Computers and IT

Munich Keeps Linux

A few good reasons to consider Linux expressed in the discussion about Munich’s IT Lead: ‘No Compelling Reason’ To Switch Back To Windows From Linux.

Computers and IT

Malware Just Showing Up on Android Phones

Reports are malware found all ready installed on Android smartphone before you even activate them.Odd isn’t it? Given that, you want more phones to have payment technology? Odd … is it not?

Computers and IT

WikiLeaks Privacy and You

You probably heard the news that any computer device can be hacked. It is now officially confirmed that tools exist to break the security of any computer and mobile device connected to the Internet. I’ve said things like that on this blog in the past. Now, there is genuine confirmation of my observations.

What does this mean? A few things.

  1. About 90% of the people don’t care if they are spied on because there is no obvious harm.
  2. People who do care don’t have convenient options.
  3. Anyone exchanging money, social security #’s, photo id #’s, or sensitive conversations over anything Internet-based are making a mistake.
  4. The web is for public data. Encryption is useful, for minimizing website defacement, casual peeping, but it is not really a secure way to lock down data permanently.
  5. Session Highjacking is rampant. In many places, people are nearby doing illegal unofficial wiretapping all over the place. It is the new side gig to sell you out, keep tabs on you, or tap into your computer and online storage accounts to see what kind of files you got.
  6. Targeted denial of service to block certain online activities for reasons ranging from the arbitrary to sophisticated remote puppetry and observation of your reactions. Sometimes, your ISP isn’t at fault when your use of an online service doesn’t work right. It may be an actual remote operator giving you a difficult time.

I’ve observed these things for years. Finally, there is proof for the basis of my claims for the last 10 years. What do you do about all this?

  1. You could stop using the Internet and mobile technology.
  2. Go back to flip phones.
  3. Use the physical post office.
  4. Only use social media and email for things you don’t mind being public and avoid eCommerce, eBanking, and e-anything that could turn into identity highjacking or general personal compromise.
  5. Only use Apple computers. Nothing is guaranteed safe, but their technology mindset goes to the furthest extent, and they seem to put the most effort into security that is not for show. Unfortunately, Apple is not an option for everyone.
  6. Hope the tech industry enters into a hardware renaissance regarding better hardware that is more resilient to backdoors.
  7. Mentally resist online manipulation. Do not be afraid of being watched. Use these technologies as the public tools they are and not under the expectation of privacy.

Lack of disclosure of a security breach or absence of evidence of a breach are not evidence that a breach did not occur. Big companies exist who have never publicly disclosed they have been breached and that any information, transaction or data you’ve shared with them has been leaked out to third parties. I’ve studied reports about Malware and Spyware enough to say that the nature of those tools are such that likely just about everybody and everything has been breached who is or has been connected to the Internet.

In the future, some of the most sought out people will be those who have the least history or footprint of any kind on the Internet. With all I have stated, I still see value in the Internet and the Web, particularly for research, looking up things, and matters that can be out in the open. Primarily on point # 4 in both sets of bulleted points presented earlier.