Background Image

The End of Privacy

Home  /  Privacy  /  The End of Privacy

Recently I have seen many news related to this title and here is my take.

The private lives of anybody possessing any device with access to the Internet are not private anymore - and have not been for quite some time anyway.

Whatever you search for using any search engine such as Google.com is used to profile you and it is saved to some pieces of information in your computer called cookies, so they can keep track of your preferences. Now you begin to see images and all kinds of ads related to whatever you were viewing earlier and you are wondering how do they know.

 

But if you think that by getting rid of cookies using your browser settings you are now safe, you are wrong. All your Internet traffic passes through a really big number of networking equipment, computers, and servers, all of which save small bits of your connection and traffic. Some part of this information might very well be destined to measure performance and log the equipment parameters, but some of it is also used by marketing companies and other parties to learn more about you.

You know that all social networks are free because you are agreeing to allow them to use your published content such as photos, events, posts, location, feelings - namely, YOUR LIFE, to do with it something of value for them. They gather that data and sell it to marketing companies so they can predict your tastes and actions. They all want a piece of you; the piece stored in your bank account, that is. They want to sell something to you and it is of their utmost interest to know all about you.

Now, you begin to get paranoid and pay for a VPN (Virtual Private Network) connection or an Anonymizer and knowing your connection is being masked by another entity or is jumping from server to server all around the globe, you are safe. Think again. If it is connected, it is traceable and hackable. It will take more time and effort but it can be done.

Now there is the rumor of IoT ("Internet of Things") devices which according to some, have the necessary hardware and software to spy on you, so in theory, anything you do is being stored somewhere and if needed can be accessed by the correct people.

Ok. I'll admit I am getting carried away here; Am I? Can you proof otherwise? Do you feel safe? Private?

What can you do?  Contact Us so we can create an assessment report of your network, evaluate your current security status, and from there we will propose some changes to it to make it more secure, and keep your data safe and redundant.  

by Javier Rosado

Leave a Reply

Your email address will not be published. Required fields are marked *

[post=590]