Welcome, my dear readers, once again to the asylum. Thank you for coming. This week we are going to talk about the most dangerous place on earth. I guess the place is the wrong word because it is everywhere and has seeped into every aspect or nearly every aspect of our culture. I am of course talking about the internet. The internet allows government, Non-Governmental Organizations (NGOs), marketers, and other actors to track everything about your life, from where you go, who you associate with, what you buy, how fast you get there, and more. Very prominent aspects of the internet have been intentionally designed to influence your children into the secular religion of the Establishment Death Cult (EDC), and even worse, it is a prime hunting ground for predators of all kinds. Some of the predators just want to steal your money, credit, and good name, while others actively seek unsuspecting women and children to physically exploit. For all the real benefits and convenience it provides, the internet is the most dangerous place on earth.
Google search works this way for everyone, but children are far more at risk than adults of this type of soft indoctrination, and sadly we are getting the first round of adults raised on this indoctrination in the 17–25-year-old age group now. Kids are more malleable because most kids want to be a part of something bigger than themselves and have a drive to make the world better because they are fundamentally good. Google has spent a lot of money to learn how to exploit these feelings, especially young people. It works like this: A young person wants to learn about an issue. So, they enter a search into Google. (You should never use Google products for anything. More on that in a few.) Google has been watching the activity on the account in question, or its AI has. So, it knows the user is a child (probably exact age), their interests, likes, and dislikes by the previous web activity, and if it is a device, also location and other data. Google’s algorithm is written in such a way as to front-load the search results, usually by at least two pages, with EDC approved articles prioritized in a way that is most likely to influence the user’s opinion (here).
Say there is a kid who wants to know about Donald Trump. They will get pages and pages with nothing but articles approved by the EDC about how evil, racist, and criminal Trump is, with no counter-points at all until three or four pages down (nobody looks that far, and Google knows it). Now, we have a kid inundated with article after article on how bad Trump is, how bad Trump supporters are, and how good the “Resistance” is. There will also be articles that spin off to various opposition groups, in LBGTQLMNOP+ land, Antifa, and other fine upstanding groups all presented in a heroic light. Sadly, as a society, we have allowed Google to become synonymous with the search for information and answers. That is why ‘google it’ is in the dictionary (here). It isn’t hard to see how children and the weak-minded are so influenced by easily disproven nonsense when for years the “ultimate” source of knowledge has been feeding them a steady diet of “reliable” sources of WOKE EDC-approved narrative garbage. It becomes all they know and much of it is designed intentionally to activate an emotional, rather than rational, response, to the point that over 75 leaders in the Mainstream Media (MSM) publicly declared that objectivity was bad and had to go (here). The message, quietly for more than a decade and now publicly, is if you want to work in big media, you cannot be objective, fair, or essentially honest. Google being part of the establishment machine is fully on board and the AI running its algorithm happily suppresses unapproved facts and opinions.
You must understand that what Google’s large AI has been caught doing isn’t new. These practices of changing the search inputs without user knowledge have been going on for years. If the search includes any politically incorrect language like manpower, mailman, black, Indian, or a list of thousands of other words behind the scenes, google rewrites the search query. It can do this with millions of searches per second due to its long-term use of Artificial Intelligence (AI), just like its very racist Gemini, a much larger, more powerful version of the search AI (here, here, here, here, and here), the Gemini AI was programmed to change search queries (here). This shouldn’t be a surprise when the head of the entire project’s Twitter looks like this (here). So, ultimately Google is an indoctrination body for the EDC and it is after your children. This desire is why Google spends so much to get its technology into public schools and offers services like Google Classroom (here, here, and here). This way they can endeavor to begin their influence as young as kindergarten, at least for those children who haven’t had a tablet babysitter.
This technology also gives schools the perfect opportunity to spy on the children and their home life. There have been numerous instances of schools using remote control to watch and listen to children at home, including calling the police because BB guns and pocket knives were witnessed (here, here, and here). Your school wouldn’t do this kind of thing. I hear it now, but we will tell you how to avoid it altogether later.
Don’t think I am giving Apple a pass. They are just as bad or worse than Google, but due to their closed ecosystem, there is little to nothing you can do about it (here, here, here, and here). For example, Apple decides how fast your phone can charge based on how green it thinks your local grid is, and if you don’t upgrade often enough it will artificially slow your device processor and memory reducing its performance without telling the device owners (here, here, and here). Apple is just as much EDC scum as any of the other companies. Unfortunately, there is nothing you can do about it because of the way Apple has its systems and services locked down. I think Google would like to at this point, but it would be hard since they started with both Android and Chromium being open source. There would be a lot of liability to change horses in the middle of the stream at this point. Ultimately, that is good news, as clean, secure versions of both operating systems are available.
The internet isn’t only dangerous to your child’s mind but to their physical well-being as well. Pedophiles lurk in almost every gaming chat room, all of the social media, and even in places supposedly specifically for children, like kids chat, are seriously problematic (here, here, here, and here). It literally takes seconds to make a Https://www.kidschat.net/ account. Pretend to be a little girl. You won’t go 15 minutes without being contacted by a pedophile (here). I have tried it and it is really fast, like minutes. However, it isn’t just pedophiles. There is an entire ecosystem of trans recruiters that lurk on social media, gaming chatrooms, and anywhere they might get a chance to interact with a child having an awkward puberty (like all of them at some point) (here, here, and here). They use almost cult-like strategies with shaming, love bombing, and isolation to move the process along (here, here, and here).
Then there are the more mundane dangers of the web like viruses, identity theft, and loss of privacy. Email phishing remains one of the most common vectors for spreading virus malware and perpetrating fraud. Malicious actors send deceptive emails containing infected attachments or links to malicious websites. Phishing is a type of social engineering attack, that involves impersonating legitimate entities to trick users into revealing sensitive information such as passwords, credit card numbers, or personal details (here and here). Malicious websites and downloads use harmful content designed to infect visitors' devices with virus malware or steal their information. Users may inadvertently download infected files, or software may automatically install from unreliable sources, leading to system compromise and data theft (here). Social engineering tactics exploit human psychology and trust to manipulate individuals into disclosing confidential information or performing actions that benefit the attacker. Techniques include pretexting (creating a fabricated scenario to obtain information), baiting (enticing users with a promise of reward), and tailgating (physically following someone into a restricted area) (here and here). Vulnerabilities in software, operating systems, or applications provide opportunities for attackers to exploit weaknesses and gain unauthorized access to systems or data. Exploiting these vulnerabilities often involves deploying virus malware or executing code remotely to compromise targeted devices. Physical security breaches occur when unauthorized individuals gain access to premises or devices, bypassing traditional security measures. Attackers may steal physical devices containing sensitive information, install malware-infected USB drives, or tamper with hardware to gain illicit access. Or, they can steal all your stuff by swapping your charging cable (here).
As I said, the internet is the most dangerous place on earth. What can you do? Don’t use Apple products if you can avoid it, but if you do, make sure that you have all the recommended software installed for any computer and keep it up to date. As far as Microsoft goes, do not make a Microsoft account based on your email make a local account and deny all information gathering in the user account privacy settings (here and here). With an Android or Chromium device, do not use the factory software. Make sure to load a custom ROM that strips all of the manufacturer and Google information-gathering automation out of them. XDA is an excellent community of developers who work on a wide variety of devices (here).
You will lose access to some of the Google and Microsoft services but remember if the service is free it is because you are the product and you pay for it with your information. On any device that connects to the internet, run antivirus\anti-malware software, a VPN, and a firewall. Do not connect to the internet without all three present and running. Use a paid email service that supports encryption like Mailfence, Proton, or Tutanota. They are not expensive, and Google, Yahoo, or Microsoft don’t get to keep a copy of all your correspondence. Use a secure browser that doesn’t spy on you like Brave, Waterfox, or Pale Moon. These have alternate funding models. For example, Brave uses just a little of your processing power for its blockchain BAT coin and rewards you with some as you use the browser, and it occasionally shows a totally random advertisement on the home screen, very infrequently and definitely not targeted based on content. The same goes for search. Most of the privacy browsers have their own and there are many more. Just, for the love of all that is holy, don’t use Google. There are alternative services for everything that you sell yourself for from Microsoft, Google, Apple, Yahoo, and others. Some, like email, cost $10-20 a year and others use some of your computing power or other resources, not your privacy or information.
As far as your accounts go, be they banking, social media, or others you MUST use two-factor authentication, or you are just asking for them to be compromised. You can use a code authenticator application, but in truth just requiring a text or an email is probably the best thing to set up because that will follow you much more easily as you change devices over the years. Never write down your passwords and always use a passphrase because they are harder to hack and easier to remember. Ehq9$wPvM! Is much easier to break than Ilovemywonderfulwife! (here). I think I know the one that is easier to remember. Seriously, passphrases with two-factor authentication and you will be as close to un-hackable as it is possible to be. You should also use a router with a firewall (Change the default password. I am a little ashamed of how many people I messed with who did not over the years.) and establish WPA2 or 3 encryption with a custom passphrase and it is even better if the router has a web filter so you can block porn, as well as access to specific sites.
Now for the kids, to bring this full circle. They do need some access to technology and exposure to function in this world, and neither the schools nor the internet can be trusted. What are we to do? First, never accept school hardware. If you have to, get a cheap Chromebook off Woot (here) and then install parental controls that report back to you daily like Bark, My Mobile Guardian, or others. Make sure that the application you choose captures all photos, prevents application function without approval (They can install whatever, but it won’t work until you go into the parent side and allow it.), full-text capture and call logging, and full social media monitoring. Then, do your job as a parent and keep track of that daily, if not a couple of times a day, as well as set triggers to notify you of specific behaviors. I would recommend no social media at all until 16 (That is how we do it.) but whatever you do don’t allow any social media that isn’t 100% monitored and block the sites and apps with parental controls. Do this with all devices and limit screen time. The best controls will let you do it by application. Kids don’t deserve privacy online because they are kids and they will do stupid shit. If you allow your child unrestricted internet access, you are putting them at risk through neglect, just as surely as if you turned them loose in an adult toy store or porno theater and then left them unattended and unsupervised. Social media is even worse. On game consoles, block the ability to chat at all in the settings and code-lock that section of the machine. Seriously, we must protect our children online as much as we protect our identities and finances. Sadly, most people don’t. I would rather be the mean parent of a well-adjusted, safe, and rational child than some of what I have seen as the alternative.
Psalm 40:2
He drew me up from the pit of destruction, out of the miry bog, and set my feet upon a rock, making my steps secure.
God Bless you
-Sam