The worldwide revolt against OTT espionage

The worldwide revolt against OTT espionage

Stop being spied on. ComputArte copyright

Roma 31 August 2014

The world revolt against OTT espionage is underway in China, in Russia, in India, in Brazil and other sovereign states that no longer accept this system.

The thing that is anomalous, it is the "strange" almost inaudible hum in Europe and the absolute uncritical silence that reigns in our village ( for the grave fault of those who governed us and those who do not choose to honor the principles that are the basis of our Democracy!!!).

China bans the purchase of Apple products ( Ipad e MacBook ) to government officials, lest they be HAPPY ( news source on EDP Line http://www.lineaedp.it/news/13232/sicurezza-nazionale-il-governo-cinese-vieta-lacquisto-di-ipad-e-macbook/ ).

Furthermore, the Chinese are moving to create a "national" operating system ( rumored to be ready in October 2014 !!) able to replace Microsoft, already pilloried in the Windows version 8 for obvious danger of continuous espionage.( source article on Hardware Upgrade http://www.hwupgrade.it/news/sistemi-operativi/la-cina-pronta-a-rilasciare-un-proprio-sistema-operativo_53752-20.html#commenti ).

The scenario in China, for large American companies, it is anything but rosy: this is demonstrated by the fact that Microsoft and Cisco are under the magnification of the local antitrust.

In Russia, the music does not change: Apple has received a specific request from the government, on the source codes of IOS and Mac to make sure that there are no "intrinsic flaws" that allow spying ( source article EDP line http://www.lineaedp.it/news/13162/il-governo-russo-vuole-i-codici-sorgente-di-apple/ ).

Snoweden's latest revelations ( the mole who worked in the NSA ) inherent in a search engine ( ICReach ) available to many spy agencies, through which it would seem possible , by entering the name and mobile phone number of a subject, know ALL conversations, sms and data generated through the "smart" mobile phone ( source article EDP line http://www.lineaedp.it/news/13314/il-motore-di-ricerca-dellintelligence/ )

The governments of some countries are realizing that being spied on is far beyond what the NSA does ( "official" spy agency ), means being spied on by private individuals who profile NOT only any uses and behaviors that are potentially dangerous for the national interest, but above all citizens, companies and institutions, decreeing an inability to innovate, compete and grow both in economic terms, than social! ( the Crouching Yeti case is interesting on industrial espionage , article source Harware upgrade http://www.hwupgrade.it/news/sicurezza-software/crouching-yeti-una-nuova-minaccia-di-spionaggio-industriale_53500.html ).

The continuous infringement of privacy can also have some positive implications, as in the case of GOOGLE who spied on a gmail address and discovered a pedophile ( source article EDP line http://www.lineaedp.it/news/13173/google-scova-materiale-pedopornografico-su-gmail-arrestato/ )

... but in addition to the deserving action that allowed the police to arrest a person who had child pornography on gmail, what is the degree of security of information that is lawful and that may relate to our life or intimate information that we do NOT want to share with unknown third parties?!?!

But if anyone still had doubts, this is Google's answer : “"Our automated systems analyze user content (include email) in order to offer personally relevant product features, as personalized search results, tailored advertising and spam and malware detection. This analysis occurs when the content is transmitted, received and stored ".

Likewise, the same case is repeated for the Microsoft CLOUD: an American judge ordered Microsoft to hand over a user's data, accused of drug trafficking, stored on a server in Dublin. ( source article EDP line http://www.lineaedp.it/news/13166/giudice-contro-microsoft-la-legge-non-difende-la-privacy-nel-cloud/ )

Once again congratulations to the justice which acts to inhibit illegal and illegitimate behavior, but how to believe in the companies that offer services in CLOUD that reassure that no one will ever read or use the "customer" data?!?

To finish a bleak and deliberately silent painting, ALL wearable technology , for how it is proposed and on the platforms on which it runs, prolong and amplify an INTOLERABLE espionage on the physiological parameters that involve intimate information on the state of health ... very dangerous if left in the hands of those who sell and steal data, for commercial purposes!!!

( Economyup article source http://www.economyup.it/innovazione/1465_altro-che-ice-bucket-challenge-contro-la-sla-c-e-la-tecnologia-wearable.htm )

ComputArte Copyright

Leave a Reply

This site uses cookies to enhance your experience. By continuing to the site you accept their use. More info in our cookies policy.     ACCEPT