Friday, November 15, 2019

US vs. EU on pesticide linked to brain damage



Excerpt: In the US, especially avoid non-organic apples, cherries, corn, oranges, and peaches

If this pesticide used in conventional farming (chlorpyrifos) is proven to cause brain damage in children, what do you think it does to non-children…?

Seems the EU has always had so much more sanity (less brain damage?) than corporate corruption when it comes to health stuff.  But, at least someone is leading properly and doing the right thing in this regard: https://www.commondreams.org/news/2019/08/02/european-regulators-praised-declaring-there-no-safe-exposure-level-pesticide-tied

~~~

123 BOTTOM LINE:

1) Eating/drinking strictly organic, non-GMO continues to be the bare-minimum for both human and environmental health (and, specifically, to minimize pesticide exposure).
[ GMOs and pesticides are a leading cause of the pollinator die-off crisis (aka "Colony Collapse Disorder") that now threatens all plant (and human food) survival.  Buying organic/non-GMO is one of the best ways to help the bees! ]

2) Ensuring you're drinking purified water that's not bottled in plastic is also paramount.  (I use/recommend a steel Berkey water purifier, with the additional PF-2 Fluoride/Arsenic/Heavy Metal Filters.)

3) Finally, please wash all (yes, even organic) fruits and veggies just before using (the major vector of the 2016 E.Coli outbreak was a bag of organic spinach), preferably in purified water (dry them afterwards if washed in un-purified tap water).  This will greatly reduce pesticides and any harmful viruses, bacteria, or parasites…other toxins or microbes introduced during harvesting, handling, transport, storage, packaging or display...as well as any air-borne pesticides or toxins that may have drifted onto the produce from conventional farms or various other sources of air pollution (factories, fires, planes, cars, etc).

4) Bonus - To reduce high Arsenic exposure:
~~~

What I use to for Pesticide Protection:
  • Restore (strengthens the tight junctions [the seals between cells] in our gut lining – the barrier protecting us from toxic substances like pesticides [GMOs punch holes in intestines/tight junctions]; they're now selling the same product, renamed  ION Biome)
  • 1 tsp - 2 Tbsp Organic Apple Cider Vinegar in 6-12oz H2O, 1-3x/day (ACV contains a bacteria that breaks down glyphosate), rinse mouth/teeth afterwards to avoid acid breakdown of tooth enamel
  • Chlorella - Usually people start with 2g/day and work up to around 5g, using the higher dose during periods of illness or stress. Take 2x/day with food/snacks, or 30min before eating for best detox effect.
  • GlyphoX Supreme (detoxes + decreases liver cell death from glyphosate; order here)
  • Detox Bonus: 8 Natural Ways to Detox GMOs, Dr. Group's 7min video on GMO detox

To your health!
Rich

PS:

Why Choosing Organic Produce Is the Best and Safest Choice — Especially for Children and Pregnant Women

Eating organically grown foods reduces your exposure to both pesticide residue and antibiotic-resistant bacteria.
This is backed by research from Stanford University, which analyzed 17 different studies comparing the health effects of organic and conventional foods.
While choosing organic is probably the safest option for everyone, it's especially important for pregnant women and children to avoid exposure to pesticides.
Children are at higher risk for pesticide toxicity than adults. This is because the developing brain is more susceptible to neurotoxins and the dose of pesticides per body weight is likely to be higher in children.
Children whose mothers were exposed to high levels of pesticides have been found to have lower IQs compared to children with the lowest levels of pesticide exposure.
Also, children exposed to pesticides are at an increased risk for a variety of chronic conditions, including learning and behavioral problems.
According to a study in Pediatrics, higher than median levels of pesticide residue in the urine were associated with double the odds of ADHD compared to those with undetectable levels.



----
Need Something Researched But Lack the Time/Patience/etc?  For $65/hr, I'll do the research and summarize the results for you (similar to what you see above but on topics/questions of your choosing!)

Rich Raffals
Tech/EMF Consults, Sound Healing, Coaching
Awaken the Magic Coaching & Consulting - 415-662-3117

Wednesday, November 6, 2019

Protect Your Privacy / Take Back Your Rights!

< Pls go here for latest version/updates, to add your comments, ask questions, and see similar articles: https://richraffals.blogspot.com/ >

How to stop Google Chrome from mining your personal information 
 
So, how can you stop Google tracking you and erase all the data its collected on you?

Matt Agorist of the Free Thought Project explains:

You need to go to your account and click on Data & Personalization and turn off all the ways Google spies on you.

To delete your history, on your Android phone or tablet, open your device’s Settings app and then Google Account.

At the top, tap Data & personalization.
Under “Activity controls,” tap Location History.
At the bottom, tap Manage Timeline. Your device will open Google Maps.
Tap More and then Settings.
At the bottom, choose Delete all Location History or Delete Location History range.

