Skip to main content

谷歌监控每个人的生活已经到了发指的地步了

 发信人: BeBeeS (I am lookin for cars), 信区: Programming
标  题: 谷歌监控每个人的生活已经到了发指的地步了
发信站: BBS 未名空间站 (Sat Jan 16 15:41:47 2021, 美东)

场景一:
在外面散步,没有带手机,看到一只狗,说了一声shepard,回到家打开youtube,立马
给出几个shepard的推荐视频。表明,不但自己的手机监控你,别人的手机也在听你的
声音。

场景二:
开车出去,雨刷的塑料部分分裂成好几片,开车过程中(local) 用了雨刷,刚回到家
,打开youtube,立马就有雨刷的广告。表明,小区摄像头都是对着你的,小心了。

场景三:
看了毛片,十分钟不到立马关掉。过了一会,youtube就给你递送延长时间的有关视频。

傻逼啊,一个万亿的公司就干这个???????
马斯克代表的制造业股价翻8倍不是没有道理的。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...