#spy software for mobile
Explore tagged Tumblr posts
Text
SURVEILLANCE INVESTIGATION
Surveillance investigation has been crucial these days because we have analyze that there are so many cases comes to us about forgery and fraudulent. To be in a safe hand you should verify the information which is being provided to you by your employee or any person who wants to associate with you. Our investigation team is profoundly strong and expert to provide the best investigation services in town.
0 notes
Text
Mobile spy software is a tool designed to monitor and track smartphone activities, often used by parents, employers, or individuals concerned with security or productivity.
0 notes
Text
Unmatched Mobile Spy App for Complete Monitoring Solutions
ONEMONITAR’s Mobile Spy App offers comprehensive tracking tools for calls, messages, and apps. Monitor any phone with ease. Get started today with ONEMONITAR!
#mobile spy app#mobile spy application#mobile spy software#mobile spy tool#mobile spy apps#spy app for mobile#mobile spying app#spying app for mobiles
0 notes
Text
CHYLDMONITOR Mobile Spy for Android
Get CHYLDMONITOR, the ultimate mobile spy solution tailored for Android devices. Seamlessly monitor phone activities, including call logs, messages, and app usage, all from a centralized control panel. With CHYLDMONITOR, you can ensure the safety of your children or enhance employee productivity by keeping an eye on their digital interactions. Experience top-notch Android monitoring today.
Protect and monitor effectively. Download CHYLDMONITOR for Android!
#mobile spy app#mobile spy software#mobile spy for android#mobile spy download#mobile spy without access to phone#mobile spy app hidden#mobile spy app undetectable#mobile spy parental control#mobile spy app with GPS tracking#mobile spy app features
0 notes
Text
Unlocking Family Safety: A Step-by-Step Guide to Activating Google Family Link on Android with SpymasterPro
In the present advanced age, guaranteeing the wellbeing of our friends and family, particularly kids, in the web-based domain is principal.
#wife tracker#cell phone monitoring software#cell spy#whatsapp tracking app#cheating wife on phone#whatsapp tracker#iphone spy#whatsapp spy app#mobile monitoring#spymasterpro
0 notes
Text
Subprime gadgets
I'm on tour with my new, nationally bestselling novel The Bezzle! Catch me THIS SUNDAY in ANAHEIM at WONDERCON: YA Fantasy, Room 207, 10 a.m.; Signing, 11 a.m.; Teaching Writing, 2 p.m., Room 213CD.
The promise of feudal security: "Surrender control over your digital life so that we, the wise, giant corporation, can ensure that you aren't tricked into catastrophic blunders that expose you to harm":
https://locusmag.com/2021/01/cory-doctorow-neofeudalism-and-the-digital-manor/
The tech giant is a feudal warlord whose platform is a fortress; move into the fortress and the warlord will defend you against the bandits roaming the lawless land beyond its walls.
That's the promise, here's the failure: What happens when the warlord decides to attack you? If a tech giant decides to do something that harms you, the fortress becomes a prison and the thick walls keep you in.
Apple does this all the time: "click this box and we will use our control over our platform to stop Facebook from spying on you" (Ios as fortress). "No matter what box you click, we will spy on you and because we control which apps you can install, we can stop you from blocking our spying" (Ios as prison):
https://pluralistic.net/2022/11/14/luxury-surveillance/#liar-liar
But it's not just Apple – any corporation that arrogates to itself the right to override your own choices about your technology will eventually yield to temptation, using that veto to help itself at your expense:
https://pluralistic.net/2023/07/28/microincentives-and-enshittification/
Once the corporation puts the gun on the mantelpiece in Act One, they're begging their KPI-obsessed managers to take it down and shoot you in the head with it in anticipation of of their annual Act Three performance review:
https://pluralistic.net/2023/12/08/playstationed/#tyler-james-hill
One particularly pernicious form of control is "trusted computing" and its handmaiden, "remote attestation." Broadly, this is when a device is designed to gather information about how it is configured and to send verifiable testaments about that configuration to third parties, even if you want to lie to those people:
https://www.eff.org/deeplinks/2023/08/your-computer-should-say-what-you-tell-it-say-1
New HP printers are designed to continuously monitor how you use them – and data-mine the documents you print for marketing data. You have to hand over a credit-card in order to use them, and HP reserves the right to fine you if your printer is unreachable, which would frustrate their ability to spy on you and charge you rent:
https://arstechnica.com/gadgets/2024/02/hp-wants-you-to-pay-up-to-36-month-to-rent-a-printer-that-it-monitors/
Under normal circumstances, this technological attack would prompt a defense, like an aftermarket mod that prevents your printer's computer from monitoring you. This is "adversarial interoperability," a once-common technological move:
https://www.eff.org/deeplinks/2019/10/adversarial-interoperability
An adversarial interoperator seeking to protect HP printer users from HP could gin up fake telemetry to send to HP, so they wouldn't be able to tell that you'd seized the means of computation, triggering fines charged to your credit card.
Enter remote attestation: if HP can create a sealed "trusted platform module" or a (less reliable) "secure enclave" that gathers and cryptographically signs information about which software your printer is running, HP can detect when you have modified it. They can force your printer to rat you out – to spill your secrets to your enemy.
Remote attestation is already a reliable feature of mobile platforms, allowing agencies and corporations whose services you use to make sure that you're perfectly defenseless – not blocking ads or tracking, or doing anything else that shifts power from them to you – before they agree to communicate with your device.
What's more, these "trusted computing" systems aren't just technological impediments to your digital wellbeing – they also carry the force of law. Under Section 1201 of the Digital Millennium Copyright Act, these snitch-chips are "an effective means of access control" which means that anyone who helps you bypass them faces a $500,000 fine and a five-year prison sentence for a first offense.
Feudal security builds fortresses out of trusted computing and remote attestation and promises to use them to defend you from marauders. Remote attestation lets them determine whether your device has been compromised by someone seeking to harm you – it gives them a reliable testament about your device's configuration even if your device has been poisoned by bandits:
https://pluralistic.net/2020/12/05/trusting-trust/#thompsons-devil
The fact that you can't override your computer's remote attestations means that you can't be tricked into doing so. That's a part of your computer that belongs to the manufacturer, not you, and it only takes orders from its owner. So long as the benevolent dictator remains benevolent, this is a protective against your own lapses, follies and missteps. But if the corporate warlord turns bandit, this makes you powerless to stop them from devouring you whole.
With that out of the way, let's talk about debt.
Debt is a normal feature of any economy, but today's debt plays a different role from the normal debt that characterized life before wages stagnated and inequality skyrocketed. 40 years ago, neoliberalism – with its assaults on unions and regulations – kicked off a multigenerational process of taking wealth away from working people to make the rich richer.
Have you ever watched a genius pickpocket like Apollo Robbins work? When Robins lifts your wristwatch, he curls his fingers around your wrist, expertly adding pressure to simulate the effect of a watchband, even as he takes away your watch. Then, he gradually releases his grip, so slowly that you don't even notice:
https://www.reddit.com/r/nextfuckinglevel/comments/ppqjya/apollo_robbins_a_master_pickpocket_effortlessly/
For the wealthy to successfully impoverish the rest of us, they had to provide something that made us feel like we were still doing OK, even as they stole our wages, our savings, and our futures. So, even as they shipped our jobs overseas in search of weak environmental laws and weaker labor protection, they shared some of the savings with us, letting us buy more with less. But if your wages keep stagnating, it doesn't matter how cheap a big-screen TV gets, because you're tapped out.
So in tandem with cheap goods from overseas sweatshops, we got easy credit: access to debt. As wages fell, debt rose up to fill the gap. For a while, it's felt OK. Your wages might be falling off, the cost of health care and university might be skyrocketing, but everything was getting cheaper, it was so easy to borrow, and your principal asset – your family home – was going up in value, too.
This period was a "bezzle," John Kenneth Galbraith's name for "The magic interval when a confidence trickster knows he has the money he has appropriated but the victim does not yet understand that he has lost it." It's the moment after Apollo Robbins has your watch but before you notice it's gone. In that moment, both you and Robbins feel like you have a watch – the world's supply of watch-derived happiness actually goes up for a moment.
There's a natural limit to debt-fueled consumption: as Michael Hudson says, "debts that can't be paid, won't be paid." Once the debtor owes more than they can pay back – or even service – creditors become less willing to advance credit to them. Worse, they start to demand the right to liquidate the debtor's assets. That can trigger some pretty intense political instability, especially when the only substantial asset most debtors own is the roof over their heads:
https://pluralistic.net/2022/11/06/the-end-of-the-road-to-serfdom/
"Debts that can't be paid, won't be paid," but that doesn't stop creditors from trying to get blood from our stones. As more of us became bankrupt, the bankruptcy system was gutted, turned into a punitive measure designed to terrorize people into continuing to pay down their debts long past the point where they can reasonably do so:
https://pluralistic.net/2022/10/09/bankruptcy-protects-fake-people-brutalizes-real-ones/
Enter "subprime" – loans advanced to people who stand no meaningful chance of every paying them back. We all remember the subprime housing bubble, in which complex and deceptive mortgages were extended to borrowers on the promise that they could either flip or remortgage their house before the subprime mortgages detonated when their "teaser rates" expired and the price of staying in your home doubled or tripled.
Subprime housing loans were extended on the belief that people would meekly render themselves homeless once the music stopped, forfeiting all the money they'd plowed into their homes because the contract said they had to. For a brief minute there, it looked like there would be a rebellion against mass foreclosure, but then Obama and Timothy Geithner decreed that millions of Americans would have to lose their homes to "foam the runways" for the banks:
https://wallstreetonparade.com/2012/08/how-treasury-secretary-geithner-foamed-the-runways-with-childrens-shattered-lives/
That's one way to run a subprime shop: offer predatory loans to people who can't afford them and then confiscate their assets when they – inevitably – fail to pay their debts off.
But there's another form of subprime, familiar to loan sharks through the ages: lend money at punitive interest rates, such that the borrower can never repay the debt, and then terrorize the borrower into making payments for as long as possible. Do this right and the borrower will pay you several times the value of the loan, and still owe you a bundle. If the borrower ever earns anything, you'll have a claim on it. Think of Americans who borrowed $79,000 to go to university, paid back $190,000 and still owe $236,000:
https://pluralistic.net/2020/12/04/kawaski-trawick/#strike-debt
This kind of loan-sharking is profitable, but labor-intensive. It requires that the debtor make payments they fundamentally can't afford. The usurer needs to get their straw right down into the very bottom of the borrower's milkshake and suck up every drop. You need to convince the debtor to sell their wedding ring, then dip into their kid's college fund, then steal their father's coin collection, and, then break into cars to steal the stereos. It takes a lot of person-to-person work to keep your sucker sufficiently motivated to do all that.
This is where digital meets subprime. There's $1T worth of subprime car-loans in America. These are pure predation: the lender sells a beater to a mark, offering a low down-payment loan with a low initial interest rate. The borrower makes payments at that rate for a couple of months, but then the rate blows up to more than they can afford.
Trusted computing makes this marginal racket into a serious industry. First, there's the ability of the car to narc you out to the repo man by reporting on its location. Tesla does one better: if you get behind in your payments, your Tesla immobilizes itself and phones home, waits for the repo man to come to the parking lot, then it backs itself out of the spot while honking its horn and flashing its lights:
https://tiremeetsroad.com/2021/03/18/tesla-allegedly-remotely-unlocks-model-3-owners-car-uses-smart-summon-to-help-repo-agent/
That immobilization trick shows how a canny subprime car-lender can combine the two kinds of subprime: they can secure the loan against an asset (the car), but also coerce borrowers into prioritizing repayment over other necessities of life. After your car immobilizes itself, you just might decide to call the dealership and put down your credit card, even if that means not being able to afford groceries or child support or rent.
One thing we can say about digital tools: they're flexible. Any sadistic motivational technique a lender can dream up, a computerized device can execute. The subprime car market relies on a spectrum of coercive tactics: cars that immobilize themselves, sure, but how about cars that turn on their speakers to max and blare a continuous recording telling you that you're a deadbeat and demanding payment?
https://archive.nytimes.com/dealbook.nytimes.com/2014/09/24/miss-a-payment-good-luck-moving-that-car/
The more a subprime lender can rely on a gadget to torment you on their behalf, the more loans they can issue. Here, at last, is a form of automation-driven mass unemployment: normally, an economy that has been fully captured by wealthy oligarchs needs squadrons of cruel arm-breakers to convince the plebs to prioritize debt service over survival. The infinitely flexible, tireless digital arm-breakers enabled by trusted computing have deprived all of those skilled torturers of their rightful employment:
https://pluralistic.net/2021/04/02/innovation-unlocks-markets/#digital-arm-breakers
The world leader in trusted computing isn't cars, though – it's phones. Long before anyone figured out how to make a car take orders from its manufacturer over the objections of its driver, Apple and Google were inventing "curating computing" whose app stores determined which software you could run and how you could run it.
Back in 2021, Indian subprime lenders hit on the strategy of securing their loans by loading borrowers' phones up with digital arm-breaking software:
https://restofworld.org/2021/loans-that-hijack-your-phone-are-coming-to-india/
The software would gather statistics on your app usage. When you missed a payment, the phone would block you from accessing your most frequently used app. If that didn't motivate you to pay, you'd lose your second-most favorite app, then your third, fourth, etc.
This kind of digital arm-breaking is only possible if your phone is designed to prioritize remote instructions – from the manufacturer and its app makers – over your own. It also only works if the digital arm-breaking company can confirm that you haven't jailbroken your phone, which might allow you to send fake data back saying that your apps have been disabled, while you continue to use those apps. In other words, this kind of digital sadism only works if you've got trusted computing and remote attestation.
Enter "Device Lock Controller," an app that comes pre-installed on some Google Pixel phones. To quote from the app's description: "Device Lock Controller enables device management for credit providers. Your provider can remotely restrict access to your device if you don't make payments":
https://lemmy.world/post/13359866
Google's pitch to Android users is that their "walled garden" is a fortress that keeps people who want to do bad things to you from reaching you. But they're pre-installing software that turns the fortress into a prison that you can't escape if they decide to let someone come after you.
There's a certain kind of economist who looks at these forms of automated, fine-grained punishments and sees nothing but a tool for producing an "efficient market" in debt. For them, the ability to automate arm-breaking results in loans being offered to good, hardworking people who would otherwise be deprived of credit, because lenders will judge that these borrowers can be "incentivized" into continuing payments even to the point of total destitution.
This is classic efficient market hypothesis brain worms, the kind of cognitive dead-end that you arrive at when you conceive of people in purely economic terms, without considering the power relationships between them. It's a dead end you navigate to if you only think about things as they are today – vast numbers of indebted people who command fewer assets and lower wages than at any time since WWII – and treat this as a "natural" state: "how can these poors expect to be offered more debt unless they agree to have their all-important pocket computers booby-trapped?"
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/03/29/boobytrap/#device-lock-controller
Image: Oatsy (modified) https://www.flickr.com/photos/oatsy40/21647688003
CC BY 2.0 https://creativecommons.org/licenses/by/2.0/
#pluralistic#debt#subprime#armbreakers#mobile#google#android#apps#drm#technological self-determination#efficient market hypothesis brainworms#law and political economy#gadgets#boobytraps#app stores#curated computing#og app#trusted computing
229 notes
·
View notes
Note
After seeing your weatherbugapp reblog i installed duckduckgo and tried it.
I don't know much about technology tbh but i downloaded this app less than 30 mins ago and in that time google tried to track me 112 times?? And they tried to collect finger prints? And my first and last name? And my gender? And my country, state and city? My gps coordinates? My postal code? My network carrier? My fricking battery level for whatever reason? Can you please tell me if this is normal at all, because i'm freaking out right now. I just turned 18 and started using mobile banking and stuff and this shit scares me
Why tf does it need to know my screen density???my system volume????my charging status????? What tf are they cooking
Now it's at 476 tracking attempts bro???? barely 5 mins passed.....
I condensed your three asks into one for readability!
And yeah, I'm very far from an expert about any of this, but as far as I know that's just. Normal. That's the normal amount of spying they're doing on your phone. I assume the numbers we see are to some extent because having been foiled, a lot of these scripts try repeatedly, since I can't imagine what use thousands of trackers per phone would be even to the great aggregators.
Tracking the phone stuff like screen resolution and battery level is because (apart from that definitely not being considered remotely 'private' so it's Free Real Estate) in aggregate that data can be used to track what phone use patterns are like on a demographic scale and therefore. Where the smart money is.
Almost all of this is getting sold in bulk for ad targeting and market analysis. This does presumably make it very hard to notice when like. Actually important stuff is being spied on, which is why I feel better about Having Apps with the duckduckgo app blocker thing.
My bank's app reportedly sells data to a couple aggregators including Google. Not like, my banking info, but it's still so offensive on principle that I avoid using the app unless I have to, and force stop it afterward.
The patterns that show up on the weekly duckduckgo blocker report are interesting. Hoopla attempts about two orders of magnitude more tracking than Libby, which makes sense because they're a commercial streaming service libraries pay by the unit for access, while Libby is a content management software run by a corporation that values its certification as a 'B' company--that is, one invested in the public good that can be trusted. The cleanness of their brand is a great deal of its value, so they have to care about their image and be a little more scrupulous.
Which doesn't mean not being a little bit spyware, because everything is spyware now. Something else I've noticed is that in terms of free game apps, the polished professional stuff is now much more invasive than the random kinda janky thing someone just threw together.
Back in the day you tended to expect the opposite, because spyware was a marginal shifty profit-margin with too narrow a revenue stream to be worth more to an established brand than their reputation, but now that everyone does it there's not a lot of reputation cost and refraining would be sacrificing a potential revenue stream, which is Irresponsible Conduct for a corporation.
While meanwhile 'developing a free game app to put on the game store' is something a person can do for free with the hardware they already have for home use, as a hobby or practice or to put on their coding resume. So while such apps absolutely can be malicious and more dangerous when they are than The Big Brand, they can also be neutral in a way commercial stuff no longer is. Wild world.
But yeah for the most part as far as I can make out, these are just The Commercial Panopticon, operating as intended. It's gross but it probably doesn't indicate anything dangerous on an individual level.
54 notes
·
View notes
Text
crowdstrike: hot take 1
It's too early in the news cycle to say anything truly smart, but to sum things up, what I know so far:
there was no "hack" or cyberattack or data breach*
a private IT security company called CrowdStrike released a faulty update which practically disabled all its desktop (?) Windows workstations (laptops too, but maybe not servers? not sure)
the cause has been found and a fix is on the way
as it stands now, the fix will have to be manually applied (in person) to each affected workstation (this could mean in practice maybe 5, maybe 30 minutes of work for each affected computer - the number is also unknown, but it very well could be tens (or hundreds) of thousands of computers across thousands of large, multinational enterprises.
(The fix can be applied manually if you have a-bit-more-than-basic knowledge of computers)
Things that are currently safe to assume:
this wasn't a fault of any single individual, but of a process (workflow on the side of CrowdStrike) that didn't detect the fault ahead of time
[most likely] it's not that someone was incompetent or stupid - but we don't have the root cause analysis available yet
deploying bugfixes on Fridays is a bad idea
*The obligatory warning part:
Just because this wasn't a cyberattack, doesn't mean there won't be related security breaches of all kinds in all industries. The chaos, panic, uncertainty, and very soon also exhaustion of people dealing with the fallout of the issue will create a perfect storm for actually malicious actors that will try to exploit any possible vulnerability in companies' vulnerable state.
The analysis / speculation part:
globalization bad lol
OK, more seriously: I have not even heard about CrowdStrike until today, and I'm not a security engineer. I'm a developer with mild to moderate (outsider) understanding of vulnerabilities.
OK some background / basics first
It's very common for companies of any size to have more to protect their digital assets than just an antivirus and a firewall. Large companies (Delta Airlines) can afford to pay other large companies to provide security solutions for them (CrowdStrike). These days, to avoid bad software of any kind - malware - you need a complex suite of software that protects you from all sides:
desktop/laptop: antivirus, firewall, secure DNS, avoiding insecure WiFi, browser exploits, system patches, email scanner, phishing on web, phishing via email, physical access, USB thumb drive, motherboard/BIOS/UEFI vulnerabilities or built-in exploits made by the manufacturers of the Chinese government,
person/phone: phishing via SMS, phishing via calls, iOS/Android OS vulnerabilities, mobile app vulnerabilities, mobile apps that masquerade as useful while harvesting your data, vulnerabilities in things like WhatsApp where a glitched JPG pictures sent to you can expose your data, ...
servers: mostly same as above except they servers have to often deal with millions of requests per day, most of them valid, and at least some of the servers need to be connected to the internet 24/7
CDN and cloud services: fundamentally, an average big company today relies on dozens or hundreds of other big internet companies (AWS / Azure / GCP / Apple / Google) which in turn rely on hundreds of other companies to outsource a lot of tasks (like harvesting your data and sending you marketing emails)
infrastructure - routers... modems... your Alexa is spying on you... i'm tired... etc.
Anyway if you drifted to sleep in the previous paragraph I don't blame you. I'm genuinely just scratching the surface. Cybersecurity is insanely important today, and it's insanely complex too.
The reason why the incident blue-screened the machines is that to avoid malware, a lot of the anti-malware has to run in a more "privileged" mode, meaning they exist very close to the "heart" of Windows (or any other OS - the heart is called kernel). However, on this level, a bug can crash the system a lot more easily. And it did.
OK OK the actual hot lukewarm take finally
I didn't expect to get hit by y2k bug in the middle of 2024, but here we are.
As bad as it was, this only affected a small portion of all computers - in the ballpark of ~0.001% or even 0.0001% - but already caused disruptions to flights and hospitals in a big chunk of the world.
maybe-FAQ:
"Oh but this would be avoided if they weren't using the Crowdwhatever software" - true. However, this kind of mistake is not exclusive to them.
"Haha windows sucks, Linux 4eva" - I mean. Yeah? But no. Conceptually there is nothing that would prevent this from happening on Linux, if only there was anyone actually using it (on desktop).
"But really, Windows should have a better protection" - yes? no? This is a very difficult, technical question, because for kernel drivers the whole point is that 1. you trust them, and 2. they need the super-powerful-unrestrained access to work as intended, and 3. you _need_ them to be blazing fast, so babysitting them from the Windows perspective is counterproductive. It's a technical issue with no easy answers on this level.
"But there was some issue with Microsoft stuff too." - yes, but it's unknown if they are related, and at this point I have not seen any solid info about it.
The point is, in a deeply interconnected world, it's sort of a miracle that this isn't happening more often, and on a wider scale. Both bugfixes and new bugs are deployed every minute to some software somewhere in the world, because we're all in a rush to make money and pay rent and meet deadlines.
Increased monoculture in IT is bad for everyone. Whichever OS, whichever brand, whichever security solution provider - the more popular they are, the better visible their mistakes will be.
As much as it would be fun to make jokes like "CrowdStroke", I'm not even particularly mad at the company (at this point - that might change when I hear about their QA process). And no, I'm not even mad at Windows, as explained in the pseudo-FAQ.
The ultimate hot take? If at all possible, don't rely on anything related to computers. Technical problems are caused by technical solutions.
#crowdstrike#cybersecurity#anyway i'm microdosing today so it's probably too boring to read#but hopefully it at least mostly made sense#to be honest I wanted to have more of a hot take#but the truth is mundane
73 notes
·
View notes
Text
The tech industry is a huge part of the Israeli economy (accounting for 50% of Israel's exports) and the Israeli government loves their tech sector because it's been indelibly married with their larger military industry complex. Many of the high-tech surveillance and security systems monitoring the Gaza wall, for example, are the product of Israel's massive tech-sector, and all that is for sale to the highest bidder.
So hearing Israel be audibly anxious about how mobilizing a huge swath of their citizenry for ethnic cleansing is hurting their economy, their precious tech sector in particular, fills me with only the pettiest schadenfreude.
But the anti-capitalist in me is also mesmerized by this new portrait of dystopia Israel has dropped. That of the citizen-soldier that must also continue to work part-time while soldiering:
Early on in the war, Raz [a software engineer] was at his base within a few miles of the border with Gaza preparing for a mission, while simultaneously talking on his phone with an overseas customer about a software project. "I had to juggle between those two," recalls Raz, sitting in his company's glass-walled office with a view of the Mediterranean Sea in the distance. "I remember it being super, super hard." Israeli aircraft were firing guns overhead while Raz was talking business with a client. "One of the customers asked, 'What's this noise?' and I had to explain that this is shooting sounds," Raz recalls.
It's like being an "essential worker" but instead of COVID it's a goddamn war. You could write an entire book about the absurd concept of a soldier being force to juggle his job in a warzone for the sake of the economy.
The tech sector in Israel builds a huge number of military and intelligence (i.e. spying) systems, which they export to other countries. It's such a vital part of Israel's entire economy that the IDF is actively pulling back soldiers to lessen the burden on their workforce.
Israel's own economic anxiety has done more to temper their war crimes than international pressure has so far managed.
#also it's just frustrating to read this NPR article and how it doesn't really interrogate anything in it#when they're usually a bit more critical in their usual Israel coverage#NPR#Big Tech#Israel Hamas War#IDF#Israeli Government#Israeli Apartheid#Capitalism#also just hearing an Israel soldier about how ''super super hard'' his job is though I couldn't resist muttering:#Gosh that must be so *DiFfIcULt* for you I'm sowwy.#🙄
9 notes
·
View notes
Text
Opposition MPs expressed dismay after the Prosecution Office of the Greek Supreme Court on Tuesday concluded that no state ministry or agency had used illegal Predator spy software, or any other surveillance software.
“There was absolutely no involvement with the spy software Predator or any other similar software by a state agency, namely the National Intelligence Service (EYP), the Anti-Terrorist unit (D.A.E.E.B.) and more generally the Ministry of Citizens Protection or any government official,” Supreme Court Prosecutor Georgia Adeilini said.
Provisions lifting the privacy of communications issued by Vasiliki Vlachou, Prosecutor of the EYP for 2020-2024, followed the procedure provided by Greek law, the court said.
However, the court said that there were sufficient grounds “for the initiation of criminal prosecution … against certain legal representatives and beneficial owners of companies for criminal acts, such as the violation of the privacy of telephone communication.” These companies, it said, had been involved in violating the privacy of telephone communications of politicians, journalists and others in other countries as well, combined with similar “targets” in Greece.
Opposition leaders reacted with disappointment.
“Today … my confidence in the Greek justice system has been seriously shaken. Unfortunately, this now coincides with the widespread feeling of the Greek people that justice is not the last refuge of the wronged,” wrote the leader of the left-wing SYRIZA party, Stefanos Kasselakis, on social media.
The preliminary examination into the wiretapping case lasted two years and more than 40 witnesses were examined.
They included politicians, journalists, representatives of mobile phone companies, Commanders, Deputy Commanders and other members of the National Intelligence Service, EYP, members of the Greek Authority for Communication Security and Privacy (ADAE) and the National Transparency Authority, NTA, senior police officers, the Intelligence Management and Analysis Directorate, the Finance Directorate as well as the Electronic Crime Prosecution Directorate.
Grigoris Dimitriadis, nephew and former secretary of Prime Minister Kyriakos Mitsotakis, resigned in August 2022 over revelations of alleged involvement with Intellexa, a company that sells Predator in Greece. He denied wrongdoing and sued the media involved in the reports – Reporters United, Efimerida ton Syntakton, as well as the journalist Thanasis Koukakis, whose phone had been infected with Predator. His resignation was followed by that of the then head of the EYP, Panagiotis Kontoleon.
The wiretapping scandal, known as Predator Gate, or the Greek Watergate, and which has occupied the Greek media since 2022, concerns the use of Predator to monitor or attempt to monitor journalists, politicians and other public figures.
The New York Times suggested that the simultaneous tapping of a victim’s phone by the EYP and its Predator infection “indicate that the spy service, and whoever implanted the spyware, were working hand in hand”.
3 notes
·
View notes
Text
https://alliancedetectiveagency.com/spy-agencies-in-delhi/
Buy Spy Gadgets- Camera & software
Alliance Detective provides Spy Camera to our Clients better than market in quality and price. Spy camera or security camera is a still or video camera used to record people without their knowledge. The term spy camera is generally used when the subject would normally be expected to object to being recorded as an invasion of their privacy.
0 notes
Text
ChyldMonitor is a powerful mobile spy app designed for parents who want to ensure their children’s safety in today’s digital world. With comprehensive features like real-time location tracking, social media monitoring, and access to call logs and messages, ChyldMonitor gives parents the ability to keep a close eye on their kids’ online and offline activities.
0 notes
Text
Introducing ONEMONITAR: Your Smart Solution to Managing Phone Use!
Empower yourself with ONEMONITAR’s insights into device usage, helping you make informed choices. By reducing stress, improving focus, and minimizing distractions, ONEMONITAR encourages balanced phone habits for personal growth. Block unnecessary apps or sites to stay focused on what matters most. Whether for personal use or parental control, ONEMONITAR helps you stay informed and in control.
Stay mindful and productive with ONEMONITAR today!
For more information, contact us at +91 9811 004 008 or visit www.onemonitar.com.
#phone spy software#android spy app#mobile spy software#parental control app#employee monitoring app#spy app for mobile monitoring
0 notes
Text
Why is Brazil’s Spy Agency ABIN Under Investigation?
Brazil’s main intelligence agency is accused of illegally spying on politicians and high-ranking judges who criticized former president Jair Bolsonaro, according to documents unsealed by the Supreme Court in January 2024. Three Supreme Court justices are among those allegedly targeted by Agência Brasileira de Inteligência (ABIN).
According to a police statement, their investigations under Operation Last Mile indicate a "criminal group" created "a parallel structure within the Brazilian Intelligence Agency (ABIN) and used its tools and services for illicit acts, producing information for political and media purposes, for personal gain and to interfere in federal police investigations".
Police allege that the rogue intelligence operatives illegally monitored public authorities and others using mobile device geolocation tools without judicial authorization. The name ‘Operation Last Mile’ is reportedly a reference to FirstMile software, developed by Israel’s Cognyte to track cell phones and geolocation data.
Police have so far searched the home and offices of Congressman Alexandre Ramagem, a former spymaster under ex-president Jair Bolsonaro who served from 2019 to 2022. ABIN’s former chief denied any wrongdoing and called the allegations politically motivated.
Continue reading.
7 notes
·
View notes
Text
Track My Wife Phone
Not only you but there are many who get cheated on by their wife and keep wondering how I can track my wife phone. Many times, traditional Cheating wife trackers are used to catch a cheating spouse either by listening to their calls or checking their messages secretly.
#cell phone monitoring software#whatsapp tracker#wife tracker#iphone spy#mobile monitoring#cheating wife on phone#whatsapp tracking app#whatsapp spy app#cell spy#spymasterpro
0 notes
Text
We should ban TikTok('s surveillance)
With the RESTRICT Act, Congress is proposing to continue Trump’s war on Tiktok, enacting a US ban on the Chinese-owned service. How will they do this? Congress isn’t clear. In practice, banning stuff on the internet is hard, especially if you don’t have a national firewall:
https://doctorow.medium.com/theyre-still-trying-to-ban-cryptography-33aa668dc602
If you’d like an essay-formatted version of this post to read or share, here’s a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2023/03/30/tik-tok-tow/#good-politics-for-electoral-victories
My guess is that they’re thinking of ordering the mobile duopoly of Google and Apple to nuke the Tiktok app from their app stores. That’s how they do it in China, after all: when China wanted to ban VPNs and other privacy tools, they just ordered Apple to remove them from the App Store, and Apple rolled over:
https://pluralistic.net/2022/11/11/foreseeable-consequences/#airdropped
That’s the completely foreseeable consequence of arrogating the power to decide which software every mobile user on earth is entitled to use — as Google and Apple have done. Once you put that gun on the mantelpiece in Act I, you damn betcha that some strong-man backed by a powerful state is going to come along and shoot it by Act III.
The same goes for commercial surveillance: once you collect massive, nonconsensual dossiers on every technology user alive, you don’t get to act surprised when cops and spies show up and order your company to serve as deputies for a massive, off-the-books warrantless surveillance project.
Hell, a cynic might even say that commercial surveillance companies are betting on this. The surveillance public-private partnership is a vicious cycle: corporations let cops and spies plunder our data; then the cops and spies lobby against privacy laws that would prevent these corporations from spying on us:
https://pluralistic.net/2023/01/25/nationalize-moderna/#hun-sen
Which makes the RESTRICT Act an especially foolish project. If the Chinese state wants to procure data on Americans, it need not convince us to install Tiktok. It can simply plunk down a credit card with any of the many unregulated data-brokers who feed the American tech giants the dossiers that the NSA and local cops rely on.
Every American tech giant is at least as bad for privacy as Tiktok is — yes, even Apple. Sure, Apple lets its users block Facebook spying with a single tap — but even if you opt out of “tracking,” Apple still secretly gathers exactly the same kinds of data as Facebook, and uses it to power its own ad product:
https://pluralistic.net/2022/11/14/luxury-surveillance/#liar-liar
There is no such thing as a privacy-respecting tech giant. Long before Apple plastered our cities with lying billboards proclaiming its reverence for privacy, Microsoft positioned itself as the non-spying alternative to Google, which would be great, except Microsoft spies on hundreds of millions of people and sells the data:
https://pluralistic.net/2020/11/25/the-peoples-amazon/#clippys-revenge
Tech’s surveillance addiction means that Tiktok’s own alternative to the RESTRICT Act is also unbelievably stupid. The company has proposed to put itself under Oracle’s supervision, letting Oracle host its data and audit its code. You know, Oracle, the company that built the Great Firewall of China 1.0:
https://www.eff.org/deeplinks/2010/01/selling-china-surveillance
We should not trust Tiktok any more than we trust Apple, Facebook, Google or Microsoft. Tiktok lied about whether it was sending data to China before:
https://www.buzzfeednews.com/article/emilybakerwhite/tiktok-tapes-us-user-data-china-bytedance-access
And even if it keeps its promise not to send user data to China, that promise is meaningless — it can still send the vectors and models it creates with that data to China — these being far more useful for things like disinformation campaigns and population-scale inferences than the mere logs from your Tiktok sessions.
There are so many potentially harmful ways to process commercial surveillance data that trying to enumerate all the things that a corporation is allowed to do with the data it extracts from us is a fool’s errand. Instead, we should ban companies from spying on us, whether they are Chinese or American.
Corporations are remorseless, paperclip-maximizing colony organisms that perceive us as inconvenient gut-flora, and they lack any executive function (as do their “executives”), and they cannot self-regulate. To keep corporations from harming us, we must make it illegal for them to enact harm, and punish them when they break the law:
https://doctorow.medium.com/small-government-fd5870a9462e
After all, the problem with Tiktok isn’t the delightful videos or the fact that it’s teaching a generation of children to be expert sound- and video-editors. The problem with Tiktok is that it spies on us. Just like the problem with Facebook isn’t that it lets us communicate with our friends, and the problem with Google isn’t that it operates a search engine.
Now, these companies will tell you that the two can’t be separated, that a bearded prophet came down off a mountain with two stone tablets, intoning, “Larry, Sergey, thou shalt stop rotating thine logfiles and, lo, thou wilt data-mine them for actionable market intelligence.” But it’s nonsense. Google ran for years without surveillance. Facebook billed itself as the privacy-forward alternative to Myspace and promised never to spy on us:
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3247362
The inevitabilist narrative that says that corporations must violate our rights in order to make the products we love is unadulterated Mr Gotcha nonsense: “Yet you participate in society. Curious. I am very intelligent”:
https://thenib.com/mister-gotcha/
Of course, corporations push this narrative all the time, which is why American Big Tech has been quietly supporting a ban on Tiktok, which (coincidentally) has managed to gain a foothold in the otherwise impregnable, decaying, enshittified oligarchy that US companies have created.
They have conspicuously failed to call for any kind of working solution, like a federal privacy law that would ban commercial surveillance, and extend a “private right of action,” so people could sue tech giants and data-brokers who violated the law, without having to convince a regulator, DA or Attorney General to bestir themselves:
https://www.eff.org/deeplinks/2019/01/you-should-have-right-sue-companies-violate-your-privacy
Instead, the tech giants have the incredible gall to characterize themselves as the defenders of our privacy — at least, so long as the Chinese government is the adversary, and so long as its privacy violations come via an app, and not buy handing a credit card to the data-brokers that are the soil bacteria that keeps Big Tech’s ecosystem circulating. In the upside-down land of Big Tech lobbying, privacy is a benefit of monopoly — not something we have to smash monopolies to attain:
https://www.eff.org/wp/interoperability-and-privacy
Not everyone in Congress is onboard with the RESTRICT Act. AOC has come out for a federal privacy law that applies to all companies, rather than a ban on an app that tens of millions of young Americans love:
https://www.businessinsider.com/aoc-first-tiktok-congress-ban-without-being-clued-in-2023-3
You know who agrees with AOC? Rand Paul. Yes, that absolute piece of shit. Paul told his caucusmates in the GOP that banning an app that millions of young American voters love is bad electoral politics. This fact is so obvious that even Rand fucking Paul can understand it:
https://gizmodo.com/rand-paul-opposes-tiktok-ban-warns-republicans-1850278167
Paul is absolutely right to call a Tiktok ban a “national strategy to permanently lose elections for a generation.” The Democrats should listen to him, because the GOP won’t. As between the two parties, the GOP is far more in thrall to the Chamber of Commerce and the rest of the business lobby. They are never going to back a policy that’s as good for the people and as bad for big business as a federal privacy law.
The Democrats have the opportunity to position themselves as “the party that wants to keep Tiktok but force it to stop being creepy, along with all the other tech companies,” while the GOP positions itself as “the party of angry technophobes who want to make sure that any fun you have is closely monitored by Mark Zuckerberg, Sundar Pinchai and Tim Cook and their pale imitations of the things you love about Tiktok.”
That’s not just good electoral politics — it’s good policy. Young voters aren’t going to turn out to the polls for performative Cold War 2.0 nonsense, but they will be pissed as hell at whoever takes away their Tiktok.
And if you do care about Cold War 2.0, then you should be banning surveillance, not Tiktok; the Chinese government has plenty of US dollars at its disposal to spend in America’s freewheeling, unregulated data markets — as do criminals, petty and organized, and every other nation-state adversary of the USA.
The RESTRICT Act is a garbage law straight out of the Clinton era, a kind of King Canute decree that goes so far as to potentially prohibit the use of VPNs to circumvent its provisions. America doesn’t need a Great Firewall to keep itself safe from tech spying — it needs a privacy law.
Have you ever wanted to say thank you for these posts? Here’s how you can: I’m kickstarting the audiobook for my next novel, a post-cyberpunk anti-finance finance thriller about Silicon Valley scams called Red Team Blues. Amazon’s Audible refuses to carry my audiobooks because they’re DRM free, but crowdfunding makes them possible.
Image: Cryteria (modified) https://commons.wikimedia.org/wiki/File:HAL9000.svg
CC BY 3.0 https://creativecommons.org/licenses/by/3.0/deed.en
[Image ID: A modified vintage editorial cartoon. Uncle Sam peeks out over a 'frowning battlement' whose cannon-slots are filled with telescopes from which peer the red glaring eyes of HAL 9000 from '2001: A Space Odyssey.' Topping the battlements in a row are Uncle Sam and three business-suited figures with dollar-sign-bags for heads. The three dollar-bag men have corporate logos on their breasts: Facebook, Google, Apple. Standing on the strand below the battlements, peering up, is a forlorn figure with a Tiktok logo for a head. The fortress wall bears the words 'RESTRICT Act.']
#rand paul is right actually ugh ugh ugh#politics#oracle#restrict act#privacy#privacy without monopoly#tiktok#commercial surveillance#trade war#bytedance#apple#google#facebook#meta#usausausa#generational warfare#electoral strategy#pluralistic#aoc
116 notes
·
View notes