Win / Conspiracies
Conspiracies
Communities Topics Log In Sign Up
Sign In
Hot
All Posts
Settings
All
Profile
Saved
Upvoted
Hidden
Messages

Your Communities

General
AskWin
Funny
Technology
Animals
Sports
Gaming
DIY
Health
Positive
Privacy
News
Changelogs

More Communities

frenworld
OhTwitter
MillionDollarExtreme
NoNewNormal
Ladies
Conspiracies
GreatAwakening
IP2Always
GameDev
ParallelSociety
Privacy Policy
Terms of Service
Content Policy
DEFAULT COMMUNITIES • All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Conspiracies Conspiracy Theories & Facts
hot new rising top

Sign In or Create an Account

9
posted 348 days ago by towards8 348 days ago by towards8 +9 / -0
11 comments share
11 comments share save hide report block hide replies
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (11)
sorted by:
▲ 2 ▼
– freedomlogic 2 points 348 days ago +2 / -0

Let me guess, jews invented computers too, how about all electronics while were at it.

Its just like a true narcissist to claim credit for the work of thousands of others.

I also consider one of the biggest influencers in neural networks to be https://en.wikipedia.org/wiki/Geoffrey_Hinton who is a british-canadian. If hes a jew he does not advertise it.

Im more inclined to believe most jewish "inventions" work much like chinas "inventions".

By stealing/cheating others out of their research/work and then claiming credit.

https://www.fbi.gov/file-repository/china-risk-to-academia-2019.pdf

However, some foreign actors, particularly foreign state adversaries, seek to illicitly or illegitimately acquire U.S. academic research and information to advance their scientific, economic, and military development goals. By doing so, they can save their countries significant time, money, and resources while achieving generational advances in technology. Through their exploitative efforts, they reduce U.S. competitiveness and deprive victimized parties of revenue and credit for their work. Foreign adversaries’ acquisition efforts can come in many forms, including overt theft, plagiarism, elicitation, and the commercialization of early-stage collaborative research.

permalink save report block reply

GIFs

Conspiracies Wiki & Links

Conspiracies Book List

External Digital Book Libraries

Mod Logs

Honor Roll

Conspiracies.win: This is a forum for free thinking and for discussing issues which have captured your imagination. Please respect other views and opinions, and keep an open mind. Our goal is to create a fairer and more transparent world for a better future.

Community Rules: <click this link for a detailed explanation of the rules

Rule 1: Be respectful. Attack the argument, not the person.

Rule 2: Don't abuse the report function.

Rule 3: No subversion.

To prevent SPAM, posts from accounts younger than 4 days old, and/or with <50 points, wont appear in the feed until approved by a mod.

Disclaimer: Submissions/comments of exceptionally low quality, trolling, stalking, spam, and those submissions/comments determined to be intentionally misleading, calls to violence and/or abuse of other users here, may all be removed at moderator's discretion.

Moderators

  • Doggos
  • axolotl_peyotl
  • trinadin
  • PutinLovesCats
  • clemaneuverers
  • C
  • Perun
  • Thisisnotanexit
Message the Moderators

Terms of Service | Privacy Policy

2026.02.01 - pv4fp (status)

Copyright © 2026.

Terms of Service | Privacy Policy