YourPrivacyTV

channel image

YourPrivacyTV

RightToPrivacyTV

subscribers

Microphone Application (Mayhem / Havoc Firmware) Allows Us To Use HackRF Portapack H2 As A Portable Walkie Talkie; Testing This With Baofeng UV-5R As Our Other Communication Device, Along With RTL-SDR Software Defined Radio For Tuning Tips

This means you can use your Portapack H2 / Mayhem Firmware as a portable handheld radio!

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

#hackrf #portapack #baofeng

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrh..

*WATCH NOW BEFORE BUYING CASES:* Includes Important Tips And Lessons On Installing Hackrf Portapack H2M Inside Case; There Is More Than 1 Factory Building Hackrf / Portapack; With This, Slight Variation Can Occur, Including A Few Milimeter difference in Screen Size

hackrf is an excellent tool for those interested in studying wireless communications. Even if simply interested in listening to CB, shortwave / ham radio, the hackrf can serve you there as well!

The portapack H2M is a Mayhem branded / screen printed Portapack attachment, adding a touchscreen and many exciting applications to the hackrf - all in the palm of your hand.

A powerful tool when combined. To step up the aesthetics, a case is in order.

Naturally, with a beautiful portapack, you want a clear case to enjoy it.

Here, I share lessons from installing my H2M portapack + R9 Hackrf clone, inside a plastic case purchased online

Share the channel to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

#hackrf #portapack #sdr

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topi..

Important Lessons On Installing Hackrf Portapack H2M Case; There Is More Than 1 Factory Building Hackrf / Portapack; With This, Slight Variation Can Occur, Including Couple Milimeter Difference, May Break Your Screen!

hackrf is an excellent tool for those interested in studying wireless communications. Even if simply interested in listening to CB, shortwave / ham radio, the hackrf can serve you there as well!

The portapack H2M is a Mayhem branded / screen printed Portapack attachment, adding a touchscreen and many exciting applications to the hackrf - all in the palm of your hand.

A powerful tool when combined. To step up the aesthetics, a case is in order.

Naturally, with a beautiful portapack, you want a clear case to enjoy it.

Here, I share lessons from installing my H2M portapack + R9 Hackrf clone, inside a plastic case purchased online

Share the channel to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

#hackrf #portapack #sdr

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consid..

Lobbying Organizations Work Behind The Scenes To Ban Tiktok, Holding Secret Hearings; This Won't End With Banning Tiktok, And Is Threatening Your 1st Amendment Rights. The Algorithm Is Not Controlled By A US Company -- This Could Be Seen As A Threat To US Interests (not voter interests)

What are some of the special interests involved in attempting to ban Tiktok, restricting the internet for US residents, and leaving the door open to future application / protocol bans

These precedents are extremely dangerous in the way they open doors to future internet restriction

When you restrict portions of the internet, similar to China's Great Firewall project, you are restricting the possibilities of the internet

And when you restrict topics of discussion, you also restrict free thought over time. As when you no longer have any form of conversation / media to refer to, knowledge disappears.

We explore lobbying efforts and more, in today's video.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

#tiktokban #politics #surveillan..

* You Are At Risk If You Haven't Done This * Every Operating System Comes With Various Default Settings. Those Default Settings Guide How Your Given Operating System Handles Files, Links, Networking. Today Sharing A Story Of How A Deanonymization Attack Could Go Down, And How To Protect Yourself.

Example: Are What Is Your Default Application To Open Links? If It's Not Tor Browser / I2P, You Will Make A Direct Connection And Could Be Manipulated Into Exploitation.

*Let's Talk About It!*

Whether running a Linux desktop, Mac, Android, iPhone, or Windows laptop, your default apps will guide how your device handles links.

If you received a link within an encrypted messenger, or social media, have you ever accidentally clicked on the link? Or do you always remember to right click / open within another app?

You will benefit by refining your default applications, and gain the peace of mind knowing your system won't make those direct connections, creating an online safety risk.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

#tor #i2p #anonymous

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch,..

Start Capturing: Series Of Fan Remote Control Buttons, To Then Replay Back, Controlling The Fan; Here's How To Do It! Thank You For Sharing The Video; Portapack Provides Touchscreen, Dial And Button Access For The

HackRFHackRF: Already An Amazing Radio Device. Add In Portapack, And You Have A Portable SIGINT / Wireless Ethical Pentest Station.

Whether interested in a handheld radio, an avid Ham operator, a developer working on new wireless protocols, or want to try ethical pentesting on your car, the HackRF provides nearly all the Flipper zero offers, with added capabilities

Warning: HackRF is considered an advanced device - this may not be the right 'toy' for everyone.

If looking to try SDR, my recommendation is going with an RTL-SDR Blog V3 / V4. The rtl-sdr is a perfect place to start, and can listen to nearly as much range as HackRF, with greater clarity.

If the goal is listening to shortwave radio, an rtl-sdr is the right option.

If a cybersecurity / SIGINT professional, hackRF could be a nice option, for your next device purchase

The HackRF is something I mostly recommend to experienced linux users - it's not "beginner friendly" - unless you buy a completed kit with firmware ready to use. Even then, familiarity with Linux commandline is strongly encouraged.

With the Portapack / HackRF, you have countless options for playing with the spectrum. From 1 MHz, all the way up to 6 GHz.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

Find HackRF: http://www.greatscottgadgets.com (creators of this)

#hackrf #portapack #SDR

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net..

Looking Glass Is The 1st App I Recommend Trying -- This Will Be Very Useful For All Your SDR Goals - Recommended Watch For SDR Beginners; Portapack Provides Touchscreen, Dial And Button Access For The HackRFHackRF: Already An Amazing Radio Device. Add In Portapack, And You Have A Portable SIGINT / Wireless Ethical Pentest Station.

TIMESTAMPS:
00:00 Introduction
01:17 One Of The Most Useful Apps
09:15 DEMO: Listening To FM Radio
12:22 SDR Starter Kit Recommendation
17:33 DEMO: Handheld Radio Transmitting / Receiving
18:39 DEMO: Shortwave 9MHz

Whether you are interested in a handheld radio, an avid Ham operator, or want to try ethical pentesting on your car (really), the HackRF provides all that the Flipper zero offers, with additional capabilities

HackRF is considered an advanced device - may not be the right 'toy' for everyone.

If looking to try SDR, my recommendation is going with an RTL-SDR Blog V3 / V4. The rtl-sdr is a perfect place to start, and can listen to nearly as much range as HackRF, with greater clarity.

If the goal is listening to shortwave radio, an rtl-sdr is the right option.

If a cybersecurity / SIGINT professional, hackRF could be a nice option, for your next device purchase

The HackRF is something I mostly recommend to experienced linux users - it's not "beginner friendly" - unless you buy a completed kit with firmware ready to use. Even then, familiarity with Linux commandline is strongly encouraged.

With the Portapack / HackRF, you have countless options for playing with the spectrum. From 1 MHz, all the way up to 6 GHz.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

Find HackRF: http://www.greatscottgadgets.com (creators of this)

#hackrf #portapack #SDR

SHARE THIS ON SOC..

What Apps Are Available On The Latest 2.0 Mayhem Firmware? Let's See! HackRF: Already An Amazing Radio Device. Add In Portapack, And You Have A Portable SIGINT / Wireless Ethical Pentest Station.

Whether you are interested in a handheld radio, an avid Ham operator, or want to try ethical pentesting on your car (really), the HackRF provides all that the Flipper zero offers, with additional capabilities

HackRF is considered an advanced device - may not be the right 'toy' for everyone.

If looking to try SDR, my recommendation is going with an RTL-SDR Blog V3 / V4. The rtl-sdr is a perfect place to start, and can listen to nearly as much range as HackRF, with greater clarity.

If the goal is listening to shortwave radio, an rtl-sdr is the right option.

If a cybersecurity / SIGINT professional, hackRF could be a nice option, for your next device purchase

The HackRF is something I mostly recommend to experienced linux users - it's not "beginner friendly" - unless you buy a completed kit with firmware ready to use. Even then, familiarity with Linux commandline is strongly encouraged.

With the Portapack / HackRF, you have countless options for playing with the spectrum. From 1 MHz, all the way up to 6 GHz.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

#HackRF #portapack #SDR

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOU..

HackRF: Already An Amazing Radio Device. Add In Portapack, And You Have A Portable SIGINT Station. Today We Make Speakers For Portapack Using Laptop

Whether you are interested in a handheld radio, an avid Ham operator, or want to try ethical pentesting on your car (really), the HackRF provides all that the Flipper zero offers, with additional capabilities

HackRF is considered an advanced device - and is not the right 'toy' for everyone.

If looking to try SDR, my recommendation is going with an RTL-SDR Blog V3 / V4. The rtl-sdr is a perfect place to start, and can listen to nearly as much range as HackRF, with greater clarity.

If the goal is listening to shortwave radio, an rtl-sdr is the right option.

