06 August 2022

Puma Biotechnology data leak reveals link to Pfizer

MANY pharmaceutical corporations are deceitful during the best of times let alone during an alleged global crisis.

News media companies, some of which are called 'entertainment' (e.g. Nine Entertainment in Australia) can also be quite deceitful via omission of 'facts' or information to the public.

In a court ruling in the United States in November 2021, the drug that is used to medicate people cannot be technically called what the news media and authorities call it, as it does not confer immunity.

See link: https://constitutionwatch.com.au/the-covid-19-injections-do-not-confer-immunity-and-therefore-do-not-meet-the-definition-of-a-vaccine/

Did Australia's mainstream media inform you of this?

The corporation that is selling the drug in Australia, had to publicly disclose its 80,000 pages of documents, as ordered by a United States court.

See link: https://phmpt.org/pfizers-documents/

Did Australia's mainstream media draw attention to these documents?

Data shares are another important source of information, either by whistleblowers or other means.

On the 29th of July 2022, data from Puma Biotechnology was put online.


A quick search via your favourite search tool should show results that Puma Biotech. is not so squeaky clean, where they are involved with Pfizer who is supplying a drug to Australians.

Yet again the question is asked; Did Australia's mainstream media inform you of this?

It's quite clear that the information required for people to make up their own mind with regards to (unlawful) health directions by authorities is deliberately left out, where instead the focus is on an entertainer's buttocks.

Enough silicon to satisfy the current chip shortage by Kim K alone?

05 August 2022

How to stop Micro$oft from collecting your data during Win 11 installation

A Big EFF YOU to Microsoft and their data collection during a Windows 11 installation.

Google is no longer a 'search engine' company nor is Meta (nee Facebook) a 'social media' platform where they are both data collection corporations that sell data to governments and non-government organisations even AI processed data (yielding results like political affiliations, beliefs, demographic, etc) under the banner of advertising Goliaths

Similarly Microsoft is no longer an operating system manufacturer but rather a data collection giant, under the banner of a software corporation.

As the Windows version increases so does the data collection on the user.

With Windows 11 there is a way to 'force' the installation without the 'mandate' for a online user account.

With Windows 10 the process is much easier, where there is an option, where it's not immediately visible in Win 11.

See tutorial by JayzTwoCents:


There are also other products that preserve your privacy within Windows.

They are:

O&O ShutUp10++ : https://www.oo-software.com/en/shutup10

WPD - Privacy dashboard for Windows : https://wpd.app/

W0Privacy : https://www.w10privacy.de/english-home/


LinkedIn - The West's equivalent to China's social monitoring system

Some may be told that China's Social Credit System is bad and maybe even an isolated form of surveillance on the plebs.

The monitoring, cataloguing and grading of the corporate slaves in the West has been going on for decades, even before the internet going 'commercial'.

LinkedIn is just one 'public' social media platform where its database can (and is) used for nefarious reasons.

See explanation as told by Rob Braxman (odysee link) in the video of the title: Perils of LinkedIn:


It's all part of the 'Nanny State' agenda!

Apple's con job on irreparable AirPods

Apple is a deceitful corporation, which it should be charged for something called 'profiteering', anti-competitive behaviour or any other 'criminal' act under consumer law.

With regards to repairing (battery problem/charging port) AirPods, Apple stated:

"It's more economical just to swap the case out".

Is that factually true?

See ~10min video:



03 August 2022

Rogue T-Mobile store owner found guilty of illegally unlocking phones in $25 million fraud

"Illegally unlocking" - whatever that really means.

Your hardware, your choice.

Law made to the detriment of consumers, for the benefit of corporations.

See article:



A former T-Mobile store owner was found guilty of breaking into the wireless provider's internal system allowing the rogue businessman to unlock and unblock smartphones. The illegal activities took place from 2014 to 2019 when 44-year-old Argishti Khudaverdyan unlocked phones from T-Mobile and other carriers' networks allowing those buying the handsets to use them with other network providers.

The scheme took in $25 million in ill-gotten revenue for the defendant and his partner


This hurt mobile carriers, many of which give huge discounts or give away free phones to customers who agree to be locked into their networks for years. Khudaverdyan also unlocked phones that carriers had blocked after they were reported stolen or lost. The guilty verdict was announced by the Department of Justice in a press release from the U.S. Attorney's Office for the Central District of California. 


