It Will Not Stop Until YOU Make It Stop
The Market Ticker - Commentary on The Capital Markets
2017-06-25 07:00 by Karl Denninger
in Technology , 380 references Ignore this thread
It Will Not Stop Until YOU Make It Stop
[Comments enabled]  

What won't stop?

Out-of-scope data collection, correlation and sales.

In other words forced divulging of data from you, or about you, for other than the purpose you reasonably both expected and agreed to.

Let's take Android.  You turn on maps, which is a Google-provided program to get you from "X" to "Y".  That Google would use your location during that time to provide you not only that service but also possibly ads related to where you are is reasonably-foreseeable and something that makes sense you'd agree to in order to get the requested service.

But now let's look at the other side.  You have a weather application on your phone.  That application has ads.  The ads are context sensitive so (for example) knowing that you're near a sub shop it might show you an ad for that.  Fine, thus far.

But not so fine when Google pops up a prompt to review that sub shop should you set foot inside when you didn't use Maps, or any other Google software that could have reasonably known that.

Oh, and you can't turn that off either -- that is, you're forced to allow one company to have access in order for anyone else to.  Google ensures this by not allowing you to "gate" applications so they only have access an can run when in the foreground (e.g. visible on the screen) -- but they sure will gate their Youtube app so you can't listen to the audio associated with a video being played unless you are physically watching it (and thus can see their ads!)

Now that particular example (which is really common) is just annoying, never mind costing you money (since the traffic to do that on the network you pay for yet you get nothing in return.)

But what happens when that data, which Google and dozens of other firms now have, is sold to a data broker who in turn uses it to set a risk profile for your health insurance and thus what you pay for it?

What about when it goes into your car insurance or homeowner's insurance pricing?

Or, that you did not go past a Best Buy means that Amazon charges you a higher price for something that you could have bought at Best Buy -- and might have, had you gone by there.

Think all of this is theoretical?

It's not.

It's happening.  All of it.  Right now, in real time.

And utterly none of that is something you reasonably expected to happen when you "gave consent" nor would you likely give consent if you knew in advance.

I'll give you an example.  My Android phone is idle right now.  I deliberately closed all of the apps, and force-closed everything in the app drawer.  Of course some of them immediately started back up.  I also blocked a lot of Google's stuff.

Nonetheless, look at this which is a tiny snippet of what goes on all the damn time:

09:32:34.368602 IP D5.Denninger.Net.47430 > a104-92-14-243.deploy.static.akamaitechnologies.com.https: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 175172 ecr 359567624], length 517
09:32:34.395562 IP a104-92-14-243.deploy.static.akamaitechnologies.com.https > D5.Denninger.Net.47430: Flags [S.], seq 3364819207, ack 4270951170, win 28960, options [mss 1460,sackOK,TS val 359567660 ecr 175168,nop,wscale 5], length 0
09:32:34.400981 IP a104-92-14-243.deploy.static.akamaitechnologies.com.https > D5.Denninger.Net.47430: Flags [.], ack 518, win 939, options [nop,nop,TS val 359567665 ecr 175172], length 0
09:32:34.401909 IP a104-92-14-243.deploy.static.akamaitechnologies.com.https > D5.Denninger.Net.47430: Flags [P.], seq 1:153, ack 518, win 939, options [nop,nop,TS val 359567666 ecr 175172], length 152
09:32:34.402726 IP D5.Denninger.Net.47430 > a104-92-14-243.deploy.static.akamaitechnologies.com.https: Flags [.], ack 1, win 343, options [nop,nop,TS val 175175 ecr 359567624], length 0
09:32:34.405302 IP D5.Denninger.Net.47430 > a104-92-14-243.deploy.static.akamaitechnologies.com.https: Flags [.], ack 153, win 343, options [nop,nop,TS val 175175 ecr 359567666], length 0
09:32:34.407235 IP D5.Denninger.Net.47430 > a104-92-14-243.deploy.static.akamaitechnologies.com.https: Flags [P.], seq 518:569, ack 153, win 343, options [nop,nop,TS val 175176 ecr 359567666], length 51

The traffic out of the WiFi interface (if it's on) is continuous and it's all encrypted.  I have no way to know what the **** is being sent or who the actual target is; being encrypted I can't see what is in the data payloads.  Akamai is a common "cloud" data aggregation and delivery system but the point remains -- what's being sent, to whom, and by what?  I have no way to know and no way, other than shutting off both cellular and WiFi, to stop it.

Then there's "markmonitor" -- which is the target of some of the traffic on le100.net.  When did I consent to my device sending something encrypted to them?  Their claimed "business model" is "brand protection."  What are they snooping for and in which app did that get into my device?  This one I have been able to track down -- Google's apps are sending to them.  Why is Google snooping around in my device and what are they sending to a "brand protection" company?

10:08:34.540999 IP6 2600:8807:8600:ea1:c978:9379:2f6c:c861.41337 > atl14s78-in-x0a.1e100.net.https: Flags [.], ack 1, win 395, options [nop,nop,TS val 345828 ecr 3390397241], length 0

There are dozens -- if not hundreds -- of others.  Some are from apps, but that belies the problem as well: Is not Google responsible for that which is in their app store?  Is not Apple responsible for that which is in theirs?  They create the "ecosystem", they profit from the "ecosystem" they should be responsible for what the apps in said ecosystem do.

Some of the traffic is identifiable as legitimate and expected.  Transmissions going to and from "googleusercontent", for example, or the IPSEC communications necessary for WiFi calling to work.  If I actually use an app then obviously it may have to go get something from the network and that's legitimate too.

But this traffic is all happening on a device that is sitting idle and yet it is continually collecting and exchanging data with a lot of "someones" unknown and unnamed, for unknown purposes.

What's worse is that all of these companies -- Facebook, Google, Apple, Snap, etc -- do this sort of thing and yet claim that they "deidentify" you.  This is nonsense; anyone with more than a few bits of these data pieces from multiple sources can with a very high degree of certainty attach your name to said "anonymous" advertising numbers, and poof -- you are known with certainty and forever, personally.

Oh, and incidentally it's just a matter of time before some nefarious jihadi type group buys up and correlates some of this data and then uses it to target people they want to kill by group.  It would be utterly trivial, for example, to identify active-duty military personnel in this fashion -- or cops, firefighters, etc.

How do we know they haven't already done this and are simply deciding when to use said data?

We don't, but it's incredibly naive to believe they haven't thought of it or won't do it.  They both have and will, and when it happens it will be our fault for allowing this crap to go on for as long as it has.  It will be our willful and intentional blindness to ridiculous exploitation and abuse served up on the American population daily that will be directly responsible for these deaths, and they will number in the thousands "all at once", making 9/11 look like a Girl Scout convention.

Let me point out once again that I did not consent to some unknown thing sending data on me all the time on a literal second-by-second basis -- and not just once, but dozens of times which nearly all appear to be wildly "out of scope" to what I did consent to.

Not only does all of this trash my battery and cost me money it also costs me anything that might be considered "privacy" too, and there is no way for me to know what that data is, who it's being sent to or why.

There are a number of relatively simple mandates that could take care of a big part of this problem.  Not all of it -- but a large part of it.  Specifically, the law could require that:

  • "Bundling" of application permissions is barred as a matter of law.  In other words it is explicitly prohibited for a manufacturer of an operating system, phone or other device to "whitelist" their apps and force you to take them and their demands to be able to see and transmit data as a group.  The impact of this today is that it is functionally impossible for me to have a weather application able to "see" the GPS or network location data (to know where I am) without Google's apps also being able to see the same thing.

  • Permissions must be able to be set separately for "with focus" and "in background", defined as when not in focus on a granular, per-application basis. Objecting to a mapping application being able to see your location while you're actively looking at it is stupid -- obviously, it can't work without that capability.  The same capability when the app is not visible is another matter, and what's worse is apps that stick pieces of themselves in the background and run without your knowledge, often at startup and on a permanent, persistent basis.  The current "model" of permissions where you can "deny" location, for example, to a mapping program is one that Google (and Apple) knows is worthless.  Denying location to a map application makes it worth nothing, of course, but denying it location when not in the foreground would make it impossible for it to grab your location when not being actively used and send it to "whoever."

  • Denying the ability of an application to run in the background must be one of the supplied permissions.  Maybe you wish to let Facebook run in the background, and perhaps you do not.  Some things (like a message app) might require that ability in order to be useful but a whole host of apps are perfectly useful without this ability and yet they frequently register and use background components.  All of the benefit of that is for the app developer (and whoever he sells data to) and none of that benefit is for you.  The inability to prevent this is outrageous.

  • Permissions must include access to the network.  If an app cannot obtain location information, cannot scan data on the device and cannot transmit or receive information when it is not in the foreground then a huge amount of the current data mining becomes instantly impossible.

  • Users must be able to change (1) the resolvers used for DNS lookups and (2) firewall and host mapping tables.  My device, my decision on what it can talk to and under what conditions.  Right now both Google and Apple deny access to these parts of the system although both are present.  Both Linux and the base IOS kernel have packet filtering available and both also trivially use a file called "resolv.conf" to determine where name resolution takes place.  These must be under user control so that I can, for example, block all traffic to and from one of those above-identified places should I choose to do so.  This is my piece of hardware, I own it and I have the right to control how it operates.  Period.

  • System services (e.g. Google's internal "play" services, etc) must not be able to circumvent these constraints.  Right now they both can and do.  The background "services" (those things that run "headless") must inherit the permission of the requesting application or program.  In other words Google's "Play Services" may not obtain your location unless the requesting caller has permission to obtain it in the current context (e.g. background or foreground) nor may it on its own collect and transmit said data independently.

  • App developers, including device vendors, must be compelled to disclose what they collect and why they collect it before you consent to loading such an application or, in the case of a pre-loaded app, before or at first use but before any collection and transmission occurs.  They must be barred under criminal and civil penalty, from sale of such data "out of scope" to anyone and any sort of "blanket permission" must be barred. In other words if you collect data "to provide better advertising" to me then you can't sell it to anyone who does not have as the sole and only purpose of its use providing said better advertising.  If you, for example, sell it to someone who is using as part of producing a "Credit risk score" you get shut down, your executives go to prison and you're financially ruined.  The use of such language as "or any other legitimate business purpose" must be explicitly unlawful.

  • This must be applied to all consumer devices, not just phones.  If your television is running an app platform (all the new ones are) this must be applied there too, with the same granularity.  Your "smart speaker"?  Same.  Refrigerator?  Same.  Washing machine?  Same.  Cellphones are just the most-obvious and pervasive example of this problem so far, but are far from the only one.  As another example I have already had to block a crazy number of IP addresses and ports from being able to be hit from a couple of webcams I have here.  They're nice and inexpensive but by default try to send a hell of a lot of data to god-knows-who for god-knows-why.  Good thing I control the device between them and the Internet and thus can interdict and stop all of that traffic, right?  You can't do it with a phone because (1) it has WiFi in it and while you control your home WiFi you don't control it anywhere else and (2) you don't control any of the cellular infrastructure.  Thus, the capacity for user control and interdiction for a cellphone must be at the device level (the above bullet point.)

  • These changes must be retroactive and a duty to destroy all existing data collected and stored without said consent must be imposed.  None of what has gone on so far has been legitimate or with consent.  The only difference between******and sex is consent folks.

If these changes are not made now then these firms -- including all the big ones -- need to be shut down and criminally prosecuted right here, right now.

All of them, without exception.

Why?  Because all of them are grabbing data from you with no real consent as to what they're taking and the "big data" paradigm today means that they are using it beyond the scope of anything you did -- or could have -- reasonably consented to and understood.

If we don't demand and enforce this we will wake up one morning to find that a large swath of people have been targeted using these "technologies" and killed, or worse it will be used to map critical infrastructure and movement of people related to same, resulting in the death of millions all at once.

You've been fairly warned.

Go to responses (registration required to post)
 
Main Navigation
MUST-READ Selection:
A One-Sentence Bill To Force The Health-Care Issue

Full-Text Search & Archives
Archive Access

Legal Disclaimer

The content on this site is provided without any warranty, express or implied. All opinions expressed on this site are those of the author and may contain errors or omissions.

NO MATERIAL HERE CONSTITUTES "INVESTMENT ADVICE" NOR IS IT A RECOMMENDATION TO BUY OR SELL ANY FINANCIAL INSTRUMENT, INCLUDING BUT NOT LIMITED TO STOCKS, OPTIONS, BONDS OR FUTURES.

The author may have a position in any company or security mentioned herein. Actions you undertake as a consequence of any analysis, opinion or advertisement on this site are your sole responsibility.

Market charts, when present, used with permission of TD Ameritrade/ThinkOrSwim Inc. Neither TD Ameritrade or ThinkOrSwim have reviewed, approved or disapproved any content herein.

The Market Ticker content may be sent unmodified to lawmakers via print or electronic means or excerpted online for non-commercial purposes provided full attribution is given and the original article source is linked to. Please contact Karl Denninger for reprint permission in other media, to republish full articles, or for any commercial use (which includes any site where advertising is displayed.)

Submissions or tips on matters of economic or political interest may be sent "over the transom" to The Editor at any time. To be considered for publication your submission must include full and correct contact information and be related to an economic or political matter of the day. All submissions become the property of The Market Ticker.

 
Comments.......
User: Not logged on
Login Register Top Blog Top Blog Topics FAQ
Showing Page 1 of 2  First12Last
User Info It Will Not Stop Until YOU Make It Stop in forum [Market-Ticker]
Supertruckertom
Posts: 1306
Incept: 2010-11-07

USA
Report This As A Bad Post Add To Your Ignored User List
Who needs traditional fieldcraft to acquire, track, and query a targeted individual any more?

This makes it very easy until the target goes Amish or Hindu Kush Government Exclusion Zone.

I'm going to be keeping the Z-10 for as long as possible.
I have 4 more replacement batteries in reserve.
Otterbox Defender has been doing its job.

I know that it is off when a Bing or Google search puts me in the wrong State for last reported location.
Duck Duck go is an option.

Is Ubuntu for smartphones gaining any traction?
How about a flavor of BSD for ARM chips?

----------
Preparing to go Hunting.
Enapa
Posts: 1555
Incept: 2008-01-25

Report This As A Bad Post Add To Your Ignored User List
Does having location set to off eliminate some or all of this? I have google play sideloaded on my z30, but I have location off. So when I use the maps it asks for my location and I just hit ignore then type in the city im in and the location I want to go to. Then I memorize the route and close the app.
Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
Those traces I captured were with location off!

----------
Winding it down.
Enapa
Posts: 1555
Incept: 2008-01-25

Report This As A Bad Post Add To Your Ignored User List
Jesus christ.... this truly is a nightmare. We are ****ed. And nobody around me seems to care and calls me paranoid when I talk about articles like this one. It is seriously depressing. Probably partly why I woke up at 5am on a sunday after waking up at 3am yesterday.
Nevertoolate
Posts: 1322
Incept: 2007-08-26
A True American Patriot!
San Antonio de Bexar de runover with illegals, Texas
Report This As A Bad Post Add To Your Ignored User List
Wow! The first time terrorists do what KD suggested, I can see s lawsuit. But of course you agreed in the TOS to let this happen. Really? How about criminal negligence *******s. Perhaps the a solution is a prepaid phone that you don't do anything else on and then have another phone that you turn on and off when you want something specific. I have a friend that has what he calls his "uber" phone so that they don't access to anything else. He refills it with a prepaid credit card. Alot of trouble, but most things worth having are. LIKE ONES PRIVACY

----------

Democracy is a conversation between 2 wolves & a sheep discussing what's for dinner. A Constitutional Republic is found when the sheep pulls out a gun & makes clear that his 2nd Amendment Right will be exercised should the wolves attempt to hold such a "vote."-KD 9-29-15
Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
Quote:
I have a friend that has what he calls his "uber" phone so that they don't access to anything else. He refills it with a prepaid credit card. Alot of trouble, but most things worth having are. LIKE ONES PRIVACY

Worthless if he has turned it on, even once, in his HOUSE.

That's the problem, in short -- you can buy a "burner phone" but within minutes of using it you're tagged again, and the data sets are merged. You just wasted your time and money, and what's worse, you THINK you have some degree of protection when you don't.

----------
Winding it down.
Wa9jml
Posts: 12
Incept: 2017-04-29

DeKalb, Illinois
Report This As A Bad Post Add To Your Ignored User List
When I was using my Blackberry Bold 9650, and had Yahoo e-mail installed on it (it defaulted to that and was hard to get around), I noticed that whenever I made a calendar entry it was sent somewhere. So, I got rid of Yahoo e-mail, and it stopped doing that. For this reason, I use a bare minimum of apps, and keep the wifi shut off on the new Classic.
Nevertoolate
Posts: 1322
Incept: 2007-08-26
A True American Patriot!
San Antonio de Bexar de runover with illegals, Texas
Report This As A Bad Post Add To Your Ignored User List
Not sure, but I will find out. He only uses it to my knowledge when he travels to the east/west coast for business and otherwise keeps it off. My question is if he only uses it for uber away from where he lives isn't the only way to "trace" it back to him is if they can id him from "how" the prepaid card is refilled? If that's true we are really, really, screwed worse than I thought.

----------

Democracy is a conversation between 2 wolves & a sheep discussing what's for dinner. A Constitutional Republic is found when the sheep pulls out a gun & makes clear that his 2nd Amendment Right will be exercised should the wolves attempt to hold such a "vote."-KD 9-29-15
Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
He need only have it on one time when any other device similarly "bound" to him is also on and in his possession, and he's ****ed.

It is almost impossible to actually segregate yourself in this fashion and keep it solid, and there is nothing worse than thinking you have when you have not.

----------
Winding it down.
Elkad
Posts: 289
Incept: 2009-09-04

Report This As A Bad Post Add To Your Ignored User List
Embedded non-removeable apps. Verizon and Samsung stuff for me. Microsoft got in trouble for that, seems the same thing could happen to VZ. I'm mighty tired of the bundled IR blaster app on my phone trying to get me to watch American Idol every time I reboot and forget to force-stop it again.

Can I VPN at the root, so EVERYTHING has to go out over it?
Then I could at least squash the more egregious stuff at my home router.

And what happens if Google Maps - or even an app I've electively loaded - can't reach it's own servers on connected WiFi because my router is blocking it? Does it try cellular data instead?

I'm a bit iffy on completely disabling location services in the background without very granular control, because I use location-based reminders quite a lot. "OK Google. When I get to the office, remind me to load plenum cable." But Google knowing my location leads to annoyances other places.

Anecdote: Last week I had a job at a Chipotle in a strip mall. Arrived early, so I ate lunch there (first time, wasn't impressed - it's a Subway for burritos. Guac was good though.). Still early, so I went back to the truck for a half-hour. Swapped my spare battery into my phone while I waited. So now I'm on a clean boot, haven't run Waze or Maps or anything else that should need my location. Location services on though.

Went back in to do the job. I made a couple trips in and out fetching tools, ladders, etc. My phone beeped and booped constantly with Google wanting me to review each and every one of the dozen businesses in that strip. It started with Chipotle, but as I swiped them away, it kept trying businesses farther and farther from my location to get me to interact with it or something.

Then I had to walk to the sprinkler room at the other end of the building (chasing a missing dialtone for a fire alarm). It went through the whole list of shops a second time fishing for reviews.

Annoying. And I've NEVER reviewed a business in the 2.5 years I've had this phone, or the 5 years I've been on this android/google account, you'd think it would give up by now.
Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
Quote:
Can I VPN at the root, so EVERYTHING has to go out over it?
Then I could at least squash the more egregious stuff at my home router.

Yes, for the most part, and I have that set up using StrongSwan (which has source available, so you can check and make sure it isn't "phoning home to mommy" with this or that.)

However, doing so really doesn't help all that much UNLESS you know and map all the places it tries to talk to so you can block them. It's not a trivial task. Advertising blocks (e.g. via a split DNS system) are fairly easy but some of what I've found is hard-coded. Now that means it's also subject to packet filters, but keeping on top of this is a **** TON of work.

Leaving a VPN nailed on your phone can also have two other bad effects - it may disable MMS entirely (it frequently does because then the MMS appears to come from other-than-inside the telcos network, and to prevent spam they block that) and in addition it ALWAYS has a VERY nasty effect on battery life (encryption is not "free" in terms of power consumption by any means!)

----------
Winding it down.

Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
Oh, you'll also be "pleased" to know that many networks will, at least some of the time, block frags. This will prevent an IPSEC VPN connection from coming up on a reliable basis because the keying requires packets that exceed the common MTU of the links used, and thus if frags cannot get through it won't negotiate.

This is a new one that I just started seeing with T-Mobile and is especially annoying -- it may be intentional or accidental, but it is definitely happening. That it OCCASIONALLY goes through implies it's not intentional, however.

Many "hostile" (e.g. open) WiFi access points are ALSO configured to drop frags (on purpose) which is VERY hostile as it prevents using a VPN through them.

----------
Winding it down.

Gable
Posts: 719
Incept: 2009-07-04

Retired in NC Mountains
Report This As A Bad Post Add To Your Ignored User List
Thanks to articles like this I have not moved to a smart phone. I still use the old flip phone. I understand I am unique because I am an old geezer that stays home most of the time and I have access to a computer in my workshop. I use a Garmen for navigation.

If I was 30 something and working I would have one of the Blackberries Karl has reviewed.

----------
In all of history, no government became more honest, less corrupt, or respected its citizens' rights more as it grew in size. E.L. 2016
Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
Quote:
If I was 30 something and working I would have one of the Blackberries Karl has reviewed.

Which doesn't do a thing if the company that builds the phone puts in place systems that prevent you from stopping apps (and the firm itself!) from collecting data on you.

----------
Winding it down.
Flappingeagle
Posts: 2621
Incept: 2011-04-14

Report This As A Bad Post Add To Your Ignored User List
I use a Star Trek communicator, commonly known as a flip phone. Does that protect me from any of this? I don't have any apps installed, just text and voice.

Honestly, I do not know because I've never taken the time to research smart phones much less dumb ones like the one I use.

Flap

----------
Here are my predictions for everyone to see:
S&P 500 at 320, DOW at 2200, Gold $300/oz, and Corn $2/bu.
No sign that housing, equities, or farmland are in a bubble- Yellen 11/14/13
Trying to leave the Rat Race to the rats...
Mtdm
Posts: 348
Incept: 2009-07-23

NH
Report This As A Bad Post Add To Your Ignored User List
One consideration regarding fragmentation & choice of MTUs ... many IPv6 transit providers block all use of Extension Headers.


Quote:
It is almost impossible to actually segregate yourself in this fashion and keep it solid

Yup. Requires very careful opsec, to the point where you're pretty much better off just going without any technology. IMO, not a bad option, but one which is incompatible with most folks' day jobs.
Village-idjit
Posts: 593
Incept: 2010-06-09

B'ham WA
Report This As A Bad Post Add To Your Ignored User List
Gable and Flap... ditto with me, just an old LG Flipper, great phone capability and I do texts once in a while but that is all.

I guess my biggest question is why we/me/all of us must stay in constant communication with the outside world???

I am old enough to remember rotary dial phones, and having only a home telephone. If a person wasn't home to pick up the receiver, you left a message or tried to call back later. Are all phone calls today of some sort of emergency nature? How about more privacy and less of a barrage of outside information, interruptions and communications?

Shut the damn thing off. Leave it at home when you go out for a dinner or movie. Leave it off when you travel except to "check in" once in a while for anything important. No need for Google etc to know where you are all the time. Leave it off while hiking, fishing, hunting, or whatever. If my wife doesn't need me for anything, I leave the phone at home for all local in town travel and my cell phone (Electronic Ankle Bracelet) tells the powers that may be interested that I am merely at home. Spoof Google and anyone who gets data from you... give your smartphone to your wife when she is shopping, or visiting friends, have her leave it in the car. Keep hers at home for you. There are all kinds of intelligent ways to overwhelm Google etc with irrelevant data.

Best thing though... leave it off or home and go out and enjoy life!
Tsherry
Posts: 852
Incept: 2008-12-09

Spokane WA
Report This As A Bad Post Add To Your Ignored User List
Karl--Was the Passport 'better' in terms of all of this info feedback? (I miss mine...)

Tom
Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
Yes, but "better" is relative.

----------
Winding it down.
Malaclypse
Posts: 11
Incept: 2016-05-07

Report This As A Bad Post Add To Your Ignored User List
Quote:
Are all phone calls today of some sort of emergency nature?
In my experience it's not the phone call, maybe the text. But I think it's the notification of somebody quoting you or liking something you posted. Validation, dopamine, something else. And the constant access to internet and distraction from what is actually around you.
Handyone55
Posts: 119
Incept: 2010-07-06

Report This As A Bad Post Add To Your Ignored User List
In 2000 I worked for a security company and carried a pager. The pager was a simple device that just gave me a number to call. Are pagers still available? If available, could you team this with a prepaid cell phone changed frequently? Would this be more secure?

Please understand I have zero computer and phone knowledge. This is just a question.


Tickerguy
Posts: 149209
Incept: 2007-06-26
A True American Patriot!
Report This As A Bad Post Add To Your Ignored User List
Not if you wish to use any sort of mobile data device.

----------
Winding it down.
Dasman
Posts: 80
Incept: 2010-06-27

Lawrence, KS
Report This As A Bad Post Add To Your Ignored User List
I have made this statement to a number of folks... ever since the Snowden revelations...

"Data mining and collection of everything an individual does has reached a sufficient enough level... that if you unplugged... ceased interacting with any of your cohorts... and wrote an anonymous piece of content and posted it anonymously online... the hoover vacuum that is NSA/Intel could take that piece of writing... crunch it with some algos and correlation, and probably isolate the author of said piece down to the low single digits of accuracy.

They can likely narrow that content down to you and 2 or 3 other individuals."

I'll admit... when I first said that... I was pulling it out of my a**. But, I felt pretty confident in it's probability. Now... I can say it is likely a near 100% certainty... the only non-trivial problem being if someone has interacted electronically VERY little... which is VERY VERY few adults in America, and most of the rest of the 1st and 2nd, and much of the 3rd world now.

Orwell clearly warned us... and we have waltzed right in, cheek to cheek with our slave masters.

I am reminded of the Kate Bush song, "Heads, we're dancing", and her explanation of that song publicly. When we live like "rubes", we are in a fair way to dance with great evil... and be unaware... or worse... indifferent.

Indifferent... THAT'S what makes me so nuts about the present American polity.

smiley



smiley
Dennisglover
Posts: 686
Incept: 2012-12-05

Huntsville, AL
Report This As A Bad Post Add To Your Ignored User List
Dasman, the book 1984 was mighty frightening when I read it in 1967 or '68. The year1984 was more frightening when it came around. The year 2000 was, in many ways, even more frightening, with its offer of Soviet-era nuclear launch sequences happening because the computers monitoring their invocation and release were "gibberish" to those computers, even while I worked 100% of my load to patch the things we "thought" might be problems.

Now I don't know who to trust, or how to trust anyone, especially in my nation's government, and how messed up is that? I just listened to the Kate Bush song, and don't have to wonder too much if it's 1939 (or something else) to which she refers in the first stanza.

Dasman wrote..
or worse... indifferent
And there's the rub. As many have remarked, hatred is not the opposite of love, but indifference is. Is this the marking-stone of our failure? I think that maybe it is... for I do think that I give a damn. I surely hope that I do.

----------
TANSTAAFL
Login Register Top Blog Top Blog Topics FAQ
Showing Page 1 of 2  First12Last