8 Comments
User's avatar
Resistance Media's avatar

This is clearly reported and reasoned analysis.

Steve Prock's avatar

Time for amplified resistance. Since the regime is employing Agenic AI, the resistance will be overcome unless a resistance strategy calls for counter AI tools to negate the regime’s efforts.

Joe Parreira's avatar

Both the Biological Weapons Convention and Chemical Weapons Convention probably have restrictions in place for neuropeptides and neurotransmitters being used to incapacitate civilians and military but countries backing the conventions should meet to discuss banning them from being used in a psyop operation and making this an international crime under the Geneva Conventions.

G.V.'s avatar
7dEdited

I've appreciated this series immensely, it's helping my network with a lot of opsec planning and threat modeling. But... Brave, though...?

https://www.spacebar.news/stop-using-brave-browser/

The Resistance Sentinel's avatar

EFF has a nice tool you can use to see how well your browser does at blocking ads, trackers, and fingerprinting.

https://coveryourtracks.eff.org/

The Resistance Sentinel's avatar

I’d say it’s still better than using Chrome if you’re wanting a Chromium based browser. There are certainly better options, however, depending on your threat model. For example, if you’re really worried about browser fingerprinting, Safari on macOS or iOS is surprisingly good. Epic is also Chromium based and comes highly recommended by the privacy community. Firefox has also had its share of controversies, however, and how private it is will depend on your settings and additional extensions (eg Privacy Badger, HTTPSEverywhere, an ad blocker, etc).

https://en.wikipedia.org/wiki/Criticism_of_Mozilla_Corporation

In all cases, though, it’s not a matter of installing a browser (or any other tool) and then having privacy as a result. You have to understand and carefully configure its settings (like in Brave, don’t use the crypto features), take care when installing and using extensions, and practice good OPSEC (which is about more than tech used).