If you’re on a browser, go to maps.google.com/timeline. You might need to sign in. You can delete individual locations, locations by date, or your whole location history in Timeline.
 
Google employees listen in on private conversations between users and Google Assistant ]

[ 10/21 Update: Beware of upgrading your Apple devices to ios 15: Snowden Slams Apple CSAM: Warns iPad, iPhone, Mac Users Worldwide.
Edward Snowden, who exposed global surveillance programs by the NSA and is living in exile, tweeted “No matter how well-intentioned, Apple is rolling out mass surveillance to the entire world with this. Make no mistake: if they can scan for kiddie porn today, they can scan for anything tomorrow.” Additionally, the Electronic Frontier Foundation criticized the system and Matthew Green, a cryptography professor at Johns Hopkins, explained the potential for misuse with the system Apple is using: "Regardless of what Apple's long term plans are, they've sent a very clear signal. In their (very influential) opinion, it is safe to build systems that scan users' phones for prohibited content. That's the message they're sending governments, competing services, China, you."
 
Bottom line: To avoid exposing your device from being scanned by Apple in the future, based on their (or the government's) whims: Upgrade to ios 14.8.1, and stay there...at least until we hear Apple's dropped adding the CSAM scanning feature (which doesn't sound likely, imho :).  When shopping in the future, specifically check for Secure Smartphones.]

Dear Friend,

While the idea and word "Democracy" seems to have been bastardized nearly beyond recognition these days, my understanding of "Democracy" is that your rights are not just your responsibility, but mine as well (and vice-versa :).  The more I research privacy, the more urgent it feels to me that everyone is at least aware of this:

EVERY SINGLE PHONE CALL YOU MAKE...
EVERY SINGLE TEXT MESSAGE, EMAIL, FACEBOOK POST, TWEET, etc...

EVERY ONLINE SEARCH...
WEB SITE YOU VISIT...
VIDEO YOU WATCH...
PURCHASE YOU MAKE...
...IS NOT ONLY BEING TRACKED BY YOUR GOVERNMENT (AND SEVERAL NON-US GOVERNMENTS)...
AND BY THE TELECOM AND INTERNET CORPORATIONS...
BUT ALL OF THIS INFO ON YOU IS ALSO BEING RECORDED AND STORED — POTENTIALLY INDEFINITELY!

IF YOU CARRY A CELL PHONE, THE SAME GOES FOR RECORDING EVERY PHYSICAL PLACE YOU GO, THE EXACT TIME YOU ARRIVE/LEAVE, ETC. (unless the phone's completely off: yep, testing done in this video that confirms your whereabouts are still tracked even in Airplane Mode!)  Current policies allow all this — legally! (references for all these statements included below)


GOOD NEWS: There's a lot you can do to avoid or minimize these assaults on your privacy...and I've broken this down into some easy steps you can do to take back your privacy rights (3 Key Steps for Calling/Texting, 6 Key Steps for Accessing the Internet).

The product of many, many hours of research follows - my investment in your rights!  If your your privacy is important to you, however, you should be able to implement all my suggestions below in under an hour.  [ See Below: "STEPS TO TAKE" … both "FOR ACCESSING THE INTERNET" … and "FOR CALLING/TEXTING".  The steps are roughly prioritized, so you can just go down the list and do the ones you have time for.  If you want this done but absolutely don't want to do it alone, call me to hire me to do it for you or walk you through it. ]  For those who really care about their privacy and want to go deeper, I've provided most of what I know for you below….

For Identity Theft Reasons, I'd definitely read the Public Wifi Do's & Dont's regardless of your interest in privacy.  Also, making your Google and Browser Privacy Settings match the screen-shots of mine (attached below) should only take a minute…and please be wary of submitting your DNA to any of those services!  For an entertaining and mind-blowing intro to your government/NSA/CIA/surveillance, check out the movie Snowden. :)

WHY DOES THIS MATTER?

Excerpt from video below"You don't have to have done anything wrong.  You just have to eventually fall under suspicion someday, even by a wrong call…and then they can use the system to go back in time and scrutinize every decision you've ever made, every friend you've ever discussed anything with, etc…and attack you on that basis...to sort-of derive suspicion from an innocent life...and paint anyone as a wrong-doer."  ~ Edward Snowden. (former CIA/NSA Intelligence Analyst)

** What You Can Do Now:  To reverse these policies and curb future laws and policies which give away even more of your privacy, please communicate to your representatives and other appropriate elected officials that you want your privacy rights restored, and that your communications and online activity should never be tracked, censored, recorded, or otherwise monitored Then, follow the "BASIC PRIVACY PROTECTION" steps below.... **

**********************************************************************************

Background on Increasing Levels of Surveillance of YOU in general (phone calls, text messages, etc):

Excerpts from NSA whistleblower Edward Snowden's TED talk on How We Take Back the Internet

"Your rights matter because you never know when you're going to need them."  

"People should be able to pick up a phone and call their family, people should be able to send a text message to their loved ones, people should be able to buy a book online, they should be able to travel by train, they should be able to buy an airline ticket…without wondering about how these events are going to look to an agent of the government, possibly not even your government, years in the future…how they're going to be misinterpreted and what they're going to think your intentions were.  We have a right to privacy.  We require warrants to be based on probable cause, or some kind of individualized suspicion, because we recognize that trusting anybody, any government authority, with the entirety of human communications in secret and without oversight is simply too great a temptation to be ignored."

* More from NSA whistleblower Edward Snowden (US Government):
   - Snowden Movie Trailer (excellent!): https://www.youtube.com/watch?v=QlSAiI3xMh4
"This man has IQ of 144. He earned 200000$ a year, living in Hawaii. He left his career, girlfriend, family and country behind…and risked his life. He could be killed anytime. On the circumstances, you don't do these things without knowing he is right."

~~~

STEPS TO TAKE: BASIC PRIVACY PROTECTION WHEN CALLING/TEXTING:

1) Turn your mobile phone completely OFF whenever you're not using it or don't want your whereabouts tracked: This will Change How You See Everything... , Edward Snowden: How Your Cell Phone Spies on You

2) For private/encrypted text messages and phone calls, especially for any sensitive topics you might discuss, I recommend the Signal app.  Using Signal is the equivalent of surfing the internet on sites using the httpS:// protocol (instead of just http://) — ie, end-to-end encryption of the content of your calls/texts.  Plus, you can set an expiration date so the message doesn't live forever on a server somewhere (as the rest of your messages do).

3) If you don't replicate the "STEPS TO TAKE: BASIC PRIVACY PROTECTION WHEN ACCESSING THE INTERNET VIA A BROWSER" below on your smart-phone, please consider using one of these non-tracking/encrypting browsers on your phone:  https://duckduckgo.com/app , https://www.mozilla.org/en-US/firefox/mobile/
Firefox Focus vs DuckDuckGo: Which Is the Best Browser for Privacy , Firefox vs DuckDuckGo vs TOR: Which Is the Best Browser for Privacy , Firefox vs Firefox Focus ]

4) OPTIONAL: Download/use DAA's AppChoices application from your device's app store to control personally-customized advertising from non-Google networks (to reduce vulnerabilities for psychologically-targeted advertising strategies, being charged higher prices based on your online footprint, etc).  Use NAI (National Advertising Institute) Consumer Opt-Out for  Interest-Based Advertising.  APPLE: You can opt out of interest-based ads in Apple News and the App Store, and also clear your play history in the Apple TV app in Settings (any video or show you watch on any apple device is tracked).

5) OPTIONAL: Learn More/Go Deeper

**********************************************************************************
WHY DOES THIS MATTER?

Background on Increasing Levels of Surveillance of YOU on the web:

* Short video includes info on how what you're doing, where you're going, etc. is being tracked (Google, Facebook, etc):

Excerpts:

' When asked about all the different ways his company is causing invasions of privacy for hundreds of millions of people around the world, Eric Schmidt, CEO of Google, said this: "If you're doing something that you don't want other people to know, maybe you shouldn't be doing it in the first place." '

' "Privacy is no longer a social norm."  ~ Mark Zuckerberg, CEO Facebook '

** What You Can Do Now:  To reverse these policies and curb future laws & policies which give away even more of your privacy, please communicate to your representatives and other appropriate elected officials that you want your privacy rights restored, and that your communications and online activity should never be tracked, censored, recorded, or otherwise monitored Then, follow the "BASIC PRIVACY PROTECTION" steps below…. **  >>

~~~

STEPS TO TAKE: BASIC PRIVACY PROTECTION WHEN ACCESSING THE INTERNET VIA A BROWSER (eg, Firefox, Chrome, Safari, Internet Explorer, Edge, etc)

A friend asked me this question, typed some of this up for her, and thought I'd add a bit more to make it of general use for you.  It's just the most basic level and I'm not an expert on the topic.

That said, the guide below should be of value if you don't want your online/browsing activity tracked, probably sold to the highest bidder, or used to target you for specific sales schemes and marketing…and/or potentially skewed/spun to discredit you, paint you as a wrong-doer, etc.  Similarly, the steps below will provide protection from cryptominers that secretly use your device's resources to mine cryptocurrency and fingerprinters that uniquely identify you based on your device, settings and apps.

The steps are roughly prioritized, so you can just go down the list and do the ones you have time for.  I'd definitely read the public wifi do's/don'ts regardless, tho. :)


0) Direct-connect your computer to the modem/router via an ethernet cable instead of using WiFi whenever possible (also has huge health benefits if you turn off your wifi altogether, at the very least while you're asleep!).  Keep your operating system, browser, and anti-virus and anti-malware applications up to date (ie, latest versions) so your system stays clean of viruses/key loggers/malware/etc. that can track you (or worse).  Run anti-virus and anti-malware scans regularly.

1) Google tracks what you're doing immensely.  Apple/Microsoft/Facebook/etc too.  Suggestions:
     * Minimize use of Facebook/Apple/Microsoft and especially Google products:
  • Use Firefox (non-profit developergood built-in privacy, many great VPN and privacy extension [see #4-6 and #9-11 below]) or Tor instead of Chrome/Safari/Internet Explorer/Edge for your browser  [ Note: I don't recommend Opera, even though it has built in VPN, since it uses Google's servers for the VPN ]
  • Use Ecosia or DuckDuckGo instead of Google/Bing/Yahoo! for your search engine
  • Use anything instead of Gmail (every word of every message you send/receive is analyzed, info on you sold to their marketing partners, etc.)
  • Know that the videos you're watching are being tracked on YouTube (owned by Google)
  • You get the idea...
     * Do the Google Privacy Checkup and check your Data/Personalization Settings, Turn off all you don't specifically need (see screen shot of my settings, attached below)
     * Similarly, check your Privacy Settings on other services you use - eg, FacebookYahoo!, etc
     * Delete your Google Products Activity (prevents it from being used by the highest bidder on the millions of sites and apps that use Google’s advertising networks, for psychologically-targeted advertising strategies, and to charge higher prices based on your online footprint)
     * Stop the vulnerabilities for the future: Turn off Google Ad Personalization

2) Activate "Do Not Track" and similar privacy settings in your browser's preferences (eg, "Firefox -> Preferences -> Privacy & Security" — see screen shots below for my settings)

3) Replace Your Default Search Engine with Ecosia (also plants a tree for every search you do!) or DuckDuckGo

4) Install and selectively use one of these browser VPN (Virtual Private Network) Extensions (see VPN NOTES below on when to use/not use; research any VPN choice other than the below to ensure that they don't log your browsing history).  Also, disable WebRTC (Web Real-Time Communication) to avoid IP leaks (I use the "Prevent WebRTC from leaking local IP address" setting in "EFF's Privacy Badger" extension for this, but the "WebRTC Leak Shield" extension will also do it -- details on both below).

* CyberGhost (free, doesn't log your online activity, and doesn't require sign-up):
https://chrome.google.com/webstore/detail/stay-secure-with-cybergho/ffbkglfijbcbgblgflchnbphjdllaogb

NOTE: I had previously been using/recommending the SetupVPN extension, since it seemed to be working better and was faster than the CyberGhost when I started using these.  But, after contacting the company, I learned that SetupVPN logs your browsing history.  So, I'm no longer recommending SetupVPN and have switched back to CyberGhost (completely free).  If you have problems w/CyberGhost, some alternative, non-logging extensions are Surfshark and NordVPN (both require sign-up and may require payment for some features.  I can't recommend since I've yet to try either extension -- please let me know your experience if you do!).
If neither CyberGhost, Surfshark, nor NordVPN work for you, or you absolutely don't want to pay a dime, and - especially- if you don't mind a record of what you do online being stored on SetupVPN's servers, then it's ok to use SetupVPN (worked pretty well for me before I discovered they logged).  [ This somewhat defeats the purpose for privacy reasons, of course:  SetupVPN may be selling your browsing history, and they would likely hand it over if a government or authorized legal entity asked them for it.  But, this is probably better than having anything you do on any website: (a) visible to any techie/hacker with the tools to snoop your WiFi (easy) or wired (harder) internet connection, and (b) simultaneously tracked/logged by your ISP...and also by Google/Facebook/Microsoft/Yahoo!/Apple/etc whenever you use their services (any of whom may sell your browsing history to the highest bidder and/or use it to psychologically market their products to you) -- all which is what you get with no VPN! ]

VPN NOTES:

A) Good to have two of these installed in case one service is not working for some reason, is really slow at a particular time, etc.

B) The free services generally have a bandwidth limit that you'll hit soon if you leave the VPN on all the time, especially if you stream a video or music, are doing web conferencing via Zoom/Skype/Google Hangouts, or otherwise up-/down- load big files.  Also, it will likely be noticeably slower, due to the extra encryption and sending everything through the VPN server.
(Note: I've been told that one of Skype's practices is to capture videos of conversations, so I'd choose Zoom, freeconferencecall.com, or another non-Google service for that.)

C) I use the free service and just turn it on/off selectively:  Eg, you can just turn it on whenever you want your web activity to be untracked and always encrypted.  Remember to also enable either the "Prevent WebRTC from leaking local IP address" setting in "EFF's Privacy Badger" extension, or the "WebRTC Leak Shield" (or similar) extension, to prevent leaking your IP via WebRTC.

