Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)qq
published in(发表于) 2015/6/8 8:47:28
Western Governments, six ways to monitor your: books,

Western Governments are monitoring your six methods: eBook-monitor-IT information

Did you read the tracking of suspects? You must be familiar to the show's iconic opening statement: "you are being watched. The Government has a secret system, there is a machine watching you all the time. I designed this machine's purpose is to detect terrorist activity, but it looks like everything ... ... "

That scene really just hypothetical TV? Or real? You're being watched all the time, please?

After the events of 911, monitoring efforts significantly increased in Western countries. Now you can see many cameras in the main streets and buildings, and armed police and soldiers were also at the airport, railway station, patrolling hot spots and other important public duty.

But monitoring the worst places on the Internet. At first glance this monitor seems to be useful, but once you dig what you know the essence of things is much more evil.

I am not saying that Internet bad guys, or we don't need security. But as long as you read the following content, you will know that the monitor has done so far.

Membership

You've been through countless times, when you shop in the store, the clerk asks do you have a store credit card.

Membership seems to look very good, accumulated a certain number of points you can exchange some commodities or at a discount. Your membership allows you to get free coffee at the supermarket or paper towels; Starbucks loyalty card lets you in full after a certain points can be exchanged for a free Cup of coffee.

Very good? What's wrong with these cards?

First, the supermarket will allow you to fill in an application form, get all of your information, and then sold the data to data agent. And your name, address, telephone number, date of birth, family status, and more information was leaking out. And then your purchase history to be recorded down and match them with your purchase information together. When you leave the supermarket doors, privacy and you say goodbye to you.

Consumer's file will then be collated and adjusted, and see you are attracted to those coupons. Food and beverage companies will obtain data from the supermarket, so that they can carry out their business. Which is why your mail, then all of a sudden the cause of a lot of spam.

And in fact, even if you destroy these membership, supermarkets can also be obtained from your bank card records your information looks really nowhere.

Labels on the eBook

Now, with the popularity of mobile devices, e-books have to a large extent replaced the role of paper books. Whether a dedicated eBook reader or a reading application on Smartphones, eBooks can give you convenient reading experience. Now the eBook is the most attention-getting capabilities can be convenient in reading the tags in the article. For example, Apple's iBooks app, you can mark your choice of content sent through the mail to your mobile phone for later reference.

But if these labels can still be viewed by others? Aidehua·sinuodeng said that Amazon's "information leaked like a sieve to the United States Government," If you believe what he says, you know your Kindle is not for you. You collected bomb-making of its contents? You may also be marked. The Quran did you tag, so believe me, you've been eyeing.

As for Apple, they think the NSA (United States National Security Agency), but according to the information disclosed in the guardian showed that NSA backdoor permission seems to have access to the iPhone.

Is it wants to return to the arms of the printed book?

Mail and Web search

Unless you enable stealth mode and do not login to your account, or your search will be recorded, including some very embarrassing searches. Over time, search engines keep track of your search preferences, and build your entire archive, what will they know what you like stars, those with chronic illnesses, have any special hobbies, often use Web sites, online shopping frequency and amount of ... ... Then you can see in your browser "push the directional" advertising.

In order to avoid tracking by search engines, you should turn on incognito mode, and do not login, try to use VPN (virtual private network).

In addition to your message. Now mail system has been able to provide you with a personalized experience based on its content, but the thought of his private communications have been scanned, think is creepy. In China, if you use the service provider of China's politically sensitive mail service to send mail, you may be "tea" to monitor's reach has touched your private communications. Scared yet?

Online advertising

How often do you shop? When you search for something on Taobao items, why would on other sites to see what you have just looked at it? Do you think that is a coincidence?

Front has also been mentioned, as long as you select one of the services that are ad networks, you can in the other sites of the same Union see what you are interested in advertising or merchandise, entice your money from your wallet out.

What is solution? Is still the same, stealth mode, do not log on, delete the cookie on your browser.

RFID chips

RFID (radio frequency identification) applications are now more widely, from access control systems to bus passes. These services so your business take control of your situation.

And now RFID is used more and more widely, have even begun to implant and may soon, people's movements will be completely unable to hide it.

TV and music

Don't think that Governments and businesses on what TV shows do you watch, not interested in listening to music.

For businesses, this is part of your personal profile, to know your hobbies can push more tailored ads, and squeeze more money out of your wallet.

For the Government, when you visit against the Government or society website, you become a potential threat, and if you listen to the song is advocating outdated rhetoric. So you may have noticed.

How to avoid it?

Using VPN is a proper method, so you can disguise your login information, but it is not foolproof. To be absolutely safe, use only traditional television and radio. I'm sorry? You do not know what is on the radio? You must be pretty young.

This is not a far-fetched

You might think that this was rather exaggerated, even if Governments and businesses do have access to this information, they do not have so many people to check. Indeed, manual review costs are too high, but with the arrival of machine intelligence, your data will be archiving machines, processing, where suspicious will be elected and monitored from the local began to extend into every aspect of your life.

Your data may be sold, your information may be stolen, harassing phone calls you may somehow bothered, and you knew who you were frauds.

Your data is more valuable than you think.












If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759