You are being spied on by a host of devices around you. Everyone knows this, but not many people are aware of the extent to which this happens. Google tracks all of your data; your browser, your device, your OS, the name you use to log into your computer, your age, your Internet history, etc. This data is stored and retrieved by almost anyone who wants it. This background exchange of information is done entirely without most people’s knowledge and the news will not discuss with the people, in detail, the extent of how much information is leaked.
Everything Google collects, along with other hacks, can and have been stolen and this information is routinely dumped the Tor Web. This information is available to anyone with a torrent client. I am not a programmer. I am not a hacker. I am a talented cut and paster; that is all. However, I do like to collect these publicly available data dumps. The most high profile dumps, at the moment, are the Collection #1 - #7 dumps. Most of this is just email/password combinations. Many entries have a lot more, like birthdays, security question answers and other personal information.
You, yourself, can easily gather these up; do focused searches, then add them to a dummy contact list, then allow Twitter, Facebook, Instagram and others do the work of finding the connected accounts and give you people’s real names based on emails alone, where there is a 90% chance that you also have their passwords.
For example, I imported 25,000 FBI employee emails from into my contacts, then logged into Twitter and connected to my contacts to ‘Find People to Follow.” Voila. Now, I can see what they look like, what their politics are, etc. Being a not-talented programmer, I can go to sleep and leave a mouse robot running, and archive all of their pages and cut and paste their text into a spreadsheet/database.
To augment what the information dumps have, it is easy to make focused searches and add information on a set of targets, using a mouse robot. It is stupid simple. There are also private investigator databases that have background check info, credit info, banking info, etc. A particular interesting role is a forensic accountant, who is like a private investigator who can write subpoenas in tandem with a lawyer, if you have a case.
A single determined person can find out nearly anything they want about you in a perfectly legal manner. With access to remote cameras, you can even find someone to serve with court paperwork on the other side of the country by using unprotected cameras. There are huge databases of them. You can very often find people at work or at home.
You can expect your Internet histories and GPS data to be widely available to the world, eventually. It is only a matter of time. Any person determined enough will be able to see everywhere you visit on the Internet. This is why privacy laws are very important. Start fighting for them, now.
Illegally, this problem is compounded because there are tools available to everyone to tap into someone’s devices for audio, video or even screen monitoring. “Command and control” software is easy to come by and easy to use. A lone person with no resources can use this type of thing to maximum effect. A group with the means to find a stingray device can be aware of everything that is going on in your life.
There is no such thing as privacy, anymore. And there won’t be until there is a lot of noise from the public, demanding it. All of this is the basis of how I know what I know.
view the rest of the comments →
thewebofslime ago
The End of Privacy
You are being spied on by a host of devices around you. Everyone knows this, but not many people are aware of the extent to which this happens. Google tracks all of your data; your browser, your device, your OS, the name you use to log into your computer, your age, your Internet history, etc. This data is stored and retrieved by almost anyone who wants it. This background exchange of information is done entirely without most people’s knowledge and the news will not discuss with the people, in detail, the extent of how much information is leaked.
Everything Google collects, along with other hacks, can and have been stolen and this information is routinely dumped the Tor Web. This information is available to anyone with a torrent client. I am not a programmer. I am not a hacker. I am a talented cut and paster; that is all. However, I do like to collect these publicly available data dumps. The most high profile dumps, at the moment, are the Collection #1 - #7 dumps. Most of this is just email/password combinations. Many entries have a lot more, like birthdays, security question answers and other personal information.
You, yourself, can easily gather these up; do focused searches, then add them to a dummy contact list, then allow Twitter, Facebook, Instagram and others do the work of finding the connected accounts and give you people’s real names based on emails alone, where there is a 90% chance that you also have their passwords.
For example, I imported 25,000 FBI employee emails from into my contacts, then logged into Twitter and connected to my contacts to ‘Find People to Follow.” Voila. Now, I can see what they look like, what their politics are, etc. Being a not-talented programmer, I can go to sleep and leave a mouse robot running, and archive all of their pages and cut and paste their text into a spreadsheet/database.
To augment what the information dumps have, it is easy to make focused searches and add information on a set of targets, using a mouse robot. It is stupid simple. There are also private investigator databases that have background check info, credit info, banking info, etc. A particular interesting role is a forensic accountant, who is like a private investigator who can write subpoenas in tandem with a lawyer, if you have a case.
A single determined person can find out nearly anything they want about you in a perfectly legal manner. With access to remote cameras, you can even find someone to serve with court paperwork on the other side of the country by using unprotected cameras. There are huge databases of them. You can very often find people at work or at home.
You can expect your Internet histories and GPS data to be widely available to the world, eventually. It is only a matter of time. Any person determined enough will be able to see everywhere you visit on the Internet. This is why privacy laws are very important. Start fighting for them, now.
Illegally, this problem is compounded because there are tools available to everyone to tap into someone’s devices for audio, video or even screen monitoring. “Command and control” software is easy to come by and easy to use. A lone person with no resources can use this type of thing to maximum effect. A group with the means to find a stingray device can be aware of everything that is going on in your life.
There is no such thing as privacy, anymore. And there won’t be until there is a lot of noise from the public, demanding it. All of this is the basis of how I know what I know.