Browsing Histories Metadata Explorations
- Vous devez vous identifier ou créer un compte pour écrire des commentaires
https://labs.rs/en/browsing-histories/
Share Lab : Research & Data Investigation Lab
THIS IS TERRIFYING.
Seriously: it's articles like this that make me amazed that anybody could feel evenly slightly apathetic towards online privacy. Thank you for sharing.
>THIS IS TERRIFYING.
It really is not. Mr J. is either a computer illiterate or someone who A) gives 0 fu.ks about privacy B) has no idea about the state of the world/Internet. Hadn't mr J used a mountain of privacy nightmare 'tools' such as faceshit and google services while learning about cookies, adblockers, tracker killers (it really isn't rocket science provided one cares in the first place) very little info would have been collected about him.
Hence, to me, it really is not terrifying but natural.. Unfortunately the layman on the Internet is bound to be raped by profiteers over and over again. It's not really shocking or terrifying, it's a given. We know it. It's the new oil.
Fortunately though the article gets much more interesting and smart as you plunge into the second half of it, the brief historical analysis and the comparison with modern monsters (think xkeyscore).
One sentence in particular is a very powerful and meaningful one:
He may be an extremist in the making, sickened by crimes committed in the name of democracy stripped of any meaning in a relentless pursuit of profit.
I agree Tramp, what stikes me is the "patern", which explaines as to why the NSA CIA and all "others" have collected vast amounts of metadata
Something recognised as an anomaly in the eye of the algorithm can put you on the watchlist of a government agency or some behavioral pattern can label you as a target for an online advertisement
Somewhat outdated, nevertheless quite instructive
This document seeks to provide the means to protect your right to privacy, freedom of speech, and anonymous net access even under the most draconian of conditions - including, but not limited to, both private and criminal investigation (which happens far more often to innocent people than one might like to think). "So what are you saying? That I can dodge bullets?" "No.. What I am trying to tell you is that when you're ready, you won't have to."
(Network Atributes)Network Forensics Evasion: How to Exit the Matrix :
http://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/
http://billstclair.com/matrix/index.html
I know how to take precautions for my privacy. Yet, privacy should be by default. Not only for "computer literates".
Yet, privacy should be by default. Not only for "computer literates". I can only agree !
A right to privacy is explicitly stated under Article 12 of the Universal Declaration of Human Rights:
“No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.”
https://en.wikipedia.org/wiki/Right_to_privacy
I agree with you mr Magique but unfortunately this is not the case and will never be, I guess. On the contrary, I reckon, as the malpractices get more invasive, the level of knowledge required to protect one's privacy will only get higher - it will get more and more difficult.
This is why embedding the best practices and the highest level of protection **by default** within privacy tools is the best thing developers can and should do these days.
I am thinking for instance about ricochet, the instant messenger (nobody uses, sadly) - it is set so the user doesn't have to change any setting at all in order to get the max out of it, while at the same time being extremely easy to use.
Mangy - Yes, the pattern analysis is very interesting indeed. You collect enough pattern, based on human habit and regularities, and you will not only be able to predict behavior but also automatically spot the irregularities. Quite scary indeed.
How did they do that?
Oh, this is how, it seems: https://labs.rs/en/metadata/
so that means they had access to email accounts in the first place? Assuming my latter sentence is true, there would be already a lot of data at hand.
But what's impressive is how much more they can get by their method, which I don't fully get yet.
I'm interested in trying that on my own email account.
EDIT: I don't use social media at all anymore (for now), so this will be harder to do in my case.
- Vous devez vous identifier ou créer un compte pour écrire des commentaires