Visibility is the New Stealth!

January 15, 2017 | Views: 5412

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Estimated reading time: 1 minute

As technology advances so is the surveillance and invasion of our privacy.

For a few decades, tech giants, people, human rights activists, and several other groups have been trying to come up with a way to avoid or block surveillance and hence there are a number of inventions to handle that matter.

However, the more we try to evade, the more we put ourselves in perspective. Consequently, more focus is then put on the ones who try to block “Big Brother”, “The eye in the Sky”, Global Watch programs, phone makers and secret agencies who create a pact to record our biometrics etc., and others alike.

With numerous agencies watching our every move via Facebook, Twitter, LinkedIn and recording our biometrics via new fingerprint recognizing phones, it is getting more and more difficult to live off the grid.

I have found a way to stay out of focus by staying close to the camera lens. The closer you get; the vision becomes blurred, and the chances of being in focus lessen. Give it a try sometime. Stay close to a camera lens and take the picture, it will come out blurred.

So, the ultimate stealth is becoming more and more “visible” by getting closer to the Watch Dogs. You know what they say, “Keep your friends close, and your enemies closer.”

We deserve our right to privacy and the right for our personal information to not be shared with anyone without our consent. Period.

Have your own thoughts on this matter? Let me know in the comments! Thanks.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
15 Comments
  1. Given all the correlation of data sources it seems more visibility is a great strategy, but only if coupled with a misinformation campaign. For example, Axciom, the top data warehouse, gathers from billions of sources continually to assemble profiles. Accuracy gets really good until there is lots of conflicting information, then the value of that data falls apart and the incentive for purchase of and utilization of that data also declines. Lie on every form you don’t really need them to have the truth. Then when you are a target, it is harder to zero in on the correct data and thus could reveal the ruse or data source.

  2. This it’s one of the main reasons I
    do this and to catch pedophiles

  3. Thank you very much for sharing such a wonderful topic
    But what is the solusion? I just downloaded a flash light app that want lots of permision like my contacts and my location
    How can i protect my privacy? Not only getting close to the camera , i want put my nose in there lol

  4. Thank you very much for sharing such a wonderful topic
    But what ia the solusion? I just downloaded a flash light app that want lots of permision like my contacts and my location
    How can i get protect my provacy? Not only getting close to the camera , i want put my nose in there lol

  5. So what you’re saying is security through obscurity is a good approach to have. Hide in plain sight, and you will blend in.

    Also the camera analogy is great, except for one flaw, if you are using a macro lens, then you are able to get closer to the lens and still stay in focus. Let’s hope it doesn’t come to that any time soon though.

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 742 / December 14, 2019
How do I Get MTA Certified?
Views: 1314 / December 12, 2019
How much does your PAM software really cost?
Views: 1751 / December 10, 2019
How Do I Get into Android Development?
Views: 2141 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel