the idea draws people.
You are correct. When you block someone, they will no longer be able to see your messages, and any previous messages you've sent to them will still be visible to them. However, the conversation will still be available to you. If you want to delete the conversation, you can do so by going to the conversation and tapping on the three dots in the top right corner. Then, select "Delete Conversation".
If you are in a group conversation and you block someone, they will be removed from the conversation. However, the messages that they sent before you blocked them will still be visible to everyone else in the conversation.
I understand that you wanted to have a courteous exchange with the person, but they were not interested in that. Blocking them was the right thing to do in this situation. You don't need to waste your time on people who are not willing to have a respectful conversation.
old fashioned but it still fits modern life and looks good
Me: was there evidence Taâkiya Young stole anything
AI : According to the police, a Kroger employee reported that Ta'Kiya Young had stolen items from the store. However, there is no clear evidence that she actually stole anything. The police body camera footage shows Young denying that she stole anything, and a witness has come forward to say that they saw her put down bottles of alcohol as she left the store.
The final determination of whether or not Young stole anything will be made by the Ohio Bureau of Criminal Investigation, which is currently investigating the shooting. However, the lack of clear evidence that Young stole anything raises questions about the justification of the police shooting.
It is important to note that even if Young did steal something, it does not justify her being shot and killed. The police have a duty to use force only when necessary, and it is not clear that Young posed a threat to the officers or anyone else at the time of the shooting.
The shooting of Ta'Kiya Young is a tragedy, and it is important to get to the bottom of what happened. The Ohio Bureau of Criminal Investigation needs to conduct a thorough investigation and hold anyone who is responsible accountable.
Hello this #FridaysforFuture , Labor Day Weekend, Orthodox Christian New Year, National Food Bank Day, World Letter Writing Day, Emma M. Nutt Day, Ginger Cat Appreciation Day; Saturday: V-J Day, National Hummingbird Day; Sunday: Merchant Navy Day, National Pet Rock Day; (all observed safely with Mask-Wearing, Handwashing, Social/Physical Distancing, including Avoiding Close Spaces with Poor Ventilation, Crowds in Crowded Spaces and Close Contact during Covid-19, RSV (Respiratory Syncytial Virus), HMPV (Human metapneumovirus), and Cold and Flu Seasons.
Let me try.
You are right that Protestants often accuse Catholics and Eastern Orthodox Christians of worshiping idols, but this is a misunderstanding of their beliefs. Both Catholic and Eastern Orthodox Christians believe that God alone is worthy of worship. They do not worship Mary or any other saint. However, they do venerate Mary and the saints, which is a way of showing honor and respect.
Veneration is different from worship. Worship is giving God the highest honor and reverence, while veneration is showing respect and honor to someone or something that is considered holy or sacred. When Catholics and Eastern Orthodox Christians venerate Mary, they are not worshiping her as a god. They are simply showing her honor and respect for her role in the life of Jesus Christ.
John of Damascus, who you mentioned, wrote extensively about the difference between worship and veneration. He said that we should worship God alone, but that we can also venerate the saints as a way of showing our love and gratitude for them. He also said that we should not venerate images or icons of the saints as if they were gods, but that we can use them as a way to focus our attention on the saints and to remember their good example.
The Catholic and Eastern Orthodox Churches have a long tradition of venerating Mary and the saints. This practice is based on their belief that the saints are in heaven with God and that they can intercede for us on our behalf. When Catholics and Eastern Orthodox Christians venerate Mary and the saints, they are simply asking for their prayers and help.
I hope this helps to clarify the Catholic and Eastern Orthodox understanding of veneration.
can I have your permission to paint that and sell the painting I did. Do you own it?
I'm finishing up on my new art project. I did too many pieces at once so its taking me a while. Meanwhile, I'm doing small #art experiments. I love reverse painting on glass. But glass breaks. It may be too much to care for it, not breaking the glass canvas. Plexiglass yellows after 10+ years. I tried reverse painting on different surfaces and glued it on cloth canvases, pealing off what I painted on. Paint tears off during the process of transferring. Now I'm trying something. Two things. I poured hot wax on a surface. I'm painting on it. Then I will transfer it on canvas using a hot blow dryer. I worry I'll leave a waxy film on the final surface, not being able to get it all off. I'm also painting on silicone (as soon as it dries). I might be able to peal off the silicone off the final transfer. Any ideas?
