Rob Braxman is a software architect, cybersecurity expert and privacy evangelist. He is a Gold VIP broadcaster on Periscope (Twitter) and is a radio personality with frequent guest interviews on AM Radio.

The topics broadly discussed here are often discussed in much greater detail on the live broadcasts.

Twitter @robmusic0
Periscope @robmusic
Youtube @robbraxman @braxme

Periscope
What the Zuck!
Evangelizing About the Erosion of Privacy




Since the advent of Google and Facebook, a disturbing trend is occuring in society; a trend that has never been accounted for in sociology. For the first time in the history of modern man, the collection of personal information is now at a level that exceeds what was the dystopian society of Big Brother as described in the book 1984. We have grown cavalier about the constant data collection and accept it as a new norm. Should we accept it as a norm? Why are the risks never discussed?

As technology moves towards high levels of computer Artificial Intelligence (AI), are you thinking about the effects of a super smart machine that has access to everyone's detailed life profile, collected over perhaps 40 years? What is the impact of this combination of AI + Big Data on jobs, choices, governments?

The biggest data collector of them all, Facebook, is not some benign social media company. Facebook is planning on the Singularity (advanced AI). Zuckerberg says he is not afraid of AI. Why would he be afraid of AI if he's controlling it?

It's time to fight back. It's time to say WE WILL NOT GET ZUCKED BY ZUCK.

This website is intended to give you a heads-up on various issues that should raise a red flag in your mind about your eroding privacy. Go the the Defensive Resources section to learn how to defend yourself from all this.


What the Zuck!
Evangelizing About the Erosion of Privacy
Since the advent of Google and Facebook, a disturbing trend is occuring in society; a trend that has never been accounted for in sociology. For the first time in the history of modern man, the collection of personal information is now at a level that exceeds what was the dystopian society of Big Brother as described in the book 1984. We have grown cavalier about the constant data collection and accept it as a new norm. Should we accept it as a norm? Why are the risks never discussed?

As technology moves towards high levels of computer Artificial Intelligence (AI), are you thinking about the effects of a super smart machine that has access to everyone's detailed life profile, collected over perhaps 40 years? What is the impact of this combination of AI + Big Data on jobs, choices, governments?

The biggest data collector of them all, Facebook, is not some benign social media company. Facebook is planning on the Singularity (advanced AI). Zuckerberg says he is not afraid of AI. Why would he be afraid of AI if he's controlling it?

It's time to fight back. It's time to say WE WILL NOT GET ZUCKED BY ZUCK.

This website is intended to give you a heads-up on various issues that should raise a red flag in your mind about your eroding privacy. Go the the Defensive Resources section to learn how to defend yourself from all this.

We are Getting Zucked!
Just a Sample of Issues that Erode Our Privacy

Your IP Address is Tracked

Every device on the Internet has a unique identifier that allows addressing of messages. This identifier is known as the IP (Internet Protocol) Address. All websites track visitors by means of this IP. This means you have absolutely no anonymity by default when click away on the Internet.

Learn more.
Your IP Address is Tracked

Every device on the Internet has a unique identifier that allows addressing of messages. This identifier is known as the IP (Internet Protocol) Address. All websites track visitors by means of this IP. This means you have absolutely no anonymity by default when click away on the Internet.

Learn more.
Location Spying to 6 Feet

New technologies are being used for more accurate location tracking. If you thought you're being tracked by old technologies like GPS, cell towers, and IP lookups, welcome to the New World Order. Expect to be tracked within Six Zucking Feet. Learn about new terms like WIFI Triangulation and Skyhook.
Location Spying to 6 Feet

New technologies are being used for more accurate location tracking. If you thought you're being tracked by old technologies like GPS, cell towers, and IP lookups, welcome to the New World Order. Expect to be tracked within Six Zucking Feet. Learn about new terms like WIFI Triangulation and Skyhook.
EXIF Data on your Photos

EXIF is metadata that is included in your digital photos. It is automatically created by all digital cameras. Companies like Facebook have known that photos are ripe with information such as your location, your device's unique ID's and possibly even more.
EXIF Data on your Photos

