Originally posted by codegreenspace
reply to post by arbiture
Thx for chking us out! Yeah I hear ya on the whole social media thing...I rejected it hard for awhile -but after some thought, I recently signed
I was ok with it b/c 1. I'm not using it for espionage or terrorist activities so I'm good from the law's standpoint..
and 2. from my own security/privacy standpoint, I'd only post what I want others to see...so you can still have a personal life
Enjoy the show!
You said it well, posting anything is far more public then having it on every bill board in the world, and on many channels of other media, video in
As for not using it for terrorist or illegal reasons thats certainly very good... But my main point on the web-net security issue is how certain
companies, Google being the most egregious, use posts and even net access by anyone for any reason to send you a cookie. You need never use Google,
makes zero difference, they do this add-naseum. And you CAN'T block it with anything but the most secure and often not privately available
technological and operative protocols, sometimes though companies do have very sophisticated, layered and analytically compartmented technologies.
That pisses me off.
I developed and make no secret of it, that I use a systems protocol and technology that sends an utterly harmless, innocuous and highly amorphous
"buried in the noise", as to be very hard to even see AS a cookie, cookie. Hey, I think its fair to share. But only if I get one or more despite
any and all efforts to block it. ATS sends cookies for their own reasons but I allow it. (relax ATS, you don't, get any, but I do scan for "decoy
cookies" all the time) I'm well aware an unscrupulous entity may send a cookie "in drag", dressed up to look like someone else's cookie. Thats
serious fraud I'm told if discovered and proven, I have and can, to a courts satisfaction but won't.
The real spooks, more so those who "play spy", would likely create serious problems if I revealed methods and exposed blatant illegality. Some of
these companies are very scary, (from experience) not to mention unethical. And civil rights, the Constitution applies to what the government does NOT
private persons or firms. THATS the group people need to worry about more so then "big brother"
The Feds will do what they deem necessary; don't always agree but I do understand the need for certain State sponsored intelligence gathering. My
methods are unique as far as I know since I invented it, implemented with the help of a superb computer engineer security expert who was a former
***** *** * ******* ******. Dude he's good, but was surprised as to the technique I designed. He knows current computer technology, I know living
systems that are self-actualized and far more capable in information manipulation, optimum augmentation, ya-da...
Hint: My area of special interest involves biological-organism communication patterns, soliton information carriers, and adaptive fractals with
temporal/non-temporal considerations and neuroquantology which involves the brains use of quantum events as part of the subatomic-to-classic level of
physics presentation. Classic just being "human sized observable events". What I can mention include; neuron-chemical bio-informatics,
neuro-morphology and many somewhat conventional cryptological methodology though not conventional methods, usually.
I only send my "morphic power ranger" cookies to those "repeat offenders" who despite using the standard "no cookies please" option on my
standard computer, the one I use for site analysis and posts, can't understand the word NO. Sounds like Rush Limbaugh with ANY women.
As for perusing the social media sites like Facebook and Twitter, I don't post on them though have seen some of what I said on another site end up
there. Tracked down who and they got a blunt letter from my lawyers. Toned it down for a while but tracing who forwarded any is sop, and ongoing.
People on this site notice I don't include links to certain sites or references I make. The main reason is one can tag a link unknowingly to the
person at either end of a link and intercept and piggy back so links people click when going from and to any site that can provide pattern tracking
for profiling, largely used for marketing or social research. I don't "dress up" what I do as others cookies.
I could but don't and prove it having to inconvenience people by not providing a link but will provide the site url and/or source. One person on this
site sent me a confidential e-mail at one of my personal "regular " (unencrypted) commercial e-mail address's. Like me they can pick up a lot from
what and how people say things, from points of view, perspective, the posts people reply to, what pushes's who's buttons also cadence, formatting
and more. I used to work with him, hmm