Privacy-Invading Systems and How to Avoid Them
There are a frightening number of systems that are being used by entities to oppress people. Here are some known systems, what they do, and how you can avoid them.
Mobile Device Interception
Stringray
The Stingray is a cell-site simulator (IMSI catcher) that spoofs mobile network towers to intercept your mobile device traffic.
Mobile Device Access
Cellebrite (UFED)
Mobile Device "Forensic" Tools=
Grayshift (GrayKey)
Graphite
Spyware used by governments to read Signal messages
Commercial Spyware
NSO Group (Pegasus)
FinFisher (FinSpy)
Enterprise / Consumer Monitoring Software
Mobile Device Management (MDM platforms)
Microsoft Intune
Network and Bulk Data Analysis Platforms
Gotham (Palantir Technologies)
AI systems used to target people to kill under the name of "defense" and "intelligence"
Foundry (Palantir Technologies)
Commercial / enterprise data platform
Apollo (Palantir Technologies)
deployment and infrastructure control
AIP (Palantir Technologies)
Artificial Intelligence Platform
Metropolis (Palantir Technologies)
Older finance-focused analytics platform; largely superceded
Surveillance
- CCTV / Flock Cameras - Watch and track citizens
Operating Systems
- iOS - Treat users like infants, preventing full access to hardware
- Android - Treat users like infants, preventing full access to hardware
- Microsoft Windows - Treat users like infants, preventing full access to hardware