Tucker Carlson: "We're moving toward one of two endpoints."
"One is a totalitarian society, where... you have to obey, because you've got programmable digital currency and universal surveillance."
"Or, we're going to have a revolution."
"The current course won't work because it's a lie. If you tell people they own the government, they're in charge, they rule through the representatives in this democratic republic... and you don't deliver on it, they go crazy. They go totally crazy."
"If you tell people they can't say what they think, and their vote doesn't matter, how many options have you left for them?"
"Just one."
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin.
Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
The Verdict Against Meta and Google That Could End the Anonymous Internet
A Los Angeles jury found Meta and YouTube negligent in platform design, awarding $3 million to a plaintiff who experienced mental health issues, with punitive damages totaling $6 million.
This verdict could dismantle anonymous internet access by establishing a legal precedent for holding platforms liable based on their design, bypassing Section 230 protections.
The legal argument treats social media architecture (infinite scroll, algorithmic notifications) as a defective product, similar to a car without brakes.
If this verdict survives appeal, it provides a blueprint for over 1,600 similar cases nationwide.
Classifying social media as an addictive product could lead to government regulation, requiring identity verification and access controls for users.
Mark Zuckerberg testified that age verification should occur at the operating system level, managed by Apple and Google, rather than within individual apps.
This proposal, if implemented, would require identity verification for all smartphone users across all apps and websites, effectively ending anonymous internet access.
New legislation like California's SB 976 and the federal Kids Online Safety Act are moving towards device or OS-level age verification, mirroring Zuckerberg's suggestion.
Mandatory identity verification creates a significant risk of data breaches, potentially exposing sensitive personal information.
Anonymous and pseudonymous online speech is crucial for whistleblowers, dissidents, abuse survivors, and journalists, and OS-level ID checks would eliminate this protection for all users.

Reclaim The Net
The Verdict Against Meta and Google That Could End the Anonymous Internet
If the design-as-defect argument survives appeal, more than 1,600 similar cases waiting in courts across the country inherit a ready-made blueprint...
A systemd fork has set out as a fu*k you to age verification.
Liberated systemd is a fork of mainline systemd started by Jeffrey Seathrún Sardina, a machine learning/AI researcher who apparently had enough of where things were heading.
The project is straightforward about its purpose; strip out what it considers surveillance-enabling code, keep everything else intact, and stay in sync with upstream as it develops.

GitHub
GitHub - Jeffrey-Sardina/systemd: Liberated systemd -- no surveillance. Ever.
Liberated systemd -- no surveillance. Ever. Contribute to Jeffrey-Sardina/systemd development by creating an account on GitHub.

It's FOSS
Someone Forked Systemd to Strip Out Its Age Verification Support
The project removes the birthDate field systemd added last week in response to age verification laws.
USA FCC bans imports of new routers made in other countries, on national security concerns
The US Federal Communications Commission has just announced a ban on imports of "all consumer-grade routers produced in foreign countries," which would be... almost all of them, except that the rule only affects new routers that haven't yet received FCC authorization.
https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers
Last year, news broke that Government officials had been considering banning sales of TP-Link routers manufactured in China, ostensibly because of concerns that they could pose risks to national security. But the FCC's announcement goes much, much further by "prohibiting approval of new models" of any router manufactured outside the United States.
https://www.washingtonpost.com/technology/2025/10/30/tp-link-proposed-ban-commerce-department/


