POPULARITY
Categories
陳之漢 chén zhī hàn – Chen Zhi-han, a well-known Taiwanese internet personality and fitness entrepreneur館長 guǎn zhǎng – gym director (nickname of Chen Zhi-han, referring to his role as gym owner)爭議 zhēng yì – controversy; dispute健身教練 jiàn shēn jiào liàn – fitness coach海軍陸戰隊 hǎi jūn lù zhàn duì – Marine Corps (of the Navy)志願役 zhì yuàn yì – voluntary military service (non-drafted)士官 shì guān – non-commissioned officer (NCO)退伍 tuì wǔ – to retire or be discharged from military service連鎖 lián suǒ – chain (store, business)成吉思汗健身館 chéng jí sī hàn jiàn shēn guǎn – Genghis Khan Fitness Center (Chen's gym brand)經營 jīng yíng – to operate; to run (a business)電商 diàn shāng – e-commerce直播 zhí bō – live streaming直白 zhí bái – straightforward; blunt顛沛流離 diān pèi liú lí – displaced and wandering; a life full of hardships欺負 qī fù – to bully拳頭 quán tóu – fist堅強 jiān qiáng – strong; resilient剛硬 gāng yìng – tough; unyielding竹聯幫 zhú lián bāng – Bamboo Union (a Taiwanese gang)黑道 hēi dào – gangster; organized crime亂七八糟 luàn qī bā zāo – a mess; chaotic; disorganized推銷 tuī xiāo – hard selling; aggressive sales promotion企業家精神 qì yè jiā jīng shén – entrepreneurial spirit共產黨 gòng chǎn dǎng – Communist Party (usually referring to the Chinese Communist Party, CCP)反感 fǎn gǎn – dislike; aversion中華民國派 zhōng huá mín guó pài – pro-Republic of China faction極統 jí tǒng – extreme unification (with China)極獨 jí dú – extreme independence (for Taiwan)統一 tǒng yī – unification獨立 dú lì – independence中立 zhōng lì – neutral和平 hé píng – peace骨氣 gǔ qì – integrity; moral backbone被...壓著打 bèi ... yā zhe dǎ – to be oppressed by...; to be suppressed by... (used metaphorically)杭州 háng zhōu – Hangzhou, a city in eastern China西湖 xī hú – West Lake, a famous scenic spot in Hangzhou翻牆 fān qiáng – to bypass internet censorship (using VPNs to "climb over the firewall")If you're ready to take your Chinese to the next level, not just memorizing words but actually having meaningful conversations with Taiwanese people about real topics like politics, culture, war, news, economics, and more. I invite you to join a one-on-one trial lesson with me. I'll help you build a clear, personalized plan so you can speak more naturally and truly connect with others in Chinese. Book a one-on-one trial lesson with me !
In this episode of Manufacturing Hub, Vlad and Dave take a deep dive into one of the most critical yet often overlooked aspects of modern manufacturing: network and systems architecture. Too often manufacturers focus on SCADA, MES, and control layers without recognizing that the architecture beneath them is the foundation that determines whether a facility can scale, connect new equipment, and maintain reliability. Architecture touches everything from plant floor PLCs and HMIs to edge devices, managed switches, firewalls, historians, and enterprise-level systems.We begin the conversation by unpacking what “architecture” actually means in manufacturing environments. Is it the hardware, switches, and cables? Is it the way new machines are integrated into existing plants? Or is it the broader strategy of ensuring that data, safety, and scalability are protected? The answer, as both Vlad and Dave explain, is that it is all of these at once.Throughout the discussion, we explore real-world stories where poor architectural decisions led to unplanned downtime, cybersecurity risks, or expensive rework. Vlad shares an example of a palletizer brought online with unmanaged switches and insecure remote access hardware that nearly crippled production until it was properly segmented. Dave recalls his own field experiences, including unusual setups where integrators resorted to improvised remote troubleshooting, highlighting just how creative but fragile some solutions can be.The episode also looks at the evolution of remote access. From the early days of Ewon boxes to modern expectations of secure VPNs, jump boxes, and approved engineering workstations, we discuss what role remote connectivity should play in today's manufacturing environment. While these solutions can reduce travel time and speed up support, they can just as easily introduce vulnerabilities and trust issues if not carefully managed.From there we move into the technical tradeoffs of device level ring versus star topologies. Vlad explains why he often prefers device level ring to save costs and simplify troubleshooting, while Dave weighs in on the importance of pre-molded cables, managed switches, and long-term maintainability. We also analyze example architectures from Rockwell white papers, pointing out where diagrams align with field best practices and where they differ from what engineers often see in real facilities.Finally, we broaden the perspective by comparing greenfield and brownfield deployments. Greenfield projects allow prime contractors and consultants to design standards up front, but most facilities live in brownfield reality where years of technical debt, unmanaged switches, and ad hoc networks make improvements harder. We also touch on how architecture differs by industry, whether in food and beverage, pharmaceuticals, oil and gas, or distributed environments such as trains or pipelines.The conversation closes with predictions, career advice, and resource recommendations. Vlad stresses that CCNA is still one of the best starting points for engineers who want to understand industrial networking fundamentals, and Dave emphasizes the importance of asking the right questions and learning from experienced peers. Both agree that demand for data, combined with the rise of AI, will continue to stress legacy networks until companies recognize the need for robust, standards-driven architectures.If you work in automation, engineering, IT, or plant management, this episode will give you perspective on why network architecture is not just a technical afterthought but a strategic enabler of digital transformation.Timestamps 00:00 Introduction and community updates 02:30 Defining architecture in manufacturing 05:00 Why networks are the backbone of manufacturing systems 08:00 A real-world palletizer story and the risks of unmanaged switches 14:00 The rise and pitfalls of remote access devices 18:30 Field story of unconventional remote troubleshooting setups 23:00 Who is responsible for network design: end users, integrators, or OEMs 28:00 Analyzing Rockwell's reference architecture diagrams 36:00 Device level ring versus star topologies in practice 49:00 Brownfield versus greenfield considerations 56:00 Industry-specific architectures from food and beverage to oil and gas 01:04:00 The role of standards and corporate versus local decision making 01:08:30 Predictions, career advice, and recommended resourcesReferences Mentioned in this Episode Ignition Community Conference: https://icc.inductiveautomation.com/ Siemens SPS Atlanta Event: https://new.siemens.com/us/en/company/fairs-events/sps.html Rockwell Automation Architectures and Design White Papers: https://literature.rockwellautomation.com CISSP Official Study Guide: https://www.isc2.org/Certifications/CISSP Winning by Tim Grover: https://www.amazon.com/Winning-Unforgiving-Race-Greatness/dp/1982168862 Cisco CCNA Certification: https://www.cisco.com/c/en/us/training-events/training-certifications/exams/current-list/ccna.htmlAbout the HostsVlad Romanov is an electrical engineer and consultant with over a decade of experience in manufacturing and industrial automation. His background spans global companies such as Procter & Gamble, Kraft Heinz, and Post Holdings, where he has led modernization projects, SCADA and MES deployments, and digital transformation initiatives. He is the founder of Joltek, a consulting firm helping manufacturers align people, process, and technology to improve operations, and he also leads SolisPLC, an education platform for automation professionals. Connect with Vlad on LinkedIn: https://www.linkedin.com/in/vladromanovDave Griffith is a manufacturing consultant and co-host of Manufacturing Hub. With extensive experience in controls, systems integration, and business development, Dave has helped manufacturers across industries adopt SCADA, MES, and digital transformation solutions. He frequently shares insights on IT-OT convergence, operational strategy, and leadership in the automation space. Connect with Dave on LinkedIn: https://www.linkedin.com/in/davegriffithJoltek is a consulting and integration firm that helps manufacturers modernize with clarity, strategy, and execution. Built on decades of hands-on experience in engineering, automation, and plant leadership, Joltek bridges the gap between technical complexity and business value. The team is known for uncovering hidden risks in outdated systems, designing scalable IT and OT architectures, and guiding digital transformation initiatives that actually deliver measurable results. Whether it is upgrading control systems, deploying SCADA and MES platforms, or advising on strategic investments, Joltek consistently brings deep expertise and practical solutions that make manufacturing operations more resilient, efficient, and future ready.Listen and Subscribe Catch every episode of Manufacturing Hub on YouTube and your favorite podcast platforms. Subscribe to stay up to date with weekly conversations on automation, digital transformation, and the future of manufacturing.
Episode 219: iPhone Event, Chrome's $34B Bid, Fake Phones, and Foldable FuturesJay and Karl unpack another wild week in tech, from Apple's September showcase to Perplexity's audacious attempt to buy Google Chrome, Trump Mobile's ever-evolving fake phones, and rumours of Apple's first foldable iPhone.Full show notes & links:techrant.online/weekly-tech-rant-episode-219/Also available on:Apple Podcasts |YouTubeIn This EpisodeNews Apple's September iPhone Event: the year's marquee showcase with new devices and surprises. Perplexity's $34.5 billion bid for Google Chrome: a bold play to shake up the browser market. Trump Mobile's fake iPhone morphs into a fake Galaxy S25 Ultra: when knock-offs get political. Trump says the US will take a 10% stake in Intel: framed as the CEO “wanting to keep his job”. UK commissioner suggests banning children from VPNs: a proposal unlikely to end well.Rumours Apple home security ecosystem: devices to rival Ring and Nest reportedly in the works. Foldable iPhone next year: four cameras, Touch ID, and Apple's own cellular modem.Say hello —@WeeklyTechRant |@weeklytechrant.bs
It's feeling like we're living in a very strange moment in time where liberal norms of openness have been shattered by the same class of tech industry titans who expressed these values just a decade ago. In this episode I spoke to Nick Houde and Severin Matusek from co-matter, a research and strategy studio based in Berlin, who recently published an incredible memo that is chock full of incredible analysis and insight into our current moment."New World Order: The Return of Hard Power and Soft Beliefs is a 35-page research memo about what happens when power, infrastructure and ideology collide.A manual for anyone trying to make sense of the present, New World Order contains ideas, context and language to participate in shaping the world that emerges in front of our eyes."The memo is chock full of useful and powerful concepts that help explain this moment. You can order a copy of the memo on Metalabel here. (I've already got my copy!) Lots of great quotes like "Yesterday's moral stance is tomorrow's liability" and "Whoever controls the infrastructure controls reality itself."This episode is sponsored by NYM, the world's most private VPN. Unlike traditional VPNs, Nym uses a decentralized mixnet to scramble your internet data — hiding who you're talking to, when, and how often. You can switch between full mixnet mode for maximum anonymity, or a faster VPN mode for everyday use.Use the code blockchainsocialist when signing up and get an extra month!If you liked the podcast be sure to give it a review on your preferred podcast platform. If you find content like this important consider donating to my Patreon starting at just $3 per month. It takes quite a lot of my time and resources so any amount helps. Follow me on Twitter (@TBSocialist) or Mastodon (@theblockchainsocialist@social.coop) and join the r/CryptoLeftists subreddit.Send me your questions or comments about the show and I'll read them out sometime. Support the showICYMI I've written a book about, no surprise, blockchains through a left political framework! The title is Blockchain Radicals: How Capitalism Ruined Crypto and How to Fix It and is being published through Repeater Books, the publishing house started by Mark Fisher who's work influenced me a lot in my thinking. The book is officially published and you use this linktree to find where you can purchase the book based on your region / country.
Tựa Đề: Sự Trông Cậy Giữa Thử Thách; Kinh Thánh: 1 Phi-e-rơ 1:1-7; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
La edad mínima para acceder a ciertos contenidos ya no es solo una formalidad: empieza a tener consecuencias reales. Lo he visto en la noticia que compartía cómo Spotify ha empezado a implementar un sistema de verificación de edad, afectando también a algunos podcast. Y claro, como metapodcaster, no he podido evitar reflexionar sobre lo que esto implica para nuestro medio y para la forma en que etiquetamos y compartimos nuestro contenido.En este episodio analizo una medida que ya se está aplicando en Reino Unido y que probablemente no tarde en extenderse a otros países: la obligación de verificar la edad de los usuarios para acceder a contenidos catalogados como explícitos. Hasta ahora esto era más común en plataformas de vídeo o redes sociales, pero Spotify, que también aloja podcasts, ha decidido sumarse utilizando herramientas como Yoti, que pueden pedir desde un escaneo facial hasta el DNI. Lo que más me sorprendió fue saber que si el usuario no supera esa verificación, su cuenta puede ser suspendida o incluso eliminada. Así, sin más. Más allá de la polémica en torno a la privacidad y la efectividad del sistema (algunos ya están usando VPNs para esquivarlo), lo que realmente me interesa es cómo esto puede afectar a nuestro contenido como creadores.¿Qué pasa si no marcamos nuestro podcast como explícito y alguien considera que sí lo es?¿Y si lo marcamos como tal y alguna plataforma decide no distribuirlo por esa etiqueta? Estamos ante un punto de inflexión. Etiquetar correctamente ya no es solo una cuestión de cortesía o de buenas prácticas, sino una necesidad real si queremos que nuestro contenido siga estando disponible. El riesgo no es menor: podrían eliminarnos episodios, restringir su difusión o incluso suspender cuentas. Y si esto lo aplicamos a contenidos que no necesariamente son ofensivos, pero sí tratan temas delicados, entramos en un terreno aún más complejo. Sin embargo, también veo el lado positivo. Este tipo de medidas, aunque incómodas, reflejan que el podcast está siendo tomado en serio. Que empieza a estar sujeto a normativas como el cine, la música o los videojuegos. Y eso, aunque nos complique un poco la vida, es una buena señal. Significa que el medio madura, que es relevante, y que se le exige responsabilidad. Algo que, en mi opinión, no deberíamos esquivar. Para mí, esto no va de censura. Va de asumir que, si queremos que el podcasting crezca y tenga presencia en plataformas generalistas, también debemos adaptarnos a ciertas normas. Etiquetar correctamente, cuidar las portadas, evitar contenidos sensibles mal ubicados. Y ojo, no solo por los oyentes, también por nuestra imagen como creadores. Creo que esta medida nos obliga a pensar un poco más allá del “grabo, publico y ya está”. Nos obliga a ser conscientes de a quién nos dirigimos, cómo lo hacemos y qué implicaciones tiene nuestro contenido. Y si eso nos ayuda a profesionalizar aún más lo que hacemos, bienvenido sea.Lee la noticia sobre estas nuevas medidas en Spotify a través del siguiente enlace:Spotify introduces face-scanning age checks for UK users, as some furious fans threaten to return to piracyhttps://www.techradar.com/audio/spotify/spotify-introduces-face-scanning-age-checks-for-uk-uses-as-some-furious-fans-threaten-to-return-to-piracy_____________ ¡Gracias por pasarte 'Al otro lado del micrófono' un día más para seguir aprendiendo sobre podcasting! Si quieres descubrir cómo puedes unirte a la comunidad o a los diferentes canales donde está presente este podcast, te invito a visitar https://alotroladodelmicrofono.com/unete Además, puedes apoyar el proyecto mediante un pequeño impulso mensual, desde un granito de café mensual hasta un brunch digital. Descubre las diferentes opciones entrando en: https://alotroladodelmicrofono.com/cafe. También puedes apoyar el proyecto a través de tus compras en Amazon mediante mi enlace de afiliados https://alotroladodelmicrofono.com/amazon La voz que puedes escuchar en la intro del podcast es de Juan Navarro Torelló (PoniendoVoces) y el diseño visual es de Antonio Poveda. La dirección, grabación y locución corre a cargo de Jorge Marín. La sintonía que puedes escuchar en cada capítulo ha sido creada por Jason Show y se titula: 2 Above Zero. 'Al otro lado del micrófono' es una creación de EOVE Productora.
EXPOSING NEW Pappa Rodger Clues About Kohberger With Ret FBI Jennifer Coffindaffer The Idaho murders case has a digital ghost haunting it — an online persona known as Pappa Rodger. From the moment the crime shocked the nation, this mysterious account was posting eerily accurate predictions. The sheath, the weapon, even the patterns of behavior — it was all there before the public knew. And the question has never gone away: was Pappa Rodger really Bryan Kohberger? Law enforcement has insisted the answer is no. They claim after a “deep dive,” the account was ruled out. But retired FBI Special Agent Jennifer Coffindaffer isn't quick to close that book. In this conversation with Tony Brueski, she digs into the contradictions: the combative tone, the obsessive need to prove superiority, the survey-like questions that echoed Kohberger's criminology work. VPNs and masked IPs make it nearly impossible to prove definitively. So should we really take “not him” at face value? The overlap is unnerving. Too precise to be coincidence, too familiar to ignore. If Pappa Rodger wasn't Kohberger, then who was it? Someone with an uncanny insight into the murders? A lucky guesser? Or another figure entirely with access to information they shouldn't have had? This isn't just about one case. It's about the way anonymity online can blur into real-world horror. Pappa Rodger may be gone, but the mystery lingers. And until the evidence is made public, we're left asking: how do you ever really prove a digital ghost isn't who you think it is? Hashtags: #Pappa Rodger #BryanKohberger #IdahoMurders #HiddenKillers #JenniferCoffindaffer #Idaho4 #TrueCrimePodcast #CrimeAnalysis #KnifeSheath #Pappa RodgerExposed #TrueCrimeCommunity #FBI Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
EXPOSING NEW Pappa Rodger Clues About Kohberger With Ret FBI Jennifer Coffindaffer The Idaho murders case has a digital ghost haunting it — an online persona known as Pappa Rodger. From the moment the crime shocked the nation, this mysterious account was posting eerily accurate predictions. The sheath, the weapon, even the patterns of behavior — it was all there before the public knew. And the question has never gone away: was Pappa Rodger really Bryan Kohberger? Law enforcement has insisted the answer is no. They claim after a “deep dive,” the account was ruled out. But retired FBI Special Agent Jennifer Coffindaffer isn't quick to close that book. In this conversation with Tony Brueski, she digs into the contradictions: the combative tone, the obsessive need to prove superiority, the survey-like questions that echoed Kohberger's criminology work. VPNs and masked IPs make it nearly impossible to prove definitively. So should we really take “not him” at face value? The overlap is unnerving. Too precise to be coincidence, too familiar to ignore. If Pappa Rodger wasn't Kohberger, then who was it? Someone with an uncanny insight into the murders? A lucky guesser? Or another figure entirely with access to information they shouldn't have had? This isn't just about one case. It's about the way anonymity online can blur into real-world horror. Pappa Rodger may be gone, but the mystery lingers. And until the evidence is made public, we're left asking: how do you ever really prove a digital ghost isn't who you think it is? Hashtags: #Pappa Rodger #BryanKohberger #IdahoMurders #HiddenKillers #JenniferCoffindaffer #Idaho4 #TrueCrimePodcast #CrimeAnalysis #KnifeSheath #Pappa RodgerExposed #TrueCrimeCommunity #FBI Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Mike talks with David Huerta about age verification laws, VPNs, and Bluesky being blocked in Mississippi; The team asked chat WHAT (?!) Is Going On Here; ALSO: Never Post Plays–Become a Never Post member at https://www.neverpo.st/ for access to extended and bonus segments, and our side shows like “Slow Post”, “Posts from the Field” and “Never Watch”– Call us at 651 615 5007 to leave a voicemail Drop us a voice memo via airtable Or email us at theneverpost at gmail dot com –Intro Links TShirt Preorder!!!!!! - https://neverpost.bigcartel.com You've got mail no more: AOL to shutter dial-up internet service An Open Letter to Kickstarter Creators & Allies: Why We, Kickstarter United, Are Fighting for a Four-Day 32-Hour Workweek YouTube secretly used AI to edit people's videos. The results could bend reality MIT report: 95% of generative AI pilots at companies are failing twitch.tv/theneverpost –Never Post Plays Date Everything Pancito Merge NBA Jam –Agewalled GardensAn In-Depth Guide to Choosing a VPN–WIGOH LIVE: Memberdrive Streamweek Ed. Kurt Cobain Will Have His Revenge on the Straights Most iconic thing in pop culture (warning: X link) –Never Post's producers are Audrey Evans, Georgia Hampton and The Mysterious Dr. Firstname Lastname. Our contributing producer for this episode is Toby Martin. Our senior producer is Hans Buetow. Our executive producer is Jason Oberholtzer. The show's host is Mike Rugnetta.Reader unmov'd and Reader unshaken, Reader unseduc'dand unterrified, through the long-loud and sweet-stillI creep toward you. Toward you, I thistle and I climb.I crawl, Reader, servile and cervine, through this blankseason, counting – I sleep and I sleep. I sleep,Reader, toward you, loud as a cloud and deaf, Reader, deafas a leaf…Except of Sweet Reader, Flanneled and Tulledby Olena Kalytiak DavisNever Post is a production of Charts & Leisure and is distributed by Radiotopia
EXPOSING NEW Pappa Rodger Clues About Kohberger With Ret FBI Jennifer Coffindaffer The Idaho murders case has a digital ghost haunting it — an online persona known as Pappa Rodger. From the moment the crime shocked the nation, this mysterious account was posting eerily accurate predictions. The sheath, the weapon, even the patterns of behavior — it was all there before the public knew. And the question has never gone away: was Pappa Rodger really Bryan Kohberger? Law enforcement has insisted the answer is no. They claim after a “deep dive,” the account was ruled out. But retired FBI Special Agent Jennifer Coffindaffer isn't quick to close that book. In this conversation with Tony Brueski, she digs into the contradictions: the combative tone, the obsessive need to prove superiority, the survey-like questions that echoed Kohberger's criminology work. VPNs and masked IPs make it nearly impossible to prove definitively. So should we really take “not him” at face value? The overlap is unnerving. Too precise to be coincidence, too familiar to ignore. If Pappa Rodger wasn't Kohberger, then who was it? Someone with an uncanny insight into the murders? A lucky guesser? Or another figure entirely with access to information they shouldn't have had? This isn't just about one case. It's about the way anonymity online can blur into real-world horror. Pappa Rodger may be gone, but the mystery lingers. And until the evidence is made public, we're left asking: how do you ever really prove a digital ghost isn't who you think it is? Hashtags: #Pappa Rodger #BryanKohberger #IdahoMurders #HiddenKillers #JenniferCoffindaffer #Idaho4 #TrueCrimePodcast #CrimeAnalysis #KnifeSheath #Pappa RodgerExposed #TrueCrimeCommunity #FBI Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Tựa Đề: Thắc Mắc Về Thẩm Quyền; Kinh Thánh: Ma-thi-ơ 21:23-27; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
EXPOSING NEW Pappa Rodger Clues About Kohberger With Ret FBI Jennifer Coffindaffer The Idaho murders case has a digital ghost haunting it — an online persona known as Pappa Rodger. From the moment the crime shocked the nation, this mysterious account was posting eerily accurate predictions. The sheath, the weapon, even the patterns of behavior — it was all there before the public knew. And the question has never gone away: was Pappa Rodger really Bryan Kohberger? Law enforcement has insisted the answer is no. They claim after a “deep dive,” the account was ruled out. But retired FBI Special Agent Jennifer Coffindaffer isn't quick to close that book. In this conversation with Tony Brueski, she digs into the contradictions: the combative tone, the obsessive need to prove superiority, the survey-like questions that echoed Kohberger's criminology work. VPNs and masked IPs make it nearly impossible to prove definitively. So should we really take “not him” at face value? The overlap is unnerving. Too precise to be coincidence, too familiar to ignore. If Pappa Rodger wasn't Kohberger, then who was it? Someone with an uncanny insight into the murders? A lucky guesser? Or another figure entirely with access to information they shouldn't have had? This isn't just about one case. It's about the way anonymity online can blur into real-world horror. Pappa Rodger may be gone, but the mystery lingers. And until the evidence is made public, we're left asking: how do you ever really prove a digital ghost isn't who you think it is? Hashtags: #Pappa Rodger #BryanKohberger #IdahoMurders #HiddenKillers #JenniferCoffindaffer #Idaho4 #TrueCrimePodcast #CrimeAnalysis #KnifeSheath #Pappa RodgerExposed #TrueCrimeCommunity #FBI Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Tựa Đề: Cầu Nguyện Bằng Đức Tin; Kinh Thánh: Ma-thi-ơ 21:20-22; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Kết Quả Cho Chúa; Kinh Thánh: Ma-thi-ơ 21:18-19; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Xét Xử Công Minh; Kinh Thánh: Châm-ngôn 24:23-25; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Đức Chúa Trời Bênh Vực Tôi; Kinh Thánh: 2 Sử-ký 32:20-23; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Papa Roger, VPNs & Secret Calls: The Dark Digital Side of Bryan Kohberger EXPOSED! Was Bryan Kohberger secretly “Papa Roger”? It's one of the most debated threads in the Idaho murders case — an online account that appeared in the days after the killings, posting in true crime groups, sometimes with eerie accuracy. Papa Roger referenced details not yet public, used an avatar that looked strikingly like Kohberger, and stirred speculation that still hasn't gone away. Investigators have long claimed they checked it out and found no connection. But here's the problem: in the official paperwork, they even spelled the name wrong. In an era when digital trails depend on precision — one letter off can mean you miss the entire account — that detail raises serious doubts about just how thorough the search really was. And the VPN excuse? That's not proof of innocence. It's exactly the kind of digital shield someone like Kohberger, meticulous about covering tracks, would use. Then there's the family dynamic. Newly revealed phone records show that in the hours immediately after the murders, Kohberger's first calls weren't to friends, lawyers, or even silence. They were to his mother. At 6:13 a.m., less than two hours after the crime, he tried her. No answer. Minutes later he called his father. Then back to his mother again — this time she picked up. They spoke for 36 minutes. By day's end, Kohberger had logged over three hours of calls with his parents. This is not normal. The forensic timeline shows his phone off during the killings, then powered back on for a flood of family calls. It paints a chilling picture: a man who wanted to be digitally invisible during the murders, then cloaked himself in the routine comfort of being “the son” afterward. So, who was Papa Roger? And what do the calls to “Mother” really tell us about Kohberger's fractured psychology? This episode dives deep into both mysteries — the online ghost and the family tether — and why they may still matter even after a guilty plea. #BryanKohberger #PapaRoger #IdahoMurders #HiddenKillers #TrueCrime #Idaho4 #DigitalForensics #NormanBates #TrueCrimeCommunity #FBI Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Papa Roger, VPNs & Secret Calls: The Dark Digital Side of Bryan Kohberger EXPOSED! Was Bryan Kohberger secretly “Papa Roger”? It's one of the most debated threads in the Idaho murders case — an online account that appeared in the days after the killings, posting in true crime groups, sometimes with eerie accuracy. Papa Roger referenced details not yet public, used an avatar that looked strikingly like Kohberger, and stirred speculation that still hasn't gone away. Investigators have long claimed they checked it out and found no connection. But here's the problem: in the official paperwork, they even spelled the name wrong. In an era when digital trails depend on precision — one letter off can mean you miss the entire account — that detail raises serious doubts about just how thorough the search really was. And the VPN excuse? That's not proof of innocence. It's exactly the kind of digital shield someone like Kohberger, meticulous about covering tracks, would use. Then there's the family dynamic. Newly revealed phone records show that in the hours immediately after the murders, Kohberger's first calls weren't to friends, lawyers, or even silence. They were to his mother. At 6:13 a.m., less than two hours after the crime, he tried her. No answer. Minutes later he called his father. Then back to his mother again — this time she picked up. They spoke for 36 minutes. By day's end, Kohberger had logged over three hours of calls with his parents. This is not normal. The forensic timeline shows his phone off during the killings, then powered back on for a flood of family calls. It paints a chilling picture: a man who wanted to be digitally invisible during the murders, then cloaked himself in the routine comfort of being “the son” afterward. So, who was Papa Roger? And what do the calls to “Mother” really tell us about Kohberger's fractured psychology? This episode dives deep into both mysteries — the online ghost and the family tether — and why they may still matter even after a guilty plea. #BryanKohberger #PapaRoger #IdahoMurders #HiddenKillers #TrueCrime #Idaho4 #DigitalForensics #NormanBates #TrueCrimeCommunity #FBI Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Papa Roger, VPNs & Secret Calls: The Dark Digital Side of Bryan Kohberger EXPOSED! Was Bryan Kohberger secretly “Papa Roger”? It's one of the most debated threads in the Idaho murders case — an online account that appeared in the days after the killings, posting in true crime groups, sometimes with eerie accuracy. Papa Roger referenced details not yet public, used an avatar that looked strikingly like Kohberger, and stirred speculation that still hasn't gone away. Investigators have long claimed they checked it out and found no connection. But here's the problem: in the official paperwork, they even spelled the name wrong. In an era when digital trails depend on precision — one letter off can mean you miss the entire account — that detail raises serious doubts about just how thorough the search really was. And the VPN excuse? That's not proof of innocence. It's exactly the kind of digital shield someone like Kohberger, meticulous about covering tracks, would use. Then there's the family dynamic. Newly revealed phone records show that in the hours immediately after the murders, Kohberger's first calls weren't to friends, lawyers, or even silence. They were to his mother. At 6:13 a.m., less than two hours after the crime, he tried her. No answer. Minutes later he called his father. Then back to his mother again — this time she picked up. They spoke for 36 minutes. By day's end, Kohberger had logged over three hours of calls with his parents. This is not normal. The forensic timeline shows his phone off during the killings, then powered back on for a flood of family calls. It paints a chilling picture: a man who wanted to be digitally invisible during the murders, then cloaked himself in the routine comfort of being “the son” afterward. So, who was Papa Roger? And what do the calls to “Mother” really tell us about Kohberger's fractured psychology? This episode dives deep into both mysteries — the online ghost and the family tether — and why they may still matter even after a guilty plea. #BryanKohberger #PapaRoger #IdahoMurders #HiddenKillers #TrueCrime #Idaho4 #DigitalForensics #NormanBates #TrueCrimeCommunity #FBI Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Tựa Đề: Các Ngươi Nương Cậy Điều Gì?; Kinh Thánh: 2 Sử-ký 32:9-20; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Đấng Ở Cùng Chúng Ta; Kinh Thánh: 2 Sử-ký 32:2-8; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Morse code transcription: vvv vvv Marius Borg H iby Son of Norways crown princess charged with rape and abuse Trump Zelensky Key takeaways from Ukraine talks in Washington Stop children using VPNs to watch porn, ministers told BBC delayed Ozzy Osbourne film due to familys wishes UK backs down in Apple privacy row, US says Entire church begins two day journey across Swedish city of Kiruna Ashvir Singh Johal Morecambe appoint Sikh as youngest boss in top five tiers Woman sexually assaulted on plane refused compensation People buying less fast food as grocery prices remain high Game of chess to keep gangsters apart in jail as attacks rise
Fraudology is presented by Sardine. Get your tickets to Sardine[Con] and end the scamedmicIn this episode of Fraudology, host Karisse Hendrick sits down with Ron Zayas, CEO and founder of Ironwall by Incogni, to explore the alarming world of data privacy and its connection to fraud and cybercrime. Zayas, an expert in online privacy protection, reveals how seemingly innocuous data collection practices by companies and data brokers have created a massive industry that puts individuals and businesses at risk. He explains how everyday activities like using loyalty cards, booking travel, and engaging on social media contribute to detailed personal profiles that can be exploited by malicious actors.The conversation delves into the sophisticated methods cybercriminals use to craft hyper-personalized phishing attacks, leveraging AI and stolen data to create convincing scams. Zayas shares shocking examples of how this information can be weaponized, from domestic abuse cases to intimidation of federal judges. He also discusses the inadequate privacy protections in the US compared to Europe and the powerful lobbying efforts that hinder meaningful regulation.Listeners will gain valuable insights into protecting themselves and their businesses from these evolving threats. Zayas offers practical advice on minimizing your digital footprint, using VPNs, and being more discerning about sharing personal information. Whether you're an individual concerned about identity theft or a business leader worried about ransomware attacks, this episode provides crucial knowledge for navigating our data-driven world. Don't miss this essential conversation on the dark side of the data economy and how to safeguard yourself - tune in now to arm yourself with the latest information on privacy protection and fraud prevention.Fraudology is hosted by Karisse Hendrick, a fraud fighter with decades of experience advising hundreds of the biggest ecommerce companies in the world on fraud, chargebacks, and other forms of abuse impacting a company's bottom line. Connect with her on LinkedIn She brings her experience, expertise, and extensive network of experts to this podcast weekly, on Tuesdays.Mentioned in this episode:2023-q4-postroll sardine 1
Gareth and Ted swelter as they chat about Perplexity AI eyeing Google Chrome, Microsoft court action over Windows 10, a battery issue with the GPD Win 5, Insta360 new 8k drone, Linux Mint Zara beta, FydeOS, VPNs vs Proxies and Honor Magic V Flip 2. With Gareth Myles and Ted Salmon Join us on Mewe RSS Link: https://techaddicts.libsyn.com/rss Direct Download | iTunes | YouTube Music | Stitcher | Tunein | Spotify Amazon | Pocket Casts | Castbox | PodHubUK Feedback, Fallout and Contributions Bloody sun is coming out Sunday here which means I'm going to roast in this tin can (with windows doors shut for noise) or have fans and dogs and trains noise aplenty - so my vote is to get underway asap please! Camera Creations now has its own website (well, kind of)! I decided to stop paying through the nose for domains and SSL registrations so dumped it, Steve Litchfield style, on my homepage! As he rightly points out, that's what he does with all his stuff and has never had a problem - the RSS feeds are the important bit for the podcast world. Anyway, so it's at tedsalmon.com/cameracreations - bare-bones for now but I'm beginning to agree with Steve - keep it simple. Everyone's on social media now anyway, not websites! I might move all my stuff the same way over time as domains expire etc. I also dumped my main tedsalmon.com site back to basics (from the Google Sites fluffy-look one it has been) - so that also needs work. Camera Creations Shared Album News This new Ryzen Max gaming handheld is too powerful to hold a battery Perplexity AI wants to buy Chrome from Google for $34.5 billion (more than twice the value of Perplexity)! It's Better Left with Google Microsoft is being sued for killing Windows 10 Gemini is about to remember everything, unless you tell it not to Brits are turning from VPNs to Proxies to resist age verification - but their data may be at risk Insta360 8K drone immerses you in an alternate reality of human flight Pixel 10 Pro Fold first foldable with IP6/8 rating - a breakthrough moment in foldables? Honor Magic V Flip 2's display can withstand 350,000 folds, 5,500mAh battery confirmed Banters: Knocking out a Quick Bant FydeOS - ChromeOS Flex rival - with Android Apps, full support, unlike FlexOS Linux Mint 22.2 “Zara” Is Available for Public Beta Testing - with fingerprint authentication (I have one on my laptop) Download Link for Cinnamon - is it a simple process to get onto the Beta? Recommended? Bargain Basement: Best UK deals and tech on sale we have spotted AMD Ryzensets 5 9600X - £131.99 (cheaper than 7600x right now) AMD Ryzensets 9 9900X - £289.99 Canon PowerShot V10 Vlogging Starter Kit £299 from £439 WOLFANG 64GB MP3 Players - £20.99 POCO F7 Ultra 512GB/16GB £559 from £619 from £699 (also the 256GB/12GB for £529) HONOR Pad 10,12.1 inches Wi-Fi Tablet - £199.99 Pen - £79 Google Pixel Tablet with Charging Speaker Dock £379 from £399 from £699 - one last shoutout! Main Show URL: http://www.techaddicts.uk | PodHubUK Contact:: gareth@techaddicts.uk | @techaddictsuk Gareth - @garethmyles | Mastodon | Blusky | garethmyles.com | Gareth's Ko-Fi Ted - tedsalmon.com | Ted's PayPal | Mastodon | Ted's AmazonYouTube: Tech Addicts
Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed. Complete our annual audience survey before August 31. The research can be found here: Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities Learn more about your ad choices. Visit megaphone.fm/adchoices
Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed. Complete our annual audience survey before August 31. The research can be found here: Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities Learn more about your ad choices. Visit megaphone.fm/adchoices
Was Bryan Kohberger “Papa Roger”? Jennifer Coffindaffer on the Mysterious Online Figure in the Idaho Murders In the aftermath of the Idaho Four murders, an online persona called “Papa Roger” began posting in true crime groups, sometimes sharing details that seemed to match inside information. The avatar even looked strikingly like Bryan Kohberger. But was it him? In this segment, retired FBI Special Agent Jennifer Coffindaffer and I revisit the Papa Roger mystery. We break down what's in the official investigative report — including a misspelling of the handle in police documentation — and why that detail matters when assessing the thoroughness of the inquiry. Was this just a dedicated sleuth with uncanny insight, or a suspect testing the waters under a fake name? We discuss the possibility of law enforcement using such accounts as bait, the limitations investigators face when VPNs are involved, and how multiple fake Papa Roger accounts after Kohberger's arrest muddied the waters. For those who followed the case from the start, it's a reminder that not every thread gets tied off neatly — and some will always live in the gray area between rumor and proof. #BryanKohberger #Idaho4 #TrueCrime #HiddenKillers #PapaRoger #FBIProfiler #IdahoMurders #CrimeNews #OnlineSleuthing #DigitalForensics Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Was Bryan Kohberger “Papa Roger”? Jennifer Coffindaffer on the Mysterious Online Figure in the Idaho Murders In the aftermath of the Idaho Four murders, an online persona called “Papa Roger” began posting in true crime groups, sometimes sharing details that seemed to match inside information. The avatar even looked strikingly like Bryan Kohberger. But was it him? In this segment, retired FBI Special Agent Jennifer Coffindaffer and I revisit the Papa Roger mystery. We break down what's in the official investigative report — including a misspelling of the handle in police documentation — and why that detail matters when assessing the thoroughness of the inquiry. Was this just a dedicated sleuth with uncanny insight, or a suspect testing the waters under a fake name? We discuss the possibility of law enforcement using such accounts as bait, the limitations investigators face when VPNs are involved, and how multiple fake Papa Roger accounts after Kohberger's arrest muddied the waters. For those who followed the case from the start, it's a reminder that not every thread gets tied off neatly — and some will always live in the gray area between rumor and proof. #BryanKohberger #Idaho4 #TrueCrime #HiddenKillers #PapaRoger #FBIProfiler #IdahoMurders #CrimeNews #OnlineSleuthing #DigitalForensics Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Was Bryan Kohberger “Papa Roger”? Jennifer Coffindaffer on the Mysterious Online Figure in the Idaho Murders In the aftermath of the Idaho Four murders, an online persona called “Papa Roger” began posting in true crime groups, sometimes sharing details that seemed to match inside information. The avatar even looked strikingly like Bryan Kohberger. But was it him? In this segment, retired FBI Special Agent Jennifer Coffindaffer and I revisit the Papa Roger mystery. We break down what's in the official investigative report — including a misspelling of the handle in police documentation — and why that detail matters when assessing the thoroughness of the inquiry. Was this just a dedicated sleuth with uncanny insight, or a suspect testing the waters under a fake name? We discuss the possibility of law enforcement using such accounts as bait, the limitations investigators face when VPNs are involved, and how multiple fake Papa Roger accounts after Kohberger's arrest muddied the waters. For those who followed the case from the start, it's a reminder that not every thread gets tied off neatly — and some will always live in the gray area between rumor and proof. #BryanKohberger #Idaho4 #TrueCrime #HiddenKillers #PapaRoger #FBIProfiler #IdahoMurders #CrimeNews #OnlineSleuthing #DigitalForensics Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
News and Updates: “Vibe coding” is redefining software development by letting AI handle most coding tasks — even architecture — through natural-language prompts. Tools like Windsurf, Replit, and Microsoft Copilot let pros and hobbyists alike generate entire apps, but the code still needs close review. Google recently acquired Windsurf's CEO for $2.4B, highlighting AI's growing role in dev workflows. The UK and 24 U.S. states now require age verification (via government ID or face scans) for access to adult content. Critics argue these laws do little to protect children and instead threaten user privacy by collecting sensitive personal data — data often stored insecurely and vulnerable to leaks. Users can mitigate risks by using burner accounts, VPNs, and privacy tools — though laws are evolving, and enforcement may increase. Experts say the laws are easy to bypass and are more likely to harm privacy than improve online safety for kids. Delta is phasing out fixed ticket prices in favor of AI-driven personalized fares, which could eventually target individuals based on their data. Only 3% of fares currently use the system, but Delta expects that to rise to 20% by year's end. Privacy experts warn this “surveillance pricing” could lead to unfair, exploitative practices — especially for lower-income travelers. Music fans were stunned to find AI-generated songs appearing on Spotify under deceased artists' names like Blaze Foley and Guy Clark. The platform removed the tracks after backlash, admitting they violated deceptive content policies — but there's still no label to indicate whether music is AI-generated.
Tựa Đề: Lời Chào Của Sứ Đồ Phao-lô; Kinh Thánh: Rô-ma 16:3-16; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com
If you like what you hear, please subscribe, leave us a review and tell a friend!
Tựa Đề: Điều Tối Quan Trọng; Kinh Thánh: Ga-la-ti 6:12-18; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Chia Sẻ Và Làm Việc Thiện; Kinh Thánh: Ga-la-ti 6:6-10; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Hey Strangers, #OnlineSafetyAct #internet #kidsWell, well, well. The “age assurance” part of the UK's Online Safety Act has finally gone into effect, with its age checking requirements kicking in a week and a half ago. And what do you know? It's turned out to be exactly the privacy-invading, freedom-crushing, technically unworkable disaster that everyone with half a brain predicted it would be.Let's start with the most obvious sign that this law is working exactly as poorly as critics warned: VPN usage in the UK has absolutely exploded. Proton VPN reported an 1,800% spike in UK sign-ups. Five of the top ten free apps on Apple's App Store in the UK are VPNs. When your “child safety” law's primary achievement is teaching kids how to use VPNs to circumvent it, maybe you've missed the mark just a tad.But the real kicker is what content is now being gatekept behind invasive age verification systems. Users in the UK now need to submit a selfie or government ID to access:Reddit communities about stopping drinking and smoking, periods, craft beers, and sexual assault support, not to mention documentation of warSpotify for music videos tagged as 18+War footage and protest videos on XWikipedia is threatening to limit access in the UK (while actively challenging the law)=======================================My other podcasthttps://www.youtube.com/channel/UCKpvBEElSl1dD72Y5gtepkw**************************************************Something Strangehttps://www.youtube.com/watch?v=GRjVc2TZqN4&t=4s**************************************************article links:https://www.techradar.com/audio/spotify/spotify-introduces-face-scanning-age-checks-for-uk-uses-as-some-furious-fans-threaten-to-return-to-piracyhttps://www.wired.com/story/itchio-restoring-free-nsfw-games/https://www.techdirt.com/2025/08/04/didnt-take-long-to-reveal-the-uks-online-safety-act-is-exactly-the-privacy-crushing-failure-everyone-warned-about/======================================Today is for push-ups and Programming and I am all done doing push-ups Discordhttps://discord.gg/MYvNgYYFxqTikTokhttps://www.tiktok.com/@strangestcoderYoutubehttps://www.youtube.com/channel/UCe9xwdRW2D7RYwlp6pRGOvQ?sub_confirmation=1Twitchhttps://www.twitch.tv/CodingWithStrangersTwitterhttps://twitter.com/strangestcodermerchSupport CodingWithStrangers IRL by purchasing some merch. All merch purchases include an alert: https://streamlabs.com/codingwithstrangers/merchGithubFollow my works of chaos https://github.com/codingwithstrangersTipshttps://streamlabs.com/codingwithstrangers/tipPatreonhttps://www.patreon.com/TheStrangersWebullhttps://act.webull.com/vi/c8V9LvpDDs6J/uyq/inviteUs/Join this channelhttps://www.youtube.com/channel/UCe9xwdRW2D7RYwlp6pRGOvQ/joinTimeline00:00 intro00:26 What Talking We Talking About02:34 Article07:14 My Thoughts10:01 outro anything else?Take Care--- Send in a voice message: https://podcasters.spotify.com/pod/show/coding-with-strangers/message
Tựa Đề: Kiềm Chế Cơn Giận; Kinh Thánh: Châm-ngôn 24:19-20; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Người Cần Được Cầu Nguyện; Kinh Thánh: 2 Các Vua 6:16-17; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
This week's full broadcast of Computer Talk Radio includes - 00:00 - Nerd news for normal people - WiFi 8, ChatGPT-5, Wikipedia, therapy, iPhones, Dell laptops - 11:00 - Blackhat Conference coverage - Dr. Doreen Galli reports to Benjamin about Blackhat conference - 22:00 - Why Benjamin likes Apple - Benjamin details out his choice on the Apple vs Android option - 31:00 - Marty Winston's Wisdom - Mark Brownstein guests and explains why free isn't free - 39:00 - Scam Series - don't convert - Benjamin gives real example where scammers asked for gold - 44:00 - Keske on drone regulations - Steve Keske covers government regulation easing for drones - 56:00 - Technology is imporant as a tool - Benjamin praises tech as tool, but has concerns about control - 1:07:00 - Listener Q&A - peer to peer VPNs - Debby asks about peer-to-peer VPNs and safety of them - 1:16:00 - IT Professional Series - 340 - Benjamin shares that all need to learn AI to protect our jobs - 1:24:00 - Listener Q&A - screen flickering - Ivy asks why her screen is randomly flickering and cutting out
In this episode of Wrestling Soup, Anthony Thomas and Joseph E. Numbers dive deep into various hot topics in the wrestling world. They begin by discussing the shift of WWE's programming to ESPN and Disney platforms, the financial implications for fans, and the convoluted landscape of streaming services. Next, they explore WWE's recent changes under Triple H's leadership, talking about his management and booking style. The hosts also cover Bret Hart's criticism of Gunther's wrestling style, questioning the balance between real and performative pain in modern wrestling. They reflect on John Cena's open and heartfelt interview with Stephanie McMahon, touching upon his potential retirement, relationship with his father, and thoughts on wrestling crowds. Lastly, they address Joey Ryan's controversial return to wrestling and the subsequent backlash. Join them for an insightful conversation on the current state and future of professional wrestling!00:00 Introduction and Hosts00:32 WWE's New Deal with Disney and ESPN01:44 Subscription Costs and Cable Packages05:26 Hulu's Integration with Disney09:09 VPNs and Streaming Workarounds18:42 Future of WWE and Streaming Services37:51 Triple H's Booking Philosophy42:20 Triple H's Motivational Tactics44:02 CM Punk's Complex Issues46:00 Wrestlers' Mental Health47:10 Triple H's Approach to Talent Management47:50 WWE's Transparency and Anti-Vince Sentiment52:34 The Importance of Enjoyment in Wrestling54:16 Triple H's Role in WWE's Current State01:00:11 John Cena's Fan Interaction01:03:16 John Cena's Interview Insights01:13:45 Bret Hart's Critique of Gunther01:15:30 Gunther's Unique Style in Wrestling01:16:04 Brett Hart's Era of Wrestling01:25:55 Gunther's Perspective on Wrestling Culture01:30:35 Jake Hagar's Retirement Announcement01:34:14 Joey Ryan's Controversial Return01:49:29 Closing Remarks and AnnouncementsBecome a supporter of this podcast: https://www.spreaker.com/podcast/wrestling-soup--1425249/support.
In this episode, I talk with Adina Glickstein — Master's student in Media Studies under Nathan Schneider at UC Boulder and editor-at-large at Spike Art Magazine — whose recent Compact Mag article, The Rise and Fall of Urbit finally gave me the excuse to talk about Urbit on the podcast and why its failing.We unpack what Urbit is trying to be (although many don't seem to agree), its creator Curtis Yarvin (aka Mencius Moldbug, philosopher of the alt-right), and how its governance structure mirrors his anti-democratic ideals. Adina shares her experience moving from enthusiasm to disillusionment — from Berlin meetups to Urbit Assembly, to witnessing the project lean into neo-colonial “exit” politics.We also get into the reactionary politics inside the Urbit community, the recent leadership coup pitting long-time developers against Yarvin and his backers, and how this drama unexpectedly created a demand for “voice” in a system designed entirely around “exit.” Links:User Error — Adina's monthly tech column for Spike Art MagazineThe Rise and Fall of Urbit — Adina's piece in Compact MagAdina on InstagramThis episode is sponsored by NYM, the world's most private VPN. Unlike traditional VPNs, Nym uses a decentralized mixnet to scramble your internet data — hiding who you're talking to, when, and how often. You can switch between full mixnet mode for maximum anonymity, or a faster VPN mode for everyday use.Use the code blockchainsocialist when signing up and get an extra month!If you liked the podcast be sure to give it a review on your preferred podcast platform. If you find content like this important consider donating to my Patreon starting at just $3 per month. It takes quite a lot of my time and resources so any amount helps. Follow me on Twitter (@TBSocialist) or Mastodon (@theblockchainsocialist@social.coop) and join the r/CryptoLeftists subreSend me your questions or comments about the show and I'll read them out sometime. Support the showICYMI I've written a book about, no surprise, blockchains through a left political framework! The title is Blockchain Radicals: How Capitalism Ruined Crypto and How to Fix It and is being published through Repeater Books, the publishing house started by Mark Fisher who's work influenced me a lot in my thinking. The book is officially published and you use this linktree to find where you can purchase the book based on your region / country.
Tựa Đề: Lời Cầu Nguyện Cần Thiết; Kinh Thánh: 2 Các Vua 6:15-17; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
- Tornado Cash CoFounder Roman Storm Found Guilty of Unlicensed Money Transmission Conspiracy https://www.therage.co/roman-storm-trial-split-verdict-tornado-cash/ - SEC Commissioner Hester Pierce Slams Bank Secrecy Act https://www.therage.co/sec-commissioner-hester-pierce-slams-bank-secrecy-act/ - OpenSats Impact Report: Developer Libraries https://opensats.org/blog/advancements-in-developer-libraries - Strike Business Bill Pay https://x.com/jackmallers/status/1952758452259889155 - Strike loans live in Missouri https://x.com/Strike/status/1953101356568305773 - SLNT Now Accepting Bitcoin https://primal.net/e/nevent1qqszqm64sqkrp6jn64zsxwz8y7vjkavgt4jjujlc3mmpeh3l2rzxy4gfrttf5 - EU Chat Control Coming in October https://www.zerohedge.com/technology/chat-control-eu-proposal-scan-all-private-messages-gains-momentum - Burma | Invasive Cybersecurity Law Comes into Full Effect In January, this newsletter reported on a repressive cybersecurity law enacted by the military junta in Burma that empowers officials with sweeping controls over digital spaces. Last week, that law came into full effect. It criminalizes the use of VPNs, mandates that platforms store and hand over user data to officials upon request, and allows authorities to shut down Internet access at will. It also empowers regime-aligned law enforcement with the absolute authority to check citizens' phones on the street. Penalties include up to six months in prison for sharing posts deemed “misinformation” or for using encrypted apps (like VPNs) to access information. Reports have already surfaced of police extorting bribes from people at checkpoints for having VPNs or “illegal social media” like X, Facebook, or YouTube on their phones. The law poses immediate threats to journalists and activists critical of the military regime or using privacy tools. Amid the junta's effort to stage a sham election to expand militarized control, this deepens Burma's retreat from civic freedoms and shrinks the already fragile space for independent voices and the free flow of information. FinancialFreedomReport.org - OpenAI GPT-OSS 120B https://primal.net/e/nevent1qqsw9z858hlpxkyc2h2kza9svqzu38hprs45pn334uprecggfw3gqtgpwwskw - Primal iOS 2.3.56 https://primal.net/e/nevent1qqswmxlw8tdt7k375a0qvutdfx3pagd3lu8khxhyycjy3z7qpj5t9ssrpej07 0:00 - Intro 2:35 - Higher 6:50 - Dashboard 12:02 - Roman Storm found guilty 25:54 - SEC commissioner slams BSA 31:38 - EU chat control 36:50 - Ministry of Truth 40:11 - OpenSats 44:01 - Strike announcements 48:25 - Boosts 52:09 - HRF Story of the Week 55:25 - SLNT accepts bitcoin 1:10:10 - Maple GPT-OSS 1:26:48 - Primal update Shoutout to our sponsors: Coinkite https://coinkite.com/ Bitkey https://bitkey.world/ Stakwork https://stakwork.ai/ Follow Marty Bent: Twitter https://twitter.com/martybent Nostr https://primal.net/marty Newsletter https://tftc.io/martys-bent/ Podcast https://tftc.io/podcasts/ Follow Odell: Nostr https://primal.net/odell Newsletter https://discreetlog.com/ Podcast https://citadeldispatch.com/
01:00:39 – UK Online Safety Act Turns OrwellianOpening segment warns that Britain's new law now requires ID for everyday activities — from adjusting Nvidia graphics card settings to ordering a pizza — and is rapidly expanding into a full surveillance regime. 01:07:09 – VPNs, Xbox & Age‑Locked InternetDiscussion on UK plans to ban VPNs and force age‑verification IDs for online gaming, social features, and even accessing support forums — a sweeping restriction on free expression. 01:15:24 – Feminist Group ‘Collective Shout' Driving Game CensorshipExposes how the Australian activist group is working with payment processors to ban games globally, pushing moral‑control agendas under the guise of child protection. 01:45:06 – Trump's $200 Million White House BallroomCritiques Trump's plan to add an opulent ballroom to the White House as an ego project, mocking his claim that past presidents “always wanted” one but couldn't do it until him. 01:50:16 – Trump, Epstein & Mar‑a‑Lago ConnectionDetails claims that Epstein victim Virginia Giuffre worked at Mar‑a‑Lago before being trafficked, and speculation that Ghislaine Maxwell's transfer to a low‑security prison could set up a pardon. 02:17:17 – U.S. Debt is $151 Trillion, Not $37 TrillionA Zero Hedge report reveals the real national debt — including unfunded liabilities for Social Security and Medicare — is over $151 trillion. The host mocks the government's “it's not debt until we pay it” logic. 02:26:15 – Stablecoins as a Stealth CBDCDiscussion of the new Genius Act regulating stablecoins, described as a backdoor to a central bank digital currency. The host warns it will allow total financial surveillance and instant “de‑banking” for political speech. 02:52:19 – The “Five‑Hour School Week” Homeschool ModelStory of parents who discovered they could teach their child all required material in just one hour a day, leading to better results and more time for real‑life learning. 03:00:54 – Homeschoolers Outperform Public SchoolsData shows homeschoolers scoring 15–30 percentile points higher than public school students, even for low‑income families. The host calls public schools Marxist indoctrination centers. 03:08:50 – Canada Dumps Academic StandardsBritish Columbia drops subject‑specific standardized testing in favor of “literacy” and “numeracy” assessments, replacing A–F grades with vague labels like “developing” and “proficient.” Follow the show on Kick and watch live every weekday 9:00am EST – 12:00pm EST https://kick.com/davidknightshow Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHTFind out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.
This week the Liberals found racism in Sydney Sweeney's Jeans while the WNBA had a dildo and wig problem. The UK continues it's slide into Orwell's 1984 by continuing to crack down on free speech. This time they are creating a police force just to deal with disinformation and cracking down on the use of VPNs. Australia hates Machete's, but loves the illegal immigrants that wield them. Fitz is on the road broadcasting from Indiana and Jefé discusses his new TikTok challenge! Come join us for a show. You'll be glad you did. @spreakerBecome a supporter of this podcast: https://www.spreaker.com/podcast/whiskey-hell-podcast--5683729/support.
01:00:39 – UK Online Safety Act Turns OrwellianOpening segment warns that Britain's new law now requires ID for everyday activities — from adjusting Nvidia graphics card settings to ordering a pizza — and is rapidly expanding into a full surveillance regime. 01:07:09 – VPNs, Xbox & Age‑Locked InternetDiscussion on UK plans to ban VPNs and force age‑verification IDs for online gaming, social features, and even accessing support forums — a sweeping restriction on free expression. 01:15:24 – Feminist Group ‘Collective Shout' Driving Game CensorshipExposes how the Australian activist group is working with payment processors to ban games globally, pushing moral‑control agendas under the guise of child protection. 01:45:06 – Trump's $200 Million White House BallroomCritiques Trump's plan to add an opulent ballroom to the White House as an ego project, mocking his claim that past presidents “always wanted” one but couldn't do it until him. 01:50:16 – Trump, Epstein & Mar‑a‑Lago ConnectionDetails claims that Epstein victim Virginia Giuffre worked at Mar‑a‑Lago before being trafficked, and speculation that Ghislaine Maxwell's transfer to a low‑security prison could set up a pardon. 02:17:17 – U.S. Debt is $151 Trillion, Not $37 TrillionA Zero Hedge report reveals the real national debt — including unfunded liabilities for Social Security and Medicare — is over $151 trillion. The host mocks the government's “it's not debt until we pay it” logic. 02:26:15 – Stablecoins as a Stealth CBDCDiscussion of the new Genius Act regulating stablecoins, described as a backdoor to a central bank digital currency. The host warns it will allow total financial surveillance and instant “de‑banking” for political speech. 02:52:19 – The “Five‑Hour School Week” Homeschool ModelStory of parents who discovered they could teach their child all required material in just one hour a day, leading to better results and more time for real‑life learning. 03:00:54 – Homeschoolers Outperform Public SchoolsData shows homeschoolers scoring 15–30 percentile points higher than public school students, even for low‑income families. The host calls public schools Marxist indoctrination centers. 03:08:50 – Canada Dumps Academic StandardsBritish Columbia drops subject‑specific standardized testing in favor of “literacy” and “numeracy” assessments, replacing A–F grades with vague labels like “developing” and “proficient.” Follow the show on Kick and watch live every weekday 9:00am EST – 12:00pm EST https://kick.com/davidknightshow Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHTFind out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-real-david-knight-show--5282736/support.
01:00:36 – Danish Study Reversal: Autism Link ConfirmedA Danish vaccine safety study is quietly corrected to reveal a correlation between aluminum and autism—but the researchers refuse media interviews, triggering accusations of deception. 01:13:42 – Gulf Jab Syndrome and COVID InjuriesThe show draws chilling comparisons between unexplained Gulf War illnesses and post-COVID vaccine injuries—calling both the results of reckless, untraceable experimentation. 01:19:36 – Religious Exemptions Under AttackPediatric elites urge the removal of all non-medical vaccine exemptions. The host argues that this represents a merging of medicine and state tyranny. 01:21:08 – The Blasphemy of “Redeemed” Fetal CellsReligious leaders are condemned for claiming vaccines developed with aborted fetal cells are morally acceptable. The host calls this a spiritual betrayal. 01:26:20 – RNA-Sprayed Food: Next Bioengineering ThreatA Moderna spin-off develops RNA pesticides that replicate in crops. The host warns this could embed genetic manipulation directly into the food supply. 02:27:34 – Cops Blame Social Media, Not AttackersThe Cincinnati police chief says social media made the mob beating "look worse than it was." The show mocks this excuse and blasts bystanders for doing nothing while a man was brutally attacked. 02:37:21 – Diversity Doesn't Stop TyrannyCincinnati's first female police chief faces lawsuits for discriminating against white men. The host mocks DEI hires as superficial fixes that don't change the abusive nature of policing. 02:44:26 – UK Internet Crackdown Triggers VPN SurgeBritish citizens scramble for VPNs as the government rolls out harsh age-verification laws. The segment warns that it's less about child safety and more about censorship and digital control. 02:50:10 – Online Safety Act Instantly Used for CensorshipJust hours after going live, the UK law is used to suppress anti-immigration protests. The host says this proves the law was never about safety—just silencing dissent. 02:54:51 – Eric Peters Returns“My first guest as I come back… is Eric Peters… somebody I really respect, who really gets it.” 03:03:02 – Destroy Trust in Institutions“I'm here to destroy trust in institutions. That's my life mission…”Peters declares that blind faith in government institutions must be dismantled—not restored. 03:20:08 – Masculinity, Compliance & Modern MenDiscussion on emasculation, symbolic submission, and how modern clothing and behavior reflect cultural decline. Jordan Peterson is referenced. 03:47:28 – Hidden Worldview in Media“Very subtle philosophy… if you just accept it without looking critically…”Hollywood and media messaging are described as covert tools of cultural transformation. Follow the show on Kick and watch live every weekday 9:00am EST – 12:00pm EST https://kick.com/davidknightshow Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHTFind out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.
01:00:36 – Danish Study Reversal: Autism Link ConfirmedA Danish vaccine safety study is quietly corrected to reveal a correlation between aluminum and autism—but the researchers refuse media interviews, triggering accusations of deception. 01:13:42 – Gulf Jab Syndrome and COVID InjuriesThe show draws chilling comparisons between unexplained Gulf War illnesses and post-COVID vaccine injuries—calling both the results of reckless, untraceable experimentation. 01:19:36 – Religious Exemptions Under AttackPediatric elites urge the removal of all non-medical vaccine exemptions. The host argues that this represents a merging of medicine and state tyranny. 01:21:08 – The Blasphemy of “Redeemed” Fetal CellsReligious leaders are condemned for claiming vaccines developed with aborted fetal cells are morally acceptable. The host calls this a spiritual betrayal. 01:26:20 – RNA-Sprayed Food: Next Bioengineering ThreatA Moderna spin-off develops RNA pesticides that replicate in crops. The host warns this could embed genetic manipulation directly into the food supply. 02:27:34 – Cops Blame Social Media, Not AttackersThe Cincinnati police chief says social media made the mob beating "look worse than it was." The show mocks this excuse and blasts bystanders for doing nothing while a man was brutally attacked. 02:37:21 – Diversity Doesn't Stop TyrannyCincinnati's first female police chief faces lawsuits for discriminating against white men. The host mocks DEI hires as superficial fixes that don't change the abusive nature of policing. 02:44:26 – UK Internet Crackdown Triggers VPN SurgeBritish citizens scramble for VPNs as the government rolls out harsh age-verification laws. The segment warns that it's less about child safety and more about censorship and digital control. 02:50:10 – Online Safety Act Instantly Used for CensorshipJust hours after going live, the UK law is used to suppress anti-immigration protests. The host says this proves the law was never about safety—just silencing dissent. 02:54:51 – Eric Peters Returns“My first guest as I come back… is Eric Peters… somebody I really respect, who really gets it.” 03:03:02 – Destroy Trust in Institutions“I'm here to destroy trust in institutions. That's my life mission…”Peters declares that blind faith in government institutions must be dismantled—not restored. 03:20:08 – Masculinity, Compliance & Modern MenDiscussion on emasculation, symbolic submission, and how modern clothing and behavior reflect cultural decline. Jordan Peterson is referenced. 03:47:28 – Hidden Worldview in Media“Very subtle philosophy… if you just accept it without looking critically…”Hollywood and media messaging are described as covert tools of cultural transformation. Follow the show on Kick and watch live every weekday 9:00am EST – 12:00pm EST https://kick.com/davidknightshow Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHTFind out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-real-david-knight-show--5282736/support.
- Interview with Matt Kim on VPN Privacy and Surveillance (0:10) - Speculation on Trump's Provocation of Russia (2:46) - Trump's Nuclear War Threats and Their Implications (19:44) - The Role of Israel and the Deep State in US Politics (29:57) - The Economic and Political Impact of Trump's Policies (40:44) - The Depopulation Agenda and Health Concerns (1:00:40) - The Role of Health Insurance and Personal Responsibility (1:07:59) - The Broader Implications of US Foreign Policy (1:18:11) - The Role of Media and Public Perception (1:18:30) - The Future of US-China Relations and Global Power Dynamics (1:18:50) - Surviving Modern Challenges and Bio-Weapons Documentary (1:19:08) - Promoting Health and Supporting Free Speech (1:27:38) - Historical Bio-Weapons Experiments and Government Deception (1:30:34) - Modern Bio-Weapons and Vaccine Risks (1:33:29) - Government Agencies and Depopulation Agenda (1:37:44) - Introduction of Matt Kim and VP.Net (1:41:51) - Technical Details and User Trust (1:50:26) - Privacy Challenges and Market Strategy (1:58:29) - Legal and Ethical Considerations (2:13:23) - Future Plans and Broader Impact (2:13:40) - Encouraging Independent Thought and Activism (2:18:04) - Discussion on Naming and Language Models (2:35:46) - Introduction of VP.net and Decentralization (2:43:00) - Political and Ethical Implications of VPNs (2:46:44) - Financial Transactions and Asset Protection (2:47:47) - Introduction to UNAs and Their Benefits (2:56:11) - Health Ranger Store and Product Recommendations (3:06:35) - Decentralization and the Impact of Decentralized TV (3:18:55) - Conclusion and Future Plans (3:21:50) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
Guy Montgomery has done the impossible and created a television show that not only has survived more than one season in New Zealand, it has taken over Australia and he has been nominated for the prestigious Graham Kennedy Award for Most Popular New Talent at the Logies (Aus' Emmys). Please help him win. It's dead simple, head on over to the Logies website and vote.On an unrelated note, here's a guide to VPNs: au.pcmag.com/vpn/138/the-best-vpn-services Hosted on Acast. See acast.com/privacy for more information.