It is no secret that tech companies are vying for consumer data because it is extremely valuable to a number of sectors that control enormous sums of money, such as insurance and financial institutions. In fact, the future where people don’t get good financing rates due to shaky medical histories is already here.
Why No One Trusts Google
It’s simply that straightforward: nobody believes Google. People are currently hesitant to invest in even its most well-known products because of its poor understanding of what people want, need, and will pay for. Almost all the privacy paranoids do not use any of the Google Products.
Google’s shocking new data harvesting discoveries should come as a rude shock to the billions of users of Chrome. Worse yet, a fresh Chrome discovery—one that hasn’t yet made headlines but is described below—should issue an even stronger caution. Here is what you should do right away.
The entire Google Ecosystem is the issue, not just Google Chrome. If you just wish to leave the Google Ecosystem, ceasing to use Google Chrome is the ideal first step. Even those who have privacy concerns cannot abandon Google Chrome in terms of the general population of this planet. Why is Google Chrome so effective? Because of its usability, it functions best even for persons who are not particularly comfortable with computers. Even those websites that don’t function properly on any other browser are displayed attractively by it.
Google gathers all of our information in order to provide relevant adverts. The highest market share for advertising belongs to Google. Google’s problem is that, unlike Facebook, it holds opposing positions. On one side, protecting your privacy with Android and its mail, docs, and drive ecosystem, and on the other, an advertising powerhouse that generates the majority of its yearly revenue from $100 billion or more in ad expenditure. It is essentially identical to Facebook in that way.
Why No One Trusts Microsoft
Two unpatched vulnerabilities are now being used by attackers to remotely hack on-premises Microsoft Exchange systems. Microsoft announced the problems late last week and provided mitigation guidance until a comprehensive patch could be created, however reports claim that the suggested mitigation is readily circumvented.
Attackers utilized the exploit to spread web shells—backdoor scripts—in the attacks that GTSC observed across a number of clients, disguising them as genuine Exchange files like RedirSuiteServiceProxy.aspx. They then carried out the deployment of malware that can dump credentials in order to steal credentials from infected servers. The researchers believe the attackers were Chinese based on their selection of web shells and other artifacts left behind.
Why No One Trusts Apple
Apple found itself in hot water when third-party contractors revealed they were able to listen in on audio recordings from Siri requests, which included all kinds of personal conversations and activities.
More than any other company, Apple has built a reputation on trust. They promise the most effective devices and freedom from viruses and ransomware. So you would think they would be the most transparent when real life happens to them. The fact is that one lawsuit discovery showed that 128 million iPhones were hacked and Apple did not tell anyone.
Why No One Trusts Facebook
Facebook monitors your internet activity. The most recent iOS 14.5 Apple update allows users the choice to opt into monitoring across other applications and websites—a mechanism that Facebook relies on in order to serve you advertisements. You would have to be living under a rock to have missed this. The social network has been at odds with Apple for the past six months because of this.
Facebook naturally gathers your data even if it doesn’t monitor you across other websites and apps. It knows who you’ve interacted with and when, it has your preferences, it has your date of birth if you’ve submitted it, and it can approximate your age. The vast data machine of the social network is fed with all of this information.
Why No One Trusts Samsung
Samsung is based in South Korea. There always seems a strange disconnect with the odd language usage in their marketing materials. This is no mistake. Samsung has numerous lawyers in the US assisting them to ensure that it says exactly what they want it to say. You, the customer, have absolutely no right to privacy.
Creating a Samsung account requires give over your name, age, address, email address, and gender. They wll also reserve the right to collect data such as credit card information, username, password for your device and for 3rd party services, photos, contacts, text messages, recordings of your voice generated using voice commands, location data, wifi access points, cell towers and payment info.
The company says it uses this information for ad delivery, customer communication, enhancing their services, improving their business, identifying and preventing fraud and criminal activity, and compliance with legal requirements. They reserve the right to share this information subsidiaries and affiliates, business partners, and related third parties.
So next time you go to the bathroom with your Samsung phone, keep in mind that your private moment may be shared on audio and video to Seoul Korea and everyone they consider a business partner.
How to Secure your PC from Google, Apple, Facebook and Apple
- Do not ever use Log In through Facebook, Google or Apple
- Keep your data Secure locally – do not use data storage services
- Do not share your contacts with any service.
- Use tools that will store your data securely like DejaOffice PC CRM Standalone.
When you start with a new PC, it is important to take steps to log in without a Microsoft account. To do this, when you get to the log in screen, cut off your PC address and follow these specific instructions for offline Windwos 11 registration.
As you set up your programs and services, avoid using any services that log in through Googkle, or Facebook. You will need to log into Google for Google Services, and Facebook for Facebook access. But never use Google, Facebook or Apple logins for banking, photo management or document management. Doing so may give up your privacy and right of ownership on those documents and photos.
When you create documents or use software, be sure to use a local program and not a web service. So use Microsoft Word, and not Google Docs for your documents. Use a local email system like Thunderbird and not an online system like Gmail. You can use the same email provider, but be sure to store your mail offline so copies are not available in case your email provider gets hacked.
Some programs offer to capture your Contact List. This is a red flag warning that they are capturing data to be used in advertising. There are a number of legal hoops they have to jump through. So if any screen mentions GPDR, CCPA or privacy, it is right to assume they are asking permission to breach your privacy.
Tools You Can Use Securely:
- Thunderbird Email
- Firefox, not Chrome
- DejaOfice PC CRM Standalone for PC and phone.
- Microsoft Office using IMAP folders
Apple is entering these blatant data-hoovering markets while promising to protect customer information and positioning itself as a safe alternative. However, this move may not come off as ethically sound as Apple seems to believe it will because Apple can’t be sufficiently contrasted with all the other industry titans that have recently repeatedly cheated on their customers with personal information.
However, these businesses may presently blur the borders around the amount of data they require to market to their customers because they have gathered sufficient data to target their users’ movements and requirements.