|
Many messengers are organized centrally. This means that even without knowing the encrypted content, very detailed knowledge about the users and the relationships among them is collected and used (in the company’s interest):
The information does not come from the actual content of the messages, but from the transmission itself. Many providers praise “complete end-to-end encryption”. However, in this context it is irrelevant whether the communication is encrypted or not. The unlimited collection, storage and evaluation of transmission data is concealed/played down. This is often overlooked.
By matching databases and applying mathematical and analytical methods, it is possible to very quickly and easily reveal background information.
determine. This information has a very high hit probability, which is why it is then traded for a lot of money. This collecting, enriching and evaluating of information is reality and corresponds to the daily practice.
Concrete examples that can be derived or unambiguously determined from the address book and the (content-encoded) transmission data:
Privacy at risk (2020) In a collaborative effort of the TU Darmstadt, the TU Graz and the University of Würzburg it is shown that currently used methods for mobile contact tracing massively threaten the privacy of users. Among other things, it says:\ … Transferring virtually all personal contacts to a service provider poses a significant privacy risk and also a legal challenge … Source: https://contact-discovery.github.io/de (external) |
Here is a small exemplary overview of which corporations collect which data:
Source: https://web.archive.org/web/20191115234907/https://securitybaron.com/blog/the-data-big-tech-companies-have-on-you-or-at-least-what-they-admit-to/amp/ (external)
Further external examples can be found >> here <<.
Nice video (with German subtitles) in which a bakery saleswoman behaves just as brazenly (friendly but rude) as many popular apps:
https://yewtu.be/watch?list=RDwHo755bxByI&v=wHo755bxByI (external)
Threema also has a nice video about this (‘free’ ice cream against payment with data): https://threema.ch/content/video/threema_icecream_en.mp4 (external, English subtitle)
At “freie-messenger.de” data is not “collected”, “enriched” and “sold”.
-> Then why give it to a for-profit company that runs a centralized system?
Privacy affects everyone and is important:
Not without reason there are curtains for the windows or apartment and house doors, which are an external sign of privacy. They protect against prying eyes or the entry of strangers into one’s life.
Privacy <-> Convenience |
Everyone must decide for themselves what value privacy has and when it is sacrificed for convenience. |
“Metadata or metainformation is structured data that contains information about characteristics of other data.”
Data described by metadata are often larger collections of data such as documents, books, databases, or files. Thus, information of properties of a single object (for example, “person’s name”) is also referred to as its metadata.
Computer users are often unaware that data has metadata that is not immediately recognizable and that it may have greater utility to computer criminals or government agencies than the data itself.”
*Source: Wikipedia