We know what technology has made possible. Phones can be turned on at the government’s request. DNS servers can log everyone’s activities. ISP’s can monitor what IP addresses one can go to. Phone conversations can also be monitored by police with sting rays. Medical records can be transferred by bad actors because of holes in the HIPAA rules that don’t protect privacy.
The beehive exists: https://nsa.gov1.info/utah-data-center/ where they store all kinds of data, including encrypted can be monitored. Also now quantum computing has been unlocked by both the US and China so many forms of encryption can be cracked.
We know what technology has made possible. Phones can be turned on at the government’s request. DNS servers can log everyone’s activities. ISP’s can monitor what IP addresses one can go to. Phone conversations can also be monitored by police with sting rays. Medical records can be transferred by bad actors because of holes in the HIPAA rules that don’t protect privacy.
The beehive exists: https://nsa.gov1.info/utah-data-center/ where they store all kinds of data, including encrypted can be monitored. Also now quantum computing has been unlocked by both the US and China so many forms of encryption can be cracked.