Meanwhile, Facebook spies on everyone and uses that data to propagandize us with messaging designed to control our minds.
The tech industry is looking pretty damned awful right now.
Meanwhile, Facebook spies on everyone and uses that data to propagandize us with messaging designed to control our minds.
The tech industry is looking pretty damned awful right now.
And just like that, possessing the bitcoin blockchain just became a Federal crime: Blockchain for bitcoin is infected with child porn | New York Post
A very decent explanation for those not wanting to read the technical paper:
“There’s no easy way to explain Bitcoin, but let me wave my hands and try: When you go to the ATM at a store and get money to buy a six-pack, you put in your bank card. The transaction processor verifies it somewhere in the ether, takes a fee, and spits out cash. It’s all powered by software. OK, deep breath. Acquiring Bitcoin is like using an ATM, except instead of government-backed money you get proof that a computer somewhere solved an automated puzzle faster than other computers, and instead of using an ATM card you’re using an auto-generated token that only you have, and instead of connecting to a bank you’re connecting to a decentralized network of computers that collectively maintain and update copies of a massive historical database of transactions—and that also collectively validate transactions, using, well, math, and spit out new Bitcoins from time to time, to reward the puzzle solvers. Slow exhale. Almost there. And instead of buying a six-pack from someone behind a counter, you’re transferring some amount of Bitcoin to another anonymous token. Over time, all the transactions that people make get lumped into blocks and validated, and they get a special code that takes into account all the codes in the blocks that came before, and thus you have it: a blockchain. According to Bitcoin.org, the Bitcoin blockchain is about 145 gigabytes, though it will be bigger by the time you read this.”
The author goes on to write:
“The current wave of coins will eventually ebb, because it’s a big, inefficient, unholy mess. It’s more ideology than financial instrument, and ideology is rarely a sustainable store of value. Plus, transactions are slow (everyone says they’re fixing that), and you shouldn’t have to use an aluminum smelter’s worth of power to make new currency.”
The article spot lights some very scary ramifications of blockchain technology, such as encoding a permanent record of allegations (not convictions) that would tarnish individuals for life as it could not be deleted.
Read the whole article to get an un-hyped perspective on bitcoin and blockchain technology.
The story of how that Sudafed ad got to me begins at Walgreens. As I bought tissues and Afrin, I keyed in my phone number so I could get loyalty points.
Stores use your loyalty card to identify you and all of your purchases. Your purchase transactions are then sold to other marketing companies. This data, in turn, can and is matched to your Facebook account and other online data using the phone number that you gave to the store and to Facebook or Google.
Think about how Facebook, Twitter and other online services are constantly pestering you to give them your phone number. Once they have your phone number, anything else you do that is linked to your phone number – such as using a loyalty card when buying stuff at Safeway or Walgreen’s is then accessible.
Everyone is also using the tracking data that Google collects on your Android phone to monitor where you are. Remember, that too is tied to your phone number. As I described on my other blog, the Facebook dossier even tracks what apps you have on your phone and data mines that to identify potential marketing opportunities.
Google and Facebook are doing highly invasive surveillance and almost no one understands what is being done or what this means.
Why the Bitcoin bubble may explode when it pops:
One reason for regulating blockchain-based cryptocurrencies, also known as digital tokens, is the growing concern that the virtual money they represent could be used for nefarious activities, such as money laundering. Cryptocurrencies could also be a threat to the current financial system because they have at times encouraged unbridled speculation and unsecured borrowing by consumers looking for a piece of the crypot action.
Government or central bank issued, blockchained-based cryptocurrencies could be far more useful for legal transactions than the underground currencies like Bitcoin. Bitcoin is great for secret or questionable transactions that do not want to be tracked, of course, but most transactions are not in the camp.
(Note “blockchain” is an important bit of technology that has numerous applications other than cryptocurrencies.)
One of many companies working to automate the restaurant business and reduce labor and benefits costs:
Pasadena-based hardware startup Miso Robotics just got a big vote of confidence from investors, in the form of a $10 million Series B. This latest windfall led by Acacia Research Corporation brings…
What is “Mail.com”
Last fall, I switched my email accounts to an email service hosted at the url mail.com which provides “free email” at your choice of up to about 200 possible domains that they have registered.
The email service is free, paid for by sponsored advertising. The ads take the form of simulated mail messages in your inbox (since they are not real email messages, you cannot mark them as spam). They also take the form of full screen ads when you first access your email via the web – typically its a full screen ad trying to convert you to a paid premium email account. Similarly, on the Android app, sometimes when selecting a mail message to read, you will see a full screen ad before you can access your email message. As before, these ads are often from the mail service itself trying to convert you to a paying customer. If you pay a subscription fee, the ads allegedly go away.
SEE UPDATES AT END
When I tried to login one day in February 2018, I received this message saying access to my account was “blocked” due to “irregular activity”:
I contacted Customer Service using their online form (the only way to reach them) and received this 24 hours later (to my alternate email address):
The service, arbitrarily, without any explanation, shut off access to my email and calendar for reasons having nothing to do with me. In fact, this shut down occurred overnight while I was a sleep. Clearly, this is not something I caused. Yet they refuse to provide any explanation.
I contacted them a third time to ask for an explanation and they sent a form response saying a “ticket” had already been opened on this issue and dealt with (see above) and, basically, further requests to them will be ignored. They actually say that “Customer Support is our main priority” which empirically is not true.
I looked online for reviews of “Mail.com” and I learned two things:
1. There are many fake review web sites with titles similar to “Top Ten Best …” where every product or service is wonderful.
2. There are also many user community web sites that had many negative comments about “Mail.com”. My experience is apparently not unusual with Mail.com.
Some of the comments voiced a suspicion that Mail.com blocks accounts after several months if you have failed to convert to a paid subscription account. Since Mail.com is unreachable, it is impossible to discuss this allegation with anyone at Mail.com.
Better Business Bureau
The parent company of Mail.com is 1 & 1 Mail & Media Inc. The company, in various places, is shown with an address in Pennsylvania but may be based in Germany. It appears to be connected to 1&1 Internet, Inc as some of their IP addresses map back to 1&1 Internet.
According to the Better Business Bureau report for the Washington, DC area only, they have received 30 complaints, 1 negative review and 1 positive report. BBB assigns them an A+ (based on separate experience I have documented with BBB, BBB ratings are meaningless). The negative complaints generally involve having their credit card billed for services the user says they did not authorize and the great difficulty that paying customers have in deleting their account and getting Mail.com to stop billing them.
The company tries to have you to install various add-on software components to your Internet browser, ostensibly to give you instant notice of new mail. However, many reviewers say you should not install these components and if you do, should remove them. 82% of IE users uninstall the component within one week of installing the add on. Many “free” browser extensions are actually used to spy on your online behavior, to track your online web access, and to create marketing dossiers about your possible interests. This data is then sold to organizations wishing to target people like you, to sell you products or services. We do not know if the “free” Mail.com browser add ons perform this feature (as noted, Mail.com is unreachable and makes it impossible to ask them questions).
When You Lose Access to your Data
When you lose access to your email account abruptly and without warning, you need to immediately update your email contact information with all accounts you have elsewhere, plus you need to alert all of your email contacts that you have lost your email service.
Worse, however, is that we typically save various messages – often important ones – in online folders for future reference. For example, emailed receipts or invoices.
When your account is cut off, you lose access to potentially substantial amounts of critical information. Effectively, Mail.com is stealing your personal data – and their terms of service even spell out that they can do this.
Furthermore, Mail.com does not tell you anything about the “irregular activity”. You have no way of knowing if the security breach is potentially worse – has your personal information in your account or folders been accessed? This is a critical security problem. What happens to the data in your account after they block it? Is the information securely erased?
