Skip to main content

Have You Any Privacy Any More?


On the Google engine for snooping on Chinese citizens linking Internet use to cell phone numbers.  Perhaps now, per the Google CEO on December 11, 2018, this engine may or may not be delivered to the Chinese government.  So what!

Do we not realize this engine, now apparently created, can be marketed to anyone, any country, any company, any agency, any party, any billionaire, with only few simple tweeks (aka adjustments)? 

Its very existence is not unlike a nuclear bomb.  If deployed, it could destroy millions of lives, level groups and companies, ruin governments, and decimate universities. 

China may have been a mere foil for Google to develop such a tool it could itself use – or sell. Do they not already sell customized versions of their search engine to private companies? Yes.  Do they not already sell search data to private merchants or politicians?  Yes.

Forget China.  For the power players of the world, let the bidding begin...

Logic.  Nonsense you say.  I get so much from Google for free.  I get gmail and search abilities for free.  Fantastic.  I just need to endure a bunch of ads, which I happily ignore.  YET, Google is nearly a trillion dollar company, nearly the richest company on the planet.  All that money comes from something, from somewhere, and in some way.  It is from information and contracts to provide it.
------------------

Hacking. Atop all this, maybe you believe to be a minor inconvenience, we still have massive hacking.  They say the only companies not hacked are those who simply don’t know they have been hacked. 
And who is to blame?  

Example. Marriott Intl recently admitted they were hacked to the tune of 500 million customers. They are so sorry.  Bull.  They have (financially) shorted their computer security so long and so pervasively, they were virtually a sitting duck, almost willing to be shot.  And who did it?  The Chinese experts hackers got this information. They do sell it.*  And who does the US blame?  The Chinese of course. They are blamed for their expertise at shooting fish in a barrel. Now Marriott is safe, blameless, having no information left to steal.  Secretly, Marriott incompetence is to blame.  


In summary, (1) you render your information willingly, (2) large corporations collect your information via phones and computers and more, (3) your information is hacked by third parties. 

It seems all the privacy you got left is stashed in a sock in the back of your closet.

* How do I know?  Recently charges were made to Marriott on one of my credit cards, happily one I rarely use and only for hotel expenses.  In this case, I had cancelled the card months before the charge. Recommend you report every credit card you have lost each and every year. Get a new one.

Comments

Popular posts from this blog

Behavioral Science and Problem-Solving

I.                                       I.                 Introduction.                Concerning our general behavior, it’s high about time we all had some understanding of how we operate on ourselves, and it is just as important how we are operated on by others. This is the wheelhouse of behavioral sciences. It is a vast subject. It touches our lives constantly. It’s influence is pervasive and can be so subtle we never notice it. Behavioral sciences profoundly affect our ability and success at problem-solving, from the elementary level to highly complex wicked problems. This is discussed in Section IV. We begin with the basics of behavioral sciences, Section II, and then through the lens of multiple categories and examples, Section III. II.     ...

Principles of Insufficiency and Sufficiency

   The principles we use but don't know it.  1.      Introduction . Every field, scientific or otherwise, rests on foundational principles—think buoyancy, behavior, or democracy. Here, we explore a unique subset: principles modified by "insufficiency" and "sufficiency." While you may never have heard of them, you use them often. These terms frame principles that blend theory, practicality, and aspiration, by offering distinct perspectives. Insufficiency often implies inaction unless justified, while sufficiency suggests something exists or must be done. We’ll examine key examples and introduce a new principle with potential significance. As a principle of principles of these is that something or some action is not done enough while others may be done too much. The first six (§2-6) of our principles are in the literature, and you can easily search them online. The others are relatively new, but fit the concepts in the real world. At times, these pri...

The Lemming Instinct

  In certain vital domains, a pervasive mediocrity among practitioners can stifle genuine advancement. When the intellectual output of a field is predominantly average, it inevitably produces research of corresponding quality. Nevertheless, some of these ideas, by sheer chance or perhaps through effective dissemination, will inevitably gain traction. A significant number of scholars and researchers will gravitate towards these trends, contributing to and propagating further work along these established lines. Such a trajectory allows an initially flawed concept to ascend to the status of mainstream orthodoxy. However, over an extended period, these prevailing ideas invariably fail to withstand rigorous scrutiny; they are ultimately and conclusively disproven. The disheartening pattern then reveals itself: rather than genuine progress, an equally unvalidated or incorrect idea often supplants the discredited one, swiftly establishing its own dominance. This cycle perpetuates, ensurin...