Quote:
Originally Posted by PairTheBoard
Scary thing. Right after my last post I opened a youtube tab to listen to a song I was hearing in a movie. The ad I had to look at before getting to the song was a Hershey ad.
PairTheBoard
You better believe they are following you and adjusting ads. They are scum. And you know they are scum because the same thing never happens with x rated things or erotic content whatever. You will not get x-rated ads because you have been in "ill repute" places before. That right there indicates they want to preserve etiquette like a silent gentlemen's agreement which makes it even creepier that they have such algorithmic conditionals. Its like in your face telling you we know and we dont tell to protect your social "integrity" (lol) but we do know because look what happens with chocolate or laptops or quantum mechanics books or new cars or flashlights lol. Cookies whatever.
I hate these idiots that have the audacity to think they can do things without ever authorizing them. Every new computer must come with option to completely block any following of your activities in that computer. Of course they collect data. All i have to say to the system is collect "this"! Basically they better collect everything about you or nothing. And they better not do anything with it but of course they do and at this point in time they have decided its only about some money. But it can get worse eventually with people like Trump and his posse filling all key positions. One day it will be about a "dangerous" but necessary idea. Being a scientist will be criminal. Any rebellion will be a crime.
You can avoid this running in incognito mode. Then no ad correlation happens. But you of course know they still collect and play silent. We are talking about genuine mfing system in place under our blessing or ignorance. Another day i will describe to you how they can create the ultimate observe everything system and no hacker will ever know it is there except the 2-3 that are running it. All you have to do is introduce 5-6 vulnerabilities in all CPU architectures that require like large number factorization endless hacking efforts to detect with limited success making it impossible you will see the functionality all 5 produce because each one alone is innocent and random. Then automatically all big websites become observation points of all your computing activity. You visit a place and they know a ton of things instantly.