Gates, Bloomberg, Bezos and other elitist multigazillionaires suffer from the same mental and personality defects. They believe that since they were successful in one sphere of economic enterprise, they’re geniuses about any other subject and should be the ones to tell everyone else how to live.

Actually, their stupidity and greed for power overrides their ability to simply shut up, retire and enjoy the rest of their lives in comfort.

A problem is that there are politicians who will cheerfully sell themselves and enforce their master’s will simply for the privilege of licking up scraps from the table.


You think social media tyrants are on a power trip? Wait until you see what Microsoft has planned for America.

SILICON VALLEY- You think tech censorship is bad now? It could be getting much, much worse, according to Allum Bokhari, senior technology correspondent at Breitbart News.

Bokhari tells us that Microsoft has partnered with a number of tech and media companies for the purposes of creating a system of tracing content on the internet which would serve to destroy only privacy and anonymity.

According to Bokhari, a press release issued by Microsoft should serve as a warning that the unholy alliance of tech and media tyrants has developed a plan that would “constitute Big Tech’s most brazen power grab yet.”

Microsoft’s press release indicated that it has partnered with a number of other organizations to form something called the Coalition for Content Provenance and Authenticity (C2PA, not to be confused with C3PO of Star Wars fame).

The purpose of this organization is to develop a system whereby all content on the internet can be traced directly back to its author.

The release notes that this system would be able to trace back “common asset types and formats,” which means videos, documents, audio and images.

So anyone who develops a meme, writes an article (or any type of document), audio, or whatever—would be susceptible to having it traced back once it reaches the internet, through a set of signals which would identify its “provenance”—or authorship.

The fact that Microsoft has signed onto this initiative is scary enough, since that platform creates widely used programs such as Word, Paint, Notepad, Edge and Office Suite. Any document created with the .doc or .jpg as an extension means Microsoft had their hands in it, at least in some capacity.

Another company signed on to the initiative is Adobe, which is the parent company behind programs such as Photoshop, Illustrator, Acrobat and Premiere Pro, in addition to a number of other well-known and popular applications for publishing photos, videos and documents.

How about this one? Truepic, which is a company that has developed technology to track the origin of photos immediately as they are taken on a smartphone.

Far more ominous is the involvement of Intel, which is the dominant maker of CPU systems for laptop and desktop computers. CPU, or central processing units are responsible for “processing virtually all information on computers,” Bokhari warns.

The CPU processes all data on a computer, whether you’re typing in a word processing program or taking a screenshot.

According to Bokhari, the ability to access the CPU is “the ultimate form of digital surveillance,” noting that even computers not connected to the internet are still surveilled by the CPU which continuously monitors what the computer is doing.

So, what would such an alliance possibly be able to do? Bokhari warns that they would have the ability to “track and de-anonymize information from the moment it created on a computer.” By so doing, these companies would have the ability to attach signals to the information which would allow it to be censored and/or suppressed wherever it goes online.

Even if the information was shared by a third person, the attached signals would still prevent the information from being shared online due to the point of origin, while once again allowing that information to be tracked back to the source.

Imagine for a moment that you send an email to a friend which complains about say coronavirus lockdowns or maybe about possible election malfeasance. These systems would have the ability to censor that information. 1984 anyone?

Bokhari notes that Microsoft does not, in its press release, even try to disguise that this is the ultimate goal of the program. In fact he says, “the press release gives several indications that these are precisely the ultimate goals.”

Microsoft says in the release that the coalition was created for a single purpose: to stop the spread of what they call “disinformation.”

Of course in 2021 America, this means anything that doesn’t go along with the established narratives by the government, media, big tech tyrants or whomever. This is clearly an attack on free speech.

The press release reads, in part that the coalition was established “to address the prevalence of disinformation, misinformation and online content fraud through developing technical standards for certifying the source and history or provenance of media content.”

Now, one would think that the media, which should be interested in free speech and the First Amendment would be opposed to such a draconian, Orwell-like program. Not so much. Bokhari notes that a precursor to this program called “Project Origin” included the New York Times, the BBC, CBC and Radio Canada.

Project Origin’s mission statement read:

“Misinformation is a growing threat to the integrity of the information eco-system. Having a provable source of origin for media and knowing that it has not been tampered with en-route, will help to maintain confidence in news from trusted providers.”

Bokhari said the stated goal is put right up front, to be able to “trace the origin of all digital content so that ‘trusted providers’ can be distinguished from non-trusted providers.”

This is a significant change in how big tech, social media, and the mainstream media plans on engaging in censorship of opposing opinions. Instead of doing it as currently done—through censorship of online social media and search engines—they are retooling to engage in censorship at the offline software and hardware level, including down to the very brains of computer hardware, the CPU.

“In other words, there will be nowhere to hide,” Bokhari says. He notes that the egregious behavior over the past year or so by the tech tyrants such as Facebook, Twitter, Google and others, which included interference in the presidential election, censorship of former President Trump, and the censorship of primarily conservative political movements is small potatoes compared to this power grab.

“This is Big Tech’s most dangerous plan yet,” Bokhari says.

We agree.