14 June 2024

A National Disgrace! EXPOSED – The false agenda of male oriented domestic violence

Another false agenda is in play by the governments and ‘supported’ by the mainstream media.

The allegation that a ‘shocking’ amount of women die in the hands of their current (male) partner or (male) ex-partner.

See the following video for explanation:

13 June 2024

Google is evil, lies on its search algorithm - massive leak REVEALED!

Governments and corporations lie to us, the people / consumers / their products, every single day, period.

Even if caught, their 'brethren' in government will sort it all out for these deceitful people in corporations.

Google is not what it used to be since its inception, where today it's one of the world's largest advertising corporations.

It's also the world's largest copyright breachers, but zero action/fines etc are handed out but rather easy targets are singled out, the being person from the general population pool, but that topic is outside the scope of this article.  

Governments also benefit hugely from Google as it is within the top tier spy network, that being the Five Eyes.

Google literally cannot be touched by the law.

Google had a massive data leak, on the technical ins and outs of its search algorithm.

Around 2,500 technical documents detailing the nuts and bolts of Google's ranking algorithms have apparently leaked. If the documents are real, it's an unprecedented look into the workings of the utterly dominant internet search engine. And one hell of an error, because it is stated that Google itself published the documents to GitHub before taking them down. But nothing published to the web disappears overnight, and the documents have been kept for posterity elsewhere.

This leak provides an interesting opportunity to compare the reality of how Google ranks its search results with the various claims the company has made about what has hitherto been largely a mysterious black box. The inner workings of Google Search have long been speculated upon but never really known outside of the company itself—or indeed inside the company by most Google employees.

The documents were shared with long-time SEO specialist Rand Fishkin by Erfan Azimi, an SEO advisor at EA Eagle Digital. Azimi says he shared the documents in the hope that they would reveal the "lies" propagated by Google in relation to its search platform.

That is obviously a very, very bold claim. Frankly, the documentation is incredibly dense and technical and covers a huge array of topics and systems. In really broad brush terms, it covers the type and character of data Google collects and uses, which sites Google elevates for sensitive topics like elections, how Google handles small websites, and much, much more. 

There are various areas where it's claimed that analysis of the documents throws up clear contradictions with Google's claims. For instance, in 2016 Google Search engineer Paul Haahr said that "using clicks directly in rankings would be a mistake."

But it's claimed the documents prove that Google uses a system known as NavBoost that directly incorporates various click count metrics into the page rankings and search results.

Other areas highlighted in contradiction to previous Google claims include the use of Domain Authority, sandboxing new websites while more data is collected, including user data collected from the Chrome web browser and more.

If these claims are all true, it's hard to be clear how much of this comes down to Google simply wanting to protect its search IP from potential competitors and how much can be chalked up to more cynical or even sinister motives.

Moreover, as far as we can tell the documents do not actually reveal exactly how Google currently ranks pages. In other words, it does not appear that this leak will make it straight forward to optimise a web page to improve Google search ranking, which is what a lot of observers would presumably have been praying for.

But if the documents are real, and the claims being made about the implications contained therein are broadly accurate, at minimum Google has a pretty major scandal on its hands in terms of the statements it has made in the past and its corporate credibility and ethics.

For now, that's a pretty big "if". This is a story that won't be resolved overnight. As far as we are aware, Google has yet to comment whether the documents are real let alone provide a riposte to the main critiques that have followed.

No doubt Google is formulating a detailed response as we write these very words. But we have a feeling that won't be the end of it and the full fall out from this alleged scandal will be measured in months if not years.

Google cannot be trusted, and your data in the possession on it servers is neither private nor confidential.

IF you value your privacy it is not recommended to use Google products.

See more within the following links:


or if video is your preferred source:

12 June 2024

Human Rights abuser Daniel Andrews ‘Companion of the Order of Australia’ award must be revoked!

You know the system is rigged when a Human Rights abuser, a man with over 800 deaths under his belt gets an ‘award’ or do you?

