34 Comments
User's avatar
mellee's avatar

Thanks Miss Ana! Very useful information! Thanks again for sharing!

Expand full comment
alexxxxxxxx's avatar

Finally, my brethren, be strong in the Lord, and in the power of his might.

11 Put on the whole armour of God, that ye may be able to stand against the wiles of the devil.

12 For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places.

13 Wherefore take unto you the whole armour of God, that ye may be able to withstand in the evil day, and having done all, to stand.

Expand full comment
Doug's avatar

there's another piece it's called the cloak of revenge in Isiah 59 I think. put that on too.

Expand full comment
alexxxxxxxx's avatar

thank you, good idea it fits well , never a truer word spoken ill add the reference "isiah 59 , i think the full text is a bit long for this forum , i hope you agree, interested people can look it up... happy trails

Expand full comment
Pammicakes1's avatar

Love you Ana! Thank you for the invaluable tips. I was lucky enough to hide evidence because they weren't paying attention. They are just people, even though they think that is an insult.

Expand full comment
Mike Hoehn's avatar

Thank you

Expand full comment
Neuroweapons Exposed's avatar

Thank you, Ana for this great advice to help protect us from this extreme abuse of 702 authority and FISA court rubber stamp.

Expand full comment
Ana Toledo's avatar

FISA Court approves 99% of FBI applications.

Expand full comment
Jim's avatar

Great info!

Expand full comment
d m c's avatar

Yrs ago, decades, Microsoft wouldn't allow me to use their email services. Simply, no access. Now i know why.

I never bothered w '2 verification step', bc i knew it to be a waste of energy. Again, decades of losing access to many emails, socials, blogs...

Mind control technology can only be beaten by unplugging & dismantling.

I foresee one day, we will have good guys writing legislation, to shut down the bad guise. May not be in my time, but then again, Assange is free!

Ana,

my eyes are blurred by emf as i type this post, yet i feel the love that goes w u dear, beautiful lady. Its a good feeling to know u, & others, are out there making change happen.

Stay blessed & KeepSpeakingOut💜✊🏼

DarleneDarDarla

Expand full comment
Ana Toledo's avatar

Blessings to you Darlene! Stay brave and strong!

Expand full comment
Yasmine Nasser-rafi's avatar

In one of the banks that had I had opened an account, the Jewish manager asked me 3 times what my country of origin is, even though she had my passport in front of her, and right in front of me, changed my password. Every time I tried to get into my account, I could not, there was not much money in it. She just wanted me to suffer. I closed the account.

Expand full comment
Ana Toledo's avatar

When one starts to look back at 'weird' interactions like that before we knew about targeting, everything starts making sense...

Expand full comment
alexxxxxxxx's avatar

the pshycopathic elites have theirown internet and eqiptment ie phones codes , special " chips ... their own medicine ,own freedom from all laws , unlimited credit , ai obeys them , and protects them , above the any world law....etc etc therefore we are more powerfull with our God of goodness truth and love

Expand full comment
Be Kind's avatar

The organization, CAIR won their supreme court case.

Thank you Ana for all that you do.

Expand full comment
Doug's avatar

yeah I've lost access to accounts too the same way. I had evidence of my calling and talking to the local sheriffs dept and now I don't.

yeah all good stuff criminals are always doing evil to us.

Expand full comment
Ing. Dipl. Voicu Anton Albu 🇺🇦's avatar

https://en.m.wikipedia.org/wiki/.arpa it’s just a technical/infrastructure domain used by the internet. Nothing interesting there.

Nonetheless, something is using ipv6 on your network. IPv6 is extremely problematic to secure, because it bypasses the usual packet inspection performed by your router. I always disable ipv6 entirely on all my routers.

Hardening a system is not easy, especially on Windows.

- install OpenWRT on your router (technically involved)

- use network segmentation to protect sensitive devices

- use two phones: one for every day use, the other for anything important such as bank accounts etc

- use virtual machines on desktop computers

I am extremely tortured. I have scripts that I wrote and can do hardening of the system but I stopped caring about it for some time now.

EDIT: I forgot the most important part: never look at a password. The criminals can read your brain. If you know the password, the low scum will also know it.

Expand full comment
Ana Toledo's avatar

Thank-you. Clarification: the criminals at #USSpaceForce can read our brain, but their security clearance does not allow them to talk to the Infragard hackers. However, if you have illegal eye implants, the local criminals can see through your eyes using their interfaces that work with wifi and bluetooth frequencies.

Expand full comment
Ing. Dipl. Voicu Anton Albu 🇺🇦's avatar

I don’t know if I have eye implants or not, but the criminals demonstrated to me their ability to see through my eyes, to move my eyes, to move my eyes to a certain point or object, and, the most scary part, they can see information which I don’t look at, but it’s in my visual field.

Expand full comment
Be Kind's avatar

Before I really understood the advanced nature of their technology, I had cataract surgery. The cataracts formed very rapidly. I trust my surgeon. I have little, for lack of a better word, beings that move like a manta ray across my field of vision. The surgeon has no idea what it is.

They are accessing my phone at night, if I leave my phone away from the bedroom at night, it will have the same charge in morning but on my nightstand it uses 20% of the charge.

I was worried about the password issue, I have trained myself to think about other things while typing it in.

They have ruined 3 computers.

They grab your credit cards as well.

Expand full comment
SP's avatar

Hi Ana,

Can you expand at all on ‘interfaces that work with Bluetooth and WiFi’?

Expand full comment
SP's avatar

Can you describe what ‘use virtual machines on desktop computers’ means or consists of?

Expand full comment
SP's avatar

I also just learned that some websites offer Yubi users opportunities to forgo use of the physical key in case they forgot it, lost it or whatever. Arrrgh! So much for REQUIRING a physical key.

Expand full comment
User's avatar
Comment deleted
Aug 27
Comment deleted
Expand full comment
SP's avatar

I know, right? Always a loophole for f’ing hackers and it seems like never a solution that is worthwhile for the victims. I have found that all apps work as they should the first time I use them, then the hacker uses the ‘cookies’ I received to access the app, set user and password, then any time, money, need for future use is gone because the hacker re-uses the copy of the ‘cookie’ and either sets up a redirect to a fake site, changes password to disallow access or send me on a never ending loop, makes me appear as a bot/changes my request for access to the website to be automatically rejected or I see ‘site has been moved’. Uh, I don’t think all/most of my typical websites (like proton mail, DuckDuckGo browser) have ‘moved’.

If you see or ever have seen 000-000-0000 or with an 86 at the end on a phone activity report it potentially is the initial access of a Remote Access hacker.

I’m blown away by all the techniques, apps and difficulty involved in proving/removing these criminals from destroying our devices, denying us the same freedoms, functions, easy access, full benefits that the majority of the world is able to enjoy. Sadly, the rank of Victim grows exponentially with each passing day. Having been hacked for 10 years, I have spoken with tech and fraud specialists at several MAJOR companies and it’s shocking to realize how very unprepared we are as Americans to even come anywhere close to matching the capabilities of Hackers.

Expand full comment
User's avatar
Comment deleted
Aug 28
Comment deleted
Expand full comment
SP's avatar

Have you opened the boxes yet? If not, let’s talk first. I’d like to try and help with sharing knowledge from my experience. Like others, I’ve lost so much $$ trying new apps, devices etc.

Expand full comment
User's avatar
Comment deleted
Sep 16
Comment deleted
Expand full comment
SP's avatar

Defeated? I know that feeling too well myself.

Pay me? No. Just the ability to share and help one another is worth much more than the items I have wasted far too much time/money on due to the unwarranted demotion I received to TI status.

What time zone are you in? I’m on PSTime.

Recent discoveries related to relentless hacking issues fuel my quest for knowledge and hopes for discovering workable solutions for at least a handful of the daily challenges that neither I, nor any other human wants to have anything to do with.

Expand full comment
SP's avatar

I haven’t but I’m interested in talking with you more about this topic. Let me know the best way that we might be able to talk offline.

Expand full comment
SP's avatar

The hacker I deal with has been using a new technology that enables WiFi waves/signals to ‘see through your walls’. Look it up on You Tube. “How to stop cops from seeing through walls” or “how to use a smartphone to see through walls”. He rendered 3 routers useless, used a Roku unit (search the internet as Roku and LG TVs are easily hacked and used as servers. I no longer watch any TV. My brand new $1K iPhone rendered useless. Stalkers swarmed my vehicle at an empty, off the beaten path parking lot on a Saturday, used an insane device called a Flipper Zero to scan my vehicle and zap my Dash camera video. My Apple ID, location, Blue Tooth, WiFi, car WiFi longitude and latitude are corrupted. Ex-BF, dangerous Sociopath I haven’t dated or see in many years was outside my cell service provider and use Near Field Communication, apps that don’t allow your phone to truly shut down like Music, Game Player, NetAnalyzers, Find My, Maps, Journaling Suggestions and many more to access whatever they want. “Cookies” are stolen from the preference pop ups you see and you may have success with an app with initial login but never after that. They keep a copy of the approval to enter, then go in after your session and change the user/password, set up redirects and VPNs are changed to prevent your access by changes in the code to disallow your entry. I’ve learned a lot.

Has anyone or please try to purchase and use a Yubi Key (a physical key)? - likely you’ll need someone else to set it up and register it without your seeing that data. However it may work to provide success with 2 Factor Authentication.

Expand full comment
User's avatar
Comment deleted
Aug 23
Comment deleted
Expand full comment
SP's avatar

It matters if they can intercept the initial registration of the physical key. And copy/use the data and also if they can remotely hack/enable a scanning of any page you view.

Expand full comment
SP's avatar

Also check out a phone called a Librem which has HW kill switches for Camera, Bluetooth and WiFi and another with Star and Circle in the name (but can’t recall the actual name at the moment). The later is touted to be the most secure phone available.

Expand full comment
User's avatar
Comment deleted
Aug 23
Comment deleted
Expand full comment
SP's avatar

Whenever possible, my thought is that if you have a trusted family member or friend, ask them to complete the purchase, set up the basics and use the equipment at a location other than your own. An inconvenience, yes, difficult questions, yes, possible risk for the person who assists, uncertain.

Personally, I am most interested in a cell phone and laptop that offers ‘hardware kill switches’ for Bluetooth, WiFi and Camera/Microphone. Unfortunately, I purchased a new iPhone with the hopes that a never before used Apple ID and a security focused Proton email account and a Yubikey would be a strong defense. I was wrong. The iPhone and other cell phones offer an incredible number of options that enable hackers to f things up.

We are SO UNPREPARED as a country, as major corporations and as individuals to even come anywhere close to having the knowledge, skills and abilities to defend ourselves from the exponentially increasing number of attacks by ‘bad actors’.

Technology, especially Artificial Intelligence (AI) and 3D 360 degree holographic technology along with all the unbelievable technologies used on TI’s will likely have nearly every human wishing we could return to the days prior to the invention of cellular phones, the Internet and virtually any connected device originally intended to increase productivity, communications and convenience.

What we are experiencing is that it can all quickly become a nightmare without solutions, escape, retribution, security, safety, freedom, trust….

I absolutely agree, it can often sound so unbelievable. But for now, only a couple hundred thousand of us know (and live) the reality. It’s an incredible challenge, but sharing and helping one another is our best option for now. Please DOCUMENT in written form or via battery operated recordings, create copies and share/store the information in trusted locations.

Expand full comment
User's avatar
Comment deleted
Aug 23
Comment deleted
Expand full comment
SP's avatar

I think the key has to be inserted into the device it will be used with.

Expand full comment
User's avatar
Comment deleted
Jun 27, 2024
Comment deleted
Expand full comment
Ana Toledo's avatar

It’s probably implants they remotely trigger to harass you.

Stay strong!

Expand full comment