Empirically, Mail.com is 100% Unreliable. Based on our actual experience outlined above, we strongly recommend avoidance of MAIL.COM
Their customer service is awful – there is no way to contact them except through a single online form with a 24 hour turn around (others report turn around time up to days to weeks).
They claim to have excellent customer support. When they offer no assistance on issues as critical as loss of all your email and provide no information about their actions, their customer support claims are empirically false.
Unfortunately, there is no way to contact the company. They refuse to acknowledge any further contact through their online customer support feature. It is impossible to ask them for their perspective on the items outlined above.
After this, I am transferring important items like emailed receipts, documents and other data to offline storage and/or printing them on paper.
Switched to Outlook.com
I have switched to reputable nline mail services offered by Microsoft and also to my own email server that I control. Using the Outlook email application, mail that was been stored in cloud email folders is also configured to be stored as a local copy on my own computer. This is a fantastically better solution than cloud-based only systems like Mail.com.
Keywords: MAIL.COM REVIEW, MAIL.COM ACCOUNT BLOCKED, MAIL.COM SUSPICIOUS ACTIVITY, IRREGULAR ACTIVITY
Update: Many people have had problems with them in the past, exactly like others are also reporting this week. There are many reports on Twitter this week of others losing access to their email too. A online comment at an online forum looked up their server IP address and found that their servers are blacklisted by anti-spam systems. This suggests defects are causing their systems to be either hacked or abused for the purpose of sending spam – indicating they have little idea how to manage an email system.
CONFIRMED: As of Feb 16, 2018 at least one of their IP addresses is blacklisted on anti-spam lists. I confirmed that the IP address 220.127.116.11 belongs to 1&1 and it is presently blacklisted.The second 1&1 IP address I checked later is also blacklisted.
Their terms of service say they can and will terminate your account and delete your private data, for any reason what so ever, whenever they feel like, without warning.
There are rumors online that
1) mail.com’s servers were hacked (this has reportedly happened before)
2) mail.com had a pre-announced system upgrade about 24-48 hours prior to the loss of accounts. The rumor is the upgrade failed.
3) As a consequence of either (1) or (2), mail.com is said to have possibly lost all user data connected to the accounts,
4) Or, that mail.com routinely blocks access to free accounts if the user does not convert the free account to a paid premium account within a few months.
I have attempted to contact mail.com through their online customer support tiny-form and via Twitter and they have not responded to anyone. It appears that you cannot get telephone support unless you upgrade to a paid premium account. Does that mean blocking accounts and then having to convert to a paid account to contact support to restore service is a protection racket? We have no way of knowing as Mail.com does not respond to customer inquiries.
Avoid all use of 1&1 and mail.com products and services. Run away fast.
Two weeks later they sent this insulting email. I have a B.S. in computer science, an M.S. in software engineering and have taken additional graduate course work in information security. You’d think I might know a few things… they still have refused to provide any information as to what their security systems detected. My mail.com account remains blocked. I have moved everything to a Microsoft hosted email system which has been secure, solid and reliable.
Update February 28th, 2018:
And … the account remains blocked in spite of what their tech support said.
Update March 5, 2018
And at last, 3 weeks later, I can now log in again to my mail.com email address. I have already switched over 149 accounts, groups, vendors, etc, to my new email address, plus am now forwarding all of my stored mail, from mail.com to my new email address at a new service provider.
My account at mail.com had been set up as my primary email address for handling all email correspondence. Being abruptly cut off for 3 weeks, with no explanation, and initially, with a statement from the vendor that I was cut off permanently, is insane.
I need to replace an old toilet and had to order one at Lowe’s. It seems they only stock the “tall” version of toilets now days, rather than old fashioned regular height toilets.
We go to a Point of Sale system where a staff member logs in to place the order. It looks like its running a VT100 emulator – like 1970s or 1980s technology. It’s apparently old Unix but looks like DOS, if you get the picture (yeah, its ancient technology).
They enter my phone number to look me up in their database – and it returns someone with my name in a city and state I have never been in.
We are told how wonderful information systems are to improving efficiencies and effectiveness in organizations, and in presenting new marketing opportunities.
But bad data and bad data mining occur everywhere and render such ideas moot.
Last week, we received a sample products package for Mom’s who’ve recently given birth, for a family member who has never lived in this house and who is not pregnant nor recently given birth, and which was addressed to her pre-married name. A bit of looking online finds others have received these sample products. One recipient called the company and found they buy customer lists from many stores like Toys R Us, and what not, and run data mining software to discern facts about people. And then promptly mail them a sample products package as part of their marketing efforts. Garbage in –> Garbage out.
Meanwhile, my GMail account became so overwhelmed with email for other people that I had to trash it. Except I can’t – the apps I have on my phone are under my email address. I have, however, moved all of my email correspondence to a different email provider. However, my GMail account receives billing statements for other people with the same name who likely entered an incorrect email address for our similar names.
We know that GMail runs artificial intelligence analysis on our email to build up a marketing profile. It is not scanning for keywords – it is literally the equivalent of someone reading all of your email and taking notes (another reason to leave GMail). GMail is taking notes on other people’s correspondence but attributing those emails to me. Google is building a dossier on me, for marketing purposes, based upon analyzing emails that have nothing to do with me – in other words, Google’s dossier on me is full of crap.
Most of the email I receive on that account is to other people who entered the wrong email address. Consequently, I receive monthly billing statements from businesses I’ve never done business with, in cities and state’s I have never lived in. I receive reminders to take my BMW, Mercedes, Audi and Volkswagen vehicles in for maintenance (I own none of those). I also receive notices of bills not paid (apparently I am a dead beat BMW owner except none of these are mine). I receive all kinds of emails for products and services I have never used, from vendors I do not know. The email account is completely wrecked. Yet Google continues to analyze email in that account without recognizing its all garbage.
One time when we pulled a credit report on ourselves, we found data records saying we had lived in places we had never lived, and employment history showing us working at places we had never been to (we requested the records be corrected).
All of these grand databases that are being data mined to improve marketing are full of crap. No amount of artificial intelligence, data science or data mining can fix that these databases are full of crap information.
Study finds that 2 in 3 jobs in Las Vegas may be automated by 2035. That’s just the headline.
The real story is that 50% or more of jobs in most metro areas at a risk of automation by 2035. Areas in yellow, orange and red indicate where more than 50% of local jobs are at risk of being automated by 2035.
Studies like these should be viewed as “possible scenarios” and not as absolute predictions for the future.
Automation has been happening for a hundred years. New, low cost technology enables automation to be applied in places where it was previously cost prohibitive or the tasks were too difficult to automate. This change is happening quickly.
Again, as frequently noted on this blog, automation is happening. The rapid increase in minimum wage and benefit requirements is accelerating the trend towards automation, improved work place efficiency and variable cost cutting – and a loss of many types of jobs (not all job losses will be low skilled either).
Similar to Uber’s “God View” scandal, Lyft staffers have been abusing customer insight software to view the personal contact info and ride history of the startup’s passengers. One source that formerly worked with Lyft tells TechCrunch that widespread access to the company’s backend let staffers “see pretty much everything including feedback, and yes, pick up and drop off coordinates.”When asked if staffers, ranging from core team members to customer service reps, abused this privilege, the source said “Hell yes. I definitely looked at my friends’ rider history and looked at what drivers said about them. I never got in trouble.”
Web site Quartz recently discovered that Google routinely logs quite a bit of information in your Location History, plus uses Bluetooth devices as an additional source of location information – even when you have Location turned off. Even on phones not having a SIM card installed.
Surveillance and privacy violations are the primary business purpose of the Internet.