Win / GreatAwakening
GreatAwakening
Sign In
DEFAULT COMMUNITIES All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Reason: None provided.

I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.

That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.

Our security is compromised at the OS level. It is compromised at the hardware level. There is not a single device that exists on this planet built after say, year 2000, that is not compromised completely. If you are connected to the internet ever on a device, the built in keylogger, microphone (even if "turned off*), and camera are sending them everything, all the time and it is being analyzed by an AI in real time.

1 year ago
1 score
Reason: None provided.

I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.

That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.

Our security is compromised at the OS level and hardware level. There is not a single device that exists on this planet built after say, year 2000, that is not compromised completely. If you are connected to the internet ever on a device, the built in keylogger, microphone (even if "turned off*), and camera are sending them everything, all the time and it is being analyzed by an AI in real time.

1 year ago
1 score
Reason: None provided.

I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.

That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.

There is not a single device that is not compromised completely. If you are connected to the internet ever on a device, the built in keylogger, microphone (even if "turned off*), and camera are sending them everything, all the time and it is being analyzed by an AI in real time.

1 year ago
1 score
Reason: None provided.

I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.

That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.

There is not a single device that is not compromised completely. If you are connected to the internet ever on a device, the built in keylogger, microphone (even if "turned off*), and camera are sending them everything, all the time and it is being analyzed by an AI.

1 year ago
1 score
Reason: None provided.

I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.

That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.

There is not a single device that is not compromised completely. If you are connected to the internet ever on a device, the built in keylogger, microphone (even if "turned off*), and camera are sending them everything, all the time.

1 year ago
1 score
Reason: Original

I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.

That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.

1 year ago
1 score