Is Your Home Wifi Revealing Your Location to be Stored in Big Tech Databases? Tips for Staying Anonymous on the Internet

With online data at a premium today for the Big Tech oligarchs who want to build their huge AI databases with your information, along with very concerning increases in cyber hacking where anything you share online can be hacked in somebody's database, one needs to take special care to protect their personal data and privacy. I have found PC Magazine to be a great resource in giving advice on how to protect your data and privacy. And all of their articles are for free, with no paywall. In an article recently published by PCMag.com, Neil J. Rubenking reported how anyone with a cell phone passing by your home can pick up your router's Wifi ID, revealing your location, which can then be stored in Big Tech databases at companies such as Google and Apple. Of course if you find their instructions on how to configure your router's Wifi too difficult, you can just turn it off altogether and only connect via an Ethernet cable (which is what I do). That will also reduce EMF radiation pollution in your home. PCMag.com also just recently published an article about how to use the Internet more anonymously: "How to Completely Disappear From the Internet."

Lack of IT-Skilled Human Workers is Leading to a Cyber Pandemic – 500,000 Cybersecurity Jobs Unfilled in the U.S.

As the full effects of the Microsoft glitch that took down so many businesses and government agencies this past Friday are still being evaluated, the vulnerability of a software system run by a cybersecurity firm is presenting new information to hackers and exposing just how unprepared the U.S. Government is to protect our country against cyber attacks that are a real threat to national security. After the CrowdStrike failed software update that infected 8.1 million devices with cascading effects spreading to millions, if not billions, of other devices and computer systems, the threat of a Cyber Pandemic is now very real. And the main reason that the U.S. Government is powerless to stop something like a Cyber Pandemic is not because of a lack of technology or computer resources, since the U.S. is home to the largest technology companies in the world, but it is due to a lack of human resources: Cybersecurity professionals. In 2021 CNN published an article with the title: "Wanted: Millions of cybersecurity pros. Salary: Whatever you want". The article highlighted the increasing cyber attacks in the U.S. and the lack of cybersecurity experts to prevent these attacks, with over 300,000 cybersecurity job openings going unfilled. Fast forward to today in 2024, and the situation has only become worse. A few weeks ago (June, 2024), members of Congress raised concerns over the shortage of cybersecurity professionals, which has now grown to a half million open jobs that cannot be filled.

The WEF’s Partnership Against Cybercrime Wants to Eliminate Online Anonymity, Destroying Privacy

Of particular interest is the call by both FS-ISAC and the WEF Partnership against Cybercrime to specifically target cryptocurrencies, particularly those that favor transactional anonymity, as well as the infrastructure on which those cryptocurrencies run. Though framed as a way to combat “cybercrime”, it is obvious that cryptocurrencies are to be unwanted competitors for the soon-to-be-launched central bank digital currencies. In addition, as this report will show, there is a related push by WEF partners to “tackle cybercrime” that seeks to end privacy and the potential for anonymity on the internet in general, by linking government-issued IDs to internet access. Such a policy would allow governments to surveil every piece of online content accessed as well as every post or comment authored by each citizen, supposedly to ensure that no citizen can engage in “criminal” activity online. A major theme in these efforts has not only been an emphasis on global cooperation, but also a merging of private banks and/or corporations with the State, specifically intelligence and law enforcement agencies. In addition, many of the banks, institutions and individuals involved in the creation of these reports and simulations are either actively involved in WEF-related efforts to usher in a new global economic model of “stakeholder capitalism” or are seeking to imminently introduce, or are actively developing, central bank-backed digital currencies, or CBDCs. Of particular interest is the call by both FS-ISAC and the WEF Partnership against Cybercrime to specifically target cryptocurrencies, particularly those that favor transactional anonymity, as well as the infrastructure on which those cryptocurrencies run. Though framed as a way to combat “cybercrime”, it is obvious that cryptocurrencies are to be unwanted competitors for the soon-to-be-launched central bank digital currencies.  In addition, as this report will show, there is a related push by WEF partners to “tackle cybercrime” that seeks to end privacy and the potential for anonymity on the internet in general, by linking government-issued IDs to internet access. Such a policy would allow governments to surveil every piece of online content accessed as well as every post or comment authored by each citizen, supposedly to ensure that no citizen can engage in “criminal” activity online. 

New Smart Meters and 5G Technologies Can Be Used to Intercept All of Your Private Data

Will smart meters and 5G cellular services become a threat to the security of our computers and smart phones? Breaches in security from these new microwave technologies are quite possible. According to Bell Labs, the smart meter is actually the weakest element in the data security system used by utility companies. Security systems designed to prevent unauthorized use of smart meters would be very expensive, and utility companies do not have the resources to apply high security control over hundreds of millions of smart meters. This means that the likelihood of smart meters being hijacked and adapted for harmful purposes without utility company cooperation is high. Smart meters are definitely not secure air-gapped devices. Smart meters are designed to send and receive microwave signals and they perform that function well. If they can receive transmissions from the utility company and send responses, then they also could receive and respond to signals from unauthorized sources. Yes, I understand that smart meters use encryption systems, but I also understand that encryption systems can be circumvented by those with evil intent as was shown by Israeli researchers.