EXIF is metadata that is included in your digital photos. It is automatically created by all digital cameras. Companies like Facebook have known that photos are ripe with information such as your location, your device's unique ID's and possibly even more.
EULA, TOS, Privacy Policy Surprises

If you think there are privacy policies that protect you on Facebook and Google, think again. Two important things to consider: PERMANENCE and DATA-MINING. The data mining allows the data to leak out of the original social media platform (such as Facebook). You need to read the EULA's closely to see what the intent is. It is not hidden. Most of you just don't care and Zuckbook and other platforms take advantage of this.
EULA, TOS, Privacy Policy Surprises

If you think there are privacy policies that protect you on Facebook and Google, think again. Two important things to consider: PERMANENCE and DATA-MINING. The data mining allows the data to leak out of the original social media platform (such as Facebook). You need to read the EULA's closely to see what the intent is. It is not hidden. Most of you just don't care and Zuckbook and other platforms take advantage of this.
Facebook - Your Permanent Data Storage

The worst offender of all in social media is Zuckbook. Zuck collects an ever expanding profile of you. Remember that Zuck knows you by your real name, by your real family, by facial recognition that connects all of you, by locations that establish your movement patterns, by your tattoos, by your likes, searches, and even private messages.
Facebook - Your Permanent Data Storage

The worst offender of all in social media is Zuckbook. Zuck collects an ever expanding profile of you. Remember that Zuck knows you by your real name, by your real family, by facial recognition that connects all of you, by locations that establish your movement patterns, by your tattoos, by your likes, searches, and even private messages.
HTTPS Snooping at Work

Your employer is likely spoofing your HTTPS connection. Your employer wants to ability to see your Internet activity even when you're on HTTPS. Is this occurring to you? Be aware so you do not inadvertently show private information.
HTTPS Snooping at Work

Your employer is likely spoofing your HTTPS connection. Your employer wants to ability to see your Internet activity even when you're on HTTPS. Is this occurring to you? Be aware so you do not inadvertently show private information.
Social Media Aggregators

Your data leaks out of Facebook and Google. Social Media Aggregators are collecting and selling your data. Be aware of this. Most of these aggregators allow an opt out.
Social Media Aggregators

Your data leaks out of Facebook and Google. Social Media Aggregators are collecting and selling your data. Be aware of this. Most of these aggregators allow an opt out.
3 Letter Agency Spying

What are 3 Letter Agencies doing to your data?
3 Letter Agency Spying

What are 3 Letter Agencies doing to your data?
Stingray Cell Phone Spying

Stingray is a mobile phone interceptor. Specifically distributed for law enforcement use, many of these devices give warrantless surveillance capability to police and other agencies. Supposedly intended for terrorist surveillance, it is secret device that has been used beyond that.
Stingray Cell Phone Spying

Stingray is a mobile phone interceptor. Specifically distributed for law enforcement use, many of these devices give warrantless surveillance capability to police and other agencies. Supposedly intended for terrorist surveillance, it is secret device that has been used beyond that.
Search Engine Tracking

You casually search for anything on Google. Are you aware that these searches are stored and analyzed and attached to your profile? Are you aware that the search results change based on how you have been profiled?
Search Engine Tracking

You casually search for anything on Google. Are you aware that these searches are stored and analyzed and attached to your profile? Are you aware that the search results change based on how you have been profiled?
Quantum Computers Break Encryption

Quantum Computers, a new exciting breed of computing devices, offers more powerful options to solve certain AI based problems. But this same capability also has the ability to break the most common encryption used on the Internet.
Quantum Computers Break Encryption

Quantum Computers, a new exciting breed of computing devices, offers more powerful options to solve certain AI based problems. But this same capability also has the ability to break the most common encryption used on the Internet.
Facial Recognition

Face ID, Facebook Deep Face, and other Facial Recognition technologies create high risks for an online world that cannot be turned off. The risks are extremely serious.
Facial Recognition

Face ID, Facebook Deep Face, and other Facial Recognition technologies create high risks for an online world that cannot be turned off. The risks are extremely serious.
Internet of Hackable Things

