There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

galloog1 ,

They could use unmitigated microphone access to develop an exact profile on what would get you to spy for them and betray the country and to what extent. Location based models from minute gps data which can predict exactly where you are to maximize attacks on infrastructure. 3d models of the inside of every federal building and us military bases from direct camera access.

Combining models can create increasing impacts with automation and cyber capabilities.

An individual example would be automatic ai generation of images of your family being threatened sent to you while you are at work. All they are asking you to do is go and flush the toilet.

Everyone does that at the same time and overwhelms the sewage system creating a manufactured infrastructure crisis in Arlington VA around the Pentagon. This multiplied by a hundred issues all at once as they invade Taiwan.

This is the type of attack that’s only possible with direct access to literally all the data that the little sensor node that is your phone can provide over time. It doesn’t include the types of profiling that they could do with your political inclinations to magnify any discontent with the world around you at the most inconvenient time for the government. It also doesn’t include the possibility that you might be a decision maker for government contracts someday or a politician influencing policy towards China.

Ever done anything wrong and still had your phone powered on that could possibly be used against you? Are you sure? What if they have enough image data to make a video that looks just like you doing something against your loved ones that they also have profiles on?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines