Consumer Privacy Alert. Verizon To Pre Install Spyware On Some Phones

If anyone thinks for a second that the only way that transactions of any sort made over the 'net or mobile phone networks require any direct access via the terminal device be it phone or computer then they are very much mistaken.
 

two types of access. the interception of the radio magnetic waves,

or data access through established data base

theres nothing new here. two ways to block

transmit in such a wide bandwidth and shorter time intervals that reception is not possible with snoopers equipment

use encryption techniques that require long computation time in determining the "primes" used in the binary code.
or unbreakable codes based on different code alphabets. these can also be entropy codes were the information is in the noise.

either way red flags go off and monitoring is started


which may be what the sender wants, especially if the tag it, by using known coding techniques of the other guys.

sort of I know, that you know, that they know,
 
if the political situation is stable it becomes a Nash equilibrium, or a tit for tat. which has been the case with the blame game in politics

Verizon stuff is pretty basic mostly designed for marketing.


If one doesn't have the "assets" to employ the above methods, the "dark net" is used to run it through so many servers it gets lost. a la Wikileaks
 
Verizon is going to pre install spyware on it's android smart phones. User history can be tracked. It's basically search history on home page.

https://www.secnews24.com/2017/03/3...p-on-its-android-phones-to-collect-user-data/

Welcome to the world of "no more reasonable expectation of privacy". Windows 10 users are being 'conditioned' to accept data snooping as the new normal, smartphones were actually a compromised platform some time ago.

Tor users will be presumed to be hiding their pedophilic tendencies.
 
This is a mapping technique and was used by Trump in his campaign. Any using the twitter feature was mapped into traffic location by locale. His planners could then concentrate their strategies and resources in this area. And since they had control of the questions, it also gave them the frequency.

I use the same tracking "activity" coming out of certain areas in the financial community and known residence in certain prime lending areas based on market activity and news releases to gain an edge in day trading.

criminal activités could be mapped also. although I doubt any specific group would have the man power to cover all the bases.
 
Tor is a Wikileaks type set up. The military and intel has their own server sets, they don't use TOR
 

Back
Top