[ Your web usage, between your computer and the website you're visiting, is almost always encrypted these days as almost all sites now use the https:// protocol ( instead of just http:// ).  But, there are still some that don't.  Your connection to any particular site is encrypted if there's a little lock icon next to the URL in your browser, and/or the URL of the site starts with "https://…".  Encrypted or not, however, your activity can still be logged/tracked by your search engine, ISP, government agencies, any tech-savvy person who's close enough to receive your wifi signal, etc.  (Ie, info about the computer you're logging in from, including its location, the web searches you do, which sites you visit, how much time you spend there, etc. is still vulnerable even if the content is encrypted.)  Using the VPN inhibits these folks from logging/tracking/using/selling that info. ]

D) YOU SHOULD, HOWEVER, TURN VPN ON AND PROBABLY LEAVE IT ON FOR THE DURATION OF THE TIME YOU'RE USING ANY PUBLIC WIFI, ESPECIALLY ANY FREE PUBLIC WIFI (an extreme security exposure!) — UNLESS, OF COURSE, YOU'RE STREAMING VIDEOS/MUSIC/ETC OR UPLOADING/DOWNLOADING LARGE FILES (which will exhaust your bandwidth quickly)

E) VPN can also be used to get around country restrictions.  (Eg, when I was unable to stream a movie via my normal service when I was in Mexico, I just turned on the VPN and chose a server in the US.)

F) Easiest: Leave enabled in browser (about:addons for Firefox), then just enable/disable via the grey ghost icon in Firefox toolbar (same as for WebRTC Leak Test).

G) Less crucial VPN notes further below...

5) WebRTC Leak Shield: Enable when using VPN/Disable when not.  VPN Extensions can hide your IP address but they cannot prevent IP leaks caused by WebRTC.  WebRTC Leak Shield protects you from this security threat.  Unless you use a VPN that does this for you, or something with similar functionality (eg, I use EFF's Privacy Badger: see below), this is a must have Addon for protecting your privacy on the internet: https://addons.mozilla.org/en-US/firefox/addon/webrtc-leak-shield/

NOTE: Enabling this extension could break site/functions that require "Web Real-Time Communication".  But, you probably don't want to be using VPN for those, anyway, as they generally need a lot of bandwidth for audio/video transfer (eg, web conferencing via Google Hangouts, downloading/streaming movies or music, Google Voice, etc).  Options if you run into this issue: 

  • Use a different browser for these services, or disable this extension temporarily for those
  • Easier: Leave extension enabled in browser Preferences (about:addons for Firefox), then just enable/disable it via blue and white shield icon in Firefox toolbar (same as for CyberGhost VPN)
  • Easier/More bang for your buck: Skip this extension and use Privacy Badger extension instead (see below)

"Clear Flash Cookies" automatically deletes Flash cookies ("Local Shared Objects") after Firefox exits, like the defunct "BetterPrivacy" add-on. Flash cookies can be used to create "super cookies" that recreate deleted HTTP tracking cookies. To view your existing Flash cookies, open Adobe's Flash Storage Settings panel.

Warning! Clearing Flash cookies may delete saved game data from Flash games (e.g. some Facebook games).

