I don’t think so. Whatever algorithm Q is talking about is some homebrew thing just shared with the big social media creeps is my thinking.
Snowden either built or distributed it.
Whatever it is is creeping me out.
Went to the dentist, mentioned that in a text — NOT on FB. Just looked at a youtube and it was preceded by an ad for a dentist on the same block as the one I went to.
Odds?
I think Bill Binney wrote it? At any rate, Snowden has possession and is waiting by the @jack’s door to run it on Twitter to see their censorship/data sales algorithm.
Open the door, @jack
Let me throw some ideas on this subject if I may...
If the “Bridge” is indeed typically or purposefully using Cisco routers then it all makes sense. I have looked into this and Cisco after production adds a component to each router that allows it to communicate to a specified device, i.e. a main collecting point “doorway” into the Dark States data collection machine. No passwords or anything will stop it,. it simply branches the data to another location just like if you are making a replicate copy for business continuity practice in case one goes down the other takes over. In their case they have a clear connection and all the data just pours into their data structure and off we go
And yes I have researched this and people who work their know this is being added but cannot stop it, at this point it may be embedded in the chipset. If that is true then the class action lawsuit part gets really big as the very act of subverting privacy under existing and upcoming GDPR and other laws means that all the data they have in their possession is de facto a conspiracy.
Ciscos company logo is a Bridge.....
If they are all using the same devices then the algorithm is baked in to the chip logic as well as the management code that runs it, automatic pilot or whatever. I looked at an article recently about something like this from the protection side and the summary was unless you put a device (hardware) on the inputs then there is little that can be done