Fixed typos and broken link

This commit is contained in:
Zesc 2024-08-24 16:01:33 +02:00
parent 6eb68f0270
commit dcf265743e
38 changed files with 88 additions and 88 deletions

View file

@ -89,7 +89,7 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>The Enemy of Privacy is Surveillance</b></h2> </br> </br>
<p>Make no mistake, as we discussed <a href="../govfear/index.html">previously</a>, governments NEED surveillance to be able to fulfill the first condition to be able to enforce their laws: <img src="../su2.png"><b>They need to know what happened.</b> To be able to know what happened, <b>they need surveillance to be implemented wherever they can</b>, and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. </p>
<p>Make no mistake, as we discussed <a href="../govfear/index.html">previously</a>, governments NEED surveillance to be able to fulfil the first condition to be able to enforce their laws: <img src="../su2.png"><b>They need to know what happened.</b> To be able to know what happened, <b>they need surveillance to be implemented wherever they can</b>, and it is definitely easy for them to force large businesses providing large centralised services to act on their behalf. </p>
<p>Yes, ANY company can act on any government's behalf. Take for example Microsoft spying on everyone through their <a href="../closedsource/index.html">closed source</a> software Windows 10, or Apple spying on their users through their MacOS closed-source software, The US government is very open about it (see <a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">FISA 702</a>).</p>
<p>In this current world we live in, Surveillance is nearly omnipresent, where there is a business involved, and especially closed-source software, Surveillance is right there.</p>
<img src="../opsec/4.png" class="imgRz">
@ -97,7 +97,7 @@
<ol>
<li><p>Microsoft (because Bob uses Windows)</p></li>
<li><p>Google (because he uses Google and Google Chrome)</p></li>
<li><p>Bob's ISP (because he doesnt use a VPN nor Tor)</p></li>
<li><p>Bob's ISP (because he doesn't use a VPN nor Tor)</p></li>
</ol>
<p>If Bob were to do something sketchy using his computer, <b>Law Enforcement would obtain all the information they need to know what Bob did, because he used Windows, Google Chrome, and no VPN/Anonymization network</b>.</p>
<p>And it does not stop there, even when LE is not involved, <b>politicians can also request and pay to get private user data</b>, at the discretion of those large companies that specialize on infringing upon users' privacy for their own profit <a href="https://en.wikipedia.org/wiki/Facebook%E2%80%93Cambridge_Analytica_data_scandal">(see the cambridge analytica scandal)</a>.</p>