There are many ways to attack this impending issue of cyber threats. Searching the dark web, you can find people’s credit card information, lists of passwords of 6 to 8 characters long, addresses, phone numbers, home security camera videos, T.V., vehicles, robot cleaners, refrigerators, dryers, and anything “smart” technology. All your data is being sent to the dark web for dark users to take hold.
Do you know there is a list called “Rock-Your Password List” (RockYou.txt), How hackersHow a general list of everyone’s passwords, 16 BILLION, hacked from all the big businesses, the government, and the IRS? These passwords are made into characters, or HASH, that the internet cyber computers use to identify you. The list is for free on most hacking sites. This list is put into a Keli “hackers” software to find your information: Link!

Let’s take a break and learn about the “Man in the Middle” hacking technique and “Poisoning the APR.”
Here is how the internet works…
You want to make a call when you are 9, so you use your phone to call someone 6. Here is the current system:
Nine makes the call using pa hone, and it goes through your router, where it gets to go through an ARP digital number to place your ring over the ISP and WIFI network through the Modem.
Hackers put themselves in the middle of your calls, computers, or anything digital. They become the Modem and direct the ARP to send everything to their laptop. Then, how will the hackers forward the information to the correct ISP address? They enable hackers to intercept all your phone calls; you would never know because the calls are being made as usual. The only problem is the “Man in the Middle” has access to everything in or out of your phone. This can be done with other devices as well.
Here are some videos to watch, and then I will offer some things you can do right now to protect yourself against hackers.
MAN IN THE MIDDLE
DATA BROKERS
2FA NOT SAFE
HACK WITH AN IP ADDRESS ONLY
HOW TO HACK ANYTHING WITH “FLIPPER ZERO”.
Now that I HAVE YOUR ATTENTION, what can you do to protect your data?
- Learn your computer. You need to understand your software and system. Begin with Windows and then jump into Linux. There are a lot of classes that were offered on Udemi and other online schools that are now on YouTube. Look and see, find a friend, and get after it.
- Safer email, with a locked down physical key. If you have to use any of them, Gmail will be the best choice because you can lock it down. Plus, if you use other services, they are all linked using your master passcode.
- Get a Password Manager; I use and like BitWarden. You use a phrase and not a six or 8-letter passcode. Find something in your home, something your dad said, or your favorite saying…Where we Go one, We go all, and you take the first letter from each word. Thus, my password would be WWGOWGA, but don’t stop there; now, you can personalize it with your dad’s birthdate or something familiar. This phrase is now your one-time password for your VAULT! BitWarden is a Vault of all your passwords. Next, you want to get 2 Yubicon digital physical keys. You register these with your BitWarden. You can also add your Cash App card and not your credit cards. Credit cards are unsafe and already hacked before you get them. Banks have been selling your information on the dark web. Another one to look out for a Password Manager is DashLane. Please don’t use it, so don’t use it, but the Cyber Security guys do.
- Use a Cash App card, and only use your bank for a processor. Do not leave much in your bank. You can move money from your Stellar, Coinbase, and CoinPop wallets into your bank. You can do the same with Cash App. No one will use Credit Cards shortly because they are a huge vulnerability, and merchants cannot accept them because they are flakey means of exchange. Chargebacks are breaking the back of America. People buy their goods and then report their cards stolen. The Merchant has to return the money, but the thief keeps the goods. There is nothing you can do. Police do not investigate these crimes. Thus, the merchant gets stolen by the means of a credit card.
- WIFI needs to shut off your phone so a hacker cannot use your WIFI to hack you. Your home network, router, and modem could send your data, keycodes, websites, and frequency during the night. Thus, shut it down. Your printer is sending your photo-copied data to the NSA. Therefore, at night, unplug your network from the wall. We have ours on a surge protector, so everything gets shut down when we unplug from the wall.
- WIFI mouse and keyboards need to be plugged into your computer and not accessible to someone using a Flipper outside of your home.
- Cyber Security AntiVirus protection is not good, so look up which ones protect you with “Open Source,” which is Linux vs. Micros, which is closed codes hiding their spyware connections.
- RFID protection wallets. These cannot be scanned with your identity-revealing cards.
- Auto cars, Key Fab case protection so hackers don’t get your car keys.
- HTTPS security for websites. If not SSL compliant, they can be fake websites, sometimes mirrored to look like your bank’s sign, so be careful.
- Do not open folders, pictures, or files when you get emails. You want to use online a Linux system Operating System = OS. The easiest one to transition into Linux is with Zorin OS. It looks just like Windows.
- When you put your password into your login pages, do not turn on the eye to reveal your password.
- Brave Browser is connected to a password vault and is much safer than others. It is the only Web Browser that protects your crypto digital wallet information: Link!
- VPN CyberGhost, please look and see if there are “open source.” Start training yourself to work with “open source” industries because they are Linux. It is said that 90% of all businesses are now using Linux. They hire hacking groups to hack their systems for safety. Linux VPN: Link!
- Banks, your bank, and bank debit cards should only be used as a processor or linked to a more secure setting. That means moving your money into a Ledger, Stellar, Coinbase, CoinPop, or Lobstrs wallet. The best is the cold wallets since they are offline. Do not print your passwords because your printer sends this information to a China server. (People hacked it to find out where it was going.) Money can also be stored in absolute value, metals like Gold, Silver, or Platinum. You want a safe underground vault, so be careful how you hide it. You don’t want a safe parsley, and you don’t want someone to know where it is or help you install it.
- NEVER USE AN IT GUY TO SECURE YOUR COMPUTER! They are trained hackers and install back doors that they can access. They can record your password screenshots or use your computer via an artificial connection. Learn your system. Things with computers will get more complicated, so you might as well learn it now. Windows will help you learn Linux. There is a “computer logic” that is used with all systems. Once you understand the logic, you can use any computer and efficiently process how systems work.
- ICE your credit scores from all three agencies. They, too, sold your information on the dark web. Therefore, you can reach each service and ask to “ICE” your account so that hackers or Identity thieves cannot use your information to get credit cards. Most credit agencies hide this information, but you can. How hackersHowfind it if you dig it. You will need to pay 5.00 per agency to lock your account down.
- Get a Gun, Pepper Gel, Personal Alarm, Wasp or Bear Spray. Shortly, we will have Shane, our Personal Security Manager, offer “dry” gun protection classes. Shane is an expert gunman and has won many championships in the gun programs. Using a gun with no bullets has turned out many great gun champions. These people were more comfortable with their weapons and better shots due to all the practicing. Classes will start soon. Watch for it: Shane’s Gun Classes in the Top Menu.
- Lastly, a Ubi Key. This gives your cyber behavior another layer of protection. It works by inserting a physical computer USB key into your computer. When you go to certain websites, you need to touch your key to allow entrance into your accounts. You can also get one for your phone. Yubicon is the best at this time. They are for sale on Amazon. This key is registered with Brave browser, so when you go to shop, you can put your Cash App card in there and then auto-fill it into your purchases. This means there are no keystrokes to steal—a very safe and secure way to use your money online. Most, if not all, digital exchanges are in the process of integrating this physical critical approach to securing their financial wealth. Link!
What is an NFC? It’s the future Dudette/Dude!!!! It is something you have to know. It’s where we are going as a Galactic Hu. It’s how we will pay and secure payments in the future, so you need to know.
https://www.youtube.com/watch?v=3dijGruxtI8
Many people are getting spammed via their phones, report it on the National Do Not Call registry, and let the government know they are wrong. They must pay 500.00 every time they call someone on the do-not-call list. Here is security for your phone protection. Link!
Link for more information: Link!

21. ANTIVIRUS ON YOUR COMPUTER! Let’s get some protection on your personal computer. Here is a list of the top 5 companies that have been around for a long time. Malware is one of my favorites, but I like them all. Link!
Start small and keep moving. I would start with an Antivirus at home, a Password manager, and using Brave Browser.
Like everything, there is a learning curve to putting this all together. You can watch videos on YouTube or call us, and Tom or Shane can set up a private meeting with you. You are announcing a computer within a computer technology to safeguard your activity on the Stellar Network or Digital investing. We can deploy a two-computer system to mask your digital movements and wallet activities. Really!
Credit Card Protection RFID is a must on eBay! | ![]() |
![]() |