World Island Kybernetik:Privacy policy: Difference between revisions
No edit summary |
No edit summary |
||
Line 10: | Line 10: | ||
Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.<br> Normally this is only significant | Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.<br> Normally this is only significant | ||
for state actors due to the resources required to break standard encryption, some of whom are known to collect comprehensively.<br><br> | for state actors due to the resources required to break standard encryption, some of whom are known to collect comprehensively.<br><br> | ||
If it concerns you, to avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks. | If it concerns you, to avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks. <br><br> | ||
An example of a relatively uncompromised network is a LAN with only wired connections or a set of these with trusted bridges. | |||
</blockquote> | </blockquote> | ||
<br> | <br> |
Revision as of 04:41, 25 December 2024
The below is the uniform statement for all my wholly owned enterprises, operating in core Domain Space, Cibernetica Americana as well as the mark applying outside the Americas. It is one appropriate to an individual/sole trader.
My privacy policy is simplicity itself: I won't ever share my user's info with anyone under any circumstances.
Yeah, I can actually do that and will not operate in jurisdictions where I cannot.
Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.
Normally this is only significant for state actors due to the resources required to break standard encryption, some of whom are known to collect comprehensively.
If it concerns you, to avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks.
An example of a relatively uncompromised network is a LAN with only wired connections or a set of these with trusted bridges.
juan@acm.org
US EIN: 22-3131-862
仁 人 卷