How About A New Year Resolution?
But First A Little Background Information.
The ancient Babylonians are said to have been the first people to make New Year’s resolutions, some 4,000 years ago. They were also the first to hold recorded celebrations in honour of the new year — though for them the year began not in January but in mid-March, when the crops were planted. During a massive 12-day religious festival known as Akitu, the Babylonians crowned a new king or reaffirmed their loyalty to the reigning king. They also made promises to the gods to pay their debts and return any objects they had borrowed. These promises could be considered the forerunners of our New Year’s resolutions. If the Babylonians kept to their word, their (pagan) gods would bestow favour on them for the coming year. If not, they would fall out of the gods’ favour — a place no one wanted to be!
Civilizations around the world have been celebrating the start of each new year for at least four millennia. These days, most festivities begin in mid December to the 31st (New Year’s Eve), (the last day of the Gregorian calendar), and continue into the early hours of January 1 (New Year’s Day). Common traditions include: eating special festive foods, making resolutions for the new year, watching fireworks displays and attending CHRISTMAS PARTIES. See below:
I’m not much of a party animal – never really have been – exempting my wilder university days – but that was half a century ago by now! I’m quite happy with my own company – having tendencies to be rather hermit like – although I do enjoy mingling and communicating with like minded people. Much less have I made any New Year resolution throughout my entire life, I can’t see the logic in it; you can make resolutions on any date of the year of your choice, and I’m certainly not superstitious about evoking the wrath of any ‘gods’ (like the ancient Babylonians) by breaking a resolution made on a special day.
However I’m going to break from that mindset this year, by making a heartfelt appeal to those who are open minded, critical thinking, astute and awake as fellow travellers in our totally insane and inverted world that has wrapped itself around the Cabal planned destruction of humanity – via a hoax viral ‘pandemic’ that was the springboard for mass injections, which was of course, the goal from the start, and in the process ushering in a New World Order of centralised, dictatorial and tyrannical – Fascist style – central (global) governance. If you haven’t observed that being played out so far, then I’m sorry to say you are probably past redemption from this nightmare.
Before Going Further . . .
Please take the time to view and listen to the video below. It was recorded by Polly St. George (Amazing Polly) on June 14th, 2019. That was a full six months before anyone had even heard the word Covid-19 or what was coming in December 2019. Quite phenomenal foresight by Polly, which is not surprising when you realise how intelligent she is. She is one of the most astute and thorough researchers that I have come across. She also thinks and analyses at a deeper lateral thinking level than most people can only dream about :
So Polly sets out the explanation of why we need to ditch our smart devices, most notably our smart phones. THAT is the key weapon in the Cabal’s coup d’état attempt to gain total control and power. Using such a device will guarantee their success. Far fetched? Hardly, as I’ll explain below.
The whole conspiracy has been planned for years. It’s happened now, because technology has advanced to the point where it can be used as a weapon against us. The whole plan revolves around the ownership of a smart phone or other ‘smart’ devices by the majority of the masses. A device that can monitor it’s owner at all times, and relays that information back to source. It can scan QR codes and carry digital certificates (vaccine passports and your medical records etc.) around within it. Simply put it’s the handcuff that keeps you controlled. The bottom line is that without a smart phone you are outside that control tool. Hence why the call is:
Make It Your New Year Resolution To: DITCH YOUR SMART PHONE |
QR Codes
Governments are desperate to control people (not the scam virus – which is what they say they are doing, and it’s what they use as the excuse to introduce track and trace, phone user surveillance etc. etc.). They have introduced a range of rules and methods to trace watch and control people. Mobile phone QR codes are an absolute key tool in doing so.
Backed by governments, shops in – for example – New South Wales (Australia), have the right to refuse access to people who refuse to give their contact details. However, they do not have the right to refuse access to people who can’t sign in on their own device. Are you seeing the picture? If you genuinely don’t have a smart phone then they are snookered. By the way it’s no use saying you don’t have a smart phone – the phone account is linked to you and it takes milliseconds to find out what the model is. On the other hand, if your SIM card is in a simple basic phone with no scanning and monitoring capabilities, and no downloadable apps (I hate that word which is a short version of ‘application’ – whatever happened to the word ‘software programme’?). Sorry – I digress.
Shops must have a means to sign you in. If you don’t have a device with a QR reader or cannot use one (i.e. a smart phone or a tablet), then you have defeated the digital system.
What is it? This QR Code?
Simply put, it’s a Quick Response (QR) code – it’s that little crazy black and white picture, often the size of a postage stamp; you see them at the entrance to cafés/restaurant, shops or other venues used by the public, and they look like a square maze.
That QR code acts just like a barcode on a grocery package you take for scanning to the shop checkout. The code contains lots of information and online links, including the link to the café’s customer record site where customer contact details are kept and which the café staff can show authorities checking on whether they are complying with the coronavirus rules. QR codes are not just used in the pandemic. They give you quick access to websites without having to type or remember a web address.
How do you use it?
Much of the information that follows is just a guide and depends on the type of phone you have, its age or model.
For example, smart phones – are phones that have built in QR readers – so when you open the camera you can automatically scan. Some other phones you need to download the QR code application (app) from the internet and then open the app to access the camera/scanner.
Personally I Don’t Scan ANY QR Codes, And Neither Should You
You really should not scan QR codes, especially if you care about cyber security.
A QR code is a two-dimensional barcode that is readable by a smart phone with a camera or a mobile device with a similar type of visual scanning technology. It allows the encoded image to contain over 4,000 characters in a condensed, machine-readable format and was designed as a rapid method to consume static content based on a specific task. Once a program generates a static QR code (as opposed to a dynamic QR code that can change fields like an URL address), that code cannot be modified to perform another function.
Surprisingly, that is not the source of a cyber security risk, even for dynamic QR codes. The risk is in the content itself that has been generated and potentially displayed for an unsuspecting user to scan. Once they do, it can be the prelude to an attack or the release of information into your device, or the other way around if a QR code on your device is read by someone else. Good technology, but hijacked for sinister and nefarious use by the wrong parties.
To dive a little deeper, a QR code can contain the following risks:
Contact details: A QR code is similar to a virtual business card or VCD file that includes all your contact details such as phone number, in and out phone call numbers, email address and mailing information. This information is automatically stored in the device’s contact list when scanned. If the data is malicious, it could trigger an exploit on the device or place a rogue entry in your phone for – as an example – your favourite credit card. The main breach of private data has been the ability by those who monitor and keep us under surveillance – during this hoax pandemic – to have the ability to know who you have been in close contact with, triggering warning messages on your phone. Bluetooth technology is also used, where your phone ‘talks’ to other phone carriers around you, and exchanges information – without your knowledge or consent. Not healthy on many levels is it? Not least from an electro magnetic frequency radiation point of view (think 5G) but that is a subject all of it’s own that I won’t touch on it here.
Phone: Scanning a QR code automatically loads or starts a phone call to a predefined number. With all the recent robocall and SIM-jacking attacks, this is another method for a threat actor to access your phone and identity. You are basically calling someone you do not know and handing over all your caller ID information.
SMS: Scanning a QR code initiates a text message with a predetermined contact by name, email address or phone number. The only thing the user needs to do is hit send, and you could potentially reveal yourself to a threat actor for SMS spam attacks or trigger the beginning of a SIM-jacking attack. A little social engineering is all it takes to convince the user to hit the send button
Text: Scanning a QR code reveals a small amount of text in the code. While this seems low risk, QR codes are not human-readable and unless you scan one, you have no idea that the contents are actually just a text message.
Email: Scanning a QR code stores a complete email message with the subject line and recipient. All that is required is to hit send, and this could be the beginning of any form of phishing or spear-phishing attack. The threat actor knows your email address because you validated it by hitting send to an unknown destination.
Location coordinates: Scanning a QR code automatically sends your location coordinates to a geolocation-enabled application. If you are concerned about your data and location privacy, why would you ever do this?
Website or URL: Scanning a QR code can automatically launch and redirect you to a website. The contents could contain malware, an exploit or other undesirable content.
Calendar event: Scanning a QR code automatically adds an event to the device’s calendar, with the option of a reminder. Outside of a vulnerability in the local calendar application, the contents may be unwanted in a business or personal calendar, and deleting a recurring meeting is an annoyance if it was improperly entered.
Social media profile: Scanning this type of QR code initiates a “follow” for a specific profile on sites such as Instagram or Twitter, using the scanner’s personal profile. Depending on the social media platform, the account being followed may have access to your personal information and be aware that you are following them.
Wi-Fi network: This QR code stores Wi-Fi credentials for automatic network connection and authentication. If you consider all the threats of open Wi-Fi networks and even closed networks that use WPA2, the introduction of an unknown or insecure network to your preferred list is just a bad idea.
App store: Scanning links to a page directly on an app store can make an application simple to download. While this is convenient, the listing could be malicious (especially on Android operating system devices – the dominant OS on most smart phones these days) or could be a spoofed page using an embedded URL to trick you into loading an unsanctioned malicious application. Your best bet is to always navigate to an application yourself and not rely on a QR ‘hotlink’.
Finally, let’s address dynamic QR codes. These codes are generated once, but the data stored on them can be edited at any later date. They can include password protection and embedded analytics so creators can track how they are used. Dynamic QR codes can even add simple logic such as device-based redirection to have different behaviours for Apple iOS devices versus Google or Android. For example, based on the device, they can be redirected to the appropriate app store or music library. That alone allows a threat actor to target a device and application exploits to specific assets to ensure a higher rate of success.
If you are ever out and about and see a QR code on a wall, building, computer screen or even a business card, do not scan it. A threat actor can easily paste their malicious QR code on top of a real one and create their own copies, and based on appearance, you have no idea if the contents are safe or malicious. To that end, I personally never scan QR codes, and neither should you.
The bottom line is that your compliance with the use of your smart phone is what empowers the authorities to do what they are doing. It is the foundation pillar of their whole digital tracking and surveillance system. Without compliance by a great number of the public the whole set-up collapses. So continued use of this type of phone, and the scanning of QR codes is a no brainer – once you understand how the technology meshes and is used against you, you should understand how you are being imprisoned by this technology.
The Addiction
Make no mistake, the use of smart phones and devices that connect to the ‘Internet of Things’ (as it’s called) is a serious addiction for swathes of people who have become hooked on this technology. It’s exactly the same as addiction to alcohol and other substances. By the same context, it can be just as difficult to kick the habit. So asking you to ditch your smart phone as part of your New Year resolutions, may be difficult, that’s understandable. However, in the long run, the reward for doing so totally outweighs the relative;ly short period of going ‘cold turkey’.
If you’ve ever misplaced your phone, you may have experienced a mild state of panic until it’s been found. About 73% of people claim to experience this unique flavour of anxiety, which makes sense when you consider that most adults in the UK (and other countries worldwide) spend an average of 2-4 hours per day tapping, typing, and swiping on their devices—that adds up to over 2,600 daily touches. Most of us have become so intimately entwined with our digital lives that we sometimes feel our phones vibrating in our pockets when they aren’t even there!
While there is nothing inherently addictive about smartphones themselves, the true drivers of our attachments to these devices are the hyper-social environments they provide. Thanks to the likes of Facebook, Snapchat, Instagram, and others, smartphones allow us to carry immense social environments in our pockets through every waking moment of our lives. Though humans have developed to be social — a key feature to our success as a species — the social structures in which we thrive tend to contain about 150 individuals. This number is orders of magnitude smaller than the 2 billion potential connections we carry around in our pockets today. There is no doubt that smartphones provide immense benefit to society, but their cost is becoming more and more apparent. Studies are beginning to show links between smartphone usage and increased levels of anxiety and depression, poor sleep quality, and increased risk of car injury or death. Many of us wish we spent less time on our phones but find it incredibly difficult to disconnect. Why are our smartphones so hard to ignore?
The Levers In Our Brains – Dopamine and Social Reward
Dopamine is a chemical produced by our brains that plays a starring role in motivating behaviour. It gets released when we take a bite of delicious food, when we have sex, after we exercise, and, importantly, when we have successful social interactions. In a species development context, it rewards us for beneficial behaviours and motivates us to repeat them.
The human brain contains four major dopamine “pathways,” or connections between different parts of the brain that act as highways for chemical messages called neurotransmitters. Each pathway has its own associated cognitive and motor (movement) processes. Three of these pathways—the mesocortical, mesolimbic, and nigrostriatal pathways — are considered our “reward pathways” and have been shown to be dysfunctional in most cases of addiction. They are responsible for the release of dopamine in various parts of the brain, which shapes the activity of those areas. The fourth, the tuberoinfundibular pathway, regulates the release of a hormone called prolactin that is required for milk production, I just mention it out of interest, but it has little contextual relevance to the subject matter of smart phone addiction.
How Did It Happen?
In order to be able to directly control, track and monitor a population, there has to be a pathway – a tool to deliver that capability. Finally technology has developed to the point where that scenario is a reality. But how do you attach that tool to the majority of the population of the globe? In a word addiction. A situation where the addicted individual voluntarily supports his addiction – by buying, using and implementing a smart phone or device.
We are pretty well versed in the technique. If you are a drug dealer, you will stand outside school gates and offer children little goodies. Those goodies eventually turn into more sinister drug packages. You keep on supplying for free until the victims are hooked. You then take over control by using the induced addiction as a potent lever. The victims will keep on returning and will do your bidding because they are desperate for their ‘packages’. The next step is to use your victims to do ‘jobs’ for you in return for their fix – they recruit others into the scene and they become drug mules for their controllers. It all starts by ‘hooking’ the potential victim.
With the advent of modern ‘smart’ technology, you provide your target population with cheap devices and free services that they enjoy. You provide eye candy for those services and develop social media platforms (Facebook, Instagram, WhatsApp etc. etc.). The hardware operating system (OS) is created and developed by the biggest data harvester in the world – Google – who just happen to own many of the aforementioned social platforms. . The Android OS, although Open Source, has advanced surveillance and monitoring capability, it can, with the right ‘app’ monitor everything from your heart rate to how many steps you take in a day, what you see, what you say and hear and everything else in between. In the wrong hands this technology can also be manipulated to monitor track and trace capabilities, and location information during a fabricated ‘pandemic’ situation.
Users of smart phones are ‘hooked’ – addicted to their devices – so they inadvertently become an integral part of the scheme. The whole set-up revolves around the smart device, apps and of course things like QR codes.
Solutions
The weak link in their operation is also the smart phone. Disconnect enough people from those devices and the whole Cabal driven fraud collapses. The wizard of Oz is exposed, and becomes helpless. Easier said than done, but, if enough people break out of their tech addiction to this ‘smart’ stuff, it will have a significant effect on the Cabal’s global depopulation and control plan. Inoculation programmes become unreliable, as data about injected/ injection free individuals becomes unstable. It becomes difficult to know who have been injected and who haven’t. It becomes impossible to track down and cart off those who refuse to have the death jabs, to medical concentration camps.
So What Are The Alternatives To Smart Phones?
This is the good news bit!
Amazingly, there is such a demand for non ‘smart’ phones (especially amongst ‘Millennials’ apparently – gasps in amazement!!) The phone manufacturers are putting an effort into producing retro models, with modern technology, but limited to the features that were included in the original. No apps, no browsers, no interrogatory tracking, no QR codes or QR scanning and no App Stores. That’s excellent news for those of us who want to side-step the ‘smart’ stuff, because we realise what a threat it is to our freedoms. One such model is the new (2017) Nokia 3310. Nokia is now owned by Microsoft – that’s not such good news – BUT – it does not use the dreaded Google Android OS. The technologies used to collect data and to spy on us without permission revolve around the Android OS and our innocent ‘smart’ technology addiction that has been cleverly foisted upon us.
I’m not a mobile phone salesman and I swear that I don’t receive a penny in commission from anywhere! However, I’ve done a very brief search of possible outlets that supply the new Nokia 3310 – if you want more info then:
Of course you can do your own searches for similar suppliers. You may of course prefer something like an older ‘flip’ or ‘slider’ phone – there are still plenty about – and they’re as cheap as chips.
Another Option
You could choose a halfway house option and go for a de-Googled phone. These are phones that have been modified.
The privacy conversation has been intensifying over the past year, so much so that even Normies are actively joining. I’ve noticed that no matter what side of the aisle people stand on the scam pandemic issue, they are concerned with Google, Facebook, and others invading their privacy. One way to get some of that privacy back is to use a de-Googled phone.
What’s a de-Googled phone?
Well, it is an Android phone that has a de-Googled version of Google’s Android operating system powering it. The core Android operating system is free and open-source, so anyone can use its core to make their own version. The main part of Android that Google owns and does not allow anyone to use – without a license – is their Playstore.
The Playstore is where you connect your email and create a Google ID to install apps on your phone. A de-Googled phone has access to an app store but uses a spoofed account to install the apps you download.
A brilliant engineer called Bob Braxman carries out this work. He neutralises all back door access in the Android OS, along with a nullification of all other spying software and apps that comes with a standard Android OS from all the main mobile phone suppliers. For more info:
Or to go straight to the meat course – as it were – watch the video below. Incidentally, the mention of a Big G does not refer to me! just in case there’s any confusion!! :
My Personal Opinion?
Although I’m a long time admirer of Rob Braxman (The Internet Privacy Guy), he really is quite brilliant. I personally would not go down the de-Googled phone avenue – but that is purely my personal choice.
Far better – I believe – is to sever the umbilical cord completely, rather than play with a half dead Google attached phone. If your addiction is such that you can’t bin your smart phone completely, then by all means follow Rob’s solution, it’s far better than carrying around the current ‘spy in your pocket’. If you can kick the ‘smart’ habit completely then I believe the best option is a retro style, non Android OS phone that just gives you the mobile phone pleasures of yesteryear. Voice calls and text.
Incidentally, if what keeps you attached to your smart phone are things like WhatsApp, Telegram or Signal then you can continue to use those on your desktop PC or Laptop – which are far safer options than a smart phone. You’re far less likely to drag one of those around with you – if you feel the urge to scan a QR code!
This will probably be the last article posted on BGB for 2021 – unless we get some really big developments on the hoax pandemic front – like all government leaders, mainstream media executives and CEOs of pharmaceutical companies are hauled off to jails and later hung at dawn from some gallows somewhere!
We hope to be back in the first week of January (the rest is currently badly needed at this end). In the meantime – ENJOY YOUR HOLIDAYS!
View all of BGB’s videos by visiting the BGB archive channels at:
SUBSCRIBE for free to receive automated notifications of new posts from BGB in your e-mail inbox – as they’re published. You can unsubscribe at any time you choose.
0 Comments
2 Pingbacks