[ZDNet] Apple's Tim Cook: Silicon Valley has created privacy-violating 'chaos factory' - Page 2 - Overclock.net - An Overclocking Community

Forum Jump: 

[ZDNet] Apple's Tim Cook: Silicon Valley has created privacy-violating 'chaos factory'

Reply
 
Thread Tools
post #11 of 57 (permalink) Old 06-19-2019, 01:48 PM
New to Overclock.net
 
8051's Avatar
 
Join Date: Apr 2014
Posts: 2,773
Rep: 22 (Unique: 16)
Quote: Originally Posted by Mand12 View Post
You're misunderstanding. No amount of software on your PC will ever affect the physical layer of the telecom network.
What about encrypted VPN's?
8051 is offline  
Sponsored Links
Advertisement
 
post #12 of 57 (permalink) Old 06-19-2019, 02:10 PM
curmudgeon
 
miklkit's Avatar
 
Join Date: Apr 2013
Posts: 5,778
Rep: 305 (Unique: 176)
Hehe. Yes Tim "Apple" has some experience with a chaos factory.

IOKIYAR
Junkyard Dog
(18 items)
Blackie
(17 items)
CPU
AMD Ryzen 1700
Motherboard
Biostar X370 GT7
GPU
Sapphire Nitro+ Radeon Vega 64
RAM
G. Skill Ripjaws ddr4 3200 16 GB 4x4
Hard Drive
Samsung 850 EVO 500gb SSD
Hard Drive
Western Digital 500gb
Hard Drive
Samsung 860 evo 1tb ssd
Optical Drive
Memorex Lightscribe dvd
Power Supply
Seasonic 850 watt
Cooling
Thermalright Silver Arrow IB-E Extreme
Case
Silverstone Redline RL05
Operating System
Win 10 64bit
Monitor
Pixio 27" 1440P
Keyboard
yes
Mouse
Evoluent vertical mouse
Mouse
yes
Audio
Creative X-FI
Other
Sennheiser headphones HD 599
CPU
AMD FX8370 @ 5 ghz
Motherboard
ASUS Sabertooth
GPU
Sapphire Fury
RAM
G Skill F3-14900CL9Q-16GBXL
Hard Drive
Western Digital
Hard Drive
Samsung 850 EVO
Optical Drive
Memorex Lightscribe dvd
Power Supply
Seasonic SS-850KM Active PFC F3
Cooling
Thermalright Silver Arrow IB-E Extreme
Case
Silverstone Redline RL02b
Operating System
Win X 64 bit
Monitor
Pixio 27" 1440P
Keyboard
yes
Mouse
Evoluent VM4
Mouse
yes
Audio
Creative Soundblaster Z
Audio
Sennheiser 428 headphones
▲ hide details ▲
miklkit is offline  
post #13 of 57 (permalink) Old 06-20-2019, 09:37 AM
Frog Blast The Vent Core
 
Join Date: Jan 2014
Posts: 6,027
Rep: 371 (Unique: 184)
Quote: Originally Posted by looniam View Post
that doesn't address the points in my post.

being dismissive works both ways.
So, let me get this straight. You quoted me, said I was wrong, said a bunch of things completely unrelated to the point I was making, and are now upset that I don't feel your irrelevant commentary is worth responding to?

You started this, not me.
Mand12 is offline  
Sponsored Links
Advertisement
 
post #14 of 57 (permalink) Old 06-20-2019, 10:44 AM
professional curmudgeon
 
looniam's Avatar
 
Join Date: Apr 2009
Posts: 9,568
Rep: 778 (Unique: 446)
Quote: Originally Posted by Mand12 View Post
So, let me get this straight. You quoted me, said I was wrong, said a bunch of things completely unrelated to the point I was making, and are now upset that I don't feel your irrelevant commentary is worth responding to?

You started this, not me.
and i bolded what i was addressing which would indicate that i wasn't addressing the whole post.

and believe me pal you cannot upset me.

"but he started it!!!!" is a rather childish response, just saying. no one is making you continue the discussion.

Remember the golden rule of statistics: A personal sample size of one is a sufficient basis upon which to draw universal conclusions.
Upload the computer to Dropbox and provide a link to it so others may download it to examine and give advice for repairs.
loon 3.2
(18 items)
CPU
i7-3770K
Motherboard
Asus P8Z77-V Pro
GPU
EVGA 980TI SC+
RAM
16Gb PNY ddr3 1866
Hard Drive
PNY 1311 240Gb
Hard Drive
1 TB Seagate
Hard Drive
3 TB WD Blue
Optical Drive
DVD DVDRW+/-
Power Supply
EVGA SuperNova 750 G2
Cooling
EKWB P280 kit
Cooling
EK-VGA supremacy
Case
Stryker M [hammered and drilled]
Operating System
Win X
Monitor
LG 24MC57HQ-P
Keyboard
Ducky Zero [blues]
Mouse
corsair M65
Audio
SB Recon3D
Audio
Klipsch ProMedia 2.1
▲ hide details ▲


looniam is offline  
post #15 of 57 (permalink) Old 06-20-2019, 11:31 AM
Performance is the bible
 
Join Date: Apr 2009
Posts: 6,735
Rep: 436 (Unique: 300)
Quote: Originally Posted by Mand12 View Post
So, let me get this straight. You quoted me, said I was wrong, said a bunch of things completely unrelated to the point I was making, and are now upset that I don't feel your irrelevant commentary is worth responding to?

You started this, not me.
You are thick.

You claimed that the internet was never private, and he claimed that in the past it was, but you for some reason just can't accept that, even though you seem to know very little about how the internet used to be.

Your statement is just plain false considering hardware in the past did concern about privacy, software was concerned about privacy.
Today, maybe not. As hardware became smarter. But 10-15 years ago, that was the case. The internet was more secure and more private than today. A news site would not track you along 100000 other sites you visited, and there were no huge players collecting all of your private data. And hardware nodes connecting all of us to the internet were afraid of data leaks as they were used other government usage, which made them more secure.


Defoler is offline  
post #16 of 57 (permalink) Old 06-20-2019, 03:33 PM
New to Overclock.net
 
1Kaz's Avatar
 
Join Date: Feb 2013
Posts: 276
Rep: 9 (Unique: 9)
Quote: Originally Posted by Defoler View Post
You are thick.

You claimed that the internet was never private, and he claimed that in the past it was, but you for some reason just can't accept that, even though you seem to know very little about how the internet used to be.

Your statement is just plain false considering hardware in the past did concern about privacy, software was concerned about privacy.
Today, maybe not. As hardware became smarter. But 10-15 years ago, that was the case. The internet was more secure and more private than today. A news site would not track you along 100000 other sites you visited, and there were no huge players collecting all of your private data. And hardware nodes connecting all of us to the internet were afraid of data leaks as they were used other government usage, which made them more secure.
If it's on the internet, it means you connected to someone else computer (or a computer on the public domain), which means it's not private. At the very least that computer knows what you requested and where to send the information requested, aka, no longer private. If you want private, use a LAN.

Over the years things have evolved. Now VPNs and Tor exists, so does javascript fingerprinting, cookies, and social media plugins that track every user across multiple sites. It's possible to hide your identity, so long as someone doesn't go looking for you. Snowden explained that the Tor network was being attacked by crews deployed to the area of high traffic tor networks, they would then hack the router so they could link incoming and outgoing data, thus peeling away a layer of the onion. It's a never ending battle, but ultimately the only way to be completely private is to never connect to an outside network.

I still prefer the old privacy focused mindset, where only the computer I was speaking to knew what I was asking for. Now we have massive data dragnets that create profiles on people who never even use their site (aka facebook/google). It's a shame the US isn't privacy concerned, but that's because we are too busy building AI.
1Kaz is offline  
post #17 of 57 (permalink) Old 06-20-2019, 05:09 PM
Head Dwarf
 
iamjanco's Avatar
 
Join Date: Aug 2016
Location: In a circus tent
Posts: 1,923
Rep: 86 (Unique: 56)
Privacy in this day and age? I found that while wearing a tin hat doesn't seem to help except perhaps against a Martian onslaught, if I put one on my vidcam they at least can't take pix of me that way:

Code:
router log, sorted by IP:

[DoS Attack: ACK Scan] from source: 199.166.0.24, port 443, Sunday, June 16,2019 21:30:25
[DoS Attack: ACK Scan] from source: 208.89.12.137, port 30106, Sunday, June 16,2019 12:44:28
[DoS Attack: ACK Scan] from source: 209.197.3.84, port 443, Saturday, June 15,2019 15:18:08
[DoS Attack: ACK Scan] from source: 23.32.70.7, port 443, Friday, June 14,2019 12:35:38
[DoS Attack: ACK Scan] from source: 23.32.70.7, port 443, Friday, June 14,2019 12:36:52
[DoS Attack: ACK Scan] from source: 40.100.48.69, port 46756, Sunday, June 16,2019 00:31:52
[DoS Attack: ACK Scan] from source: 46.251.239.27, port 30120, Tuesday, June 18,2019 08:56:45
[DoS Attack: ACK Scan] from source: 52.85.89.30, port 443, Monday, June 17,2019 16:47:01
[DoS Attack: ACK Scan] from source: 72.21.81.200, port 443, Wednesday, June 19,2019 14:16:27
[DoS Attack: NULL Scan] from source: 121.228.150.168, port 43378, Sunday, June 16,2019 07:11:28
[DoS Attack: NULL Scan] from source: 41.32.56.171, port 64562, Saturday, June 15,2019 10:51:56
[DoS Attack: RST Scan] from source: 120.92.173.125, port 80, Thursday, June 20,2019 09:50:38
[DoS Attack: RST Scan] from source: 136.243.60.85, port 8000, Wednesday, June 19,2019 23:24:11
[DoS Attack: RST Scan] from source: 148.251.48.231, port 50002, Wednesday, June 19,2019 11:26:56
[DoS Attack: RST Scan] from source: 162.241.158.7, port 22, Saturday, June 15,2019 17:09:41
[DoS Attack: RST Scan] from source: 184.168.137.1, port 80, Friday, June 14,2019 07:07:35
[DoS Attack: RST Scan] from source: 184.168.56.52, port 443, Monday, June 17,2019 09:56:35
[DoS Attack: RST Scan] from source: 23.185.0.3, port 80, Sunday, June 16,2019 05:28:53
[DoS Attack: RST Scan] from source: 50.62.89.138, port 80, Friday, June 14,2019 06:48:28
[DoS Attack: RST Scan] from source: 50.62.89.138, port 80, Friday, June 14,2019 08:26:52
[DoS Attack: RST Scan] from source: 88.99.103.29, port 8000, Wednesday, June 19,2019 22:55:08
[DoS Attack: TCP/UDP Chargen] from source: 120.52.152.17, port 40477, Thursday, June 20,2019 04:20:47
[DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 35212, Wednesday, June 19,2019 16:21:14
[DoS Attack: TCP/UDP Chargen] from source: 165.22.76.251, port 41924, Saturday, June 15,2019 14:18:20
[DoS Attack: TCP/UDP Chargen] from source: 178.62.245.140, port 48606, Friday, June 14,2019 06:42:08
[DoS Attack: TCP/UDP Chargen] from source: 184.105.139.113, port 10308, Sunday, June 16,2019 23:56:08
[DoS Attack: TCP/UDP Chargen] from source: 184.105.139.113, port 52432, Friday, June 14,2019 23:30:12
[DoS Attack: TCP/UDP Chargen] from source: 184.105.139.121, port 58955, Saturday, June 15,2019 20:06:41
[DoS Attack: TCP/UDP Chargen] from source: 184.105.139.69, port 9239, Monday, June 17,2019 23:07:14
[DoS Attack: TCP/UDP Chargen] from source: 184.105.139.81, port 64664, Wednesday, June 19,2019 00:53:13
[DoS Attack: TCP/UDP Chargen] from source: 184.105.139.89, port 14951, Wednesday, June 19,2019 21:39:25
[DoS Attack: TCP/UDP Chargen] from source: 185.244.25.104, port 60097, Tuesday, June 18,2019 11:33:17
[DoS Attack: TCP/UDP Chargen] from source: 185.244.25.108, port 60818, Sunday, June 16,2019 21:54:42
[DoS Attack: TCP/UDP Chargen] from source: 185.244.25.251, port 52675, Monday, June 17,2019 07:09:22
[DoS Attack: TCP/UDP Chargen] from source: 185.244.25.253, port 47629, Saturday, June 15,2019 11:50:10
[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 35072, Wednesday, June 19,2019 19:52:09
[DoS Attack: TCP/UDP Chargen] from source: 198.108.67.109, port 52618, Sunday, June 16,2019 14:24:07
[DoS Attack: TCP/UDP Chargen] from source: 45.67.15.65, port 43806, Monday, June 17,2019 05:49:26
[DoS Attack: TCP/UDP Chargen] from source: 45.79.164.193, port 58931, Wednesday, June 19,2019 18:48:45
[DoS Attack: TCP/UDP Chargen] from source: 50.116.55.251, port 52303, Thursday, June 20,2019 03:26:44
[DoS Attack: TCP/UDP Chargen] from source: 52.73.169.169, port 53203, Monday, June 17,2019 03:01:34
[DoS Attack: TCP/UDP Chargen] from source: 66.175.214.217, port 33998, Thursday, June 20,2019 12:34:07
[DoS Attack: TCP/UDP Chargen] from source: 71.6.135.131, port 31743, Saturday, June 15,2019 15:54:04
[DoS Attack: TCP/UDP Chargen] from source: 71.6.167.142, port 29921, Thursday, June 13,2019 23:28:50
[DoS Attack: TCP/UDP Chargen] from source: 71.6.232.5, port 56765, Monday, June 17,2019 21:45:38
[DoS Attack: TCP/UDP Chargen] from source: 82.221.105.6, port 29921, Monday, June 17,2019 06:42:26
[DoS Attack: TCP/UDP Echo] from source: 120.52.152.15, port 44193, Thursday, June 20,2019 12:03:42
[DoS Attack: TCP/UDP Echo] from source: 120.52.152.17, port 49019, Friday, June 14,2019 06:58:09
[DoS Attack: TCP/UDP Echo] from source: 120.52.152.18, port 49019, Thursday, June 20,2019 03:23:59
[DoS Attack: TCP/UDP Echo] from source: 141.212.123.34, port 42372, Saturday, June 15,2019 13:12:31
[DoS Attack: TCP/UDP Echo] from source: 71.6.146.186, port 27221, Tuesday, June 18,2019 17:33:05

...playin' the lead roll in a dwerg tossing contest.


iamjanco is offline  
post #18 of 57 (permalink) Old 06-20-2019, 05:33 PM
professional curmudgeon
 
looniam's Avatar
 
Join Date: Apr 2009
Posts: 9,568
Rep: 778 (Unique: 446)
Quote: Originally Posted by 1Kaz View Post
If it's on the internet, it means you connected to someone else computer (or a computer on the public domain), which means it's not private. At the very least that computer knows what you requested and where to send the information requested, aka, no longer private. If you want private, use a LAN.

Over the years things have evolved. Now VPNs and Tor exists, so does javascript fingerprinting, cookies, and social media plugins that track every user across multiple sites. It's possible to hide your identity, so long as someone doesn't go looking for you. Snowden explained that the Tor network was being attacked by crews deployed to the area of high traffic tor networks, they would then hack the router so they could link incoming and outgoing data, thus peeling away a layer of the onion. It's a never ending battle, but ultimately the only way to be completely private is to never connect to an outside network.

I still prefer the old privacy focused mindset, where only the computer I was speaking to knew what I was asking for. Now we have massive data dragnets that create profiles on people who never even use their site (aka facebook/google). It's a shame the US isn't privacy concerned, but that's because we are too busy building AI.

you first start off with saying that simply connecting to a computer is not private but then end with stating it use to be. you do a nice enough job explaining some of the causes/differnces, with javascript, cookies and plug ins but you make a one glaring mistake. however just the act of clicking a link does not mean i give up personal information such as my name, address, political affiliations, credit or medical history, or anything of the like. if you read the article; that is what is what cook is talking about.

privacy does not mean secret. a person's person privacy deals with how much information is passed to the other party or public , not whether any information is passed it's not black and white but a continuum that the person them self decides where it lands.

the one extreme is the right to solitude and the other extreme is full disclosure.

just because myself, or anybody else, may leave their house certainly doesn't mean they are allowing full disclosure. they may have given up their right to solitude but, they can even walk in the public and that doesn't mean they give up the information of their name or any other personable identifiable information, unless they have a transaction w/another where it becomes necessary. someone can take their picture and even publish it but cannot publish their name without consent.

just because i connect my computer does not mean i need to give up any information other than what my ISP needs to provide me service. and only to my ISP for billing purposes. they can also monitor my connection for network diagnostics and keep a log of it; though the amount of time is debatable, it is all perfectly reasonable.

however that does not mean that because i click on a link to amazon, you tube, or any web site; that i give up my name, address, social security number, political affiliations or anything else just to be able to view a web page. my ip address, browser or even OS would be need to display a web page even what NIC i am using, but again that would be entirely reasonable and none of that is uniquely identified to me, just who the manufacturer is.

so this stuff about you can't have privacy on the internet is utter hogwash. technology has advanced in the past with telegrams, telephones, photography, videography and yes, even motor vehicles. those have all posed questions that needed answered and laws (which DO exist) to protect a person's private information.

but i guess its just easier to say something never existed or cannot exist than deal with the problem, eh?

EDITED FOR CITATIONS
Spoiler!

Remember the golden rule of statistics: A personal sample size of one is a sufficient basis upon which to draw universal conclusions.
Upload the computer to Dropbox and provide a link to it so others may download it to examine and give advice for repairs.
loon 3.2
(18 items)
CPU
i7-3770K
Motherboard
Asus P8Z77-V Pro
GPU
EVGA 980TI SC+
RAM
16Gb PNY ddr3 1866
Hard Drive
PNY 1311 240Gb
Hard Drive
1 TB Seagate
Hard Drive
3 TB WD Blue
Optical Drive
DVD DVDRW+/-
Power Supply
EVGA SuperNova 750 G2
Cooling
EKWB P280 kit
Cooling
EK-VGA supremacy
Case
Stryker M [hammered and drilled]
Operating System
Win X
Monitor
LG 24MC57HQ-P
Keyboard
Ducky Zero [blues]
Mouse
corsair M65
Audio
SB Recon3D
Audio
Klipsch ProMedia 2.1
▲ hide details ▲



Last edited by looniam; 06-20-2019 at 08:24 PM.
looniam is offline  
post #19 of 57 (permalink) Old 06-20-2019, 05:55 PM
New to Overclock.net
 
christoph's Avatar
 
Join Date: Jan 2009
Posts: 1,663
Rep: 30 (Unique: 26)
Quote: Originally Posted by looniam View Post
you are wrong. esp before 2004 w/FB.

first isp i had was a unix shell account, remember winsock on WFW?
i use to dial up the local library and use thier menu WAIP(?) to the yahoo page and boom, lynx was my first browser. ya know there was a time when there were no cookies either.

mind blowing i know. but your statement is false.

he is right, internet never been a private environment, you're just playing idiotic right now

christoph is offline  
post #20 of 57 (permalink) Old 06-20-2019, 06:10 PM
professional curmudgeon
 
looniam's Avatar
 
Join Date: Apr 2009
Posts: 9,568
Rep: 778 (Unique: 446)
Quote: Originally Posted by christoph View Post
he is right, internet never been a private environment, you're just playing idiotic right now
no, the idiocy is not mine but his and yours.

Remember the golden rule of statistics: A personal sample size of one is a sufficient basis upon which to draw universal conclusions.
Upload the computer to Dropbox and provide a link to it so others may download it to examine and give advice for repairs.
loon 3.2
(18 items)
CPU
i7-3770K
Motherboard
Asus P8Z77-V Pro
GPU
EVGA 980TI SC+
RAM
16Gb PNY ddr3 1866
Hard Drive
PNY 1311 240Gb
Hard Drive
1 TB Seagate
Hard Drive
3 TB WD Blue
Optical Drive
DVD DVDRW+/-
Power Supply
EVGA SuperNova 750 G2
Cooling
EKWB P280 kit
Cooling
EK-VGA supremacy
Case
Stryker M [hammered and drilled]
Operating System
Win X
Monitor
LG 24MC57HQ-P
Keyboard
Ducky Zero [blues]
Mouse
corsair M65
Audio
SB Recon3D
Audio
Klipsch ProMedia 2.1
▲ hide details ▲


looniam is offline  
Reply

Quick Reply
Message:
Options

Register Now

In order to be able to post messages on the Overclock.net - An Overclocking Community forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
If you do not want to register, fill this field only and the name will be used as user name for your post.
Password
Please enter a password for your user account. Note that passwords are case-sensitive.
Password:
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:

Log-in



Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Show Printable Version Show Printable Version
Email this Page Email this Page


Forum Jump: 

Posting Rules  
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off