The surveillance and data mining comes at the expense of the end user’s privacy, cybersecurity, and safety since most apps and social media platforms are intentionally developed to be highly addictive in order for the developer to exploit the end user for profits according to the Netflix documentary, “The Social Dilemma”.
In essence, OS, app, and social media end users are accepting “cyber-enslavement agreements”, meaning that once the end user clicks on “I agree” they are accepting the fact that they will be used as “Uncompensated Information Producers” whom are to be exploited for profits by the very tech companies the end user patronizes with their trust, loyalty, and hard-earned money.
According to the Netflix documentary, “The Social Dilemma”, Google, Facebook, plus other intrusive app and social media companies intentionally develop their apps and platforms to be highly addictive even at the expense of the end user’s privacy and safety.
The Facebook/Instagram whistleblower, Francis Haugan, also testified before congress in the fall of 2021 that Meta knew of the harmful affects Facebook and Instagram had on end users, especially teens and children, yet Meta continued to do business as usual in light of some end user’s ultimately committing suicide according the medical reports featured in “The Social Dilemma”.
According to Meta Cofounder, Sean Parker (Axios News), Facebook and Instagram use highly addictive and dangerous technology associated with “brain hijacking” technologies (social validation feedback loops) that support manipulative advertising technologies in order to exploit end users, including teens & children, for profits.
The surveillance and data mining business practices employed by tech giants such as Google, Facebook, ByteDance (TikTok-China), Instagram, and other tech giants pose massive privacy, cybersecurity, and safety threats to end users, including the end user’s employer.
With all of this being said, let me pose a question: “How is it legal for tech giants to intentionally develop highly addictive and dangerous technology in order to lawfully exploit their product users for financial gain at the expense of the user’s civil liberties, privacy, cyber security, and safety?”
Even app developers from adversarial countries such as China and Russia, are enabled by the U.S. Government, Google, Apple, and Microsoft to lawfully monitor, track, and data mine the Android OS, Apple iOS, and Microsoft Windows 8, 10, & 11 OS end user for profits posing massive privacy and cybersecurity threats to end users, including the end user’s employer.
I had purchased a Samsung Galaxy Note, supported by the Android OS, from a T-Mobile Corporate Store in Texas, to use while doing contract work for U.S. defense contractor, Space Data.
After reviewing some of the app permissions that supported the uncontrollable preinstalled (rooted) apps, I became concerned that the Samsung Galaxy Note smartphone was not a secure device to use within a confidential and protected environment such as the defense industry, critical infrastructure, government, and enterprise business.
The collective preinstalled apps were developed by over 15 multinational corporations, including those from China that had partnered with Google the developers of the Android OS.
My findings were shocking and concerning to say the least, especially considering some of the preinstalled apps were developed by multinational companies from China, such as Baidu.
I was horrified to find out that a single intrusive preinstalled app enabled the developer, including developers from China, to surveil the end user 24x7/365 days a year while data mining over 5,000 highly confidential data points associated with the end user’s personal, business, medical, legal, and employment information to exploit for profits.
The collective personal and business-related information being harvested from the Samsung Galaxy Note product owner by numerous preinstalled app developers included the following:
My findings concluded that most of the preinstalled apps could not be uninstalled or controlled by the Samsung Galaxy Note owner and/or device end user.
This meant that the Samsung Galaxy Note owner was forced to be surveilled by numerous multinational corporations, including those from China, who were responsible for the development of the Android OS, Apps, cloud storage servers, and social media platforms.
I couldn’t find anything specific regarding how much surveillance and data mining the OS and app developers could conduct on the end user.
However, privacy polices did state that Google and their app developer partners could share “unidentifiable” personal information with numerous third parties that included advertisers, publishers, partners, and other nebulous entities.
In-device T&Cs such as app permissions are the most important T&Cs because the app permissions state specifically how much surveillance and data mining the OS and preinstalled app developers can conduct on the product owner and/or end user.
In-device T&Cs include:
My report concluded that the Samsung Galaxy Note product owner accepts over 3,000 pages of complicated legalese written in a torturous manner that enables numerous app developers, including those from China, to surveil, data mine, and exploit the Samsung Galaxy Note product owner for profits at the expense of the device user’s privacy, cybersecurity, civil liberties, and safety by way of highly addictive, dangerous, and intrusive preinstalled apps.
In closing, we can see that smartphones, tablet PCs, connected products and PCs supported by the Android OS, Apple iOS, and Microsoft Windows 8, 10, & 11 OS are not private, secure, or safe forms of telecommunications and computing due to intrusive pre-installed apps.
Don’t take my word for this claim: T-Mobile and Verizon confirmed to me that all products concerned aren’t private, secure or safe due to pre-installed surveillance and data mining technology developed by Google, Apple, and Microsoft, plus all relevant pre-installed content developers.
T-Mobile’s admission: “We, too, remember a time before smartphones when it was reasonable to conclude that when you activated service with T-Mobile that only T-Mobile would have access to our personal information. However, with the Samsung Galaxy Note, the iPhone, and many other devices, there are indeed a variety of parties that may collect and use information.”—T-Mobile Privacy Team (FCC Consumer Complaint #423849 filed by Rex M. Lee/Public Record)
In April, I contacted Verizon to see if I could purchase a private, secure, and safe smartphone, tablet PC, or even a traditional cellular phone.
While Verizon said they could sell me a private, secure, and safe telecom-related solution, after reviewing the options, I concluded that wasn’t the case.
Verizon agreed with my conclusions that all products concerned aren’t private, secure, or safe telecom-related solutions:
Verizon’s admission: “We have reviewed your request at the highest levels of our organization and have confirmed that the only solutions to make a phone private and secure are available through third-parties, not directly from Verizon. … Additionally, Verizon is not equipped to address preinstalled solutions or applications on any device.” (July 2, 2018)
Below are some examples (including screen shots) of in-device application permission statements, application product warnings, and interactive application permission statements:
Note that the above app permissions and product warnings are only a few of numerous permissions that support hundreds of preinstalled apps and 3rd-party apps downloaded from app stores.
Note that some individual apps can be supported by over 60 intrusive and exploitative permissions.
Question: “If you were enabled to read the enclosed pre-installed app permissions and product warnings prior to making your smartphone purchase, would you have purchased your smartphone?”
I believe that it is illegal to hide application legalese such as product warnings from consumers and businesses which I believe the FTC and State AGs need to investigate.
Hiding product warnings from consumers is tantamount to a cigarette company hiding the product warnings associated with cigarettes within the packaging.
Rex M. Lee, Cybersecurity and Privacy Advisor/Tech Journalist. For more information, please visit CyberTalk TV at: www.CyberTalkTV.com