'This isn’t supposition, or assumption, or even an opinion. It’s a fact.
If you have the minimum of a standard smartphone and/or leave your house at any time, what you say, what you type, what you do, is being listened to, recorded, monitored, and analyzed by software, technology, people, or all of the above. Cameras in the phone, virtual assistants, GPS (Global Positioning System) tracking, traffic cameras, store cameras, other people’s phones, cameras and recording devices, dash cams, body cams, and even satellite and drone cameras, all watch, listen, and monitor what we do. And that’s just the tip of the iceberg.
Electronic anything is monitored and recorded. Every keystroke on a phone, every letter and number on a tablet, every ad clicked on a laptop or notebook, every site visited on any computer device, every subject entered on every single search engine ever created, is logged and held forever waiting for someone to request that information. Or to hack it. Even DuckDuckGo (which has been quietly added as a search engine option for Google).
If you haven’t already been alerted, let me do so now: Welcome to the end of the Information Age, or what Brian Bi, a former software engineer at Google, calls “the Age of Reckoning”.
First, let’s go back to 1822 when Charles Babbage began developing the first automatic computing machine, and by 1837 proposed what was to be the concept of the first general-purpose computer but it was Charles’ son, Henry Babbage, who was later able to complete a part of his father’s ideas by making a machine that could perform basic calculations. The first programmable computer was created in Germany during the 1930s by German engineer Konrad Zuse, who went on to later construct the first digital computer. Some thirty years later, computer hackers came on the scene.
These hackers were rumored to be MIT students who were curious about the massive machines locked behind glass in temperature-controlled rooms, and the hacks themselves were more like shortcuts, like life hacks, that helped complete computer programming tasks more quickly. One of those hacks actually went on to become UNIX (originally UNICS), a computer operating system. But most hacks weren’t for the betterment of anything, and as the use of computers became more popular, so did hacking.'
Read more: “Every Keystroke on Every Device Is LOGGED Somewhere”: The Unsettling Truth About the Internet
Did you like this article?
Thank you for your vote!
3 February 2020
Revealed: Big Brother facial recognition cameras are watching you more than ever - being used by ten police forces, councils and hundreds of shops across Britain
29 January 2020
University of Missouri Students Will Now Be Required to Install Location Tracking App
From our advertisers
23 hours ago
‘We should talk war crimes & killing civilians, not US espionage claims in this court’ – WikiLeaks head Kristinn Hrafnsson
From our advertisers