My best friend owns a firearms store and uses Ring for security. Seen this happen first hand. While it is suitable for his purposes, the privacy implications for the average citizen are terrifying.
. . . As @agtonik runs to his compound and sends his employee into the prying public for supplies.
I mean if you use Occam’s Razor on the volatility of life in general one simple conclusion always comes to the top - nothing can happen if nobody knows you’re there
I use to hate iPhone but if you make an iCloud not linked to any personal information or apps like Facebook or instagram then it’s the best. When you send a text it goes over a network for example Verizon but if you communicate with other people with iMessage and feds got a warrant for texts from your service provider the messages to other people through iMessage or FaceTime audio doesn’t show up on your service providers list of text or calls you make. Not fail proof obviously Feds can get into any of that but if they’re just going to service providers looking for that stuff anything else over iMessage is safe and Apple even went to court trying to deny feds access because they pride themselves on security. When the guy in Texas was shooting up the place a few years back the fbi was in a court battle with Apple trying to retrieve his iMessage and others . Fortunately for that case they gave in but it was a pain in the ass none the less
Yeah but the smoking man isn’t really looking at those and reporting them to FB. Assume everything you’ve ever said is on file - all they’re waiting for is a “Hey look up this asshole” call to check your own personal database they’ve made about you. It’s all automatically parsed so I mean it’s not like someone is watching you. It’s a phone number, email address, gps coordinate, etc that they automatically cross reference with eachother to see trends. Forget facebook, they know the good shit.
Assume they are already in there, have been in there and have sent vacation postcards back to their family from your personal electronics otherwise… Don’t expect courts to save your privacy. If they want it bad enough all they do is just…don’t put it on paperwork. This is where my inner Rusty Shackleford really comes out because i’ve seen it happen. Or moreso the lack of ‘happening’ when something was most certainly happening if that makes any sense at all.
We have all resigned ourselves to live with bugs. If you don’t like it? Faraday cage your phone the second you get home. Fun to make. Either way, they know. Personal computers are the most secure thing you can use if you can handle them properly. Seems like privacy is a concern of yours. Learn how to use the Tails OS and how to properly use TOR, VPNs, cryptography, etc.
I’ve said it in other threads, I came up glued to a computer essentially (wooooo unixpunx!) and security was ALWAYS the main focus in everything we did. It was a good primer for life. Never trust your communications of anything sensitive unless you have a good hard look under the hood of that jalopy and understand how the engine putters at least minimally.
I think this is the single most misunderstood aspect of the Snowden / NSA / 5 Eyes spy program leaks. If anyone has watched the movie “Minority Report” they should know that is closer to real life than science fiction.
I honestly don’t know how people have a hard time understanding what a small chunk of a hard drive text can take up if not formatted.
I honestly assume they use an un-neutered version of Maltego (do they still call it that?) that can run big-boy transforms including socials, LLCs, license plates, etc to compile their data
Dont even worry about the data storage. Storage is cheap. Everything that connects to the internet is recorded by default, by design. Almost all the time we literally hit the “I accept” button so it’s hard to be mad lol. It’s about what happens with the data. You got a big pile of data, a blank check, and now in charge of parsing. Alright take every convicted murderer and compare their activities for the last 10 years. Thats everything they’ve eaten, seen, spoken, traveled to, movement activities (pacing, increased beating, heart rates). It would be trivial to detect a change in behavior in common with people that lead to X.
When you are sitting in front of the data, it’s really really hard not to squish it around and line it up and look for patterns and try to change them. This is just the stuff we know about.
I’ve worked in some military environments with various types of listening devices and devices to decipher cell and internet traffic. Whats available to see with some basic computer knowledge and the authority, is scary.