Avatar
John
27bfc7ddf50abf0a8249c57bce0dbcb214980cc10c03ddb691fb1f94cb7cb8d1
🔒 Expert Linux & Privacy 🌐 ProtĂšge tes donnĂ©es, gagne ta libertĂ© 💡 Outils Ă©thiques & accessibles Ă  tous 🐧 Linux & KDE fan 🔐 E2EE chiffrement de bout en bout ₿ Bitcoin maxi đŸ’ȘIci pour construire, Ă©duquer, dĂ©centraliser

# Qu’est-ce qu’une adresse Bitcoin rĂ©vĂšle avant et aprĂšs une dĂ©pense ?

La rĂ©utilisation d’une adresse Bitcoin est souvent prĂ©sentĂ©e comme un problĂšme de confidentialitĂ©. Pourtant, elle soulĂšve aussi un risque **cryptographique rĂ©el**, liĂ© Ă  la sĂ©curitĂ© mĂȘme de la clĂ© privĂ©e. L’enjeu concerne autant les anciennes adresses P2PKH que les formats rĂ©cents SegWit (bc1q
) ou Taproot (bc1p
) : lorsqu’une adresse est rĂ©utilisĂ©e aprĂšs avoir dĂ©jĂ  servi Ă  dĂ©penser un UTXO, l’ensemble des fonds associĂ©s Ă  cette mĂȘme clĂ© dĂ©pend dĂ©sormais d’un matĂ©riau cryptographique exposĂ© plusieurs fois sur la blockchain. Le prĂ©sent article expose les raisons structurelles de ce risque, les mĂ©canismes cryptographiques en jeu, et la maniĂšre concrĂšte d’observer la clĂ© publique rĂ©vĂ©lĂ©e lors d’une dĂ©pense.

### L’exposition de la clĂ© publique : un moment critique

Avant toute dépense, une adresse Bitcoin **ne révÚle pas la clé publique**, mais seulement un hachage :

```

HASH160(pubkey) = RIPEMD160(SHA-256(pubkey))

```

Ce hachage n’offre aucune possibilitĂ© de retrouver la clĂ© publique. Tant qu’un UTXO reste non dĂ©pensĂ©, la clĂ© associĂ©e demeure mathĂ©matiquement inaccessible.

DĂšs qu’un UTXO est dĂ©pensĂ© :

- la **signature** est publiée,

- la **clé publique complÚte** est révélée,

- la validité de la signature est vérifiée contre cette clé.

À partir de ce moment, l’adresse n’offre plus la mĂȘme protection cryptographique : la clĂ© publique est exposĂ©e Ă  l’analyse offensive, et toute rĂ©utilisation de cette mĂȘme clĂ© multiplie les donnĂ©es exploitables par un attaquant.

### OĂč se trouve la clĂ© publique au moment de la dĂ©pense ?

L’emplacement exact dĂ©pend du type d’adresse :

### P2PKH (adresses commençant par 1 ou 3)

Dans les transactions **P2PKH**, la clé publique apparaßt :

- **dans le scriptSig**,

- immédiatement aprÚs la signature,

- sous forme hexadécimale, généralement en clé compressée (33 octets, préfixe 02 ou 03) ou non compressée (65 octets, préfixe 04).

### P2WPKH (SegWit v0, adresses bc1q
)

Dans les transactions **P2WPKH**, la clé publique apparaßt dans le **witness** :

- witness[0] → signature (format DER),

- witness[1] → **clĂ© publique compressĂ©e** (33 octets, dĂ©butant par 02 ou 03).

### Taproot (P2TR, adresses bc1p
)

Les transactions **Taproot** utilisent des signatures Schnorr et des clés publiques **x-only**. La clé publique apparaßt :

- dans le **script witness**,

- en général sous la ligne « key path spending »,

- au format **x-only** : 32 octets (64 hex) sans préfixe 02/03.

### Sur mempool.space

[mempool.space](http://mempool.space/) n’affiche **pas “Public Key” en texte clair**. Il faut lire les champs bruts hexadĂ©cimaux et reconnaĂźtre le format :

- **33 octets** → pubkey compressĂ©e : commence par 02 ou 03.

- **65 octets** → pubkey non compressĂ©e : commence par 04.

- **32 octets** → Taproot x-only pubkey.

La clĂ© publique est donc toujours visible, mais sous la forme d’un champ hexadĂ©cimal dans les Inputs.

### Pourquoi la réutilisation affaiblit-elle la sécurité ?

### RĂ©vĂ©ler une fois la clĂ© publique n’est pas critique

La sĂ©curitĂ© repose sur la difficultĂ© du problĂšme du logarithme discret (ECDLP). Tant qu’un attaquant ne dispose que d’une seule signature produite par la clĂ© :

- il ne peut rien reconstituer,

- il n’a pas de matiùre statistique,

- ECDLP reste intact.

### RĂ©vĂ©ler la mĂȘme clĂ© plusieurs fois multiplie la surface d’attaque

Chaque dĂ©pense d’un UTXO associĂ©e Ă  une mĂȘme adresse publie :

- une clé publique identique,

- une nouvelle signature distincte.

En ECDSA (P2PKH, P2WPKH), chaque signature nĂ©cessite un nombre alĂ©atoire : le **nonce k**. k doit ĂȘtre :

- unique,

- imprédictible,

- parfaitement généré.

> Un dĂ©faut de gĂ©nĂ©ration de k — Ă©vĂ©nements bien documentĂ©s — permet de rĂ©cupĂ©rer la clĂ© privĂ©e si deux signatures utilisent un mĂȘme k ou des k corrĂ©lĂ©s.

Exemples réels :

- bug Android 2013,

- RNG matériel défaillant,

- bibliothĂšques OpenSSL anciennes,

- faiblesse d’entropie au boot d’un appareil,

- smartcards produisant des nonces biaisés.

La rĂ©utilisation d’adresse **multiplie les signatures produites** par une mĂȘme clĂ© → augmente la probabilitĂ© d’un incident cryptographique.

### Taproot amĂ©liore la situation mais ne l’annule pas

Taproot utilise Schnorr :

- nonce dĂ©rivĂ© de façon dĂ©terministe → Ă©limine le risque “mĂȘme k”,

- structure linéaire des signatures plus résistante.

Mais :

- la clé x-only reste unique et exposée,

- plusieurs signatures restent exploitables pour des analyses statistiques,

- les risques matériels demeurent,

- la cryptographie post-quantique mettra à mal toute clé publique exposée.

### Concentration du risque

Un portefeuille HD (BIP32) permet d’isoler chaque UTXO derriĂšre une clĂ© dĂ©rivĂ©e diffĂ©rente. La rĂ©utilisation d’adresse annule cet avantage :

- un bug dans une seule signature → compromet tous les UTXO dĂ©pendant de cette clĂ©.

C’est la pire configuration possible en termes de compartimentation.

### Et en cas d’avancĂ©es cryptographiques (quantique ou non) ?

Si un attaquant obtenait la capacité de résoudre ECDLP :

- toute clé publique **déjà exposée** deviendrait vulnérable,

- toutes les adresses réutilisées seraient particuliÚrement fragiles,

- une adresse jamais dépensée resterait protégée par HASH160.

La rĂ©utilisation d’adresse concentre ainsi un risque futur que l’écosystĂšme cherche explicitement Ă  Ă©viter.

### Exemple concret : clé révélée dans une transaction réelle

Pour la transaction :

```

7ee6745718bec9db76390f3a4390b9e7daeeb401e8c666a7b261117a6af654a1

```

Il s’agit d’un input P2WPKH. Dans le witness :

- la signature se trouve dans witness[0],

- la clé publique compressée dans witness[1].

La clé publique révélée est :

```

02174ee672429ff94304321cdae1fc1e487edf658b34bd1d36da03761658a2bb09

```

> Avant dépense : seule HASH160(pubkey) était visible.

> AprĂšs dĂ©pense : la clĂ© publique rĂ©elle l’est, dĂ©finitivement.

### Conclusion

La rĂ©utilisation d’adresse Bitcoin reprĂ©sente un risque cryptographique tangible. Elle ne relĂšve pas seulement d’une mauvaise hygiĂšne de confidentialitĂ©, mais d’un problĂšme structurel : **une clĂ© publique ne devrait ĂȘtre exposĂ©e qu’une seule fois**, et une signature ne devrait jamais ĂȘtre multipliĂ©e sur une mĂȘme clĂ© si l’on souhaite maximiser la robustesse.

Les mĂ©canismes cryptographiques actuels sont solides, mais l’expĂ©rience montre que :

- les implémentations ne sont jamais parfaites,

- les nonces peuvent ĂȘtre biaisĂ©s,

- les appareils peuvent manquer d’entropie,

- les attaques matérielles existent,

- la cryptanalyse progresse.

Minimiser l’exposition des clĂ©s publiques reste une bonne pratique fondamentale, aujourd’hui comme demain, et cela passe d’abord par une rĂšgle simple : **ne jamais rĂ©utiliser une adresse qui a dĂ©jĂ  dĂ©pensĂ© un UTXO**.

[Source](https://www.linkedin.com/pulse/quest-ce-quune-adresse-bitcoin-r%25C3%25A9v%25C3%25A8le-avant-et-apr%25C3%25A8s-une-cantu-x5uee/)

Interview from #PlanBLugano

Check what the guys from https://getportal.cc are doing.

Cool demo with an NFC tag to login into a website or to open a door đŸšȘ

https://youtu.be/aOwN29C-eRo

They should go live in Q1 2026 with their project, so don't hesitate to contact them to beta test.

PS: there was lots of background noise in the room, I had to use AI to remove the noise.

#PlanB

At #PlanBLugano I interviewed Daniel from https://www.fairdeeds.com

His company supports circular economy in developing countries. He buys product from them and pay them in sats. Keychain and mini surf board, upcycling from used board that the kids cannot surf on it anymore with Bitcoin related backstreet art from StreetCyber from Barcelona.

https://youtube.com/shorts/VO_dn5oH9d0?feature=share

#PlanB

Guess with whom I ran into at #PlanBLugano ?

Uncle Rockstar Dev. He gave me a cool NFC card with his image on it and when you tap it to your phone, you got laser eyes ! đŸ€©

Read my feedback from the conference here:

https://stacker.news/items/1269250/r/jinformatique

Projet HAARP une realité

HAARP : le climat sous contrĂŽle ?

https://www.youtube.com/watch?v=Vk62y2tEKKA

#HAARP #SNOWDEN

**RÉVÉLATION CHOC : SNOWDEN DÉVOILE LE PROGRAMME DE GUERRE MONDIALE DE HAARP**

Edward Snowden vient de faire exploser la bombe d'information que l'État profond redoutait le plus. HAARP n'est pas une station de recherche — c'est une arme de contrĂŽle global. Des documents fuitĂ©s montrent que HAARP peut dĂ©clencher des AVC et des crises cardiaques en ciblant le tronc cĂ©rĂ©bral avec des ondes radio Ă  trĂšs haute frĂ©quence. Les dĂ©cĂšs semblent naturels, ne laissant aucune trace de meurtre.

Snowden confirme que l'OTAN utilise HAARP pour rĂ©primer la dissidence, manipuler les pensĂ©es et provoquer des ruptures psychotiques afin de discrĂ©diter des cibles. Ce n'est pas une thĂ©orie — lors de sa fuite de Hong Kong, Snowden et le personnel de WikiLeaks ont dĂ» se protĂ©ger des impulsions homicidaires induites par les ondes radio.

Snowden a construit une cage de Faraday pour bloquer tous les signaux entrants, preuve qu'encore aujourd'hui HAARP le cible. Il a fourni des e-mails d'amiraux et de généraux de l'Armée de l'air confirmant les capacités de HAARP. Des initiés du renseignement ont vérifié leur authenticité.

Le rĂ©seau HAARP en Alaska gĂ©nĂšre 36 millions de watts d'Ă©nergie dirigĂ©e, assez pour manipuler l'ionosphĂšre, perturber le climat et transformer des rĂ©gions entiĂšres en zones de catastrophe. Ces installations existent dans le monde entier — Alaska, SuĂšde, Russie — toutes faisant partie d'un systĂšme coordonnĂ© capable de provoquer famine, tremblements de terre et chaos pour Ă©craser la rĂ©sistance.

Des initiés affirment que les antennes relais et le systÚme TrapWire de la DARPA sont connectés à cette grille, créant une toile planétaire de surveillance et de contrÎle. D'anciens lanceurs d'alerte comme Nick Begich ont averti que la manipulation émotionnelle via HAARP était « effroyablement facile ».

C'est une guerre contre l'humanitĂ© elle-mĂȘme. Notre mĂ©tĂ©o, nos esprits, mĂȘme nos morts peuvent ĂȘtre scĂ©narisĂ©s par ceux qui actionnent HAARP. Le rĂ©gime globaliste le cache sous le prĂ©texte de « recherche scientifique » tout en menant une guerre silencieuse.

L'avertissement de Snowden est clair : HAARP est l'arme ultime. Elle peut dĂ©stabiliser des nations sans qu'aucune balle ne soit tirĂ©e. Elle peut effacer des patriotes sans laisser d'empreintes. C'est la main invisible qui guide les Ă©vĂ©nements mondiaux — tempĂȘtes, guerres, effondrements — tous orchestrĂ©s pour forcer la soumission.

Les patriotes doivent se rĂ©veiller. Exiger la fermeture de ces installations. Exiger la rĂ©vĂ©lation de ceux qui autorisent leur usage. L'horloge tourne. Chaque seconde oĂč HAARP reste actif est une seconde de plus de guerre psychologique et environnementale contre le peuple.

La tempĂȘte n'arrive pas — elle est dĂ©jĂ  lĂ .

https://x.com/BeaupinEric/status/1968591953504633323

#HAARP #SNOWDEN

« HAARP est conçu pour injecter de l'énergie dans l'atmosphÚre afin de la contrÎler. Cela peut paraßtre fou, mais nous expérimentons depuis 30 ans.

HAARP + spray quotidien + ondes de frĂ©quence = IngĂ©nierie climatiqueđŸ”„

https://x.com/BeaupinEric/status/1956267826508964078

#HAARP #SNOWDEN

nostr:naddr1qvzqqqr4gupzqfalclwl2z4lp2pyn3tmecxmevs5nqxvzrqrmkmfr7cljn9hewx3qq2kysntvem855tw2355u63jfgukvd63t90k506p44q

Windows pour 1M€ ? MĂȘme pas en rĂȘve. 🐧 Linux c’est la vie, le reste c’est de la perte de temps.”

#LinuxPower #WindowsUsers #CyberSecurity #TechTalk #Informatique #DebatSansFiltre #TechCommunity https://video.nostr.build/4c443bb74f392d323086040681725c5fe82d47b3c88e2dc5f436f98d847c7c53.mp4

Ok so now I changed it again in the profil. First I cleared it, then saved and then I typed it manually, no copy/paste.

Please let me know how it goes on your end ?

Sorry, it seem's that I missed a step when I had to log back into amethyst. Now it should be working.

Hello Rizful !

I just love the nodes and the vaults. I mentioned Rizful to folks at a bitcoin presentation I made about LN. And I zapped This Week in Bitcoin to mention Rizful to ChrisLAS !

Hi Chris, Alby is great, but to setup a node easily without hardware and for tinkering, I found Rizful. They also offer Vaults where you can customize your Lightning Address @rizful.com. It's the guy behind The Megalith Node that created Rizful, a fun way to learn about LN and tinkle with it.

https://fountain.fm/episode/NYnqsqd7mDA2Irs4UdTp

nostr:nevent1qvzqqqpxquqzpvfhqan4sf5wsa3kjgu2pqv7p0jtevqf6tfr5xaa63dh6snfl5kfsue6x4

https://www.youtube.com/watch?v=Xhtgobb7MIE

Video backup: https://peertube.fr/w/7K1RuPZjyCF5nQoZvFwSWw

A full length documentary by Sacha Stone exposing the 5G existential threat to humanity in a way we never imagined possible!

### Summary

The video transcript presents a comprehensive and highly critical examination of 5G technology, emphasizing its alleged dangers, health risks, and socio-political implications. Experts, researchers, activists, and whistleblowers express grave concerns about the biological effects of electromagnetic fields (EMFs) emitted by 5G infrastructure, linking them to various health problems such as cancer, neurological disorders, DNA damage, reproductive harm, and immune system disruption. The discussion highlights that 5G is not merely an incremental advancement in wireless communication but constitutes a radical deployment of high-frequency, militarized technology with weapon-like properties.

The transcript reveals claims that 5G frequencies are used in military applications such as crowd dispersal and interrogation systems, and that the infrastructure involves dense networks of small antennas close to homes, schools, and workplaces. It also references historical and current examples of microwave radiation being used as a covert weapon against populations. Independent research on the health impact of wireless radiation is reportedly scarce, with industry and regulatory bodies like the FCC showing reluctance or inability to conduct rigorous safety evaluations.

The narrative stresses the failure of regulatory frameworks, particularly the FCC, which is accused of regulatory capture by the telecommunications industry, resulting in safety limits that are vastly inadequate relative to scientific evidence. The transcript points out that insurance companies refuse to cover wireless industry risks due to known hazards, yet governments continue the rollout without public consent or transparent discussion.

Moreover, the transcript touches on the environmental implications of 5G, including damage to pollinators and ecosystems, and warns of a potential extinction-level event linked to pervasive exposure. It also explores the concept of “smart” technology as militarized and invasive, capable of mass surveillance and control. The transcript ends with a call to public awareness, activism, and resistance against what is described as a global technological and health catastrophe.

### Highlights

- ⚠ 5G technology employs militarized microwave frequencies used for crowd control and battlefield interrogation.

- 🧬 Wireless radiation, including 5G, is linked to DNA damage, cancer, neurological disorders, and reproductive harm.

- đŸ„ Regulatory agencies like the FCC lack biomedical expertise and have set safety limits ignoring vast scientific evidence.

- 🛑 No independent, comprehensive biological safety testing has been conducted on 5G before global rollout.

- 📉 Insurance companies refuse to insure wireless industry risks due to known health hazards.

- đŸŒ± 5G’s environmental impact threatens pollinators and ecosystems essential for human survival.

- 📡 5G infrastructure enables invasive surveillance by embedding antennas in everyday objects and public spaces.

### Key Insights

- ⚡ **5G as a Weaponized Technology: In-depth Analysis**

The transcript asserts that 5G is fundamentally different from previous wireless generations, incorporating millimeter-wave frequencies and advanced phased-array antennas originally developed for military applications such as radar, crowd dispersal, and electronic warfare. This characterization reframes 5G as a technology with inherent assault capabilities rather than simply a communication upgrade. The use of frequencies that can penetrate buildings and home environments facilitates continuous monitoring and potentially targeted effects on individuals, raising ethical and safety concerns about mass deployment.

- đŸ§Ș **Lack of Independent Research and Regulatory Capture**

The absence of independent, industry-funded research into 5G’s health effects emerges as a critical issue. The Federal Communications Commission (FCC), which regulates wireless safety in the U.S., is portrayed as captured by the telecommunications industry, lacking transparency and expertise in biomedical science. Consequently, safety standards are based on outdated engineering models focused on thermal effects, ignoring chronic, low-level biological impacts demonstrated in thousands of peer-reviewed studies. This regulatory failure compromises public health and trust.

- 🧬 **Biological and Genetic Harm from EMF Exposure**

The video details numerous biological effects linked to electromagnetic radiation, including oxidative stress, DNA fragmentation, cancer, reproductive infertility, neurodegenerative diseases like Alzheimer’s and ALS, and cognitive impairments. Particularly alarming is the evidence of damage to mitochondrial and microbial DNA, which are vital to cellular and systemic health. The potential for transgenerational genetic damage due to exposure during pregnancy and early development highlights risks extending beyond immediate health to future generations.

- 🌍 **Environmental Consequences and Ecosystem Disruption**

Beyond human health, 5G’s impact on the environment, particularly on pollinators such as bees and other insects, is emphasized. The phased-array radar technology and dense antenna deployment allegedly cause biological disruption, including sterilization of livestock and destruction of soil microbiomes. Given the vital role pollinators play in agriculture and natural ecosystems, these effects could precipitate ecological collapse and food insecurity.

