Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: generally

I don’t think so. Whatever algorithm Q is talking about is some homebrew thing just shared with the big social media creeps is my thinking.
Snowden either built or distributed it.


412 posted on 04/09/2018 10:47:14 AM PDT by No_Doll_i
[ Post Reply | Private Reply | To 405 | View Replies ]


To: No_Doll_i

Whatever it is is creeping me out.

Went to the dentist, mentioned that in a text — NOT on FB. Just looked at a youtube and it was preceded by an ad for a dentist on the same block as the one I went to.

Odds?


415 posted on 04/09/2018 10:50:44 AM PDT by generally ( Don't be stupid. We have politicians for that.)
[ Post Reply | Private Reply | To 412 | View Replies ]

To: No_Doll_i

I think Bill Binney wrote it? At any rate, Snowden has possession and is waiting by the @jack’s door to run it on Twitter to see their censorship/data sales algorithm.

Open the door, @jack


458 posted on 04/09/2018 11:21:45 AM PDT by txhurl (The Final Thunderdome: Two Americas enter, One America leaves)
[ Post Reply | Private Reply | To 412 | View Replies ]

To: No_Doll_i

Let me throw some ideas on this subject if I may...

If the “Bridge” is indeed typically or purposefully using Cisco routers then it all makes sense. I have looked into this and Cisco after production adds a component to each router that allows it to communicate to a specified device, i.e. a main collecting point “doorway” into the Dark States data collection machine. No passwords or anything will stop it,. it simply branches the data to another location just like if you are making a replicate copy for business continuity practice in case one goes down the other takes over. In their case they have a clear connection and all the data just pours into their data structure and off we go

And yes I have researched this and people who work their know this is being added but cannot stop it, at this point it may be embedded in the chipset. If that is true then the class action lawsuit part gets really big as the very act of subverting privacy under existing and upcoming GDPR and other laws means that all the data they have in their possession is de facto a conspiracy.

Ciscos company logo is a Bridge.....

If they are all using the same devices then the algorithm is baked in to the chip logic as well as the management code that runs it, automatic pilot or whatever. I looked at an article recently about something like this from the protection side and the summary was unless you put a device (hardware) on the inputs then there is little that can be done


491 posted on 04/09/2018 11:51:55 AM PDT by 100American (Knowledge is knowing how, Wisdom is knowing when)
[ Post Reply | Private Reply | To 412 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson