Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
Chris Vickery
VickerySec
Ready?The commonly accepted solution to the Monty Hall Problem is wrong. Computer simulations have shown the incorrect answer as correct due to the problem of "bullsh*t in, bullsh*t out" in
Read more
You will either understand that the following statement is a real possibility, or you will deny it because you don't understand psychographic profiling. Either way, don't ask me for the
Read more
In a stunning turn of events, Gloo (the Cambridge Analytica infused, politically motivated, weapon of war being actively used to harm Democracy while masquerading as some sort of religious entity
Read more
Hey kids, did you know there are cryptocurrency schemes now which give you coins in exchange for renting out your device’s empty storage space in a distributed network?(keep reading, it
Read more
Remember when I tweeted this image back in June, 2018?It shows one of the configuration files used by "Ripon", the software Ted Cruz's presidential campaign paid Cambridge Analytica millions of
Read more
The absolute juiciest part about this has nothing to do with the biden campaign or cyber security staffers on it.The very best, yet-to-unfold, detail of this is that [...]https://twitter.com/SaysSimonson/status/1306928085477011457 [...]the
Read more
The Watergate2.0 operation began in June 2016.Minus the hotel rooms, plus smartphones. Hot-mic audio streaming, screen capture, and file transfer, all through deceptively invoked web browser components (e.g. WebRTC +
Read more
I’m not sure exactly who and how many companies need to hear this, but if you are responsible for hosting the user login database for any school’s “parent portal” (or
Read more
If Cambridge Analytica (and its co-conspirators) ran 100s of thousands of iterations of the same advertisement and recorded reactions for each down to the individual level in order to cause
Read more
If a genie granted me one magic wish, I would wish for a temporary worldwide moratorium on brain-machine interface research and experimentation. That bridge which will need to be crossed
Read more
The Layer Cake Approach to Organized and Political Criming:Kc//]]>)))Layer 1: A criminal act in plain sight, easily recognized by everyone, followed by adamant public denial which is easily shown to
Read more
Someday intelligence and law enforcement agencies will realize that general public privacy rules are the bedrock foundation that allows them to actually collect useful information. If everyone became fully aware
Read more
‹
1
2
›