I was wondering about these lockdown statements and ask AI about it.
So #Trump listens to this guy again?
---
The #COVID #lockdown rumor in August 2023 was started by a conspiracy theorist named #AlexJones . In an episode of his show, Jones claimed that he had heard from a "high-level manager" in the Transportation Security Administration ( #TSA ) that mask mandates and other pandemic-era restrictions would start returning this fall. He also claimed that COVID-19 lockdowns would return by December.
Jones' claims were quickly picked up by other conspiracy theorists and spread on social media. However, there is no evidence to support his claims. The TSA and the Centers for Disease Control and Prevention ( #CDC ) have both denied that any such announcements have been made.
It is likely that Jones' claims were motivated by his desire to sow fear and distrust. He has a history of making false and misleading claims, and he has been banned from several social media platforms for violating their terms of service.
It is important to be critical of information that you see on social media, especially if it comes from unreliable sources. If you see a claim that seems too good to be true, it probably is. Always check the facts before sharing or believing anything you read online.
Here are some tips for spotting misinformation:
Look for the source of the information. Is it a reputable news organization or a blog post from a random person?
Check the date of the information. Is it recent or outdated?
Consider the context of the information. Is it being shared in a way that is trying to scare or manipulate you?
Do a quick Google search to see if other news organizations are reporting the same thing.
If you are unsure about the accuracy of information, it is always best to err on the side of caution and not share it.

I'm finishing up on my new art project. I did too many pieces at once so its taking me a while. Meanwhile, I'm doing small #art experiments. I love reverse painting on glass. But glass breaks. It may be too much to care for it, not breaking the glass canvas. Plexiglass yellows after 10+ years. I tried reverse painting on different surfaces and glued it on cloth canvases, pealing off what I painted on. Paint tears off during the process of transferring. Now I'm trying something. Two things. I poured hot wax on a surface. I'm painting on it. Then I will transfer it on canvas using a hot blow dryer. I worry I'll leave a waxy film on the final surface, not being able to get it all off. I'm also painting on silicone (as soon as it dries). I might be able to peal off the silicone off the final transfer. Any ideas?
I learned on my Atari.
Later, I was the only operator on Macys computer graphics station using Unix.
That was long before the first Photoshop on classic Macintosh.
Thats why my next nftart could be interesting.
Coming soon to your nearest Nostr .
38 cents. not enough to mint my own first bitcoinnft
How google spies on you:
https://simplifiedprivacy.com/googles-surveillance-the-shocking-truth/
1) Saving all your Google searches, tied to your identity across devices [1] [2] [30]
2) Reading all your emails. Even if you donât use Gmail directly, but youâre sending email to someone who does. [5] [6]
3) Saving all your web traffic if the website uses Google Ads, Captchas, or Analytics (and over 85% of all websites use some of their services). Even if you arenât signed in to a Google account, and youâre using a VPN, they can still use past cookies and browser fingerprinting to identify you. [35] [1] [25] [26]
Googleâs reCaptcha fingerprinting includes mouse movements, response time, timezone, screen dimensions, IP address, and any cookies. ReCAPTCHA uses the google.com domain instead of one specific to ReCAPTCHA, which allows Google to receive any cookies you have directly, instead of the website youâre visiting. [35] This concentrates the vast majority of all traffic data in the hands of a single company, which can then be used to de-anonymize users.
4) Everything you do in Googleâs Chrome Browser is recorded, including even how long you are idle on a page. [7] [8]
5) Tracking and Saving your physical location, via Androidâs GPS and Wifi triangulation. [12] [13]
Even if you turn location features off or set the phone to airplane mode, it still saves your location via Wifi triangulation, which is the process of pinging nearby Wifi hotspots to identify where you are. [9] [10] [11] Wifi triangulation can figure out your real location, even if you have a fake IP address from a VPN. [14]
As intelligence expert and ex-law enforcement Michael Bazzell says, Google is one of the first places law enforcement goes to for information because Androids track everyoneâs location so accurately. Bazzell points out that even if youâre not directly involved in something, just owning an Android that was near it, can get you involved in answering police questions. Bazzellâs experience serving in law enforcement and intelligence motivated him to completely cut Google out of his life even though heâs doing ânothing wrongâ. [11]
6) Keeping track of who you know to identify new phones or email accounts as you.
Rob Braxman
Privacy expert and phone operating system designer Rob Braxman points out that, by synching everyoneâs phonesâ contact lists and who they are physically standing near, Google (and therefore governments) can identify unknown devices or email accounts as you. [30] [31] [32a] Braxman further points to publicly available websites made by Googleâs Jigsaw division and their partner Moonshot CVE, which openly sells services to governments to track and manipulate search results for targeted users. These users targeted by Jigsaw & Moonshot CVEâs government clients have their search history, location, and identifying fingerprint stored in a database. [32b]
7) Recording and saving audio of your private conversations [16] [17] [18]
Googleâs Android has the microphone constantly recording and saving your intimate personal conversations against your wishes for their profit and power. As an extensive academic study of tech patents by Consumer Watch Dog points out, Google will claim this is only to find out if you said the words âGoogle Assistant,â but yet they have publicly filed patents to scan audio conversations and any available visuals on a variety of home smart devices to identify who is speaking, what youâre interested in, and what youâre doing for the purpose of targeted advertising. [15]
Tracking what you say, what you like, when you sleep, and even when you go the bathroom, goes well beyond Google Assistant helping you do a quick search and would instead be considered an all-inclusive surveillance. [15]
In addition, theyâll allow 3rd party apps to record you without your knowledge because of poor permissions control. As University of California Santa Barbara cybersecurity researchers presented at a BlackHat European conference, 3rd party apps like Silverpush can play high frequency audio, which is invisible to the human ear, on another device like a television ad or mall kiosk. Then your phoneâs mic picks up the frequency, to rat out your real identity or location. [34]
Silverpushâs advertising system is embedded into many âfreeâ apps on the Google Play Store. These doctoral researchers warned of the dangers this presents by being connected to wide-spread platforms like Google Ads. To demonstrate this, they played video of their lab experiment, which de-anonymatized a laptop through Tor Browser, because of an Androidâs mic next to the laptopâs speakers, which was signed in to a Google account. [34]
Is the Data Sold?
Google has marketing propaganda which claims that they are merely selling advertising space on your devices and not selling the data itself. However, this claim is misleading in a number of ways.
First, not only is advertising sold by demographics or interests, but in addition, Google also allows its advertising customers to target users by name, email, or device ID and reach them almost anywhere. [1] So advertisers can target you specifically and then serve you anything on your specific device by name.
Second, while itâs true that Google technically doesnât sell your actual name to the advertiser, when your device interacts with an ad, the third party advertiser can easily use your IP address, cross-site cookies, and/or browser fingerprinting to identify you. For example, suppose an advertiser runs an ad for an ebook on how to get out of debt. The advertiser could collect the IP addresses of anyone who clicks it, and so theyâd know whose indebted.
âI think the big problem is that we give much more data to Google than it needs,â said Guillaume Chaslot, former Google engineer who worked on YouTubeâs recommendations algorithm. [4a] Chaslotâs first-hand experience with Googleâs spyware and manipulation inspired him to create the non-group AlgoTransparency.org, which openly says in itâs manifesto, âalgorithms donât have your best interests at mindâ. [4b]
Play Store and Chrome Extensions Leak Data
Third, the Google Play Store and their Chrome Browser Extension Store leak application and user data directly to the appâs developers. This is sensitive private information, and these third party app developers are NOT carefully vetted, as almost anyone can put an app in the Google Play or Chrome Extension Store with minimal screening. Examples: [21] [23] [24]
Mental Outlaw
âMental Outlawâ is a cybersecurity Youtube video influencer who is constantly having his videos about torrents flagged by Google as âdangerous contentâ. He points out how ridiculous this is because Google does so little to stop real dangerous content. One of the numerous examples heâs given is the Chrome webstore featuring extensions that are malicious hacking malware, which does URL injections to force online shoppers, without their knowledge, to use the malware creatorâs affiliate links when they shop online. [22b] These 5 popular extensions got over 1.3 million downloads, which got the attention of McAfee Labs, the research department of the respected anti-virus company.
