Tuesday, March 29, 2016

Misusing returnability in online retail - when confused between two products, order both, and try out both, and finally return one

This is what I'm going to do as I'm confused between two toasters - one from Philips and other from Glen. I've ordered both and I'm going to use both for a week or so, and send back the one which I find less good. It looks like even otherwise good customers of Amazon can sometimes push the limits.

Sunday, March 27, 2016

A cynical explanation for the rapid public adoption of encryption by Apple, Dropbox, Facebook, Google, Microsoft, etc. - only the US can spy


Sometimes it appears to me that the rapid [and very public] adoption of encryption by American technology giants such as Google, Microsoft, Yahoo, Apple, Facebook/WhatsApp, Twitter, Dropbox, AOL, etc., is actually/covertly being done hand-in-glove with all those usual criminal American military/spying agencies - CIA, DIA, NSA, etc.. Points to note here:
  1. A strong public support in favor of encryption, public's right to privacy, human rights, blah blah blah, will assure the general public - most of whom are foolish sheep anyway - into believing that these top companies are fighting for the people and are on their side. Not. Such wrongly placed blind confidence will make the global population give away more and more of data as well as actions/activities of their lives to these companies.
  2. More and more use of unbreakable encryption in products/services that are used by more and more people over the globe means that local governments just cannot monitor anything, allowing covert regime-change operations, etc., by criminal global actors such as the United States, without the knowledge of sovereign governments that do not accept the foreign policy ambitions/demands of the US.
  3. The installation of secret/undeclared backdoors - without the foolish public's knowledge - in all such American products/services will allow the US government and its agencies - and only the US government and its agencies - to fully and promptly monitor/alter all the communications/data flowing globally, enabling it to secretly carry out operations that destabilize/destroy other nations and create unrest/violence there, as well as assess in real-time the effectiveness of these operations.