the more options there and can be used to violate privacy. Most people consider they have little, if any, control over their personal data. Better encryption and the minimizing of data requirements aids in this goal. PIMS systems are a new technological developing that promises to aid the privacy dilemma. The PIMS system consists of a user’s server, running the services selected by the user, storing and processing the user’s data locally instead of on an online server. The user owns the server or pays to use the server. The server does what the user wants it to do, and nothing else. These servers offer the possibility to reconstruct technology, and industry. Although these PIMS are a security risk, they are far less risky than today’s large, …show more content…
While using tor is a great way to keep your searches from being tracked. It also comes with its downfall. While using tor it is wise to avoid using any accounts that identify you. That includes any accounts that store your user names, real names, address information or anything in the matter that can be linked to you. Sites that require your location or that require webcams. This includes sites like Facebook, using a personal account on Tor be it email be it Amazon can link your traffic and deffet the whole purpose of anonymity. There are a large number of websites that don’t work on the Tor browser because they require scripts to run. These scripts are blocked in tor by default for anonymity proposes. One of the most annoying downfalls of using Tor is all the CAPTCH`s tests that involve typing the letters on a small picture to prove that you are a indeed a human and not a bot on an attack mission. But other than that Tor is a great way to conserve anonymity if you are doing some web browsing. Not to mention the endless deep sea of websites hidden from the rest of the world that you can now have access to. On the dark net you will find so truly interesting things. There is absolutely no regulations so you can stube on to a disturbing site or an inlighting site. And if at any time you feel like your anniminity has been compromised, you simply refresh the connection. Your IP …show more content…
After creating the account that basically created itself. Since Facebook for some reason knew a lot about me to the point where it was creepy. I decided to see how much information I could dig up on a random person. I picked a lite friend from high school that randomly came to mind. With a couple hours’ worth of “online stocking” I was able to gather quite a lot of information. From his posts I was able to remember his personality, what his plans were, what he has been thinking, doing, going. I did a keyword search for “work” and I was able to create his basic work schedule, his basic leisure schedule, his basic private schedule. I also learned where he worked, doing what, with who and how much he was making. I also learned what his plans were for latter in the day. Were he has been thanks to location tags on posts. I also learned if he was dating, where he went to school where he currently is going to school, the make, year, color and plates of his car. Where he lives who lives with him. If he’s been out of the state where he has lived, his phone number, email, birthday, and other social account he owns that I can use to learn more. I learned his favorite color, books, TV shows, movies, spots, etc.… I also had access to his profile photos, videos, what he like and what he doesn’t like. And of course if he’s online. So now I know this kid like my own brother and I didn’t have