If a cybersecurity / SIGINT professional, hackRF could be a nice option, for your next device purchase

The HackRF is something I mostly recommend to experienced linux users - it's not "beginner friendly" - unless you buy a completed kit with firmware ready to use. Even then, familiarity with Linux commandline is strongly encouraged.

With the Portapack / HackRF, you have countless options for playing with the spectrum. From 1 MHz, all the way up to 6 GHz.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

#HackRF #portapack #SDR

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today ..

From World War, To War On Drugs, To Terror: How Surveillance Transformed Our Rights, Life, And The World; Battle The Wrong Way, We All Pay The Price; Unwinnable Wars Are Fast Paths To Lost Liberty

"Show Me Your Papers". Common quote on world war II history, police states, and how those traveling were stopped, and forced to show documents, simply to move around.

Is today much different? In some ways, very different. Have we truly moved away from the humiliation of innocent people?

Watch the video, and decide for yourself. I'm not here to think for anyone. Reporting information. You can do the thinking. ;)

The choice is always yours. And we will (together) collectively end up at the same destination.

Who / what are you fighting for?

We will (together) arrive at one.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

#surveillance #Law #policing

Bringing you unique content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to supp..

How To Get (Internal) WiFi Driver Working On Pinetab2! Earlier Shared An Easy Way To Share Ethernet, But Today We Get The Internal WiFi Card To (Finally) Work; This Is EASY! Watch To Start Using WiFi! :)

Pinetab 2 Is A Linux Dedicated Tablet Developed By Pine64 hardware Company. It Has A Solid Build Quality With Backlit Keyboard

This device is not intended for general consumers - please do your due diligence before purchase. Pine64 works on linux hardware, making available to developers and dedicated linux hardware enthusiasts

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

#pine64 #pinetab #pinephone

Bringing you independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link..

Covering Long Distance WiFi MAC Address Tracking, Hostnames, Saved SSID Tracking, Trilateration, How Wipri Mitigates And True Story That Helped Inspire Wipri (on Gitea Onion);

Wireless Devices Rely On Radio Based Protocols, Offering Many Avenues For New Persistent Tracking; We Use Real Stories And Evidence To Share How Wipri Can Help Protect You And Your Devices From Invasive Privacy Invasions Of The Wireless, And Wired Persuasion.

SHARE your thoughts in the comments below!

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

#surveillance #anonymous #macaddress

Progress: Making Sound On HackRF Portapack Using Old Laptop Speaker (to be continued) - Will Be Sharing Process And More Details / Step By Step Coming Up (Photos / Video Taken)

Essentially snagged a small speaker from an old partial laptop - kept for parts, and saved a couple dollars

You can opt for this as a portapack handheld radio from 1MHz all the way up to 6GHz!

Will be taking a closer look at this, planning, and more, coming up

*SUPPORT CONTENT BY SHARING / OPTIONS BELOW*

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

#HackRF #portapack #radio

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

HackRF R9 Gave Portapack A Blank Screen. Here Is How I Got It Mayhem Portapack Firmware Flashed / Working On A HackRF One R9 Clone. I Cover The Commands And Share What I've Learned So Far

*PLEASE SHARE VIDEO IF THIS HELPS YOU*

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

#HackRF #radio #SDR

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAI..

HackRF Is An SDR Tranceiver Offering Access From 1 MHz - 6 GHz. Today I Received One Of The Touchscreen Portapacks To Go Along With It, And Today, Unboxing, To See What Comes With It (First Actual Look)

SHARE ON SOCIAL MEDIA TO SUPPORT CHANNEL

#HackRF #Portapack #SDR

Bringing you content I am interested in, and if you like it, leave a Like / Comment. If you don't like it, leave a huge Thumbs Down to pair with your dislike, in the comment! :-P

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RT..

How Attacks Against Tor / I2P Work, And How These Networks Of Freedom, Work To Detect, And Ban These Malicious Routers / Relays; Ideally, Routers On Hidden Networks Behave / Appear -- The Same -- As Much As Possible; If Not, You Might Be Dealing With Something Averse...

Symbolic gesture signaling the success of anonymity networks / software: being under attack.

The truth is, those who work on free to the world networks, that which protect human rights / journalism... educating the population, while making free flow of information a reality, are the true "good guys" of the world.

At the same time, on the positive side, these attacks make the network more resilient, and lead to many improvements against.

#I2P #Tor #Privacy matters.

Is your work pushing towards the end goal of freedom for all? Or not?

The choice is always yours. And we will (together) collectively end up at the same destination.

