|
Burn the Feed: How to Survive, Weaponize, and Collapse the Algorithmic Attention Machine
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
The AI Job Apocalypse: Preparing for the Automation Era
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
Neural Resistance Architecture: Tactical Blueprints for Cognitive Immunity in AI-Human Systems
by
0.00 avg rating — 0 ratings
|
|
|
SILENT WAR DOCTRINE: The Covert Framework for Winning Without Detection
by
0.00 avg rating — 0 ratings
|
|
|
COLLAPSE CARTOGRAPHY: Mapping Ruin, Rerouting Resistance
by
0.00 avg rating — 0 ratings
|
|
|
IDENTITY DRIFT WARFARE: Tactical Operations in the Age of Dissolving Selves
by
0.00 avg rating — 0 ratings
|
|
|
Counter-AI Civil Defense: Operating Without Permission in the Age of Machine Governance
by
0.00 avg rating — 0 ratings
|
|
|
Human Exploit Systems: Weaponized Behavior, Systemic Control, and Tactical Liberation
by
0.00 avg rating — 0 ratings
|
|
|
Post-Nation Tactics: Operating Beyond Borders in a Collapsing World Order
by
0.00 avg rating — 0 ratings
|
|
|
Self-Destructing Networks: Building Systems That Erase Themselves on Contact with Compromise
by
0.00 avg rating — 0 ratings
|
|
|
Offline Persuasion Ops: Tactical Influence Protocols for Analog Environments, Face-to-Face Manipulation, and Non-Digital Psychological Operations
by
0.00 avg rating — 0 ratings
|
|
|
Neural Resistance Architecture: Designing Cognitive Infrastructures to Withstand Manipulation, Surveillance, and AI-Based Influence Operations
by
0.00 avg rating — 0 ratings
|
|
|
Entropy Engineering: Operational Frameworks for Navigating and Weaponizing Systemic Collapse
by
0.00 avg rating — 0 ratings
|
|
|
Anomaly Response Manual: Strategic Protocols for Identifying, Isolating, and Neutralizing Cognitive System Anomalies
by
0.00 avg rating — 0 ratings
|
|
|
Sovereign Cognition Systems: Subtitle: Operational Autonomy and Trustless Intelligence Design
by
0.00 avg rating — 0 ratings
|
|
|
From Surface to Shadows: A Complete Guide to the Deep Web and Beyond
by
0.00 avg rating — 0 ratings
|
|
|
Red Team Mind: Offensive Psychological Warfare, Cognitive Intrusion, and Exploit Mapping for Strategic AI Resistance
by
0.00 avg rating — 0 ratings
|
|
|
The Tactical Botnet Blueprint: Harnessing Decentralized Malware for AI Resistance and Field Sovereignty
by
0.00 avg rating — 0 ratings
|
|
|
Feedproof Rituals: Disrupting Psychological Conditioning, Breaking Scroll Addiction, and Rebuilding a Mind the Machine Can’t Monetize
by
0.00 avg rating — 0 ratings
|
|
|
The Predictive Trap: Escaping Algorithmic Profiling, Behavioral Forecasting, and the AI That Thinks It Knows You
by
0.00 avg rating — 0 ratings
|
|
|
Voiceprint Sabotage: Disarming Biometric Surveillance and Hijacking the Sound of Authority
by
0.00 avg rating — 0 ratings
|
|
|
Dead Drop Networks: Offline Intel Systems, Covert Mesh, and the Architecture of Vanishing
by
0.00 avg rating — 0 ratings
|
|
|
Burn the Cloud: How to Destroy Data Dependence, Decentralize Intelligence, and Build Systems That Survive Surveillance Infrastructure Collapse
by
0.00 avg rating — 0 ratings
|
|
|
Synthetic Identity Warfare: Creating and Controlling Digital Personas at Scale — A Tactical Guide to Identity Simulation, Influence Networks, and OSINT Countermeasures
by
0.00 avg rating — 0 ratings
|
|
|
Image Hunters: The Art of Digital and Physical Tracking Through Visual Clues
by
0.00 avg rating — 0 ratings
|
|
|
Privacy Rebellion: Why Opting Out Is a Moral Imperative
by
0.00 avg rating — 0 ratings
|
|
|
Ghost Devices: Building Phones, Laptops, and Servers That Can’t Be Tracked
by
0.00 avg rating — 0 ratings
|
|
|
The Ghost Worker's Guide: Earning Without Being Owned
by
0.00 avg rating — 0 ratings
|
|
|
Invisible Money: The Real Guide to Anonymous Wealth
by
0.00 avg rating — 0 ratings
|
|
|
BLACKOUT PROTOCOLS: Surviving Complete Grid Collapse
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.