m5GTkSK14Usbusiness-insider-we-found-one-of-jeffrey-epsteins-black-booksBusiness Insider | We Found One of Jeffrey Epstein's Black Books...In 2021, Business Insider obtained a Jeffrey Epstein address book no one had ever seen before. This 1997 book predates Epstein's original "little black book" by at least seven years. The original book dates to 2004 and was published in 2015.
KIWlr4XGBisthoughty2-every-page-in-this-book-is-disturbingThoughty2 | Every Page In This Book Is DisturbingThe fact that the book was chained is not unusual for that time, many books were chained. Because of their immense value even then. The theft of just one book could have been a disaster for the monastery
A5XvjhJlI4Eformer-facebook-executive-exposes-alarming-failingsFormer Facebook Executive Exposes Alarming FailingsSarah Wynn-Williams reveals the secrets about the upper management of Facebook’s parent company, Meta.
Ruk34HfUT-shands-on-with-apples-new-macbook-air-and-mac-studioHands-on with Apple’s new MacBook Air and Mac StudioWe had a chance to play around with the new M4 MacBook Air and find out the answer to the real question, how blue is the sky blue?
FVFS8c__qSMsamtime-meta-responds-to-torrenting-pirated-books-for-aiSamTime | Meta Responds to Torrenting Pirated Books For AIMeta wouldn’t steal a car… but they might torrent pirated books to train their AI. How fun and legal!
bBa5TO_nBJ0facebook-illegally-downloaded-a-lot-of-booksFacebook Illegally Downloaded A Lot of BooksIn this video I discuss how Meta/Facebook has been illegally downloading dozens of terabytes of books from Z-library, Libgen, and other sources to train their AI models and what this might mean for the fictional book writing industry.
s1jhZwRsh2Mcursor-ai-for-laravel-hotel-booking-project-part-1Cursor AI for Laravel | Hotel Booking Project | Part 1I've tried Cursor for a month, and here's an example of one project step-by-step.
WyQ7z8BMwwkfern-how-hackers-stole-1000000000-from-banksFern | How Hackers Stole $1,000,000,000 From BanksThis is the story of one of the biggest bank robberies in history, committed by hackers.
L2Jud35UH14facebook-and-instagram-to-get-rid-of-fact-checkersFacebook and Instagram to Get Rid of Fact CheckersMeta is abandoning the use of independent fact checkers on Facebook and Instagram, replacing them with X-style "community notes" where commenting on the accuracy of posts is left to users.
NIai-060SH0metas-move-in-flooding-facebook-with-fake-usersMeta's Move In Flooding Facebook With Fake UsersMeta officials, including vice-president of product for generative AI Connor Hayes, makes a disastrous announcement over flooding the Facebook platform with the one thing it doesn't need, more AI generated fake users. John Iadarola and Abelina Sabrina break it down on The Damage Report.
Er1nb-4xHdEhow-hackers-take-over-computers-with-reverse-shellsHow Hackers Take Over Computers With Reverse ShellsIn this video I give a demonstration of how reverse shell can be used to take over a Windows 11 machine.
H6U4AtPfY7schinese-hackers-infiltrated-us-telecom-networksChinese Hackers Infiltrated US Telecom NetworksIn this video I discuss the Salt Typhoon hacking campaign which has affected more than 8 US telecom networks and is allowing Chinese hackers to spy on Americans text messages and phone calls. US authorities recommend using encrypted messaging apps to protect yourself until the issue can be resolved
mYvZV2nInvgchinese-hackers-have-infiltrated-at-least-8-us-telecom-companiesChinese Hackers Have Infiltrated 8 U.S. Telecom CompaniesThe White House said that a broad Chinese hacking operation had infiltrated at least eight American telecommunications companies and that none of them have managed to remove the Chinese hackers from their systems. Nick Schifrin reports.
xR5d4Ba4FZgfireship-top-g-andrew-tate-penetrated-by-lgbt-hackersFireship | Top G Andrew Tate Penetrated by LGBT HackersAndrew Tate's Hustler's University, aka The Real World, was recently attacked by an unknown group of hackers. Let's reverse engineer the tech stack and find out how the hack was performed.
Fg9hCKH1sYsbbc-news-hackers-expose-deep-cybersecurity-vulnerabilities-in-aiBBC News | Hackers expose Deep Cybersecurity Vulnerabilities in AIAs is the case with most other software, artificial intelligence (AI) is vulnerable to hacking.
y09zfZyZEXIwindows-11-snapdragon-x-elite-vs-macbook-pro-m3Windows 11 Snapdragon X Elite Vs MacBook Pro M3Today we have the M3 MacBook Pro and we will be comparing it to an Snapdragon X Elite Laptop running Windows 11 in this hands on review.
SWYTNsk5gqodid-this-ancient-egyptian-book-predict-the-futureDid This Ancient Egyptian Book Predict The Future?The Book of Thoth is said to have been written by the ancient Egyptian God of knowledge of the same name. It has had a strange, mystical impact on the thousands of years following its discovery. Some say it is a “book of spells” and some say it has already predicted the future.
Cn_Wa0QhFDkmyth-hunters-10-the-nazis-and-the-book-of-powerMyth Hunters | 10: The Nazis and the Book of PowerHeinrich Himmler sent his SS solders to locate a treasure so valuable to Nazi ideology that it must be recovered at all costs. The item they are searching for is an ancient manuscript, a perfect copy of a book written nearly two thousand years before in Rome which the Nazis call the birth certificate for the German race. The book is known as the Germania; for the Nazis it is the "Book of Power".
z3m7E8hQp9Mmyth-hunters-08-the-hunt-for-the-book-of-spellsMyth Hunters | 08: The Hunt for the Book of SpellsIt's one of the most influential books ever written. It's said to have inspired early Freemasons, to provide the wisdom behind the Tarot and to have underpinned a string of 20th century esoteric cults. Yet after years of looking for it nobody has ever found the original text.
C6L07VdZO4odanny-boomers-getting-tricked-by-ai-on-facebookDanny | Boomers Getting Tricked By AI On FacebookI’m part of a few crochet/knitting groups on Facebook, and the AMOUNT of AI generated crocheted/knitted projects posted that make everyone so envious and disheartened in the comments… like is nothing sacred anymore? We have to make the grandmothers of the internet feel inferior?
Gpztzf5i1Sohackers-leak-witcher-3-and-cyberpunk-2077-source-codeHackers Leak Witcher 3 And Cyberpunk 2077 Source CodeIn this video I discuss how a hacker group released the full source code and passwords to the archives for Cyberpunk 2077 and The Witcher 3.
WkLvpxImRGwmental-outlaw-how-facebook-intercepts-your-web-trafficMental Outlaw | How Facebook Intercepts Your Web TrafficIn this video I discuss how Facebook has been intercepting and decrypting your private data sent to apps that have nothing to do with Facebook over the years and how anyone else doing this kind of man in the middle attack would be facing prison time, but Facebook execs get special privileges.
sdidb7Z8IUcdisrupt-how-3-hackers-built-a-3-trillion-empire-2024Disrupt | How 3 Hackers Built a $3 Trillion Empire (2024)This is the true story of how hacking phone networks in the early 70's led to the founding of one of the largest companies on the planet. Alongside this story, there is a scandal in space with 3 other characters from the same time.
n84o7Ggw2Fwalien-abductions-in-the-book-of-enoch-and-the-search-for-noahs-arkAbductions in the Book of Enoch and the Search for Noah's ArkEnoch warned the Giants and the Watchers of the world. Repent or feel God's wrath... They ignored his warning.
fIMqeBNQuMgchatgpt-tool-could-be-abused-by-scammers-and-hackersChatGPT Tool could be Abused by Scammers and HackersA ChatGPT feature allowing users to easily build their own artificial-intelligence assistants can be used to create tools for cyber-crime, a BBC News investigation has revealed.
uD4ox32PQgsjohn-coogan-facebook-should-be-dead-by-nowJohn Coogan | Facebook Should Be Dead By NowDisclaimer: This video is purely my opinion and should not be regarded as a primary source.