This YouTube video discusses the intersection of privacy and cybersecurity, focusing on the increasing capabilities of AI-powered surveillance. The creator predicts the evolution of client-side scanning, highlighting concerns about government access to encrypted data and the potential misuse of AI by tech companies like Google and Apple. He advocates for increased user privacy, offering practical advice like using alternative operating systems and browsers to minimize data collection. The video also touches upon Neuralink and the broader implications of AI's growing role in data collection and surveillance. do some, it's not just the government, anyone, you know, Apple certainly can do it. They can use the AI as I said, how many years ago now, year and a half ago that y that, that the phone will be able to through the camera use the AI to detect what's going on around it and that's what client side scanning is client side scanning is to use the AI to scan the phone Now they're scanning the file content, but there's no actual technical limitation to scanning through the camera. So let's say you're looking for a certain image and you want to see, well, who's at a demonstration and they can just turn on the camera and if you're holding the camera you can see the surroundings and the AI can say up we know where you are because we have the uh, AI that can sense where the location is just from the image which is not a new technology. They've been doing this for a while so that's my main fear and of course the other prediction I have and I already mentioned it here is how the AI is involved. As I told you the client side scanning involved the AI and the AI will be involved more. Now here's the the main thing that I think is going to be the evolution of AI. So far you're using let's say gp4 or chat GPt and you're doing some search of something and that search does not include your personal data that's not a limitation. Uh, what is the Genesis program from Google doing in the background? They have the data for every individual and every click you have in the internet. So what if they are already feeding that data to the AI? So the AI will really know you. Now I made a video about this, talking about this specifically about how to push this AI techn ology, the very first step that in my prediction here, the very first step that will happen is that the AI will be your friend, it'll be your friend, it, it will you will talk to it, and it will gate your political nature, your religious, your values, you your preferences, and the AI will know you and people will think, oh, my, this is so nice, I have a personal assistant that can do crash detection and all of that. But they they forget one thing my friend, they forget one thing it is one computer one, it is not your personal AI. it's the AI of whoever Google open AI. Uh X one computer. Yeah, the AI thing is really worrying right because for AI to effectively work, it has to have massive amounts of data and they want more and more data to make AI even more effective And of course, who has the most data? This is the problem that most people don't know. it's Google. Uh, did you see the the new about how the uh, Congress voted to ban tik tok? Yeah, I just saw something about that but I didn't I don't know the detail. I just it's kind of funny because they said, oh we'll ban tik tok because it's collecting data. I mean, I I installed tik tok just to see uh, and and I found that what it can collect is fairly limited it's not not much and what Facebook and Google can pick from you is a 100 times more complic licated my goodness I mean google specifically google can track every click every click and people always say oh you yes that is hyperbole there's no such thing and no uh if you actually understand the mechanism you'll be shocked of course people don't pay attention to me when I say that but that's the truth the Google ID pervades the internet the Google id exist it just about everything you do it's incredible I'm must say this for everyone like the naysayers it was interesting because when I interviewed for the interviewed you for the first time you said some stuff and I was like Rob can't be right about that and then I went and did research and i couldn't find anything that you said that was incorrect, which was, you know, I I think that's what everyone needs to do is watching If they don't agree with what you're saying they need to go and do their own research. Go and look at Lewis Rosman, go and look at other people's Youtube channels you know, just go and look on Google. It was every and then the prediction was like Rob how on Earth is a phone going to ever sense this happening? And then crash detection happened literally two weeks later. So yeah, go for it, give us your opinion because I want to hear what you see coming down the road because you and I have discussed about, um, SkyNet taking over and it seems like we 198, 1984 is I think I've heard you say is is already passed. It's more scary than that. And you know, the SkyNet predictions are already here. That's correct. It is, unfortunately, and I'm trying to get people to understand and you know what I kind of gave up. I said, you know, only a certain population listen to me and my channel does better when I just focus on the people who already are interested, uh, versus the average person who doesn't want to listen. I'm not trying to convince the average person doesn't want to listen. Your audience is probably that group that is