/Wacky movie 25th November 1977 – Logan's Run Sprinted Into Spanish Theatres - https://www.imdb.com/title/tt0074812/ - https://ascmag.com/articles/logans-run-and-how-it-was-filmedOn this day in 1977 in Spain, audiences were treated to one of the best Dystopian thrillers from the 1970's when Logan's Run enjoyed its debut. Here's the plot summary: "A police officer in the future uncovers the deadly secret behind a society that worships youth."IntroArtist – Goblins from MarsSong Title – Super Mario - Overworld Theme (GFM Trap Remix)Song Link - https://www.youtube.com/watch?v=-GNMe6kF0j0&index=4&list=PLHmTsVREU3Ar1AJWkimkl6Pux3R5PB-QJ See acast.com/privacy for privacy and opt-out information.
In this week's episode Mike, Rich and Steve are joined once again by Sean Malloy, host of I MUST BREAK THIS PODCAST - Sean joined us to record a review for the next episode but stuck around to help out reviewing this week's DTV Throwback... First up though is SLUMBER PARTY MASSACRE a remake of the 1982 classic slasher. This one is directed by Danishka Esterhazy whose film The Banana Splits movie went down well around here! Next is RED SNOW , a horror comedy in which a young novelist is "visited" by an injured vampire. NIGHT RAIDERS is a political allegory dressed up as a Dystopian sci-fi movie and gave us unsettling flash-backs of The Flood! Our final feature review is STEALING CHAPLIN, a caper movie directed by Paul Tanter (Kill Ratio, Once Upon A Time at Christmas), and starring Simon Philips alongside his brother Doug as a pair of conmen in Las Vegas. Our Short Shot is BOGLINS RETURN - This is from the MASE BROTHERS who gave us the excellent Cyborg: Deadly Machine. We recommend you click the link to check out their other work! As mentioned above, Sean Malloy joins us to talk about our DTV Throwback, the remake of GET CARTER starring Sylvester Stallone. Please note that I mistakenly call Stallone's character "John" when in fact it's Jack! You can find Get Carter on IMDB TV, and is free with adverts. Follow the Short Shots TWITTER page, where we will be linking to a short film every day! Don't forget to also check out our main show, the DTV DIGEST on TWITTER and FACEBOOK!
Ah yes, here lies the drug wrappers! On this week's episode, the group of Andrew, Bryan, and Gracie discuss what it truly means to be a gaffer, the unnecessary hate for Marvel's Eternals, and a pitch about a group of people blissfully happy in their life's patterns...until one of them starts to question it altogether.Hosts IG: @bredacted, @therealgracegiffune, @writerbrandt, @canwesavepodOriginally recorded on: 12-01-2021.In a utopian society where everything is perfect and everyone has a role to play, one person finds themselves convinced that the reality around them isn't quite what it seems and attempts to dig further into the truth.
Dystopian and The Pandemic What do they have in common? The word ‘dystopian' comes to mind: ‘relating to or being an imagined world or society in which people lead fearful lives. The difference: The last year and a half - real and full of fear. Matched was imagined. Ally's message to her audience, young and old: it's okay to not be okay. Matched, a dystopian young adult novel has been read by a wider readership than the young adult population. The first in a series of three, it has been compared to ‘The Hunger Games' and ‘Twilight'.
In this second bonus episode of the week, the crew sits down together to watch Logan's Run, a 1976 science fiction gem that Josh suggested, but this time with Ricky D! Josh shares what makes this movie so special to him, while Ricky D wonders what makes this movie so special to Josh. Meanwhile, the Cap'n is having a good ol' time imagining a new society built from the combined ashes of the ones in the film, complete with its own musical culture and societal goals! The bonus episodes may be close to winding down, but our crew sure ain't!Check out the Cap'n on other shows like I've Never Seen..., NerdCanon, and Them's Fightin' Nerds!Support your favorite indie podcast in style with an SBI shirt! Follow us on Twitter @SuddenBut! Check out our picks for Shot of the Show on Instagram @suddenbutinevitablepodcast! Follow our Facebook page to join us live and be part of the discussion! Watch us on YouTube! Call us at 508-93-TWIST to share your picks for our weekly segments! Or, you can head on over to twistmyarmpodcast.com/sbi to get everything all in one place!
On this episode of Rightly Dividing, we are looking at how the movie 'The Matrix' contains stunning illustrations of hardcore Bible doctrine regarding the book of Job, spiritual circumcision, and the tripartite nature of human beings as found in Colossians 2 speaking about our body, soul and spirit. Why are we talking about a 22-year old movie in a Bible study? Because many of the things that 'The Matrix' refers to are not fiction, and they are coming to pass as we watch. What do you think the Metaverse is, anyway? Your King James Bible is more up-to-date than you might think it is, showing you human teleportation, time travel, power over the elements of the natural world, and resurrection from the dead. I'm sure it's just a coincidence, but the upcoming 4th installment is called 'The Matrix 4: Resurrections'. We are living in unique times, biblical times, and the long-held prophecies contained in the pages of the Bible are coming to life. Here's a fun fact, the word 'matrix' is unique to the King James Bible, and appears 5 times. Tune in tonight to find out what that means, it'll blow your mind. The first time I ever watched the movie 'The Matrix' back in 1999, it immediately struck me how much Bible was being taught through this movie created by Jesus Christ-rejecting atheists. Back in 1999, I didn't know as much Bible as I do now, but even at that early phase of my walk with the Lord, it jumped right out at me. If you don't think God will use unsaved people as a witness to the truth of the Bible, think again. Donald Trump comes to mind. https://www.nowtheendbegins.com/matrix-is-a-king-james-bible-word/
The producers challenge our hosts overall rating of this group of films. Katrina shares her slight obsession with watching Divergent...and Four. Rich isn't sure whether or not we are bonusing. We talk about what factions we may be in, and share random tidbits of information with you.
We go deep into the dystopian world with these four films: Hunger Games, Divergent, The 5th Wave, and Maze Runner. Some of them went farther than others, but we look just at the first film and say what's weak and what's fleek. What makes them work? Why does this genre keep having so much success? Are adults the problem? These are just some of the questions we examine.
The Bible is full of images and stories about the end of time and the collapse of society. Why are they in there? How should we approach them? Can we learn anything from the Hunger Games? In the conclusion of their series, Phil and Sara talk the explosion of Dystopian fiction, particularly amongst young adults, and the role apocalyptic and dystopian stories in Scripture can shape our hope as followers of Jesus.
WEF's The Great Narrative and The Metaverse by @DBrozeLiveFree via @YoureAllDunces - https://thelastamericanvagabond.com/great-narrative-metaverse-dystopian-vision-future. You can find out all about Derrick Broze here: https://theconsciousresistance.com. And you can check out The Last American Vagabond here: https://thelastamericanvagabond.com. Join my newsletter: jfodnews.com. Follow me on Twitter: @TheRealJFOD.
Part 1 -- Maria Albanese Joins Paine and The Duo Dissect Disturbing Details of the 'Great Reset' & The Elites' Coveted Scheme to Usher in the Dystopian Fourth Industrial Revolution Learn more about your ad choices. Visit megaphone.fm/adchoices
Part 2 -- Maria Albanese Joins Paine and The Duo Dissect Disturbing Details of the 'Great Reset' & The Elites' Coveted Scheme to Usher in the Dystopian Fourth Industrial Revolution Learn more about your ad choices. Visit megaphone.fm/adchoices
Part 3 -- Maria Albanese Joins Paine and The Duo Dissect Disturbing Details of the 'Great Reset' & The Elites' Coveted Scheme to Usher in the Dystopian Fourth Industrial Revolution Learn more about your ad choices. Visit megaphone.fm/adchoices
Part 4 -- Maria Albanese Joins Paine and The Duo Dissect Disturbing Details of the 'Great Reset' & The Elites' Coveted Scheme to Usher in the Dystopian Fourth Industrial Revolution Learn more about your ad choices. Visit megaphone.fm/adchoices
Part 5 -- Maria Albanese Joins Paine and The Duo Dissect Disturbing Details of the 'Great Reset' & The Elites' Coveted Scheme to Usher in the Dystopian Fourth Industrial Revolution Learn more about your ad choices. Visit megaphone.fm/adchoices
Part 6 -- Maria Albanese Joins Paine and The Duo Dissect Disturbing Details of the 'Great Reset' & The Elites' Coveted Scheme to Usher in the Dystopian Fourth Industrial Revolution Learn more about your ad choices. Visit megaphone.fm/adchoices
tracklist is not in right order. &ME,_Rampa_&_Adam_Port_pres_Keinemusik_&_Solomun_The_Day_I_Met_You Pachanga Boys - Time (John Cosani Remix) Altman - Hybrid Destiny Autoflower - Lasers Bird, Valentín Huedo - Tonight feat. Bird (Original Mix) DJ_Unique_LB_feat_Bobbi_Fallon_Flames_Black_Circle_Remix Fec - Shifting Reality Fur Coat - Dystopia Kenny Garcia L-ED - Feels Like Home Melodia Pysh Remix Mike Tohr, Amari (BE) - Borax (Oliver Koletzki Remix) Mike Tohr - The Last Zebra Miss Monique - Out of Sight (Extended Mix) Paravorik - Dancing in the Dark Riigs - Stay Forever (No Distance Remix) Shazse - Breath (Original Mix) Tim Penner - Counting Sails Tomb - Abyss Tryger - Lights on Me (Extended Mix) Tryger - Sandstorm (Extended Mix)
Is Your Firewall Actually Protecting You? What Should You Be Doing? New stats are out this week. So what's the number one vector of attack against us? Our Firewalls. And they're failing. So, what's going on. And what can you do about it? [Automated transcript follows] [00:00:16] And of course, I'm always talking about cyber security, because if you ask me that is one of the biggest problems we have in business. [00:00:27] Today. Well, yeah, you got to find employees. In fact, uh, it's almost impossible to find them in the cyber security space as well. And it's been hard for years. So I try to keep you up-to-date here. We've got boot camps that are coming up and you are really going to like them. We've been working on some supplemental materials for it. [00:00:47] And of course these boot camps are always free, so you can join it. You can have your friends come and learn the. Basics. It's not one of these high sell things. Right. I, I got a little letter in the mail this week saying, Hey, you can come and get a free steak dinner. And of course it's kind of like a timeshare, right? [00:01:09] Jay, you have to listen to the pitch. Yes. Stay over. On us. And you are going to be sitting there for four hours listening to this crazy pitch that's going on. That's not what my bootcamps are. Anybody that's been to. One of them will tell you we work on it. I explain it. You know what you have to do, how you have to do it, the wise, the winds, the wherefores. [00:01:35] So if you would like to learn more for yourself, Make sure you sign up Craig peterson.com sign up for my newsletter. And when a bootcamp is coming up, I will be sure to tell you about it in the newsletter so that you can attend. And it's important to, to understand that this is yeah. Aimed at business, the, these boot camps, but almost everything businesses have to do or shouldn't be doing the same thing applies to you in your. [00:02:08] So, if you are a small business person, if you're someone who has some it experience, and you've been assigned to worry about cyber security, this is for you. If you are a very small business and you're kind of the Jack of all trades, and you've got to worry about cybersecurity, this is for you. And I just got. [00:02:31] This week from someone on my email list who is retired and she was talking about her husband and her, they don't have any kids, no errors. They're trying to protect their financial investments. And of course I responded saying, Hey, I'm not a financial investment advisor, but I can certainly give you some cyber security input, which I did. [00:02:53] And you can ask your questions as well. I'm more than glad to hear them. And you probably, if you've sent them in, you know, I always answer them now. My big man, a few days might take me a week, but I will get around to it. And I try and respond to the emails. Sometimes I answered here on the radio show or on my podcast, but usually it's via email me. [00:03:17] At Craig peterson.com. And of course, that's also on my website, Craig peterson.com. And that's also my name Craig Peters on.com. So let's get into the firewall thing. When you have a network, you are connecting that network to your computers, maybe. To your security cameras, to your printers that you have, maybe there's a lock system. [00:03:44] Maybe there's more, all of this stuff is interconnected and it's all rather well and good. You can have a whole lot of fun with it, but it is not as particularly good if you can't get out to the internet. So what do we do? We hook our network, whether it's home or if it's business to the internet. Now, you know, all of this stuff so far, right? [00:04:06] You're following me. The internet is actually inter connected networks. In case you didn't know, there are now millions of networks that are connected on the internet. There are core networks out there. We were my company like number 10,000. I think it was, uh, a S an R a S number autonomous system. So we were fairly early on. [00:04:32] And of course, as you know, I've been on the internet in various forums since the early 1980s and helping to develop the protocols, but it is important to remember it is an interconnected network of networks. You might ask why? Well, the bottom line is you aren't connecting your network with other networks that have malicious software on them. [00:04:58] Maybe they're just poorly configured. Maybe they're causing a denial of service attack effectively because there's so badly configured. But whatever the case may be, you are still exposed. If you look at the traffic that's coming to your router. So your router is sitting at the edge of your network connected to your internet service provider. [00:05:19] So it might be Comcast or Verizon or a whole slew of others. But your network is connected via a router. Then the router knows how do I get my data from the input to the output or from the output to the input, if you will upstream and downstream data, that's what the router is for. And if you look at the data on your router and most of us can't, but if you were able to, what you will see is hundreds of thousands of internet packets coming to, and from your. [00:05:55] Router your endpoint every day. Usually these are bad guys doing what are called scans. They do port scans. They're primarily looking for services. So what do you, do you have a firewall now in many cases, you'll get a device from your Janette service provider that has a router built in and has a firewall built in, and it has wifi. [00:06:19] All of this stuff, all built in together makes life all nice and warm and fuzzy and Catalina, doesn't it. But in reality, it's not necessarily a good thing to have it all in one, because you're definitely not going to get the best of breed and router or firewall or wifi, but that's a different story. What is that firewall for that router? [00:06:41] Of course, it's getting all this internet traffic and anything that's on the internet that is. I'm trying to get to you is going to go through the. And anything that you are trying to send up to the internet, like for instance, to try and get a web page or something is also going to go up through that router. [00:07:02] So how do you protect yourself time? Was that there wasn't really much of a way to protect yourself. And frankly, there weren't a lot of reasons. To try and protect yourself. And the internet was just this wonderful open thing, lots of fun and played around a lot. Back in the early nineties, it was, it was just a joy in the late eighties to, to be connected up to the internet and then bad guys started doing bad things. [00:07:30] We took the concept of what you have in an automobile and applied it to the. If you're driving your car, your in the passenger compartment and that passenger compartment is hopefully warm in the winter and cool in the summertime. And you are protected from that big mean nasty engine that's in front of you, or if you're driving an electric car from those mean nasty batteries that are probably below you in that car and what's between you and the. [00:08:04] Of course a firewall. And the idea is to keep the nastiness of that engine, all of the heat, the oil, the grime, the wind, everything else is associated with that engine. Keep that away from you so that you can now drive that car just comfortably in that controlled climate of the passenger compartment, that concept was then applied to the inter. [00:08:30] And in fact, I designed and implemented one of the first firewalls ever made way back when and the firewall in the internet Partland is very similar to the car in the car. You have some protrusions through that fire. Don't you, you you've got a steering wheel. How does that get up to the front of the car? [00:08:53] Well, it goes through the firewall and around that steering wheel, of course there's some EBDM, some rubber type stuff that helps stop anything from coming through right next to that steering column. Same, thing's true with the brake pedal and the gas pedal. At least it used to be. Nowadays, it's so much of this as drive by wire, that the only thing going through the firewall is a wire and there's no mechanical linkage. [00:09:24] Unlike my car, which is a 1980 Mercedes-Benz diesel. Where yes, indeed. Direct linkages to everything. So the firewall in the cars protecting you from the nastiness in the engine compartment and the firewall, when it