Liliputing
FCC bans imports of new routers made in other countries, on national security concerns - Liliputing
FCC bans imports of new routers made in other countries, on national security concerns
AWAKE: A Guide to Android Attacks and Exploitation
I found a really awesome resource - AWAKE: Android Wiki of Attacks, Knowledge & Exploits - essentially a one-stop shop for those involved in malware analysis, reverse engineering, and vulnerability hunting on Android.
It includes descriptions of attack techniques, exploits, and methods for analyzing APKs and the platform itself. It's aimed at analysts, reverse engineers, penetration testers, and threat intelligence researchers.
In other words, it's not just abstract theory, but a very practical reference with specific details. What I particularly liked is the "offense-first" approach. Everything is presented from the attacker's perspective, not the defender's. For those of us involved in mobile security analysis, this is exactly what we need: understanding how attacks work so we can know how to defend against them. And as a reference for our own research - it's perfect!
AWAKE
Android Wiki of Attacks, Knowledge & Exploits
It's an on-chain privacy scanner of #Bitcoin
I'd like to introduce you to a new tool called:
Paste an address or transaction ID and you'll get a score from 0-100 with specific findings.
Tags for 30 million addresses from over 650 entities have been included.
• It works from your computer, they don't store data
• No backend, no tracking.
• It can be used from TOR
am-i.exposed
am-i.exposed - Bitcoin Privacy Scanner
Is your Bitcoin traceable? Paste an address or txid - get a privacy score with 33 chain analysis heuristics. Free, client-side, no tracking.
Systemd Adds Age Verification & Reddit Linux Censors Age Verification Posts
Plus: Which Open Source Operating Systems plan to include Age Verification?
The Lunduke Journal compiles a list.
Does It Age Verify?
GitHub
GitHub - BryanLunduke/DoesItAgeVerify: The age verification status of Open Source Operating Systems
The age verification status of Open Source Operating Systems - BryanLunduke/DoesItAgeVerify
The Lunduke Journal
HEALTHEX announces a partnership with Microsoft to connect consumers "digital identity, comprehensive health records, and consent infrastructure" to power Copilot Health.
The Psychology of Tyranny
➡️ TLDR;
- Governments utilize psychological manipulation to influence thought, emotion, and behavior, often without explicit consent, by exploiting fundamental human needs like security and belonging.
- Twelve core psychological manipulation tactics identified include gaslighting, bandwagon effect, scarcity manipulation, framing and narrative control, guilt and moral shaming, FOMO, carrot and stick, othering, cognitive overload, authority bias exploitation, emotional priming, and desensitisation.
- Governments employ propaganda, fear-based messaging, nudge tactics, disinformation, censorship, and social credit systems as examples of psychological manipulation.
- The 'carrot and stick' approach combines rewards for compliance with punishments for non-compliance, seen in systems like China's social credit system and wartime rationing.
- Othering creates an 'us vs. them' dynamic by portraying a group as inferior or threatening, used in contexts like the Israel-Palestine conflict and anti-immigrant rhetoric.
- Cognitive overload overwhelms individuals with excessive or conflicting information, making them more likely to rely on authority, as seen during the Brexit referendum and COVID policy rollouts.
- Authority bias exploitation leverages trust in figures of authority to promote policies, often by suppressing dissenting experts, exemplified by tobacco regulation and climate policy endorsements.
- Emotional priming uses evocative imagery and rhetoric to trigger strong emotions, bypassing rational analysis, as seen in post-9/11 patriotism and atrocity propaganda.
- Desensitisation gradually exposes the public to controversial ideas or policies to reduce shock and resistance over time, observed in the normalization of drone strikes and surveillance expansion.
- Repeated exposure to psychological manipulation can alter brain function through neuroplasticity, potentially weakening critical thinking, increasing anxiety, and reducing autonomy, though recovery is possible through education and reflection.


The Psychology of Tyranny
How Governments Undermine Consent and Legitimacy Through Psychological Manipulation
❌ #fdroid security problems:
https://privsec.dev/posts/android/f-droid-security-issues
https://xcancel.com/GrapheneOS/status/1883895255142932816
https://xcancel.com/GrapheneOS/status/1497272529223917575
https://github.com/obfusk/fdroid-fakesigner-poc
https://m.youtube.com/watch?v=IAoCfrqx

GitLab
Sign in · GitLab
GitLab.com
GitHub
Issues · CatimaLoyalty/Android
Catima, a Loyalty Card & Ticket Manager for Android - Issues · CatimaLoyalty/Android

GitLab
Sign in · GitLab
GitLab.com

GrapheneOS Discussion Forum
F-Droid or Obtainium? - GrapheneOS Discussion Forum
GrapheneOS discussion forum
AI Can Now Easily Unmask Your Secret Online Life (Even If You Use a Fake Name)
Imagine this: You're on Reddit, Hacker News, or some forum, posting with a silly username like GamerCat2025 or SecretCoderX.
You think you are anonymous, and no one knows you and so you can freely express your thoughts.
Well, a brand-new research paper just blew that idea apart. It's called "Large-scale online deanonymization with LLMs" which is a fancy way of saying "figuring out the real person behind a secret online name".
Research: 

It's FOSS
AI Can Now Easily Unmask Your Secret Online Life (Even If You Use a Fake Name)
New study shows smart chatbots can figure out who you really are from just a few posts... and it only costs a couple of dollars.

arXiv.org
Large-scale online deanonymization with LLMs
We show that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker New...
🥸 Smart glasses detector on your mobile
Its author, a sociologist who programs as a hobby, devised an application after seeing how these accessories are used to record people without permission, and considers it a small gesture against constant surveillance.
The program checks the typical Bluetooth signals emitted by these devices and sends push notifications to alert.
It is now available and its code can be viewed openly. It may not be 100% effective depending on the environmental conditions, but it is a good advancement.
You can download it from the PlayStore here: https://play.google.com/store/apps/details?id=ch.pocketpc.nearbyglasses
and review its code on Github here: 
GitHub
GitHub - yjeanrenaud/yj_nearbyglasses: attempting to detect smart glasses nearby and warn you
attempting to detect smart glasses nearby and warn you - yjeanrenaud/yj_nearbyglasses
How Epstein Hijacked Bitcoin with Aaron Day
From the hijacking of Bitcoin to the passing of the GENIUS Act, a deep dive in the Epstein files reveals Epstein's fingerprints are all over the transformation of the global economy and our digital currency enslavement.
"The Hijacking of Bitcoin," his detailed and well-documented breakdown of how and why Epstein hijacked #Bitcoin


The Corbett Report
Interview 2005 - How Epstein Hijacked Bitcoin with Aaron Day | The Corbett Report
Aaron Day joins us today to discuss "The Hijacking of Bitcoin," his detailed and well-documented breakdown of how and why Epstein hijacked bitcoin.

Brownstone Institute
The Hijacking of Bitcoin
The original vision for Bitcoin was simple: digital cash, free from banks and government. However, Bitcoin is pushed as "digital gold."
Keep Android Open
During out talks with F-Droid users at FOSDEM26 we were baffled to learn most were relieved that Google has canceled their plans to lock-down Android.
Why baffled?
Because no such thing actually happened, the plans announced last August are still scheduled to take place. We see a battle of PR campaigns and whomever has the last post out remains in the media memory as the truth, and having journalists just copy/paste Google posts serves no one.
But Google said... Said what? That there's a magical "advanced flow"? Did you see it? Did anyone experience it? When is it scheduled to be released? Was it part of Android 16 QPR2 in December? Of 16 QPR3 Beta 2.1 last week? Of Android 17 Beta 1? No? That's the issue... As time marches on people were left with the impression that everything was done, fixed, Google "wasn't evil" after all, this time, yay!
While we all have bad memories of "banners" as the dreaded ad delivery medium of the Internet, after FOSDEM we decided that we have to raise the issue back and have everyone, who cares about Android as an open platform, informed that we are running out of time until Google becomes the gate-keeper of all users devices.
Hence, the website and starting today our clients, with the updates of F-Droid and F-Droid Basic, feature a banner that reminds everyone how little time we have and how to voice their concerns to whatever local authority is able to understand the dangers of this path Android is led to.
We are not alone in our fight, IzzyOnDroid added a banner too, more F-Droid clients will add the warning banner soon and other app downloaders, like Obtainium, already have an in-app warning dialogue.

Keep Android Open
Advocating for Android as a free, open platform for everyone to build apps on.

Keep Android Open | F-Droid - Free and Open Source Android App Repository
This Week in F-Droid TWIF curated on Friday, 20 Feb 2026, Week 8 F-Droid core During our talks with F-Droid users at FOSDEM26 we were baffled to le...

FOSDEM 2026 - Home

Alt-Sendme
Send files and folders to anywhere in the world without storing them in the cloud - any size, any format, without accounts and restrictions.
A free file transfer tool with open source code, using the capabilities of an advanced peer-to-peer network, allowing you to transfer files directly without storing them on cloud servers.

GitHub
GitHub - tonyantony300/alt-sendme: Send files and folders anywhere in the world without storing in cloud - any size, any format, no accounts, no restrictions.
Send files and folders anywhere in the world without storing in cloud - any size, any format, no accounts, no restrictions. - tonyantony300/alt-sendme
You can now run Fedora Atomic OS on your Android Smartphone and Tablet
A GitHub project called Pocketblue is providing Fedora Atomic images for mobile devices.
Pocketblue is an atomic system that relies on OCI, OSTree and Bootc technologies. System images are based on upstream atomic Fedora images (Silverblue/Kinoite) and are built and distributed as OCI containers.
NOTE: This is a work-in-progress project. During the installation process all data on your device will be wiped. Use at your own risk.
However, the only supported devices are the Xiaomi Pad 5, the Xiaomi Pad 6, and the OnePlus 6/6T. So if you have one of those just lying around, you can give this a try.
GitHub
GitHub - pocketblue/pocketblue: Fedora Atomic for mobile devices
Fedora Atomic for mobile devices. Contribute to pocketblue/pocketblue development by creating an account on GitHub.
Meshtastic ❌
MeshCore ✅
"Why We Abandoned Matrix
The Dark Truth About User Security and Safety"
https://forum.hackliberty.org/t/why-we-abandoned-matrix-the-dark-truth-about-user-security-and-safety/224
MetaRadar
This is a tool for monitoring the Bluetooth Low Energy (BLE) environment, designed to detect and track nearby Bluetooth devices, as well as to notify the user when a target device is detected.
The program allows you to scan, analyze, and track BLE devices within range, providing the ability to create flexible filters for searching for devices based on various parameters, such as device name, address, location, and detection time.
MetaRadar also performs a deep analysis of detected BLE devices, extracting data from available GATT services, and determines the type of device based on metadata, as well as the approximate distance to it.
The application works in offline mode and does not collect personal data or information about the user's geolocation, ensuring privacy and security.
The tool can also be useful for detecting surveillance of you
Lang: Kotlin

GitHub
GitHub - BLE-Research-Group/MetaRadar: A tool for BLE environment monitoring. Find and track Bluetooth devices around, and get notified when the target device is detected.
A tool for BLE environment monitoring. Find and track Bluetooth devices around, and get notified when the target device is detected. - BLE-Research...