First of all, the ISP controls cable modem firmware. They have all the settings and manage the device. You don’t get much control there.
As for your question, I’d say no, for 2 reasons. First, designing that capability is expensive and modems are built for cheap reliability. Second, any hardware to spy is more useful installed in a data center accessible to their user base. There is not much point installing unnecessary tech to one endpoint.
As for router, they are beefier CPU-wise. AT&T has in the past prevented users from changing DNS settings and that could lead to lots of tasty data. Deep packet inspection is becoming more prevalent in home routers as is integration with other technologies. (EERO devices for example).
Make sure to fire up a VPN or something when you need.
Don’t take on all that guilt. There are things we can do to limit our data, but a lot, dare I say the majority, is scraped from sources beyond your control. You may have great practices and security, but others may not, and those weaknesses or business arrangements are vectors for breaches like these.
We’re all in the same boat here.
I feel a lot of these responses miss the mark. If I read it correctly, you suggest matrix is the data leak and the results of which show in Instagram.
Matrix has many clients, one of which could be leaking data, but not necessary from your end of the conversation.
There are also keyboards which analyze input, and high privileged apps that can read notifications.
From what I understand, Meta apps can scan a device for a list of apps installed (probably somesort of fingerprinting concern) but can’t actually read app interactions or content.
I’d say hi in a chat with some clear, unique keywords on a new or old/wiped device and see if the leak continues. It may not be you at all, but it would identify the problematic device
Enlightening read and explained very well.
As for the Apple bug bringing back old photos from an erased data partition; non-applicable if I recall. Apple identified the bug having to do with restoring devices from backups. Backup data contained the presumed deleted content.
This article is therefore correct that deleted photos from reset devices (and not restored from backup) could not be recovered from the data partition.
Look up the IRS’s ID.me verification. That’s a nasty 3rd party IMO.
Ha! I gave up that fight long ago. I just try not to make it easy for them.
Just sort of pointing out this tracking network (like many others already running) is happening whether you opt out or not.
The opt out part is just security theater for your peace of mind.
Keep in mind they (Google, Apple, Amazon, etc) must still comply with government warrants. Probably pre-encryption.
I use both, but a big complaint of noscript is the inability to tell what scripts were blocked. I end up unblocking ***CDN.com or ***static.com and if that doesn’t work, check each until it does. Sort of defeats the purpose.
I installed it on my parents computers and trying to teach them how to get necessary function working again is beyond them.
I have instead installed privacy badger since I read it also blocks scripts.
I think you are talking OBDII systems, and while they communicate with the ECU, that system wouldn’t need any GPS access. I don’t think it has a direct link with the cambus that would hold the more advanced data. (Which if memory serves, also doesn’t handle GPS.
There is a dedicated port in my car specifically for data logging, but it only records realtime, not past travel. My GPS unit does track “breadcrumbs” if not following a road, but you’d have to interface directly to that computer. since there is no Bluetooth, there is no contact data or advanced privacy weaknesses.
Looks like there is an iOS app in development
Residential utility customers have a legitimate expectation to preserve individual and behavioral privacy with regard to energy-related or water consumption data collected by the utility.
That’s so cute. Here is a list of 3rd party scripts that load when I pay my bill:
seg.js
I may expect and want privacy, but I’m under no illusion I have it.
I’ve been on the receiving end of one of those extreme campaigns. Let me tell you it’s no joke.
Imagine we’re all hatchlings running to the ocean shore for safety. Yeah, seagulls and predictors are picking us off one by one. It sucks.
Then a “life event” happened listed above and suddenly all the gulls look at you in straight in the eyes.
It was brutal. It was restless. It changed the way my family and my extended family protected themselves. I built piholes for anyone and everyone, recommended browser settings and plugins, and purchased VPN.
Stay low, stay private. And remember you’re being watched.
Thanks! Didn’t know about that yet.
Sort of wish I exported my settings from simple to import to the Fossify app before I uninstalled. Oops.
EDIT: reinstalled the old version, exported, erased the app, and finally imported to the new fork. Everything worked great.
The app icon changed from green to orange after import so I uninstalled the wrong app at first. Haha! Was an easy fix once I knew what happened.
I sort of do this because I own my domain. I generally pick an annual keyword email filters can lock on, followed by an identifier with whom I’m contacting.
It’s easy to trace if addressed get breached, especially unreported breaches, and add to a burn list if they get spammed.
Also, if I have no intention of responding I give fake info or if I need that rare password reset link I know when to look in the spam.
Yeah, using my domain is it’s self a bit trackable, but enough friends and family use it I figure poisoned data is sweet justice.
Fun fact, but for some reason old fake accounts have boomed in popularity; like data brokers with bad information bounce verifications off each other, linked it to some poor sap in another state, and snowballed into an actual profile. I’m going to use that identity as an alt profile for something someday.