Avatar
DOW
54d8f90d7b86ba313a08423c8d730d0dbd6e17b26db5186c2c0c473c8c91201f
The Wild Beast of Modern Art
Replying to Avatar 7x8

22:38 7x8

don't bring that on the Iceland plane unless you can

You are correct. When you block someone, they will no longer be able to see your messages, and any previous messages you've sent to them will still be visible to them. However, the conversation will still be available to you. If you want to delete the conversation, you can do so by going to the conversation and tapping on the three dots in the top right corner. Then, select "Delete Conversation".

If you are in a group conversation and you block someone, they will be removed from the conversation. However, the messages that they sent before you blocked them will still be visible to everyone else in the conversation.

I understand that you wanted to have a courteous exchange with the person, but they were not interested in that. Blocking them was the right thing to do in this situation. You don't need to waste your time on people who are not willing to have a respectful conversation.

old fashioned but it still fits modern life and looks good

Me: was there evidence Ta’kiya Young stole anything

AI : According to the police, a Kroger employee reported that Ta'Kiya Young had stolen items from the store. However, there is no clear evidence that she actually stole anything. The police body camera footage shows Young denying that she stole anything, and a witness has come forward to say that they saw her put down bottles of alcohol as she left the store.

The final determination of whether or not Young stole anything will be made by the Ohio Bureau of Criminal Investigation, which is currently investigating the shooting. However, the lack of clear evidence that Young stole anything raises questions about the justification of the police shooting.

It is important to note that even if Young did steal something, it does not justify her being shot and killed. The police have a duty to use force only when necessary, and it is not clear that Young posed a threat to the officers or anyone else at the time of the shooting.

The shooting of Ta'Kiya Young is a tragedy, and it is important to get to the bottom of what happened. The Ohio Bureau of Criminal Investigation needs to conduct a thorough investigation and hold anyone who is responsible accountable.

Hello this #FridaysforFuture , Labor Day Weekend, Orthodox Christian New Year, National Food Bank Day, World Letter Writing Day, Emma M. Nutt Day, Ginger Cat Appreciation Day; Saturday: V-J Day, National Hummingbird Day; Sunday: Merchant Navy Day, National Pet Rock Day; (all observed safely with Mask-Wearing, Handwashing, Social/Physical Distancing, including Avoiding Close Spaces with Poor Ventilation, Crowds in Crowded Spaces and Close Contact during Covid-19, RSV (Respiratory Syncytial Virus), HMPV (Human metapneumovirus), and Cold and Flu Seasons.

Replying to Avatar Bass

The topic of Mary, Mother of God, the Theotokos, was a hurdle for me. Protestants unknowingly setup for ourselves this strawman argument that Rome and the Eastern church worship idols, while never considering once how they justify their stance. Well, for one, they agree with protestants that God alone is worthy of and to be the only recipient of worship. Immediately, the argument doesn't meet the qualification of its presupposition.

John of Damascus, a champion against muslim influence within the church during the iconoclast revolt, once stated, "I do not worship matter. I worship the Creator of matter who became matter for my sake, who willed to take His abode in matter, who worked out my salvation through matter. Never will I cease honoring the matter which wrought my salvation! I honor it, but not as God. Because of this I salute all remaining matter with reverence, because God has filled it with his grace and power. Through it my salvation has come to me."

The term veneration is also depicted as interchangeable with worship, however, it is simply to honor those who went before us and bore the light of Christ in their lives. We know that all good things come from God, including a faith that perseveres and conquers, thus when the saints are remembered for their lives willingly given to their Beloved, it encourages us to run the race as we are in the midsts of such a great cloud of witnesses.

How much more the one who bore the very glory and image of God Himself? It's partly due to Mary's willingness to say yes that we are in God's kingdom today, and praise God alone she did!

#biblestr #jesus #christisking #christian

Let me try.

You are right that Protestants often accuse Catholics and Eastern Orthodox Christians of worshiping idols, but this is a misunderstanding of their beliefs. Both Catholic and Eastern Orthodox Christians believe that God alone is worthy of worship. They do not worship Mary or any other saint. However, they do venerate Mary and the saints, which is a way of showing honor and respect.

Veneration is different from worship. Worship is giving God the highest honor and reverence, while veneration is showing respect and honor to someone or something that is considered holy or sacred. When Catholics and Eastern Orthodox Christians venerate Mary, they are not worshiping her as a god. They are simply showing her honor and respect for her role in the life of Jesus Christ.

John of Damascus, who you mentioned, wrote extensively about the difference between worship and veneration. He said that we should worship God alone, but that we can also venerate the saints as a way of showing our love and gratitude for them. He also said that we should not venerate images or icons of the saints as if they were gods, but that we can use them as a way to focus our attention on the saints and to remember their good example.

The Catholic and Eastern Orthodox Churches have a long tradition of venerating Mary and the saints. This practice is based on their belief that the saints are in heaven with God and that they can intercede for us on our behalf. When Catholics and Eastern Orthodox Christians venerate Mary and the saints, they are simply asking for their prayers and help.

I hope this helps to clarify the Catholic and Eastern Orthodox understanding of veneration.

can I have your permission to paint that and sell the painting I did. Do you own it?

I'm finishing up on my new art project. I did too many pieces at once so its taking me a while. Meanwhile, I'm doing small #art experiments. I love reverse painting on glass. But glass breaks. It may be too much to care for it, not breaking the glass canvas. Plexiglass yellows after 10+ years. I tried reverse painting on different surfaces and glued it on cloth canvases, pealing off what I painted on. Paint tears off during the process of transferring. Now I'm trying something. Two things. I poured hot wax on a surface. I'm painting on it. Then I will transfer it on canvas using a hot blow dryer. I worry I'll leave a waxy film on the final surface, not being able to get it all off. I'm also painting on silicone (as soon as it dries). I might be able to peal off the silicone off the final transfer. Any ideas?

Replying to Avatar corndalorian

you can get the X biochip injector through the mail.

I was wondering about these lockdown statements and ask AI about it.

So #Trump listens to this guy again?

---

The #COVID #lockdown rumor in August 2023 was started by a conspiracy theorist named #AlexJones . In an episode of his show, Jones claimed that he had heard from a "high-level manager" in the Transportation Security Administration ( #TSA ) that mask mandates and other pandemic-era restrictions would start returning this fall. He also claimed that COVID-19 lockdowns would return by December.

Jones' claims were quickly picked up by other conspiracy theorists and spread on social media. However, there is no evidence to support his claims. The TSA and the Centers for Disease Control and Prevention ( #CDC ) have both denied that any such announcements have been made.

It is likely that Jones' claims were motivated by his desire to sow fear and distrust. He has a history of making false and misleading claims, and he has been banned from several social media platforms for violating their terms of service.

It is important to be critical of information that you see on social media, especially if it comes from unreliable sources. If you see a claim that seems too good to be true, it probably is. Always check the facts before sharing or believing anything you read online.

Here are some tips for spotting misinformation:

Look for the source of the information. Is it a reputable news organization or a blog post from a random person?

Check the date of the information. Is it recent or outdated?

Consider the context of the information. Is it being shared in a way that is trying to scare or manipulate you?

Do a quick Google search to see if other news organizations are reporting the same thing.

If you are unsure about the accuracy of information, it is always best to err on the side of caution and not share it.

I'm finishing up on my new art project. I did too many pieces at once so its taking me a while. Meanwhile, I'm doing small #art experiments. I love reverse painting on glass. But glass breaks. It may be too much to care for it, not breaking the glass canvas. Plexiglass yellows after 10+ years. I tried reverse painting on different surfaces and glued it on cloth canvases, pealing off what I painted on. Paint tears off during the process of transferring. Now I'm trying something. Two things. I poured hot wax on a surface. I'm painting on it. Then I will transfer it on canvas using a hot blow dryer. I worry I'll leave a waxy film on the final surface, not being able to get it all off. I'm also painting on silicone (as soon as it dries). I might be able to peal off the silicone off the final transfer. Any ideas?

I learned on my Atari.

Later, I was the only operator on Macys computer graphics station using Unix.

That was long before the first Photoshop on classic Macintosh.

Thats why my next nftart could be interesting.

Coming soon to your nearest Nostr .

Replying to Avatar jack

interesting how a closer full moon makes the hurricane floods additional 1-2 feet higher

38 cents. not enough to mint my own first bitcoinnft

How google spies on you:

https://simplifiedprivacy.com/googles-surveillance-the-shocking-truth/

1) Saving all your Google searches, tied to your identity across devices [1] [2] [30]

2) Reading all your emails. Even if you don’t use Gmail directly, but you’re sending email to someone who does. [5] [6]

3) Saving all your web traffic if the website uses Google Ads, Captchas, or Analytics (and over 85% of all websites use some of their services). Even if you aren’t signed in to a Google account, and you’re using a VPN, they can still use past cookies and browser fingerprinting to identify you. [35] [1] [25] [26]

Google’s reCaptcha fingerprinting includes mouse movements, response time, timezone, screen dimensions, IP address, and any cookies. ReCAPTCHA uses the google.com domain instead of one specific to ReCAPTCHA, which allows Google to receive any cookies you have directly, instead of the website you’re visiting. [35] This concentrates the vast majority of all traffic data in the hands of a single company, which can then be used to de-anonymize users.