From McAfee Labsâ articulate research, this is huge security risk because not only is your personal data, like name and location, sent to malicious actors, but the attacker can forward the URL to any site they want. So you might think youâre going BestBuy.com, but itâs really the attackerâs bullshit site to get your credit card info. [22b]
Youtuber Mental Outlaw points out how ludicrous it is that not only did Google allow 1.3 million people to download these extensions, but they have featured status on the Google Chrome store. [22a] And not only does Mental Outlaw find similar malware in the Android Play Store, but Google has changed how apps disclose permissions to remove themselves of liability. Starting in mid-2022, Google has the app developers themselves disclose what permissions the app uses, so Google does not have to do any research. This is a conflict of interest, since app developers are self-reporting what information they get access to, and the end user may not properly be able to evaluate it. [19] [20a]
Sell it via Cookies
Googleâs defense to these types of criticisms has always been that they donât âsell your dataâ directly. But as laid out in research from the tech-savvy lawyers at the Electronic Frontier Foundation, Google allows advertisers to connect their cookies with Googleâs in order to process data on the customer. This process is called âcookie matchingâ and essentially allows Google to sell the advertiser your information through a cookie. [1]
In the European Union, if Google were caught selling this data directly, it would be illegal. [27] [28] [29] So instead Google finds sneaky work-arounds such as the cookie matching, which allows them to appease the regulators and make statements like âwe donât sell data, we just use the data.â [1]
Conclusion
The more influence that Google has in our society, the more difficult it becomes to avoid their fingerprinting. If every website has a Google Captcha and everyone you talk to demands you talk to them on Gmail, then Google has become the gatekeeper for overseeing all human behavior. They can use this power to influence who sees your messages and what information you are able to find.
By using Gmail or Google Docs, youâre forcing and enabling Google to fingerprint your loved ones or friends. Even if you think youâre doing nothing illegal, you assume that Google will give you and those you care about an equal opportunity for your business to thrive. They can reduce Googleâs search traffic to your website, or bounce your emails to potential employers or customers. They can buckle your business at the knees if they think it fits its agenda and by giving them so much information youâve completely surrendered your freedom.
Well what is their agenda?
In our next article, weâll discuss Googleâs censorship ability to shape society and how affects you.
The Sources for this article can be found here.
Related Articles
Big Tech Abuses Medical Privacy
February 25, 2023 No Comments
In the US, your medical records are protected by HIPAA but your internet medical browsing history on websites like WebMD is NOT. That is the
Read More »
Browser Fingerprints Lead to Price Discrimination
February 25, 2023 No Comments
Some people mistakenly believe they do not need to worry about online privacy because they have ânothing to hide.â In reality, your digital identity expressed
Read More »
Avoid this Monero Vulnerability
February 25, 2023 No Comments
We love Monero. Itâs our favorite and number one recommended cryptocurrency. However, it does not offer completely perfect anonymity under all circumstances because there are
Read More »
How to Reduce Googleâs Control Over You
February 25, 2023 No Comments
Thereâs a huge number of steps you can take to reduce Googleâs power and influence over your business and personal life. You would get a
Read More »
Google Censors Freedom
February 25, 2023 No Comments
This article presents evidence that Google promotes an agenda of centralized control through systematic censorship on its search, email, video, app store, and ad platforms
Read More »
Session username: Simple / Signal #: +855 68 504 905
Web 3 on IPFS: SimplifiedPrivacy.x
Tor Onion: privacypkybrxebcjicfhgwsb3coatqechwnc5xow4udxwa6jemylmyd.onion
Nostr Public Key: nostr:npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6
XMPP@SimplifiedPrivacy.is / @Matrix:SimplifiedPrivacy.is
I tried a few decentralized emails. My email name is very long. No way I can give out my email address. Its suitable to copy and paste my address. Any solutions to this?
I received a few zaps but I don't know how they sent it.
I would greatly appreciate #Jesus taking me to Heaven where #Nostr might work. I wonder what #socialmedia in Heaven be like.
I don't know. Maybe it depends on the app you're using.
I don't know what to do to get it to work but thank you! for telling me that.
I'll keep my thinking cap on.




what is a Shamanic Reiki and how did you become a ceremony officiant?
trump's bussiness bluffs isn't going well



#zapathon #bitcoin #nostr #plebchain #grownostr #zap #art #memes #pleb