Flash cookies are less of an issue in Firefox 55+ because Flash is click-to-activate by default, but deleting Flash cookies is a good precaution. If you don't actually need Flash, consider disabling or uninstalling it: https://support.mozilla.org/kb/disable-or-remove-add-ons#w_how-to-disable-plugins, as Flash can be used to track you.

~~~

7) OPTIONAL: If you don't want the history of where you've surfed to on the web to be stored on your computer, open a Private Window before you start surfing (eg, "File -> New Private Window" in Firefox).  Even when not surfing via  Private Window, your browsing history is not viewable by anyone who doesn't have direct access to your computer.  So, it's likely only required if you want to hide what you've done from others who might be using the same computer.  But, if there's something you'll be doing that you don't want anyone to ever see (eg, in the event that your computer is lost, stolen or seized by authorities), then you might also want to use a Private Window.

8) OPTIONAL: Go to AdChoices or NAI Consumer Opt-out to control ads from non-Google ad networks (Best to do this before installing/enabling Privacy Badger or Ghostery, else you'll need to disable them for this website): 
  • You need to do this for each browser you use
  • Extensions: Click "Trust Site" for Ghostery, "Disable for This Site" for Privacy Badger, and similar for any other any-tracking/anti-cookie services you may be using
  • Temporarily disable any anti-tracking/anti-cookie settings in each browser, eg:
    • Firefox: Preferences->Enhanced Tracking Protection->Custom "Cookies" + "Tracking Content"
    • Opera: Preferences->Settings->"Block Ads"
    • Safari: Preferences->Privacy->"Prevent cross-site tracking" + "block all cookies
  • Remember to turn the above settings back on after DAA's "OPT OUT OF ALL" web ads process is complete [you should see "Opt-Out Completed" and "✓" to the right of most of the companies (it's normal for some to fail)]
  • To make choices for mobile apps on a mobile device, you can download DAA's AppChoices application from your device's app store 
  • APPLE: You can opt out of interest-based ads in Apple News and the App Store, and also clear your play history in the Apple TV app in Settings (any video or show you watch on any apple device is tracked).
9) OPTIONAL: Install/Enable Privacy Badger (Firefox extension from EFF that learns to block invisible trackers.  It can also disable WebRTC leaks for use with VPN [eliminates need for WebRTC Leak Shield extension], but you need to specifically enable that in this extension's Preferences: Ie, click on "badger" icon in toolbar, on "gear" icon, check "Prevent WebRTC from leaking local IP address".): https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/

10) OPTIONAL: Install/Enable Ghostery (Firefox extension blocks ads, allows you to view/block trackers to control who collects your data, speeds browsing by blocking trackers according to your criteria. Enhanced Anti-Tracking also anonymizes your data to further protect your privacy.  NOTE: Although it has nice "Trust Site" and "Pause" features, it can get annoying if you have to do that for too many sites you visit.  Suggestion: Only enable it once you have everything else working.  That way, if things start breaking, you'll know to click on blue ghost icon in the toolbar and select "Trust Site".  It should get trained fairly quickly, but if that gets too annoying, you can just disable it.)
https://addons.mozilla.org/en-US/firefox/addon/ghostery/

11) OPTIONAL: Install/Enable Facebook Container (Firefox extension to inhibit Facebook's from tracking what you do: "You see them everywhere: those little "F" buttons from Facebook. Sure, they let you share things quickly to your profile. But they also let Facebook follow and collect information about you without your consent — even if you don't have an FB account. It works with Instagram, FB Messenger and Workplace, too."

12) OPTIONAL: IF YOU USE Video Download (eg, FVD/Flash Video Downloader, Video DownloadHelper, etc) OR Coupon/Lowest Price (eg, Honey, Wikibuy, etc) EXTENSIONS: Disable these extensions when not using or ensure they're not tracking you, as they typically monitor all your online activity to see when you're on a page with a video, pending purchases, etc.

13) OPTIONAL: Ed Snowden TED talk on How We Take Back the Internet (See how NSA has deputized corporate America — Microsoft, Yahoo, Google, Facebook, PalTalk, youTube, Skype, AOL, Apple — to collect the content of your communications, etc.
(In addition, I've been told that one of Skype's practices is to capture videos of conversations, so I'd choose Zoom, freeconferencecall.com, or another service for that.)

14) OPTIONAL: Learn More/Go Deeper

~~~

ADDITIONAL VPN NOTES (continuation of #4 above):

If you want to leave the VPN on all the time, you'll probably need to pay for the service to get unlimited bandwidth.  In that case, you may want more than just the browser extension VPN….

If you want everything you do on the internet (the above just covers what you do in the browser — ie, your email, etc. are still potentially vulnerable), then you'll need to get a full VPN service for your computer (not just a browser extension as I describe above).  While all the above VPN vendors also offer this service, here's the order in which I'd look for full VPN service (prioritized): BolehVPN, Mullvad, SecureVPN.to, TrustZone, CyberGhost, Surfshark, NordVPN.  You can also check out:
(Research any VPN choice other than those I've listed to ensure that they don't log your browsing history.  These coupon/deals might also be of value.)

"If not using a VPN, your ISP, the CIA and the NSA can see exactly what you're doing on any website.  But, it's not just the NSA that Internet users have to worry about.  Cybercrime is at an all-time high, and major Internet firms from Google to Apple and from Microsoft to Yahoo! are engaged in massive data collection for their own commercial purposes.  Also, your internet service provider (Comcast, Verizon, AT&T, etc.) can sell your browsing history to the highest bidder.  Furthermore, online censorship  and blocking of regular Internet access is a problem that has grown beyond nations such as China."

A VPN redirects your internet traffic, disguising where your computer, phone or other device is when it makes contact with websites.  It also encrypts information you send across the internet, making it unreadable to anyone who intercepts your traffic.  That includes your internet service provider.  (But, you need to do your homework on which VPN to use, to ensure they don't log your browsing history.)

"There are some things to note:

    The connection is only secured up to the VPN's servers; the connection from the VPN provider's servers to the final destination is once again unencrypted. That means the VPN provider, as well as any other networking equipment along the rest of the way, may be able to see your data, and can at least see which servers you're connecting to.
    Connections you make via https are completely encrypted along the entire path from your machine to the remote server you're accessing. That's why banks (and other services that allow you to access sensitive data) should use https. Most web-based email providers also provide full https connectivity.
    You're adding steps between your computer and the server you're accessing. The practical effect of this is that your connection becomes slower. How much slower varies based on the VPN service you're using, their capacity, and the server you're attempting to access."

