Home › Forums › Computers, Games and Technology › Wtf Internet? Big brother bastard!
Tagged: Stealth
This topic contains 14 replies, has 11 voices, and was last updated by
Anonymous 4 years, 3 months ago.
- AuthorPosts
Ok, something just happened to me that confirmed my suspicions about something… SUSPICIOUS!
Last night I watched some songs on Youtube on my desktop PC (songs by Christy Moore. I recommend him).
Today when I opened the Youtube app on my Samsung phone the exact songs came up, and when I opened the search box there was the search I had used on my desktop PC last night!
How da fuq does it know I’m the same person using two completely unrelated devices? I don’t use Facebook or Twitter or anything like that, don’t have anything signed in across both devices, don’t have a Youtube account (if there is such a thing), just access it like any other peon.. The closest thing to an exception is occasionally I am logged on to mgtow.com through both, but I certainly don’t blame mgtow.com as this has been nagging at me since before I discovered this site.
Is it wirelessly sharing cookies or something? Dang you Bill Gates, dang you straight to heck!
Person of Interest is real life s~~~.
I don’t have a tv but watched an episode in a hotel.
If it has a screen ….. it’s watching you more than you watch it.
I’ve done both coding and scripting in my time, bro (thanks for the answer btw) the question is, what code is sharing what with what?
The only thing I do across both devices is banking. Are my banks sharing info with Youtube? Seriously? That’s not quite in their privacy statements, from what I remember reading…. and what’s the payoff for them? For their customers to feel less secure about their financial info, the one bit of personal info people actually worry about?
Person of Interest is real life s~~~.
I am thoroughly hooked on Person of Interest! I buy the DVDs as soon as they come out.
If it has a screen ….. it’s watching you more than you watch it.
Your PC, television, smartphone, and lord knows what else are watching and listening. The cell is keeping track of your location. Govt agencies have unrestricted access to them through backdoors that ISPs and cell companies are required to provide.
This is not fiction to move some TV thriller along. This is established fact.
Society asks MGTOWs: Why are you not making more tax-slaves?
Alot of home ISP modem/routers are now heavily locked down too and you’re forced to use them, no more choosing your own device. At this point there’s no reason that they can’t see into your network if they wanted to either. It’s a truly disgusting situation.
The internet is rapidly becoming more and more invasive and a nuisance, that’s why I put 3 or 4 old computers in a network that has no physical connections to the internet. Won’t stop someone determined to get you specifically, but will keep away most of the pests.
Android phone – means you’re signed in to google services permanently. Youtube is owned by google, – you must also be signed into youtube on your desktop, hence seeing the songs. If you sign out of youtube (should be top right) on your desktop you wont see this happening. If you use google mail on your desktop and sign in, and later go to youtube you’ll automatically be signed into youtube with your google ID. It’s annoying.
Best bet is to go into your browser options and get it to delete your history & cookies every time you close the browser. If you want to be able to go back to any webpages of interest, just use bookmarks.
Love a bit of Christy Moore btw, ‘DTs’ is hilarious!
We only dream this bondage. Wake up and let it go. - Vivekananda
A European Court Judge has declared data mining between the US and Europe illegal just a day ago. Now Google and the Company, along with the data merchants are crying foul.
In light of illegal international snooping by the CIA and NSA the Europeans are finally growing a pair and telling the international Data Thieves to get themselves in queue!European Court Rules Against Safe Harbor
Don't let them Blame, Shame or Tame you!
Give 'em NOTHING, not even an answer!
#GenderSegragationNow!
Anonymous42Lucifer hit it! I dug deep into my google account and was shocked at how every search was recorded in chronological order, and cell phones can be GPS tracked (if equipped), or the old method of electronic triangulation between 3 or more towers. It seems all the horrors of biblical prediction are coming true,,,, I always liked a good fireworks show, please pass the popcorn….
Lucifer hit it! I dug deep into my google account and was shocked at how every search was recorded in chronological order, and cell phones can be GPS tracked (if equipped), or the old method of electronic triangulation between 3 or more towers. It seems all the horrors of biblical prediction are coming true,,,, I always liked a good fireworks show, please pass the popcorn….

A while ago, I went in there and erased all the search terms and set it on “pause”. I also make sure it’s not logged in when I’m doing anything sensitive.
Alot of home ISP modem/routers are now heavily locked down too and you’re forced to use them, no more choosing your own device.
Not true. No matter how they may “lock it down,” they have to route your IP traffic for it to work. That means you can ALWAYS install a second router with a firewall plugged into your ISP’s router and keep anyone out of your network. Using NAT, ip masquerading, and similar packet shaping techniques, there is literally no way for them to distinguish between your PC directly plugged in and having a second router/firewall in between your home network and the ISP router.
IP traffic is IP traffic.
The difference is they can’t come through your firewall and see anything on your local network. Not that they do that – I run Comcraps and regularly do dumps of all traffic passing on my network and I’ve never seen anything from Comcast attempting to look at my internal network.
The Chinese? Different story – they’re constantly trying to get in to my network as I guarantee they are with yours, you just don’t realize it. Plus most of their attacks are just looking for devices plugged in where the owner didn’t bother to change the default accounts/passwords on the device. If you’re dump enough to do something like that, I have little sympathy.
Also, keep in mind that I forward traffic from the outside to multiple servers I’m running on my home network which is why I get the chinese(sometimes Russian and other) hack attempts. This is completely normal and non of that will ever make it past your Cable/DSL/Fiber modem/router/firewall unless you specifically forward certain traffic like ssh to your internal network like I do.
The reason google has similar search cache or play lists on your different device is 1. you’re logged into one of many the services they run like youtube and they’re simply sharing cookies or 2. They’re both on your internal network going out through your conncetion to your ISP. In the case of #2, you usually only get one public IP address and all of your traffic routes through there (ip masq). Therefore to google, everything that gets to the internet through your ISP connection looks like it’s all coming from the same machine (from a networking POV) so they naturally offer some of the same stuff regardless of which physical device it originates.
I’d be far more worried about OS venders like microsoft and apple spying on you than anything from your ISP or the internet at large. This is why I ONLY run linux. Nothing beats a million eyeb~~~~ scrutinizing the source code for keeping “undesirable” spyware, etc. Not that Linux is perfect, but I’ve spent hours sniffing my network and never saw traffic going into or out of my Linux box that I didn’t authorize/enable in some way.
Linux: The ultimate GYOW Operating system and it runs on ANYTHING.
PS: If you’re really worried about big brother watching your internet traffic, get yourself a $7/mo proxy account and all your internet activity will go encrypted anonymously through unlogged systems in places like Albania, Brazil, Canada, wherever. Nevermind that the link comes from torrentfreak – it’s best article I’ve seen yet rating various proxy providers and how/if they take your anonymity seriously.
"Data, I would be delighted to offer any advice I can on understanding women. When I have some, I'll let you know." --Captain Picard,
Very creeped out about something similar the other day. I mentioned possibly staying at a particular hotel in San Francisco in an email. The following day, I got an email news letter from them. Last time I stayed at that hotel was 2009. I didn’t get any news letters since then. Creepy ass s~~~.
But you can exhale, because we don’t take phone numbers or your name. No possible way this is related to us. We only care about your email so we can contact you. No other personal information unless you enter it voluntarily. You can check out our privacy policy with a link in the footer. We don’t even store a single cookie on our site.
There is a chance google stores your IP. (Or IPS you frequent from) so it’s a good bet they will feed you something based on that. Your phone uses the same wireless connection to get online, so that’s how Google / Youtube may remember what you recently checked out from your IP.
If you checked out something at home…. and then went to a cafe …. the same thing would likely not happen. (providing you’re logged out)
If you keep doing what you've always done... you're gonna keep getting what you always got.I highly believe that phones even listen in on what you talk about, too.
I wouldn’t believe this if I hadn’t have researched “Tropical Storm Allison” after talking about it with my best friend. I NEVER looked it up online before, and all I had to do was type in the letter “T” and Google’s “guessing autofill” system had none other than TROPICAL STORM ALLISON AS THE FIRST RESULT.
This has happened to me a few times. No way it’s a coincidence.
Not true. No matter how they may “lock it down,” they have to route your IP traffic for it to work. That means you can ALWAYS install a second router with a firewall plugged into your ISP’s router and keep anyone out of your network. Using NAT, ip masquerading, and similar packet shaping techniques, there is literally no way for them to distinguish between your PC directly plugged in and having a second router/firewall in between your home network and the ISP router.
The difference is they can’t come through your firewall and see anything on your local network. Not that they do that – I run Comcraps and regularly do dumps of all traffic passing on my network and I’ve never seen anything from Comcast attempting to look at my internal network.
Not here. Unless you’re paying $200+ a month for FTTH, you are stuck with their ghetto modem/router and FTTN. Firmware updates are pushed to the device remotely and without your control. It’s also fairly well known that Bell tech’s can access your modem remotely as well. Thus they can see all the devices on your LAN just like you can when you logon to the management interface.
The owners of the residence love their IPTV too and although the modem reportedly has a half baked bridge mode, it cut’s your throughput by atleast %25 and will stop the TV from working properly if you engage it(TV is dependent on 2 VLANS). I have not yet seen anyone come up with a solution to this problem either. Furthermore I’ve heard Bell removed that feature in one of their recent firmware updates.
Before the FTTN when there was just DSL. I had the current modem in bridge mode with my own network behind it and it worked great, but Bell ruined that with their mandatory hardware, so I was forced to abandon that setup. I did later go to considerable effort to run Ethernet and reestablished the double NAT setup I had years ago and it works but I understand this isn’t exactly the proper way to do things. In any case I consider the 1st network a DMZ and only my PfSense firewall’s external interface shows up on it. All of my personal machines are inside my perimeter.
The Chinese? Different story – they’re constantly trying to get in to my network as I guarantee they are with yours, you just don’t realize it. Plus most of their attacks are just looking for devices plugged in where the owner didn’t bother to change the default accounts/passwords on the device. If you’re dump enough to do something like that, I have little sympathy.
I should know since I studied IT in college and one of the courses was computer and network security. I have seen the random connection attempts from China and other places bouncing off the client firewall when ports were forwarded.
I’d be far more worried about OS venders like microsoft and apple spying on you than anything from your ISP or the internet at large. This is why I ONLY run linux. Nothing beats a million eyeb~~~~ scrutinizing the source code for keeping “undesirable” spyware, etc. Not that Linux is perfect, but I’ve spent hours sniffing my network and never saw traffic going into or out of my Linux box that I didn’t authorize/enable in some way.
Linux: The ultimate GYOW Operating system and it runs on ANYTHING.Except that open source has been shown to have a crucial flaw. That being that people assume other people who are experienced are actively scrutinizing the code, but apparently that didn’t work out very well in the case of bash, openssl, xorg and others as some of these flaws remained undetected for years.and with the rise of advanced persistent threats, running Linux won’t do any good if something from the internet takes root in the firmware of your devices. Detection will be very difficult and removal almost impossible. Throwing away the hardware would likely be the only option.
I used to use Linux myself years ago, but it was a constant hassle, stuff breaking, half baked distro’s, inconsistent way of doing things, infighting among developers, obnoxious t~~~s and their stupid feminist baggage(“linux girl”- the dumbest thing I’ve ever seen), people who weren’t capable of writing quality code, things taking years to get done, people trying to turn Linux into a Windows clone, repos that didn’t have all the software you wanted, the mess with systemd and people trying to take control of large parts of the ecosystem and so on. Just about the time I left things started going to hell.
PS: If you’re really worried about big brother watching your internet traffic, get yourself a /mo proxy account and all your internet activity will go encrypted anonymously through unlogged systems in places like Albania, Brazil, Canada, wherever.
I should know since I’ve been using a reputable VPN service for all my daily drivers for a year or so now. Before I used free ones, but the question of who was running these free services, why, the fact that spammers/abusers constantly ruined them, the increasingly dangerous nature of the internet, an incident involving a mentally deranged individual and cops and a government that passed a law requiring ISP’s to keep logs for 6 months forced me to get a full time service.
Thanks for the feedback guys.
There is a chance google stores your IP. (Or IPS you frequent from) so it’s a good bet they will feed you something based on that. Your phone uses the same wireless connection to get online, so that’s how Google / Youtube may remember what you recently checked out from your IP.
Yeah, I think I was overthinking it KM. The devices share a wireless, so it’s probably no more than that.
Android phone – means you’re signed in to google services permanently. Youtube is owned by google, – you must also be signed into youtube on your desktop, hence seeing the songs. If you sign out of youtube (should be top right) on your desktop you wont see this happening. If you use google mail on your desktop and sign in, and later go to youtube you’ll automatically be signed into youtube with your google ID. It’s annoying.
Best bet is to go into your browser options and get it to delete your history & cookies every time you close the browser. If you want to be able to go back to any webpages of interest, just use bookmarks.
See, my first thought was I had remained logged in to Gmail (I have an account but almost never use it) and the Google octopus got me that way. Sure enough, when I went to gmail.com on my desktop PC, I was logged in.
BUT…. I’ve never set up Gmail for my phone. Clicking the email app only asks me to log in, and ditto navigating there via Chrome on the phone.
So it must be the shared wireless. Still a dubious way to do stuff – what if a thousand people are sharing an office server? Do they all see each other’s Youtube searches?
EDIT: Bugger me sideways, I AM Signed on to Youtube for some reason with my gmail account, both desktop AND phone! Wtf? I’d remember typing my ridiculously long gmail address in to Youtube if I’d done it on a phone’s toy keyboard, damn Android machine did it automatically somehow! I must have my details on file at the App store where I downloaded the Youtube app.
That’ll learn me <sigh>

Anonymous18About the GPS tracking I am one of the cheapass mofos who has never had data on his phone and relies on public wifi’s when outside my home.
But I just leave my GPS always on in my android phone.
Last year I drove to Ohio then to NY and then to Toronto. All in a week WITHOUT data.
Once I got home I was connected to Internet and under ‘My Places’ the exact route and places I went to with precise time stamps were made available. Over the entire 2000 miles I drove.
So basically the little s~~~ was being tracked by satellites and the information stored on Google’s servers automatically when I was connected to Internet.
Antoine Dodson had it right “hide yo wifi cuz they trackin’ errybady out heya”
- AuthorPosts
You must be logged in to reply to this topic.

921526
921524
919244
916783
915526
915524
915354
915129
914037
909862
908811
908810
908500
908465
908464
908300
907963
907895
907477
902002
901301
901106
901105
901104
901024
901017
900393
900392
900391
900390
899038
898980
896844
896798
896797
895983
895850
895848
893740
893036
891671
891670
891336
891017
890865
889894
889741
889058
888157
887960
887768
886321
886306
885519
884948
883951
881340
881339
880491
878671
878351
877678
