Skip to main content

Google's Secret Is Out

The secret is out!  Google and other email service providers track, store, and analyze your email.  They claim that the service is free, and they have every right to monitor and analyze your emails.  Yes?  When you do searches  or even read your email, you see on your screen promotions that not surprisingly address your personal concerns.   It goes even further, in that they maintain permanent records of your email.  This implies corporate secrets, family secrets, and even government secrets are available to third parties, and particularly those to whom they market such information.  It has even been discovered that IRS officials have been using these services for official work. 

Previously we reported on a number of high-level scandals involving the emails  of some officials and their various peccadilloes.  But now the range of activities seems to extend to e v e r y single person.

Example.  If I was the president of Corporation A and I wanted to know what the president of Corporation B is doing, and if a email address is known, this information can be purchased. 

Multiply this over  hundreds or thousands of special interests with a concern about their opponents.  Can foreign governments access the "ZitMail" records of persons or companies with whom they are involved?   The information is sitting on a server somewhere.  The scope of the  full implications are so  momentous it challenges the mind to grasp it.

For those of you familiar with regular postal mail, imagine if you will, that the US Postal Service regularly opened all your mail, copied it, and then analyzed and stored it in perpetuity. This includes letters from your banker, your mom, your business partners, and everybody else.   You would be incensed, not to mention shocked, not to mention outraged.  Yet, the outrage against these email services, while shocking to us all, seems to be hitting a soft landing.  We say, "Oh well, that's our new normal."

All of that said, your should encrypt your email if you really don't want it read.  Period!  You cannot escape through the anonymity of the massive scale of the totality of messages.  There are programs and servers capable of the analysis of this data that range far beyond the scope of your imagination.  For example, Google has a publically availabe Ngram code that has analyzed millions of books for work frequency counts.  See http://books.google.com/ngrams/.  

A rule of thumb is that if you don't want your message read, don't send it.  A former solution was to make the communiques by phone, but now this is even suspect.  In generations past, much serious communications was conducted only face-to-face in a secure location.  Those folks knew the risks of written information - translated now to e- and voice mail.  

The caveat to the rule of thumb above is encryption.  In a previous blog, I outlined how to do this - easily and for free.  See.
http://used-ideas-quickies.blogspot.com/2013/01/encryption-for-those-in-need.html
The code is written for relatively small emails of a few hundred words, but we can make it available to those needing greater capacity. 

Cloud computing.  All the rage these days is cloud computing, wherein you store your data in the "cloud" accessing from any computer anywhere you may be.  It is safe, it is secure.  Maybe.   But you can be assured everything you have in the "cloud" and you don't even know where that cloud is or who owns it, has been mined or is available for mining.  Cloud computing may protect your data from your neighbor, but your data is known nonetheless.

Comments

Popular posts from this blog

Behavioral Science and Problem-Solving

I.                                       I.                 Introduction.                Concerning our general behavior, it’s high about time we all had some understanding of how we operate on ourselves, and it is just as important how we are operated on by others. This is the wheelhouse of behavioral sciences. It is a vast subject. It touches our lives constantly. It’s influence is pervasive and can be so subtle we never notice it. Behavioral sciences profoundly affect our ability and success at problem-solving, from the elementary level to highly complex wicked problems. This is discussed in Section IV. We begin with the basics of behavioral sciences, Section II, and then through the lens of multiple categories and examples, Section III. II.     ...

The Lemming Instinct

  In certain vital domains, a pervasive mediocrity among practitioners can stifle genuine advancement. When the intellectual output of a field is predominantly average, it inevitably produces research of corresponding quality. Nevertheless, some of these ideas, by sheer chance or perhaps through effective dissemination, will inevitably gain traction. A significant number of scholars and researchers will gravitate towards these trends, contributing to and propagating further work along these established lines. Such a trajectory allows an initially flawed concept to ascend to the status of mainstream orthodoxy. However, over an extended period, these prevailing ideas invariably fail to withstand rigorous scrutiny; they are ultimately and conclusively disproven. The disheartening pattern then reveals itself: rather than genuine progress, an equally unvalidated or incorrect idea often supplants the discredited one, swiftly establishing its own dominance. This cycle perpetuates, ensurin...

Principles of Insufficiency and Sufficiency

   The principles we use but don't know it.  1.      Introduction . Every field, scientific or otherwise, rests on foundational principles—think buoyancy, behavior, or democracy. Here, we explore a unique subset: principles modified by "insufficiency" and "sufficiency." While you may never have heard of them, you use them often. These terms frame principles that blend theory, practicality, and aspiration, by offering distinct perspectives. Insufficiency often implies inaction unless justified, while sufficiency suggests something exists or must be done. We’ll examine key examples and introduce a new principle with potential significance. As a principle of principles of these is that something or some action is not done enough while others may be done too much. The first six (§2-6) of our principles are in the literature, and you can easily search them online. The others are relatively new, but fit the concepts in the real world. At times, these pri...