The new buzzword in 2016 is IoT (Internet of Things). All your ordinary objects and control devices in your home are now being connected to the Internet. An IoT device is a SENSOR in your home. Have the makers of these devices prepared themselves for cyber threats? No. Your baby monitor is a spy device.
Internet of Hackable Things

The new buzzword in 2016 is IoT (Internet of Things). All your ordinary objects and control devices in your home are now being connected to the Internet. An IoT device is a SENSOR in your home. Have the makers of these devices prepared themselves for cyber threats? No. Your baby monitor is a spy device.
Fake Promise of Incognito Mode

Incognito mode (or Privacy mode) on your browsers give you a false sense of privacy. If you understand how cookies are tracked by Facebook and Google, you will understand that their capabilities are diabolical.
Fake Promise of Incognito Mode

Incognito mode (or Privacy mode) on your browsers give you a false sense of privacy. If you understand how cookies are tracked by Facebook and Google, you will understand that their capabilities are diabolical.
Chromebook in Schools

The promise of a Chromebook is that it is inexpensive and uses little computing resources. It is nothing but a Chrome browser-focused computer after all. But it also limits you to the Google ecosystem which is fraught with dangers for young school kids. It is not the best solution for vulnerable kids!
Chromebook in Schools

The promise of a Chromebook is that it is inexpensive and uses little computing resources. It is nothing but a Chrome browser-focused computer after all. But it also limits you to the Google ecosystem which is fraught with dangers for young school kids. It is not the best solution for vulnerable kids!
Driverless Cars

Driverless cars have a great promise as big step towards transportation safey and added leisure time. Driverless cars will be mainstream in a couple of years. But did we forget that we will create the first mass-produced robots?
Driverless Cars

Driverless cars have a great promise as big step towards transportation safey and added leisure time. Driverless cars will be mainstream in a couple of years. But did we forget that we will create the first mass-produced robots?
RFID Tracking

No need for a chip implant. You're always carrying the chip around. Is this really only for NearField Communications?
RFID Tracking

No need for a chip implant. You're always carrying the chip around. Is this really only for NearField Communications?
Windows 10 DNS Leaks

Windows 10 is notorious for having hooks that allow extensive tracking of your activities. Here's one that defeats a VPN. It is called a DNS Leak.
Windows 10 DNS Leaks

Windows 10 is notorious for having hooks that allow extensive tracking of your activities. Here's one that defeats a VPN. It is called a DNS Leak.
Have You Been Hacked?

We are at war! Hacking goes on constantly 24/7 and threats continuously increase both from inside and outside our country.
Have You Been Hacked?

We are at war! Hacking goes on constantly 24/7 and threats continuously increase both from inside and outside our country.
Remote Access Trojans on your Android

This is the most insidious kind of malware that one can install on your computer. The ultimate spy device and very difficult to detect. A RAT. In a basic form it can just be a keylogger and can be used to capture your logins and passwords. In a more sophisticated form. it can remotely control your computer.
Remote Access Trojans on your Android

This is the most insidious kind of malware that one can install on your computer. The ultimate spy device and very difficult to detect. A RAT. In a basic form it can just be a keylogger and can be used to capture your logins and passwords. In a more sophisticated form. it can remotely control your computer.
How Much is your Information Worth?

Your credit cards, social security numbers, and identity are worth money on the Dark Web.
How Much is your Information Worth?

Your credit cards, social security numbers, and identity are worth money on the Dark Web.
DNA Databases - Google Connection

What would happen if your DNA data was accessed by Google? What would this mean to profiling your identity? As it turns out. Your fears are well founded. 23andMe is connected to Google.
DNA Databases - Google Connection

What would happen if your DNA data was accessed by Google? What would this mean to profiling your identity? As it turns out. Your fears are well founded. 23andMe is connected to Google.
Centralized Health Databases

Secret side is Real-time sending of medical data to the Government repositories. Real time monitoring (i.e. bureaucratic control) of doctor decisions. Coming soon to a doctor near you.
Centralized Health Databases

Secret side is Real-time sending of medical data to the Government repositories. Real time monitoring (i.e. bureaucratic control) of doctor decisions. Coming soon to a doctor near you.
Voice Control Devices

Voice Control devices such as Alexa Echo, Google Nest and others are listening devices that has been allowed into your home willingly. Data captured by these voice control devices have yet to be deleted. So all your voices are stored nicely for AI to learn from and ready for mass surveillance.
Voice Control Devices

Voice Control devices such as Alexa Echo, Google Nest and others are listening devices that has been allowed into your home willingly. Data captured by these voice control devices have yet to be deleted. So all your voices are stored nicely for AI to learn from and ready for mass surveillance.
Drones

The imagery of the SKYNET scenario from the movie Terminator is not complete withou the presence of drones which where a dominant feature of the movie. But are drones expected to be like the ones in the movie?
Drones

The imagery of the SKYNET scenario from the movie Terminator is not complete withou the presence of drones which where a dominant feature of the movie. But are drones expected to be like the ones in the movie?
Data Analysis and AI Companies

Internet companies are moving to the next phase. Now that data collection is at it's peak, the time has come for data analysis and the application of data for offensive action.
Data Analysis and AI Companies

Internet companies are moving to the next phase. Now that data collection is at it's peak, the time has come for data analysis and the application of data for offensive action.
Intel AMT - VPRO

When they say Intel Inside, we thought it was just an advertising slogan. But now this takes on a different meaning when we discovered that in the last decade, Intel processors have included a back door.
Intel AMT - VPRO

When they say Intel Inside, we thought it was just an advertising slogan. But now this takes on a different meaning when we discovered that in the last decade, Intel processors have included a back door.
Email is Unsafe

Since the invention of the email protocols SMTP, POP3, IMAP, it is well known by IT people that email is sent out in plaintext. Thus emails are actually as open as postcards and most people don't realize this.
Email is Unsafe

Since the invention of the email protocols SMTP, POP3, IMAP, it is well known by IT people that email is sent out in plaintext. Thus emails are actually as open as postcards and most people don't realize this.
Identify Theft

Understand how identity theft is done and how you can protect yourself from it, if possible.
Identify Theft

Understand how identity theft is done and how you can protect yourself from it, if possible.
My Business Blacklist

Here are a list of companies we need to stop supporting since they don't care about our privacy. They mistakenly block VPN's which puts their customers at risk.
My Business Blacklist

Here are a list of companies we need to stop supporting since they don't care about our privacy. They mistakenly block VPN's which puts their customers at risk.
Voice Prints

The Intelligence Community has much more sophisticated tracking of voices then we have realized. They have the capability to identify a voice on the Internet or on any phone and to do it without having to respect wiretapping laws by storing voice prints.
Voice Prints

The Intelligence Community has much more sophisticated tracking of voices then we have realized. They have the capability to identify a voice on the Internet or on any phone and to do it without having to respect wiretapping laws by storing voice prints.
Weaponized Data

Data isn't just passively collected. As demonstrated by the Cambridge Analytica/Facebook debacle, the data can be used to manipulate.

Several companies are eager to be the mercenary arm for data: Jigsaw (an Alphabet commpany) and Palantir (Peter Thiel).

Learn more.
Weaponized Data

Data isn't just passively collected. As demonstrated by the Cambridge Analytica/Facebook debacle, the data can be used to manipulate.

Several companies are eager to be the mercenary arm for data: Jigsaw (an Alphabet commpany) and Palantir (Peter Thiel).

Learn more.
More Issues

There are more issues than I can reveal in this website. Some things are just too sensitive. Please watch my broadcasts on Periscope so I can tell more details.
More Issues

There are more issues than I can reveal in this website. Some things are just too sensitive. Please watch my broadcasts on Periscope so I can tell more details.
Rob Braxman is a software architect, cybersecurity expert and privacy evangelist. He is a Gold VIP broadcaster on Periscope (Twitter) and is a radio personality with frequent guest interviews on AM Radio.

The topics broadly discussed here are often discussed in much greater detail on the live broadcasts.

Twitter @robmusic0
Periscope @robmusic
Youtube @robbraxman @braxme

Periscope

Buy VPN Bytz VPN - with Built-in TOR Routing
by Rob Braxman
Buy Now


Buy VPN

Copyright 2018 Rob Braxman - All Rights Reserved