We've Moved! Visit our NEW FORUM to join the latest discussions. This is an archive of our previous conversations...

You can find the login page for the old forum here.
CHATPRIVACYDONATELOGINREGISTER
DMT-Nexus
FAQWIKIHEALTH & SAFETYARTATTITUDEACTIVE TOPICS
PREV12
suspicious iphone photo blocking Options
 
Aegle
#21 Posted : 7/31/2010 10:54:55 PM

Cloud Whisperer

Senior Member | Skills: South African botanicals, Mushroom cultivator, Changa enthusiast, Permaculture, Counselling, Photography, Writing

Posts: 1953
Joined: 05-Jan-2009
Last visit: 22-Jan-2020
Location: Amongst the clouds
Jbark

No worries... :b


Much Peace and Compassion
The Nexus Art Gallery | The Nexian | DMT Nexus Research | The Open Hyperspace Traveler Handbook

For small creatures such as we the vastness is bearable only through love.

The fate of our times is characterised by rationalisation and intellectualisation and, above all, by the disenchantment of the world.

Following a Path of Compassion and Heart
 

STS is a community for people interested in growing, preserving and researching botanical species, particularly those with remarkable therapeutic and/or psychoactive properties.
 
vovin
#22 Posted : 8/1/2010 9:56:21 PM

DMT-Nexus member

Senior Member | Skills: Prototype and Design Engineer amongst other things, Craftsman

Posts: 1072
Joined: 12-Feb-2009
Last visit: 18-Dec-2021
Location: Here with you but living in florida
I used to work for Qualcomm on the GPSOne project in the research department/ I wont go into detail and i am not a conspiracy nut or anything of the like but I will just say one thing If your freaked out you have a very good reason to be. Your cellphone sends allot more data than you can even imagine. And it CAN BE REMOTELY controlled. Via a force call. Meaning in the iphone I wouldnt put it beyond them to listen to everything you are saying if the phone is in earshot. They claim this is only used when people are hurt to assist 911........
If you don't sin, Jesus died for nothing.
 
ms_manic_minxx
#23 Posted : 8/2/2010 5:21:49 AM

DMT-Nexus member

Moderator

Posts: 1538
Joined: 24-Nov-2009
Last visit: 31-Aug-2024
$10 vintage grandma phones with giant buttons are the way to go. Pleased
Some things will come easy, some will be a test
 
Kisper
#24 Posted : 8/2/2010 12:30:27 PM

DMT-Nexus member


Posts: 17
Joined: 29-Sep-2009
Last visit: 16-Oct-2024
Location: Midwestern U.S.
ms_manic_minxx wrote:
$10 vintage grandma phones with giant buttons are the way to go. Pleased


You mean the satanically possessed variety? Razz
Isn't role-playing fun?
 
Touche Guevara
#25 Posted : 8/2/2010 12:59:15 PM
DMT-Nexus member


Posts: 595
Joined: 19-Aug-2009
Last visit: 30-Apr-2011
Other people experiencing similar symptoms?
http://forums.macrumors..../showthread.php?t=975769
 
Crystalito
#26 Posted : 8/2/2010 3:18:06 PM
DMT-Nexus member

Senior Member

Posts: 351
Joined: 25-Jul-2009
Last visit: 25-May-2016
Location: Europe
Some thoughts on the subject :

1) If i am a telephone company or whoever with the power to do so, and i start snooping around people (remote accessing of any of their data in any of their devices connected to any kind of network) , with the intention to keep those data on a file or to use it against them at a point, it would be counterproductive to alarm them in any way. Secrecy, not leaving traces and the element of surprise would be my utmost priority. Its of no use alarming/scaring someone, this makes them more suspicious and propably more carefull hence its counterproductive for anyone interested in cathing you redhanded.See? You already turned off your wi-fi! You used to have it on though, which brings us to the next point.

