As we move along in the areas of computers, privacy and the internet, once treasured ideals are quickly and firmly being swept aside in favor of convenience and pervasive connectivity. With easy social networking “freedom” promoted as the end-all and be-all, the entire internet is becoming a dramatically more restrictive and invasive environment.

Few people realize how their lives are being exploited every time they do something related to the internet. Chief among the culprits is the harvesting and selling of personal information using internet tracking trickery. While the screen of your digital device may hide it, every time you access email, texting or a website, scores of tiny software robots leap into action, devouring information about you and building a profile of your every move.

kAm(9@ J@F D6?5 >6DD286D E@[ 9@H =@?8 E96J 2C6[ 9@H @7E6? J@F D6?5 E96>[ H92E H63D:E6D J@F G:D:E[ 9@H =@?8 J@F 2C6 E96C6[ H92E J@F 4=:4[ 92G6 J@F 6G6C 925 2 “5@>6DE:4 5:DAFE6[” 5@ J@F A2J 3:==D @?=:?6[ H9@ 2C6 J@FC 7C:6?5D[ H9@ 2C6 E96:C 7C:6?5D[ H96C6 5@ J@F =:G6[ 5@ J@F @H? 7:C62C>D[ 5@ J@F “EH66E[” H92E 2C6 J@FC A@=:E:42= 2?5 C6=:8:@FD :?4=:?2E:@?D[ 5@ J@F FD6 2=4@9@= @C E@3244@[ H92E’D J@FC 7:?2?4:2= =:76 =:65:42= 9:DE@CJ[ 5@ J@F 92G6 2 4C:>:?2= 3246C2D @C E@== 82E6D[ 5@ J@F 92G6 :?G6DE>6?E 244@F?ED[ 2C6 J@F >2=6[ 76>2=6[ >2CC:65[ D:?8=6 @C D@>6E9:?8 6=D6[ H92E 2C6 J@FC D6IF2= AC676C6?46D[ H92E 7@@5 5@ J@F =:@G:6D 2?5 >FD:4 5@ J@F 6?;@J[ 5@ J@F 92G6 49:=5C6?[ H92E 2C6 E96:C =:G6D =:2E:@? 23@FE 6G6CJE9:?8 J@F 4@F=5 6G6C :>28:?6 2?5 D@>6 E9:?8D J@F 4@F=5?’E 😀 4@==64E65]k^Am

kAm(:E9 2== E92E 😕 >:?5[ :E’D ?@ H@?56C 7@=JD6=7 5@?’E 86E @AE:>:DE:42==J 8:55J 6G6CJ E:>6 pAA=6 C@==D @FE 2?@E96C F??66565 2?5 F?H2?E65 G6CD:@? @7 :~$ 7@C :!9@?6D @C |:4C@D@7E 4@33=6D E@86E96C J6E 2?@E96C 3F88J G6CD:@? @7 (:?5@HD] pD E96 x?E6C?6E 92D >@G65 2H2J 7C@> 36:?8 2 7C66[ 7F? 2?5 A@H6C7F= H2J E@ 6I492?86 :?7@C>2E:@?[ >@CA9:?8 :?DE625 :?E@ 2 C28:?8[ >F=E:\3:==:@? 5@==2C >@?6J\8C233:?8 >249:?6[ 6G6CJ >@G6 >256 3J 3:8 E:>6 :?E6C?6E 4@>A2?:6D 92D 7@==@H65 DF:E]k^Am

kAm%9@D6 25565 “762EFC6D” 😕 (:?5@HD H6C6?’E AFE E96C6 3642FD6 E9@FD2?5D @7 |:4C@D@7E 72?D H6C6 4=2>@C:?8 7@C E96>] u2463@@[ v@@8=6[ ) 2?5 {:?6 ?@3=6 BF6DE E@ >2 E96 36DE E96:C 4FDE@>6CD 4@F=5 6G6C 92G6] pAA=6 5@6D?’E 26DD286 D2J:?8[ “qJ FD:?8 E9:D D:E6[ J@F 28C66 E@ E96 !C:G24J !@=:4J 2?5 %6C>D @7 $6CG:46[” 3642FD6 E96J C62==J 8:G6 2 9@@E 23@FE J@FC AC:G24J]k^Am

kAmtG6CJE9:?8 E96 >2;@C :?E6C?6E 4@>A2?:6D 5@ W2?5 >@DE @7 E96 >:?@CDX[ 2== @7 E96:C “8@@5 5665\5@:?8” 2D:56[ 😀 5C:G6? 3J @?6 @G6CH96=>:?8 56D:C6 — E@ 4@==64E 2D >F49 :?7@C>2E:@? 23@FE J@F 2D A@DD:3=6 😕 E96 D9@CE6DE 2>@F?E @7 E:>6 2?5 D6== :E] x?7@C>2E:@? 😀 ?66565 E@ 3F:=5 AC@7:=6D 2?5 AC@7:=6D >62? 3:8[ 3:8 >@?6J] x? E96 368:??:?8[ 6G6CJ@?6 H@?56C65 9@H E96 :?E6C?6E H2D 8@:?8 E@ >2@?6J] (6==[ E9:D 😀 :E] x?E6C?6E 4@>A2?:6D 2?5 H63D:E6D 3:8 2?5 D>2== 2C6 A:>A:?8 @FE E96:C 4FDE@>6CD 😕 @C56C E@ 7665 2E E96 >2DD:G6 >@?6J EC@F89 E92E 😀 A6CD@?2= 2?5 AC:G2E6 52E2]k^Am

kAmp== 😀 ?@E =@DE[ E9@F89] %96C6 2C6 564:D:G6 DE6AD J@F 42? E22:EE:?8 E96C6 😀 2 AC@3=6>[ 2?5 3@J[ 5@ H6 92G6 2 AC@3=6>] (6’C6 ?@E 8@:?8 E@ 492?86 9@H E96 :?E6C?6E H@C