US authorities can see more than ever, with Big Tech as their eyes

Adtech and data inference

  • Commenters describe how much can be inferred from seemingly minor data (e.g., city from follow-graphs, gender from tweet text) using old Twitter firehose access.
  • A book on adtech is cited to illustrate how “advertising-only” data is quietly resold (especially location) to all kinds of buyers with minimal client vetting.
  • Several see too much profit in personal data for collection/sale to ever voluntarily stop.

“Must” collect data vs business-model choice

  • Some strongly dispute the article’s claim that Meta, Google, and Apple “must” collect maximal data, arguing they choose to because of ad-driven business models.
  • Others say Meta/Google are structurally dependent on data, while Apple is meaningfully different (hardware/services first, some user controls, end‑to‑end encryption options).
  • A counterpoint argues all three are still giant corporations systematically collecting and distributing personal data; debating degrees may obscure the core problem.

Individual countermeasures and their limits

  • Practical tips discussed: disabling location, turning phones off or using Faraday bags, using fake or “fictional” phone numbers at checkout, hardware kill switches (e.g., privacy-focused phones), paying cash for sensitive purchases, dashcams and home cameras for self‑protection.
  • Others argue individual operational security is like farm animals trying to understand a modern farm: the problem is systemic and structural, not solvable by personal hygiene alone.
  • The notion of “herd immunity” is raised: even if one person opts out, data from friends, contacts, and shadow profiles can reconstruct much of their behavior.

Surveillance, governance, and risk

  • Some claim: if a company knows it, the government effectively does too, via legal requests, adtech purchases, or intelligence agencies—creating a near‑“panopticon” contingent only on political will.
  • There’s debate over whether the bigger danger is explicit authoritarians or broadly popular governments quietly normalizing surveillance.
  • Others note weak or dysfunctional states may surveil poorly but still punish people using bogus or fabricated “intelligence.”

US vs foreign providers

  • One line of discussion emphasizes that foreign providers are not safe either: attacking foreign infrastructure is an explicit intelligence mission, and Five Eyes–style sharing blurs boundaries.
  • Another view stresses a practical difference: a US company can be directly compelled through legal process; a well‑secured foreign service must still be technically “broken,” which is non‑trivial with strong cryptography.

Online identity and opting out

  • Some advocate treating one’s online persona as a distinct “agent” and simply engaging less: in‑person work, offline hobbies, and fewer apps.
  • Others warn that dropout strategies can make individuals stand out; the suggested tactic is to appear normal while selectively “going dark” when stakes are high.