World Island Kybernetik:Privacy policy: Difference between revisions
No edit summary |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 10: | Line 10: | ||
Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.<br> Normally this is only significant | Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.<br> Normally this is only significant | ||
for state actors due to the resources required to break standard encryption, some of whom are known to collect comprehensively.<br><br> | for state actors due to the resources required to break standard encryption, some of whom are known to collect comprehensively.<br><br> | ||
If it concerns you, to avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks. | If it concerns you, to avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks. <br><br> | ||
An example of a relatively uncompromised network is a LAN with only wired connections or a set of these with trusted bridges.<br><br> | |||
Some level of permitted loss of control is inevitable here without state actor level resources to, e.g. not have any unaudited integrated circuits which could potentially open back doors. | |||
</blockquote> | </blockquote> | ||
<br> | <br> |
Latest revision as of 04:44, 25 December 2024
The below is the uniform statement for all my wholly owned enterprises, operating in core Domain Space, Cibernetica Americana as well as the mark applying outside the Americas. It is one appropriate to an individual/sole trader.
My privacy policy is simplicity itself: I won't ever share my user's info with anyone under any circumstances.
Yeah, I can actually do that and will not operate in jurisdictions where I cannot.
Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.
Normally this is only significant for state actors due to the resources required to break standard encryption, some of whom are known to collect comprehensively.
If it concerns you, to avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks.
An example of a relatively uncompromised network is a LAN with only wired connections or a set of these with trusted bridges.
Some level of permitted loss of control is inevitable here without state actor level resources to, e.g. not have any unaudited integrated circuits which could potentially open back doors.
juan@acm.org
US EIN: 22-3131-862
仁 人 卷