How are they then if I don't use facebook, use duckduckgo, and am behind a proxy?This is not even remotely close to accurate. Google is nearly as bad as Facebook with data mining.
even though their encryption is strong, I don't like the concept of the cloud. Why have it? So apple can spy on you? Feel free to tell me why I'm wrong. Considering I don't use social media, my text msg are encrypted, I use a proxy if need be. As a comment from someone else mentioned Google and mining...this has been going on for a long time. I was just simply trying to say I can hide on an android pretty easy. But I have also been a pc and droid guy for a long time.Whoah. You're not just wrong, you're WAY wrong.
I want to buy an Ipad , just to surf the web at home mainly.
I just want the wifi version, not the 3g and I like the Pro size. I just don't know what a good deal is on one. My son bought a refurbished one on Amazon for school for $400, it came in and looked and worked like brand new
I just don't want to buy one and find out it was made in 2012 or something.
I would like to keep it under $500
Any advice you can give me would be apprecitated
you guys are naive if you think apple doesnt whore your info out to the highest bidderThis 100%. Apple, if anything resisted that garbage. That doesn't mean they still don't data mine for themselves. However, Google is open that they use your information. In the end, get what you want. I've been in the IT industry for a long time, if you are worried about personal data being mined or shared, get rid of anything network based eletrical, optical, RF, or otherwise.
I never said they didn't I said they resisted when it came to government intrusion. They do indeed use data for their own advancement and their partners as does every other tech company out there.you guys are naive if you think apple doesnt whore your info out to the highest bidder
yeah i messed up the tag. i edited my post lolI never said they didn't I said they resisted when it came to government intrusion. They do indeed use data for their own advancement and their partners as does every other tech company out there.
You don't need Facebook for Google to mine services from an operating system they designed (technically bought out). A proxy simply forwards on your behalf for any web services, applications, the phone itself, and a myriad of other back-end processes forward information to Google. Proxies are 1. not invincible 2. terminate somewhere, and 3. not invulnerable to their own server side issues with exploits and possible private key leaks. You wouldn't even know unless someone told you. Additionally, some proxies actually still act as a middleman. The only true way to completely avoid data mining is to pay in cash and not use an sort of network based device. Encryption can help but again, with keys that get leaked and the Poodle vulnerabilities that some hosts don't fix, you are still at risk along with a myriad of other things. I do IT security, networks, and VoIP for a living, I've seen my share of things occur at this point.How are they then if I don't use facebook, use duckduckgo, and am behind a proxy?
Yep that information used with debit cards can and will be correlated to you in the form of your phone number, house address, and a myriad of other things. Getting way off topic here. Vmax, get what pleases you the most, the iPad would probably be the best if you are not tech savvy.yeah i messed up the tag. i edited my post lol
Thanks for sharing. Good info. I still think ultimate security comes in the form of not relying on a device for anything other than communication and on top of that always assume its listening. I left the world of computers behind. I was a web designer and if you want to date me (here's your out of context quote) I was at my peak in the beginning of flash. Anyway way before that were talking c++ days, I played with remote interface. Lol we will call it that. My teacher was cool with it. He considered anything a means to learn. Anyway even back in the late 90s I was shocked how easy it was to listen in on people vie two way computer speakers. I grew out of it. I knew technology would be harmful to us. So with my phone I don't do banking on it, I don't order stuff. I pay cash at stores. Most importantly I don't use social media. Computers are only good for spying, communication, and porn.You don't need Facebook for Google to mine services from an operating system they designed (technically bought out). A proxy simply forwards on your behalf for any web services, applications, the phone itself, and a myriad of other back-end processes forward information to Google. Proxies are 1. not invincible 2. terminate somewhere, and 3. not invulnerable to their own server side issues with exploits and possible private key leaks. You wouldn't even know unless someone told you. Additionally, some proxies actually still act as a middleman. The only true way to completely avoid data mining is to pay in cash and not use an sort of network based device. Encryption can help but again, with keys that get leaked and the Poodle vulnerabilities that some hosts don't fix, you are still at risk along with a myriad of other things. I do IT security, networks, and VoIP for a living, I've seen my share of things occur at this point.
IT security.... are you OSCP? I wanna become OSCP certified. right now i just piddle around with kali learning as much as i can. wanna take a few classes at the locoal college here. also on the topic of payment methods.... cryptocurrency for the win. its not 100% anonymous but it's very hard to track someone down if you do it properly. (not using the same key twice, using a cold storage wallet, etc)You don't need Facebook for Google to mine services from an operating system they designed (technically bought out). A proxy simply forwards on your behalf for any web services, applications, the phone itself, and a myriad of other back-end processes forward information to Google. Proxies are 1. not invincible 2. terminate somewhere, and 3. not invulnerable to their own server side issues with exploits and possible private key leaks. You wouldn't even know unless someone told you. Additionally, some proxies actually still act as a middleman. The only true way to completely avoid data mining is to pay in cash and not use an sort of network based device. Encryption can help but again, with keys that get leaked and the Poodle vulnerabilities that some hosts don't fix, you are still at risk along with a myriad of other things. I do IT security, networks, and VoIP for a living, I've seen my share of things occur at this point.
nobody's fighting. just trying to keep people from spreading false information.Hey if you want to fight about Google and apple selling information, start a a thread and fight all night
you had my country ass fooled...nobody's fighting. just trying to keep people from spreading false information.
I'll give you a little intro, you can do the research on your own based on how deep you personally feel like diving. I don't want to turn this into a total propeller-head threadeven though their encryption is strong, I don't like the concept of the cloud. Why have it? So apple can spy on you? Feel free to tell me why I'm wrong. Considering I don't use social media, my text msg are encrypted, I use a proxy if need be. As a comment from someone else mentioned Google and mining...this has been going on for a long time. I was just simply trying to say I can hide on an android pretty easy. But I have also been a pc and droid guy for a long time.
None of these devices are truly trust worthy. If its got a speaker someone can listen. Data mining...like that's really the big problem.
I'm way behind but that's ok. I gave that up long ago. Good info.I'll give you a little intro, you can do the research on your own based on how deep you personally feel like diving. I don't want to turn this into a total propeller-head thread
"Android" is not an operating system, it's an operating environment sitting on top of the OS. A virtual machine if you will, where everything is hosted on a Linux OS but running (well, mostly) in Dalvik (pre 4.4) or the Android Runtime (4.4 to current). As such, all of your interactions with the device, every touch, every key press, every network packet, all input and output, are subject to the whims of Google. Or worse, anyone who can exploit any flaw in the platform. I don't care what level of encryption the device or your apps have, if you have access to the privilege level beneath the entire environment you own the fort. Period. Game over.