Skip to content

Instantly share code, notes, and snippets.

@markroxor
Last active September 4, 2019 09:57
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save markroxor/e693664baac2f28e3c6cdd47db234add to your computer and use it in GitHub Desktop.
Save markroxor/e693664baac2f28e3c6cdd47db234add to your computer and use it in GitHub Desktop.

Privacy.

Quis custodiet ipsos custodes?

Why should I care? I am clean.

Imagine what would happen if any of the following scenarios are breached.

  • Are you aware that a regular person possess at least three devices with him which can be used for
    conducting survellience on him?

  • Are you okay with being watched and listened to all the time by an unknown person? It is proven that psychologically
    people act different when they know that they are being watched regardless of whether they are doing anything out of the ordinary or not.

  • You may not be a fugtive, convict, or a transgressor but it just takes one bad day to fall prey to the mischiefs of life, inadvertantly people commit transgressive acts all the time.

    • In Australia you cannot possess more than 50KG potato at any
      given moment.
    • In India, according to The Aircraft Act of 1934, kites and balloons come under the definition of Aircraft. So legally, you need a license to fly kites.
  • The private conversations you have with your family that you don't want anyone to know going public.

  • You most intimate moments.

  • The Japanese say you have three faces. The first face, you show to the world. The second face, you show to your close friends, and your family. The third face, you never show anyone. It is the truest reflection of who you are.

How the big four are churning data.

enter image description here The big four - Google, Amazon, Facebook, Apple

NO FREE LUNCH

  • For all the free services you readily savor, have you ever wondered why tech giants spend millions (sometimes billions) to get these services to you without charging a penny? None of them are running a charity for sure.
  • As a regular non-tech user you might have never heard about a service for which Google charges to it's users, then what makes it one of the big four tech giants on the planet?
    • Some of us might already know an answer to this, the answer is - Ads.
    • Google's adsense is one of the prime source of generating revenue, the ads you see when you search for your favorite brand of perfume, the ad you watch on the 'free' video sharing platform - YouTube, the ad you see in you gmail, etc. They all generate revenue for Google. Companies pay Google to promote their products.
    • but what about all the apps by Google which do not show any Ads.
    • What about Google Photos which allow me to store GBs of images for 'free'?
    • What about Google Keep which let's me take notes on the go, notes which might involve all the vicissitudes of life I deal with.
    • What about Google Calender, docs, sheets, forms, slides, hangouts? Heck what about my updated Android OS?
    • All these 'free' apps/os are used by Google to either establish market monopoly or for collecting data from users or most probably - for both.

PASSWORDS

  • How many passwords will you remember?
  • Compromised passwords.

NOTES

  1. Whatever goes on the internet (even for a fraction of second) stays there forvever, perhaps not in plainsight but
    definitely out there somewhere.
  2. Million years ago manking would leave there footprints everywhere they went, in 21st century you might not
    leave footprints everywhere in the same conventional way like the cave man did but the modern footprints are the by-product of the technology we use. From willingly posting that picture of yours on social media to getting captured by the camera at the end of the street. Leaving footprints behind is once again not your choice anymore.
  3. How many of us actually accept the permissions asked by our Android applications wisely? Have you ever wondered why a note-taking app would require your location access or the accessto your phone camera.
  4. Laptop/Macs have lights which turn on when the camera is in use but what about your iPhone/Android smartphone?
  5. What about the microphone that can always be listening from your laptop or from your phone?
  6. What about the seemingly innocuous apps that seem to ask permission for what they actually are meant to do but still indulge in selling the collected data to third party without your explicit authorization. Perhaps an sms organiser that seem to need read and send permission for all the messages you receive.
  7. With the technological era kicking in even our refridgerators are able to connect to the internet, with such a huge intertwined network of devices which connect to internet, how can you be sure that all your personal data is privately stored and cannot be intercepted by any unauthorised person/party?
  8. You don't need a mentalist to get inside someone's head, today all you need is a hacker who for little money can literally create a virtual replica of the victim and can politely ask for all the information he wants. Long gone are the days of extorting information.
  9. https://twitter.com/iamdylancurran/status/977559925680467968?s=08


11. TARGET - how it uses your info to personalise. 12. SMS apps, salary. Expenses. 13. CRED. 14. Illusion of privacy. 15. My reading list, tweets, the way I type - these all can be used for cracking my passwords. Be at the top of the food chain.

Solutions in hand

  • open-sourcing is >> proprietary encryption.
  • Either we can find a solution to all the privacy issues listed above, which equals increased freedom and of course increased privacy for a common man and a criminal alike or we can try and exploit these holes ourselves to track criminals. Our call.
  • Be a Robin Hood or be Harvey Weinstien?
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment