WYSIWYG

What You See Is What You Get. This is a journal blog, an explore-blog, a bit of this and that blog. Sharing where the mood takes me. Perhaps it will take you too.

Menowercogitatus; Cognitive Liberty - The Micro

This is the second of a two-post focus on how our technology is increasingly inveigling its way into our brains. Part one was yesterday's post (hint hint). 

Okay, we know that virtually everything we do on our computers and, particularly, our oh-so-smart telephones now has the potential to be tracked. It would be easy to get depressed about it all, dump it, and head for the hills. That solves nothing, however. 

The simple truth is that we, as individuals, are highly unlikely to be targeted by any 'superpower' seeking to wage war upon us. In our daily interactions with our tech, the main issue is basic privacy and the attack upon our ability to make our own choices. In the great move to user-friendly interfaces, there has been a standardisation that is both a boon and a bust. The boon is that we can pick up virtually any instrument now and find our way around it due to the standardisation of touch and swipe. The bust comes when we realise how many permissions are snuck in that we may not be aware of. What is required is that we take action to the best of our ability to minimise the impact of those permissions.

Among the various things that came to my notice in this little flurry of technological research was a YouTube channel. "Payette Forward helps solve problems with iPhones, Macs, and [Android] devices, through easy-to-understand articles and helpful videos." They have PLAYLISTS for a lot of the basics I am talking about. Interesting, informative and entertaining.

Yesterday I mentioned 'master and tools'. This is the thing that is perhaps getting a little forgotten as we become ever more immersed in the online world. The chosen instrument is clearly a tool - but so is all the software contained therein. There is a lot of connectivity that simply cannot be switched off by the user, but there is also quite a lot that can be. We have control over the 'permissions' - even when, sometimes, the machine throws back lines such as "if you switch this off, other things might not work." That is a tactic to keep you alive in the system's eyes. Over-ride it. Now I will give you examples from my own stuff - bearing in mind that the OctoKan and the Gopika work in Android mode and are 'synced'; every system works similarly. So you will all be able to find your way to the settings for your laptops, tablets or phones. You will all be able to locate the apps and permissions - they may not always be in the same order or layout, is all. (David and David, in the tubular link I just gave you, have stuff for IOS and Samsung, so give them a watch!) Anyway, here are screenshots from my couple to give you an idea.




A note on incognito mode - if you are unaware, you can select to open each tab in this mode to be more private.
This should definitely be used if you are not on your own machine, regardless of what you are doing.
I use it even on my own machine for things like online shopping, as it helps to cut down the excess cookie activity, and one's browsing cannot be tracked back in the event of someone else thinking to have a gander at your screen.
In Chrome, go to the three dots far right of the tool and search bar; click the incognito tab from the drop-down list.






The top four are from the laptop. Clearly, as it is a Chromebook, the OS will be Chrome - but as mentioned, every OS and browser will have settings you can investigate. Seek out all labels with Privacy, Security, Site Management and such. The last four images are from the phone. Same but different. As you see, every app will have notifications and permissions, and you can choose which ones you wish to have access to these things and by how much. You'll note here that I opt for the location to be requested each time I open the app - because it will not always be necessary to use my location if I am simply browsing. 

Most apps do not need your microphone, camera, or location, so moving these all to the full 'don't allow' or 'ask every time' position is worth it. Also, on the laptop, be sure to sign out of applications and sites not in use... I am thinking of places like Amazon, Quora, Reddit, and any other place that would love to keep you signed on permanently. It is in those that there is an increased risk of privacy being compromised.

Anyway, you're getting the gist by now! Note that you need to go through the procedure with everything; Google, Microsoft, Apple, Facebook/Instagram... it is worth spending a morning digging into what's on your machines and seeing what permissions are open. When downloading any new apps, you may have to allow permissions to initiate it - but then go into settings immediately and cancel the demands for access to your mic, photos, contacts, location, and whatever else you wish to remain silent. When challenged that adverts may not now be selected for you - say all the better! Don't allow yourself to be funnelled. I mostly don't face ads on the laptop due to using Adblock Plus (other ad-blocking software is available). I will be seeking something similar for the Gopika now.

In a related matter, as one who does a lot of search and research online, it is increasingly important that the suitability and authenticity of the sites I reach as verified. Google is currently updating the search functions it offers to enable a more reliable system. Read about it on The Keyword. There you are, a new site for you to browse!

Circling back to the start of this duet of posts, you'll recall I mentioned the Gopika wanting to monitor my every breath, movement, probably even my 'stooling'... you can well imagine my response to that! That all harks back to what Ms Farahany discusses in her book. While it can seem like a positive, it is also something which is currently unsupervised. This can be problematic. Then there were those earbuds that I was prompted for two or three times before being allowed to actually go to the checkout. Think how close to your brain they are. When I read about the phone alerts the UK government is planning, I couldn't help thinking that if you have earbuds in, that could be painful. Then I thought back to that report from the Chinese Journal of Traumatology. If UKGOV has all our numbers...



16 comments:

  1. All excellent advice here, thanks. My guiding principle is never type anything anywhere into the internet (that includes emails, WhatsApp messages, blogs, google searches, online purchases and other transactions etc) that you would not be happy for anyone anywhere to see. I'm well aware that an unfriendly government, other authority, or commercial entity would soon be able to work out, should they choose to, that I'm an enthusiastic reader of the Guardian who is a bit obsessed with cycling and dogs!
    Cheers, Gail.

    ReplyDelete
  2. very very interesting... the mama shares too much of our secrets we think... but she said it is only between friends.. and we all are friends in the world wide web right? (LOL)

    ReplyDelete
  3. it is all mind boggling yet interesting and so much fun. i am giggling at Gails comment. I do take care what i say or send, we do not want to have something out there that even a friend could use against us. that is the one thing about social media, FB and instagram and others like them that i see people typing things they should not and that could cause a lot of problems and direct the Bad Guys right to our computer or to our very door. it is so complex there are many who do not use these things you showed today. and a few people that I consider friends do not need to try any of this.

    ReplyDelete
  4. I'll have to carve out a day to look into all my 'settings'. There are a lot of helpful hints here -- thank you Yamini. I wish I had a more technical mind to make sense of this tech world. All this can be quite overwhelming at times!

    ReplyDelete
  5. Excellent advice and important information. Thanks for sharing! Take care, have a happy day and a great weekend!

    ReplyDelete
  6. About 25 years ago a tech geek told F that the internet was about as secure as a postcard. She acts like that is still the case. The problem is that (and you know this) she has turned off so many permissions that she can't figure out why G**gle meet will produce no sound. On her work machines that is a security thing they have installed. On her own tablet and computer, she has no idea which denial has produced that result (it isn't any of the obvious ones, and other video conferencing apps work)... What concerns F is how things that started out as independents end up aggregated in the hands of a couple of tech giants and before you know it all your apps are talking to one another behind your back. Grrrr. The real conflict in our house is between Mr B who would have everything talking to everything and doesn't care what he shares, and F who wants everything siloed - and nothing suggesting your life should include X based on a throw away comment you made somewhere else last week. Your duo of posts has also inspired a 'spin-off' post for Mr T .... you will recognize the subject when you see the post. Furrings and purrings Mr T (and F)

    ReplyDelete
  7. Our SIL is an encryption engineer. He is my go-to man!

    ReplyDelete
  8. Well YAM you have blown my mind...wow lots to think about. And now with the AI..that is purely scary. Recently on the news we heard that a 15 year old's voice was taken by AI...whomever runs AI called her parents using her voice saying that she had been kidnapped. Thus far my voice is not out there anywhere. I tried to use voice command program on the BAR mobile. I had to practice talking the robot did not understand anything I said...she/he/it repeated googly gook so I gave up.
    We had nearly 1.5" of rain in 2 hours. Our duct work was postponed til Monday
    Hugs cecilia

    ReplyDelete
  9. Thank for the great information! Gail's advice is very sound...Never say anything, post a picture of anything or refer anything on the internet that you wouldn't share to friends in "real life".

    Also...having a security systems specialist as a husband doesn't hurt LOL.

    ReplyDelete
  10. I'll return to learn a few things. Hope you are fine.

    ReplyDelete
  11. Hi Yam - all the best - sounds like good news ... I've noted these two posts - I need to gather some time to absorb all your info. Good luck for the coming weeks - looking forward to hearing more ... cheers Hilary

    ReplyDelete
  12. Loved both the macro view and the micro advice, which I think are al of a piece. I must take a look at that book. And thank you for reminding me to log out of applications--I went and signed out of Amazon and Facebook right away. BTW, I did once have a Russian hack get into my computer through Google Chrome, It was a frightening experience. My friend was held to ransom by one outfit, and had to pay them in order to save her documents.

    ReplyDelete
    Replies
    1. Hari OM
      Yikes. I have had to deal with viruses long years back, before Google became one of the best at beating these things. I am no fan of megalopolies, but there is no question that G is working very hard on security issues, which is why I stick with them and have moved to a Chromebook instead of a PC. The single main risk to me now would be downloading an app that was actually disguised malware... which is why I just don't "do" apps beyond the well-established and necessary! Ransomware works through the email system and almost always targets business systems. Any individual receiving such a threat ought to report it to local security authorities, for there will be ways to overcome it - almost always there is no real threat to files, it is just bullying. The corporate level stuff is a different matter. Yxx

      Delete
  13. I believe the moment we are connected online there is definitely some compromising of privacy. Only how much is the question. It's not that offline we are safe and secure. We aren't living in caves. People can keep a watch on your movements. Our address is public. So too our phone numbers to a certain extent. Telephone service providers have a record of all the calls we make and the location. The only difference that the vulnerability is far greater online than offline.

    ReplyDelete
  14. Morning YAM!! We just this year stepped into the 21st century by giving up out Landline we had for 43 years in this house.
    Thankfully I waited long enough that technology was such that AT&T could transfer our landline phone # to our cell. Surely save lots of headaches changing #'s every where
    Hugs Cecilia

    ReplyDelete

Inquiry and debate are encouraged.
Be grown-ups, please, and play nice.
🙏