Tuesday, August 16, 2022

Smartphones are spy tools first and foremost written by Gloria

I have several so-called smartphones and I have made efforts to learn some about how they work. There are so many built-in gotchas that it is mind boggling. The defaults are factory set to NO SECURITY. What each citizen of the United States and world must remember is that the devices sold to you, spy on you, turn on and off your wifi, your camera, your recorder, secretly without any input from you, and record/photograph/videograph all activities in your household, where you go what you do. And they send it to the so-called "cloud" which is only large data centers often in a foreign country to be stored for governments, think tanks, research, businesses to use in basically any way they want.

Also, all internet channels, platforms, devices, I o T appliances, modems, routers, computers, tablets,smartphones have become political tools that allow politicians to buy the info they glean from their owners, and manipulate it. If you read the book, 1984, you probably remember that TVs and computers and telephones would spy on the household, so that when a person watched the T V it also watched that person.

As I was tinkering with smartphones of mine to learn the inner workings of them some, I realized how much trouble they are, how expensive they are compared to original and real phones that had wired and reliable, predictable service. I wrote down some info that day as I was thinking about the comparison between what we citizens label smartphones which are handheld computers with apps that function [some of the time] to make voice calls over the internet. I want to share my thoughts about that :

I remember when phones were real, physical, wired that worked every time you picked up the handset.

And you didn't have to create web accounts or enter 10 databases of info about yourself into it to make it work some of the time.

And you didn't have to worry about people going through your belongings to search for your phone [or other internet connection to banks] etc.

And when your telephone didn't " alert" you, "notify " you, ping you, email you, break into your bank, harass your friends, steal your identity or photos, or publish your SSN, DoB, bra size, etc on the web.

And when you didn't have to " upgrade "it every 6 months to make it work.

And you didn't have to keep paper logs of when you used it in case it needed repair.

And when your telephone didn't follow you around town with beacons, or publish your internet ID on your bank card receipts.

And when the telephone company answered their phones.

And when your telephone helped you and not harmed you by revealing all your confidential info to your political enemies or actual enemies.

And when the telephone company recognized their customers'faces and called them by name.

And when the telephone company wanted your business instead of sloughing you off to the gobble-up-businesses-web.

And your real telephone rang loudly when real people [not robots] called you.

And when you didn't receive emails sent to your phone that are only phishing for information and stored bank card that you told telco NOT to store.

And when you could feel safe answering your phone because you were a voice on the line, without your image or your bank account info being sent as you answered the phone.

And when answering your phone didn't put your expenssive handheld computer at risk of total destruction via malware/ransomware/cyber-attacks from enemies.

Apparently other people have grievances with software apps labeled telephones too according to this article:

https://www.theverge.com/2022/8/5/23293924/push-notifications-ios-android-daily-digest-time-sensitive;

7Aug2022;8:32am

Here are some of the news articles that indicate the situation of whether citizens will ever feel safe with smartphones is only going to get worse before it gets better or all humans quit smartphones, whichever happens first. "The US Federal Election Commission approved a Google plan on Thursday to let campaign emails bypass Gmail spam filters. The FEC's advisory opinion adopted in a 4-1 vote said Gmail's pilot program is permissible under the Federal Election Campaign Act and FEC regulations "and would not result in the making of a prohibited in-kind contribution."...

Republicans reportedly could have avoided some of their Gmail spam problems by using the proper email configuration. At a May 2022 meeting between Senate Republicans and Google's chief legal officer, "the most forceful rebuke" was said to come "from Sen. Marco Rubio (R-Fla.), who claimed that not a single email from one of his addresses was reaching inboxes," The Washington Post reported in late July. "The reason, it was later determined, was that a vendor had not enabled an authentication tool that keeps messages from being marked as spam, according to people briefed on the discussions."

As Techdirt's Mike Masnick explained, "[I]t sounds like Rubio's spamming operation didn't set up a DKIM/DMARC authentication setup. "

https://arstechnica.com/tech-policy/2022/08/us-approves-google-plan-to-let-political-emails-bypass-gmail-spam-filter/;

{My comment: does the D in both of those mean "democrat approved only"? since the internet rigged the 2020 fed election by totally squelching any negative press of Biden and all prolife comments; and all republicans.]

https://arstechnica.com/tech-policy/2022/08/us-approves-google-plan-to-let-political-emails-bypass-gmail-spam-filter/;

14Aug2022;6:50pm

This next article proves what I thought to be true, i.e. that 2 step auth is easily intercepted to create a bypass around a secure password and a trick to users; and that Twitter is a facade for collecting confidential info .

Quote: "The phishers also had the means to defeat forms of 2FA that rely on one-time passwords generated by authenticator apps or sent through text messages....

I have strong feelings about the inappropriateness of Twitter —a company that has been hacked at least three times and admitted to misusing user phone numbers— asking for this kind of data..."

https://arstechnica.com/information-technology/2022/08/im-a-security-reporter-and-got-fooled-by-a-blatant-phish/;

14Aug2022;6:55pm

Next bit of hopeful news :

The FTC is planning to stop surveillance of consumers via their devices--well. Thank GOD! Quote: The Advanced Notice of Proposed Rulemaking, approved on a 3-2 vote along partisan lines, was spurred by commercial data collection, which occurs at "a massive scale and in a stunning array of contexts," FTC Chair Lina M. Khan said in a press release. Companies surveil online activity, friend networks, browsing and purchase history, location data, and other details; analyze it with opaque algorithms; and sell it through "the massive, opaque market for consumer data," Khan said.

Companies can also fail to secure that data or use it to make services addictive to children. They can also potentially discriminate against customers based on legally protected statuses like race, gender, religion, and age, the FTC said. What's more, the release said, some companies make taking part in their "commercial surveillance" required for service or charge a premium to avoid it, employing dark patterns to keep the systems in place."...

The FTC is seeking input from stakeholders and the public, starting with a public forum on September 8."

https://arstechnica.com/tech-policy/2022/08/ftc-aims-to-counter-the-massive-scale-of-online-data-collection/;

on web 14Aug 2022;7pm

And another warning to public:

5G and IoT a nightmare of no security.

Quote : " But the interfaces that carriers have set up to manage Internet-of-things data are riddled with security vulnerabilities, according to research presented this week at the Black Hat security conference in Las Vegas. And those vulnerabilities could dog the industry long-term....

After years of examining potential security and privacy issues in mobile-data radio frequency standards, Technical University of Berlin researcher Altaf Shaik says he was curious to investigate the application programming interfaces (APIs) that carriers are offering to make IoT data accessible to developers. These are the conduits that applications can use to pull, say, real-time bus-tracking data or information about stock in a warehouse. ...

Looking at the 5G IoT APIs of 10 mobile carriers around the world, Shaik and his colleague Shinjo Park found common but serious API vulnerabilities in all of them, and some could be exploited to gain authorized access to data or even direct access to IoT devices on the network. “There's a big knowledge gap. This is the beginning of a new type of attack in telecom,” Shaik told WIRED ahead of his presentation. “

https://arstechnica.com/information-technology/2022/08/one-of-5gs-biggest-features-is-a-security-minefield/;

14Aug2022;7:06pm

And this startling report by N Y Times:

Smartphones are not built for consumers but for data collectors' use to make profits is my sum up of the following article.

Quote : " In most states, companies can use, share, or sell any data they collect about you without notifying you that they’re doing so.

* No national law standardizes when (or if) a company must notify you

* if your data is breached or exposed to unauthorized parties.

* If a company shares your data, including sensitive information

* such as your health or location, with third parties (like data brokers), * those third parties can further sell it or share it without notifying you....

The Electronic Communications Privacy Act (ECPA) restricts government wiretaps on telephone calls and other electronic signals (though the USA Patriot Act redefined much of this). It also sets broad rules concerning how employers can monitor employee communications. Critics often point out that ECPA, which was passed in 1986, is outdated. Since ECPA was written well before the modern internet, it doesn’t protect against modern surveillance tactics such as law enforcement access of older data stored on servers, in cloud storage documents, and in search queries....

Even the latest laws leave out all sorts of other data concerns, such as algorithm transparency or government use of facial recognition....

All of the experts we spoke with preferred an opt-in consent model and “privacy by default” concepts. Such an arrangement would make accounts private initially, and apps wouldn’t have any permissions. It would be up to you to opt into those settings...

[my comment: at present every computer/tablet/smartphone/laptop/chromebook is set to NO SECURITY as the default and requires creation of an " account" before it can be fully used, -- an account" that identifies person by name, birthday, and often/usually i p address and wifi or internet credentials also. By the time the device/machine is set up the login credentials are "shared"with "merchants" around the world and privacy and security never had a chance.]

, https://www.nytimes.com/wirecutter/blog/state-of-privacy-laws-in-us/

14Aug2022; 8:37pm

And shocking news about Missouri. Missouri's so called privacy laws prohibits librarians [only ] from sharing what books a person checked out.

No mention of any other circumstance being covered by it.

Source: https://revisor.mo.gov/main/OneSection.aspx?section=182.817&bid=9243&hl=;

14Aug2022;8:40am

I have also updated other blogs of mine including these :

https:/gloriapoole-RN-artist.blogspot.com

https://gloria0817.blogspot.com

https://prolife-nurse.blogspot.com

https://salvation-is-free.blogspot.com

https://gpoole817.blogspot.com

https://artist-gloriapoole.blogspot.com

https://gloriapoole-paintings.blogspot.com,

https://save-the-baby-humans.blogspot.com

https://real-women-have-babies.blogspot.com

https://prolife-nurse.blogspot.com

https://news-for-life.blogspot.com

https://publishing-life.blogspot.com

https://words-that-work-LLP.blogspot.com

https://tapestry-of-life-LLP.blogspot.com

https://glorias_writing.medium.com

Selfie of me with no make-up on 12th August 2022, while tinkering while laying on my sofa in my front room by glass door to my balcony because I like that spot in my apartment because the sun shines on me there. Copyright. All rights to all content created by me, drawn,sketched,painted,photographed,signed,uploaded,posted, by me Gloria Poole /gloriapoole /gloria0817/ gpoole817/ Ms Gloria Poole/ Poole,Gloria/ gloriapoole.RN, is owned by me and copyrights belong to me alone.

Posted today 16Aug2022 at 7:53am by me Gloria Poole,RN,artist,Springfield Missouri, owner of this Apple iMac and everything in this apartment including other Apple products, and android smartphones, and tablets,routers, flip phones and my own skills and observations .

Dogwood tree near me photo-by-gloriapoole Republic Missouri

I, Gloria Poole,gloriaoole, photograhed this blooming Dogwood tree that's very near my apartment on walkabout about a week ago. Copyrigh...