πŸ“° REPORT: Computer Technicians Spying O ...

πŸ“° REPORT: Computer Technicians Spying On Customer Devices

Oct 22, 2023

Early video release on blog (now public on channels)

Public on channels later after thumbnail creation (for mirroring)

Thanks for following / supporting independent content.


πŸ“Ί VIDEO / πŸ—žοΈ INVESTIGATION

In the following report / video, covering information on computer repair / supply snooping. How there are deals with Geek Squad to report on customers, and how many times, a technician may have a copy of your files forever (can be the case with storage recovery jobs).

Real Sting Operation: professor of computer science sets up monitoring software on devices (phones / computers), some of which takes screenshots every few seconds to keep an eye on the user of device.

Those devices contain the photos (some revealing) of hired models specifically photographed for this sting operation.

In addition, false sets of tax documents are planted on the devices -- to see just how far computer technicians would like to take this...

Using this monitoring software, we are able to see what exactly computer technicians are looking at.

(click below: watch on Odysee - join using my invite code helps promote channel)

https://youtu.be/ppOCR9h02f4


THE FACTS

  • 20 shops were checked

  • 4 out of the 20 shops did not turn on the device (or nothing was logged)

  • 9 / 16 shops accessed private data (over 50%)


SHARE TO EXPOSE UNETHICAL BUSINESS PRACTICES

[ READ SOURCE ARTICLE ]


SOLUTION ZONE

This blog is not only about introducing current / pressing problems, it's also a place to share solutions for those problems.

Before taking in your device, for any sensitive financial / personal files, you may like to try making a encrypted volume.

There are several applications to choose from here. From Veracrypt, to Zulu-crypt. Both, using the same underlying process for encryption (choose which one you prefer).

Both, trusted applications.

If you wish to take things even further, you could try out creating hidden volumes -- such as my tutorial on creating hidden encrypted volumes inside a video file.

2 years ago, I covered this in a Pinephone tutorial on Zulu-crypt. You DO NOT need a Pinephone to try this.

ANY Linux device can use Zulu-crypt. Here, we create a hidden encrypted volume inside a video file.

You might rather opt for something more simple: an encrypted volume on USBstick, for example.

https://www.youtube.com/watch?v=87yg8peq3kw


Share a link, leave a comment, like, coffee / membership, follow this. Recommend blog to others.

THANK YOU.


CASHAPP: $HumanRightsTech
JOIN MONTHLY (help fund coffee / public servers, posts / tips / early access & more)
XMR:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
πŸ’» coreboot laptop: supports public interest work here, get refurbished intel mgmt engine neutered laptop (USA based service, security / privacy / unique options available)


FOLLOW ON SOCIAL MEDIA

Twitter Fosstodon


πŸŽ₯ VIDEO CHANNELS / MIRRORS:

Youtube Odysee Bitchute Peertube


FEEDBACK / CONTACT

If you have feedback, comments, or suggestions... Love to hear from you.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org


Let me know if you have any thoughts / questions.

Happy to answer any questions.

Vous aimez cette publication ?

Achetez un cafΓ© Γ  πŸ₯· (RTP) Privacy Tech Tips πŸ“‘

Plus de πŸ₯· (RTP) Privacy Tech Tips πŸ“‘