comes to your internet is doing something very similar. Think about your house for a minute, you have a house with doors and windows. [00:09:53] I would hope. And a chimney and maybe a couple of other protrusions that are going outside of the house. Well, you have some similar problems and when it comes to the internet and when it comes to the firewall, With your house, sir. Sure. You could post a guard out front, a whole series of them. You've got a dozen guards out front and they are all guarding that front door. [00:10:19] But if no, one's watching the back door, if no one's paying attention to the windows, there's still ways for the bad guys to get in. And that's what we're going to talk about. How does the internet firewall tie into this analogy of cars and the analogy of your home? Because it's a very important point when you get right down to it. [00:10:44] We need to understand this because the number one tactic reported this week by MITRE and Cisco is exploitation of public facing application. So I'm going to explain what that is. What's your firewall can do for you and what you should do for your firewall. A stick around. We've got a lot more coming up. [00:11:09] I want to invite you to go. Of course, right now, online to Craig peterson.com. Once you're there, just sign up for mind's newsletter. Simple Craig peterson.com. [00:11:25] This week, we found out what the top five tactics are that are most frequently being used by bad guys to attack us. This is done by MITRE and Cisco systems. Number one, public facing applications. What does that mean? [00:11:42] We've been talking about this report, but really what we've been delving into is how data flows on your network, whether it's a home network or maybe it's a business network, how does this whole mess work? [00:11:58] And when miters talks about the biggest problem here, 91% of the time being what's called an exploit of a public facing application, what does that mean? We went through the basics of a firewall and a router. So all of the data coming from the internet, coming into the router, then handed to the firewall. [00:12:24] Any data going out, goes into the firewall. And then the. So that's the pretty simplistic version. And of course the firewall on your network does a similar thing to the firewall in your car. It stops the bad stuff, at least it's supposed to, but your home and your car both have different ways of getting. [00:12:48] Past the firewall in the house. It's your doors and your windows in the car. Of course, it's where the steering column goes through where the brake pedal and the gas pedal go through the clutch, all of that stuff that perch, um, permeates, it goes through. That firewall. And of course, you've probably, if you're been around for awhile, you've had leaks coming through your firewall and, uh, you know, how poorest they can be sometimes. [00:13:18] Well, we have the same type of thing on our internet firewalls. Every home has doors and what we call the doors in on the internet is similar to what they call them. On the, in the Navy, on the water, the reports. So think about a porthole in a boat, or think about a, a door, a port, which is the French word for door. [00:13:45] What happens on the internet? For instance, if you're trying to connect to Craig peterson.com, you are going to connect to a specific port on my server. So the address typically, uh, is going to be resolved by DNS. And then once it gets to the server, you can connect to port 4 43. You might try and connect to port 80, but I'll do a redirect, but that's neither here nor there. [00:14:12] So you're going to connect to that port four 40. So my firewall has to say, Hey, if somebody is coming in and wants to get to port 4 43, which is called a well-known port, that's the port that all web server. Listen on. So if someone's trying to get to my port, my web server on port 4 43, let them in. But if someone's trying to get to another port, don't let them in. [00:14:48] Now there's multiple ways to respond or not respond. I can talk about that right now. That'd be for deep dive workshop, but the idea is. Each application that you are connecting to, or that your providing has. Part of the problem that we've been seen. And this is a very big problem is that people are not changing the administrative passwords on their machines. [00:15:20] So administrative passwords mean things like admin for the username and admin for the password on your firewall. So. Your firewall, if you have what's called when admin enabled, what that means is someone on the wide area network. In other words, The internet, someone on the internet or on the, when can connect to your firewall and control it. [00:15:51] This is, as you can imagine, a very big thing, and it is something that we cover in one of our workshops, explained it all and all of the details and what to do, but most businesses and most people have not properly configured their firewalls. When we're talking about number one, problem, 91% of the time being an exploit against public facing applications. [00:16:18] What that means is they could very well just be trying to connect to the administrative interface on your firewall. Unfortunately, they will often offer. Change the software on your firewall. So they won't just reconfigure. They'll just change it entirely. And they'll do all kinds of evil things. Again, we're not going to get into all of that and what to look for and what can happen. [00:16:44] But number one thing everybody's got to do, and I saw some stats this week as well, that made me want to bring the. Most people and most businesses about two thirds have not changed the default passwords on the hardware that they have. Now it can understand sometimes the kids confusing. No question about. [00:17:07] But if you don't change the password on something that's public facing, in other words, something that can be reached from the internet or again, the wide area network. I know there's a lot of terms for this, but something that someone else can get at from outside your network. And it's the default password like admin admin, you could be in a whole lot of. [00:17:35] So check that right now, please double check that triple check that because even if you have a router from a big internet service provider, again, like the Comcast Verizon's, et cetera of the world, they will almost always have it set up. So you can change that administrative password and Jewish. Now I, again, for clients, I have some different advice than I have for, for just regular users, but make sure you change that. [00:18:09] And here's the second part of the problem. What happens if you have a business and let's say you're not hosting your own website, like I've been doing for a couple of decades and how three 30 years, I guess now. Um, and so you've got your website hosted at some. Web height site, hosting place, you know, Gator or one eye and one eye and one or GoDaddy or whatever. [00:18:35] Okay. So, okay. That's fine. So let's not inside our network. Uh, w we don't worry about the security because that's the vendor's problem. Now we're talking about, okay, what happens. My users who need to work from home. This gets to be a very big problem for so many people, because work from home is important. [00:19:00] So what are you going to do? Well, basically in most cases, unfortunately, businesses are just exposing an application to the internet. So they might, they might. Terribly configured networks, where there is a direct connection that goes right to the files. So you connect to a port on their firewall and it immediately redirects it internally. [00:19:30] Remaps it to the file server. And some people are really, really clever. Alright. Or so they think, because what they'll do is they'll say, okay, well, you know, that, that normal port number. Okay. So I'm going to move. Port number. So you're going to connect to port 17, 17 on my firewall, and it's going to connect you to the file share on my file server so that people from home can just connect to port 17, 17, and ta-da, there are all the files and yeah, we're, we're using passwords, so it'll be okay. [00:20:06] It'll be fine. Um, but, uh, guess what it isn't for a few. Different reasons are we're going to be talking about those here in just a minute. Yeah, I want to encourage you right now. Take a minute. Go online. Craig peterson.com. You'll find lots of information there. I've got 3,500 articles, all searchable, Craig peterson.com. [00:20:32] But more importantly, make sure you sign up for my newsletter. Craig peterson.com/subscribe. So that you can keep up to date on everything that is important in all of our lives. [00:20:51] We're talking about firewalls at home at the office, what it means to have public facing services, really applications, people working from home. How can you make it easy for them and hard for the bad guy? [00:21:15] Many businesses had to quickly change the way their computers were set up because of course the lockdown and people working from home. [00:21:26] And, um, unfortunately. Many mistakes were made. And some of this, in fact, I'm going to talk a lot of this problem up to these managed services providers break, fix shops. My, my fellow information technology contractors, if you will, because they didn't know any. Most of these people have been computer people, their whole lives, right. [00:21:55] They played with PCs when they were young and they might've taken a course or two and wow. MCSC certified. Believe me, this is not something that a straight up MCSC or. And frankly, most of the it certifications can really understand or really handle the cybersecurity can be done, but there's so many things they overlook just like what I was just talking about, exposing a file server directly to the internet. [00:22:29] I mentioned, okay. While they thought it was going to be safe because there's a username and password, but there's a couple of huge problems here. Problem. Number one. When you're exposing a service to the internet, like for instance, the files server, you are exposing software that may have exploitable, but. [00:22:54] And again, going back to those stats from earlier this week, more than half of all of the systems that are out there are not patched to date. It's so bad that president Biden just ordered the federal government agencies to apply patches some as old as three years. So what happens now? Well, the bad guy scan, and guess what they found. [00:23:23] Port that you thought was just so clever because it wasn't the standard port number for that service. Maybe it's SMB or CIFS or something else. And, uh, they found it because they scan, they look, they see what the response is that tells them what type of a server sitting there. And then they try, well, let me see. [00:23:45] There's the zero day exploits, but why bother with those? Let's just start with the good old standard ones. And unfortunately, because so many machines are not patched up at all, let alone properly patched up. You, they end up getting into the machine. It's really that simple, just because it's not patched up. [00:24:08] How does that sound? Huh? Yeah, it's just plain, not patched up. It's not available for anyone to be able to use anybody to be able to access. Right. It there it's not restricted. So the passwords don't matter if you haven't patched your systems. And then the second problem is that. Are brute force attacks against so many servers out there. [00:24:36] And most of the time, what we're talking about is Microsoft, but, you know, there's the share of bugs kind of goes around, but Microsoft and really, they get nailed a lot more than most beet, mainly because they're probably the number one out there that's in use today, not in the server community, certainly, but certainly also in the. [00:24:59] It's been, you know, small businesses, that's all they know. So they just run a Microsoft server and more and more, you kind of have to run it because I, I get it. You know, there's so many apps that depend on the various functions that are provided by the active directory server at Microsoft and stuff. So we, we do that for our customers as well. [00:25:19] So are you starting to see why the brute force against a server will often get them in and the smarter guys figure out what the business is? And then they go to the dark web and they look up those business emails. Addresses that they have that have been stolen along with the passwords that were used. [00:25:43] That's why we keep saying, use a different password on every site because that stolen password now. Is going to be tried against your service, your, your file server. That might be there. You might be trying to have a VPN service that the people are VPN in from home. You might have remote desktop, which has been. [00:26:08] Abject failure when it comes to cybersecurity, it's just been absolutely terrible. So you might have any of those types of things. And if they've got your email address and they've got the passwords you've used on other sites, which they've stolen and they try them, are they going to work? Odds are yes, because most people, I got another set of stats this week. [00:26:36] Most people use the same password for every site out there or every type of site. So they might get a second, most common is they use one password for all of their social media sites. They use another one for all of their banking sites. So we cover this in some depth in our bootcamp so that you understand how to do the whole password thing. [00:27:03] And what I recommend is a piece of software called one password. I don't recommend that you just use one password for everything. I was misunderstood by someone the other day. You mean just w w I use one password for everything. Yeah, you do. And then I talked to them a little bit more because I thought that was an odd question. [00:27:24] And it turned out, he was thinking, you just have the one password, like, like, you know, P at sign SSW, zero RD. Right? You use that everywhere. No, there's a piece of software go to one password.com. That's what I recommend as a password manager. And I show you how to use that and how to use it effectively in my bootcamp. [00:27:48] Absolutely free. Just like the radio is free. I'm trying to get the information out to as many people as possible, but you gotta be on my list. Craig peterson.com. Make sure you go there. So I've explained the basics here of what happens. We have a door open or windows, open ports on our servers, on our firewalls at home. [00:28:15] And at work. So the thing to do, particularly if you're a business, but even if your home user is check that firewall configuration. And let me tell you something that probably won't come as a surprise. Most of these internet server. The providers are in the business to make as much money as possible. And cybersecurity is very much secondary. [00:28:40] They know they talk about it and they talk about software defined networks and things that sound really cool. But in reality, what they give you is. Configured very well and is going to expose you. So make sure you go in, they will set it up. For instance, if they're providing you with television services, they'll set it up so that they can just bypass your firewall and get into the cable box that they installed in your house. [00:29:09] Yeah. Obviously that's not something they should be doing because now they are opening you up to attack. What happens when there's a cybersecurity problem with the cable box? We've seen this problem too, with television vendors where they poke a hole out through your firewall so that they can then gather statistics and do firmer updates and everything else. [00:29:34] It's insane. It really is. These vendors are not thinking about you. They're not thinking about the consequences. It is a very, very sad situation, but now you know what to do and how to do it. Okay. I explained today, firewalls. I explained router. I explained ports, which should be open, which should not be open. [00:29:58] And the reasons why I even mentioned passwords, I get into that in a lot of detail in my bootcamp, Craig peterson.com to get on that waiting list. Craig peterson.com, just subscribe and you'll be kept up to date. [00:30:14] There has been a whole lot of discussion lately about Metta. You might've heard. In fact, you probably did that. Facebook changed its name to Metta and they're aiming for something called the metaverse. So what is it exactly and what's it going to do for or to you? [00:30:32] The metaverse oh my gosh. I had a great discussion this week about the metaverse this came out in, um, and originally anyways, in this novel called the what was it now? [00:30:47] A snow crash. That's what it was 1992, Neil. Stevenson or Steffenson. I'm not sure how he pronounces it, but in this book, which was a cyberpunk model and I've, I've always thought cyber punk was cool. Uh, is the metal versus an imaginary place that's made available to the public over the world wide fiber optics network. [00:31:13] And it's projected onto virtual reality goggles sound familiar yet. And in the. You can build a buildings park signs as well as things that do not exist. In reality, such as vast hovering overhead light show, special neighborhoods were three where the rules of three-dimensional spacetime are ignored and free combat zones where people can go hunt and kill each other. [00:31:42] Great article about this in ARS Technica this week. And, uh, that was a little quote from the book and from the article. Phenomenal idea. Well, if you have read or seen the movie ready player one, and I have seen the movie, but a friend of mine this week said the book is so much better. So I'm going to have to read that book, ready player one. [00:32:06] But in it, you have these people living in. Dystopian future where everything is badly worn down, the mega cities, people building on top of each other and they get their entertainment and relaxation and even make money in. Prison time by being inside this virtual world, they can go anywhere, do anything and play games, or just have fun. [00:32:39] One of the vendors that we work with at my company mainstream has this kind of a virtual reality thing for. I kind of a summit, so people can go and watch this presentation and I think it's stupid, but they, you walk in. And it's, uh, this is just on a screen. They're not using like those Oculus 3d graph glasses, but you walk into an auditorium. [00:33:13] So you've got to make your little avatar walked on. Dun dun, dun dun, dun, dun, dun, dun, dun, and then go to an empty seat. And then you have to make your avatar sit down. Right? I, I have never played a game like this. I never played second life. Never any of that sort of thing. It was kind of crazy to me. And then I was doing a presentation, so I had to go Dundon then, then, then the, up onto the rostrum there and stand behind the podium and, and then put my slides up on this virtual screen. [00:33:49] It was ridiculous. I have a full television production studio here in my, in my lab. Right. And that's, this is where I do the radio show. This is where I do my television appearances. This is where I do pretty much everything. Right. And so what I can do is I can split screen with my face, with the desktop. [00:34:12] You can see my desktop, I can draw on it, circle things, highlight things or whatever I want to do. Right. But no, no, no, no. I was in their virtual reality. And so all I could do is. I have the slides come up. In fact, I had prepared beforehand, pre-taped it? A, the whole presentation, but I couldn't play that video. [00:34:37] No, no, no. I had to show a slide deck, you know, death by PowerPoint. I'm sure you've been there before. It's very, very frustrating in case you can tell for me, well, we've seen this type of thing. I mentioned some of the things like that. I'm in second life. I'm sure you've heard of that before. Sims is another one you've probably heard of before. [00:35:01] These types of semi metaverses have been around a very long time. And, and in fact, all the way on back to the nineties is Habbo hotel. G I don't know if you ever heard of that thing, but it was non-line gaming and social space. I helped to develop one for a client of mine back in the early nineties. [00:35:23] Didn't really go very far. I think it was ahead of its time. It's it's interesting right now, enter. Mark Zuckerberg. Do you remember a few years ago, mark Zuckerberg had a presentation. He was going to make this huge announcement, right? They bought Oculus. What was it? It was like crazy amount of money. And then he came in the back of the hall. [00:35:50] And nobody noticed he walked all the way up to the front and nobody even saw him because they were all wearing these 3d glasses. And of course, today they are huge. They are awkward and they don't look that great, the pictures inside, but the idea is you can move your head around and the figures move as your head moves, almost like you're in the real world. [00:36:13] And that's kind of cool and people thought it was kind of cool and they didn't see Zuckerberg because they all had these things on. And the inside was playing a little presentation about what Facebook was going to do with Oculus. Well, they just killed off the Oculus name anyways here a couple of weeks ago, over at Facebook about the same time that got rid of the Facebook name and went to meta. [00:36:39] The Facebook product is so-called Facebook and it appears what they are going to be doing is taking the concept of a metaverse much, much further than anyone has ever taken it before. They're planning on there's speculation here. Okay. So, you know, don't obviously I don't get invested. I don't give investment advice, investment advice. [00:37:10] Um, but I do talk about technology and, uh, I've been usually five to 10 years. I had so take that as well. They as the grain of salt, but I think what they're planning on doing is Facebook wants to become the foundation for Mehta versus think about things like world of Warcraft, where you've got the. Gain that people are playing. [00:37:39] And it's a virtual reality, basically, right? It might be two D, but some of it's moving into the three-dimensional world. Other games like Minecraft and roadblocks, they have some pretty simple building blocks that people can use network effects and play your creativity to make your little world and the ability. [00:38:04] To exchange and or sell your virtual property. That's where I think Mr. Zuckerberg is getting really interested now because if they can build the platform that everybody else the wants to have a virtual world builds their virtual world on top of. Man, do they have a moneymaker? Now? People like me, we're going to look at this and just poo poo it. [00:38:35] I I'm sure I'm absolutely sure, because it will be another 20 years before you really think it's. You know, some of these scifi shows have talked about it. You know, you can feel someone touching you, et cetera, et cetera. Yeah. That's going to be very crude for a very long time. And now CGI is pretty good. [00:38:57] Yeah. You watch the movies. CGI is great, but that takes weeks worth of rendering time on huge farms, clusters of servers. So it's going to take quite a while. Looking at the normal advancement of technology before this really becomes real. Now there have also been us court cases over who owns what in bad happened with Eve online. [00:39:28] Second life where disagreements over player ownership of the virtual land created by the publisher, which was Linden labs. When. And I've also mentioned in the past how our friends over at the IRS have tried to tax some of the land that you own inside these virtual worlds. So ownership, do you really own it? [00:39:55] Does it really exist? What would non fungible tokens maybe it does. And these non fungible tokens are. Basically just a check, some verification, I'm really oversimplifying of some sort of a digital something rather lately. And initially it was mostly pictures. And so you had a picture of something and you owned that and you could prove it because of the blockchain behind it. [00:40:27] But I think this is where he's really interested because if he can build the base platform. Let the developers come up with the rules of what's it called it a game and come up with what the properties look like and how people can trade them and sell them and what kind of upgrades they can get. Right. [00:40:48] So let's nothing Zuckerberg has to worry about. Uh, Metta or Zuckerberg then worries about, okay. So how do we collect money for these? How do we check with the transactions? Uh, somebody wants to buy those sort of Damocles. How does that transaction work and how do we Facebook Metta? How do we get a slice of the act? [00:41:16] You got to believe that that's where things are going. And if they have the ability to make this base platform and be able to take characters from one part of a developer to another part of the developer, you could have worlds where Gandalf might be fighting bugs bunny. Right? Interesting. Interesting and Warner brothers, all these movie companies would probably be coming out with complete virtual reality. [00:41:49] So when you're watching James Bond, you're not just watching James Bond, you can look around, you can see what's happening. People sneaking up behind. And ultimately you could be James Bond, but that's decades away. I think a good 20 years. All right, everybody. Thanks for sticking around here. Make sure you go online. [00:42:11] Craig peterson.com/subscribe. Get my weekly newsletter. Find out about these free boot camps and other things that I have. So we can keep you up to date and keep you safe. [00:42:25] We already talked about Metta and their name, change the metaverse, but there's something else. Facebook did this last week that surprised a lot of users, something they started in 2010, but has been controversial ever since. [00:42:41] We had a pretty big announcement, frankly, this last week from our friends over at Facebook, not the one where they change their name and the. [00:42:51] Basically trying to create a metaverse platform. That's going to be the one platform that rules the world. Although those are my words by the way. But Facebook has announced plans now to shut down a decade old. Facial recognition system this month. We'll see what they do with this. If they follow through entirely, but they're planning on deleting over 1 billion faces that they have already gone through and analyzed. [00:43:26] You might remember. In 2010, Facebook had a brand new feature. It started announcing, Hey, did you know that so-and-so just posted your picture? Is this you? Is this your friend, is this sewn? So do you remember all of those questions? If you're a Facebook user back in the day? Well, they were automatically identifying people who appeared in digital photos and suggested that users or users tagged them with a click we're going to get to and admitted here. [00:43:57] Uh, and of course that then linked the Facebook account for. The picture that you tagged to the images and let that person know. And of course Facebook's ultimate goal is to get you to stay on long, as long online, as long as possible. Because if you're online, you are going to be looking at ads that are aimed primarily at. [00:44:18] Well, facial recognition has been a problem. We've seen it a worldwide. I just read through a restatement from the electronic frontier foundation, talking about facial recognition and the problems with it, how some people have been arrested based on facial recognition and held for over a day. We'll have cases where the police use to kind of a crummy photograph of them from a surveillance video sometimes also from a police car, in some areas, the police cars are continually taking video and uploading it to the internet, looking for things like license plates, to see if a car. [00:45:00] Parking ticket that hasn't been paid or it hasn't paid us registration all the way through looking at faces, who is this person? And some in law enforcement have kind of thought it would be great to have kind of like Robocop. You remember Robocop, not the ed 2 0 9. There was also in that movie. That's also very scary, but when they look at someone who's on a street at autonomous. [00:45:24] Pops up in their glasses, who it is, any criminal record, if there any sort of a threat to et cetera. And I can understand that from the policemen standpoint. And I interviewed out at the consumer electronic show, a manufacturer of. That technology, it was kind of big and bulky at the time. This was probably about six or eight years ago, but nowadays you're talking about something that's kind of Google glass size, although that's kind of gone by the wayside too. [00:45:54] There are others that are out there that you. Facial recognition. Technology has really advanced in its ability to identify people, but you still get false positives and false negatives. And that's where part of the problem becomes from they have been taking and they been private companies primarily, but also some government agencies they've been taking pictures from. [00:46:21] They can find them. We've talked about Clearview AI before this is a company that literally stole pitchers, that it could get off the internet. They scan through Facebook, Instagram, everywhere. They could find faces and they tied it all back in. They did facial recognition. On all of those photos that they had taken and then sold the data to law enforcement agencies. [00:46:49] There's an app you can get from Clearview AI. That runs on your smartphone and you can take a picture of someone in the street, clear view. AI will run that face through their database and we'll tell you who it is, what their, what their background is, where their LinkedIn page is their Facebook page, wherever it found them online. [00:47:13] Basically what they've been doing. Now Clearview had a problem here this last couple of weeks because the Australian government ordered them to delete all facial recognition, data belonging, to anyone that lives. In Australia. Now that's going to be a bit of a problem for clear view, because it's hard to identify exactly where people live just based on a photograph. [00:47:40] And the United Kingdom is also considering doing this exact same thing. Now, clear views have been sued. They violated the terms of service from Facebook and some of these other sites that I mentioned, but they did it anyway. And clear view was. To destroy all the facial images and facial templates they had retrieved about any Australian. [00:48:08] I think that's probably a pretty good idea. I don't like the idea of this data being out there. Well, if your password is stolen and we're going to be talking about that in our bootcamp, coming up here in a couple of weeks about how to determine if your username or your password is stolen. But, uh, and of course, if you want to get that. [00:48:29] Bootcamp and go to that. There's no charge for it, but you have to know about it. And the only way is to sign up. You have to make sure you're on my email email@example.com. But what happens when your email address is stolen or your password, or both are stolen from a web. Oh, typically they end up on the dark web. [00:48:50] They sell personal identification for very little money. In some cases it's only a few dollars per thousand people's identities. It is absolutely crazy. So the bad guys are looking for that information, but you can change your password. You can change your email address, but if your facial information is stolen, Can't change your face. [00:49:18] If your eye print is stolen, you can't change your eye. I have a friend who's pretty excited because he got to go right through the security at the airport ever so quickly. Cause all they had to do was scan his eyeball. Well, that data is valuable data because it cannot be changed. And it can, in some cases be replicated. [00:49:41] In fact, the department of Homeland security and the transportation safety administration had the database of face print stolen from them in 2019. To about 200,000 people's identities were stolen, the face sprints. It's just absolutely crazy. And this was some, a vendor of us customs and border protection. [00:50:05] And it, it, you can't write down to it. I read the detailed report on it just now. And the report that came out of the federal government said, well, it went to a contractor who. Took the data, all of the face prints off site over to their own site. And it wasn't encrypted when they took it over there. But it does mention that it was taken from an un-encrypted system at customs and border protection. [00:50:34] So wait a minute. Now you're blaming the contractor that you hired because it wasn't encrypted and yet you didn't encrypt it yourself either. I, you know, I guess that kind of goes around, but they want to. They want your biometric information just as much as they want anything else. Think about your phones. [00:50:53] Nowadays, apple has done a very good job with the biometrics and the fingerprints and making sure that that information is only ever stored on the phone. It never goes to apple, never leaves the phone it's in what apple calls, the secure long term. And if you mess with it at all, it destroys itself, which is part of the problem with replacing a cracked screen yourself on an iPhone, because you're going to disturb that secure enclave and the phone will no longer work. [00:51:24] That is not true when it comes to many other devices, including most of your Android phones that are out there. It is. So if the bad guys have. Your face print, they, and they can create 3d models that can and do in fact, go ahead and fool it into letting you in that that's information they want. So why are we allowing these companies to like clear view AI? [00:51:52] And others to buy our driver's license photos to the federal government, to also by the way, by our driver's license photos, by them from other sites and also our passport information. It's getting kind of scary, especially when you look into. China has a social credit system. And the Biden administration has made rumblings about the same here in the U S but in China, what they're doing is they have cameras all over the place and your faces. [00:52:27] And they can identify you. So if you jaywalk, they take so many points off of your social credit. If you don't do something that they want you to do or be somewhere, they want you to be, you lose credits again, and you can gain them as well by doing various things that the government wants you to do. And. [00:52:49] And ultimately, if you don't have enough social credit, you can't even get on a train to get to work. But the real bad part are the users. This is a minority in China and China's authorities are using. Us facial recognition, technology and artificial intelligence technology. Hey, thanks Google for moving your artificial intelligence lab to China in order to control and track the users. [00:53:19] Absolutely amazing in the United States law enforcement is using this type of software to aid policing, and we've already seen problems of overreach and mistaken IRS. So Facebook to you're leading a billion of these frameworks. If you will, of people's faces biometrics. Good for them. Hopefully this will continue a tread elsewhere. [00:53:46] Well, we've talked a little bit today about firewalls, what they do, how your network is set up. If you miss that, make sure you catch up online. My firstname.lastname@example.org, but there's a whole new term out there that is changing security. [00:54:03] It's difficult to set up a secure network. [00:54:07] Let's just say mostly secure because if there's a power plug going into it, there's probably a security issue, but it's difficult to do that. And historically, what we've done is we've segmented the networks. So we have various devices that. Maybe be a little more harmful and on one network, other devices at a different level of security and many businesses that we've worked with, we have five different networks each with its own level of secure. [00:54:38] And in order to get from one part of the network, for instance, let's say you're an accounting and you want to get to the accounting file server. We make sure your machine is allowed access at the network level. And then obviously on top of that, you've got usernames and passwords. Maybe you've got multifactor authentication or something else. [00:54:59] I'll make sense, doesn't it? Well, the new move today is to kind of move away from that somewhat. And instead of having a machine or a network have firewall rules to get to a different network or different machine within an organization. There's something called zero trust. So again, think of it. You've, you've got a network that just has salespeople on it. [00:55:25] You have another network that might have just your accounting people. Another network has your administrative people and other network has your software developers, et cetera. So all of these networks are separate from each other and they're all firewalled from each other. So that only for instance, at county people can get to the accounting server. [00:55:44] Okay, et cetera. Right? The sales guys can enter the sales data and the programmers can get at their programs. And maybe the servers that are running their virtual machines are doing testing on what was zero trust. It is substantially different. What they're doing with zero trust is assuming that you always have to be authentic. [00:56:11] So instead of traditional security, where, where you're coming from helps to determine your level of access, you are assuming that basically no units of trust. So I don't care where you're coming from. If you are on a machine in the accounting department, We want to verify a lot of other information before we grant you access. [00:56:38] So that information probably does include what network you're on. Probably does include the machine you're on, but it's going to all. You as a user. So you're going to have a username. You're going to have an ID. You're going to have a multi-factor authentication. And then we're going to know specifically what your job is and what you need to have specific access. [00:57:04] Because this follows the overall principle of least privilege to get your job done. Now you might've thought in the past that, oh my gosh, these firewalls, they're just so annoying. It's just so difficult to be able to do anything right. Well, zero trust is really going to get your attention. If that's what you've been saying. [00:57:23] But here's an example of the traditional security approach. If you're in the office, you get access to the full network. Cause that's pretty common, right? That's not what we've been doing, but that's pretty common where we have been kind of working in the middle between zero trust and this traditional you're in the office. [00:57:41] So you can potentially get it. Everything that's on the off. And if you're at home while all you have to do is access a specific portal, or as I've explained before, well, you are just connecting to an IP address in a hidden port, which won't remain hidden for. So maybe in a traditional security approach, the bouncer checks your ID. [00:58:08] You can go anywhere inside this club and it's multi floor, right. But in a zero trust approach, getting into the club, having that bouncer look at your ID is only the first check, the bartender or the waiter. They also have to check your ID before you could be served. No matter where you are in the club and that's kind of how they do it right now, though, they'll make a mark on your hand or they'll stamp it. [00:58:35] And now they know, okay, this person cannot get a drink for instance. So think of it that way, where every resource that's available inside the business independently checks whether or not you should have access to. This is the next level of security. It's something that most businesses are starting to move towards. [00:58:57] I'm talking about the bigger guys, the guys that have had to deal with cybersecurity for awhile, not just the people who have a small business, most small businesses have that flat network that. Again about right. The traditional security approach of all you're in the office. So yeah, you can get at anything. [00:59:15] It doesn't matter. And then you, you have the sales guys walking out with your client list and who knows what else is going on? Think of Ferris, Bueller, where he was updating his grades and miss days at high school, from his home computer. And you've got an idea of why you might want to secure. You are network internally because of, again, those internal threats. [00:59:40] So keep an eye out for it. If you're looking to replace your network, obviously this is something that we've had a lot of experience with. Cisco is probably the best one out there for this, but there are a few other vendors that are pretty good. If you want to drop me an email, I'll put together a list of some of the top tier zero. [01:00:02] Providers so that you can look at those. I don't have one right now, but I'd be glad to just email me M email@example.com. We can point you in the right direction, but if you have an it person or department, or whether you outsource it to an MSP, a managed services provider, make sure you have the discussion with them about zero. [01:00:28] Now, when I'm looking at security, I'm concerned about a bunch of things. So let me tell you something that Karen and I have been working on the last, oh man, few weeks. I mentioned the boot camp earlier in the show today. And one of the things that we're going to do for those people that attend the bootcamp is I think incredible. [01:00:49] This has taken Karen so much time to dig up. Once she's done is she's worked with me to figure out what are the things that you need to keep tabs on. Now, again, this is aimed primarily at businesses, but let me tell you, this is going to be great for home users as well. And we've put together this list of what you should be doing. [01:01:15] About cybersecurity every week. And in fact, a couple of things that are daily, but every week, every month, every quarter, every six months and every year, it's a full checklist. So you can take this and sit down with it and, you know, okay. So I have to do these things this week and this isn't. Response to anything in particular, it does meet most requirements, but frankly, it's something that every business should be doing when it comes to the cybersecurity. [01:01:53] It includes things like passwords. Are they being done? Right? Did you do some training with your employees on fishing or a few other topics all the way on down to make sure you got some canned air and blew out the fan? In your workstations, you'd be amazed at how dirty they get. And he is the enemy of computers that makes them just fail much, much faster than, than 82, same thing with server. [01:02:22] So it is everything. It is a lot of pages and it is just check she'd made it nice and big. Right. So even I can read it. But it's little check marks that you can mark on doing while you're going through it. So we're doing some more work on that. She's got the first couple of iterations done. We're going to do a couple more, make sure it is completely what you would need in order to help keep your cyber security in. [01:02:50] But the only way you're going to get it is if you are in the BR the bootcamp absolutely free. So it was this list, or of course you won't find out unless you are on my email list. Craig Peterson.com/subscribe. [01:03:06] One of the questions I get asked pretty frequently has to do with artificial intelligence and robots. Where are we going? What are we going to see first? What is the technology that's first going to get into our businesses and our homes. [01:03:22] Artificial intelligence is something that isn't even very well-defined there's machine learning and there's artificial intelligence. [01:03:33] Some people put machine learning as a subset of artificial intelligence. Other people kind of mess around with it and do it the other way. I tend to think that artificial intelligence is kind of the top of the heap, if you will. And that machine learning is a little bit further down because machines can be programmed to learn. [01:03:54] For instance, look at your robot, your eye robot cleans the floor, cleans the carpet. It moves around. It has sensors and it learned, Hey, I have to turn here. Now. I robot is actually pretty much randomly drew. But there are some other little vacuum robots that, that do learn the makeup of your house. The reason for the randomization is while chairs move people, move things, move. [01:04:22] So trying to count on the house, being exactly the same every time isn't isn't exactly right. Uh, by the way, a lot of those little vacuums that are running around are also sending data about your house, up to the manufacturer in the. So they often will know how big the house is. They know where it's located because you're using the app for their robot. [01:04:47] And that, of course it has access to GPS, et cetera, et cetera. Right. But where are we going? Obviously, the little by robot, the little vacuum does not need much intelligence to do what it's doing, but one of the pursuits that we've had for. Really since the late nineties for 20, 25 years are what are called follower robots. [01:05:13] And that's when I think we're going to start seeing much more frequently, it's going to be kind of the first, um, I called it machine learning. They call it artificial intelligence who you really could argue either one of them, but there's a little device called a Piaggio fast forward. And it is really kind of cool. [01:05:34] Think of it almost like R2D2 or BB eight from star wars following you around. It's frankly, a little hard to do. And I want to point out right now, a robot that came out, I think it was last year from Amazon is called the Astro robot. And you might remember Astro from the Jetsons and. This little robot was available in limited quantities. [01:06:01] I'm looking at a picture of it right now. It, frankly, Astro is quite cute. It's got two front wheels, one little toggle wheel in the back. It's got cameras. It has a display that kind of makes it look like kids are face, has got two eyeballs on them. And the main idea behind this robot is that it will. [01:06:23] Provide some protection for your home. So it has a telescoping camera and sensor that goes up out of its head up fairly high, probably about three or four feet up looking at this picture. And it walks around your one rolls around your home, scanning for things that are out of the normal listening for things like windows breaking there, there's all kinds of security. [01:06:50] That's rolled into some of these. But it is a robot and it is kind of cool, but it's not great. It's not absolutely fantastic. Amazon's dubbing the technology it's using for Astro intelligent motion. So it's using location and mapping data to make sure that Astro. Gets around without crashing into things. [01:07:18] Unlike that little vacuum cleaner that you have, because if someone loves something on the floor that wasn't there before, they don't want to run over it, they don't want to cause harm. They don't want to run into your cats and dogs. And oh my maybe lions and bears too. But, uh, they're also using this computer vision technology called visual ID and that is used. [01:07:41] With facial recognition, drum roll, please, to recognize specific members of the family. So it's kind of like the dog right in the house. It's sitting there barking until it recognizes who you are, but Astro, in this case, Recognizes you and then provide you with messages and reminders can even bring you the remote or something else and you just drop it in the bin and off it goes. [01:08:08] But what I am looking at now with this Piaggio fast forward, you might want to look it up online, cause it's really. Cool is it does the following, like we've talked about here following you around and doing things, but it is really designed to change how people and goods are moving around. So there's a couple of cool technologies along this line as well. [01:08:35] That it's not, aren't just these little small things. You might've seen. Robots delivery robots. The Domino's for instance, has been working on there's another real cool one out there called a bird. And this is an autonomous driving power. Basically. It's a kind of a four wheel ATV and it's designed to move between the rows of fruit orchards in California or other places. [01:09:01] So what you do to train this borough robot is you press a follow button on it. You start walking around the field or wherever you want it to go. It's using, uh, some basic technology to follow you, cameras and computer vision, and it's recording it with GPS and it memorizes the route at that point. Now it can ferry all of your goods. [01:09:29] Around that path and communicate the path by the way to other burrow robots. So if you're out doing harvesting or whether it's apples out in the east coast, or maybe as I said out in California, you've got it. Helping you with some of the fruit orchards. It's amazing. So this is going to be something that is going to save a lot of time and money, these things, by the way, way up to 500 pounds and it can carry as much as a half a ton. [01:09:58] You might've seen some of the devices also from a company down in Boston, and I have thought that they were kind of creepy when, when you look at it, but the company's called Boston dynamics and. They were just bought, I think it was Hondai the bought them trying to remember. And, uh, anyway, These are kind of, they have robots that kind of look like a dog and they have other robots that kind of look like a human and they can do a lot of different chores. [01:10:33] The military has used them as have others to haul stuff. This one, this is like the little dog, it has four legs. So unlike a lot of these other robots that are on wheels, this thing can go over very, very. Terrain it can self write, et cetera. And they're also using them for things like loading trucks and moving things around, um, kind of think of Ripley again, another science fiction tie, uh, where she's loading the cargo in the bay of that spaceship. [01:11:05] And she is inside a machine. That's actually doing all of that heavy lifting now. Today, the technology, we have a can do all of that for us. So it is cool. Uh, I get kind of concerned when I see some of these things. Military robots are my favorite, especially when we're talking about artificial intelligence, but expect the first thing for these to be doing is to be almost like a companion, helping us carry things around, go fetch things for us and in the business space. [01:11:40] Go ahead and load up those trucks and haul that heavy stuff. So people aren't hurting their backs. Pretty darn cool. Hey, I want to remind you if you would like to get some of the free training or you want some help with something the best place to start is Craig peterson.com. And if you want professional help, well, not the shrink type, but with cyber security. [01:12:06] email me M E at Craig peterson.com. [01:12:10] Just in time for the holidays, we have another scam out there and this one is really rather clever and is fooling a lot of people and is costing them, frankly, a whole lot of money. [01:12:26] This is a very big cyber problem because it has been very effective. And although there have been efforts in place to try and stop it, they've still been able to kind of get ahead of it. There's a great article on vice that's in this week's newsletter. In my show notes up on the website and it is talking about a call that came in to one of the writers, Lorenzo, B cherry, um, probably completely messy and that name up, but the call came in from. [01:13:03] Supposedly right. Paid pals, uh, fraud prevention system. Someone apparently had tried to use his PayPal account to spend $58 and 82 cents. According to the automated voice on the line, PayPal needed to verify my identity to block the transfer. And here's a quote from the call, uh, in order to secure your account, please enter the code we have sent to your mobile device. [01:13:32] Now the voice said PayPal, sometimes texts, users, a code in order to protect their account. You know, I've said many times don't use SMS, right? Text messages for multi-factor authentication. There are much better ways to do it. Uh, after entering a string of six digits, the voice said, thank you. Your account has been secured and this request has been blocked. [01:13:57] Quote, again, don't worry. If any payment has been charged your account, we will refund it within 24 to 48 hours. Your reference ID is 1 5 4 9 9 2 6. You