Who / what are you fighting for? Our collective freedom? Or centralized power, control. Therein lay the 2 destination options.

We will (together) arrive at one.

Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.

We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO ..

Fusus Is A Company Attempting To "Fuse" All Business / Home Private Cameras Nationwide, Into Centralized Monitoring Center -- The Company Name Itself / Goals Are Reminiscent Of Fusion Centers - Mass Surveillance For "Safety", Without Results, Outside Contractor Enrichment, And Bloated Budgets Galore

We know this type of monitoring 24 /7 of innocent residents does *not* make us any safer.

In fact numerous times (washington post, NBC and others have reported mass surveillance has not prevented a single terrorist attack...

Have you ever thought to ask, in a world where nearly everything is monetized, "where is this taking us""?

Maybe you should.

#surveillance #privacy #terrorism

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr..

HOWTO: Selfhost Anonymous I2P SSH Tunnel For More Secure Remote Administration And REPORT: Microsoft Outlook To Track Users, Share Data With 772 3rd Parties

When we started setting up our anonymous I2P site / blog, we may like to have ssh access to manage our server remotely, taking advantage of the enhancements provided by i2p

We have the ability to close off access to the rest of the world, by blocking ssh connections outside localhost, and implementing ssh key authentication

Once we create our ssh tunnel, we can access ssh from anywhere in the world, using proxychains (example)

In addition, we cover how Microsoft Outlook News report reveals sharing of user data with over 772 outside parties

Everything from device information / scanning, to geolocation tracking - another reason to try Thunderbird (see my tutorials on this)

Your selfhosting hardware... could be anonymous (if you feed it that way).

Meaning: you have full control over what people can, and can't see - and you have the final say over what identifiers you share.

Watch today and begin sharing ideas for activism, journalism, and thoughts, anonymously -- or not. It's all up to you.

#I2P #ssh #Outlook

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many..

Selfhost Website OR Blog, Anonymously From The Comfort Of Home! Take Advantage Of The Invisible Internet Project: I2P. EASIER Than You Might Think! [ Part I ] We Installed Railroad, A Java I2P Plugin Automating An Anonymous (if you choose) Selfhosted Blog. Today Covering Building Webhosting Tunnels For Hosting Any Anonymous I2P Site And How To Create Short .i2p Domains (like righttoprivacy.i2p).

Selfhosting is the ultimate user / administrator empowerment. You control the server hardware 100%, and you decide if you wish the server to be anonymous or not.

This type of set up makes a great starting point for Journalists, Activists, and nearly anyone interested in selfhosting a website, without giving away personal information / IP address.

Your selfhosting hardware... can be anonymous (if you feed it that way).

Meaning: you have full control over what people can, and can't see - and you have the final say over what identifiers you share.

Watch today and begin sharing ideas for activism, journalism, and thoughts, anonymously -- or not. It's all up to you.

#I2P #selfhosting #anonymous

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressin..

Today We Cover How To Selfhost An Anonymous I2P Based Blog. You Can Do This On Your Existing Java Based I2P Set Up. It's Easier Than You Think! Want To Share Something Anonymously? Here's Your Chance!

Selfhosting: The nice thing is - with selfhosting you have full control of the hardware.

Your selfhosting hardware... can be anonymous (if you feed it that way).

Meaning: you have full control over what people can, and can't see - and you have the final say over what identifiers you share.

Watch today and begin sharing ideas for activism, journalism, and thoughts, anonymously -- or not. It's all up to you.

#I2P #selfhosting #cyber

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnp..

Want To Try SDR (Software Defined Radio)? DragonOS Could Be Perfect For You. Comes With Various SDR Tools. Today We Will Download And Burn It While Talking About Wireless / Radio Based Privacy Concerns Like Tempest

Tempest / Van Eck Phreaking Involves Capturing Excess Radio Signal Emanating / Delivering Contents Of Electronic Devices - This Is Defined Very Briefly, And The Main Topic Of This Video Is Downloading And Burning DragonOS - Which We Will Explore Soon (together - I have never used it!)

TEMPEST / PASSIVE EMISSION CAPTURE: https://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

#radio #surveillance #tempest

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - ht..

Rite Aid Busted For Flawed Facial Recognition (5yr) After Shoppers Wrongfully Accused Thanks To Flawed Biometric Mass Surveillance Tracking Of Shoppers; ALSO: Facial Recognition Defense Strategies

Future Video? LEAVE THOUGHT IN COMMENTS AND SHARE TO SUPPORT

Adversarial Fashion Tips - Every System Has A Weakness, And This Can Be Taken Advantage Of - Even with facial recognition

All facial recognition / biometric identification relies on pattern recognition. From the shape of your nose to the spacing of your eyes, to the angle of one biometric identifier in relation to another -- these all provide measurements which create a unique fingerprint.