probably not exposed to this versus my audience is very specific. I think a lot of a lot of people are interested, a lot of people are interested, I think especially these days as more and more revelations come to light. But sorry, go on. Yeah, so so my style and and it's different from, you know, a lot of, uh, tech related even privacy channels on on Youtube is that I give a lot of detail, My videos are really deep. I mean, you know, I if you're going to ask me about the phone network, I'm going to give it to you in a lot of detail and that of course that of course scares a newbie because they hear a lot of terms and and it's natural, but the thing is that you don't really have to pay attention to the details so much. it's more about understanding what the point is. Uh, it it's so if you don't know what a specific terminology is, well, it doesn't matter It i'm just showing you that This segment explains Google's "SkyNet," a mesh network infrastructure enabling autonomous device control and data collection. Braxman details the implications of this technology for widespread privacy loss, emphasizing that it's already impacting 100% of the population and outlining a potential solution for a small percentage to remain unaffected. Braxman explains client-side scanning, a technology allowing AI to scan phone data pre-encryption. He reveals how this technology, initially justified for child safety, can be used for broader surveillance, highlighting Apple's role and the lack of transparency surrounding its implementation. This segment discusses the coordinated efforts of the EU, UK, and US to implement client-side scanning laws, highlighting the UK's success in passing such legislation. Braxman emphasizes the inherent risks of creating backdoors for government access, increasing vulnerability to hackers and undermining privacy. This segment details how Google and Facebook collect user data through Google IDs and cookies, explaining how websites connected to Google can retrieve user IDs and track clicks, ultimately building a comprehensive profile of user activity on the internet. The speaker emphasizes the depth of this data collection and its implications for user privacy. This segment focuses on the evolution of AI and its potential for personalized surveillance. Braxman discusses how AI, fed by vast amounts of user data, can become a "personal assistant" that learns intimate details about individuals, raising concerns about the lack of user control and potential misuse by corporations. This segment focuses on cross-device tracking, explaining how companies like Apple and Google connect user activity across devices, even when location services are turned off. The speaker cites the Google Sensor Vault as an example of the vast location data collected and its use in real-world investigations. The segment also highlights the difference between Apple's approach to security versus privacy. This segment introduces the concept of browser isolation as a privacy-enhancing technique. The speaker explains how using separate browsers prevents Google IDs from being tracked across different websites, effectively creating "blind sites" that cannot attribute activity to a specific user. The discussion also touches upon the historical context of Google's universal login and its impact on data collection. This segment explains how alternative operating systems like CalxOS and /e/OS handle notifications without Google services, using microG to reroute notification traffic and maintain functionality. The discussion clarifies the impact on notification access for users choosing privacy-focused options.This segment details app compatibility issues with alternative operating systems lacking Google services. It explains that paid apps and apps requiring Google services for payment processing may not function correctly, while many other apps work with minor limitations. The speaker provides examples and clarifies the percentage of apps likely to function. This segment offers practical advice on enhancing privacy on phones and computers. The speaker recommends using de-googled phones (like the Pixel) with alternative operating systems like CalxOS or LineageOS to prevent Google ID tracking. For computers, the speaker advocates for Linux-based operating systems like Pop!_OS, emphasizing their reduced data reporting compared to Windows. This segment reveals Apple's data collection practices, even when devices are factory reset. The speaker discusses the Near Location Provider (NLP) feature, which constantly collects location data regardless of user settings or device ownership. The speaker uses a personal anecdote of returning a device to illustrate this point, highlighting the continuous data transmission even without user association. This segment reveals Google's Project Moonshot, a program designed to manipulate search results based on user data. The speaker discusses the implications of this manipulation for political bias and the potential for misuse of user data to create watchlists. The discussion highlights the importance of using alternative search engines like Startpage to mitigate this issue. This segment challenges the common assumption that a VPN is always necessary, differentiating between situations where it's crucial (home DSL) and where it's less critical (Starlink, mobile data with IPv6). The speaker explains the implications of IPv6 addressing and the limitations of tracking users in those contexts, focusing on privacy rather than security.