Teenagers Care about Online PrivacyAdded: Friday, September 6th, 2013
Category: About Torrents > Staying Safe And Secure
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extrattorrent.com, 2013
According to the 2012 Teens and Privacy Management Survey conducted by Pew Internet, teenagers are probably more worried about online privacy than adults – it turned out that they have taken steps to uninstall or avoid many teen apps over concern about their privacy.
According to statistics, teen girls are more likely to delete location data, and most of them have disabled location tracking features on mobile phones and in applications, as they are worried about others’ access to that private data. The survey in question was conducted among American teenagers ages 12-17.
Over 50% of all teens have downloaded applications to their cell phone or tablet PC and 51% of teen apps users have also avoided certain software because of privacy concerns. More than 25% have uninstalled an application because they found out that it was collecting personal data which they didn’t want to share. Finally, over 46% have switched off location tracking features on their cell phone or in an application since they were worried about the privacy of their data.
September 6th,2013Posted by:
Friday, September 6th, 2013
|If you really care about these criminals spying on you, go to the prism-break dot org website and implement as many of the alternatives listed as you can. If you don't want them spying on your email, you can run your own encrypted email server. If you don't want them spying on your skype conversations, you can use an Ostel SIP account and make encrypted calls via wifi, and even make secure calls from an otherwise unsecure android phone. If you have an IPhone, you need to lose it though. Those are just a few examples. Go to prism-break, tell your friends, and let's start a new, anonymous, encrypted, secure internet.|
|posted by (2013-09-06 20:06:55)|
|Online privacy does not exist, probably never has.|
|The web can be made private, and secure, it's just that nobody made it a priority. If we make it a priority, we can encrypt, and anonymize the whole thing. If we do it right, we might even be able to foil the NSA's quantum computers that try to crack encryption etc.|
|posted by (2013-09-06 20:55:01)|
|#1 YoMammaSoFat. Thanks for the information bro... Great one...|
|The internet was never made to be private. The internet is doing exactly what it was initially modeled to do - keep an eye on everyone using it. If you want real privacy, that's simple, unplug your life from the internet. Use public phones to make calls. Use the post office to send letters. Use everything you can that we use to use 25 years ago. You will be free from any worries about your privacy being invaded in this screwie digital age where people praise proxies and VPN's which CAN be traced and decrypted. Long live analog!|
|VPNs and proxies are useless as is https(SSL)- the Guardian reported they've cracked many VPNs annd ssl. But open source encryption makes it hard for them to put in back doors and ways to just steal passwords etc. while allowing development to constantly spot any weaknesses. And even though they target encrypted users and TOR users, it takes extra work and if everyone did it, while placing a priority on developing more security into the internet itself, it could be made just about impossible for them to do what they're doing. Of course they will just take that as a cue to take more tax dollars and hone their capability over time.|
But all of these steps also assume that the goal is to protect us (the citizens, press, activists, lawyers, judges, etc.) while we put the criminals on trial for treason.
After anyone advocating or participating in levying this war on the public faces a firing squad, none will dare do this any time soon thereafter.
|And also, public phones and everything else is being spied on, so that's still not secure. They know where the phone is, and can figure out it's you by using a voice scan. In this day and age you need encryption that's hard to break with some anonymizing layer.|
Oh and the post office scans labels and keeps track of who is mailing who. Probably x-rays it too or soon will.
|yea there is no hiding really unless you take the no net at all approach after reading blog reports from experts on this topic and studying some cryptography in the past few years the basic conclusion is no matter what the avg user will not be-able to protect themselves for that matter experts are scratching there collective heads at how or what exactly this means if all types or some types of encryption are compromised. the tech side of things is beyond most of us lol but if you know about i suggest looking into cryptome ... this is scary but something like previously said the net was designed to do so dont be shocked be pro active to the best of your ability and research into these things. yes the media issues the report but if you dont know what ecc, or dsa , rsa is its kinda pointless at least i think .. yes @6 vpns at this scale are useless for that matter ip hide and spoofing is as well .. we dont know much despite the leak its informative value it gives little bits on what exactly is broken so to say .. lets hope this stops but that's more fantasy than reality at this point we have not one bit of privacy online..|
|posted by (2013-09-07 08:41:51)|
|teenagers are probably more worried about online privacy than adults? *PORN* lolz|
|Without question All data/traffic can be monitored for even I2P (anonymous network) despite low latency if the dogs are chasing you and on your case, but how easy you make it for them is the question,I have accounts for email on 7 or 8 tech sites where I am known as varying entities sourceforge.net for but 1 and not as embolism although I have over half a dozen ID`s purely since they filter the sh1te out better than many independent servers will do and add another layer of anonymity as well as helping out on certain forums where I see development is required and give them input.I would only send information through those I trusted to begin with and encrypted to the best possible degree.Rest assured Big brother is out there and the WWW is getting tightened albeit slowly, so fortune favours the prepared mind.|
|It must be said 1 in 10 Americans are currently serving prison time and if everyone is watched / monitored for everything all the time this will not only put up the inmate population but have an adverse effect on the costs of keeping people in their penal system as well as the 450 million dollars they want to commit to enlarging and refurbishing Guantanamo bay when the prisoners there should be tried and incarcerated in general occupation in the USA or released without charge and a bloody big compensation for time served without charge or conviction.Sorry strayed off the subject ,the point is the general population will increase drastically in every country as well as the USA and do nothing constructive but collectively add to many countries national debt in a knock on effect of over policing what does not need to be policed and is neither welcomed or required by the end user.|
|20 million torrent users multiplied by|
$47000 to keep 1 inmate per yr = $940,000,000,000 conservatively to the Governments and taxpayers as well as a lot of time and man hours to implement in monitoring by cyber divisions which in turn eat a lot of revenue an economic folly for the countries that wish to implement it to the fullest extent.So probably well over the amount the war in Iraq cost in totality just to arrest those that are torrent users,think it equates to many years before they can get round to the serious cases if dealing exclusively in cyberspace on witch hunts just for us and just another front on which they will ultimately end up begging for more Chinese loans to balance the economy.
|posted by (2013-09-08 05:20:06)|
|is nobody gonna ask..how fat is she..or did I miss the boat on that one.anyway im not real tech savy but I tried a hide my ip app once and when I tried to log in at facebook you would have thought I killed their family and raped their dog they actualy seemed kinda pissed off(in a cordial manner of course)the second I shut it off I was welcomed with open arms.|
|posted by (2013-09-08 05:38:15)|
|speaking of straying off the subject and since prisons privacy facebook and governments have been mentioned how long do you suppose before they all get together.(at least that way prisons would actualy know what was happening right under their noses maybe they wouldn't be able to ignore it anymore)cause facebook assures everyones privacy you.well they wont use anything you havent said or posted that is.|
Of course FaceSCANbook and Gmail are monitoring the IP addresses and think someone is hacking your account if you mask it. I can't imagine how retarded one would have to be to use FaceSCANbook- if you were a Jew in Germany and Hitler had this stuff, they could have a ARGUS drone identify you by face scan and a swarm of HELLADS drones hunt you with the 150KW lasers on them(I'm not joking- they have those). If you have want to do social networking, use one of the alternatives on prism-break dot org, some of which you can host yourself so you at least know Google etc. doesn't own it.
@Embolism - Remember, they PRINT the money and usually just add zeros in a computer. If they need a quadrillion dollars to pay for rectal cameras and forcibly install them, they can just pull a zillion bucks out of their asses and put cameras up your butt.
They don't even need people to pay taxes to pay for this stuff, they just make you do that to keep you from having resources/wealth so you're always willing to do almost anything for almost nothing(so that the money will still buy things) and so you're too weak to fight them.
|yes your probably right the yearly budget for the NSA could probably pay for it all and still have change.|
|posted by (2013-09-10 08:39:57)|
|Before leaping on the Prism-Break bandwagon you may like to check this article out: http://www.alexanderhanff.com/prism-break-dangerously-misleading|
|Teenagers care about their parents not finding out what they are up to, other than that they really don't give a damn. As parents get more PC savvy, teens have to try alternatives in order to not get caught. Their are a lot of teens now using Live Linux CD's to avoid evidential traces, especially Gentoo, Debian and Fedora. Boys especially use this method, although more and more girls are getting craftier.||
Most Popular Stories