By wearing strategic clothing, we can dress to confuse mass surveillance (all in good fun); Other adversarial clothing adornments can blind infrared cameras. All covered on today's video.

SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL

#facialrecognition #biometrics #privacy

Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CON..

logoFAIL UEFI Firmware Vulnerability Affects Almost Every Windows / Linux Offering Ability For Hardware Backdoor Persistence! Watch To Find Out If You Are Vulnerable And What Isn't Vulnerable

UEFI: Unified Extensible Firmware Interface, responsible for booting device hardware for interaction with operating systems - this comes earlier in the operating system

This particular logoFAIL regards a vulnerability in image parsing

One could be exploited remotely in certain circumstances, and is very serious, affecting most machines, even some arm.

logoFAIL: discovered by BINARLY - https://www.youtube.com/watch?v=nJDnPFzSh4E

Bringing you 100% independent content, aiming to introduce to you, the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$Human..

"Who Is Calling Me?" Investigate Strange Numbers With Maltego IPQualityScore. Everyone Experiences Random Calls. There is danger in not knowing who is calling you. Among the most common malware targeting, comes to us via phone number targeting. One of the most persistent identifiers, as well as a long-term target, for accessing YOU.

The message will likely seem important / urgent.

EXAMPLE: it's the holidays and nearly everyone is waiting on a package.

This brings scam artists and attackers new opportunities. You may receive a SMS txt message from a malicious party, appearing to come from a shipping company having trouble delivering your package.

They may state a requirement to receive your package -- leaving a link to a supposed website for filling in said forms. Website turns out to be malicious deanonymization (direct connect), or worse; malware targeting.

Those using spyware such as Pegasus take advantage of personal phone numbers to target Human Rights activists and Journalists.

In some cases, not even requiring targets to click on a link - using something known as a "zeroclick" 0day exploitation - where an unpatched vulnerability will take advantage of features such as iMessage previews, and more, in order to exploit a target phone.

Bringing you 100% independent content, aiming to introduce to you, the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!

*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you inf..

Can You Search Maltego Anonymously? Not A Simple Answer -- Watch To Find Out. Covering options for more privately using Maltego. Today We Cover Maltego Proxy Options And Set I2P to handle our individual searches.

Some OSINT Investigators May Prefer Not To Have Searches Attached To Personal Name / Identity. Today I Cover Ideas For More Private Searches On Maltego Using The Power Of I2P And Proxy Settings -- Along With Ideas For Anonymous Maltego Usage.

Alternatively, you may enjoy other means of proxying - the nice thing about this is, it opens up the world of I2P to new OSINT afficianados - a strategic video, if you like.

The proxy setting change alone won't guarantee anonymity. Watch full video to better understand - although your proxy settings will enhance privacy of searches at a given moment, various other identifiers including account creation could tie back to you - though if you share maltego account with others, you may have the benefit of differentiating IP addresses from those other users

Maltego is a great tool for OSINT, and opens up a new world, even for the novice. From geopolitics to the activist world, it's an extremely helpful tool.

I bring you the most honest security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow! Thanks for sharing this and all videos.

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider su..

SHOW MORE

Created 5 years, 1 month ago.

216 videos

Category Science & Technology

🛡️ "Privacy: the singular right able to protect all of your other rights". --RTP

Sharing experience protecting privacy online & covering Linux / Infosec topics in an age of predatory
Surveillance Capitalism.

🎉 😎 SUPPORT (Sharing Links Is A Great Way To Support This - Help Keep Channel Alive)

❤️MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

💻 coreboot (Intel Management Engine Removed Max / Neutered) Laptop: https://buymeacoffee.com/politictech/commissions (custom rare service / device! - limited available)

🤑 💵 CASHAPP - $HumanRightsTech

👁️‍🗨️ Full Support Options (incl BTC List) At Public Blog: https://buymeacoffee.com/politictech

➡️ Custom Tutorials (Public Blog) Organized By Category: https://bmc.link/politictech/posts
Blog Mirror (Most Posts) https://politictech.wordpress.com

If you want to support these efforts & help dedicate more time towards the channel, appreciate any and all donations, no matter how small :)

Thanks for coming by. Please Like, SHARE (genuine content is suppressed) & Subscribe