You are viewing a single comment's thread from:

RE: Everything you need to know about Snowden's book "Permanent Record", and why he's being sued for it

in #snowden5 years ago

Yes. Encryption helps. Another option is to manually write over the data you deleted. Well, that process may not be guaranteed to completely change and transform the deleted file into a new file, but it may work to some extent, at least in theory.

Sort:  

Yeah that's another good option if you're not encrypting!

Wireless Ethernet:

Wireless Ethernet would be a great invention, assuming there isn't anything like that already, as WIFI is mapped out. I mean like a two-way walky talky device. Specifically, I would design the hardware to plug into the modem. The hardware would act like a wireless router. However, the software would be designed to connect to a virtual port that is actually wireless. But, hypothetically, if that is possible, that could be a compromise between Ethernet and the vulnerability found in WIFI. I'm just hypothesizing. I know that anything wireless is still vulnerable to an extent. I know there still may be hardware spyware, software spyware, viruses, backdoors, etc. But regardless, I'm just looking for options for people who may not want to be limited to Ethernet, to being plugged-in all the time.

Cordless Landline Phones

If a cordless landline phone is not mapped out at all or not to the same extent or in the same ways that WIFI is, then there has to be a way to adapt tech. I wonder if Blue Tooth is mapped out on public websites like WIFI networks are.

Wireless TV Remotes

I assume TV remote controls are not charted on websites. Therefore, there has to be a way to have wireless without violating any privacy or perhaps excessive amounts of privacy at least.

Coin Marketplace

STEEM 0.20
TRX 0.13
JST 0.029
BTC 67130.22
ETH 3466.74
USDT 1.00
SBD 2.73