Maybe the ex Victorian premier Daniel Michael Andrews served his masters, the ‘faceless men’ well, you know one for team NWO, hence the award.

His order for Victoria Police to carry out shocking and horrific violence against the general population was unlawful, and Daniel Michael Andrews never saw court time for this.

The ex premier’s order to lock up the residence in North Melbourne public housing, with medical or food rations was Human Rights abuse, yet again he never saw any court time.

um, yes they do

The fact that Victoria Police acted under dictation is also unlawful, something the courts did not punish the police for.

Personally in a criminal act of a hit and run on a bicyclist, where his wife was 'allegedly' behind the wheel, Andrews again never saw any court time.

Andrews lied through his teeth regarding that accident, with zero repercussions.

A secret Patient Care Report developed by the paramedics who attended the crash scene was recently unearthed, revealing the teenage rider was struck by the Andrews’ Ford Territory.

“There needs to be a forensic analysis of the damage to the car and to see whether what’s said by both sides is consistent,” Mr Glare told Sky News host Andrew Bolt.

The ‘brotherhood’ irrespective of being Anglo-Masonic, Fabian or other looks after itself.

Daniel Michael Andrews is a well supported thug and an ‘alleged’ criminal that cannot be touched by the law, basically meaning he is literally above the law.

That’s life in a colony.

09 June 2024

Australian health businesses advertising health information from global corporations?

It is quite clear that society is manipulated by corporations, which also have an influence in the law-making process, where that is a significantly in-depth topic beyond the scope of this article.

The health industry, from government health ‘care’ to private hospitals, dentists, doctors etc are literally businesses, i.e places that exist for the generation of profit.

You are nothing more than a 'customer' to them, where best business practice is that you become a repeat customer, dependent on the products. 

Across different health businesses in Victoria, advertisements or health advice is not printed from local health authorities, e.g. Victoria’s ‘Department of Health', nor an internal health business, like the Australian Medical Association, nor maybe even the federal health minister but rather a global corporation, in particular that being the World Health Organization (WHO).

If the people are going to be taking instructions from a global organisation, then surely there is zero need for any so called health ‘authority’ to exist in Australia, right?

So, taxpayer’s funds are being wasted on useless institutions, which harvest ‘money for mates’ jobs, where the funds could be better spent on infrastructure and utility projects instead or just welfare for low quality immigrants which is the global trend now.

Australia is a top-heavy oligarchical totalitarian state, but Australians are more than accepting of this, as if they weren’t then they would do something about it.

Stockholm syndrome at its finest.

07 June 2024

3G Network shutdown, governments useless and media silence

The colony’s governments state and federal, are deliberately useless on many fronts, where all that is of concern is how much they can get away with, ripping off the general population.

MANY in the Information Technology and Communications industry have been aware of the 3G telecommunications network shutdown, especially those in government, as they too are a party to this action.

So what do they (the governments) do about it?

In typical colonial fashion, NOTHING.

What are they doing about the fallback?


What are they doing about the stranded customers / 'consumers'?


What are they doing about the huge e-waste?


Local federal politicians? USELESS!

Communications Minister? USELESS!

Another day, another bunch of f**king useless politicians getting their high payed salaries for little benefit to the community.

Not that one is to rely on the mainstream media for ANY sort of tech news.

Better to get your tech fix from plenty of good independent resources from the internet.

In any event see an email on this topic:


05 June 2024

End Violence Against Women Now - Corrupt Cops Push Falsified Government Agenda!

The colony's governments, that being federal and state have many false agendas in play against the good people of Australia.

'Investigative' journalists are no longer within the mainstream media, but rather agenda promoters or Ctrl-C and Ctrl-V keyboard monkeys.

There is a nefarious agenda in action at the moment, that being against men, i.e. an alarmingly high number of women are being murdered in the hands of men, from the general population pool.

