Surveillance capitalism is predatory data mining typically via addictive and harmful sites and applications with social validation feedback loops/intermittent variable rewards along with manipulative targeted advertising based on one’s personal identity and gathered preferences.

I am a former app/platform developer, and I have been an advisor to numerous lawmakers regarding tech congressional hearings dating back to 2018’s Facebook Cambridge Analytica involving Mark Zuckerberg which ended in meaningless resolve, like the majority of other tech congressional hearings.

The Facebook Cambridge Analytica scandal was based on a data broker, Aleksandr Kogan, who launched surveillance/data mining capabilities within the Facebook ecosystem.

This enabled Kogan to conduct surveillance on Facebook users while collecting over 5,000 data points associated with each individual end user’s personal, business, medical, legal, employment, biometric, and location information.

This is how much access and information an intrusive app (“Legal Malware”) enables the developer to collect on the end user.

Kogan then packaged the Facebook user information and sold it to many companies, governments, and entities around the world that included Cambridge Analytica who developed personalized (targeted) advertising for political candidates around the world.

Privacy laws such as GDPR and CCPA attempt to protect internet end users when online, but do not address intrusive apps and social media platforms such as Facebook, Instagram, LinkedIn, YouTube, TikTok, Snapchat, and so on.

It is the app that enables the developer to surveil/data mine the end user.

Tech companies such as Meta (Facebook) and ByteDance (TikTok) circumvent privacy laws with predatory terms of service.

Once you click on “I Agree”, you agree to give up your privacy, security, and safety and hands control over you to these tech giants.

The predatory terms of service you accept when clicking on “I Agree” are a contract of adhesion that only benefits the app, social media, and AI developer.

This is why these privacy laws mean nothing today, until Surveillance Capitalism is understood and addressed to remove these intrusive apps, addictive/harmful social media platforms, and generative AI with predatory terms of service (cyber-enslavement agreements) nothing will change.

Protecting digital rights through proper regulation will keep our children safe from addictive, harmful, and exploitative social media developers while we all can get our privacy, security, freedom, and safety back.

If government won’t act, then we must rely on the market (capitalism and investment) to solve the problem.

One company, Purism, is solving for privacy, security, freedom, control, and safety by developing a secure Linux operating system, PureOS, that supports smartphones, tablet PCs, laptop PCs, mini-PCs, and servers manufactured by Purism.

Not only can you buy these secure products from Purism, you can invest in Purism. Learn more at: https://www.startengine.com/offering/purism

Purism Products and Availability Chart

 ModelStatusLead Time 
USB Security Token Purism Librem KeyLibrem Key

(Made in USA)
In Stock
($59+)
20 business days
Librem 5In Stock
($699+)
3GB/32GB
10 business days
Librem 5 COMSEC BundleIn Stock
($1299+)
Qty 2; 3GB/32GB
10 business days
Librem 5 + SIMple
(3 GB Data)
In Stock
($99/mo)
10 business days
Librem 5 + SIMple Plus
(5 GB Data)
In Stock
($129/mo)
10 business days
Librem 5 + AweSIM
(Unlimited Data)
In Stock
($169/mo)
10 business days
Librem 11In Stock
($999+)
8GB/1TB
45 business days
Most Secure Laptop Purism Librem 14Librem 14In Stock
($1,370+)
20 business days
Most Secure PC Purism Librem Mini
Librem MiniJune 2024
($799+)
45 business days
Purism Liberty Phone with Made in USA ElectronicsLiberty Phone
(Made in USA Electronics)
June 2024
($1,999+)
4GB/128GB
20 business days
Most Secure Server Purism Librem ServersLibrem ServerJune 2024
($2,999+)
60 business days
The current product and shipping chart of Purism Librem products, updated on April 30th, 2024

Recent Posts

Related Content

Tags