Saturday, March 28, 2026

Digital IDs are insecure and can be hacked


Digital IDs are insecure and can be hacked



My response to Prof Norman Fenton after hearing about how X made it increasingly difficult under the guise of “security,” and then comically insecure involving a threatening letter and his needing to establish and use a previously unknown email account that honestly could have been anyone, was this:

I think we can take Norman’s contentions at the end of his post a logical step further.

With several more controlled and less resistant countries having already adopted the WEF/UN digital ID, and countries like the UK, Australia, New Zealand and Canada all marching in lockstep to a digital ID dystopian future, how can governments even pretend these “all eggs in one basket” solutions are remotely safe, secure or protected?

Governments in countries like Sweden failed to secure their digital ID source code (see ‘Sweden’s E-Government Source Code Leaked After ByteToBreach Breaches CGI Sverige’) and have had their digital ID systems and databases hacked by bad actors, with personally identifying data capable of enabling identity and bank fraud being found for sale on the dark web (see ‘Sweden’s digital ID provider CGI Sweden confirms data breach’). Even worse than that, their own tax office was selling access to the data to advertisers! (see ‘Sweden’s Tax Authority Accused of Selling People’s Data to Advertisers’).

The UK’s OneLogin digital ID system has already shown itself to be a potential security nightmare that could send the UK back into the technological dark age – with the core code being written by unvetted Romanian hackers on insecure systems and the platform losing encryption and needing to be taken down when key SSL certificates expired and were not renewed (see ‘Security concerns over system at heart of digital ID’). The platform was also shown to lack key redundancy and resiliency when a minor Amazon AWS outage took down the UK’s entire digital ID and OneLogin system (see ‘AWS Outage Sparks Debate Over UK’s Digital ID Resilience’).

It wasn’t as if the UK didn’t have warning that the Romanians were bad at digital ID security – only around 20 months ago, the Romanian Government’s system was hacked, with the ID of many, including the Romanian Prime Minister’s ID, being taken (see ‘Hackers Crack Into Romanian Parliament’s Database, Steal PM’s ID’).

And parts of the platform behind Vietnam’s digital ID that led to over 86 million bank accounts that lacked a linking digital ID being seized by the government were hacked in what was described as “a data breach of epic proportions” (see ‘A data breach of epic proportions in Vietnam’).

How will our governments protect us from having our digital ID accounts hacked, hijacked and abused like Professor Fenton’s X account?

What happens when these collections of hugely sensitive and personally identifiable data are stolen and potentially millions of people are at the mercy of the hackers and the identity fraudsters who buy the data on the dark web?


I think the answers are all pretty clear …

Having all your identity eggs in one basket – like Australia’s MyGov login which links to your Centrelink benefits, Medicare payouts, Tax Office refunds, Superannuation and other accounts, each with national ID and bank details included – is a significantly bigger risk than leaving them as separate logins to separate systems.

We won’t be protected.

These systems can never be safe or secure.

When our digital IDs are taken, we will at best become non-persons – unable to access or participate in daily life or societal systems at large. Limited like Professor Fenton was – only to watch as the hackers and fraudsters use our accounts to ruin us, our reputations and use us as a way into the accounts of our friends and family. At worst, we will be deemed responsible for the acts of the hackers or the identity fraudsters to whom they sell our digital IDs. Why? Because it is impossible to prove a negative … i.e. that it wasn’t you who did these acts with what is, after all, your digital ID.


And supported by the examples in Romania, Sweden and Vietnam, I predict now that in every country that adopts the digital IDs wanted by our globalist overlords in the WEF and UN, hundreds of thousands to millions of lives will be ruined each year by this wonderful … all eggs in one basket … target.



More Than 400 Hezbollah Fighters Killed in New War With Israel So Far, Sources Say


More Than 400 Hezbollah Fighters Killed in New War With Israel So Far, Sources Say


More than 400 fighters from Hezbollah have been killed since the Iran-backed Lebanese terrorist group launched the opening salvoes of a new war with Israel on March 2, two sources familiar with Hezbollah‘s count told Reuters.

The figure was the first overall toll provided of Hezbollah fighters killed in Israel‘s expanding air and ground campaign in Lebanon. The group has issued sporadic notices for a few individual fighters but has not provided an official overall toll.

In a 2023-2024 war with Israel, Hezbollah issued daily death notices for each fighter killed and said after the war that some 5,000 had been killed in total.

The Israeli military gave a higher toll of the group’s latest losses than the sources, saying this week it has killed at least 700 Hezbollah fighters in Lebanon, including hundreds of members of the group’s elite Radwan Force.

Lebanon’s health ministry said on Friday that Israeli strikes and ground operations had killed 1,142 people in Lebanon. They include 122 children, 83 women, and 42 medical personnel. The health ministry does not otherwise distinguish between civilians and combatants.

On Friday, the Israeli military said that a soldier and a combat officer had been severely injured overnight during its operations in Lebanon. The military has previously said four of its soldiers have been killed in fighting in southern Lebanon.



IDF reports ‘significant’ progress against Iranian military targets as campaign enters fourth week


IDF reports ‘significant’ progress against Iranian military targets as campaign enters fourth week
Yaakov Lappin



On day 27 of “Operation Roaring Lion,” the Israel Defense Forces have made major achievements toward many of the objectives they set at the start of the war, particularly in striking core Iranian regime targets, a military spokesperson told JNSon Thursday.

During a briefing with journalists, IDF International Spokesperson Lt. Col. Nadav Shoshani said, “We do feel like we’ve had great achievements with a lot of the things we prioritized as top targets. But there’s always more, and we have more.”

Shoshani confirmed that on Wednesday, the IDF struck the Iranian regime’s underwater research center in Isfahan, significantly limiting its ability to manufacture new and advanced submarines and upgrade its existing fleet.

The entire operation follows a structured strategic framework, he said, focusing on targeting military industries, weapons and missile production facilities, and surface-to-air missile systems.

The Israeli Air Force operates continuously within Iranian airspace, systematically striking thousands of regime targets, Shoshani said.

“Dozens of Israeli Air Force craft every day go back and forth acting on IDF intelligence amid complete waves after waves of strikes targeting Iranian terror regime infrastructure,” he added.

Key Iranian regime command centers in Tehran have been hit in recent days, as well as Iranian intelligence organizations, Shoshani said. Targets also include weapons storage facilities and ballistic missile storage and launch sites.

Data tracked by the IDF continues to show joint operational success by Israeli and American forces in heavily suppressing the volume of Iranian ballistic missile fire, Shoshani said.

“Since the third, fourth day of the operation, the numbers have been high single-digit to low teens with an average of approximately 10 [Iranian missiles],” Shoshani stated. “This is not something random and it is part of relentless efforts in Iranian skies by the IDF and the U.S. Armed Forces.”

US planning for Strait of Hormuz security

Also on Thursday, a military official provided further background on the elimination of senior leadership of the IRGC Navy, including its commander, Alireza Tangsiri, and the IRGC naval intelligence chief, in strikes in the port city of Bandar Abbas.

On Wednesday, during a webinar hosted by the Jewish Institute for National Security of America (JINSA), a Washington-based defense policy think tank, United States Marine Corps Gen. Frank McKenzie (ret.), the former commander of CENTCOM and a JINSA distinguished fellow, said:

“This is not something that we’re drawing up on the back of the envelope day to day. These are things that have been studied for many years, were fine-tuned for many years, and were simulated war-gamed every way that you can. We’ve examined this problem. I have some responsibility for this plan, as does my predecessor, as does my successor. But we’ve been working on this for a long time.”

“I think we’re accomplishing the objectives that we set out. CENTCOM is executing a long, prepared campaign plan,” McKenzie said. The suppression of the ballistic threat remains paramount, he added.

Referring to the Iranian ambition of firing hundreds of missiles per volley at U.S. bases, Gulf allies, and Israel, he said, “Largely we have denied them the ability to do that.”

“We’ve been able to take out Iranian air defenses to the degree that I would argue we have effectively air superiority over most of Iran. And what that has given us the opportunity to do is go hunt for ballistic missiles.”

Addressing the threat to the Strait of Hormuz, McKenzie noted that the U.S. is focusing on steps to clear the strait, including removing Iranian submarines, fast attack craft, and anti-ship cruise missiles.

Noting that there are actually two Iranian navies (the standard Iranian Navy and the IRGC naval branch), McKenzie said, “I think both those navies in terms of large combatants are largely gone. We struck them all. So what we’re—I think what we’re doing now is we’re focusing on preparatory steps in order to clear the Strait of Hormuz.”

This would involve neutralizing Iran’s remaining naval threats that could disrupt shipping, including submarines, fast attack craft, and small swarm boats operating along the Iranian coastline, as well as coastal anti-ship missile systems positioned to target vessels transiting the Strait of Hormuz, he said.

“You go after those with slow-moving aircraft, perhaps A-10s or attack helicopters, and perhaps attack them from across the gulf. A variety of weapons systems that we can employ to get after those targets. Also, short-range Iranian anti-ship cruise missiles that have been built, targeted, and dug in on the north, on the northern edge of the littoral.”

The former CENTCOM commander stressed that “you don’t have to clear the whole Strait of Hormuz. You’ve got to clear a route that you’re going to bring vessels through. So you’re not clearing every bit of water up there.”

More....



Shadows of the Electromagnetic Apocalypse: A wake-up call to the invisible battlefield


Shadows of the Electromagnetic Apocalypse: A wake-up call to the invisible battlefield


  • Steve Quayle exposes how Russia and China have surpassed the U.S. in electromagnetic warfare (EW), disabling fleets, jamming GPS and rendering stealth tech obsolete—leaving Western military infrastructure defenseless in a real conflict.
  • Advanced Russian phased-array radars detect U.S. stealth aircraft (F-35s, B-2s), while hypersonic missiles like Avangard (Mach 20) bypass traditional defenses, showcasing NATO's outdated strategies.
  • Geoengineering (HAARP) and historical precedents (Operation Popeye) suggest weather is weaponized for destabilization, while staged crises (9/11, COVID) justify authoritarian control under "emergency" pretexts.
  • A globalist push for mass culling via bioweapons, AI surveillance (CBDCs, social credit) and transhumanism aims to enslave or eliminate humanity while merging elites with machines.
  • Quayle offers actionable solutions—EMF detox (Faraday cages), food sovereignty (permaculture), financial independence (gold/silver) and community resilience—urging preparation before systemic collapse.

In "Shadows of the Electromagnetic Apocalypse: The Unseen War on Humanity," investigative journalist Steve Quayle delivers a harrowing exposé on the hidden warfare being waged against humanity—not with bullets and bombs, but through electromagnetic dominance, psychological manipulation and geopolitical deception. This book is a meticulously researched manifesto that pulls back the curtain on the globalist agenda, revealing how unseen forces are systematically dismantling national sovereignty, personal freedom and even human consciousness itself.

Quayle's work is not for the faint of heart. It is a clarion call to those who sense something deeply wrong with the world but can't quite pinpoint the source. Drawing from military insiders, whistleblowers and suppressed scientific research, he constructs a terrifying yet undeniable case: We are already under siege and most people don't even realize it.

1. Electromagnetic warfare: The silent killer

Quayle begins by dismantling the myth of Western military superiority, exposing how Russia and China have leapfrogged the U.S. in electromagnetic warfare (EW) capabilities. He details how advanced EW systems like Russia's Krasukha-4 and Murmansk-BN can disable entire fleets, jam GPS signals and render stealth technology obsolete.

Case studies of disabled U.S. aircraft carriers, compromised missile cruisers and GPS spoofing incidents in the Black Sea illustrate how vulnerable our military infrastructure truly is. The implications are staggering: If war breaks out, America's high-tech arsenal could be rendered useless before the first shot is fired.

2. The death of stealth and the rise of hypersonics

One of the book's most shocking revelations is the obsolescence of U.S. stealth technology. Russian phased-array radars can detect F-35s and B-2 bombers with ease, while hypersonic missiles like the Avangard (Mach 20) make traditional missile defense systems irrelevant. Quayle argues that NATO's reliance on outdated paradigms leaves the West defenseless against a coordinated EW and hypersonic strike—something both Russia and China have been preparing for decades.




Apple Co-Founder Warns 'You Are Owned' by Big Tech


Apple Co-Founder Warns 'You Are Owned' by Big Tech


Apple cofounder Steve Wozniak has a message for users of Big Tech's growing subscription business model: "You are owned."

Speaking with Fox Business host Liz Claman earlier this week, "Woz" said, "For the first two decades of personal computers, you bought a product, you owned it, you set it up your way, and it always ran that way, and it solved your problems… It was yours."

But since then, "you have to subscribe to services and pay something per month… They’ll take things away, features that you were using… They’ll even take your data away sometimes."

Digital movies? You don't own those for real; they're effectively just long-term rentals. Anything you store in the cloud, same story, but worse — you've probably read multiple reports of Google arbitrarily cutting off users' cloud storage or Gmail accounts.

"I don’t like the business models of today where you don’t own it," he continued. "You are owned. Whoever the suppliers are, you have to go through them on the cloud, up to the internet, and they own it." 

Woz concluded, "I’m not a super fan of when I don’t feel like I own something."

Software companies insist that the subscription model benefits users because the never-ending revenue stream from your credit card to their bank accounts encourages constant improvements and new features. But subscriptions also mean — unlike the days when you'd plonk down your money for an application and own it until you decided to upgrade — that even existing features you rely on are effectively held hostage.

In other words, I'm not a super fan, either. 

At least as bad is the data users often unwittingly "sell" to Big Tech in exchange for discounted products.

I covered this next item earlier today at Instapundit, so I'll keep this brief. But now that Walmart owns TV-maker Vizio, you'll need to sign into your Walmart account on new Vizio TVs if you want to use the "smart" features like the built-in Netflix, YouTube, Plex apps, or the like. Vizio uses Automatic Content Recognition (ACR) to "fingerprint" everything you watch. Now that data will be tied into your Walmart account, so Walmart will be better able to show you more tailored ads — on "your" TV! — and sell you more stuff while maximizing profits via dynamic pricing. 


Vizio is hardly alone in this. Smart features allow TV makers to effectively own their consumers, instead of the other way around. The same is true of set-top boxes from Roku, Amazon, and anything Android-based.

"You are owned," indeed.

TVs have never been bigger, brighter, or cheaper. 30 years ago, I paid $750 (roughly $1,500 in today's dollars) for a 27" lo-def Sony Trinitron that seemed to weigh about as much as a small car. If you had told me then that in the future, that same money would get me a 70" 4K HDR screen so thin and light that I could hang it on the wall, I'd have said, "Bring it on!"

But if you'd also told me that today's TVs would report to the manufacturer every show and movie I watch, and they'd sell that information to any and every advertiser out there… Well, I'd have been a lot less enthusiastic. 

There are a couple of workarounds, neither entirely satisfactory. 

The first is to run everything you watch through an Apple TV box. They're overpriced, and the remote control is made of weapons-grade suck, but at least Apple doesn't (yet?) use ACR or plaster your screensaver with ads. The other is to deny your smart TV any WiFi access, refuse to use the built-in apps and limiting your viewing to cable, over-the-air broadcasts, and physical media. 

Neither solution is perfect, but I'd rather settle for something unsatisfactory than be owned, as Woz put it, by a multibillion-dollar company.