VOX of SU Profile picture
Sep 17 17 tweets 8 min read Read on X
⚠️ THREAD: The Bio-Digital Kill Switch ⚠️

This is a thought experiment, not a claim.
I’m showing how existing technology could be combined to create a system so powerful, it could control life and death without leaving fingerprints.

Everything here is real and documented.
The only question is how far it’s already been connected. 🧵
⚠️ THREAD: The Snake Bite System ⚠️
How a bio-digital kill switch could be built today using tech that already exists.

This is a thought experiment, but every piece I show you is real and documented.
The question isn’t whether it can be done.
The question is who’s connecting the dots.

The three layers of control

To create a silent kill switch, you need three layers:

Biological: a change in your body that makes you susceptible.

Digital: a device tethered to your identity, always monitoring.

Network: the infrastructure to target and trigger remotely.

All three layers already exist.

And are already integrated in to society through mRNA transfection, eSIM, and 5G…
Digital identity: eSIM backdoor

Modern phones no longer rely on removable SIM cards.
They use eSIMs…
virtual SIMs that can be programmed remotely.

Patents show they can store multiple profiles, which can be:
- Added
- Deleted
- Activated
Without your knowledge.

Patent US10715978B2 – remote provisioning of multiple eSIM profiles
Patent US20170289788A1 – silent activation/deletion of profiles

This means a second, hidden line can run on your phone… invisible to you.

The kicker… most networks won’t let you use both eSIMs which means a backdoor is open at all times.
I caught one in the wild

When I switched to a basic dual SIM flip phone, thousands of login attempts flooded in.
Why?
Because someone had been silently using the second eSIM profile on my smartphone to intercept codes and spy.
This is how you’d tether a biological “target” to a digital control grid… silently.
Network targeting: 5G precision beams

5G isn’t just “faster internet.”
It uses beamforming…
steering highly focused RF beams to specific devices, down to a few meters.

This precision isn’t just for speed.
It creates the perfect weapon delivery system:
- Pinpoint a single device.
- Send a custom signal or payload.
- No one else nearby affected.

Proof: Beamforming in 5G (the receipts)

“A 5G NR FR2 Beamforming System with Integrated Transceiver Module”
Sensors, 2024 Bhatta, Kamrojjaman, Sim & Kim.

They built a system at 28 GHz (in the mmWave band) with an 8×7 antenna array + custom beamforming transceiver. The beam can steer horizontally from ~–50° to +50°, demonstrating precise directional control.

“Broad beamforming technology in 5G Massive MIMO”
Ericsson tech-review article, Oct 2023.
Describes DPBF (Dual-Polarized Beamforming) to control beam shapes and pointing directions, both for wide broadcast/control signals and more focused data beams. Shows how real networks use adaptive beamforming in Massive MIMO setups.

Patent “Facilitation of beamforming utilizing interpolation for 5G or other” (US20220408427A1)
Covers methods to facilitate beamforming in 5G via interpolation, channel state info (CSI), etc. This shows legal/industry work on manipulating signal direction & shape.

“Massive MIMO in 5G: How Beamforming, Codebooks, and Feedback Enable Larger Arrays”
arXiv, 2023… Dreifuerst & Heath Jr.
Explains how 5G uses large antenna arrays + feedback from devices (“codebooks”) to dynamically adjust beams (“beam-management”) so signals go where they’re needed, even as users move.
Biological layer: the spike code (the Venom)

mRNA is software for your cells.
In 2022, researchers at Lund University showed Pfizer’s mRNA (BNT162b2) reverse transcribed into DNA in human liver cells in vitro.

Aldén et al., Intracellular Reverse Transcription of Pfizer BioNTech COVID-19 mRNA Vaccine (2022)

Other studies confirmed that SARS-CoV-2 RNA can reverse transcribe and integrate into the genome under certain conditions (stress).

Once embedded, this code is persistent.

It just needs to be activated…

And what activates this venom mimicker people were “spiked” with?
“Venom-mimic” angles on spike (what’s actually in the literature)

- nAChR (nicotinic acetylcholine receptor) interaction signals.
Experiments show spike ectodomain can modulate α7 nAChR responses (potentiate/inhibit ACh signals) via an allosteric mechanism in cell systems. That’s a real receptor class targeted by snake neurotoxins (e.g., α-bungarotoxin), hence the “toxin-like” discussion.

- “Toxin-like epitope” reports.
Several computational/structural papers note a short spike motif with homology to snake-toxin sequences and propose potential binding to nAChRs (the “toxin-like” epitope). These are largely in silico/biophysical with mixed follow-ups, but the motif reports exist.

-Superantigen-like region in spike.
Independent teams reported a superantigen-like (SEB-like) motif in S1 that could hyper-activate T cells—offered as a hypothesis for MIS-C/TSS-like inflammation. Evidence includes structural modeling and immunologic profiles in patients; note that one study argues spike lacks intrinsic SAg activity, so this remains debated.

- Integrin (“RGD”) docking avenue.
Spike carries an RGD motif; multiple studies suggest it can bind integrins and trigger downstream signaling (e.g., TGF-β). Others contest practical binding under native conformations. Bottom line: plausible but context-dependent.

Takeaway: Spike has motifs that hit systems also targeted by venoms (nAChRs; immune superactivation; integrins). That’s where the “venom-mimic” language comes from. The strength of evidence ranges from direct cell data (nAChR modulation) to in silico homology that needs more in-vivo proof.
Reverse transcription / “embedding” under stress (why stress matters)

Reverse-transcribed spike mRNA in vitro.
The Lund group reported cDNA from BNT162b2 mRNA in human liver cell lines (Huh-7). That’s in vitro, not proof of genome integration in living people…
but it establishes mechanism plausibility (mRNA → cDNA) under certain conditions (stress = lockdowns and uncertainty).

Viral RNA integration signals (lab systems; patient tissue signals).
Studies reported reverse-transcribed and potentially integrated SARS-CoV-2 RNA (and chimeric transcripts) in cultured cells; some signals in patient tissues have been described—again, debated and context-limited.

Stress → LINE-1 (endogenous reverse transcriptase) activation.
Reviews and mechanistic work link oxidative/physiologic stress to retrotransposon (LINE-1) reactivation, genome instability, and environments more permissive to reverse-transcription events. Prolonged psychosocial/physiologic stressors plausibly raise the baseline for these mechanisms.

Takeaway: There’s peer-reviewed evidence that reverse transcription can occur in cells and that stress biology can nudge cellular machinery (LINE-1/RT activity) in the wrong direction. Translating that to widespread, durable in vivo genomic insertion is not proven, but the I ingredients exist.
“Activation” via 5G/eSIM/RF (what we can and cannot claim)

Solid facts:

eSIM & beamforming are real. eSIM profiles can be remotely provisioned/managed; 5G uses phased-array beamforming to steer narrow, device-specific beams. (already have these receipts.)

Bioelectromagnetics evidence (mixed):
Multiple reviews report RF/EMF can modulate Ca²⁺ signaling (often via VGCCs), ROS/oxidative stress, and heat-shock responses in cells/animals… sometimes yes, sometimes null, depending on frequency, intensity, modulation, and dosimetry.

Credible bridge (if one exists) would look like:

A defined EMF exposure pattern (frequency, modulation, SAR, duty cycle) shown to trigger a reproducible pathway (e.g., Ca²⁺ influx → arrhythmia) in spike-expressing cells/tissue.

Independent replications with rigorous dosimetry.
We don’t have that… yet…
but I am working on it.

I have a method to my madness…

I am thinking out loud.

Bear with me…

I know this is a lot of scientific jargon…

But I will explain it in simple terms…
Why spike is the perfect candidate

The spike protein binds to ACE2 receptors and interacts deeply with cellular pathways.

It’s like a master key, recognized across multiple systems:
- Cardiovascular
- Neurological
- Immune

If reverse-transcribed into your DNA, spike sequences could act as a biological QR code, a receiver ready to respond to external triggers.

Stress and Trauma are the external triggers…
and we have a lot of people becoming unhinged.
Stress is the catalyst

Stress doesn’t just hurt your mind…
it changes your genes.

Lockdowns, fear, isolation, and inflammation all increase oxidative stress, which:

- Activates LINE-1 retrotransposons (your body’s internal reverse transcriptase).

- Increases genomic instability.

- Makes cells more likely to integrate foreign RNA like spike.

Under mass psychological stress, the population itself becomes more “programmable.”

It is the perfect hidden weapon just like the dual eSIM.
The theoretical trigger event

Now, combine all three layers:

A hidden eSIM silently listens for network commands.

5G towers lock onto you with a focused beam.

A frequency pulse interacts with spike-primed cells.

Those cells respond…
calcium floods, arrhythmias, seizures, or sudden cell death.

Externally? It looks like natural causes:

“Heart attack.”

“Sudden Adult Death Syndrome.”

“Mysterious seizure.”
The perfect snake bite

It’s a digital venom.

The spike protein is the venom molecule.

Stress during lockdown embedded it deeper into some genomes.

eSIM and 5G act as the fang and delivery system.

No dart, no gunshot, no blood spatter.
Just a silent broadcast and a body dropping…

Or neurological disorders that make some completely unhinged.
The receipts

Everything I’ve shown you is real:

eSIM patents for silent, remote provisioning (US10715978B2, US20170289788A1).

Studies proving reverse transcription of spike mRNA (Aldén et al., Zhang et al., Doerfler et al.).

Research linking stress to LINE-1 activation and genomic instability.

5G documentation of beamforming and precision device targeting.

The only missing link is intentional integration of these systems.
But the parts are already on the table.

- Spike ↔ α7 nAChR (experimental): “Spike ectodomain potentiates and inhibits α7 nAChR responses” (cell systems).

- “Toxin-like” epitope (homology): Spike region with snake-toxin-like similarity proposed to interact with nAChRs.

- Superantigen-like motif (SAg): S1 region shows SEB-like features linked to MIS-C/T-cell hyperactivation (debated).

- Integrin RGD pathway: Evidence that spike binds α5β1 / uses RGD to signal; also contested studies.

- Reverse transcription (in vitro): BNT162b2 mRNA → cDNA in human liver cell line; mechanism spotlight.

- Stress & LINE-1/oxidative pathways: Stress can increase RT/retrotransposon activity and ROS (mechanistic risk context).

- 5G beamforming (precision): Steerable beams with phased arrays demonstrated in 5G systems.

- RF bioeffects (mixed): Reports of VGCC/Ca²⁺ and ROS modulation vs. reviews showing no confirmed hazard at regulated mmWave levels.
This is all public information:

Scientists have built programmable “kill switches” for living cells across microbes and human cell therapies. They’re triggered by chemicals, temperature, frequencies, or logic gates, and they work by activating toxins, converting harmless drugs into poisons (HSV-TK), or flipping apoptosis (iCasp9). In cells, stability over evolution is the battle; in human therapies, speed, reliability, and low immunogenicity are king.

This is science that has been occurring over the last decade. And we already know…
once published the technology has been available for years…
usually decades.
The Premise (thought experiment):
A bio-digital “kill chain” could exist if three mature technologies are braided:

1.Biology primed to misfire (spike)

2.Devices tied to your identity and always reachable (eSIM)

3.Networks that can point a signal at you and not your neighbor. (5G)

What’s real today:

- eSIM lets carriers silently add/enable multiple profiles over-the-air. Great for convenience; catastrophic if abused.

- 5G beamforming uses phased arrays to steer narrow, device-specific beams. Precision delivery is no longer science fiction… it’s standard radio engineering.

- Kill switches in biology are proven… in microbes (Deadman/Passcode, CRISPR circuits) and human cell therapies (iCasp9, HSV-TK)…showing we can program life with reliable “off” buttons.

The biological vulnerability (why spike is in the conversation):

- Spike contains motifs that touch systems targeted by toxins (nicotinic receptors, possible superantigen-like regions, integrin/RGD interfaces).

- In-vitro studies show vaccine mRNA or SARS-CoV-2 RNA can be reverse-transcribed to cDNA under specific conditions; stress biology (oxidative load, LINE-1 activity) is known to loosen genomic guardrails.

- Together, that yields a plausible susceptibility pathway: stressed cells made more reactive, potentially expressing spike-related signals longer than intended.

Why the risk matters:

- The control planes already exist: remotely programmable identity (eSIM), precision targeting (5G), and biological systems with known “kill switches.”

- History says capability invites ambition. The gap is not physics; it’s policy, oversight, and intent.

Practical stance (how to live sanely):

- Favor single physical-SIM hardware; audit your carrier account for ghost profiles.
- Reduce ambient stress (digital + physiological)…
it’s not just mental hygiene; it’s molecular hygiene.
- Demand auditable governance around interception, provisioning, and RF safety… trust with verification, not vibes.

If a snake bite is possible, the antidote is awareness: understand the stack (bio, device, network), cut unnecessary attack surfaces, and force sunlight into the control rooms.

Get outside of the grid if you can and recalibrate…
There’s a reason people are going mad…
And I believe it was planned… at the very least thirty years ago we had the technology.

Thirty years is the generational gap they exploit.
It’s the perfect window: long enough for a generation to forget, for memories to fade, and for old warnings to be dismissed as conspiracy or myth.

Time travel isn’t what most people think.
Some don’t “travel” at all…
they stay ahead by holding back technology.
What you see as new today was already created, tested, and implemented decades ago.

By the time it’s released to the public, the world has moved on, blind to the patterns repeating.
The thirty-year gap isn’t random…
it’s their reset cycle, and most never notice it until it’s too late.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with VOX of SU

VOX of SU Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @VOX_of_SU

Sep 18
How to Harness your Own Free Energy for Free

Free energy doesn’t have to be complicated… humans have done it for thousands of years before the grid.

Most of the complexity comes from the system itself…
permits, regulations, “certifications”…
all carefully designed to gatekeep what is actually simple and ancient.

This thread 🧵, provides the minimal resources needed to generate free energy for a home or small community, requiring no special expertise and easily shared knowledge.

It provides a full spectrum of free energy harvesting, using what nature provides and what the system throws away. These methods require minimal tools, rely on salvaged or natural materials, and break the illusion that energy must be bought or controlled.
Tree Battery: Step-by-Step

Purpose: Harvest small amounts of bioelectricity from a living tree to power LED lights or small devices.

Materials (Free or Salvaged)
- 1 healthy living tree
- 1 copper wire (1–2 feet long)
- 1 zinc-coated nail (or galvanized steel nail)
- 1 small LED light string or low-voltage device (like a garden light)

Optional: multimeter to measure voltage

Instructions:
1.Choose a Tree:
Select a healthy, well-rooted tree with good moisture content… maples, oaks, or fruit trees work well.

2.Insert Zinc Nail:
Hammer the zinc nail gently into the tree about 1–2 inches deep, at waist height.

3.Place Copper Wire:
Insert the copper wire into the tree a few inches away from the nail.
The zinc acts as the positive terminal, and the copper as the negative terminal.

4.Connect the Circuit:
- Attach a wire from the zinc nail (+) to the positive lead of your LED string or device.
- Attach a wire from the copper (-) to the negative lead.

5.Light It Up:
A single tree produces about 0.5–1 volt.
Chain multiple trees in series to increase voltage…
like batteries linked together.

Output Uses
- Power small LED garden lights.
- Run sensors or tiny electronics.Image
Saltwater Battery (Ultra Simple & Non-Toxic)

Best For: Beginners, teaching energy principles, low-power lighting.

Materials:
- Plastic or glass container (jar or bucket)
- Saltwater solution (salt + water)
- Copper strip or wire
- Zinc nail, galvanized nail, or scrap steel
- Wires to connect

Instructions:
1.Mix saltwater until fully dissolved.
2.Place the zinc nail on one side of the container.
3.Place the copper strip on the opposite side.
4.Attach wires to each and connect to a small LED or device.
5.For higher voltage, connect multiple jars in series (like linking AA batteries).

Output:
Enough to power LED lights, sensors, or trickle charge a small battery bank.Image
Read 15 tweets
Sep 18
The official story of the internet is a fairy tale…
a shiny tech utopia about “connecting humanity” and “knowledge access.”
But if we follow the dark fiber trail from ARPANET to MK Ultra, the pattern shows that the net wasn’t built for us, it was built around us.

🧵 The True History of the Internet and it’s Programs
ARPANET (1969) Military Origins

The internet began as ARPANET, birthed by DARPA (Defense Advanced Research Projects Agency).

Its original purpose was survivable command and control during nuclear war.

The nodes were universities and labs, yes, but only to test and map human communication patterns, like rats in a maze.

“If you can model how humans communicate under stress, you can control them.”

This is the seed of a digital panopticon, not a library of Alexandria.
Phoenix Program → Digital Counterinsurgency

During Vietnam, the Phoenix Program was a CIA-run counterinsurgency op to track, identify, and neutralize dissidents.

They used informant networks, biometrics, and early computational systems to catalog entire populations.

After Vietnam, these tactics didn’t vanish… they scaled up, eventually merging with ARPANET and later internet technologies.

Phoenix wasn’t just about killing insurgents. It was proof-of-concept for networked population control.

Think of Phoenix as MK Ultra for entire societies…
test it on villages, then wire the whole planet.
Read 10 tweets
Sep 12
The Premature Headlines

Charlie Kirk wasn’t just assassinated
his death was scheduled.

These screenshots show multiple outlets publishing headlines three days ago, before the shooting even happened (see time stamps highlighted in red):

Record Herald: “Charlie Kirk shot and killed at Utah college”

State Hornet: “BREAKING: Charlie Kirk fatally shot at Utah Valley University”

Racism.org: “Charlie Kirk, White Supremacist, Dead at 31”

Even PBS News and WETA had the story indexed one full day early.

Your phone captured the Google timestamps before they were scrubbed.
Now, those same articles have been quietly updated to display Sept 11 timestamps…
a digital rewrite.

This did not happen 3 days ago!Image
Image
Image
Image
Why This Matters

Narrative Pre-Loading
These stories were written, distributed, and queued for release in advance.
Someone, or some system, accidentally triggered them early.

The 9-Hour Offset
Utah is UTC-6, Israel is UTC+3.
The exact 9-hour difference matches the anomaly we saw at 09:11 UTC,
suggesting the master clock controlling the narrative runs on Israeli time.

Palantir’s Role
Palantir’s Foundry platform routes global data and media feeds.
Their Israeli nodes likely pushed the narrative packet,
linking this event to the telecom “cable failures” and the global reset that occurred on 9/11.Image
Image
Image
Image
It’s all connected.

Everything comes down to prophecy, if it isn’t prophecy… it is the World Stage.
Read 8 tweets
Sep 12
What really happened on 9/11/2025

On September 10, Charlie Kirk was assassinated.

The next day, silence fell over September 11.

Little to no reflection or mention of 9/11.

I almost forgot about it.

While the world argued over Kirk’s death,
the real event happened in the shadows.

At 09:11 UTC, the global telecom grid glitched for 60 seconds.

Undersea cables were “blamed.”
Headlines spoke of anchors, outages, repairs.

But that was just the cover story.

What really happened was a simulation reset:

Data rerouted through Palantir’s new backbone.

Packets rewritten in real time.

Financial markets decoupled from reality as the Dow hit 46,000 on bad data.

The collective memory of 9/11 itself erased.

At 11:11 UTC, the grid smoothed to perfect stability…
the new code locked in.
The silence wasn’t apathy.
It was engineered amnesia.

Charlie Kirk’s assassination wasn’t the main event.
It was the ritual distraction to keep everyone staring at the wrong screen
while the Genesis Simulation was patched and upgraded.

The world didn’t just change that day…
reality was rewritten.

And almost no one noticed.
The Timeline

Sept 4, 2025: Palantir hosts AIPCon 8, showing off massive new tools for real-time data fusion and “peer manager” systems…
a direct upgrade to their Foundry platform.

These upgrades focus on telecom traffic, military data streams, and industrial control systems.

Days before the event, they announced partnerships with Lumen Technologies, one of the largest telecom carriers in the U.S.

Sept 6–7, 2025: Red Sea “cable failures” reported.

This narrative creates cover for rerouting global data through new systems… which just happen to be Palantir’s newly announced architecture.

Sept 10, 2025: Charlie Kirk assassinated.

Media frenzy ensures no one is paying attention to global network infrastructure.

MK sleeper cells flood the internet with abhorrent videos dehumanizing themselves while they celebrate the death of Charlie Kirk.

Sept 11, 2025, at 09:11 UTC:

Global micro-outages occur.

Our telecom scan showed global micro-outages, all hitting within seconds of each other:

Red Sea region (the “official” narrative focus)

Middle East financial hubs

West Coast U.S.

Random bursts across Europe and Asia

This wasn’t random congestion.
It was precision synchronization, like pressing the “save and reset” button on a running simulation.

All traffic briefly flows through chokepoints tied to Lumen’s backbone… and therefore, Palantir’s systems.

At 11:11 UTC, perfect stability returns.

This is the “lock-in” of the new simulation layer.
The Role of the Red Sea Cables

The “cable failures” are the scapegoat.
I don’t believe anything was physically cut that day.
Instead:

They temporarily rerouted global internet through Palantir-controlled nodes,

While claiming an external accident had “forced” those changes.

By funneling the world’s data through a single chokepoint, they were able to rewrite packets in real time…
altering the flow of financial, military, and even social media data.

Imagine a software update not for one computer, but for all of reality.
Read 5 tweets
Sep 12
Who Staged Charlie Kirk’s Assassination?

Title: “The Shooting of Charlie Kirk: A Comprehensive Account of the Utah Valley University Attack, the Aftermath, and America’s Response.”

Author credited as Anastasia J. Casey.
Amazon listing (Kindle edition) had a publication date showing September 9, 2025, which is one day before the reported date of the shooting.

The listing has reportedly been removed.

So who is Anastasia J. Casey?Image
The credited author is:

Anastasia J. Casey

This person does not exist.

But… could represent:

Initial + Surname → standard intelligence cover pattern.

Casey has strong intelligence connotations:

William J. Casey:
former CIA Director under Reagan.

William Casey, the former CIA Director, famously said, "We'll know our disinformation program is complete when everything the American public believes is false." This quote reflects concerns about the manipulation of information and the spread of disinformation.

Using “Casey” signals CIA involvement or homage, a dark joke among insiders.

So right away, this alias screams Intel Theater.

This was staged!Image
It gets weirder…

A PolitiFact article from June 13, 2024 mentions a viral image claiming that some “girls” didn’t die at Sandy Hook, listing names including Anastasia Williams, but as part of misinformation content.

And weirder…

Jewish Gematria: “Anastasia J William”

Breakdown:
Anastasia J William → 1330

Jewish Gematria: “Sandy Hook Jacob Hall Satanic Ritual”

Breakdown:
Sandy Hook Jacob Hall Satanic Ritual →1330

Perfect Match: 1330

This isn’t random.
This is a direct numerical link, the kind these intelligence rituals thrive on.

1330 reduces: 1+3+3+0 = 7, a ritual completion number in esoteric systems.

A perfect hit like this ties the name of the supposed author directly to the phrase describing a satanic false-flag school shooting.

The disinformation program is complete.Image
Read 9 tweets
Sep 10
Modern Tethers: 5G & eSIM

Here’s where it gets dystopian:

5G isn’t faster; it’s built for total device identity tracking, down to microsecond handoffs.

Cellular carriers like AT&T’s role in nationwide 5G deployment gives the NSA real-time geo-location and behavioral data.

eSIMs give carriers permanent root-level access.

Carriers can silently provision or swap digital identities without your consent.

The NSA doesn’t need to plant bugs anymore… the eSIM is the bug.

Want to know more about the Global Operations of Defense Telecom Cartel…
👇 🪡 🧵
The Big Four (U.S.): G.O.D’s Favorite Toys

AT&T is the spymaster,
Verizon is the lieutenant,
T-Mobile and Sprint are useful puppets.

Want to know what the 5 eyes web is?

The G.O.D’s all-seeing-eye in the simulated sky that spies? 👇🪡

This is why they think they are like gods…Image
International Partners: The Five Eyes Web

The G.OD doesn’t just play domestically… they are a global spy ring known as the Five Eyes alliance (see image).

These carriers are wired into the same surveillance backbone, sharing real-time intelligence through programs like:

ECHELON: The original global wiretap network.

PRISM: For direct access to private tech company data streams.

XKEYSCORE: The search engine for everything you’ve ever done digitally.

Beyond Five Eyes… Global Sellouts

Some foreign telecoms pretend to be neutral but are deeply compromised:

Huawei & China Mobile… Partnered with Chinese state intelligence; The G.O.D monitors them via backdoors.

Deutsche Telekom (Germany)… Backboned into NATO’s data-sharing agreements.

Orange (France)… Known participant in cross-Atlantic cable taps.Image
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(