2) Sometimes people behave quite naively, whereas they know better: when people tend to "loosen up" and behave "casually" in such matters is that the "accidents" start to happen. This extents to many matters for example matters of privacy and online actions : People tend to get "over aquainted" with technology and with socialising through it that the phenomenon of "over-sharing" appears either by willingly providing data for almost public viewing, or unwillingly via storing sensitive material/information in places that can be accessed by third parties. Why put sensitive material in an iphone where a)propably material can be accessed by phone companies, they own the network, think about it for a moment b) has internet access and we all know that the most secure system is one that it OFFLINE ? Invest in a digital camera for sensitive material Smile.

Think of it for a moment: how much information does your phone have about you? If i could access it ,what could i learn about you? If the responce is "almost everything" then rethink your course of action. Same goes about your computer. For example in this thread you did not even blur or distort the phote you used to give us an example. Now,everyone interested knows the face of your son, knows that you have pot plants (!), and if one has physical or remote access to your phone or to the network might even have more information such as your address ,other hobbies of you ,you wife's/gf face/phonenumber/name etc. Scary isnt it? And whats best, what takes the top of the cake? If i was someone trying to gather information about you (from stalker to anyone interested in having info on you) i wouldnt even have to go for the famous dumpster diving, following you around or trying social engineering to obtain info. All the information is given generously and happily by their owners...Ah, where are the good ol' days where stalkers and secret services had the actually fun of digging for information? Nowadays, everyone can lightheartedly act as an informant on themselves Very happy.

The above are rather easy to forget,Information is easy and fun to share!...After all ,we live in a world full of friends, how could someone possibly harm us? Laughing

By the way, i am not saying that what you had was someone messing with your pics, propably it was a glitch. On the other hand, better safe than REALLY sorry! The above are not "textbook quality" paranoia and i am not fond of conspiracy theories at all : but they reamin well withing the realm of possibility and well within the power a phone company/ abilities of current technology.
 
Caen
#27 Posted : 8/2/2010 7:57:11 PM

O.o


Posts: 77
Joined: 09-May-2010
Last visit: 10-May-2013
Location: Hill Country
Gosh whatever happened to personal privacy.
I wonder if officials can use this type of data in court as evidence.
The most merciful thing in the world... is the inability of the human mind to correlate all its contents.
~H. P. Lovecraft~
 
Crystalito
#28 Posted : 8/3/2010 3:22:43 AM
DMT-Nexus member

Senior Member

Posts: 351
Joined: 25-Jul-2009
Last visit: 25-May-2016
Location: Europe
Quote:
Gosh whatever happened to personal privacy.


Nothing happened to it ,its status is unchanged, same as the status of "common sense": nonexistent when it matters the most.

Well, slowly but steadily it gets more..er. "Officialy nonexistent" meaning that laws may come up where they cancel privacy explicitly.

A good thing though is that privacy is also an individual issue : If i really want to keep some matters private i know how to do so, or at least make it quite difficult for those wanting to break it to do so. Many times ,the "privacy" many people speak about is just a "sense of privacy" with no real substance since they themselves dont take basic steps to protect it and ensure it at the best of their knowledge.

A golden rule pertaining to this thread is that every kind of communication or data storage involving at any stage a third party cannot be assumed to be foolproof as far as privacy goes,since someone else has the power to interfere. This pertains to : phones and communication using them, conventional mail, email ,internet in general etc.

A small example that may seem farfetched and paranoid : I never share sensitive information through phone, email, or mail.If i want to do so , i meet the other party in person. If in any time i was worried that the information is too sensitive or that someone could be wanting in on it (lets take it to the extreme), then cellular phones can be left at a room while we can talk far away from them.For the extra paranoid,or for the really sensitive information: make good arrangements beforehand and leave the cell phone at home like the good ol' days when you didnt have one Smile

Most of the times though for someone to take extreme measures or for an "opposing party" to go after you , you must be into ...big things/deep shit and if you are you know it and its almost intuitive that you will not share info through 3rd parties or that you will not carry your mobile phone to a critical meeting (location can be pinpointed easily).
 
PREV12
 
Users browsing this forum
Guest (2)

DMT-Nexus theme created by The Traveler
This page was generated in 0.023 seconds.