More Info:

**************************************************

* Public Wi-Fi Don'ts
  •     Never leave your device alone when connected to public Wi-Fi — not even for a minute, such as going to a restroom. You might come back to see your laptop still there, but you also might have something a bit extra like a keylogger. This is used to capture keystrokes.
  •     Don't e-mail anything of sensitive nature. Save these e-mails for when you are on a secure network.
  •     Take a look at the networks before connecting to them. Make sure you are connecting to the right network and not to a network that is specifically set up to collect information, it might say "free wifi".
  •     Do not turn on file sharing when connected to public Wi-Fi.
  •     If you don't need to connect to a wireless connection, don't leave your Wi-Fi on.
  •     Never do any online banking or work with sensitive information when connected to these networks.
  •     Do not let anyone see your screen.

Public Wi-Fi Dos
  •     Look at your surroundings before settling into a spot for browsing.
  •     Make sure you sit so that your back is to a wall.
  •     Assume any Wi-Fi link is suspicious. Any link can be set up by a hacker, so exercise caution. Try to confirm any link by looking at the address closely.
  •     Ask an employee to confirm the name of the network. Hackers are clever. If you are at Joe's Coffee Shop and see two networks, JoescoffeeWifi and JoescoffeshopWifi, which one do you connect to?
  •     Only visit sites that you don't have to enter any personal information into. Save the others for a secure network.
  •     Turn on your VPN/Virtual Private Network! (see steps above)

**************************************************
MY GOOGLE PRIVACY SETTINGS:
**************************************************

Note: I only leave Web & App Activity on so that I have my home and other locations I visit frequently available in google maps.  If you don't use google maps or don't need this functionality, you can probably turn this setting off, too.  (Suggestion: You might turn them off one at a time to see if doing so breaks any functionality or services that you use regularly. :)





































**************************************************
MY BROWSER PRIVACY SETTINGS:
**************************************************






































----
Need Something Researched But Lack the Time/Patience/etc?  For $65/hr, I’ll do the research and summarize the results for you (similar to what you see above but on topics/questions of your choosing!)

Rich Raffals
Tech/EMF Consults, Sound Healing, Coaching
Awaken the Magic Coaching & Consulting - 415-662-3117
http://www.AwakenTheMagic.com/

Wednesday, September 25, 2019

3 Steps to Avoid Neurological Damage from Roundup ("to cause Autism in 50% of Children by 2025" ~ MIT Reseacher)

Neurological damage to adults will, of course, be similar.  But, it's largely avoidable: See "123 BOTTOM LINE" below! (3 steps)


("Glyphosate and Autism" graph excerpted below)

Details from Dr. Stephanie Seneff, Senior Research Scientist at MIT:

Expect similar neurological damage to adults — What to Do?
1) See "123 BOTTOM LINE" below (3 steps to minimize exposure)
2) This article also contains excellent tips on how to avoid pesticide poisoning + 3 easy recipes to detox Roundup/Glyphosate
3) See this 15min TEDxYouth talk by PhD Biochemist Mom — Through her research and trial and error, Dr. Reid determined that certain ingredients hidden in our food (eg, MSG) were triggering her daughter's autistic behaviors (and other inflammatory/neurological disorders), the removal of which lead to a full recovery


123 BOTTOM LINE:

1) Eating/drinking strictly organic, non-GMO continues to be the bare-minimum for both human and environmental health (and, specifically, to minimize Roundup/Glyphosate exposure)[ GMOs and pesticides are a leading cause of the pollinator die-off crisis (aka "Colony Collapse Disorder") that now threatens all plant (and human food) survival.  Buying organic/non-GMO is one of the best ways to help the bees! ]

2) Ensuring you're drinking purified water that's not bottled in plastic is also paramount (after decades of spraying, Glyphosate is now in our water).  [ I use/recommend a steel Berkey water purifier, with the additional PF-2 Fluoride/Arsenic/Heavy Metal Filters. ]

3) Finally, please wash all (yes, even organic) fruits and veggies just before using (the major vector of the 2016 E.Coli outbreak was a bag of organic spinach), preferably in purified water (dry them afterwards if washed in un-purified tap water).  This will greatly reduce pesticides and any harmful viruses, bacteria, or parasites…other toxins or microbes introduced during harvesting, handling, transport, storage, packaging or display...as well as any air-borne pesticides or toxins that may have drifted onto the produce from conventional farms or various other sources of air pollution (factories, fires, planes, cars, etc).

