Protect Your Phone From Government Spying With-The Only Product That Whistleblowers Julian Assange And Edward Snowden Use And Trust (Video)

Protect Your Phone From Government Spying With-The Only Product That Whistleblowers Julian Assange And Edward Snowden Use And Trust (Video)

On March 7, 2017, surveillance and intelligence watchdog WikiLeaks released “Vault 7  its largest publication of confidential documents on the U.S. Central Intelligence Agency. This data dump reveals how the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, exposes the entire hacking capacity of the CIA.

It’s been known for some time that Skype, the popular standalone peer-to-peer application specializing in providing video chat and voice call services was initially developed by the CIA, contrary to the official story regarding its origins. Marketed for its groundbreaking proprietary Internet telephony (VoIP) protocol, its real purpose was data mining and domestic surveillance.

take our poll - story continues below

Should Jim Acosta have gotten his press pass back?

  • Should Jim Acosta have gotten his press pass back?  

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to Truth Uncensored updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

All of this is taking place in the wake of President Donald Trump’s allegations that his Trump Tower headquarters was the victim of covert surveillance by operatives at the behest of former president Obama, and earlier revelations that government agencies like the National Security Agency (NSA) had been conducting clandestine surveillance of private citizens throughout the Obama administration, Nobel Prize Nominee Jim Garrow from Before It’s News reports.

The data that has been collected through these and other means has been used to harass and persecute private organizations, political organizations, businesses, and private citizens, DEAF.org

The bottom line is that your phone conversations are anything but private; if you’ve heard names like Max Kelly, Project Chess, or Prism, you know this to be true. And since government agencies build networks and databases based upon nodes of activity and the online routines of groups of people, engaging in unsecure online communications is comparable to a person having indiscriminate, frequent, unprotected sex.

So… what’s a user to do?

Knowing what we know today, would you have indiscriminate, unprotected sex? Probably not. So when you make a phone call, do you discuss private information of a personal nature, or business, or your investments, or your credit card information? Did you know how easy it was for someone to listen in? In addition to sensitive information of a general nature, did you know that identity theft is the fastest-growing crime in America – and that criminals are seldom far behind governments in exploiting emerging technology?

Protect yourself with the only product that the world’s real whistleblowers Julian Assange and Edward Snowden use and trust. Protect yourself with DEAF.

The rumors that swirl hither and yon in this day and age of deceit and deception are finding no greater friend than the mainstream media. They could not bring down the Donald in the election and so now they are resorting to a rearward action and starting rumors that once again have no substance, Before It’s News reports.

The latest swill that we are expected to swallow is that the communications of President – elect Trump were compromised by the Russians. Now let me stop that one immediately and with some authority.

I suggested to Maj Gen Paul Vallely early in the run up to the choice of the Republican Party to have Mr. Trump champion their cause, that his communications needed to be protected by our Defence Enabling and Assisting Framework (DEAF) and thus ensure that his privacy was secure. DEAF was already known to Lt Gen Mike Flynn and had been praised for its abilities. So we daisy chained DEAF onto Flynn’s cell phone and then Trumps cell phone. Over 100 of Trumps immediate folks including his children had DEAF placed on their communications devices.

Let me be very clear, DEAF is unhackable, and as a result major leaders around the word seek to have it secure the communications devices that they use.

The reporters who are spreading the malicious untruths that Mr. Trump’s communications have been compromised are nothing more than gutter snipes and liars with an agenda that has nothing to do with reporting but more about smearing and undermining our next leaders ability to do his job well.

And by the way, as you read this is and question any patriotism that we might have, know this, we protected the future President and his entourage for free.

– Dr. Jim Garrow

Photo:  Bing


 

Join the conversation!

We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.