Google Privacy Policy Changes

Greetings,

On March 1 Google will change their Privacy Policy, arguably and ostensibly, to “create one beautifully simple, intuitive user experience across Google”; yet, what it also accomplishes is to remove the “firewalling” of search history ON ALL GOOGLE SERVICES such that EVERYTHING you search on, using Google’s Engine, will become available to Google, and to any ‘Agency’ which Google deems should also share in this information (the usual instruments of the Bastards….).

Read the following to educate yourself from [The Electronic Frontier Foundation (EFF)

(https://web.archive.org/web/20140114173046/https://www.eff.org/deeplinks/2012/02/what-actually-changed-google’s-privacy-policy:2jlrx864).

What I have done to defeat their ability to track everything I do, view, and search, is to delete my web history on both my Google account and my (now linked) YouTube Account, and also “paused” the collection of such history from that point going forward.

The following links provide instructions for removing your [Google/url:2jlrx864 and [YouTube/url:2jlrx864 Search Histories:

I have also changed my default search engine from Google to [DuckDuckGo/url:2jlrx864 which does not “[Bubble/url:2jlrx864” or “[Track Us/url:2jlrx864”. My preliminary user experience with DuckDuckGo search is that I don’t miss Google Search… And I use web searches ALL DAY as a function of software development and engineering, let alone my research on GeoPolitical, and Etheric, Chicanery by the Miscreant Banksters…

In any case, there you have it…. Hope this is helpful.

Best Regards,

–Azti

Thanks Atzi, just did that for the web history. When I went to do it for youtube I was unable to access those accounts until I started typing this

this appears to only be necessary if you have an account on either Google or Youtube or both. Correct me if I’m wrong but if I only use Google search engine as my choice for my browser (firefox), there is nothing I can do to clear anything because I have no account.

Is there a reason I should cease using Google search engine? Not that the duckduckgo one isn’t bad – in some ways I like it better – a few searches brought up better search results than Google did and none of that targeted stuff up front you get with google.

Gene, I don’t believe there is anything horribly ‘dangerous’ about using Google search… Other than that they:

(https://web.archive.org/web/20140114173046/http://donttrack.us/:3clbbvm5)

Bubbling is not as big a deal if you don’t have a Google Search history, however, I haven’t really had time to research what they can do if you don’t use one, in this regard….

Regardless, I don’t want to give the bastards anything that I don’t have to. And, as you’ve already experienced, DuckDuckGo is pretty damned good! I would rather support some clever, and ethically minded, entrepreneurs than Google (who is, apparently, turning to the ‘Dark Side’)…

http://duckduckgo.com/

Finaly a decent alternative search engine, thanks!

Why do you find it important to hide from sites like Google, Facebook, etc?
About ten years ago remember every new laptop was equipped with a keystroke logger, and even if that
did not go on forever, we are all familiar with surveillance. It kind of makes me laugh when pyjama people are outraged
by Big Brother on the internet… Big Brother invented the internet, right?
I just can`t feel motivated, but perhaps you can convince me otherwise…

Ive not been writing a lot here, lately, but have been reading from time to time. When I wanted to comment on this topic my login failed, Don had to fix it and asked me to mention this hack. Im sure I still could login only a few months ago.

cheers

Dirk

Dirk,

Even if there was an institutionally installed, surreptitious, key logger within the hardware/firmware of laptops built over the last 10 years, how do the devices ‘phone home’ the captured data?

Yes, you could have ‘rogue’ chips installed…. Doctored CMOS… Any number of nasty, clever, hardware/firmware sort of things that tools like chkroot, and other similar scanners couldn’t find as it is not software, but something instrumenting memory directly, or listening on some IO path on the box, that is performing the logging of key strokes.

The problem for the bastards, again, is how do they make use of anything they capture with out the transfer, eventually, being spotted?

There are any number of clever ways to send data surreptitiously, many such methods are used once by the Agencies and then abandoned as they feel that they are likely compromised after being used in ONLY ONE Op against a capable advesary. Coming up with CovComms is an interesting endeavor, one that I, in fact, am engaged in. However, they ALL get spotted, eventually… Especially, in the case of some firmware based keylogger on “every’ laptop built since 10 years ago”…. Such a huge amount of data, flowing from the millions of Windoze and Mac machines in use, would INEVITABLY be spotted by resourceful, and very clever, Network Security types.

The data MUST get out on the network, if they are to retrieve it… If not the “Internet” then what other network accessible to the hardware? It MUST be routed (to get anywhere outside of the local area network’s collision domain [Ethernet]), I.E. it must be carried within a packet routed over a layer 3 protocol (IPv4 and increasingly IPv6, by definition, implement the “Internet”). Again, you could try hiding it (CovComs) in stuff but these methods are WELL KNOWN and only clever encoding, obfuscation, and spreading messages around any number of these methods work for very long. People like, me (if motivated by need, duty, curiosity, money, or any combination of the former) WOULD FIND IT.

Frankly, I don’t for a second believe that the miscreants have an institutional capacity to instrument our machines. Yes, they occasionally, with a varying degree of effort (depending on how protected a machine is), will plant a rootkit on some box, and get data out of it (USUALLY by physical access to the machine and NOT by any network transmission). Probably they plant hardware/firmware on h4xored laptops on particular targets… But institutionally? On every laptop out there? No way….

The first thing that happens to any new laptop (certainly within a year or so of it coming out) is that its taken completely apart, and every component checked by Security Professionals. If I had anything that I TRULY NEEDED to hide, and the budget to support it, that is what I would do…

A lot of what folks perceive as being ‘hacked’ is either plain old crappy networks wigging out at random. However, that is not to say that any number of Denial of Service attacks can’t account for claims of being ‘hacked’… there is a BIG difference between the bastards screwing with our connectivity, via any number of methods and actually having our machines broken into and compromised. For example, it is ELEMENTARY to completely mess up a Wireless 802.11x network if you are in range of the Access point and have some very simple software to inject frames over the air. One could also send syn floods, or icmp floods, or send tcp reset packets, or do any number of things to make networks unstable, unreliable, or completely unusable (and when that is done, its again then ELEMENTARY, if one captures packets entering the affected network, to tell what is happening to the network)… But, that is a FAR CRY from actually Hacking INTO a box–that is a different kettle of fish altogether–and an attacker must have a vector, a vulnerability, to be exploited. At the same time, those very same vectors, and vulnerabilities, and are constantly being discovered (and the more its used the faster its found) and publicized, by the very community that is blamed for the Hacking!

In any case, I do what I can and giving Google free reign to capture details about my life–THAT I CLEARLY AM CERTAIN THAT THEY CAN DO–would be completely FOOLISH, if not INSANE on my part.

What your are saying, Psychiatrist, is that its is reasonable to not fix the leak in your tank that you KNOW ABOUT, because you have a “Belief” that a much bigger leak exists but that you can not put your finger on but for a nebulous dread….

I would humbly suggest that it would behoove you to contemplate the most apropos function of your Moniker and evaluate if your position on this matter is, in fact, “sane” or is not….

Regards,

–Azti