The 44-year-old, Khudaverdyan, who lives in Burbank, California, was found guilty last Friday of one count of conspiracy to commit wire fraud, three counts of wire fraud, two counts of accessing a computer to defraud and obtain value, one count of intentionally accessing a computer without authorization to obtain information, one count of conspiracy to commit money laundering, five counts of money laundering, and one count of aggravated identity theft.

Prosecutors said during the trial that the scheme generated $25 million in illegally attained revenue as removing blocks on these phones allowed them to be sold on the black market. Khudaverdyan unlocked handsets that had been locked to T-Mobile, AT&T, and Sprint's networks. He and a partner co-owned Top Tier Solutions Inc., a T-Mobile store in Eagle Rock Plaza, Los Angeles.

T-Mobile terminated the contract it had with Top Tier in 2017 because of Khudaverdyan's suspicious behavior and unauthorized unlocking of phones. He advertised his illegally unlocked phones through brokers, email, and websites including "unlocks247.com." While promoting the illegally unlocked phones, Khudaverdyan advertised them as being official unlocked T-Mobile phones.

Khudaverdyan will be sentenced on October 17th and could end up with a long stretch in jail


Unlocking these phones allowed T-Mobile customers to use other carriers costing the company revenue from service contracts and equipment installment plans. To access T-Mobile's internal computer systems, Khudaverdyan tricked T-Mobile employees by using phishing emails to trick them into revealing information. These fake emails looked so much like legitimate T-Mobile correspondence that the employees passed along their sign-in credentials allowing the convicted felon to break into T-Mobile's computers.

Khudaverdyan also elicited help from overseas call centers to receive employee credentials. Armed with this information, the bad actor then called the T-Mobile IT Help Desk to reset the employees' company passwords. This gave him access to the T-Mobile systems that he used to unlock phones. More than 50 T-Mobile employees had their credentials stolen and hundreds of thousands of handsets were unlocked during the years that this scheme was active.

Sentencing will take place on October 17th and Khudaverdyan will face statutory maximum sentences of 20 years in federal prison for each wire fraud count, 20 years in federal prison for conspiracy to commit money laundering, 10 years in federal prison for each money laundering count, five years in federal prison for each count of intentionally accessing a computer without authorization to obtain information, five years in federal prison for the count of accessing a computer to defraud and obtain value, and a mandatory two years in federal prison for aggravated identity theft.

His partner and co-defendant, Alen Gharehbagloo, 43, of La Cañada Flintridge, already pleaded guilty on July 5th to to three felonies: conspiracy to commit wire fraud, accessing a protected computer with intent to defraud, and conspiracy to commit money laundering. He will be sentenced on December 5th.

Source:phonearena.com

31 July 2022

Gov data storage model a blueprint for disaster


It's not a matter of if, but rather when your data will be breached.

Then, will you be notified of the breach or will the government hide this fact when it occurs, as they usually do, irrespective of the so called law in place.

Governments are pushing/forcing/enticing people more and more to conduct business via online methods rather than the tried and tested paperwork way.

One of the most important factors is the easier and more cost effective way of administering the serfs, at the expense of security or privacy of course.

After all, it's not the person's in government personal data that will be on the deep web but rather their 'customer's'.

The government's current 'blueprint' for computing devices is to have Microsoft's OneDrive as a storage facility in who knows which country's servers.

Instead of hosting the data locally and being in control of it right here in Australia, the I.T management buffoons have opted to 'outsource' data storage.

Maybe today it's not such a bad choice, considering the low quality 'engineers' employed by various Australian government departments as reflected in the cheap labour cost to taxpayers.

In any event, it is recommend to resist all invitations to participate in online business transactions with businesses such as the tax office, health care or social security.

A disaster in the making no thanks to the cost cutting efforts of your 'slaves' the people in the 'public service'.

See link to above screenshot at:

https://desktop.gov.au/blueprint/client-devices.html

Hardening Microsoft Windows 10 according to the Australian Signals Directorate

If you're running Microsoft Windows 10, it is a deliberately design data leaking platform, with privacy not on the menu.

The way to deal with his is via a method called 'hardening' of the operating system.

There are a variety of ways to do this, either via tutorials or privacy focused apps that do all the hard work for you, where it's as easy as the click or a software toggle switch.

Here is one way recommended the Australian Government's Australian Signals Directorate (ASD):


See original document within the link:

https://www.cyber.gov.au/sites/default/files/2021-10/PROTECT%20-%20Hardening%20Microsoft%20Windows%2010%20version%2021H1%20Workstations%20%28October%202021%29.pdf

Please note we do not recommend the purchase or use of Microsoft Windows products by rather Linux variants.