- Dec 9, 2017
- 11
- 0
- 1
Vulnerbilities in all OS and software are put there in purpose by developers.
If you think about what a developer offers you (most times for "free") goes straight into your computer and starts interacting with your OS (no matter if is Mac, Windows, Linux, Android or other) that is designed to collect your private data to be sent straight into "security" datacenters like the one located in Bluffdale, Utah,
see: Blimp flies over NSA center in Bluffdale in aerial protest
Therefore this developer and the corporation he or she belongs to, becomes an intermediator between you and security organizations and/or cybercriminals, making your private life is persistently exposed to more people you can imagine.
The heroes of putting your life in third partie´s hands are: The Internet Engineering Task Force (In charge of making ISO rules that govern Internet protocols in a way if it is more intrusive is better)
Regarding metadata hidden inside pictures we have Gimp (GNU Image Manipulation Program) that really means: GIMP = PMIG = Profile MIGration
Your profile classified by encripted metadata captured by programmatic inventions and enviroments like. ODBC, WMIC, ICMP,Microsoft NET, PowerShell, icc profiles, regular expressions and so on is a very profitable way to steal your critical data (specially useful for "servicing" politicians, scientifics, writters and many others) , as there are more than 8.000 million digital devices to capture out there, used by non programming oriented consumers that rely on corporations that show them a big smile while really are intruders into their homes by their backdoor.
This last point is what really make happy corporative evangelists see: Ballmer`s happiness
If you don`t want to collaborate with this insane current reality be very careful in how and what you put inside your computer.
In next posts I will give you some practical advice to make your metadata not available to others.
If you think about what a developer offers you (most times for "free") goes straight into your computer and starts interacting with your OS (no matter if is Mac, Windows, Linux, Android or other) that is designed to collect your private data to be sent straight into "security" datacenters like the one located in Bluffdale, Utah,
see: Blimp flies over NSA center in Bluffdale in aerial protest
Therefore this developer and the corporation he or she belongs to, becomes an intermediator between you and security organizations and/or cybercriminals, making your private life is persistently exposed to more people you can imagine.
The heroes of putting your life in third partie´s hands are: The Internet Engineering Task Force (In charge of making ISO rules that govern Internet protocols in a way if it is more intrusive is better)
Regarding metadata hidden inside pictures we have Gimp (GNU Image Manipulation Program) that really means: GIMP = PMIG = Profile MIGration
Your profile classified by encripted metadata captured by programmatic inventions and enviroments like. ODBC, WMIC, ICMP,Microsoft NET, PowerShell, icc profiles, regular expressions and so on is a very profitable way to steal your critical data (specially useful for "servicing" politicians, scientifics, writters and many others) , as there are more than 8.000 million digital devices to capture out there, used by non programming oriented consumers that rely on corporations that show them a big smile while really are intruders into their homes by their backdoor.
This last point is what really make happy corporative evangelists see: Ballmer`s happiness
If you don`t want to collaborate with this insane current reality be very careful in how and what you put inside your computer.
In next posts I will give you some practical advice to make your metadata not available to others.