Somewhere in some statistics pool, last year's figure was 60, where they use 'shock tactics' that half way through this year the figure is at an alarming 30, but in reality mathematically/statistically so far, it's the same. 

Another figure that is 'falsified' or the same shock tactics used is the road toll, but that topic is outside the scope of this article.

There is an eerie silence on how male police officers commit domestic violence against their spouses, a topic not in the benefit for government to expose.

In any event the following video shows how corrupt police 'support' this false agenda.

Every cop that you see talking in this false advertising campaign is a sellout.

There is no "community crisis" but rather another government sponsored LIE.



04 June 2024

Corrupt cop Simon John Blackney 51, protected by government funded by taxpayers

One of the 'perks' of living in a colony, especially if you're corrupt and part of one of the three arms of government that being the Parliament, Executive or Judiciary you get the protection from the 'brotherhood' at the expense of the taxpayers, brilliant!

There should be a law where police accused of criminal conduct must pay for their own defence, but there isn't.

Maybe then this would help to stamp out rife corruption within Australia's police forces.

The system is not broken, it's functioning perfectly the way they designed it.

Also, the current 'trend' by media and government is to focus on domestic violence, specifically male centered, within the general population pool.

The real problem is far worse that is being hidden from the general population, that being 'domestic' violence by male police personnel on their female spouses.

The rate 'per capital' is much higher within the colony's police forces than what is portrayed within the general population.

In any event, when a serf does a similar crime as Simon John Blackney, that person's face is plastered all over the media, where you will notice that there is deliberately no photo published in any article on Blackney by the mainstream media.

See print article:

02 June 2024

Global Surveillance Network: 5 Eyes, 9 Eyes, 14 Eyes

When it comes to picking the right VPN provider, jurisdiction is important.

By jurisdiction, that means where the company providing a VPN is actually based, and not where its servers are located, but that matters too.

This is crucial for a number of reasons, but the major issue is state surveillance

You may not be aware of it, but security agencies in most developed nations have the ability to snoop and monitor almost everything you do. And they use these powers to the full, as the NSA scandals showed. 

It would be naïve to think that VPNs are immune to their intrusive activities.

5 Eyes alliance

The full five eyes list includes:

It emerged from the UKUSA security agreement, signed in 1946, and has been updated for the digital age. The idea behind the agreement was to ensure that Cold War allies could share SIGINT (signal intelligence) seamlessly. And the treaty also sought to keep this information sharing under wraps, remaining secret to the public until 2005.

Nowadays, the core aim of the alliance is to monitor their citizens’ online activity. And if certain laws prevent one member from digging into its peoples’ internet escapades, they can just ask another Eye to do the dirty work for them. The UK was found guilty of just that – asking the NSA to provide any data they pulled about United Kingdom residents.

Why was the 5 Eyes agreement kept hidden from the people? Well, we still don’t know the full story and the true scope of information gathering carried out under the terms of the alliance. But the implication is that the USA and its allies were engaged in detailed surveillance and intrusive activities which electorates would find controversial.

It very likely included the use of ECHELON, STONEGHOST, PRISM, and various other surveillance systems, which tapped into electronic communications across the world.

Do the 5 Eyes nations work alone?

If the intrusive operations permitted by the UKUSA treaty were the only global surveillance network, life would be easier for many spying-wary citizens. However, the core alliance doesn’t operate on its own. It has also gathered a series of satellite partners, that supplement its intelligence-gathering capabilities:

Israel operates hand in glove with the US government, providing and requesting security information on individuals of interest. It also has a thriving tech sector where cybersecurity is a major growth area. So users should be cautious about using Israeli VPNs.

Other partners include Asian nations like Singapore, Japan, and South Korea. All of these countries came under the US sphere of influence during the Cold War, and retain intelligence sharing systems with Washington. The same applies to British Overseas Territories like Bermuda or the Cayman Islands.