may now hang up, but this call was actually. Hacker they're using a type of bot is what they're called. These are these automated robotic response systems that just dramatically streamlined the process for the hackers to gain access into your account. [01:14:31] Particularly when you have multi-factor authentication codes where you're using. An SMS messages, but it also works for other types of one-time passwords. For instance, I suggest to everybody and we use these with our clients that they should use something called one password.com. That's really you'll find them online. [01:14:54] And one password.com allows you to use and create one time password, same thing with Google authenticator, same thing with Microsoft authenticator, they all have one-time password. So if a bad guy has found your email address and has found your password online in one of these hacks, how can they possibly get into your PayPal account or Amazon or Coinbase or apple pay or. [01:15:26] Because you've got a one time password set up or SMS, right? Multifactor authentication of some sort. Well they're full and people and absolute victims. Here's what's happening. Th this bot by the way, is great for bad guys that don't have social engineering skills, social engineering skills, or when someone calls up and says, hi, I'm from it. [01:15:51] And there's a problem. And we're going to be doing an upgrade on your Microsoft word account this weekend because of a bug or a security vulnerability. So what, what I need from you is I need to know what username you're normally using so that I can upgrade the right. So we don't, it doesn't cost us a whole bunch by upgrading accounts that aren't being used. [01:16:15] So once the account name that you use on the computer and what's the password, so we can get in and test it afterwards, that's a social engineering type attack. That's where someone calls on the phone, those tend to be pretty effective. But how about if you don't speak English very well? At all frankly, or if you're not good at tricking people by talking to them, well, this one is really great. [01:16:44] Cause these bots only cost a few hundred bucks and anybody can get started using these bots to get around multi-factor authentication. See, here's how it works. In order to break into someone's account, they need your username, email address and password. Right? Well, I already said. Much many of those have been stolen. [01:17:07] And in our boot camp coming up in a few weeks, we're going to go through how you can find out if your username has been stolen and has been posted on the dark web and same thing for your password. Right? So that's going to be part of the. Coming up that I'll announce in the newsletter. Once we finished getting everything already for you guys, they also go ahead and buy what are called bank logs, which are login details from spammers who have already tricked you into giving away some of this information. [01:17:41] But what if you have multi-factor authentication enabled something I'm always talking about, always telling you to do. Well, these bots work with platforms like Twilio, for instance, uh, and they are using other things as well, like slack, et cetera. And all the bad guy has to do with that point is going. [01:18:07] And, uh, say, they're trying to break into your account right now. So they're going to, let's get really, really specific TD bank. That's where my daughter works. So let's say you have a TD bank account. And the hacker has a good idea that you have a TD bank account knows it because they entered in your username and password and TD bank was letting them in. [01:18:32] But TD bank sent you a text message with that six character code, right? It's usually digits. It's usually a number. So what happens then? So the bad guys says, okay, so it's asking me for this six digit SMS
0:00 Intro 3:20 News 30:36 Financial News 44:50 Terraforming 58:38 Vaccines For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
Over the past 15 -20 years, the way people learn English - and other languages - has been transformed. The internet has become central and given opportunities to people all around the world to learn languages. But is something new coming that might be the future of learning. Find out what that is in today's lesson.Get my book for free here:https://www.tofluency.com/5-step-plan/Listen to the podcast on how to learn English through social media here:https://www.youtube.com/watch?v=aQXY6ABsyj8Listen to conversations in English here:https://www.youtube.com/playlist?list=PLZOJurmtexYo8s2UKr--aqOi9UssrOh96Articles on the Metaverse:https://www.bbc.com/news/technology-58749529https://www.latimes.com/business/story/2021-10-28/explainer-what-is-the-metaverse-and-how-will-it-workhttps://www.bbc.com/news/technology-59154520Films that predicted this:https://www.zdnet.com/article/seven-tech-advances-that-will-make-minority-report-a-reality/https://www.cgmagonline.com/articles/features/top-ten-movies-predicted-vr/Join this channel to get access to perks:https://www.youtube.com/channel/UC32mYgIHS-e3C3Eyd2tRw6g/join
Brand new episode!Enjoy and subscribe for more!!!Donate us on PayPal: https://www.paypal.me/iamquantom Follow our social media:instagram.com/techartofficialinstagram.com/wanderlustrecfacebook.com/wanderlustrecsoundcloud.com/wanderlustrecFollow our Spotify Playlist:https://open.spotify.com/playlist/4i4M6A9QvdIAgOStjjWQPrTAG #wandeepsession on IGFollow our group on Telegram for more music:https://t.me/wanderlustrecordsConnect with Rafi Jerez:https://www.instagram.com/rafijerez/ https://soundcloud.com/rafijerezTracklist: Amalthea (Original Mix) - Voices Of Valley Bóreas (Original Mix) - Binaryh Eightball (Original Mix) - Matador Endurance (Original Mix) - Einmusik, Stereo Express Phobia (Cherry Remix) - Iga Dep Confident Journey (Original Mix) - Martin Eyerer, Craig Walker Amber - Fat Sushi Sizzle (Original Mix) - MPathy Reboq - Aftermath (Original Mix) - Reboq Mirari (Original Mix) -Reboq Occasum (Original Mix) -Outcome If you want to have a guestmix in our session, just send us link with 1h of your mix (32O MP3).Email: firstname.lastname@example.org© Wanderlust Records Ltd. 2017-2021 All Rights Reserved
We continue our discussion of Naomi Alderman's haunting sci-fi novel, "The Power." The story of a dystopian future where women rule, in part two we discuss the dark slide into brutality that the women take once their power spreads.
Jase, Al, and Zach find Mark Zuckerberg and his "metaverse" creepy and disturbing, and Al suspects we'll be even more disturbed when we find out who "the android" running Facebook really is. Jase is so rude he interrupts himself — repeatedly. Phil offers up a little philosophy inspired by Chicago lyrics. Zach points out that today's disconnected, superficial culture presents a prime opportunity for the Gospel to flourish. Al dubs Jase the "world's greatest garbage man." Phil explains why many people are called to do things for God but few are chosen. And Zach argues that technology isn't the real problem — it's the isolation of living your life virtually and worshipping created things instead of the Creator. Learn more about your ad choices. Visit megaphone.fm/adchoices
For this week's Random Routine, we chat to Rob Hart, who came on back in 2019 to talk about 'The Warehouse'.'The Warehouse' is in the mold of 'Farenheit 451' and '1984', and focuses on one big business that suffocates all others, and the stories of 3 people who work there. Because of this, his characterisation needs to be truly believable and authentic, we talk about this struggle and how he became his characters in writing. It's also his first proper foray into standalone novels, having made his way with the 'Ash McKenna' series.The first full episode dropped in August 2019, and you can listen in by scrolling back in your podcast feed.If you can, please do support the show over at patreon.com/writersroutine.If you want to buy the book, please use this link! - https://amzn.to/32yhXKL@writerspodwritersroutine.com See acast.com/privacy for privacy and opt-out information.
In this segment of By Any Means Necessary, Sean and Jacquie are joined by technologist Chris Garaffa, the editor of TechforthePeople.org to discuss Facebook's rebranding as Meta in the aftermath of multiple controversies and scandals, the stark reality behind the metaverse, and how the metaverse reflects the 1992 novel “snow Crash” by providing a distraction from an increasingly dystopian reality.
With Bob taking a much-deserved vacation day, Dave the intern fills in and spills the beans about his days as a burnout wanna-be-rockstar. Then, the makeshift crew decides to purge a bunch of unused show material. In doing so, they learn about some interesting haunted places and an evil billionaire who's trying to run a creepy experiment on a bunch of college students. Support the show: https://www.klbjfm.com/dudley-and-bob-with-matt-show/ See omnystudio.com/listener for privacy information.
The Elite's idea of a Utopia is humanity's version of a dystopia. Dystopian societies are typically characterized by oppression, fear, and hopelessness. Since the fall of humanity, the world has been quite dystopic. However, there are a few more agendas that have to be met before the New World Order is in full effect.
Gavin Newsom sailed through the recall attempt. This was entirely predictable. Even though he's spent years proving repeatedly that he's a corrupt and craven narcissist, when it comes down to it, the masses will eagerly turn out to beg for his boot upon their necks.If you're expecting your liberty to be preserved or protected through the processes of the state, you will be disappointed.You will not save this nation. You will not save this economy. But you can save yourself.******If you're ready to take control of your life, income, and future, go to http://controlthesource.com and join the Nomad Network to get started. Brand new app in app stores now!Give your business an unfair advantage in less than 3 minutes a day. Get the daily newsletter that delivers the most actionable and tactical growth strategies available today, straight from the mind of a marketing genius: http://dailyalchemy.me.Learn the blueprint for generating predictable and sustainable income from anywhere on earth: http://www.nomadicwealthoffer.com.Jason on Twitter: https://twitter.com/jason_stapletonJason on IG: https://www.instagram.com/thejasonsta...Jason's website: https://jasonstapleton.comMatt on Twitter: https://twitter.com/realkingpilledDon't forget to like and subscribe, and please share the show!