On Thu, 26 Dec 2019, Mike C. wrote:

Indeed. Which means that in practice you're only as secure as the app your
family, friend and co-workers use. And then when you bring up how they
should use encryption, you're instantly the "security conspiracy tin foil
hat wearing person who has a Faraday Cage in their basement" person of the
group.

Over the past week the NY Times reported on their investigation of how
extensive and comprehensive is the tracking of individuals by their mobile
phones. As part of the series they tracked a whole small town for a time
then told the residents what they did and what they found. They also
published a list of three things one could (should) do with Android and iOS
phones to limit the ability of being tracked.

A perfect example of how a technology developed initially for beneficual
uses can be turned into a tool to control or do harm. Sad.

Rich
_______________________________________________
PLUG mailing list
PLUG@pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to