More From Eric Dixon at

Support Independent Investigations With Bitcoin:
Send Bitcoin Here: 171GMeYRD7CaY6tkXs8dSTjLbAtFazxhVL

Top 50 Twitter Rank of Worldwide Startup Advisors For Much of 2014
. Go to my professional site for solutions to your legal, business and strategic problems. The only lawyer who is a co-inventor of multiple, allowed-for-grant patents on blockchain technology!!! Blockchain and Digital Currency Protocol Development --
Top Strategic Judgment -- When You Need A Fixer -- Explore Information Protection and Cryptographic Security -- MUST-WIN: JUST DON'T LOSE -- SURVIVE!: Under Investigation? Being Sued? Handling Extreme Stress -- Corporate Issues -- Startup Issues -- Investor Issues -- Contracts To Meet Your Needs -- Opposition Research -- Intellectual Property, Media and Reputation Issues -- Independent, top-notch legal, strategic and personal advice -- Extensive ghostwriting, speechwriting, book writing, issue research, press and crisis management services. Listed by American Bar Association's Law Bloggers (Blawgers). Contact European Union audiences: This site uses a third party site administrator which may use cookies but this site is intended for AMERICAN clients and prospective clients only!

Friday, May 14, 2010

Google Spying on Users? We Warned You Way Back When...

 Several months ago -- December 2009 to be exact -- we reported that Google executive Eric Schmidt had some troubling comments about users who were concerned about Google saving their searches.   Click here for our report.
Now it appears that Google has indeed been collecting data from unsuspecting WiFi users.   See this report posted tonight by the Wall Street Journal.
This illustrates that privacy is only as secure as the diligence, and ethics, of the people who have access to troves of information.   Your privacy is only as secure as the "weakest link" in the long, long information pipeline.  That is to say, it is not secure one bit.   No matter how much the corporations and government agencies doth protest.   Your privacy can be -- and in all likelihood has already been -- compromised, because there are simply too many careless, incompetent or malevolent people out there. 
As we have said before, you are the strongest defender of your own privacy.

No comments:

Post a Comment