mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
Fixed typos and broken link
This commit is contained in:
parent
6eb68f0270
commit
dcf265743e
38 changed files with 88 additions and 88 deletions
|
@ -89,7 +89,7 @@
|
|||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<h2><b>The Enemy of Privacy is Surveillance</b></h2> </br> </br>
|
||||
<p>Make no mistake, as we discussed <a href="../govfear/index.html">previously</a>, governments NEED surveillance to be able to fulfill the first condition to be able to enforce their laws: <img src="../su2.png"><b>They need to know what happened.</b> To be able to know what happened, <b>they need surveillance to be implemented wherever they can</b>, and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. </p>
|
||||
<p>Make no mistake, as we discussed <a href="../govfear/index.html">previously</a>, governments NEED surveillance to be able to fulfil the first condition to be able to enforce their laws: <img src="../su2.png"><b>They need to know what happened.</b> To be able to know what happened, <b>they need surveillance to be implemented wherever they can</b>, and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. </p>
|
||||
<p>Yes, ANY company can act on any government's behalf. Take for example Microsoft spying on everyone through their <a href="../closedsource/index.html">closed source</a> software Windows 10, or Apple spying on their users through their MacOS closed-source software, The US government is very open about it (see <a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">FISA 702</a>).</p>
|
||||
<p>In this current world we live in, Surveillance is nearly omnipresent, where there is a business involved, and especially closed-source software, Surveillance is right there.</p>
|
||||
<img src="../opsec/4.png" class="imgRz">
|
||||
|
@ -97,7 +97,7 @@
|
|||
<ol>
|
||||
<li><p>Microsoft (because Bob uses Windows)</p></li>
|
||||
<li><p>Google (because he uses Google and Google Chrome)</p></li>
|
||||
<li><p>Bob's ISP (because he doesnt use a VPN nor Tor)</p></li>
|
||||
<li><p>Bob's ISP (because he doesn't use a VPN nor Tor)</p></li>
|
||||
</ol>
|
||||
<p>If Bob were to do something sketchy using his computer, <b>Law Enforcement would obtain all the information they need to know what Bob did, because he used Windows, Google Chrome, and no VPN/Anonymization network</b>.</p>
|
||||
<p>And it does not stop there, even when LE is not involved, <b>politicians can also request and pay to get private user data</b>, at the discretion of those large companies that specialize on infringing upon users' privacy for their own profit <a href="https://en.wikipedia.org/wiki/Facebook%E2%80%93Cambridge_Analytica_data_scandal">(see the cambridge analytica scandal)</a>.</p>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue