[Cryptography] Creepy correlation noted

Tom Mitchell mitch at niftyegg.com
Fri Jul 14 19:43:43 EDT 2017


On Fri, Jul 14, 2017 at 9:38 AM, Henry Baker <hbaker1 at pipeline.com> wrote:
> At 07:46 AM 7/13/2017, John Levine wrote:
>>In article <E1dVRn8-0007Xe-P9 at elasmtp-masked.atl.sa.earthlink.net> you write:
>>>So unless someone across the street is reporting my presence in real
>>>time, I'm pretty sure that my ISP is the culprit
...
>
> Even creepier: the correlation seems to also extend to my cellphone,

I fully doubt that this is happening... !
Correlation is not causality.  <--- this bit is important.

Could it happen... well I did buy a lottery ticket today.  <--- I do
believe in long shots.
In a context of risk if the law and hardware vendors allow this
feature set in future
infrastructure without  audit and consequence it might.  If it gets
too easy it will be abused.

I was once in an engineering meeting where the manager fought any audit of
his group's performance.   He was unwilling to allow anything that he was not
in full control of.  He was a master manipulator of his destiny.

This is in part where net neutrality laws can help if well structured.
  Abuses of net neutrality
for the last two to five miles depend on the same infrastructure that would
realize this creepy stuff and make it real and are likely the same.

Kafka would point out laws that solve one problem and create three
more bigger ones
if he did stand up like George Carlin.

So back to crypto.
What ways can an individual obfuscate their life to foil the creepy stalker.
Does crypto help or hinder.  Is https everywhere a good start i.e. firewall
port 80 in and out.  what else...











-- 
  T o m    M i t c h e l l


More information about the cryptography mailing list