Google works like NSA - Julian Assange says: Spying and storing

Status
Not open for further replies.

Dima007

Level 23
Thread author
Verified
Well-known
Apr 24, 2013
1,200
34.si.jpg

WikiLeaks founder Julian Assange equated Google with the National Security Agency and GCHQ, saying the tech giant has become “a privatized version of the NSA,” as it collects, stores, and indexes people’s data. He made his remarks to BBC and Sky News.

“Google’s business model is the spy. It makes more than 80 percent of its money by collecting information about people, pooling it together, storing it, indexing it, building profiles of people to predict their interests and behavior, and then selling those profiles principally to advertisers, but also others,” Assange told BBC.

“So the result is that Google, in terms of how it works, its actual practice, is almost identical to the National Security Agency or GCHQ,” the whistleblower argued.

Read more: http://rt.com/news/188896-assange-google-nsa-spying/
 
  • Like
Reactions: Terry Ganzi

MalwareHunter

Level 17
Verified
Top Poster
Well-known
Jul 30, 2014
806
“Google’s business model is the spy. It makes more than 80 percent of its money by collecting information about people, pooling it together, storing it, indexing it, building profiles of people to predict their interests and behavior, and then selling those profiles principally to advertisers, but also others,” Assange told BBC.
Yes, it's true.
You can only do one thing against this: Do not use Google. But it's no easy, because they have a very good search engine...
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top