9 Eyes alliance

Here’s the full 9 Eyes list for reference:

Essentially the 9 Eyes network is an extension of the 5 Eyes group, and there is a debate about how formalized its structures are, and how powerful it is.

The main reason we are having this debate is down to one man: Edward Snowden. When he went public with his revelations about the NSA back in 2013, Snowden lifted the veil from the NSA’s global surveillance structures, confirming the existence of the 5 Eyes list.

What’s notable is that the 9 Eyes, and by extension the 14 Eyes, don’t have the same privileges as the 5 Eyes. Not all information collected by 5 Eyes members is available to the rest of the group, but the core nations are privy to all data gathered by the rest of the alliance countries, including satellite partners.

According to Snowden, the original 5 Eyes are not supposed to target each other. So, there should be no wiretapping by the USA of UK government meetings, and Australian ministers should be free to use the web without their activities being logged by the NSA. But that doesn’t really apply to other members.

14 Eyes alliance

As with the 9 Eyes countries, the 14 Eyes list includes:

This alliance also emerged directly from the Cold War and NATO structures, being christened the “SIGINT Seniors Europe” grouping. But it is much more loosely integrated into the circuits of global intelligence sharing than countries in the core alliance.

In fact, this has led to some friction, with Germany demanding greater access to intelligence data. In 2015, allegations emerged about the NSA spying on German government meetings, so it’s easy to see why they would want the protection from mutual spying that being in the 5 Eyes provides.

However, the core nations have sought to protect their privileges, leading some of the 14 Eyes countries to go their own way. In August 2018, the Germans announced a major new cybersecurity initiative along the lines of America’s DARPA, with the aim of establishing digital independence from the USA/UK.

Recent years have also seen the rise of “Pirate Parties” in nations like Sweden, which prioritize digital freedom and privacy, making governments less inclined to strengthen their ties to bodies like the NSA.

Surveillance systems used by the Eyes alliance

Naturally, this alliance has numerous ways to spy on people. And we only know about a fraction of systems used to monitor and gather citizen information. Here are a few that received media attention, bringing them to light.


This surveillance program was originally created in the 1960s to spy on the Soviet Union and its Eastern Bloc allies by the signatory states to the UKUSA Security Agreement. Now, they are the core 5 Eyes countries, and ECHELON has greatly expanded beyond the original scope.

According to the documents leaked by Snowden, ECHELON’s systems are capable of eavesdropping on telephones, faxes, computers, emails, bank accounts, and so much more. And the computers used for this purpose can store millions of records about individuals.


USA-led surveillance program the NSA uses to request user data from technology and telecommunication companies. Such information includes essentially anything that is passed over the company’s network. We’re talking about emails, chat logs, photographs, documents, videos, etc.

The confirmed companies participating in PRISM are:

  • AOL
  • Apple
  • Dropbox
  • Facebook
  • Google, YouTube
  • Microsoft
  • Paltalk
  • Skype
  • Yahoo!

As of today, the true extent of the PRISM program is still unknown.


Another NSA-led program that allows surveillance in real-time and the agents intercepting your communications don’t require a warrant to do so. With XKeyscore, they can parse through metadata, emails and the content on them, VoIPs, browser history, and any other internet activity associated with a person.

It shouldn’t be surprising that the 5 Eyes countries have access to these surveillance databases.

All eyes on VPN: using VPNs based in alliance member states

How do the 5 Eyes countries relate to VPN users?

In recent years, 5 Eyes governments have passed numerous laws which should concern VPN users.

For instance, the UK’s Investigator Powers Act empowered GCHQ to collect the following:

  • Data on users’ browsing habits
  • How long users spend connected to certain sites
  • Users’ SMS messages

These nations have also beefed up their powers to force Internet Service Providers (ISPs) to hand over data regarding individual users, again using national security as an excuse. And ISPs have tended to comply, adding backdoors when asked which allow security agencies to access the flow of consumer data.

Most importantly, governments have recognized the increasing usage of VPNs and taken steps to neutralize the threat they pose. Experts now generally advise users to avoid companies based in 5 Eyes nations and to exercise caution when using servers located in these nations.

Are worries about the Five Eyes countries exaggerated?

While the intelligence-gathering abilities of Washington and GCHQ are formidable, they are generally focused on specific security threats and interests, not everyday web users.

    • For many of us, government intrusion is less worrisome than the threat of cyber-crime and theft, and your VPN jurisdiction doesn’t matter too much when facing down these threats.
    • Secondly, the 5 Eyes countries haven’t taken direct steps to regulate VPNs. Their efforts are focused more on ISPs and conventional traffic, along with cellphone networks. VPNs currently have very few requirements regarding data retention. If they state that they keep logs (or fail to make it clear that they don’t), that’s their decision, not the state’s.
    • VPNs based in 5 Eyes nations also tend to be transparent about their identity and how to reach them – in keeping with the regulatory environment in places like the UK, Australia or Canada. This needs to be balanced against non-5 Eyes operators, who can sometimes be very hazy about who they are, and how they work.

So there’s room to question how dangerous the 5 Eyes is when choosing a VPN jurisdiction. But bear in mind that we simply don’t know the full scope of how VPNs interact with bodies like the NSA, and given the past history of governments, there’s a decent chance that VPNs in 5 Eyes countries have working relationships with spooks.

Should you worry if your VPN jurisdiction is on the 9 Eyes list?

Here’s another area where things get interesting. On one hand, third parties on the 9 Eyes list tend to have less intrusive surveillance agencies than the 5 Eyes. So they should be more trustworthy as hosts for VPN providers. And plenty of VPNs have set up in these countries, such as GooseVPN (in the Netherlands) or ActiVPN (in France).

However, if you scroll through a list of the world’s most trusted VPNs, you’ll probably notice that many aren’t based in 9 eyes countries. The same security concerns apply to 9 Eyes jurisdictions as to those in the five eyes list. VPNs located in places like Norway or France are liable to be subpoenaed by the FBI or other agencies, forcing them to either release logs or hand over encryption key data.

Of course, you need to bear in mind that the risk is low for everyday users, but if you are using a VPN for sensitive business or political communications, the 9 Eyes alliance is just as perilous as the core 5 Eyes nations. In fact, given that the 5 Eyes nations have an agreement not to spy on each other, there may be a higher probability of VPNs in third party nations being compromised.

As with 5 Eyes nations, this tends to lead experts to advise those in need of the best possible security protection to avoid a VPN jurisdiction in the 9 Eyes network.

Is it dangerous to use a VPN based in 14 Eyes countries?

The answer to this question is exactly the same as with the other alliances. Yes, it tends to be riskier to use VPNs based in 14 Eyes countries than those outside the alliance.

There have been cases of these informal information-sharing networks being used to issue DMCA notices from US-based corporations, targeting file-sharers in other jurisdictions. And anyone in a 14 Eyes nation can expect the same kind of intrusion from state surveillance agencies, making them dangerous for transmitting sensitive information.

In general, 14 Eyes countries will be slightly more autonomous where privacy is concerned than their partners in the core alliances. And for ordinary users, the risks are small.

Should I use a VPN based outside the 14 Eyes list?

By now, you’re probably asking yourself whether you should always look for VPNs based outside the 14 Eyes umbrella. There are certainly plenty of good reasons to do so.

Most importantly, VPNs located outside the core nations will be much more tightly protected against legal challenges and state surveillance originating in the USA. So if you intend to work around geo-blockers or torrent large amounts of data, they could be the right option to go for.

This is especially important if you are worried about protecting personal communications from the eyes of the state. If privacy is your major concern, choosing a VPN jurisdiction outside the 14 Eyes is essential.

So, where should you look? Given that the world now has over 200 nations, there shouldn’t be any lack of contenders. Several things you should pay attention to while picking a VPN provider:

  • Jurisdiction. Ideally, the VPN is based outside the influence of the 14 Eyes alliance, including the satellite nations. Such services won’t be forced to collect or hand over any user data. Furthermore, they aren’t required to comply with data requests dished out by other countries.
  • Audited no-logs policy. Any service can claim to have a no-logs policy they adhere to, but where’s the proof no data collection is happening behind the scenes? Here’s where independent audits done by reputable third parties come into play. And better yet if you can view audit documentation and results yourself.
  • Any past controversies. Many VPNs with “strict no-logs audits” have cooperated with governments in the past, like Riseup, HMA VPN, and such. A little digging around with Google helps reveal services that you shouldn’t trust from the get-go.

Generally, VPNs in countries like Switzerland or Panama will deliver enhanced protection against snoopers, especially if they offer techniques like “multi-hop” transmission. So when choosing your next VPN, take jurisdiction into account. It’s a key part of ensuring online security, so it pays to keep your eyes open and exercise caution.

Other online privacy measures to consider

With so much data and our lives being shared on the web, you should think about minimizing how much you share of yourself online. We recommend:

  • Pseudonyms and anonymous mail. Anonymous mail services encrypt your emails and usually don’t contain any information that could be traced back to you.
  • Privacy-friendly browsers. Most web browsers like Chrome and various others that run on Chromium collect your browsing data for marketing purposes. Switching to a secure browser helps solve this. The most popular choices include Brave and Tor.
  • Encrypted messaging apps. Not all messaging apps that utilize end-to-end encryption protect your metadata or abstain from collecting other identifiable data. (WhatsApp is notorious for this). There are better alternatives, like Telegram or Signal, that do not participate in such practices.
  • Just don’t overshare. While it might be tempting to post the latest vacation photos on Instagram or share life updates on Facebook or Twitter, is it really worth it? Any kind of personal information you put on the internet stays there forever. And it’s easy pickings for any entity (government or not).
What is also important is who owns your VPN.

When it comes to the true ownership of various VPN products and brands, it’s crucial to know which company owns or operates the users’ data. There are two big possible issues to consider.

1. Data privacy

If the parent companies are actually located in Fourteen Eyes countries, which are typically high-surveillance countries, users’ data could be wide open to the governments.

Suppose they are in Russia, China, and other authoritarian or repressive regimes. Then, the governments force them to provide data on a default basis (we discussed this in our Chinese surveillance analysis). The parent company may also be willing to sell user data.

In 2019, US senators planned an investigation into the foreign servers used to redirect traffic when using a VPN. Senators Marco Rubio (R-FL) and Ron Wyden (D-OR) noted the following [pdf]:

“If US intelligence experts believe Beijing and Moscow are leveraging Chinese and Russian-made technology to surveil Americans, surely DHS should also be concerned about Americans sending their web browsing data directly to China and Russia.”

For ultimate safety, a VPN shouldn’t operate in any of the 5, 9, or 14 Eyes alliance countries. A privacy-friendly jurisdiction means there’s no push to collect your data or what you do while the VPN is turned on. As such, locations like Panama, Switzerland, The British Virgin Islands, Romania, and so on, are what you should look for. If you want the best VPN service tucked away from the clutches of the Eyes alliance, we recommend getting NordVPN, now 74% off.

2. Data security

If the owning company is untrustworthy, it could bring up many problems. We’re talking about parent companies with major vulnerabilities or even suspicious add-ons and possible phishing emails with malware. This could lead to stolen data user data or even hacked computers.

This is especially applicable if you’re entrusting yourself to free VPN brands. We understand the appeal, but, ultimately, they aren’t worth it since you’re paying for these services with your data instead. In fact, numerous costless VPN providers have been caught collecting various information about their users.

Let’s take Betternet. They promise utmost privacy and security, yet what’s actually happening behind the scenes couldn’t be further away from it. The company behind it was busted for logging and selling user data to third parties, as well as embedding third-party trackers into its VPN Android app.

Another example is Hola VPN. For them, stealing and reselling your bandwidth is fair game. And the VPN itself isn’t really a private virtual network, but rather a P2P network. Here, the user itself is the endpoint other people connect to, meaning strangers are cloaking themselves in your IP address. If they do something that’s illegal, you’re the one who’s going to get busted for it, not the actual perpetrators.

Whatever VPN you choose, make sure you know it's current place of business and the country's current law with regards to privacy, as changes to the law are getting worse and worse with regards to your privacy.

31 May 2024

Government lies, MediSecure cyber attack "isolated"

People in government lie to the plebs every single day, period.

Catching them out is sometimes easy, other times more effort is required.

Governments and corporations dot not care about your data, but rather what it costs them, the department where 'liability' is not part of any equation, where maybe if they had to pay damages to their clients then the story would be different.

Australia's cyber security chief says the latest online ransomware attack is an "isolated" incident and that no other entities were impacted.

She then states that an investigation is underway to determine whether identity documents and Medicare cards were compromised, with affected customers to be notified if that is the case.

If that's the case then she cannot state that the attack was "isolated", because they'd know that  no other entities are involved.

As one should also know that 'lies by omission' is another common tactic by those in government.

Realistically, she's not qualified for the job, like many in government.

What's next?

Apparently, Australians are told to take basic precautions against cyber attacks, like updating their software and using complex passwords which has nothing to do with this attack where a so called complex password is useless in the event of a data breach.

The reality is that many corporations and government departments have truly useless I.T staff or outsourced those services to monkeys on keyboards, where the ultimate price is paid by the customer where their data is breached.

How many "isolated"  data breach notification have occurred in the health industry in 2024 until the end of May, and where?

MediSecure – May 2024

  •     OAIC releases statement on MediSecure data breach

Unnamed Australian Healthcare Organisation – May 2024

  •     NCSC warns of “large-scale ransomware data breach incident” at Australian healthcare org

Monash Health – May 2024

  •     Monash Health caught up in ZircoDATA ransomware data breach

SSS Australia – April 2024

  •     SSS Australia falls victim to Hunters International ransomware gang

Ambulance Victoria – April 2024

  •     Paramedics’ mobile numbers ‘exposed’ in data breach

Diabetes WA – April 2024

  •     Diabetes WA reveals data breach
  •     Diabetes WA is the latest hacked Australian healthcare organisation

Royal Australian College of General Practitioners – March 2024

  •     Phone numbers, education details stolen in RACGP cyber security breach

Canberra Medical Centre – January 2024

  •     Patient data hacked at Canberra medical centre

Quantum Radiology – January 2024

  •     Hacked Sydney radiologist instructs staff to tell customers hack was a technical fault

A total of 9 out of a reported 69 cases by Webber Insurance.

27 May 2024

Governments & corporations using Microsoft ‘Recall’ (Spyware), a major security, privacy threat!

Your ‘private and confidential’ data that is stored on government and corporation’s computer systems is NEVER safe from being hacked or ‘leaked’, period.

Anyone saying otherwise is simply lying to you.

Microsoft is using terms like ‘encrypted’ and stored locally, to make you feel better, but it’s all smoke and mirrors.

Your data within corporations like tax institutions, banks or telecommunications providers will be captured by Microsoft, including passwords and other personal details, only to be extracted at a later date regardless of 'encryption'.

Whatever Terms & Conditions you agree to in using Recall will change at a later date where the user will not have any control over the software or where the data goes.

Another attack on privacy led by the corporations within the FiveEyes global surveillance network.

An action that is part of the global Nanny State agenda.

If you are truly concerned about your privacy (and security) then Microsoft, Apple and Google et al products are not recommended to be used.

Instead Linux, LibreOffice and ‘De-Googled’ smart-phones offer more privacy.

See some videos on the topic from tech experts:

Should you switch to Linux from Windows? Know this first!

See also:

Does Microsoft really spy on you?