Watch Latest Shows & Videos on Our Official YouTube Channel – BLOCKBYTES

Facebook Twitter Youtube Instagram Tiktok Linkedin Spotify
Blockbytes
  • Home
  • Shows
    • Across The Chains
    • Beyond the Block
    • Featured By Blockbytes
    • The Workflow
    • Byte Sized Videos
    • Quickflip Polygon
    • Legacy Content
  • Articles
    • News
    • Getting Started
    • Project Overviews
    • DeFi
    • NFTs
    • Networks
      • Polygon
      • Iota + Shimmer
      • Fantom
      • Aurora
  • BlockBytes Weekly
  • Meet the Team
    • About Us
    • Contact
Reading: Recording devices are EVERYWHERE!
Share

  • bitcoinBitcoin(BTC)$16,787.14
  • ethereumEthereum(ETH)$1,210.10
  • tetherTether(USDT)$1.00
  • usd-coinUSD Coin(USDC)$1.00
  • binancecoinBNB(BNB)$247.45
  • binance-usdBinance USD(BUSD)$1.00
  • rippleXRP(XRP)$0.344393
  • dogecoinDogecoin(DOGE)$0.073311
  • cardanoCardano(ADA)$0.250973
  • matic-networkPolygon(MATIC)$0.79

Aa
Blockbytes
  • Home
  • Shows
  • Articles
  • BlockBytes Weekly
  • Meet the Team
Search
  • Home
  • Shows
    • Across The Chains
    • Beyond the Block
    • Featured By Blockbytes
    • The Workflow
    • Byte Sized Videos
    • Quickflip Polygon
    • Legacy Content
  • Articles
    • News
    • Getting Started
    • Project Overviews
    • DeFi
    • NFTs
    • Networks
  • BlockBytes Weekly
  • Meet the Team
    • About Us
    • Contact
Have an existing account? Sign In
Follow US
Facebook Twitter Youtube Instagram Tiktok Linkedin Spotify
Blockbytes > Blog > Article > Series > Recording devices are EVERYWHERE!
Series

Recording devices are EVERYWHERE!

Contributor
Last updated: 2022/06/16 at 6:36 AM
Contributor Published June 16, 2022
Share

Hello. It’s Cass again. I hope you enjoyed my last article, “How-to Improve Your Password Security”. Today I’m here to discuss recording devices, where they are, what they are listening to, and if we should be worried.

Contents
Safely Interacting Protecting yourself

Let me ask you this: what items won\’t have these devices in them soon? I would go as far as to say that in coming years, it will be difficult to find and use products that don\’t have recording capabilities. It is quickly becoming an inescapable fact of life that we are being recorded by our phones, laptops and vacuums.

Safely Interacting

I bet you\’re wondering how this affects you. In most cases, it won\’t! However, it could mean the loss of millions of dollars for the remaining cases. As we become more disruptive to existing and entrenched institutions and fiat currencies, they will fight back. They can and probably will use recording devices to gain inside information. Corporate espionage is real. So is state sponsored cyber warfare. Hostile actors can use your devices to record your activity to know when you\’re there and when you\’re not. They can use that information to build up psychological profiles to determine who could be the weakest link in a protocol and how to exploit them. 

These same devices can spot you putting in your passwords and see where you store information. Many companies state they don\’t save any of this information, and have been subsequently caught with that same information. Do not trust these companies. You should always consider anything connected to the internet as compromised. Once your information is on the internet you have lost all control over it.  So, if this information isn\’t something you don\’t want to be made public take all the necessary steps to protect that information.

Protecting yourself

Now I bet you\’re wondering, \”how do I protect myself if they are everywhere?\” In most cases, the average user won\’t be affected aside from some eerily specific directed advertisements. However, there are a select few that truly need that additional security. In those cases, your best bet will be to handle all communications in person. Establish a clean room that doesn\’t allow any type of signal to be leaked outside and conduct your meetings there.

For the standard user, try to limit the number of devices around you that record. Do you need that robo-vacuum knowing that it might be recording your every conversation? For now, I beg you to continue asking What if…?. I will see you next time when we will continue to explore the many questions and possibilities around security.

You Might Also Like

Modeling DeFi, Part 8 – Boosted Pools

Modeling DeFi VII: – RoboVault Delta-Neutral Strategies

Modeling DeFi Pt VI – Sustainability, A Practical Example

Modeling DeFi VI: – Sustainability, A Practical Example

TAGGED: Byte Masons, Security

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share this Article
Facebook Twitter Email Copy Link Print
Previous Article Core Series III: Decentralized Finance
Next Article Reaper.Farm vs Robo-Vault: Why I need both
- Subscribe Us-
Ad image
Popular News
Shimmer 2022
IOTA 2022 – Small Steps, Big Year
Harmony Bridge Hack
Crypto Hack Casefiles: Horizon Bridge
SBF Confessions
Notes from Sam Bankman-Fried’s Congressional Confessions
QiDao logo on blue background
QiDAO
Ronin Bridge
CRYPTO HACK CASEFILES: RONIN BRIDGE

Latest News

Shimmer 2022
FeaturedIota + Shimmer

IOTA 2022 – Small Steps, Big Year

January 18, 2023
Harmony Bridge Hack
Hacks/Exploits

Crypto Hack Casefiles: Horizon Bridge

January 12, 2023
SBF Confessions
Editor's PicksNews

Notes from Sam Bankman-Fried’s Congressional Confessions

January 12, 2023
QiDao logo on blue background
Project Overviews

QiDAO

January 11, 2023

Stay Connected

Twitter Youtube

Subscribe

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Register Lost your password?