zero chance of this happening
deceiver
Pathological Demand Avoidance
you’re not wrong, and it’s not really a conspiracy, it’s fairly well-documented at this point
there’s a whole industry of companies called ‘exploit brokers’ and surveillance vendors that sell smartphone compromise capabilities to governments. the most famous is NSO Group, an Israeli firm whose product Pegasus was used by governments worldwide to silently compromise iPhones and Android devices, including targeting journalists, activists, and political opponents. Amnesty International and Citizen Lab have forensically confirmed infections on real devices. this isn’t speculation; it’s documented in court filings and peer-reviewed technical research
the way it works is through what are called zero-days: software vulnerabilities that even the phone manufacturers don’t know about yet. these can be worth millions of dollars on the open market. governments and their contractors hoard them, sometimes for years, to maintain access capabilities. Apple and Google are constantly patching these when they discover them, which is why you see urgent security updates
so the ‘we can’t break into it’ statements from agencies like the FBI are more nuanced than they appear. what they often mean is they can’t break into it cheaply, at scale, without vendor cooperation, not that it’s impossible. they’re usually pushing for backdoors built into the software so they don’t have to rely on expensive zero-days or third-party vendors like Cellebrite
the problem is that any backdoor you build for the “good guys” is also a vulnerability that adversaries can find and exploit. security researchers largely agree you can’t have a backdoor only the right people can use, it doesn’t work that way technically
so your instinct is right. the public debate is somewhat theater. the real capabilities exist, they’re just expensive, targeted, and something governments don’t want to fully disclose because it would reveal sources and methods
it absolutely can! there’s Bypass Paywalls Clean developed by magnolia1234. the reason you don’t see them shared often is that they’re repeatedly taken down from official extension stores like the Chrome Web Store and Firefox Add-ons, and platforms like GitHub, due to legal and political pressure from publishers, which pushes them to increasingly obscure and/or questionable hosting platforms that most normal users wouldn’t touch - case in point, Bypass Paywalls Clean itself is currently hosted on GitFlic, a Russian code hosting platform, as it’s been pushed outside the reach of Western legal frameworks
soft paywalls are enforced by JavaScript running in your browser - the server sends the full article content regardless, and then the JavaScript checks if you’re a subscriber and hides or blocks it if not. when archive.today or a self-hosted tool like ArchiveBox fetches the page, it gets the full content directly from the server before any of that JavaScript enforcement runs. the server doesn’t know or care whether you’re a subscriber, it just responds to the request
the archiving mechanism itself is what bypasses paywalls. it archives by fetching pages server-side before client-side JavaScript enforces paywalls
no, archive.today (and similar services like the Wayback Machine) work by fetching the page directly through their own servers, essentially acting as a headless browser that renders the page and saves a snapshot. the archive service itself makes the HTTP request, executes JavaScript, and captures the resulting document object model - no subscriber involvement required
no, Bitwarden isn’t “based off” anything
where is the video? why was this upvoted?
an identity verification system that’s tied to Ukraine’s national government databases and uses taxpayer IDs, national ID numbers, and official digital signatures
most men don’t even make $100k per year