This may be the tip of what sunk the Titanic.
It is darn difficult to place an auditing proxy service or other auditing resource
between a cell phone and the globe.
Worse the connections to scripts and sites that trigger additional links
and fetches. Some are common prefetch and may never run except
the prefetch itself contained all the info needed to track an individual.
Since http and https are stateless the tricks of passing an interesting hash code
establishes a unique user profile tag...
It is too much like the Jedi mind control trick: This is not the Droid you
are looking for" becomes that is not the URI you are looking for. The entire
world is offered this or that DNS server that then connects to others
to translate a name to number. There is little in the system to validate
the answer. https almost helps but there are rogue SA hosts and depending
on the one you connect to you get what you expect or what Lenovo wanted
you to get. Packet injection tricks trigger errors that then trigger a second connection
that may be hacked.
Too much security legislation is theater and increasingly legislation moves
to punish white hat researchers or even random typing errors that uncover
A child in school that changes the background of an ill secured computer system
gets a felony warrant. A child that has a note sent home because a couple Oreo
cookies were seen in his lunch -- the world has gone mad. OK I am getting
mad at the fools that tell me my SO can swallow a camera to check for uterine
cancer or prenatal care: To which Barbieri responded: "Can this same procedure
then be done in a pregnancy? Swallowing a camera and helping the doctor determine
what the situation is?"