Showing posts with label fraud. Show all posts
Showing posts with label fraud. Show all posts

Social: Is onlyfans secure?

Can it be assured that the internet has been built on the basis of anonymous speech? Although after years of learning about who tries to investigate who can be said that privacy is something difficult to achieve speaking from how data may only have market use value for capitalist systems or large companies such as Amazon, Google, Facebook or Microsoft that collect navigation data for targeted advertisements, as well as all data that might be leaked between hackers or people of bad or inexplicable intentions, since plaintiffs in defamation cases use subpoenas to try to unmask identities of internet users who have been interrogated, arrested, tortured and sentenced to long prison terms for the "crime" of speaking critically about governments and institutions. So is it bad to want to remain anonymous? Hasn't it been a cornerstone for the same democratic expression, for example the northamerican one with the publications of the 'Federalist Papers' under the pseudonym Publius, or for the dialogues that daily users carry out or even have carried out during the Arab Spring through the network and through social networks?

 \ \ 

On the case of the internet, it must be realized that no blog can be completely anonymous since with enough time, resources and political will, a group or government can discover the identity of the writer since there is always a risk when you say what you think to people that they cannot tolerate dissent on issues such as the corruption of a public servant, or bad procedures or protocols of fascist institutions but, is it necessary to provide biometric data even to register on platforms to buy pornography as http:// onlyfans.com does?

 \ \ 

So, it is not only about a possible government spying on its people, it is also that with the implementation of exaggerated registries or standards in mobile telephony, possible cases of identity theft, arbitrary or abusive interference with dignity, honor, reputation, personality development, or possible intrusions to privacy and security from the data collected against any of the distortions in the market, protocol or agreement are implied with a flow of public spending reaching extremes such as extortion or favors selling. Is it possible to take control of your information online? In the day to day it seems that the only way to remain anonymous is not to use the network, which is not an option; So from the moment one turns on a computer, one must take into perspective the use of a router as instance, to mitigate the use of hackers who may be constantly bombarding IP addresses to see if it is possible to enter their system when locating an ISP provider. At the same time, those who may be somewhat careless when browsing the web, in the same way as new exploits are found or when a device fails, posibilities that the user can walk with the VPN itself leaking (https://pcmag.com/how-to/is-your-vpn-leaking) or by keeping too much personal information such as passwords; Of which, in case of priority anonymity use, any browser intended for privacy must be kept with the Javascript disabled as Tor Browser may well be. 

\ \

 Another factor apparently is that the only anonymous mobiles are prepaid telephones (aka a burner) that although a call log is kept from them and the user might be triangulated via GPS, it is possible to register it without associating it with the user's name and discard it, which can be said is functional when not wanting to receive calls from numbers that have one blocked with an iPhone or Smartphone, when there is also a 2014 investigation by Neophapsis Labs (http://www.zdnet.com/article/recycled- burner-number-sends-sex-workers-clients-to-security-researcher) that found companies recycle numbers quickly, meaning spam calls are still possible. It is added there is no evidence or positive correlation between a registry and the reduction of criminality in extortion since recharge systems and relatively cheap chip changes are used daily, as well as the same authority can be corrupted, a subject of which there is cloth where to sew.

 \ \ 

Did courts recognized that the right to speak anonymously is part of the freedoms of speech, belief, of the press, of petition, and of assembly already? Although the use of the international network is rather a privilege and not a right, as on cases where a person is not authorized to use any computer, the right to personality, dialogue, the guarantee of autonomy and the information if they are, exist; So to say that by refusing to give your information the protocol will be to immediately cancel the lines of the clients without the right to reactivation, payment or compensation, it is talking about all that near to despotism, totalitarian control, and dictatorship by the simple fact of wanting to express, promote, pursue, communicate, or defend anonymously, or conserved as private, exempt and immune and/or in a unnoticed way by sometimes unstable governments and societies on changing. 

\ \

 Do people in general know what has happened or not about it in Saudi Arabia, Bahrain, Bangladesh, China, United Arab Emirates, Nigeria, Pakistan, Tanzania, Uganda and Zambia?

 \ \ \ \ 

You want to know about: 

GLOBAL 

The amnesia incognito live system. https://tails.boum.org

USA 

Legal protections for anonymous speech

 https://www.dmlp.org/legal-guide/legal-protections-anonymous-speech \ \ \