The internet is not safe and probably never will be. But most people do not suspect that their television can be a covert listening device, even when turned off. Unplugging it when not in use is the only safe bet.
Please read George Orwell’s visionary 1984 @AMAZON.
Some of the details of the C.I.A. programs might have come from the plot of a spy novel for the cyberage, revealing numerous highly classified — and in some cases, exotic — hacking programs. One, code-named Weeping Angel, uses Samsung “smart” televisions as covert listening devices. According to the WikiLeaks press release, even when it appears to be turned off, the television “operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”
In early 2015, Samsung appeared to acknowledge the TVs posed a risk to privacy. The fine print terms of service included with its smart TVs said that the television sets could capture background conversations, and that they could be passed on to third parties.
The company also provided a remarkably blunt warning: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.”
There are enormous privacy and legal implications here, and MPG is not singling out Samsung For example, law enforcement is already demanding Amazon Echo records shows that you probably have no legal protection even inside your own home. Today, the law has very weak protections for email, let alone your data in the cloud at Apple or Amazon and doesn’t even contemplate televisions inside a home. You have zero privacy rights in essence, all in the context of hysteria about cookies—security theatre and the joke is on you.
Anything with a speaker or camera or blinking light or GPS or internet connection or wireless connection is a vector, and both the CIA and organized hackers are enormously creative and well funded.
Cell phones, iPads, computers, televisions, smart watches, etc all form the infrastructure for a police state as per George Orwell’s visionary 1984 @AMAZON, let alone organized and very well funded cyber crime organizations. The technology has arrived—hardware and software. What will happen? What might today’s campus thugs (aka students and professors), unable to tolerate other viewpoints without resorting to physical violence, might do with such power in a decade or two while holding office?