World Island Kybernetik:Privacy policy: Difference between revisions
From Cibernética Americana
Jump to navigationJump to search
No edit summary |
No edit summary |
||
| Line 9: | Line 9: | ||
Yeah, I can actually do that and will not operate in jurisdictions where I cannot.<br><br> | Yeah, I can actually do that and will not operate in jurisdictions where I cannot.<br><br> | ||
Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.<br> Normally this is only significant | Be aware that this is in effect within my core space, and your data is subject to capture before it reaches or after it leaves this domain space.<br> Normally this is only significant | ||
for state actors due to the resources required to break standard encryption.<br><br> | for state actors due to the resources required to break standard encryption, some of whom are known to collect comprehensively.<br><br> | ||
To avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks. | To avoid this exposure, restrict the sensitive operations to private name spaces routed using only uncompromised networks. | ||
</blockquote> | </blockquote> | ||