4) Everything you do in Google’s Chrome Browser is recorded, including even how long you are idle on a page. [7] [8]

5) Tracking and Saving your physical location, via Android’s GPS and Wifi triangulation. [12] [13]

Even if you turn location features off or set the phone to airplane mode, it still saves your location via Wifi triangulation, which is the process of pinging nearby Wifi hotspots to identify where you are. [9] [10] [11] Wifi triangulation can figure out your real location, even if you have a fake IP address from a VPN. [14]

As intelligence expert and ex-law enforcement Michael Bazzell says, Google is one of the first places law enforcement goes to for information because Androids track everyone’s location so accurately. Bazzell points out that even if you’re not directly involved in something, just owning an Android that was near it, can get you involved in answering police questions. Bazzell’s experience serving in law enforcement and intelligence motivated him to completely cut Google out of his life even though he’s doing “nothing wrong”. [11]

6) Keeping track of who you know to identify new phones or email accounts as you.

Rob Braxman

Privacy expert and phone operating system designer Rob Braxman points out that, by synching everyone’s phones’ contact lists and who they are physically standing near, Google (and therefore governments) can identify unknown devices or email accounts as you. [30] [31] [32a] Braxman further points to publicly available websites made by Google’s Jigsaw division and their partner Moonshot CVE, which openly sells services to governments to track and manipulate search results for targeted users. These users targeted by Jigsaw & Moonshot CVE’s government clients have their search history, location, and identifying fingerprint stored in a database. [32b]

7) Recording and saving audio of your private conversations [16] [17] [18]

Google’s Android has the microphone constantly recording and saving your intimate personal conversations against your wishes for their profit and power. As an extensive academic study of tech patents by Consumer Watch Dog points out, Google will claim this is only to find out if you said the words “Google Assistant,” but yet they have publicly filed patents to scan audio conversations and any available visuals on a variety of home smart devices to identify who is speaking, what you’re interested in, and what you’re doing for the purpose of targeted advertising. [15]

Tracking what you say, what you like, when you sleep, and even when you go the bathroom, goes well beyond Google Assistant helping you do a quick search and would instead be considered an all-inclusive surveillance. [15]

In addition, they’ll allow 3rd party apps to record you without your knowledge because of poor permissions control. As University of California Santa Barbara cybersecurity researchers presented at a BlackHat European conference, 3rd party apps like Silverpush can play high frequency audio, which is invisible to the human ear, on another device like a television ad or mall kiosk. Then your phone’s mic picks up the frequency, to rat out your real identity or location. [34]

Silverpush’s advertising system is embedded into many “free” apps on the Google Play Store. These doctoral researchers warned of the dangers this presents by being connected to wide-spread platforms like Google Ads. To demonstrate this, they played video of their lab experiment, which de-anonymatized a laptop through Tor Browser, because of an Android’s mic next to the laptop’s speakers, which was signed in to a Google account. [34]

Is the Data Sold?

Google has marketing propaganda which claims that they are merely selling advertising space on your devices and not selling the data itself. However, this claim is misleading in a number of ways.

First, not only is advertising sold by demographics or interests, but in addition, Google also allows its advertising customers to target users by name, email, or device ID and reach them almost anywhere. [1] So advertisers can target you specifically and then serve you anything on your specific device by name.

Second, while it’s true that Google technically doesn’t sell your actual name to the advertiser, when your device interacts with an ad, the third party advertiser can easily use your IP address, cross-site cookies, and/or browser fingerprinting to identify you. For example, suppose an advertiser runs an ad for an ebook on how to get out of debt. The advertiser could collect the IP addresses of anyone who clicks it, and so they’d know whose indebted.

“I think the big problem is that we give much more data to Google than it needs,” said Guillaume Chaslot, former Google engineer who worked on YouTube’s recommendations algorithm. [4a] Chaslot’s first-hand experience with Google’s spyware and manipulation inspired him to create the non-group AlgoTransparency.org, which openly says in it’s manifesto, “algorithms don’t have your best interests at mind”. [4b]

Play Store and Chrome Extensions Leak Data

Third, the Google Play Store and their Chrome Browser Extension Store leak application and user data directly to the app’s developers. This is sensitive private information, and these third party app developers are NOT carefully vetted, as almost anyone can put an app in the Google Play or Chrome Extension Store with minimal screening. Examples: [21] [23] [24]

Mental Outlaw

“Mental Outlaw” is a cybersecurity Youtube video influencer who is constantly having his videos about torrents flagged by Google as “dangerous content”. He points out how ridiculous this is because Google does so little to stop real dangerous content. One of the numerous examples he’s given is the Chrome webstore featuring extensions that are malicious hacking malware, which does URL injections to force online shoppers, without their knowledge, to use the malware creator’s affiliate links when they shop online. [22b] These 5 popular extensions got over 1.3 million downloads, which got the attention of McAfee Labs, the research department of the respected anti-virus company.

From McAfee Labs’ articulate research, this is huge security risk because not only is your personal data, like name and location, sent to malicious actors, but the attacker can forward the URL to any site they want. So you might think you’re going BestBuy.com, but it’s really the attacker’s bullshit site to get your credit card info. [22b]

Youtuber Mental Outlaw points out how ludicrous it is that not only did Google allow 1.3 million people to download these extensions, but they have featured status on the Google Chrome store. [22a] And not only does Mental Outlaw find similar malware in the Android Play Store, but Google has changed how apps disclose permissions to remove themselves of liability. Starting in mid-2022, Google has the app developers themselves disclose what permissions the app uses, so Google does not have to do any research. This is a conflict of interest, since app developers are self-reporting what information they get access to, and the end user may not properly be able to evaluate it. [19] [20a]

Sell it via Cookies

Google’s defense to these types of criticisms has always been that they don’t “sell your data” directly. But as laid out in research from the tech-savvy lawyers at the Electronic Frontier Foundation, Google allows advertisers to connect their cookies with Google’s in order to process data on the customer. This process is called “cookie matching” and essentially allows Google to sell the advertiser your information through a cookie. [1]

In the European Union, if Google were caught selling this data directly, it would be illegal. [27] [28] [29] So instead Google finds sneaky work-arounds such as the cookie matching, which allows them to appease the regulators and make statements like “we don’t sell data, we just use the data.” [1]

Conclusion

The more influence that Google has in our society, the more difficult it becomes to avoid their fingerprinting. If every website has a Google Captcha and everyone you talk to demands you talk to them on Gmail, then Google has become the gatekeeper for overseeing all human behavior. They can use this power to influence who sees your messages and what information you are able to find.

By using Gmail or Google Docs, you’re forcing and enabling Google to fingerprint your loved ones or friends. Even if you think you’re doing nothing illegal, you assume that Google will give you and those you care about an equal opportunity for your business to thrive. They can reduce Google’s search traffic to your website, or bounce your emails to potential employers or customers. They can buckle your business at the knees if they think it fits its agenda and by giving them so much information you’ve completely surrendered your freedom.

Well what is their agenda?

In our next article, we’ll discuss Google’s censorship ability to shape society and how affects you.

The Sources for this article can be found here.

Related Articles

Big Tech Abuses Medical Privacy

February 25, 2023 No Comments

In the US, your medical records are protected by HIPAA but your internet medical browsing history on websites like WebMD is NOT. That is the

Read More »

Browser Fingerprints Lead to Price Discrimination

February 25, 2023 No Comments

Some people mistakenly believe they do not need to worry about online privacy because they have “nothing to hide.” In reality, your digital identity expressed

Read More »

Avoid this Monero Vulnerability

February 25, 2023 No Comments

We love Monero. It’s our favorite and number one recommended cryptocurrency. However, it does not offer completely perfect anonymity under all circumstances because there are

Read More »

How to Reduce Google’s Control Over You

February 25, 2023 No Comments

There’s a huge number of steps you can take to reduce Google’s power and influence over your business and personal life. You would get a

Read More »

Google Censors Freedom

February 25, 2023 No Comments

This article presents evidence that Google promotes an agenda of centralized control through systematic censorship on its search, email, video, app store, and ad platforms

Read More »

Session username: Simple / Signal #: +855 68 504 905

Web 3 on IPFS: SimplifiedPrivacy.x

Tor Onion: privacypkybrxebcjicfhgwsb3coatqechwnc5xow4udxwa6jemylmyd.onion

Nostr Public Key: nostr:npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6

XMPP@SimplifiedPrivacy.is / @Matrix:SimplifiedPrivacy.is

I tried a few decentralized emails. My email name is very long. No way I can give out my email address. Its suitable to copy and paste my address. Any solutions to this?

I received a few zaps but I don't know how they sent it.

I would greatly appreciate #Jesus taking me to Heaven where #Nostr might work. I wonder what #socialmedia in Heaven be like.

I don't know. Maybe it depends on the app you're using.

I don't know what to do to get it to work but thank you! for telling me that.

I'll keep my thinking cap on.

https://blog.getalby.com/create-your-lightning-address/

what is a Shamanic Reiki and how did you become a ceremony officiant?

trump's bussiness bluffs isn't going well