• 0 Posts
  • 5 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle
  • Probably because no one has any proof other than anecdotal evidence. And the vast majority of times it’s looked into it’s because the person reporting it doesn’t understand how else their information is collected (i.e. web searches, intranet data for other people, browsing histories, etc.)

    Look at it this way, is it more likely that the majority of security researchers that look into it, find nothing, and deem these use cases as inefficient and improbable, are wrong; OR is it more likely that data collectors builds good profiles, mixed with some Baader-Meinhof, a little Dunning-Krueger, and a lot of coincidence?

    Not everything is a big conspiracy, nuance is neccesary, or the sky will always be falling.


  • It’s like you didn’t even read the original post. Your first three paragraphs are redundant because the OP already mentioned that they agree with you, barring calling it bullshit.

    Your utilitarianism the the whole problems they’re pointing out, if you read the actual post, you’ll notice that all it does is draw us further and further to the right, with no end in sight.