PostsCommentsPayoutsfqdd7l32brrw (39)in #dtube • 5 years ago#425 Friends in Need, The Final Solution, and the war against the MustacheStreamed live on Jan 22, 2019 by Owen Benjamin on YouTube. Regarding Eric Nimmer's false military service record.…fqdd7l32brrw (39)in #news • 6 years agoFaceBook is Melting Down over WhatsApp and Election Interference | Encryption and Freedom of SpeechThe FaceBook War Room Has No Control Over WhatsApp Although FaceBook has a "War Room" dedicated to prevent "election…fqdd7l32brrw (39)in #dlive • 6 years agoD E E P H O U S E | Morning Mixdeep house live mixing My live stream is at DLivefqdd7l32brrw (39)in #dlive • 6 years agoMorning HouseDeep House Mixing My live stream is at DLivefqdd7l32brrw (39)in #dlive • 6 years ago#QAnon Twitter Networks | Data DecodingWas bringing #QAnon to Twitter a good plan? Let's see what the Twitter API shows. My live stream is at DLivefqdd7l32brrw (39)in #technology • 6 years agoOperational Rules | The Rules Part 6 (Final)The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and…fqdd7l32brrw (39)in #technology • 6 years agoOperational Rules | The Rules Part 5The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and…fqdd7l32brrw (39)in #dlive • 6 years agoSecure Browsing with ChromeDemo of how setup Chrome for safe and secure browsing My live stream is at DLivefqdd7l32brrw (39)in #technology • 6 years agoOperational Rules | The Rules Part 4The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and…fqdd7l32brrw (39)in #technology • 6 years agoOperational Rules | The Rules Part 3The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and…fqdd7l32brrw (39)in #technology • 6 years agoOperational Rules | The Rules Part 2The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and…fqdd7l32brrw (39)in #security • 6 years agoOperational Rules | The Rules Part 1The Rules for Secure Operations These are not mine, this is a compilation of knowledge over years of experience and…fqdd7l32brrw (39)in #dlive • 6 years agoTest StreamTesting dlive in various modes My live stream is at DLivefqdd7l32brrw (39)in #technology • 6 years agoBasics of OPESEC | Keep your mouth shut.The Basics of Operations Security (OPSEC) If you’re happy with your security, so are the bad guys. Operations…fqdd7l32brrw (39)in #technology • 6 years agoStay Anonymous Using Tor | Correlation DNS and EncryptionStaying Anonymous Using Tor 4 examples of people who have used Tor for illegal activities and how they were caught.…fqdd7l32brrw (39)in #qanon • 6 years agoBakerAnon QAnon Leak Full Text | QAnon Baker Leaks to Lift The VeilBakerAnon Leak Email: Full Text This is the full text of the unverified email sent to @lifttheveil411 which he…fqdd7l32brrw (39)in #dsound • 6 years agoPushing Limits► Listen on DSound ► Listen from source (IPFS)fqdd7l32brrw (39)in #community • 6 years agoSunday Shout Outs | 2018 Jan 28Sunday Shout Outs I have been editing a how to video on computer security, but I wanted to get a post up today to…fqdd7l32brrw (39)in #dsound • 6 years agoLoosing Her MindDrum and base/Jungle track made with loops and synth in Ableton Live. ► Listen on DSound ► Listen from source (IPFS)fqdd7l32brrw (39)in #technology • 6 years agoElectronic Frontier Foundation | The leading nonprofit defending digital privacy, free speech, and innovation.If You Use The Internet, You Should Care About The EFF The Electronic Frontier Foundation (EFF) is the ACLU of…