NEW EVIDENCE THE U.S. GOVERNMENT CAN TRACK YOUR EVERY MOVE (AND THE “SECRET KEY” TO DEFEAT THEM)

I’ve warned you about this before – but now there’s more proof…

A new finding from the November Capital Riot should scare the living bejeesus out of you with how the U.S. government was able to track each person in the mob individually the entire time they were in Washington.

This information is now being used to haul in every last rioter as they’re hunted down for questioning.

And they’re not the only ones who are being “hunted”…

YOU, my friend, are being tracked right now and your personal information is being shared on the “dark web”.

Make no mistake, your personal movement and information CAN (and WILL) be used against you in so many ways, it’s literally keeping me up at night.

Fortunately, I have a “secret disable key” you can use right now that will protect you.

But you have to use it NOW, before any more of your data gets shared with the wrong people.

You might be living in one of America’s deathzones and not have a clue about it
What if that were you? What would YOU do?

In the next few minutes, I’m going to show you the U.S. Nuclear Target map, where you’ll find out if you’re living in one of America’s Deathzones.

This image has an empty alt attribute; its file name is untitled-1.png

How To Stop The Government From Tracking Your Movement Via Your Smart Phone…

You see, every “smart phone” comes already implanted with a “tracking ID” that’s specific to you and everything you do.

Some of it, you already know, like what you shop for, what articles you like, what facebook ads you click on, etc.

But there are also deeper identifiers that are secretly being tracked without your knowledge… INCLUDING where you travel every single step of your day.

This includes every intimate detail of your whereabouts: gun stores, strip clubs, shooting ranges, fraternity meetings, coffee with a friend who may unknowingly be on a “watch list”.

You get it, right?

Each one of these locations is a “ping” on the government’s radar that – at will – could be used to pin you to something that you may not even know about.

And with a renewed focus on “domestic terrorism” and the government’s own records that cite WHO could be considered an “enemy of the state” – specifically:

  • Believing in the 2nd Amendment
  • Storing away “survival food”
  • Buying more than 2 guns
  • Purchasing “excessive” amounts of ammo
  • Even comments you make on Facebook!

Sound like anyone you know?

Yup, me too!

Look, it’s more important than ever to safeguard your personal privacy – for your own protection.

And while I do love my smartphone for all the cool stuff it allows me to do, it can also be your worst enemy when it comes to government snooping (during a very dangerous time).

Here’s A “Secret Key” To Disable Your Smart Phone’s Tracking Device…

On an iPhone…

  1. Go to “Settings”
  2. Tap “Privacy”
  3. Select “Tracking”
  4. Disable the option that says “Allow Apps to Request to Track”

On an Android…

  1. Go to “Settings”
  2. Tap “Google”
  3. Select “Manage your Google Account”
  4. Select the “Data & personalization” tab from the account dashboard
  5. Scroll down till you find Activity Controls. Here you’ll find the two options that need to be disabled. Just toggle both to the “Off” position.

Your Next Steps To Take Your Personal Information “Off The Radar”…

Of course these aren’t the ONLY steps you need to take for “complete protection”.

There are all kinds of sneaky tricks the government (and slimy marketers) are using to track you and use your information without you knowing it.

If you’re as protective of your personal information as I am, there’s a book I just got that has a simple 7-step plan to take yourself “off the radar” that I highly recommend.

But in my opinion, you have to take these steps NOW because you and I both know that the government will stop at nothing to invade our private lives for their own benefit.

You’ve been warned (again).

What Other Steps Are You Taking To Protect Your Personal Information?

Please Feel Free To Leave Your Tips Below Now…

Disclaimer: We sometimes promote other products on our website for a small commission.  It’s how our families eat, but we don’t promote anything we haven’t seen or used and nothing we wouldn’t suggest you also use.  Plus, 10% of our profits go to our 501c3 nonprofit, “Operation Save Our Soldiers” to end combat PTSD.  Thank you for supporting our efforts.

Today I’d like to share with you a 3-second survival hack you can use to skyrocket your chances of protecting your loved ones during ANY crisis.
This technique is so powerful it can give you almost superhuman powers during the ugliest nightmares imaginable….
From natural disasters like earthquakes or tornadoes…
To explosive situations like mass shootings or even nationwide martial law.
And It doesn’t matter if you’re out of shape…
Or have no equipment…
Or even if you’re disabled living in a wheelchair.
This technique has been tested and proven by elite soldiers and real world “miracle” survivors from around the world.

12 thoughts on “NEW EVIDENCE THE U.S. GOVERNMENT CAN TRACK YOUR EVERY MOVE (AND THE “SECRET KEY” TO DEFEAT THEM)

  1. Kill you less than smart phone along with your television. Simple. Research what ‘SMART’ really means. It’s not an adjective.

    Like

  2. As a software engineer with decades of experience, and now an Android SW developer, it is naive to think that turning a few “tracking options” off will prevent the govt tracking endeavors.

    Like

    1. They want the shootings, so of course they’re not going to stop them. They probably set them up in the first place, tbh. Chaos furthers the agenda.

      Like

    1. Don’t use VPN services.

      No, seriously, don’t. You’re probably reading this because you’ve asked what VPN service to use, and this is the answer.

      Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party “VPN provider” does.

      • A Russian translation of this article can be found here, contributed by Timur Demin.
      • A Turkish translation can be found here, contributed by agyild.
      • There’s also this article about VPN services, which is honestly better written (and has more cat pictures!) than my article.

      Why not?

      Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want – including logging.

      But my provider doesn’t log!

      There is no way for you to verify that, and of course this is what a malicious VPN provider would claim as well. In short: the only safe assumption is that every VPN provider logs.

      And remember that it is in a VPN provider’s best interest to log their users – it lets them deflect blame to the customer, if they ever were to get into legal trouble. The $10/month that you’re paying for your VPN service doesn’t even pay for the lawyer’s coffee, so expect them to hand you over.

      But a provider would lose business if they did that!

      I’ll believe that when HideMyAss goes out of business. They gave up their users years ago, and this was widely publicized. The reality is that most of their customers will either not care or not even be aware of it.

      But I pay anonymously, using Bitcoin/PaysafeCard/Cash/drugs!

      Doesn’t matter. You’re still connecting to their service from your own IP, and they can log that.

      But I want more security!

      VPNs don’t provide security. They are just a glorified proxy.

      But I want more privacy!

      VPNs don’t provide privacy, with a few exceptions (detailed below). They are just a proxy. If somebody wants to tap your connection, they can still do so – they just have to do so at a different point (ie. when your traffic leaves the VPN server).

      But I want more encryption!

      Use SSL/TLS and HTTPS (for centralized services), or end-to-end encryption (for social or P2P applications). VPNs can’t magically encrypt your traffic – it’s simply not technically possible. If the endpoint expects plaintext, there is nothing you can do about that.

      When using a VPN, the only encrypted part of the connection is from you to the VPN provider. From the VPN provider onwards, it is the same as it would have been without a VPN. And remember, the VPN provider can see and mess with all your traffic.

      But I want to confuse trackers by sharing an IP address!

      Your IP address is a largely irrelevant metric in modern tracking systems. Marketers have gotten wise to these kind of tactics, and combined with increased adoption of CGNAT and an ever-increasing amount of devices per household, it just isn’t a reliable data point anymore.

      Marketers will almost always use some kind of other metric to identify and distinguish you. That can be anything from a useragent to a fingerprinting profile. A VPN cannot prevent this.

      So when should I use a VPN?

      There are roughly two usecases where you might want to use a VPN:

      1. You are on a known-hostile network (eg. a public airport WiFi access point, or an ISP that is known to use MITM), and you want to work around that.
      2. You want to hide your IP from a very specific set of non-government-sanctioned adversaries – for example, circumventing a ban in a chatroom or preventing anti-piracy scareletters.

      In the second case, you’d probably just want a regular proxy specifically for that traffic – sending all of your traffic over a VPN provider (like is the default with almost every VPN client) will still result in the provider being able to snoop on and mess with your traffic.

      However, in practice, just don’t use a VPN provider at all, even for these cases.

      So, then… what?

      If you absolutely need a VPN, and you understand what its limitations are, purchase a VPS and set up your own (either using something like Streisand or manually – I recommend using Wireguard). I will not recommend any specific providers (diversity is good!), but there are plenty of cheap ones to be found on LowEndTalk.

      But how is that any better than a VPN service?

      A VPN provider specifically seeks out those who are looking for privacy, and who may thus have interesting traffic. Statistically speaking, it is more likely that a VPN provider will be malicious or a honeypot, than that an arbitrary generic VPS provider will be.

      So why do VPN services exist? Surely they must serve some purpose?

      Because it’s easy money. You just set up OpenVPN on a few servers, and essentially start reselling bandwidth with a markup. You can make every promise in the world, because nobody can verify them. You don’t even have to know what you’re doing, because again, nobody can verify what you say. It is 100% snake-oil.

      So yes, VPN services do serve a purpose – it’s just one that benefits the provider, not you.


      This post is licensed under the WTFPL or CC0, at your choice. You may distribute, use, modify, translate, and license it in any way.


      Before you comment: Be aware that any non-constructive comments will be removed. This includes advertising for VPN providers (yes, even when you phrase the marketing claims like a question), trolling, harassment, insults towards other people, claims that have already been addressed in the article, and so on.

      If your comment isn’t a genuine question or a concrete counterargument supported by evidence, it probably doesn’t belong here.

      view raw

      vpn.md

      hosted with ❤ by GitHub

      VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want – including logging.

      Like

      1. Yes, I’m aware of that and all what you said. But I got my service for free which is probably far worse than what you said and I’m aware of that too. Heck, if I’m gonna pay a lot for VPN.

        The truth is never do “funny” things on the computer or Internet is the best way to be useless to anybody. 😉

        But thanks for reminding me to be more serious all the time about surfing. i’ll look at the other things you mentioned.

        Like

  3. i use a faraday cage pouch. i run silent. be sure to turn off your phone or it will run down the battery pinging the towers.

    Like

  4. Nice fantasy article. The Nazi government tracks you in every way possible – your cell phone even old flip phones, automobile gps, your smart electric or gas utility meter, your IP address, your cable, satellite internet or DHL connection, your Hardline telephone connection & you can be ghost tracked via cell tower & wireless router triangulation using data packets which gives the Tracking agency actual real time thermal imaging of you & everyone in your house by using your neighbor’s wireless routing signals that overlap your house kind of like the imagery they used in the Matrix. Don’t forget to mention your Smart TV, all of the Smart speakers, All Ring & other “Security” devices + All of your Smart appliances in the house are Hacked by the Chinese & you don’t think the Nazi government doesn’t have it? Sure. Snowden confirmed all of this as has ex-Fed intelligence types. There is Zero Nothing Never privacy unless you live in a cave. I didn’t even mention your Credit, Debit, Digital Wallet or RFID that are in all kinds of cards, devices, clothing, food packaging. VPNs are a Joke since the transmitting & receiving locations can be identified & hacked. Encryption is already being Defeated by Quantum Computing so Good Luck on being James Bond. Dr. Evil is winning!

    Like

Leave a Reply to Janet Cancel reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create your website with WordPress.com
Get started
%d bloggers like this: