Proprietary software is often malware: proprietary back doors. “..Non-free software is controlled by its developers, which puts them in a position of power over the users. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. This typically takes the form of malicious functionalities. Some malicious functionalitiesContinue reading “Of Back Doors and Malicious Functionalities”
Category Archives: information technology
Of VPN that Track Users and Infringe their Privacy
A research paper that investigated the privacy and security of 283 Android VPN apps concluded that “in spite of the promises for privacy, security, and anonymity given by the majority of VPN apps—millions of users may be unawarely subject to poor security guarantees and abusive practices inflicted by VPN apps.” Following is a non-exhaustive list, taken fromContinue reading “Of VPN that Track Users and Infringe their Privacy”
Every phone has a walking data collector app.
In general, electronic devices are not secure. People do not understand and can not wade through user agreements, commonly more than 5000 words and more than 18 pages to read, presented always at the wrong time, when one can’t wait to activate a device or a service, and one is already tired of the nonsenseContinue reading “Every phone has a walking data collector app.”
Digital Tricks: G20-WHO Vaccine Passport and Digital Health Identity Scheme
Digital Tricks: G20 Promotes WHO-Standardized Global Vaccine Passport and ‘Digital Health’ Identity Scheme Puppets of the Group of 20 (G20), after drinking and partying a lot together in Bali, have issued a joint declaration promoting a global standard on proof of vaccination for international travel and calling for the establishment of “global digital health networks”Continue reading “Digital Tricks: G20-WHO Vaccine Passport and Digital Health Identity Scheme”
Of Malware in Mobile Devices
Nearly all mobile phones do two grievous wrongs to their users: tracking their movements, and listening to their conversations. The malware listed here is present in every phone, or in software that is not made by Apple or Google (including its subsidiaries). Malicious functionalities in mobile software released by Apple or Google are listed inContinue reading “Of Malware in Mobile Devices”
Of Consumer VPN
https://www.youtube.com/watch?v=A_l4WB2Yvk8&list=PLcajvRZA8E09bgru8xIqsQrEjgH6YM27e&index=70 VPN client and the VPN server refer to software, but oftentimes a computer is dedicated to function as a VPN server, so the hardware and software can be thought of as one and the same. The VPN client software connects to a computer running VPN server software. Typically, the VPN client software runs onContinue reading “Of Consumer VPN”
Samsung Terms and Conditions – just an example
My Samsung Terms and Conditions tell me I do NOT own my things. The terms and conditions (“Terms and Conditions”) in this document (“Agreement”) describe and stipulate the provisions which govern and regulate the legal relationship between Samsung Asia Pte Ltd and/or Samsung’s Subsidiaries (“Samsung”) as provider of the Services and you as user ofContinue reading “Samsung Terms and Conditions – just an example”
Mobile communications, the most vital toys for the automatons of the modern world
Every “smart”-phone or other device with mobile communications capability (e.g. 3G or LTE) runs two operating systems. Aside from the operating system that the end-users see (Android, iOS, PalmOS), it also runs a small operating system that manages everything related to radio. Since this functionality is highly timing-dependent, a real-time operating system is required. ThisContinue reading “Mobile communications, the most vital toys for the automatons of the modern world”