*) Bonus to reduce high Arsenic exposure: Avoid/limit rice and rice products (especially brown rice/brown rice syrup), and non-organic/non-pastured chicken/eggs.  Cook rice like you do pasta (boil/strain).  ( Prepared at home: Choose Lundberg Organic White Basmati Rice from California, soak the rice overnight in (6 parts purified water to 1 part rice) before cooking [reduces Arsenic by 80%], then cook by boiling with 10x purified water to rice ratio (as the FDA suggests and they do traditionally in Asia), and then pouring off the excess water (like cooking pasta) [reduces Arsenic by another 50% = 90% total] ).

What I use to detox Roundup/Glyphosate:
* 1 tsp - 2 Tbsp Organic Apple Cider Vinegar in 6-12oz H2O, 1-3x/day (ACV contains a bacteria that breaks down glyphosate), rinse mouth/teeth afterwards to avoid acid breakdown of tooth enamel
GlyphoX Supreme (detoxes + decreases liver cell death from glyphosate; order here)
Restore (strengthens the tight junctions [the seals between cells] in our gut lining – the barrier protecting us from toxic substances like glyphosate [GMOs punch holes in intestines/tight junctions]; they now have a new and supposedly improved product called ION Biome, which I haven't tried)

~~~
Background on Glyphosate/Roundup and Chronic Health Problems, Microbiome, etc:

Glyphosate is the world's most widely produced herbicide and is the primary toxic chemical in Roundup™, as well as in many other herbicides. In addition, it is a broad-spectrum herbicide that is used in more than 700 different products from agriculture and forestry to home use. Glyphosate was introduced in the 1970s to kill weeds by targeting the enzymes that produce the amino acids tyrosine, tryptophan, and phenylalanine. The enzymes of many bacteria are also susceptible to inhibition by this chemical, thus altering the flora of many animals.

Usage of glyphosate has since amplified, after the introduction of genetically modified (GMO) glyphosate-resistant crops that can grow well in the presence of this chemical in soil. In addition, toxicity of the surfactant commonly mixed with glyphosate, polyoxyethyleneamine (POEA), is greater than the toxicity of glyphosate alone (1). In addition, in 2014 Enlist Duo™, a herbicide product which contains a 2,4-dichlorophenoxyacetic acid (2,4-D) salt and glyphosate, was approved for use in Canada and the U.S. for use on genetically modified soybeans and genetically modified maize, both of which were modified to be resistant to both 2,4-D and glyphosate. 2,4-D has many toxic effects of its own and can be measured in the GPL-TOX test.

Recent studies have discovered glyphosate exposure to be a cause of many chronic health problems. It can enter the body by direct absorption through the skin, by eating foods treated with glyphosate, or by drinking water contaminated with glyphosate.

A recent study(2) stated that a coherent body of evidence indicates that glyphosate could be toxic below the regulatory lowest observed adverse effect level for chronic toxic effects, and that it has teratogenic, tumorigenic and hepatorenal effects that can be explained by endocrine disruption and oxidative stress, causing metabolic alterations, depending on dose and exposure time.

The World Health Organization International Agency for Research on Cancer published a summary in March 2015 that classified glyphosate as a probable carcinogen in humans (3). Possible cancers linked to glyphosate exposure include non-Hodgkin lymphoma, renal tubule carcinoma, pancreatic islet-cell adenoma, and skin tumors.

Studies have also indicated that glyphosate disrupts the microbiome in the intestine, causing a decrease in the ratio of beneficial to harmful bacteria (4). Thus, highly pathogenic bacteria such as Salmonella entritidis, Salmonellagallinarum, Salmonella typhimurium, Clostridium perfringens, and Clostridium botulinum are highly resistant to glyphosate but most beneficial bacteria such as Enterococcus faecalis, Enterococcus faecium, Bacillus badius, Bifidobacterium adolescentis, and Lactobacillus spp. were found to be moderately to highly susceptible.

The relationship between the microbiome of the intestine and overall human health is still unclear, but current research indicates that disruption of the microbiome could cause diseases such as metabolic disorder, diabetes, depression, autism, cardiovascular disease, and autoimmune disease.

Treatment of glyphosate toxicity should be centered on determining the route of introduction and avoiding future exposure. Eating non-GMO (genetically modified organism) foods and drinking reverse osmosis water are two of the best ways to avoid glyphosate.

A recent study showed that people eating organic food had considerably lower concentrations of glyphosate in the urine (2). Drinking extra water may also be beneficial since glyphosate is water soluble. More than 90% of corn and soy used are now of the GMO type. In addition, non-GMO wheat is commonly treated with glyphosate as a drying procedure. Glyphosate is somewhat volatile and a high percentage of rain samples contained glyphosate (2).


----
Need Something Researched But Lack the Time/Patience/etc?  For $75/hr, I’ll do the research and summarize the results for you (similar to what you see above but on topics/questions of your choosing!)

Rich Raffals
Tech/EMF Consults, Sound Healing, Coaching
Awaken the Magic Coaching & Consulting - 415-662-3117
http://www.AwakenTheMagic.com/