- 🔍 **Surveillance and Privacy Intrusions Embedded in 5G Infrastructure**

The rollout of 5G involves embedding micro and nano antennas in streetlights, appliances, and personal devices, effectively turning homes and neighborhoods into continuous tracking zones. The presence of nanoparticulates in the environment, which are theorized to interact with 5G signals, further facilitates this surveillance. This raises profound concerns about privacy, autonomy, and the potential for social control via a “social credit” system or behavioral monitoring.

- đŸ’Œ **Economic and Political Dimensions: Industry Profit vs. Public Health**

The transcript highlights the tension between the enormous economic interests driving 5G deployment and the health risks being ignored or suppressed. Telecommunications companies are aware of potential liabilities—evidenced by their inability to secure insurance—yet continue aggressive marketing and lobbying for rapid infrastructure expansion. Legislative frameworks like Section 704 of the Telecommunications Act remove local authority to oppose cell tower siting on health grounds, undermining democratic oversight and community rights.

- 🚹 **Urgent Need for Public Awareness and Policy Reform**

The testimony of numerous experts calls for immediate precautionary measures, independent and comprehensive safety testing, and a moratorium on 5G rollouts until health impacts are fully understood. The transcript underscores that current regulatory and political processes have failed to protect public health, necessitating grassroots activism, transparent scientific inquiry, and robust legal challenges to safeguard individuals and the environment.

### Conclusion

This video transcript delivers a sobering and urgent message about the risks associated with 5G technology, framing it as a powerful, weaponized form of electromagnetic radiation with widespread biological, environmental, and societal consequences. It critiques the regulatory landscape’s failure to prioritize health and safety, warns of long-term genetic and ecological damage, and exposes the intertwining of technological innovation with corporate and governmental interests. The call to action is clear: increased scientific scrutiny, public engagement, and political accountability are essential to prevent what is described as a looming global health catastrophe.

### Sources:

1. [https://science.howstuffworks.com/radiation2.htm](https://science.howstuffworks.com/radiation2.htm)

2. [https://cellphones.procon.org/view.resource.php?resourceID=006543](https://cellphones.procon.org/view.resource.php?resourceID=006543)

3. [https://www.telegraph.co.uk/science/2018/05/02/mobile-phone-cancer-warning-malignant-brain-tumours-double/](https://www.telegraph.co.uk/science/2018/05/02/mobile-phone-cancer-warning-malignant-brain-tumours-double/)

4. [https://www.ncbi.nlm.nih.gov/m/pubmed/20483835/](https://www.ncbi.nlm.nih.gov/m/pubmed/20483835/)

5. [https://www.scientificamerican.com/article/new-studies-link-cell-phone-radiation-with-cancer/](https://www.scientificamerican.com/article/new-studies-link-cell-phone-radiation-with-cancer/)

6. [http://www.physics.org/article-questions.asp?id=84](http://www.physics.org/article-questions.asp?id=84)

7. [https://www.hindawi.com/journals/jeph/2018/7910754/](https://www.hindawi.com/journals/jeph/2018/7910754/)

8. [https://www.researchgate.net/publication/318916428_Impact_of_radiofrequency_radiation_on_DNA_damage_and_antioxidants_in_peripheral_blood_lymphocytes_of_humans_residing_in_the_vicinity_of_mobile_phone_base_stations](https://www.researchgate.net/publication/318916428_Impact_of_radiofrequency_radiation_on_DNA_damage_and_antioxidants_in_peripheral_blood_lymphocytes_of_humans_residing_in_the_vicinity_of_mobile_phone_base_stations)

9. [https://www.emfacts.com/2017/08/cancer-expert-declares-cell-phone-and-wireless-radiation-as-carcinogenic-to-humans/](https://www.emfacts.com/2017/08/cancer-expert-declares-cell-phone-and-wireless-radiation-as-carcinogenic-to-humans/)

10. [https://faculty.washington.edu/chudler/bbb.html](https://faculty.washington.edu/chudler/bbb.html)

11. [https://theconversation.com/explainer-what-is-the-blood-brain-barrier-and-how-can-we-overcome-it-75454](https://theconversation.com/explainer-what-is-the-blood-brain-barrier-and-how-can-we-overcome-it-75454)

12. [https://www.cellphonetaskforce.org/the-work-of-leif-salford/](https://www.cellphonetaskforce.org/the-work-of-leif-salford/)

13. [https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0185461](https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0185461)

14. [https://www.saferemr.com/2015/05/brain-tumor-rates-are-rising-in-us-role.html](https://www.saferemr.com/2015/05/brain-tumor-rates-are-rising-in-us-role.html)

15. [https://www.rcrwireless.com/20140811/carriers/spending-lobbying-tag15](https://www.rcrwireless.com/20140811/carriers/spending-lobbying-tag15)

16. [https://arstechnica.com/tech-policy/2017/12/ajit-pai-jokes-about-being-a-brainwashed-verizon-puppet-at-the-fcc/](https://arstechnica.com/tech-policy/2017/12/ajit-pai-jokes-about-being-a-brainwashed-verizon-puppet-at-the-fcc/)

17. [https://thehill.com/blogs/pundits-blog/healthcare/301432-the-cdc-is-being-being-influenced-by-corporate-and-political](https://thehill.com/blogs/pundits-blog/healthcare/301432-the-cdc-is-being-being-influenced-by-corporate-and-political)

18. [https://www.prlog.org/12359483-cdc-issues-precautionary-health-warnings-about-cell-phone-radiation.html](https://www.prlog.org/12359483-cdc-issues-precautionary-health-warnings-about-cell-phone-radiation.html)

19. [https://www.webmd.com/children/news/20140819/children-cell-phones](https://www.webmd.com/children/news/20140819/children-cell-phones)

20. [http://capitolweekly.net/berkeley-wireless-industry-cell-phone-warnings/](http://capitolweekly.net/berkeley-wireless-industry-cell-phone-warnings/)

21. [https://www.healthline.com/health/oxidative-stress](https://www.healthline.com/health/oxidative-stress)

22. [https://www.who.int/news-room/fact-sheets/detail/electromagnetic-fields-and-public-health-mobile-phones](https://www.who.int/news-room/fact-sheets/detail/electromagnetic-fields-and-public-health-mobile-phones)

23. [https://www.ncbi.nlm.nih.gov/pubmed/22891885](https://www.ncbi.nlm.nih.gov/pubmed/22891885)

24. [https://www.rfsafe.com/specific-absorption-rate-sar-fcc-cell-phone-radiation-exposure-limits/](https://www.rfsafe.com/specific-absorption-rate-sar-fcc-cell-phone-radiation-exposure-limits/)

25. [https://www.saferemr.com/2017/08/5g-wireless-technology-millimeter-wave.html](https://www.saferemr.com/2017/08/5g-wireless-technology-millimeter-wave.html)

26. [https://www.france24.com/en/20190205-dont-let-huawei-help-set-5g-us-warns-eu-nations-0](https://www.france24.com/en/20190205-dont-let-huawei-help-set-5g-us-warns-eu-nations-0)

27. [https://www.livescience.com/32860-why-do-medical-researchers-use-mice.html](https://www.livescience.com/32860-why-do-medical-researchers-use-mice.html)

28. [https://www.defendershield.com/global-fertility-crisis-mobile-devices-emf-radiation-dropping-sperm-counts](https://www.defendershield.com/global-fertility-crisis-mobile-devices-emf-radiation-dropping-sperm-counts)

29. [https://onlinelibrary.wiley.com/doi/pdf/10.2164/jandrol.111.014373](https://onlinelibrary.wiley.com/doi/pdf/10.2164/jandrol.111.014373)

30. [https://www.vox.com/science-and-health/2018/5/22/17376536/fertility-rate-united-states-births-women](https://www.vox.com/science-and-health/2018/5/22/17376536/fertility-rate-united-states-births-women)

31. [https://www.ncbi.nlm.nih.gov/pubmed/25175620](https://www.ncbi.nlm.nih.gov/pubmed/25175620)

32. [https://www.researchgate.net/publication/51394628_Human_Skin_as_Arrays_of_Helical_Antennas_in_the_Millimeter_and_Submillimeter_Wave_Range](https://www.researchgate.net/publication/51394628_Human_Skin_as_Arrays_of_Helical_Antennas_in_the_Millimeter_and_Submillimeter_Wave_Range)

33. [https://ehtrust.org/wp-content/uploads/Blumenthal-Eshoo-letter-to-FCC-re-5G-safety-December-2018.pdf](https://ehtrust.org/wp-content/uploads/Blumenthal-Eshoo-letter-to-FCC-re-5G-safety-December-2018.pdf)

34. [https://www.chroniclelive.co.uk/news/north-east-news/mark-steele-5g-gateshead-council-15269240](https://www.chroniclelive.co.uk/news/north-east-news/mark-steele-5g-gateshead-council-15269240)

### Videos:

1. [www.newearth.media](http://www.newearth.media)

2. [www.newearth.university](http://www.newearth.university)

3. [http://www.truthstreammedia.com/](http://www.truthstreammedia.com/)

4. [https://www.davidicke.com/](https://www.davidicke.com/)

5. [https://www.rt.com/](https://www.rt.com/)

6. [https://pressfortruth.ca/top-stories/global-5g-wifi-will-blanket-earth-mosaic-cells-what-you-need-know-max-igan/](https://pressfortruth.ca/top-stories/global-5g-wifi-will-blanket-earth-mosaic-cells-what-you-need-know-max-igan/)

7. [http://doyoutrustthiscomputer.org/](http://doyoutrustthiscomputer.org/)

### YouTube Links:

1. [https://www.youtube.com/channel/UC__gDLdpGQmezdCl0lAnnYQ](https://www.youtube.com/channel/UC__gDLdpGQmezdCl0lAnnYQ)

2. [https://www.youtube.com/watch?v=z2hTtTF8gkU](https://www.youtube.com/watch?v=z2hTtTF8gkU)

3. [https://www.youtube.com/watch?v=qih2K5uCF10](https://www.youtube.com/watch?v=qih2K5uCF10)

4. [https://www.youtube.com/watch?v=BH3gJctqKk4](https://www.youtube.com/watch?v=BH3gJctqKk4)

5. [https://www.youtube.com/watch?v=YVpdyreCxyw](https://www.youtube.com/watch?v=YVpdyreCxyw)

6. [https://www.youtube.com/watch?v=F9bdU_uw2Dc](https://www.youtube.com/watch?v=F9bdU_uw2Dc)

7. [https://www.youtube.com/watch?v=Wm69ik_Qdb8](https://www.youtube.com/watch?v=Wm69ik_Qdb8)

8. [https://www.youtube.com/watch?v=jc9yFVojlE4](https://www.youtube.com/watch?v=jc9yFVojlE4)

9. [https://www.youtube.com/watch?v=Pm5Oc5s4_8M](https://www.youtube.com/watch?v=Pm5Oc5s4_8M)

10. [https://www.youtube.com/watch?v=lBbY8fvTidU](https://www.youtube.com/watch?v=lBbY8fvTidU)

11. [https://www.youtube.com/watch?v=K7jiLPIADKY](https://www.youtube.com/watch?v=K7jiLPIADKY)

12. [https://www.youtube.com/watch?v=ZbNEpLP8x5A](https://www.youtube.com/watch?v=ZbNEpLP8x5A)

13. [https://www.youtube.com/watch?v=ekNC0J3xx1w](https://www.youtube.com/watch?v=ekNC0J3xx1w)

14. [https://www.youtube.com/watch?v=ah8Bpg6ep1k](https://www.youtube.com/watch?v=ah8Bpg6ep1k)

15. [https://www.youtube.com/watch?v=-FqFe-ndZPg](https://www.youtube.com/watch?v=-FqFe-ndZPg)

16. [https://www.youtube.com/watch?v=xTmAIo4A6mI](https://www.youtube.com/watch?v=xTmAIo4A6mI)

17. [https://www.youtube.com/watch?v=kzG4oEutPbA](https://www.youtube.com/watch?v=kzG4oEutPbA)

18. [https://www.youtube.com/watch?v=9y1NRNF3Sm0](https://www.youtube.com/watch?v=9y1NRNF3Sm0)

19. [https://www.youtube.com/watch?v=tmorf4dAAbo](https://www.youtube.com/watch?v=tmorf4dAAbo)

20. [https://www.youtube.com/watch?v=lNZOtrAzJzg](https://www.youtube.com/watch?v=lNZOtrAzJzg)