I've read the links carefully. Some of it was known to me, a lot of it was not, but also some of it I am aware very well about and know as a fact that this has nothing to do with "spying", but can see how such calls to what is being called as "3rd party websites" can appear nefarious to people outside of the ad tech industry (yes, most of the 3rd party calls have to do with advertising, of course).
I can say several things so far on the matter.3. So the important conclusion is that there is control being leveraged at corporations big and small and there are a lot of gains in this territory. Therefore, messages on problems with privacy online should be more nuanced if they are to reflect reality.
And definitely Will is not alone in his views. Yours truly had held exactly same views in the past. But, provided new evidence, I have since revised them considerably.
On Fri, Jun 17, 2016 at 7:37 AM, Ralf Mardorf <ralf.mardorf@xxxxxxxxxxxxx> wrote:
On Fri, 17 Jun 2016 09:21:23 +1200, worik wrote:
>Facebook do not now ... where I live
You fake your IP before you visit facebook? However, you are using
facebook with faked data only? You are writing with other people about
something, that has nothing to do with your interests? If so, then your
interest is to fake a life and facebook knows what life you fake. As an
employee I take a look what superiors are doing. Some already were
pissed off, imputed that I hacked their accounts, but actually I'm
even not subscribed to facebook and things like this and I never
hacked anything. Many people are simply to stupid to know what they made
public for everybody.
A list of servers in mail headers + a service such as
https://www.denic.de/en/service/whois-service/ could provide useful
data.
Even if you are using tor, you aren't safe. You e.g. visit facebook by
tor and at the same time Ardour phones home, this doesn't help
facebook, but anybody else watching you. This and other pitfalls are
explained on the tor website and as Fons already pointed out, Schneier
is one of the most important sources.
Sometimes spying isn't done by complex algorithms and hacking accounts,
it's just reading public data and calculating that 1 + 1 is 2.
_______________________________________________
Linux-audio-user mailing list
Linux-audio-user@xxxxxxxxxxxxxxxxxxxx
http://lists.linuxaudio.org/listinfo/linux-audio-user
--
Louigi Verona
http://www.louigiverona.com/
http://www.louigiverona.com/
_______________________________________________ Linux-audio-user mailing list Linux-audio-user@xxxxxxxxxxxxxxxxxxxx http://lists.linuxaudio.org/listinfo/linux-audio-user