(WORLD NEWS) ***** How Silicon Valley Big Tech Killed Dating And Human Interaction

After multiple FTC investigations and lawsuits, money-laundering charges and DOJ filings;  Big Tech is STILL harming citizens with their automatted mass human data harvesting using ‘dating’ as the BAIT!

Are you tired of pandering shill corporate Facebook and Google media outlets trying to sell you on mindlessly naive, rainbows and unicorns, wishful thinking, BS crunchy-granola concepts that have an utter disregard for actual human nature, sociology and psychology?


How The Silicon Valley Tech Bros Ruined Dating Forever

– Guidelines and horrors created by corporate ‘dating mill’ meat farm big tech companies

“I feel like I can’t be myself,” confesses Bree, a young woman from Plainfield, Ill.

“You don’t want to seem like you care,” says Cam, slouched on a couch in Santa Cruz, Calif.

“I hate it, I hate it,” sobs Cheyenne of Austin, Texas. “Everything, so much of who you are, is dependent on how you look.”

“It exhausts me,” admits Alex.

“Nothing good happens from Tinder,” agrees Kyle, Alex’s sometime boyfriend — even though the two New Yorkers met through the massively popular dating app.


“So much dysfunction,” says journalist and filmmaker Nancy Jo Sales of the dozens of college students and young adults she interviewed for her documentary “Swiped: Hooking Up in the Digital Age,” premiering Sept. 10 at 10 p.m. on HBO.

After a five-year immersion in the social-media-driven sex lives of the millennial generation — and, more personally, as the mother of an 18-year-old daughter — it’s clear to Sales that many of her subjects are miserably swiping their way through the brave new dating world that Silicon Valley has created for them.

“We are experiencing an unprecedented change in how we date, how we mate and how we connect,” Sales tells The Post.


At least 40 million Americans use one or more of the dozens of online dating services and mobile apps that have cropped up in the last six years. Millennials aged 18 to 30 spend an average of 10 hours a week flicking through the portraits and profiles on sites like Tinder, Bumble, Grindr and Hinge.


The biggest, Tinder, sees up to 1.5 billion swipes a day worldwide, says company co-founder Jonathan Badeen, the man who claims credit for inventing the swipe — the right-or-left motion that drives the app as users pursue or reject potential matches. The simple mechanism perfectly suits the service’s short-attention-span, glued-to-their-phones target market.


It also launched a seismic social shift that psychologists are just beginning to grapple with.

“We evolved in the context of small groups,” says David Buss, a University of Texas evolutionary psychologist interviewed in the film.

Early humans encountered just a few dozen potential mates over a lifetime. But modern life — and especially Internet dating — provides an endless parade of choices, which “triggers the short-term mating psychology in a way that never would have been triggered ancestrally,” Buss adds.

In other words, it encourages hookups.

“Hookup culture did not start with dating apps,” Sales says. “But online dating has weaponized hookup culture and has sent it into warp speed.”

And even though 80 percent of dating-app users say they turn to them in hopes of finding a long-term partner, Sales says, the apps instead reward behaviors that undermine and, eventually, destroy relationships.

THE fault lies in their very design, which exploits our brain chemistry through a calculated program of intermittent rewards that arrive regularly but unpredictably, just like the occasional jackpots of a slot machine.

“We absolutely added these almost game-like elements, where you feel like you’re being rewarded,” Tinder’s Badeen tells Sales in the film. “You’re excited to see who the next person is, or you’re excited to see, did I get the match?”

When a pair of Tinder users swipe right on each other’s profiles, the signal of mutual interest sets off some gratifying graphics and audio effects.



“And then you unlock the ability to message them, and it feels good,” explains Vin, a college student from California. “Or you can go back and test your luck again.”

“It’s like a mini-adrenaline rush every time,” Kyle says. “It’s like a little video game.”

Badeen based the function on the theories of Harvard behavioral scientist B.F. Skinner, whose experiments with pigeons proved that even birds can be transformed into compulsive gamblers, addicted to the high of occasional machine-driven winnings, if the rewards are doled out on what he called a “variable ratio schedule.”

“Having unpredictable, yet frequent, rewards is the best way to motivate somebody,” Badeen says in the film.

Alex (left) and Kyle met on Tinder but have negative feelings about the app.HBO







“It’s called gamification, and it is designed to be addictive,” Sales adds. “It’s explicitly modeled to control behavior.”

A variable ratio schedule, Skinner maintained, is what hooks us on gambling devices. The payoffs, when they happen, bathe our brains in a feel-good hit of dopamine — and the unpredictability goads us into trying for just one more win.

“Apps that give you variable feedback, rather than predictable feedback, have this same potential to be addictive,” says NYU psychologist Adam Alter.

“They are engineered to draw you in and to keep on using it, not to help you meet the love of your life,” Sales says.

Finding a long-term partner “may be what the user wants, but it’s not the goal of these platforms. The goal is to keep you swiping, keep you coming back for more” — an urge the apps can monetize by offering premium features and added access, for a price.


Tinder is on pace to earn $800 million this year, its parent company said last month.

“The way these services are designed tips the scale toward hookups,” admits Justin McLeod, the CEO of Hinge, a dating app that bills itself as relationship-oriented.

And even the apps that talk a good relationship game trend in the same Tinder-fied direction, users say.

“All the guys, they’re not looking for s–t but hookups,” Bree insists in the film. “And like quick, that-night hookups . . . for guys, it’s like a catalog for them.”

“This tech has actually privileged the people who want hookups,” Sales says. “And statistically, it’s just true that men are more interested in hooking up than women.”

She blames the “bro culture” of Silicon Valley and the tech genius of young men — and a handful of female peers — who bonded in college and went on to build sites that suited their own social needs.

ONE of those few women, Tinder co-founder Whitney Wolfe Herd, appears in the film to talk about her company’s early marketing strategy.

The app was launched with Herd’s 2012 visit to Southern Methodist University in Texas. “It was first taken to the sororities — pretty much the height of the culture of traditional femininity,” Sales says.

“Then we took it to the frats,” Herd recalls. “And we told them, ‘Every Kappa, every Pi Phi, every Theta — they’re on this app and they’re waiting for you to match with them. Download it, download it, download it!’ ”

Dylan recounts an ex treating her like an “object” only valued for her Instagram likes.HBO










“Talk about reinforcing gender stereotypes!” Sales says. “[Herd] seemed to be very proud of her marketing strategy. But here they were, literally giving girls to guys. That’s what these apps are designed to do.”

It led almost inexorably to the “Barbie and Ken culture” that social scientists see as the norm on dating apps aimed at heterosexual users.

Both sexes “rely on gender stereotypes, leading many women to sexualize themselves and many men to present themselves in a very stereotypically masculine way,” Sales says.

Fish pics, for example. The photo of a young man hoisting a just-caught sailfish or trout is a common Tinder trope.

“Literally, it’s saying, ‘I will get food for you,’ ” Sales says. “Or they’ll post a picture of themselves at the top of a mountain — that says ‘I can climb, I am strong.’ Or torso shots at the gym.”

Women, in turn, feel pressure to project a veneer of ultra-feminine sexuality.

“We got the bombshell bra on, face full of makeup, the weave or the wig,” Bree says in the doc. “And when all that comes off, when they see the real you, then they’re not even attracted to you anymore.”

“The accepted narrative of the apps is all about liberation,” Sales says. “But in truth it’s just a lot of people reapplying gender stereotypes — and a lot of times feeling bad about it.”

The constant curation of an online persona can do a number on users’ emotional health.

“The effect of mobile dating apps is that you feel like you can be dating all the time,” says Harvard dating historian Moira Weigel. “You feel as if you should always be putting yourself out there, promoting your product.”

“I’m very aware of the pressure and the need to be manicured and beautiful and to have a uniform Instagram feed that people will want to follow,” says Cheyenne. “I don’t enjoy doing sexual stuff with people because I’m so caught up in how I look. And then I’m also caught up in how they look.”

“I don’t have the greatest self-esteem,” she admits.

Millennials like Dylan, a young New York DJ with an impressive social-media following, don’t have it any easier.

“I was his trophy girlfriend with the cool clothes and a lot of followers on Instagram . . . but I don’t think he genuinely wanted me,” she says of one former flame. “He treated me like I was an object.”

Sales calls it “the scourge of ‘likes.’ ”

“That constant pressure to post and be perfect and be sexy has now worked its way into dating,” she says. “The makeup industry has exploded, by the way, and also plastic surgery — plastic surgeons have young women coming in saying ‘I want to look good in selfies.’ ”

An August study released by the American Society of Plastic Surgeons noted a sharp rise in procedures for girls under age 19 — tying that stat to the fact that the average millennial will take more than 25,000 selfies in his or her lifetime.

“Now dating is based entirely on pictures, not just on dating apps but also on Instagram, on Snapchat, multiple platforms,” Sales says.

“Heartbreak is nothing new, but it becomes so much easier with this technology.” “This technology” watches YOU even worse than you thought. What if your dating site is full of spies? A secret program at the Central Intelligence Agency relies on a form of mass surveillance activity that involved the collection of an unknown data set and included the gathering of some records belonging to Americans, according to a newly declassified letter from two Democratic senators.

Details of the CIA program have been kept from the public as well as some lawmakers, according to the April 2021 letter to the agency from Sens. Ron Wyden (D., Ore.) and Martin Heinrich (D., N.M.), members of the Senate Intelligence Committee. The letter was partially declassified and disclosed Thursday.

The nature of the type of collection isn’t made clear in the heavily redacted letter. It couldn’t be determined when the surveillance occurred or if the intelligence program is currently operational. It was also not clear whether another U.S. intelligence agency was performing the actual surveillance that supported the functioning of the CIA program, which isn’t unusual.

The senators’ letter urged the CIA to inform the public about the program, including what kinds of records have been collected, as well as the spy agency’s relationship with its sources of intelligence, the legal framework of the program, the amount of Americans’ records being maintained and how often searches of U.S. data are performed.

“This declassification is urgent,” the senators wrote.

“CIA recognizes and takes very seriously our obligation to respect the privacy and civil liberties of U.S. persons in the conduct of our vital national security mission, and conducts our activities, including collection activities, in compliance with U.S. law, Executive Order 12333, and our Attorney General guidelines,” Kristi Scott, the agency’s privacy and civil liberties officer, said in a statement. “CIA is committed to transparency consistent with our obligation to protect intelligence sources and methods.”

The CIA is generally prohibited by law from engaging in domestic spying. But some U.S. intelligence programs collect broad streams of internet or telephone data in a way that can scoop up information on Americans, such as when someone is communicating with a target of surveillance who lives overseas. Intelligence agencies refer to such information gathered about Americans as incidental collection, an issue that lawmakers in both parties have long said raises privacy concerns because it can evade traditional warrant requirements.

The surveillance activity is authorized under presidential Executive Order 12333, according to the senators’ letter, which is a Reagan-era document that sets rules for some methods of U.S. intelligence gathering. It is not subject to some of the same oversight that governs surveillance activities performed under the Foreign Intelligence Surveillance Act, a decades-old law that created a secretive court to review surveillance requests by U.S. intelligence agencies. But in their letter, the senators say the CIA has run the program “entirely outside the statutory framework that Congress and the public believe govern this collection.”

Ms. Scott didn’t address the senators’ concerns.

A redacted portion of the letter appearing to refer to previous actions by lawmakers said, “history demonstrates Congress’s clear intent, expressed over many years and through multiple pieces of legislation, to limit and, in some cases, prohibit the warrantless collection of Americans’ records, as well as the public’s intense interest in and support for these legislative efforts,” the letter to Director of National Intelligence Avril Haines and CIA Director William Burns said. “And yet, throughout this period, the CIA has secretly conducted its own bulk program.”

Disclosures in 2013 by former intelligence contractor Edward Snowden revealed that the National Security Agency had been secretly operating a program that collected bulk metadata from phone carriers about U.S. phone calls and text messages. The disclosures ignited an international uproar over the scope of America’s electronic-spying capabilities. That program was narrowed by a law passed by Congress in 2015 but has been beset by technical challenges since then and is believed by lawmakers to currently not be operational following the law’s lapse in March of 2020.

Soon after, reporting by The Wall Street Journal and other news organizations disclosed that the CIA was obtaining bulk data from companies such as Western Union Co. on international money transfers that included millions of Americans’ financial and personal data. The program was meant to fill what U.S. officials saw as an important gap in their ability to track terrorist financing world-wide, the Journal reported in 2014.

The letter from the two senators concerns a separate CIA program, according to a report also released Thursday by the Privacy and Civil Liberties Oversight Board, or PCLOB, a government panel that reviews classified intelligence programs. The board’s report refers to the same surveillance activity referenced by the senators as “another classified program” apart from the CIA’s financial data surveillance, which the privacy board also released findings on Thursday.

The privacy board said in its report it researched the CIA’s surveillance program between August 2015 and December 2016. The five-member board’s operations and its ability to release material to the public has been hampered for years by struggles to maintain a quorum.

Senators weren’t aware of the full details of how the CIA program operated before the board completed a review of it in March of 2021, according to the letter by Messrs. Wyden and Heinrich.

“Until the PCLOB report was delivered last month, the nature and extent of the CIA’s collection was withheld even from the Senate Select Committee on Intelligence,” the senators’ letter said.

On top of that: Zoom users on Apple computers got a shock when they realized their microphones were still recording them after installing macOS Monterey in October 2021. At the end of December, Zoom released an update — Zoom version 5.9.1 (3506) — to fix the bug, but users are still seeing the same thing happen.

Key Details

  • Apple’s devices have visual signals when apps use the device’s microphone or camera — an orange dot in the menu bar for the mic, a green dot for the camera — which users noticed that even when they weren’t on a call, these dots would still appear.
  • After Zoom’s December update, one user said, “I’ve just noticed the orange dot again, and when I quit Zoom, Timing.app told me that I’d apparently been on a 2 hour Zoom call.”

IN FACT – EVERY online camera, on dating sites, and just plain old Zoom, WEBEX, all of the Cisco products, etc. DO record you when you are not aware, and open your computer, or phone, to every hacker on Earth. Only dumb-bells use internet devices to relay any personal thoughts!

In partnership with

In the months leading up to Russia’s invasion of Ukraine, two obscure American startups met to discuss a potential surveillance partnership that would merge the ability to track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter. According to Brendon Clark of Anomaly Six — or “A6” — the combination of its cellphone location-tracking technology with the social media surveillance provided by Zignal Labs would permit the U.S. government to effortlessly spy on Russian forces as they amassed along the Ukrainian border, or similarly track Chinese nuclear submarines. To prove that the technology worked, Clark pointed A6’s powers inward, spying on the National Security Agency and CIA, using their own cellphones against them.

Virginia-based Anomaly Six was founded in 2018 by two ex-military intelligence officers and maintains a public presence that is scant to the point of mysterious, its website disclosing nothing about what the firm actually does. But there’s a good chance that A6 knows an immense amount about you. The company is one of many that purchases vast reams of location data, tracking hundreds of millions of people around the world by exploiting a poorly understood fact: Countless common smartphone apps are constantly harvesting your location and relaying it to advertisers, typically without your knowledge or informed consent, relying on disclosures buried in the legalese of the sprawling terms of service that the companies involved count on you never reading. Once your location is beamed to an advertiser, there is currently no law in the United States prohibiting the further sale and resale of that information to firms like Anomaly Six, which are free to sell it to their private sector and governmental clientele. For anyone interested in tracking the daily lives of others, the digital advertising industry is taking care of the grunt work day in and day out — all a third party need do is buy access.

Company materials obtained by The Intercept and Tech Inquiry provide new details of just how powerful Anomaly Six’s globe-spanning surveillance powers are, capable of providing any paying customer with abilities previously reserved for spy bureaus and militaries.

According to audiovisual recordings of an A6 presentation reviewed by The Intercept and Tech Inquiry, the firm claims that it can track roughly 3 billion devices in real time, equivalent to a fifth of the world’s population. The staggering surveillance capacity was cited during a pitch to provide A6’s phone-tracking capabilities to Zignal Labs, a social media monitoring firm that leverages its access to Twitter’s rarely granted “firehose” data stream to sift through hundreds of millions of tweets per day without restriction. With their powers combined, A6 proposed, Zignal’s corporate and governmental clients could not only surveil global social media activity, but also determine who exactly sent certain tweets, where they sent them from, who they were with, where they’d been previously, and where they went next. This enormously augmented capability would be an obvious boon to both regimes keeping tabs on their global adversaries and companies keeping tabs on their employees.


Most Read

Noam Chomsky and Jeremy Scahill on the Russia-Ukraine War, the Media, Propaganda, and Accountability

Jeremy Scahill

Jared Kushner Flaunted His Influence With Saudi Arabia, Russia in Pitch to Investors

Ken Klippenstein

The Armenian Genocide Holds a Bitter Lesson for Those Who Weep for Ukraine

Jon Schwarz

The source of the materials, who spoke on the condition of anonymity to protect their livelihood, expressed grave concern about the legality of government contractors such as Anomaly Six and Zignal Labs “revealing social posts, usernames, and locations of Americans” to “Defense Department” users. The source also asserted that Zignal Labs had willfully deceived Twitter by withholding the broader military and corporate surveillance use cases of its firehose access. Twitter’s terms of service technically prohibit a third party from “conducting or providing surveillance or gathering intelligence” using its access to the platform, though the practice is common and enforcement of this ban is rare. Asked about these concerns, spokesperson Tom Korolsyshun told The Intercept “Zignal abides by privacy laws and guidelines set forth by our data partners.”

A6 claims that its GPS dragnet yields between 30 to 60 location pings per device per day and 2.5 trillion locational data points annually worldwide, adding up to 280 terabytes of location data per year and many petabytes in total, suggesting that the company surveils roughly 230 million devices on an average day. A6’s salesperson added that while many rival firms gather personal location data via a phone’s Bluetooth and Wi-Fi connections that provide general whereabouts, Anomaly 6 harvests only GPS pinpoints, potentially accurate to within several feet. In addition to location, A6 claimed that it has built a library of over 2 billion email addresses and other personal details that people share when signing up for smartphone apps that can be used to identify who the GPS ping belongs to. All of this is powered, A6’s Clark noted during the pitch, by general ignorance of the ubiquity and invasiveness of smartphone software development kits, known as SDKs: “Everything is agreed to and sent by the user even though they probably don’t read the 60 pages in the [end user license agreement].”

The Intercept was not able to corroborate Anomaly Six’s claims about its data or capabilities, which were made in the context of a sales pitch. Privacy researcher Zach Edwards told The Intercept that he believed the claims were plausible but cautioned that firms can be prone to exaggerating the quality of their data. Mobile security researcher Will Strafach agreed, noting that A6’s data sourcing boasts “sound alarming but aren’t terribly far off from ambitious claims by others.” According to Wolfie Christl, a researcher specializing in the surveillance and privacy implications of the app data industry, even if Anomaly Six’s capabilities are exaggerated or based partly on inaccurate data, a company possessing even a fraction of these spy powers would be deeply concerning from a personal privacy standpoint.

Reached for comment, Zignal’s spokesperson provided the following statement: “While Anomaly 6 has in the past demonstrated its capabilities to Zignal Labs, Zignal Labs does not have a relationship with Anomaly 6. We have never integrated Anomaly 6’s capabilities into our platform, nor have we ever delivered Anomaly 6 to any of our customers.”

When asked about the company’s presentation and its surveillance capabilities, Anomaly Six co-founder Brendan Huff responded in an email that “Anomaly Six is a veteran-owned small business that cares about American interests, natural security, and understands the law.”

Companies like A6 are fueled by the ubiquity of SDKs, which are turnkey packages of code that software-makers can slip in their apps to easily add functionality and quickly monetize their offerings with ads. According to Clark, A6 can siphon exact GPS measurements gathered through covert partnerships with “thousands” of smartphone apps, an approach he described in his presentation as a “farm-to-table approach to data acquisition.” This data isn’t just useful for people hoping to sell you things: The largely unregulated global trade in personal data is increasingly finding customers not only at marketing agencies, but also federal agencies tracking immigrants and drone targets as well as sanctions and tax evasion. According to public records first reported by Motherboard, U.S. Special Operations Command paid Anomaly Six $590,000 in September 2020 for a year of access to the firm’s “commercial telemetry feed.”

Anomaly Six software lets its customers browse all of this data in a convenient and intuitive Google Maps-style satellite view of Earth. Users need only find a location of interest and draw a box around it, and A6 fills that boundary with dots denoting smartphones that passed through that area. Clicking a dot will provide you with lines representing the device’s — and its owner’s — movements around a neighborhood, city, or indeed the entire world.

As the Russian military continued its buildup along the country’s border with Ukraine, the A6 sales rep detailed how GPS surveillance could help turn Zignal into a sort of private spy agency capable of assisting state clientele in monitoring troop movements. Imagine, Clark explained, if the crisis zone tweets Zignal rapidly surfaces through the firehose were only a starting point. Using satellite imagery tweeted by accounts conducting increasingly popular “open-source intelligence,” or OSINT, investigations, Clark showed how A6’s GPS tracking would let Zignal clients determine not simply that the military buildup was taking place, but track the phones of Russian soldiers as they mobilized to determine exactly where they’d trained, where they were stationed, and which units they belonged to. In one case, Clark showed A6 software tracing Russian troop phones backward through time, away from the border and back to a military installation outside Yurga, and suggested that they could be traced further, all the way back to their individual homes. Previous reporting by the Wall Street Journal indicates that this phone-tracking method is already used to monitor Russian military maneuvers and that American troops are just as vulnerable.

In another A6 map demonstration, Clark zoomed in closely on the town of Molkino, in southern Russia, where the Wagner Group, an infamous Russian mercenary outfit, is reportedly headquartered. The map showed dozens of dots indicating devices at the Wagner base, along with scattered lines showing their recent movements. “So you can just start watching these devices,” Clark explained. “Any time they start leaving the area, I’m looking at potential Russian predeployment activity for their nonstandard actors, their nonuniform people. So if you see them go into Libya or Democratic Republic of the Congo or things like that, that can help you better understand potential soft power actions the Russians are doing.”

To fully impress upon its audience the immense power of this software, Anomaly Six did what few in the world can claim to do: spied on American spies.

The pitch noted that this kind of mass phone surveillance could be used by Zignal to aid unspecified clients with “counter-messaging,” debunking Russian claims that such military buildups were mere training exercises and not the runup to an invasion. “When you’re looking at counter-messaging, where you guys have a huge part of the value you provide your client in the counter-messaging piece is — [Russia is] saying, ‘Oh, it’s just local, regional, um, exercises.’ Like, no. We can see from the data that they’re coming from all over Russia.”

To fully impress upon its audience the immense power of this software, Anomaly Six did what few in the world can claim to do: spied on American spies. “I like making fun of our own people,” Clark began. Pulling up a Google Maps-like satellite view, the sales rep showed the NSA’s headquarters in Fort Meade, Maryland, and the CIA’s headquarters in Langley, Virginia. With virtual boundary boxes drawn around both, a technique known as geofencing, A6’s software revealed an incredible intelligence bounty: 183 dots representing phones that had visited both agencies potentially belonging to American intelligence personnel, with hundreds of lines streaking outward revealing their movements, ready to track throughout the world. “So, if I’m a foreign intel officer, that’s 183 start points for me now,” Clark noted.

The NSA and CIA both declined to comment.


Anomaly Six tracked a device that had visited the NSA and CIA headquarters to an air base outside of Zarqa, Jordan.

Screenshot: The Intercept / Google Maps

Clicking on one of dots from the NSA allowed Clark to follow that individual’s exact movements, virtually every moment of their life, from that previous year until the present. “I mean, just think of fun things like sourcing,” Clark said. “If I’m a foreign intel officer, I don’t have access to things like the agency or the fort, I can find where those people live, I can find where they travel, I can see when they leave the country.” The demonstration then tracked the individual around the United States and abroad to a training center and airfield roughly an hour’s drive northwest of Muwaffaq Salti Air Base in Zarqa, Jordan, where the U.S. reportedly maintains a fleet of drones.


“It doesn’t take a lot of creativity to see how foreign spies can use this information for espionage, blackmail, all kinds of, as they used to say, dastardly deeds.”

“There is sure as hell a serious national security threat if a data broker can track a couple hundred intelligence officials to their homes and around the world,” Sen. Ron Wyden, D-Ore., a vocal critic of the personal data industry, told The Intercept in an interview. “It doesn’t take a lot of creativity to see how foreign spies can use this information for espionage, blackmail, all kinds of, as they used to say, dastardly deeds.”

Back stateside, the person was tracked to their own home. A6’s software includes a function called “Regularity,” a button clients can press that automatically analyzes frequently visited locations to deduce where a target lives and works, even though the GPS pinpoints sourced by A6 omit the phone owner’s name. Privacy researchers have long shown that even “anonymized” location data is trivially easy to attach to an individual based on where they frequent most, a fact borne out by A6’s own demonstration. After hitting the “Regularity” button, Clark zoomed in on a Google Street View image of their home.

“Industry has repeatedly claimed that collecting and selling this cellphone location data won’t violate privacy because it is tied to device ID numbers instead of people’s names. This feature proves just how facile those claims are,” said Nate Wessler, deputy director of the American Civil Liberties Union’s Speech, Privacy, and Technology Project. “Of course, following a person’s movements 24 hours a day, day after day, will tell you where they live, where they work, who they spend time with, and who they are. The privacy violation is immense.”

The demo continued with a surveillance exercise tagging U.S. naval movements, using a tweeted satellite photo of the USS Dwight D. Eisenhower in the Mediterranean Sea snapped by the commercial firm Maxar Technologies. Clark broke down how a single satellite snapshot could be turned into surveillance that he claimed was even more powerful than that executed from space. Using the latitude and longitude coordinates appended to the Maxar photo along with its time stamp, A6 was able to pick up a single phone signal from the ship’s position at that moment, south of Crete. “But it only takes one,” Clark noted. “So when I look back where that one device goes: Oh, it goes back to Norfolk. And actually, on the carrier in the satellite picture — what else is on the carrier? When you look, here are all the other devices.” His screen revealed a view of the carrier docked in Virginia, teeming with thousands of colorful dots representing phone location pings gathered by A6. “Well, now I can see every time that that ship is deploying. I don’t need satellites right now. I can use this.”

Though Clark conceded that the company has far less data available on Chinese phone owners, the demo concluded with a GPS ping picked up aboard an alleged Chinese nuclear submarine. Using only unclassified satellite imagery and commercial advertising data, Anomaly Six was able to track the precise movements of the world’s most sophisticated military and intelligence forces. With tools like those sold by A6 and Zignal, even an OSINT hobbyist would have global surveillance powers previously held only by nations. “People put way too much on social media,” Clark added with a laugh.

As location data has proliferated largely unchecked by government oversight in the United States, one hand washes another, creating a private sector capable of state-level surveillance powers that can also fuel the state’s own growing appetite for surveillance without the usual judicial scrutiny. Critics say the loose trade in advertising data constitutes a loophole in the Fourth Amendment, which requires the government to make its case to a judge before obtaining location coordinates from a cellular provider. But the total commodification of phone data has made it possible for the government to skip the court order and simply buy data that’s often even more accurate than what could be provided by the likes of Verizon. Civil libertarians say this leaves a dangerous gap between the protections intended by the Constitution and the law’s grasp on the modern data trade.

“The Supreme Court has made clear that cellphone location information is protected under the Fourth Amendment because of the detailed picture of a person’s life it can reveal,” explained Wessler. “Government agencies’ purchases of access to Americans’ sensitive location data raise serious questions about whether they are engaged in an illegal end run around the Fourth Amendment’s warrant requirement. It is time for Congress to end the legal uncertainty enabling this surveillance once and for all by moving toward passage of the Fourth Amendment Is Not For Sale Act.”

Though such legislation could restrict the government’s ability to piggyback off commercial surveillance, app-makers and data brokers would remain free to surveil phone owners. Still, Wyden, a co-sponsor of that bill, told The Intercept that he believes “this legislation sends a very strong message” to the “Wild West” of ad-based surveillance but that clamping down on the location data supply chain would be “certainly a question for the future.” Wyden suggested that protecting a device’s location trail from snooping apps and advertisers might be best handled by the Federal Trade Commission. Separate legislation previously introduced by Wyden would empower the FTC to crack down on promiscuous data sharing and broaden consumers’ ability to opt out of ad tracking.

A6 is far from the only firm engaged in privatized device-tracking surveillance. Three of Anomaly Six’s key employees previously worked at competing firm Babel Street, which named all three of them in a 2018 lawsuit first reported by the Wall Street Journal. According to the legal filing, Brendan Huff and Jeffrey Heinz co-founded Anomaly Six (and lesser-known Datalus 5) months after ending their employment at Babel Street in April 2018, with the intent of replicating Babel’s cellphone location surveillance product, “Locate X,” in a partnership with major Babel competitor Semantic AI. In July 2018, Clark followed Huff and Heinz by resigning from his position as Babel’s “primary interface to … intelligence community clients” and becoming an employee of both Anomaly Six and Semantic.

Like its rival Dataminr, Zignal touts its mundane partnerships with the likes of Levi’s and the Sacramento Kings, marketing itself publicly in vague terms that carry little indication that it uses Twitter for intelligence-gathering purposes, ostensibly in clear violation of Twitter’s anti-surveillance policy. Zignal’s ties to government run deep: Zignal’s advisory board includes a former head of the U.S. Army Special Operations Command, Charles Cleveland, as well as the CEO of the Rendon Group, John Rendon, whose bio notes that he “pioneered the use of strategic communications and real-time information management as an element of national power, serving as a consultant to the White House, U.S. National Security community, including the U.S. Department of Defense.” Further, public records state that Zignal was paid roughly $4 million to subcontract under defense staffing firm ECS Federal on Project Maven for “Publicly Available Information … Data Aggregation” and a related “Publicly Available Information enclave” in the U.S. Army’s Secure Unclassified Network.

The remarkable world-spanning capabilities of Anomaly Six are representative of the quantum leap occurring in the field of OSINT. While the term is often used to describe the internet-enabled detective work that draws on public records to, say, pinpoint the location of a war crime from a grainy video clip, “automated OSINT” systems now use software to combine enormous datasets that far outpace what a human could do on their own. Automated OSINT has also become something of a misnomer, using information that is by no means “open source” or in the public domain, like commercial GPS data that must be bought from a private broker.

While OSINT techniques are powerful, they are generally shielded from accusations of privacy violation because the “open source” nature of the underlying information means that it was already to some extent public. This is a defense that Anomaly Six, with its trove of billions of purchased data points, can’t muster. In February, the Dutch Review Committee on the Intelligence and Security Services issued a report on automated OSINT techniques and the threat to personal privacy they may represent: “The volume, nature and range of personal data in these automated OSINT tools may lead to a more serious violation of fundamental rights, in particular the right to privacy, than consulting data from publicly accessible online information sources, such as publicly accessible social media data or data retrieved using a generic search engine.” This fusion of publicly available data, privately procured personal records, and computerized analysis isn’t the future of governmental surveillance, but the present. Last year, the New York Times reported that the Defense Intelligence Agency “buys commercially available databases containing location data from smartphone apps and searches it for Americans’ past movements without a warrant,” a surveillance method now regularly practiced throughout the Pentagon, the Department of Homeland Security, the IRS, and beyond.

The Internet Is Stealing Your Life!

Here’s what we’re talking about this month:

  • Real estate. How Personally Identifiable Information (PII), the housing market, and scams go hand in hand and how to avoid having your house stolen.
  • Recommended reads, including “LinkedIn Phishing Scams Up by 232% Since February.”
  • Q&A: What are dark patterns? Are they actually bad?

If you know someone who might enjoy learning more about data privacy, feel free to forward them this newsletter.

House prices may be soaring, but that hasn’t stopped Americans from going on a “near-record homebuying spree” during the pandemic. In fact, the sudden shift to hybrid work models combined with relatively low interest rates and pandemic savings have prompted more people to consider buying second and even third homes.

However, potential home buyers were not the only ones busy during the last few years. Amidst the chaos of the COVID-19 crisis, criminals also ramped up their activities, including identity theft. For example, in 2020, about 49 million Americans fell victim to identity theft, costing victims a total of almost $56 billion.

While identity theft is most commonly associated with drained bank accounts, few realize that as long as criminals can access people’s personal information, including their real estate data, they can also steal their homes.

Your Real Estate Data Is (Very) Public

In the US, the real estate recording system is based on open access. That means that any information about a home purchase is public record.

Anyone can perform a property record search to find out things like who the owner of a home is, how much they paid for it, when they purchased it, its square footage, property deeds, terms and conditions of a mortgage loan (if applicable), tax liens (if applicable), and even the owner’s personal history, like if they’re divorced or facing bankruptcy.

Real estate records are easily available.

Individuals can access this data through entities like the county courthouse, city hall, and county clerk recorder’s office.


  • In many cases, people don’t even have to leave their homes to find this data, as most agencies upload their records online.
  • Data brokers also collate this information, which they get from deed registrations, magazine subscriptions, phone connections, and the US Postal Service. However, data brokers also have other, very personal data on individuals, like their race/ethnicity, income, and presence of children, among other things.
  • Real estate property data + other personally identifiable information (PII) = Identity theft waiting to happen.

Exploiting the New Kid on the Block

At the very least, moving home will lead to predatory junk mail, targeted ads, and spam calls. This is because data brokers place people they know have bought a new home into “new movers” lists. These lists are frequently sold to furniture and appliance dealers, doctors and dentists, lawn maintenance services, and other businesses.

Experian, a data broker and credit reporting company, that has information on over a billion individuals, sells a “new movers mailing list” to local businesses so that they can get to “know prospective clients, including trade-up homebuyers, apartment renters, corporate climbers, and retirees.”


THE PERFECT DATE ON YOUR DATING WEBSITES IS A COMPUTER-GENERATED FAKE THAT YOU WILL NEVER MEET IN-PERSON! The dating websites that sell you scam profiles are: AnastasiaDate, Ashley Madison, Bumble, Coffee Meets Bagel, Cupid.com, Hinge, JDate, Match.com, OkCupid (OkC), POF (PlentyofFish), Tinder and all of the IAC and Match Group Cartel. Artificial intelligence has given its verdict on what the ‘ideal’ human body type is – and the results have sparked concerns. Unrealistic and damaging body image stereotypes promoted on social media have been highlighted in the worrying recent study by The Bulimia Project, that used AI image-generating software. Researchers from The Bulimia Project, an organisation focusing on publicising research around eating disorders, body image and mental health, used AI platforms Dall-E 2, Stable Diffusion, and Midjourney, to create the “perfect body”. By producing and analysing multiple images, they investigated the idealised body types being promoted aiming to shed light on the detrimental impact of stereotypes on mental health and self-esteem. The AI-generated images showcasing the “perfect” female body revealed a prevalent preference for more petite women, with Midjourney producing the most unrealistic representations. Similarly, the images of the “perfect” male body resembled heavily photoshopped versions of bodybuilders, giving an unrealistic representation of the male physique. Match.com is now the number one place for hookers in the world. 80% of match.com users who are not fake profiles found to be prostitutes or gold-diggers, per https://reason.com/blog/2018/03/22/reddit-bans-escort-subreddits
MATCH.COM AND OKCUPID ARE ACTUALLY LEFT WING POLITICAL APPS. Swipe Left, Swipe Right: Political Campaigning Invades Dating Apps. Young people are on Tinder, Bumble, Grindr and other dating apps, so political strategists are too, promoting their favorite candidates. ‘I’m only matching with voters.’ When New Yorker Jen Winston connected last month with Spencer from Georgia on Tinder, finding true love wasn’t her priority. “Why are you so far away from me?” Spencer messaged Ms. Winston on the swipe-based dating app…. MORE: https://www.wsj.com/articles/swipe-left-swipe-right-political-campaigning-invades-dating-apps-1541182048

Match.com dating sites spy on you and rape your privacy. Handing over your personal data is now often the cost of romance, as online dating services and apps vacuum up information about their users’ lifestyle and preferences. Why it matters: Dating app users provide sensitive information like drug usage habits and sexual preferences in hopes of finding a romantic match. How online dating services use and share that data worries users,according to an Axios-SurveyMonkey poll, but the services nonetheless have become a central part of the modern social scene.What they know: Everything you put on your profile, including drug use and health status. Web trackers can examine your behavior on a page and how you answer key personal questions. JDate and Christian Mingle, for example, both use a tracker called Hotjar that creates an aggregate heat map of where on a web page users are clicking and scrolling. Every time you swipe right or click on a profile. “These can be very revealing things about someone, everything from what your kinks are to what your favorite foods are to what sort of associations you might be a part of or what communities you affiliate with,” says Shahid Buttar, director of grassroots advocacy for the Electronic Frontier Foundation. How you’re talking to other people. A reporter for the Guardian recently requested her data from Tinder and received hundreds of pages of data including information about her conversations with matches. Where you are. Location data is a core part of apps like Tinder. “Beyond telling an advertiser where someone might physically be at a given time, geolocation information can provide insights into a person’s preferences, such as the stores and venues they frequent and whether or not they live in an affluent neighborhood,” says former FTC chief technologist Ashkan Soltani.

Popular dating websites broadly collect information on their users for advertising purposes from the minute they first log on to the site, according to an analysis by the online privacy company Ghostery of the websites for OkCupid, Match.com, Plenty of Fish, Christian Mingle, JDate and eHarmony. (Ghostery, which performed the analysis for Axios, lets people block ad trackers as they browse the web.) Popular services broadly track their users while they search for potential matches and view profiles. OkCupid runs 10 advertising trackers during the search and profile stages of using its site, Ghostery found, while Match.com runs 63 — far exceeding the number of trackers installed by other services. The number and types of trackers can vary between sessions. The trackers can collect profile information. Match.com runs 52 ad trackers as users set up their profiles, Plenty of Fish runs 21, OkCupid runs 24, eHarmony runs 16, JDate runs 10 and Christian Mingle runs nine. The trackers could pick up where users click or where they look, says Ghostery product analyst Molly Hanson, but it’s difficult to know for sure. “If you’re self-identifying as a 35 year-old male who makes X amount of money and lives in this area, I think there’s a wealth of personal information that should be pretty easy to capture in a cookie and then send to your servers and package it and add it to a user profile,” says Jeremy Tillman, the company’s director of product management. Many of these trackers come from third parties. OkCupid installed seven ad trackers to watch users as they set up their profiles. Another 11 came from third parties at the time Ghostery ran its analysis. Trackers include data companies that often sell data to other companies looking to target people, Hanson says.

Match Group owns a number of dating services, including Tinder and OkCupid. The privacy policies say user data can be shared with other Match Group-owned services. What they’re saying: A spokesperson for Match Group says in a statement said that data collected by its companies “enables us to make product improvements, deliver relevant advertisements and continually innovate and optimize the user experience.” “Data collected by ad trackers and third parties is 100% anonymized,” the spokesperson says. “Our portfolio of companies never share personally identifiable information with third parties for any purpose.” The primary business model of the industry is still based around subscriptions rather than targeting ads based on personal data, notes Eric Silverberg, the CEO of gay dating app Scruff. I would argue that the incentive to share information is actually lower for dating businesses than it is for media businesses and news sites. … We have subscription services and our members pay us for the services we provide and the communities we create,” he says. Why you’ll hear about this again: Researchers routinely uncover security risks related to dating apps. A security firm recently claimed to have found security flaws in Tinder. The 2015 Ashley Madison hack resulted in the personal data of users of the site, which purported to facilitate infidelity, being exposed.The FTC last week warned of dating app scams. Match.com sued for tricking and lying to all of it’s users. Match.com allegedly tricked hundreds of thousands of users into buying subscriptions by sending them fake love interest ads, according to a lawsuit filed by the FTC. The company gained nearly 500,000 subscriptions by alerting users of connections known to be fake. The FTC claims the dating site also lured customers with deceitful promotions, and later made it difficult for them to dispute charges and cancel subscriptions. Match.com CEO Hesam Hosseini denied the FTC’s claims in an email to executives. The Fed­eral Trade Com­mis­sion has sued on­line-dat­ing ser­vice Match Group Inc. for al­legedly us­ing fake love-in­ter­est ad­ver­tise­ments to trick hun­dreds of thou­sands of users into buy­ing sub­scrip­tions on Match.­com.

Quit playing games with our hearts, says the Federal Trade Commission: . With its new explosive lawsuit against Match (which owns Match, Tinder, Hinge, and OkCupid), the Federal Trade Commission signals the start of a consumer-fraud crackdown in the online-dating market. Most interesting among its several salacious allegations is that Match enticed basic (free) users to purchase premium subscriptions by notifying them that they had received “matches” in their premium inboxes knowing that the “matches” were from scammers, not real love interests. Only time (and lengthy discovery) will tell whether Match forwarding these supposed “matches” was a product of malicious intent or a benign algorithm. But online-dating apps and services should be on notice that the Federal Trade Commission does not take consumer fraud of the heart lightly. #consumerprotection #match #socialmedia #onlinedating #advertising

A league out of their own: Truth be told, cancelling a subscription to anything can be a chore, but it’s even worse when it’s one tied to emotions https://lnkd.in/e8jaqRK #advertising #dating #psychology #match #relationships

Why does social engineering work so well? Because it involves humans and emotions. Match.com used social engineering to convert unsuspecting users into paying members. The social costs and damage to Match’s reputation will likely be long-lasting. In fact, in a 2018 survey, 81% of respondents stated they would lose trust in a brand if the product or service didn’t live up to the company’s promise and 78% due to a poor customer service experience[1]. Consumer trust is sacred. Maintaining this trust includes always practicing high-quality.

Internet dating sites abuse their users in the most horrific ways. They now all share their ‘ai’ software and databases and that means that they share all of the scammers, AI bots, sex solicitors, players, cheaters poly, and tons of green card scamming 3rd world country profiles that EVERY SINGLE ONE OF THEM IS NOW INFESTED WITH!

For match.com horrors see the user reports at:


For Bumble horrors see the user reports at:


For Eharmony horrors see the user reports at:


For Cupid.com horrors see the user reports at:


For Zoosk horrors see the user reports at:


For OKCUPID horrors see the user reports at:


EVERY, internet dating site is now a fake profile-based, privacy harvesting, political spying, computerized scam service operating off of your emotional vulnerability in order to profit off of your basic needs.

Online dating companies are fraud companies. They purchased a AI, and that is for manipulating you and getting you to go through the rat maze as they want you:


All the naive people on hinge think its people from outside creating these “model” profiles. its match group themselves:


Instead of using their advanced algorithms to keep the platforms friendly and clean, they purposely do this.


In the modern world, there is no way to meet singles without the internet and corporate exploiters like IAC, Inc., Match Group and other ‘corporate vagina vultures’ knowing that they can openly sucker you, in plain sight, and get away with it. In America, the FTC, and other agencies, never punish them because they pay politicians big bribes. President’s family members and staff own stock in these companies.

People that work at dating site companies are either out-sourced data entry contractors from Asian regions and/or college age kids with no comprehension of how life really works. They are usually bored at work so they read all of your emails and text messages. If you mention something political that goes against their zealotry then you get your sexier potential dates replaced with fat people or you get your profile shadow-banned. In fact, if you mention anything that one of these influencer-beholden, naive, worker bees does not agree with, you get shit-listed. Just remember this: if you typed it on a dating site, it is archived and searched on all the dating sites shared databases FOREVER!

Many people find that Match.com and big corporate dating sites are a stain on humanity and a cancer on the internet. Match.com and big corporate dating sites are sometimes digital sex traffickers, exploiters of emotions and a data rapists. The Match.Com bosses are known to bribe politicians and lobby the FTC to keep from getting shut down.

Match.com and it’s affiliates are the worst of the bunch. They need to be put out of business forever. They needs to be sued by each member of the public that used the site. The company also needs to be sued by the FTC, The FEC, The DOJ, The FCC and various class action citizen groups. Match.com sends your most intimate and private data to political fronts, marketing companies and government spy agencies.

Match.com, and it’s corporate clone sites, are corporate political honey-traps designed to harvest your data, emotions, psychological and political profiles at your expense. You are being raped when you use Match.com.

This book details the 100% legal spy agency tactics and legal tools to put evil Match.com out of business. If you care about doing good, then you want to undertake these efforts to exterminate Match.Com.

Match.com does not care about you, your social life or your personal needs. They care about spying on you for their political and corporate bosses. They know you are addicted to sex and social connection. They exploit those universal emotional needs for profit and social manipulation.

This book goes beyond “who pays for the meal”, and delves into the sinister political and social crime base that Match.com covertly exploits around the globe. You have to really want to know why U.S. Senators are involved in sex sites: ( https://madworldnews.com/pelosi-child-prostitution-ring/ )
( https://www.americanpatriotdaily.com/latest/nancy-pelosi-major-scandal/ )
( http://redwhiteandright.com/skeleton-pelosis-closet-liberals/ ) and why so many name brand politicians have been outed in sex site leaks:
( https://en.wikipedia.org/wiki/Ashley_Madison_data_breach )
( https://medium.com/lifes-funny/my-match-com-account-was-hacked-782560c2fcf7 )
( https://www.washingtonpost.com/news/the-intersect/wp/2015/10/19/we-are-frequently-under-attack-match-com-says-hackers-are-after-its-data/ )

Within minutes of your use of their dating site, a political and psychological profile has been created about you and is being used by some of the most nefarious corporate, political and government entities.

Every word, every text message, every mouse click, every mouse direction, all of your audio and video…everything.. is being harvested to harm you on Match.com. Every image you post on Match.com is harvested by many parties and cross checked across the internet to find all of your other social media sites, bank records, medical records, traffic camera shots and other things you don’t want the world to see.

Match.com’s dating corporation knows that you are trapped. Those corporations have no souls. They see you as data cows to be harvested for government agencies, political parties, competitor research and marketing manipulation. Any picture you upload on Match is instantly cross checked across face scan databases globally, using the same software that the FBI, CIA, DEA, IRS and NSA use. By joining Match, you just said “Here I Am” to every investigator, hacker, collection agency, marketing service and enemy you could ever want to avoid.

Today, a single one of your images on Match.com is being scanned by software called “ClearView ai”, “Yandex Image tracker”, “Google Image Bot” and the Chinese secret police. Within 10 minutes of capturing your image off of that dating site, their computers assemble every bank record, medical record, lawsuit, property ownership record, complaint about you and every other dirty detail about you that you never wanted made public.

It is not just big spy-guys that scan your Match.com profile; Any 14 year old with a notebook computer can do this. In this book, you will see details of thousands of such technologies, in use today, that can end your life and social standing tomorrow.

This is the information they never told you in main stream news. This is how to protect yourself from Match.com.

As proven by scientific statistics, a majority of the “people” you will encounter on Match.com dating sites are: 1.) Russian scammers, 2.) Guys pretending to be girls, 3.) Robotic software seeking to scam you, 4.) Narcissists, who will never meet you in-person, seeking self-validation, 5.) Sex workers, 6.) Gold diggers, 7.) Free dinner seekers, 8.) Recently broken-up people who are addicted to their past partner and will, eventually, go back to them, 9.) Oxytocin brain chemical junkies, 10.) Single parents looking for a new person to pay the mortgage, 11.) Trans-sexuals trying out their look to see if they can fool you, 12.) Marathon daters going out with a different person every night to see which one can buy them the best dinners and show tickets and other non-qualified subjects.

This collaboratively edited book was created by the public to educate the rest of the public. It will horrify you, shock you, amaze you, enlighten you and clearly illuminate the fact that Match.com is truly breaking all of the rules of morality.

Most people that sign up for Match.com, or it’s clone online dating sites, cancel it within a few weeks because of the trauma of trying to wade through the terrible things that happen to users of the system.

Every Match.com online dater is looking for: marriage, sex, free food, money, social revenge, distraction, entertainment, narcissistic validation, arm-candy, friends, a baby-daddy or related goals. The corporation, though, behind Match.com, is only looking for one thing: Your digital and political data.

Let’s take a deeper look at Match.com as our writers go deep under-cover inside Match ( including working undercover in their offices ) …





Who Is Match.Com?

Match calls itself an “online dating service”, but it is really a spy operation, with web sites serving over 50 countries in twelve languages.[citation needed] Its headquarters are in Dallas, Texas. The company has offices in Dallas, West Hollywood, San Francisco, Tokyo, Rio de . The Match consortium sells it’s data to the CIA, FBI, NSA, IRS, DEA and DNC via Axciom and other data brokers. The USPS social media surveillance service uses it to hunt political party members who oppose the Obama Administration.

While you may know that Chelsea Clinton is part of it, the whole tale is much more sordid.

In 1993, Match.com was founded by Gary Kremen and Peng T. Ong in San Francisco.[2][3][4] At the beginning, Match.com was the name of the website, while the company that operated it was formally named Electric Classifieds Inc.[2] Early on, Kremen was assisted by Ong and Steve Klopf, who helped in the design of the initial system, and Simon Glinsky, who co-wrote its business plan, developed product designs including matching criteria, services to LGBT communities, created business models and rollout marketing strategies and made early hires.[5] Fran Maier later joined the company as its director of marketing.[5] According to a retrospective from The Atlantic, Maier helped to implement Match.com’s business strategy, which included a subscription model and the inclusion of diverse communities, including women, technology professionals, and the lesbian, gay, bisexual, and transgender communities.[5] Match.com went live as a free beta in early 1995, and was first profiled in Wired magazine that same year.[4][2]

Gary Kremen and Steve Klopf are shown in California public records as 2544 Re, LP which is a California Domestic Limited Partnership filed On April 13, 2007. The company’s filing status is listed as Active and its File Number is 200710300012.

The Registered Agent on file for this company is Steve Klopf (Later with the highly sexually driven IDEO design group, where staff members sleep with each other ) and is located at 23 Jules Avenue, San Francisco, CA 94112. The company’s mailing address is 23 Jules Avenue, San Francisco, CA 94112.

The company has 2 principals on record. The principals are Gary Kremen from San Diego CA and Steve Klopf from San Francisco CA. Gary Kremen was marketing SEX.COM.

From it’s very roots, perversion and dirty money fueled the fires.

David Lawlor published a report about how the sick story of early Match.com as Sex.com reads like a bad Hollywood movie script.

The California public records record:

“Kremen, Father & Partners, LLC is a California Domestic Limited-Liability Company filed On May 13, 1999. The company’s filing status is listed as Canceled and its File Number is 199913710035.

The Registered Agent on file for this company is Philip Father and is located at 50 California St, Ste 2000, San Francisco, CA 94111. The company’s principal address is 50 California St, Ste 2000, San Francisco, CA 94111 and its mailing address is 50 California St, Ste 2000, San Francisco, CA 94111.

The company has 2 principals on record. The principals are Gary Kemen from San Francisco CA and Philip Father from San Francisco CA.” Philip Father And Gary Kremen had a Victorian building on 3rd Street in the Portrero Hill neighborhood in San Francisco, not far from Nancy Pelosi’s “Goat Hill Pizza”. All of their files got leaked. So the story goes…

Boy gets domain name, boy loses domain name, boy gets domain name back. Add in millions of dollars flying about, a possible run-in with Mexican authorities and, naturally, a climactic courtroom finale.

But real life is always stranger than fiction, and the case of Gary Kremen versus Stephen Michael Cohen et alia is no different. No movie could fully reveal the oddities and quirks of the case of the disputed Sex.com domain name.

A trial in a San Francisco court Thursday will bring the two men together, both hoping for very different endings to the tale.

The story begins in 1994 when Gary Kremen registered the name Sex.com with domain name registrar Network Solutions (NSOL), for free and without any official contract — the way things were often done in the early days of the Web. At the time, the Internet was in its infancy — Amazon.com (AMZN: Research, Estimates) was still a year away.

After successfully launching the online dating service Match.com, Kremen turned his entrepreneurial attention to Sex.com. He hadn’t developed a Web site to accompany the Sex.com nomenclature immediately after registering it. The domain name had sat empty.

While Kremen was busy developing his online dating service and registering Sex.com, Stephen Michael Cohen sat in federal prison serving a 42-month sentence for bankruptcy fraud. The prior felon had orchestrated a number of impersonation and deception schemes in the past. Cohen finished his bankruptcy fraud term in February 1995, and left federal prison.

Then the tale’s first plot twist began. In October 1995, Network Solutions received a letter from a company called Online Classifieds Inc. stating that control of the Sex.com domain name was to be turned over to Cohen. The writer of the letter is listed as Sharyn Dimmick.

Dimmick, who was Kremen’s roommate until April 1995, did not know Cohen, says Kremen’s lawyer Pamela Urueta of San Francisco-based Kerr & Wagstaffe LLP.

Network Solutions obliged and transferred control of the domain name to Cohen.

Following the transfer, Online Classifieds Inc. informed Network Solutions that all correspondence would have to take place via mail or telephone — because Online Classifieds Inc. did not have Internet access, Urueta says. Online company, no Internet access.

Following the transfer, Cohen developed the Sex.com Website and turned it in to a multimillion dollar venture. How many millions? It’s hard to tell, because Cohen has refused to supply the court with accounting information for the Web site.

But the online pornography sector averaged $2.7 million per day in earnings in 1999, according to a U.S. House of Representatives report. The Internet pornography industry also represents the most consistently successful e-commerce product on the Web.

However, despite the huge amount of cash the Web site was generating, something was rotten in the land of online titillation. Kremen learned from a friend that Sex.com was operating as a pornographic Web site, he says. Attorneys were called, a lawsuit was filed, and the most bizarre domain name battle in the Internet’s short history began.

The first item in question was the letter written to Network Solutions with Dimmick listed as the author. Urueta believes Cohen saw the Internet was becoming a global phenomenon after his release from prison and decided Sex.com could be a lucrative domain name on which to base a business. After finding the name was already taken, Urueta says, Cohen decided to deceptively gain control of the Web property.

She contends that Cohen forged the letter after learning who Dimmick was, as the first step in his plot to take over the domain name. Cohen’s lawyer, Robert Dorband of the law firm DuBoff Dorband Cushing and King in Portland, Ore., says Cohen did not forge the letter.

In the end it didn’t matter who authored the transfer memo, because in November 2000, the U.S. District Court in San Jose found the letter was fraudulent and therefore the transfer of Sex.com from Kremen to Cohen was void. Sex.com was Kremen’s again.

But Cohen argued that the letter and the court’s view was irrelevant. He now claimed Sex.com was his before Network Solutions received the letter from Dimmick. In fact, Cohen said he had been using the Sex.com name as long ago as 1979.

Before heading to federal prison, Cohen had run a bulletin board for swingers and operated it from 1979 into the 1980s. One of the areas on the bulletin board used the three-letter file extension “.com” and was preceded by the word “sex,” Dorband says.

Trademark law does not require one to register a name to own it, but simply to use the name for a period of time. Citing that law, Cohen claimed that since he had used the term Sex.com since 1979, the moniker was his.

The judge didn’t buy it.

For Kremen, the only matter remaining now was the amount of money he should be rewarded from the Web site’s earnings while under Cohen’s leadership. At the November 2000 hearing, Judge James Ware ordered Cohen, along with two other corporate defendants, to place $25 million in the court’s control, pending final judgment and assessment of damages. The judge also ordered Cohen not to transfer any assets.

It’s a very strange case. Kremen was big with the Jerry Brown and Gavin Newsom crew and set about pitching himself as a “Green Energy Guru” for Sacramento. Steve Klopf got a job at IDEO Design after that gig, where is bosses have asked staff not to mention the SEX.COM thing.

In defiance of those two orders, Cohen did not place $25 million in the court’s bank and did transfer money to accounts outside of the United States, says Urueta. She adds that Cohen has been sending money to banks in Luxembourg and other such countries for some time in order to avoid seizure of his assets. Cohen’s lawyer confirms that the $25 million was not placed, and that money was transferred after the court order.

Cohen was held in contempt on March 5 for violating the court’s orders and for failing to appear in court on another date. The judge’s decision steming from those violations will disallow Cohen to present evidence at the trial scheduled Thursday. The judge also issued a warrant for Cohen’s arrest for failing to comply with court orders.

Cohen could not be reached for comment. Network Solutions declined requests for an interview.

Gary Kremen “It’s a very strange case,” says Dorband. “It has some unusual characters, who really are more alike than they are different. I think if they [Kremen and Cohen] had met each other in some different forum they would actually be friends.”

Since Kremen has regained control of Sex.com, he says he has toned down the nature of the content and may eventually shift the Web site’s focus away from pornography and make it an educational property.

“I still need to figure out exactly what’s going on with it [the Web site],” Kremen says. “But I don’t really want it to be a porno site.”

Dorband says the case sets no real precedent for future domain name battles.

“This whole case is really an anomaly,” Dorband says. “Everything happened when, for a brief time, Network Solutions had no written agreement with its customers. Now, with contracts, you also have property rights to your domain name. If that would have been the case to start with, then who knows what might have happened in this situation.

Founder Kremen left the company in March 1996, after disagreements with venture capitalists.[6] In 1997, Match.com was purchased by Cendant, who then sold it to IAC in 1999.[7]

In September 2001, Match.com partnered with AOL and MSN, with the idea that Love@AOL and MSN Dating and Personals would allow a more diverse audience to gain access to Match.com.[8]

In 2002 and early 2003, Match.com’s then CEO, Tim Sullivan, expanded Match.com into local dating with a service called MatchLive, where daters would meet in a public location for social activities and a form of speed dating.[9][10]

In September 2004, Jim Safka replaced Sullivan as CEO.[11] Safka was replaced as CEO by Thomas Enraght-Moony in 2007.[12][better source needed]

On November 10, 2005, a class action was filed by Matthew Evans against Match.com in federal court in Los Angeles alleging that Match.com employed fake members to send emails and go on dates with paying members. The suit was repudiated by IAC as baseless, and was later dismissed by the United States District Court for the Central District of California on April 25, 2007.[13] Similar suits were filed in June 2009 and December 2010, with the judges ruling that Match.com did not break user agreements.[14][15]

Do you see the trend here, yet? Match.com was forged in creepiness and built on slime-ball people with sinister motivations.

In January 2006, Match.com hired Dr. Phil McGraw as a celebrity spokesman.[16]

In February 2021, Match Group acquired Hyperconnect, a technology company based in Seoul, Korea, for $1.73 billion.[17]

In February 2009, IAC incorporated Match Group as a conglomerate of Match.com and other dating sites it owned.[18] Also in February, it was announced that Match.com’s European operations would be sold to Meetic for 5 million Euros and a reported twenty-seven percent interest in the company.[19] At the same time that this sale was announced, the current CEO Thomas Enraght-Moony stepped down, while IAC’s (Match.com’s parent company) Executive VP and General Counsel, Greg Blatt, took his place.[20]

In July 2009, Match.com acquired People Media, which powered AOL Personals and operated BlackPeopleMeet.com and OurTime.com, from American Capital for $80 million.[21] The following year, Match.com acquired SinglesNet, another dating site.[22] In December 2010, Match.com’s CEO Greg Blatt was made CEO of parent company IAC.[20]

In 2012, Match.com bought OkCupid, and Sam Yagan, OkCupid’s co-founder and CEO, became CEO of Match Group.[23] That same year, Match.com announced Stir, an events service that was to offer local events each month for Match.com members to attend.[24]

In April 2014, Match.com launched an updated mobile app with a feature called “Stream” which used location to match people based upon photographs, using similar algorithms as the mobile dating app Tinder.[25] The platform’s membership auto-billing method has been criticized by customers for the lack of transparency.[26]

In 2017, Yagan was replaced by Mandy Ginsberg as the CEO of Match.com’s parent company, Match Group.[27]

A woman claiming she was raped by another person she met on Match.com sued the site in 2011.[28] The woman and her lawyer wanted Match.com to start doing background checks on their users in order to prevent registered sex offenders from using the site. Match.com has responded that it would create many problems trying to get background information from all their users.[29] Days after the lawsuit was filed, Match.com announced that the site would begin screening new members.[30]

From 2011 to 2014, a man described by British police as a “sexual predator” contacted thousands of women through the website. He raped five of them. In March 2016 Derby Crown Court heard that four of the victims complained about the man to Match.com; one of the women was told that administrators could not do anything because he had not sent abusive messages through the site.[31][32]

IAC is an American holding company that owns brands across 100 countries, mostly in media and Internet.[2] The company is headquartered in New York City[3] and incorporated in Delaware.[4] Joey Levin, who previously led the company’s search & applications segment,[5] has served as Chief Executive Officer since June 2015.[6]

IAC’s largest shareholder, Liberty Media, exited the company in 2010, following a protracted dispute over the 2008 spinoffs.[54][55] Liberty traded its IAC stock for $220 million in cash, plus ownership of Evite and Gifts.com.[54] On the same day, Diller stepped down as CEO, though he remained as chairman and Match.com CEO Greg Blatt was appointed to succeed him.[54] That same year, IAC acquired dating site Singlesnet[56] and fitness site DailyBurn.[57]

In January 2013, IAC acquired online tutoring firm Tutor.com.[58] On August 3, 2013, IAC sold Newsweek to the International Business Times on undisclosed terms.[59] On December 22, 2013, IAC fired their Director of Corporate Communications, Justine Sacco after an AIDS joke she posted to Twitter went viral,[60] being re-tweeted and scorned around the world.[61] The incident became a byword for the need for people to be cautious about what they post on social media.[62]

In 2014, IAC acquired ASKfm for an undisclosed sum.[63]

November 2015, IAC and Match Group announced the closing of Match Group’s previously announced initial public offering.[64]

In May 2017, HomeAdvisor combined with Angie’s List, forming the new publicly traded company ANGI Homeservices Inc. The company made its stock market debut in October 2017. In October 2018, the ANGI made its first acquisition of on-demand platform Handy.[65]

In July 2019, IAC made its largest investment ever in the world’s largest peer-to-peer car sharing marketplace, Turo. Later that year, IAC acquired Care.com.[66] In December 2019, IAC and Match Group entered into an agreement providing for the full separation of Match Group from the remaining businesses of IAC.[67]

In January 2020, IAC withdrew its financial backing for CollegeHumor and its sister websites and sold the websites to Chief Creative Officer Sam Reich. As a result of the restructuring, more than 100 employees of CollegeHumor were laid off.[68] In February, IAC completed its $500 million acquisition of Care.com.[69]

The Clinton Family own an interest in this operation. Anytime you are trying to date on Match.Com think about Chelsea Clinton and her Friend Ghislaine Maxwell ready your emails and texts on the Match.com servers.

The people that work in the lower staff ranks at Match are generally high-strung leftists woke rights activists who are not old enough to have fully developed brains. They party in clusters in sports bar and loud music club scenes and reinforce a party culture. They are mostly female and embrace “influencers”, “Instagram postings” and casual dating. They have a higher tatoo volume than the average corporation.

In July 2020, IAC and Match Group announced the successful completion of the separation of Match Group from the remaining businesses of IAC. As a result of the separation, Match Group’s dual class voting structure was eliminated and the interest in Match Group formerly held by IAC is now held directly by IAC’s shareholders. As of the separation, “new” IAC trades under the symbol “IAC” and “new” Match Group under the symbol “MTCH.” [70]

In August 2020, IAC announced[71] it had invested a 12% stake in MGM Resorts International.

Match Group, Inc. is an American internet and technology company headquartered in Dallas, Texas.[2] It owns and operates the largest global portfolio of popular online dating services including Tinder, Match.com, Meetic, OkCupid, Hinge, PlentyOfFish, Ship, and OurTime totalling over 45 global dating companies.[3] The company was owned by parent company IAC and in 2019, the company had 9.283 million subscribers, of which 4.554 million were in North America.[1] In July 2020, Match Group became a separate, public company.

Match.Com and Attack service: Gawker Media/Gizmodo Media trade Staffer Ian Fette back and forth to share mass computerized political attack and political defamation tools developed at both outfits.
In February 2009, IAC incorporated Match Group as a conglomerate of Match.com and other dating sites it owned.[1][4] In July 2009, Match Group’s Match.com acquired People Media from American Capital for $80 million in cash. People Media operated dating sites BlackPeopleMeet.com and OurTime, which became part of Match Group’s portfolio, and powered AOL Personals.[5]

In February 2010, Match.com acquired dating site Singlesnet.[6] In February 2011, Match Group acquired OkCupid for $50 million. OkCupid was the first free, advertising-based product added to the Match Group portfolio.[7]

In 2012, online dating application Tinder was founded within Hatch Labs, a startup incubator run by parent company IAC.[8] The application allowed users to anonymously swipe to like or dislike other profiles based on their photos, common interests and a small bio.[9] On November 19, 2015, the company became a public company via an initial public offering.[10]

In 2017, Match Group launched Tinder Gold, which established Tinder as the highest grossing non-gaming app globally.[8] In the summer of 2017, the company offered to acquire Bumble for $450 million.[11]

In January 2018, Mandy Ginsberg, formerly the CEO of Match North America, replaced Greg Blatt as CEO of the company.[12]

In June 2018, Match Group acquired 51% ownership in dating app Hinge.[13] The acquisition was intended to help diversify Match’s portfolio and appeal to a wider array of singles. In February 2019, Match Group fully bought out the company.[14][15]

In July 2018, Match Group launched a Safety Advisory Council comprising a group of experts focused on preventing sexual assault across its portfolio of products. The council included #MeToo movement founder Tarana Burke and worked with organizations like the Rape, Abuse & Incest National Network (RAINN) and the National Sexual Violence Resource Center.[16]

In August 2018, Tinder co-founder Sean Rad filed a $2 billion lawsuit against Match Group, claiming that Match Group and its parent company IAC purposely undervalued Tinder to avoid paying out stock options to the company’s original team.[17] Rad and his co-plaintiffs also accused the former Tinder CEO, Greg Blatt, of sexual harassment.[18] The company said that the allegations are “meritless”.[19] In October 2019, Blatt filed a defamation lawsuit against Rad and Tinder founding member Rosette Pambakian seeking at least $50 million in damages.[20][21]

In January 2019, Match Group partnered with media brand Betches to launch a dating app, called Ship, that allowed users to help their friends pick out potential dates.[22]

In August 2019, the company acquired Harmonica, an Egyptian online dating service.[23][24][25][26]

In January 2020, Match Group announced an investment and partnership with safety platform Noonlight. The partnership incorporated new safety tools in Match Group’s products, including emergency assistance, location tracking and photo verification.

In January 2020, Mandy Ginsberg stepped down as chief executive officer due to personal reasons.[27][28][29] Shar Dubey, then President of Match Group, became the CEO of the company effective March 1, 2020.[30][31]

In March 2020, Match Group became the first tech company to support the Earn It Act of 2020, a bipartisan bill to combat online child sexual exploitation.[32]

In July 2020, the company completed the separation from IAC. The separation was the largest ever for IAC, as Match Group then had a market capitalization of $30 billion.[33] After the separation, four new members joins Match Group’s board of directors: Stephen Baily, Melissa Brenner, Ryan Reynolds and Wendi Murdoch[34][35][36]

In August 2020, amidst the Covid-19 pandemic, Match Group reported growing profit and revenue and surpassed 10 million subscribers across its portfolio.[37]

In September 2020, Match Group joined others companies like Spotify and Epic Games to form the Coalition for App Fairness. The purpose is to combat Apple over its app store policies.[38][39]

In February 2021, Match Group announced that it would be acquiring Seoul, Korea-based social network company Hyperconnect for $1.73 billion in both cash and stock.[40] This deal is reportedly Match Group’s largest acquisition to date.

Also in February 2021, Match Group took legal action against dating app Muzmatch, the online Muslim dating app, calling the app a “Tinder Clone”. [41]

In 2019, the company was sued by the U.S. Federal Trade Commission (FTC) for allegations of unfair and deceptive trade practices. According to the FTC’s civil complaint, the company used fake love interest ads to encourage free users to pay for premium subscription services on Match.com. Accounts that were flagged as suspicious or potentially fraudulent by the site were prevented from messaging paid subscribers but were allowed to continue messaging free users who were tricked into believing that the suspicious accounts were real users encouraging them to subscribe and connect with them. The company denied the allegations. The FTC further alleged that the company offered false promises of guarantees, failed to provide support to customers who unsuccessfully disputed charges, and made it overly difficult for users to cancel their subscriptions, which Match Group disputed as cherry-picked and misrepresenting internal emails.[42][43][44][45][46] In September 2020, it was reported that the Department of Justice had closed its investigation into the FTC complaint.[47]



Black People Meet
Disons Demain
Hawaya (formerly Harmonica)
Love Scout 24
Plenty of Fish

And any other facades that these digital manipulators pop up with.

You see, in reality, most internet dating sites are owned by the same crooked corporations and they should be PUT OUT OF BUSINESS. If not the exact same corporation, they are the same kinds of heartless corporate human manipulation machines. Do yourself and your friends a favor and file complaints about each of these dating sites at: http://www.ftc.gov/complaint

Here Is A Sampling Of What The World Says About Match.Com On The Internet

* When you post anything on Match.com, you activate over 100 companies around the globe that scan every single dating and social media site, every few minutes, for new profiles and harvest the posted photos. Your photos are instantly compared, via AI software and massive computer arrays, with every social media site (ie: Facebook, Linkedin, Google, Instagram, etc.) to reveal who you actually are and produce a digital dossier on you (that will be available on you forever). If you are in a lawsuit, or politics, that data will be used to harm and defame you. If you have assets, that data will be used to hack your bank accounts and medical records and blackmail you. By now, any educated person should already know this, as it is widely covered in the news. Anyone who pooh-poohs this is most likely a hacker using a fake dating or Linkedin profile. There are millions of fake dating and Facebook profiles operated by Russian and Chinese spies and data harvesters…

* Match.com’s culture has made online dating a bidding war for sex, free dinners and money. As a guy you will find that in New York City and the San Francisco Bay Area, all of the guys you are competing against make over $160,000.00 per year, have excellent condo’s, BMW’s and take girls to $100.+/per ticket shows. If you can’t compete with that then your entire online dating experience will consist of feeding one girl after another free food and then never hearing from them again. As a woman you will find that all of the women in those areas have big fake boobs, cow fat injected lips, visible abs, insectoid eyebrows, and deep dark spray tans and they WILL do anal, if you can’t compete with that then you are stuck dating used car salesmen who might take you to Denny’s. Big tech guys will dump you four weeks later because you are “old news” and they can get 100,000 other Instagram hookers and nasty girls on match.com any time they want to…

* Before your first blind meeting, exchange text numbers on your burner phones or you will likely not find each other, if you have never seen each other in 3D before, because many profiles on Match.com are fake shills who will never show up in-person…

* Famous dating site owners, like IAC, Match.com, okcupid, zoosk, farmers only, plenty of fish, etc., use your private information ILLICITLY by rigging the system exclusively for themselves and their crony insiders to gather information on you. Stay informed about corporate dating site face harvesting, privacy abuse, reading of users messages, selling users to political parties and other misdeeds. Your face on a dating site can lead to the hacking of your bank account in 10 minutes if an experienced hacker is using face comparison AI software across social networks. Protect yourself by reading http://lifebooks.net/Web_Safety_Part_One.html ..

* A “Date” means that both parties are agreeing to meet based on the belief that both parties believe there is a chance of sex occurring. A “Hook-Up” means that both parties are agreeing to meet just for sex. Match.com exploits both of these concepts to sucker users into extending their subscriptions…

* If you have to describe your status as “It’s Complicated”, then you are a SLUT! Quantum Physics is complicated. Whether or not you have had sex with someone that you may have sex with again is not complicated. Either be single or say you are “Dating Around”. Don’t insult people’s intelligence by using the “It’s Complicated” excuse. People on Match.Com who say “it’s complicated are just dating a different person every night…

* Over 50 groups scan every photo on a dating site to look for political exploitation opportunities. Do not think that your dating profiles are exempt from scanning by political party operatives. Many of the big dating sites sell your data to the DNC and/or RNC…

* Russian, Nigerian and Chinese “Fake Profile Farms” have placed millions of fake profiles on all of the dating sites. Some dating sites are MOSTLY fake profiles. When you write to them, expert texting scammers, or AI bots, respond to you in an extremely convincing manner. Never believe someone is real from a dating site until you have met them in person in front of a local coffee shop. Match.Com covertly supports these fake profiles because it is free content. Match officials say otherwise but they are lying.

* “influencers” on the internet are: FAKE, LIARS WHO BOUGHT THEIR “LIKES” FROM CHINESE CLICK-FARMS, NARCISSISTS, FAKES, FAKES and FAKES! Match.com loves “influencers” because their BS creates free content…

* Have you noticed how most of the sign-up questions on sites like Match.com and OKCupid are questions about your political beliefs? Political party operatives are also getting a copy of those answers on some of these sites…

* Never communicate more than a few generic sentences (to arrange to meet) over an internal messaging system on any Match.com, or related, dating site. Everything you type on a Match dating site message system is often read by bored staff at the dating site, harvested by government analysts, scanned by marketing companies for phone numbers and email addresses, read by hackers and archived for years for future legal and political analysis. Intention analysis of your words is sold to political parties and other third parties. Get your communication OFF of the dating site ASAP. Never say too much about yourself or place very much private data on a dating site. The messaging system inside a dating App is one of the most dangerous threats to your privacy…

* A unique way for guys to get hot girls paid for by the Russian spy agency the KGB (Also known as the FSB). KGB Girlfriends can be really fun. As a guy, you create a pretend hot technology start-up company in Silicon Valley, New York City or Los Angeles. You buy a lot of buzz in tech PR in those areas and make it look like you have some hot secret technology that can change global media or internet or energy. Then you attend tons of tech parties that are advance promoted. The Russian and Chinese secret service will target you to try to steal your technology. They will have impossibly hot girls approach you to date you. They are called “Honey Traps”. The Russians and Chinese have placed thousands of them on Match.com, Plenty of Fish, OK Cupid and all of the big corporate dating sites. These planted women will approach you. You have sex with them and you secretly know that the spy agencies are paying for your sex. You just never tell them any ACTUAL secrets. You plan out a careful set of disinformation that leaves out some key tech points and tell them your fake secrets. Russia has thousands of these “Red Sparrows” planted around the USA in major cities. If your technology is hot enough, they will charter a plane from the Ukraine and fly a few dozen of these tech hookers in to target you. Russian hookers are VICTORIA SECRET HOT! They are trained in sex universities. The downside: If you let on that you know they are spies they could kill you with poison or simulated heart attacks or heroin overdoses. So: The KGB will pay for all of your sex but you have to game your pretext quite well or you could get killed like Tony Hseigh or Forrest Hayes or Ravi Kumar or… But these Chinese and Russian spy girls are soooooo hot!..

* If you have been on many Match.com related dating sites you have had a huge number of first date/meetups but they ended in failure since you are not in a relationship with those people. You may have dated people longer but those relationships did not work out either or you would not be on a dating site. The thinking that “getting to know someone” has any value in dating has already been proven wrong by your own past experiences. ‘Waiting in dating leads to undating’. Most marriages end in divorce and that proves that you can never “get to know someone”. All people dating are always looking for an imperfection so they can rationalize the: “Delete”…”Next”…” option to switch to the next person. The so-called “perfect” match can never be found. The Grass-Is-Always-Greener-On-The-Other-Side-Of-The-Fence never ends in online dating. You CAN get a rapid paced pseudo-feeling of “social action” by going through many people but that is shallow. The only thing that works is to take the next person, that is not too ugly, and partner with them and craft a relationship TOGETHER…

* People on Match.com dating sites with photos that look like they are fashion models or with pictures that have advertising type poses and make-up could be sociopath narcissists. If they look like they should have people lined up to date them, they probably do. There are a certain number of angry divorcee-type people, who hate the other gender because of a bad divorce and want to punish all those from that other gender by being mean to them online. Watch out for internet hotties who just have a “LOOK AT ME” insecurity complex and have no intention of ever meeting anybody. See: https://videosift.com/video/Narcissists-and-SOCIAL-MEDIA

* Everyone on an internet dating site is presumed to be open to having sex, otherwise they would be on Facebook or Meet-Up if they were just looking for a social herd interaction sorority type hang out. Don’t be offended if sex comes up earlier in the conversation that you expect. That is the nature of the internet. You both need to text each other that you BOTH agree to “a monogamous, committed relationship”, in writing, or you need to expect the other person to be sleeping with the other members on the dating site on the nights that they are not with you.

* Before dating, make sure your doctor has tested you for: 1.) HIV (https://www.mylabbox.com/how-much-does-an-hiv-test-cost/); 2.) Hepatitis C; 3.) Herpes Simplex II; 4.) Syphilis (https://www.mylabbox.com/test-for-syphilis/); 5.) Chlamydia (https://www.mylabbox.com/chlamydia-101-the-facts/); 6.) Gonorrhea (https://www.mylabbox.com/clap-gonorrhea-symptoms-in-women/); 7.) Trichomoniasis; 8.) HPV; 9.) Mycoplasma; 10.) Ureaplasma; 11.) COVID; 12.) Anal sore; 13.) Vaginal Fungus. Consider getting a prescription for the AIDS prevention drug: “Prep” and try using “topical microbicide STD gel” to kill STD’s, especially on Match.com because Match.com users have the highest rate of STD’s…

* Facial symmetry and social similarity herd programming are the two biggest factors you are up against in on-line dating. Try to get past these biological subliminal conditioning factors and date outside your “comfort zone”. Don’t date people that look exactly like your social cliques faces. Try not to date people that all look like they go to the same frat house or sorority. Match.com software favors frat house and sorority looking people…

* Match.com dating has put men in the position of being used for free dinners while each woman has many other men buying them dinners the same week. Internet dating has made men hyper-sensitive about being “used”. The first few dates from an internet connection must be “dutch” these days, to avoid conflict…

* Men who date via Match.Com sites will eventually always get sex, so they expect it more than usual because the internet changes the numbers game…

* Billionaires from Google, Facebook, Netflix and Linkedin are hard to date because most of them have a number of sex workers (hookers and rent-boys) they retain weekly plus they have an account with every dating site and a “social connections” manager. The nights that they are not with you, they are with a person from another dating site and they get bored of each person after a couple of weeks and dump them in their constant search for new distractions. If you can get pregnant by one of them, though, you can get a phenomenal payday…

* People who have many photos but only photos of their face are usually fat on Match.com. Beware…

* On Match.Com, move fast on new members that just joined a dating site because people quit, or get scooped up, as soon as they appear as “new meat” on a dating site for the first time, most internet daters move fast in order to avoid missing out. If you don’t get to date a new member within a week or so, they will have been taken by someone else or they will have found out how tough dating sites are and quit. You have about 11 days to make your case to a new member or they will be gone. If you are a guy, you are competing against thousands of other guys all trying to sound richer, more fun, more together, more employed, sexier and more interesting than you. The early bird gets the worm and it is truly a numbers game online. This is the harsh, but true reality of it…even more so in a post-Pandemic world…

* On Match.Com, the question: “HOW ARE YOU STILL SINGLE?” or “What’s the catch?” or “You must have a secret wife”? implies that someone may not be “perfect”. In fact: Nobody is perfect. Every Silicon Valley CEO beat his wife, cheated on taxes and stocks, hires hookers and abused their workers. Their divorce court filings prove it. Even though they had chiseled symmetrical facial features and drove an over-priced race car, they almost all turned out to be dirty when you scratched the surface. Outsiders are never allowed into their club, so, hopefully, you won’t get programmed to do those things. People’s faults are usually the same as their abilities. Some people love them, some don’t. Employers hire them for those peculiarities. You’d have to hang out with the live version (not the internet facade) to see. There is no living human that does not have things about them you will not like. Most people are programmed to have an extreme reaction if they hear a word like “drinking”, “partying”, “organized”, etc. if their last break-up was with a person who had a problem with one of those things. Oxytocin, and other brain chemicals, program non-rational trigger-reaction thinking into people over baggage from their bad break-ups. The smarter you are, the easier it is for you to venture outside the social bubble you were conditioned to, previously, operate in. Doing things with another human takes work. ANYBODY can get along with anybody if they just try. The internet makes people reject others, for no valid reason, just because it is a push-button machine operation. Humans are organic. The internet is a heartless machine. You should only decide about people from in-person meetups. First time meetings over the internet cannot possibly ever work. You have to meet people, in-person, in the real world. If a person online is not willing to meet in-person, then there is no legitimate reason for them to have a profile up unless they are a Russian troll or free-meal hunter…

The Spies And Hired Character Assassins Of Match.com

Over 1000 profiles on Match.com, and it’s related sites, are spies that are there entirely to attack others! Since 2008, one San Francisco business man has recorded over 20 of these spy girls recording him and reporting back to his competitor. He has placed a private investigation firm on long-term contract to hunt down and prosecute these spider-women who sell entrapment services and operate under cover of Match.com’s guise.

In another case, a network of activists, aided by a British former spy, mounted a campaign during the Trump administration, using Match.com, to discredit perceived enemies of President Donald Trump inside the government, according to documents and people involved in the operations.

The campaign included a planned sting operation against Trump’s national security adviser at the time, H.R. McMaster, and secret surveillance operations against FBI employees, aimed at exposing anti-Trump sentiment in the bureau’s ranks.

The operations against the FBI, run by the conservative group Project Veritas, were conducted from a large home in the Georgetown section of Washington that rented for $10,000 per month. Female undercover operatives arranged Match.com dates with the FBI employees with the aim of secretly recording them making disparaging comments about Trump.

The campaign shows the obsession that some of Trump’s allies had about a shadowy “deep state” trying to blunt his agenda — and the lengths that some were willing to go to try to purge the government of those believed to be disloyal to the president.

Central to the effort, according to interviews, was Richard Seddon, a former undercover British spy who was recruited in 2016 by security contractor Erik Prince to train Project Veritas operatives to infiltrate trade unions, Democratic congressional campaigns and other targets. He ran field operations for Project Veritas until mid-2018.

Last year, The New York Times reported that Seddon ran an expansive effort to gain access to the unions and campaigns and led a hiring effort that nearly tripled the number of the group’s operatives, according to interviews and deposition testimony. He trained operatives at the Prince family ranch in Wyoming.

The efforts to target American officials show how a campaign once focused on exposing outside organizations slowly morphed into an operation to ferret out Trump’s perceived enemies in the government’s ranks.

Whether any of Trump’s White House advisers had direct knowledge of the campaign is unclear, but one of the participants in the operation against McMaster, Barbara Ledeen, said she was brought on by someone “with access to McMaster’s calendar.”

At the time, Ledeen was a staff member of the Senate Judiciary Committee, then led by Sen. Chuck Grassley, R-Iowa.

This account is drawn from more than a dozen interviews with former Project Veritas employees and others familiar with the campaign, along with current and former government officials and internal Project Veritas documents.

The scheme against McMaster, revealed in interviews and documents, was one of the most brazen operations of the campaign. It involved a plan to hire a woman armed with a hidden camera to capture McMaster making inappropriate remarks that his opponents could use as leverage to get him ousted as national security adviser.

Although several Project Veritas operatives were involved in the plot, it is unclear whether the group directed it. The group, which is a nonprofit, has a history of conducting sting operations on news organizations, Democratic politicians and advocacy groups.

The operation was ultimately abandoned in March 2018 when the conspirators ended up getting what they wanted, albeit by different means. The embattled McMaster resigned on March 22, a move that avoided a firing by the president who had soured on the three-star general.

Project Veritas did not respond to specific questions about the operations. On Thursday, James O’Keefe, the head of the group, said this article was “a smear piece.”

Neither Seddon nor Prince responded to requests for comment. McMaster declined to comment.

When confronted with details about her involvement in the McMaster operation, Ledeen insisted that she was merely a messenger. “I am not part of a plot,” she said.

Scheme Against McMaster

The operation against McMaster was hatched not long after an article appeared in BuzzFeed News about a private dinner in 2017. Exactly what happened during the dinner is in dispute, but the article said that McMaster had disparaged Trump by calling him an “idiot” with the intelligence of a “kindergartner.”

That dinner, at an upscale restaurant in downtown Washington, was attended by McMaster and Safra Catz, the chief executive of Oracle, as well as two of their aides. Not long after, Catz called Donald McGahn, then the White House counsel, to complain about McMaster’s behavior, according to two people familiar with the call.

White House officials investigated and could not substantiate her claims, people familiar with their inquiry said. Catz declined to comment, and there is no evidence that she played any role in the plot against McMaster.

Soon after the BuzzFeed article, however, the scheme developed to try to entrap McMaster: Recruit a Match.com woman to stake out the same restaurant, Tosca, with a hidden camera. According to the plan, whenever McMaster returned by himself, the woman would strike up a conversation with him and, over drinks, try to get him to make comments that could be used to either force him to resign or get him fired.

Who initially ordered the operation is unclear. In an interview, Ledeen said “someone she trusted” contacted her to help with the plan. She said she could not remember who.

“Somebody who had his calendar conveyed to me that he goes to Tosca all the time,” she said of McMaster.

According to Ledeen, she passed the message to a man she believed to be a Project Veritas operative during a meeting at the University Club in Washington. Ledeen said she believed the man provided her with a fake name.

By then, McMaster already had a raft of enemies among Trump loyalists, who viewed him as a “globalist” creature of the so-called deep state who was committed to policies they vehemently opposed, like remaining committed to a nuclear deal with Iran and keeping American troops in Afghanistan.

The president often stoked the fire, railing against national security officials at the CIA, FBI, State Department and elsewhere who he was convinced were trying to undermine him. These “unelected deep-state operatives who defy the voters to push their own secret agendas,” he said in 2018, “are truly a threat to democracy itself.”

Seddon recruited Tarah Price, who at one point was a Project Veritas operative, and offered to pay her thousands of dollars to participate in the operation, according to interviews and an email written by a former boyfriend of Price and sent to Project Veritas Exposed, a group that tries to identify the group’s undercover operatives.

The May 2018 email, a copy of which was obtained by The Times, said that Price was “going to get paid $10,000 to go undercover and set up some big-name political figure in Washington.” It was unclear who was funding the operation. Price’s former boyfriend was apparently unaware of the target of the operation, or that McMaster had been forced to step down in March.

Two people identified the political figure as McMaster. Price did not respond to requests for comment.

Ledeen was a longtime staff member for the Judiciary Committee who had been part of past operations in support of Trump. In 2016, she was involved in a secret effort with Michael Flynn — who went on to become Trump’s first national security adviser — to hunt down thousands of emails that had been deleted from Hillary Clinton’s private email server.

Barbara Ledeen is married to Michael Ledeen, who wrote the 2016 book “The Field of Fight” with Flynn. She said she retired from the Senate earlier this year.

After Flynn resigned under pressure as national security adviser, Trump gave the job to McMaster — inciting the ire of loyalists to Flynn.

Ledeen posted numerous negative articles about McMaster on her Facebook page. After The Times published its article about Prince’s work with Project Veritas, she wrote on Facebook, “We owe a lot to Erik Prince.”

A Former Spy’s Role

Seddon first came to know Prince in the years after the Sept. 11, 2001, attacks, when he was stationed at the British Embassy in Washington and Prince’s company, Blackwater, was winning large American government contracts for work in Afghanistan and Iraq. Former colleagues of Seddon said he nurtured a love of the American West, and of the country’s gun culture.

He is married to a longtime State Department officer, Alice Seddon, who retired last year.

After Seddon joined Project Veritas, he set out to professionalize what was once a small operation with a limited budget. He hired former soldiers, a former FBI agent and a British former commando.

Documents obtained by The Times show the extent that Seddon built espionage tactics into training for the group’s operatives — teaching them to use deception to secure information from potential targets.

The early training for the operations took place at the Prince family ranch near Cody, Wyoming, and Seddon and his colleagues conducted hiring interviews inside an airport hangar at the Cody airport known locally as the Prince hangar, according to interviews and documents. Prince is the brother of Betsy DeVos, who served as Trump’s education secretary.

During the interview process, candidates fielded questions meant to figure out their political leanings, including which famous people they might invite to a dinner party and which publications they get their news from.

After finishing the exercises, the operatives were told to burn the training materials, according to a former Project Veritas employee.

Project Veritas also experienced a windfall during the Trump administration, with millions in donations from private donors and conservative foundations. In 2019, the group received a $1 million contribution made through the law firm Alston & Bird, according to a financial document obtained by The Times. The firm has declined to say on whose behalf the contribution was made.

That same year, Project Veritas also received more than $4 million through DonorsTrust, a nonprofit used by conservative groups and individuals.

Targeting FBI Employees

Around the time McMaster resigned, Seddon pushed for Project Veritas to establish a base of operations in Washington and found a six-bedroom estate near the Georgetown University campus, according to former Project Veritas employees. The house had a view of the Potomac River and was steps from the dark, narrow staircase made famous by the film “The Exorcist.”

The group used a shell company to rent it, according to Project Veritas documents and interviews.

The plan was simple: Use undercover operatives to entrap FBI employees and other government officials who could be publicly exposed as opposing Trump.

The group has previously assigned Match.com female operatives to secretly record and discredit male targets — sometimes making first contact with them on dating apps. In 2017, a Project Veritas operative also approached a Washington Post reporter with a false claim that a Senate candidate had impregnated her.

During the Trump administration, the FBI became an attractive target for the president’s allies. In late 2017, news reports revealed that a senior FBI counterintelligence agent and a lawyer at the bureau who were working on the Russia investigation had exchanged text messages disparaging Trump.

The president’s supporters and allies in Congress said the texts were proof of bias at the FBI and that the sprawling Russia inquiry was just a plot by the “deep state” to derail the Trump presidency.

Project Veritas operatives created fake profiles on Match.com dating apps to lure the FBI employees, according to two former Project Veritas employees and a screenshot of one of the accounts. They arranged to meet and arrived with a hidden camera and microphone.

Women living at the house had Project Veritas code names, including “Brazil” and “Tiger,” according to three former Project Veritas employees with knowledge of the operations. People living at the house were told not to receive mail using their real names. If they took an Uber home, the driver had to stop before they reached the house to ensure nobody saw where they actually lived, one of the former Project Veritas employees said.

One woman living at the house, Anna Khait, was part of several operations against various targets, including a State Department employee. Project Veritas released a video of the operation in 2018, saying it was the first installment in “an undercover video investigation series unmasking the deep state.”

In the video, O’Keefe said Project Veritas had been investigating the deep state for more than a year. He did not mention efforts to target the FBI.

O’Keefe has long defended his group’s methods. In his 2018 book, “American Pravda,” O’Keefe wrote that a “key distinction between the Project Veritas journalist and establishment reporters” is that “while we use deception to gain access, we never deceive our audience.”

The Match.com spy scam was created by the Obama White House and used massively in the post 2008 time period but Erik Prince copied the process for the Trumps.

The Nightmare That Is The Match.Com Sick Dating Site Churn Mill

By The Stanford Center For Journalism Research Group

Nobody should ever use Match.com unless they want all of their texts and emails read by the Bumble college-age gossip-monger staff. If you want everything you do on Match.com sent to political party bosses to try to manipulate your vote, Google data harvesters and leaked via hackers then you will love Match.com. If you think staffers who barely started having periods have enough intellect and emotional maturity to control your dating life, then you must certainly use Match.com. Match.com will suck your credit card, Paypal account and bank account dry but your genitals will stay just as dry because most of the profiles on Match.com are fake. Match.com face pictures are often generated with the NVIDIA GANS fake face software that creates idyllic faces of people that do not exist. Match.com management is in it for cash-at-any-cost and you are just a cow in their digital abattoir. You are meat for them to process through their emotional connection fakery machine. Match.com exists to separate you from your money with a promise of connection that can’t possibly happen over a computing machine.

Be sure and share these notes with your friends. It could save their emotional life!

Match.com’s founder fakes up controversy to create web coverage of herself. Her past employers at her other dating company call her a “scammer” and a “mercenary” harvester of user dating data.

The actual original founders of one huge dating site went online to reveal that all corporate online dating sites, are miserable failures and scams. That revelation has been proven in court!

Most people that sign up for online dating with Match.com cancel it within a few weeks because of the technology disconnect, the fake profiles, the spying, the face harvesting and the huge abuse of human emotional experience that they find on Match.com.

You think Match.com is “free”? You could not be more wrong. You pay the price with your soul, your privacy, your ideology and your human rights! The current owners of the Match.com servers are the most sinister bastards in corporate data harvesting.

Match.com acquires massive numbers of fake profiles from nefarious sources and posts them in order to buffer up it’s lack of real, credible, humans on the site.

Match.com exists ENTIRELY to make money at the expense of your emotions. It is operated by computers, naive college interns and greed-driven zealots who care ENTIRELY ZERO about you! Match.com is a bigger sucker-play than The Lottery or back alley crap shoots.

Match.com computers and bored staffers read all of your emails and text messages on Match.com. For example: If you say you “…like Trump” you are flagged. If you say you “…like Obama”, you get extra cute matches. Your politics should not determine if you get laid or not! Nobody should be reading your communications, created when you are putting your heart on the line!

Russian and Chinese state spy agencies scan every photo on Match.com every few minutes and use those photos to hunt down your Facebook, Linkedin, YouTube and other sites. They have computers build a dossier on you, starting with your Match.com photos, so you can be black-mailed or influenced in the future. You can even back-track photos of users through Yandex and hunt them down to their home address via Match.com…ugh!

Match.com has an army of shills who are live people that pretend to be looking-for-love on Match.com. In actuality, these fakes get fake to string you along to get you to keep renewing your subscription.

YOU should demand that Congress, the FTC, The FCC and other agencies investigate and prosecute Match.com now!
















Be informed about the hell of Match.com’s online dating by reading this huge compendium of actual user experiences. Every online dater from Match.com seems to be looking for: quid pro quo marriage, sex, free food, money, social revenge, distraction, entertainment, narcissistic validation, arm-candy, friends, a baby-daddies or related goals. See how others reach these targets, for good or evil, by reading these notes from Match.com users around the nation:

— “FireEye, one of the largest cybersecurity companies in the world has been hacked, likely by a government or a big hacking club, and the ultimate arsenal of all of the CIA-class hacking tools it uses for corporations , such as Match.com, has been stolen. This means that any time you touch Match.com, you could be opening your computer or phone to releasing every contact, photo or ANYTHING on your computer or phone to every weirdo on Earth. This means that literally anybody can remotely turn on your microphone or camera and watch/listen to you have sex, take a shower or discuss your biggest secrets… this is widely disclosed in the main-stream news. If you don’t already know this fact, you may be too dumb to be online dating…”

— “There are over 100 companies around the globe that scan every single dating and social media site, especially Match.com, every few minutes, for new profiles and harvest the posted photos. Your photos are instantly compared, via AI software and massive computer arrays, with every social media site (ie: Facebook, Linkedin, Google, Instagram, etc.) to reveal who you actually are and produce a digital dossier on you (that will be available on you forever). If you are in a lawsuit, or politics, that data will be used to harm and defame you. If you have assets, that data will be used to hack your bank accounts and medical records and blackmail you. By now, any educated person should already know this, as it is widely covered in the news. Anyone who pooh-poohs this is most likely a hacker using a fake dating or Linkedin profile. There are millions of fake dating and Facebook profiles operated by Russian and Chinese spies and data harvesters.”

– “Many fakers on Match.com use exaggerated fake gestures and facial expressions. These online facial tricks are used by internet dating ‘influencers’ to catch the public eye but they are totally fake and contrived. Dating “Influencer” culture skewered in Gia Coppola film at Venice …

– “In order to get more money (ie: “clicks”) Dixie D’Amelio, and every other kid web narcissist, posts pictures and video clips of themselves engaing in 1950’s Madison Avenue-type facial extremes and gestures. In “Exaggerating Facial Expressions: A Way to Intensify Emotion or a Way to the Uncanny Valley?” Meeri Mäkäräinen, Jari Kätsyri & Tapio Takala ( via Cognitive Computation volume 6, pages708–721(2014) show how media deployment of fake expressions can ruin society, kids in particular. They said “…Exaggeration of facial expressions is used in animation and robotics to intensify emotions. However, modifying a human-like face can lead to an unsettling outcome. This phenomenon is known as uncanny valley. The goal of this study was to identify the realism level and magnitude of facial expression that produce the maximum amount of emotional intensity and the minimum amount of perceived strangeness. We studied the perceived intensity of emotion and perceived strangeness of faces with varying levels of realism (from schematic to photorealistic) and magnitude of facial expressions (from neutral to extremely exaggerated). We found that less realistic faces required more exaggeration to reach the emotional intensity of a real human face. While there is a range of emotional intensity that can be expressed by real human faces (from neutral to full intensity), we found that the same range of emotional intensity could be expressed by artificial faces when exaggeration was used. However, attempts to express emotional intensities outside this range using exaggeration led to strange-looking faces at all levels of realism.” Their study began to open the doors of “fake facing” which is creating divisiveness in society by created popular kids and distance unpopular kids without the desire or facial muscles to copy them.

A kid “Influencer” named Cadena is now dead too. His passing is the latest in a string of young social media star deaths, following 19-year-old Landon Clifford, star of YouTube’s “Cam & Fam,” who hanged himself in August after struggling with depression and drug addiction for years. Mommy vlogger Nicole Thea, 24, who was pregnant, died of a “massive heart attack” in July. Siya Kakkar, 16, a viral sensation with more than 2 million followers on TikTok, died by suicide in June.

So while cute little Dixie, and her peers, may not be Satan’s children, they are creating great harm in the world. Here is how:

In their study; “Felt, false, and miserable smiles” Paul Ekman & Wallace V. Friesen (Journal of Nonverbal Behavior volume 6, pages238–252(1982)” describe how theoretically based distinctions linked to measurable differences in appearance are described for three smiles: felt smiles (spontaneous expressions of positive emotion); false smiles (deliberate attempts to appear as if positive emotion is felt when it isn’t); and, miserable smiles (acknowledgments of feeling miserable but not intending to do much about it). Preliminary evidence supports some of the hypotheses about how these three kinds of smile differ.

The internet “influencers” all maintain deliberate attempts to appear as if positive emotion is felt when it isn’t. They must all appear happy and excited, all the time, in order to create clicks and draw other kids into their false reality. This is why so many of them end up committing suicide.

Does Dixie know that is driving herself and other kids to suicide? No, she is just a little girl. Do her parents and marketing managers know? They Should!

Instabrats are cute and adorable and live, apparently, perfect lives. Behind-the-scenes the Kardashians, The Paris Hilton’s, The Stevie Ryan’s are almost all insane, damaged, co-dependent fakers who are enabled by uncaring, greedy parents and marketing companies. They are selling you absolute bull-shit fairyland facades disguised as their normal lives.

Google and Youtube’s Larry Page, Sergy Brin, Eric Schmidt, Anne E. Wojcicki, Yasmin Green and the rest are hateful sick people who know how much their media damages kids but they do it anyway because private jets and sex parties are EXPENSIVE! They encourage this behavior for profit.

In college you watched the popular kids always clustered around each other Fake-Facing their conversations with nearly manic, over-interested, wide-eyed facial expressions and gesticulations as if they other person’s comment about Cindy’s new eyebrow pencil were as big a deal as the arrival of an army of magic unicorns. Nothing they said to each other was as interesting as they expressed with their faces. They had learned that “being popular” means that you have to look like you are having more fun than normal people and that your life is more exciting than that of others.

By minimizing the lives of others you lift yourself up in your eyes. You also drive every other kid crazy.

There are millions of expose’s about internet “Stars” who were later outed as fakes. Their expensive sports cars and piles of money were rented for the photo shoot. Their smiles, exaggerated facial expressions and web lives are FAKE, FAKE, FAKE!

Black Lives Matter riots have a large basis in poor little Dixie D’Ameli. Inner city people will never have a big cool life like Dixie, the internet tells them. The influencers are so happy and rich and have none of their problems…

So kids see all this facade and kill themselves. Inner City people see all this facade and burn down cities. Influencer’s tell kids and the disadvantaged: “Here is all this stuff you will never have”. The notorious Fyre Festival was an amazing example of all these fakers suckering all of these suckers to a facade that clearly exposed itself for what these people are!

It is Anne E. Wojcicki’s fault. It is the fault of Match.com, YouTube and Google pushing their woke, data-harvested crap on society.

More User Comments About Match.Com, OK Cupid And Their Dating Factory Cartel

This is the “advice” that Match.com markets to users and that Match.com users post on the web. Do you agree with these concepts of social control?:

“Be very careful on Match.com dating sites. I have read the newspaper articles and am being cautious. I have encountered a veritable army of Nigerian scammers, privacy data thieves, Russian spammers and spies on the dating site. On top of that there are tens of thousands of newspaper articles warning about this. Additionally, nothing that you engage in with a stranger you are considering for possible intimacy will be valid over a computer, phone or text device. It isn’t being paranoid if it is based on actual experience and vast documentation by the rest of America. 60 MINUTES just did a feature segment on how data thieves can get all your stuff with just your full name and a picture they can run through image-comparison software. They do it all day long.”

“ You just joined Match.com’s dating sites. You message some attractive ladies right near you. You get some responses. Alas, you don’t realize that those “hot ladies”, now messaging with you, are actually all a guy with a goatee, named Wu Lee, in the Philippines. While you see lots of talk about these dating services, “not allowing fake profiles”, they are, in fact, the ones who hire the “shill Farms” to supply them with the fake date experiences. They only use them for guys because women always get flooded with actual guys contacting them. Many of the pictures are from the ex-websites of dead Russian hookers. The first red flags:

– Your date is out “of the area for a few weeks”, or longer, on a trip or some big project so that a real person doesn’t actually have to show up.

– They have some other excuse to not meet you for a few weeks. The psychology is that no guy will wait that long and move on to the next candidate. Alas, the next candidate , and the next, and the next, is, more often than not, that same guy Wu Lee. If you are savvy enough to track them in your calender and follow-up a few days after they are supposed to “return to town”, they will tell you that they just happened to have met someone on their trip.

– They won’t talk on the phone. While talking to a person on a dating site is very comforting, the Shill Farms have escalation Teams that route phone call requests to sex phone operators, with your local accent, who do double duty as fake phone dates and fake sex call takers. Even if you talk on the phone, it still is not guaranteed that you don’t have a shill.

– The shill starts asking you very specific detailed personal data about yourself. In real world dating, nobody asks that kind of stuff before their first date. You look at each other, decide if you both look OK and off you go to the movies or dinner that Saturday. The reason the shills want detailed data on you is that the Shill Farm bosses make money from both providing fake profiles AND harvesting your private data for data harvesting banks.

– They try to keep you on the site for as long as possible. The Shill Farmer has a third way of making money off of you. It is called “Spoofing”. The more volumes of people the dating site can show for their subscriptions and advertisers, the more money they can make.

– They won’t meet. For most people, the purpose of a dating site is to meet someone you can hug, squeeze, kiss and go do things with. It should seem odd to you, if your potential date won’t meet in person ASAP. If they were real, you would think they would want to see how both of you are, in-person, before wasting time. Here are some key terms and types to watch out for: “Shill”- A person pretending to be someone else, or another gender, in order to suck you in to some scheme to get your money or your data; Shill Farm – A large building, apartment complex, warehouse or other building where large numbers of shills are base; “Shill Farmer” – The owner of the Shill Farm. Often Russian mobsters, Asian gangs or Nigerian cartels; “Dating Harvester” – Match.com, Plenty of Fish, OK Cupid and similar automated conglomerate-owned dating services that are in the business for far different reasons than you might think; “Trolling” – Working the pretext to try to get the victim/target guy sucked into the scheme. Using different scenarios and talking scripts to get the target to loosen their guard; “Cat Fishing” – Men pretending to be women; “Spoofing” – creating fake user volume numbers in order to help dating sites trick advertisers into paying more…”








“Nothing you do in email, text or phone will count, once you meet in-person. It will all go out the window (ie: as sad as it sounds, pre-communication is a waste-of-time in online dating, because people decide on attraction in the first few minutes of the live meeting). “

“On Match.com and OK Cupid, All of the men are looking for sex and all of the women are looking for free dinners”

“I remember when I first started using online dating apps around 2012/2013, before these companies decided to go completely full exploitation and profiteering mode on us. It was a completely different world. I always had like 10 different matches to have ongoing conversations with, and could score a date or two every week, very easily. Now it’s more difficult. Long story short, men need to boycott these online dating apps/companies. The bullshit that they’re doing is unacceptable. Their acceptance of bots, spam, scammers, exploitation of men, and expecting us to pay for the nonsense is disgusting. You don’t even want to leave notifications on because they no longer pertain to when you get a message. I was considering a lifetime purchase for Bumble, but learned that it’s the easiest way to get a shadowban. Absolutely inexcusable, unethical business practices like this need to be brought to light and highlighted for all to see. Oh, and this is also bad for women in the long run. These apps do nothing for women who actually do want relationships. These apps are designed to sexualize women to keep them coming back. We must all boycott these unethical businesses.”

“Do not send more than a few emails or talk on the phone more than 45 minutes without meeting in person. The human mind will always create a bigger-than-life image of who you think you are talking to and it will be impossible for the other person to live up to that. You will set yourself up for disappointment and your experience here will always be unproductive. The longer you wait, the more likely you are to be disappointed because the vision and the real-world don’t match.”

“The grass is greener mentality, it’s always in the background for a while it seems. It affects grounded and emotionally mature people at some point on their OLD journey, as the options can be overwhelming.

A lot of people are fresh out of relationships, and didn’t realise how attractive they are, or how they became over the course of a stale relationship.

As they date, it starts to dawn on them. So they want better and better, regardless of how you matched up vs the rest. So they start to stall, when the novelty of someone new, equally or even just fractionally more attractive shows interest…It becomes an ongoing search for someone marginally “better” until the novelty wears off…

Then months later. “Hi. Sorry I wasn’t in the right head space back then…. So how are you? Xx”, from a deleted number.”

“Online dating has been a revolving door of temporary people for me. The longest I was able to date someone was a whopping 4 dates before she called it quits (1.5 months). I HEAVILY get the impression that people have very unrealistic expectations when it comes to dating. It’s like they want an orgasmic spark on the first date, followed by consistent magic shows for the following dates. It’s really hard to get to know someone from a dating app. I do think if you’re a super hott guy, you can have fun getting a lot of hookups though, but if you’re searching for a romantic relationship as an ‘average dude,’ it’s truly a struggle puddle. I tend to get cycled out pretty quickly even if we got along well.”

“…a change that jumps out at me is that a substantial percentage of the women posting photos sticking their tongues out. No one looks smarter, funnier, sexier (or anything else one would be looking for in a mate) with their tongues hanging out the side of their mouths. What cultural shift happened that made some women think this is in some way attractive (and I know attractiveness is incredibly subjective, true, but going from “this looks really stupid” to “this will get me more dates” in the span of a decade is a long way to travel, culturally). It just makes me think, “This woman is either too young for me, or she is mentally ill”. Either way, it’s disqualifying.”

“my experience when meeting women on-line:
– they are still attached/trauma bonded to their ex..

– “I don’t know what i want but will know when i see it”

– hidden mental health issues

– hidden addiction issues

– suppressed rage..

– misrepresenting themselves ( catfishing but video chats help )

– getting very attached too quickly…

– not being authentic..”

“The Match.com Internet dating process can be heartbreaking.. You will meet tons of beautiful, sexy, sharp people that you would, at first blush, be able to visualize yourself being boy/girl-friended with, or married to. This can be very painful, though, if you have had great email and phone calls and both decided you really like each other. But the ones you like may tell you, right on the spot, that they are not attracted to you and the ones that want you strongly, you may not be attracted to. Prepare yourself and try to have no expectations, but don’t deny that “chemistry” makes up to 25% of the first encounter and if there is no chemistry, it usually seems to fritter away rapidly”

“Most of the internet people will select one of the first few people they meet because they get overloaded after more people contact them. Most people, women more than men, get 30 to 200 responses and just get burned out after the first dozen meetings. The first people one meets tend to stick out in that persons mind more because the others start blending together in the density of increasing contacts, emails, phones calls and meetings. If you don’t meet soon you will often be buried in the confusion that follows as the increasing volume of email contacts builds up. Most of relationships on match turn out to be with one of the first few people one meets according to the survey. If people are trying to meet quickly, they are probably trying to get in to your “emotional window” before it closes.”

” Many of the people on Match.com are just dabblers, or looky-loo’s who never intend to meet anybody in person, some of them are even marketing people for the dating service acting as “shills”. Ask them to meet soon to see if they are sincere.”

“Match.com People who object to long initial letters or emails are really not interested in knowing anything about the people they are contacting. They are often just looking for flings and distractions. If the people can’t deal with alot of information about you then they may not be interested in a long term relationship(LTR) and could just be using the dating system for personal validation and not for creating a relationship”

“Women tend to get 10 responses for every one response men get on Match because so many female profiles are fake.”

“Most people go in with the best of intentions…thinking that a great mind/intellect connection will make-up for any lacks in “chemistry”..but it has never turned out to be like that…everybody seems to, ultimately, let chemistry rule. Looks are not the whole driver but they are always a non-insignificant criteria.”

“Bad breath can totally kill a date. How many losers have I been out with that would have been OK except their breath made me ill. Take 4-5 “Breath Assure” tablets at least 30 minutes before the date and eat an Altoid or some mint a few minutes before the date. Eat a little something before the date because an empty stomach can cause bad breath. Brush your teeth. See your dentist and have your teeth professionally cleaned.”

“IF you are cute and you try to get off of the internet service they may not take you off very quickly because you are attracting eyeballs or customers for them, you can get many free months from the service if you work it right.”

“Don’t do internet dating unless you are prepared to meet people and you have from 6-10PM Free every night, 30-90 minutes a day to read and respond to emails and at least half your weekend free to meet a few people. I will not work for most people unless they make a commitment to the process, feel that getting a special person is the most important priority in their lives (Over work, money, material things, etc.)and really treat the effort like a job. Most people are completely surprised by how much work is involved in this kind of dating. Many people select one of the first few people they meet just to avoid the time-drain. But, when you meet the person that you want to be with, it makes it all worth it ten times over.”


“When you first notice something you don’t like about the person, don’t run away or write them off, you must remember that you are operating in a hyper-accelerated dating environment (Where else would you meet 20 guys in 60 days?), in the “normal world” you would be looking for all these checklist items or first a validating red-flag to write them off as a stalker/creep like you do here. The density of people can be daunting but don’t let it make you too clinical in your approach.”


“Most dating systems forward from an anonymous email to your personal email. Be sure and set your email system up so your emails pop up on your work desktop or on your home system to avoid coming home at night and finding a plethora of responses and replies that you don’t have time to give proper attention to. That is unfair to you and to the people that are interested.”


“I now want to meet as soon as possible because the “rejection intensity” seems to be less painful for both people if you have not gotten emotionally involved with lots of phone calls and emails beforehand. So it is important to meet as soon as possible to reduce the pain factor of the potential turndown. Of course, if both of you happen to be attracted, then you are done and you get a boyfriend or girlfriend.”


“Don’t ask a person if they like you on the date. It puts them on the spot and is too harsh to hear live and in person if they do not.”


“The marketing people at each of the bigger dating services will tell you that the demographics for the service are high-income, well educated, aggressive, driven business people. This can be both good and bad. The women tend to be more sexually aggressive and the guys tend to be busier”.


“Men lie more than women but they both lie. Men lie because they had bad upbringings, or they are insecure or they are afraid. Men only lie about one thing so it is actually a misnomer to say men lie. It is better to say “Men are Polyamory addicted”. Men don’t think they are doing anything wrong unless there has been a very loud and official wedding or girlfriend/boyfriend-stage in the relationship announcement. Men never think they are lying..they really don’t, they just think that the relationship isn’t happening. Men think that women are too slow and careful and always shopping for the right man so they always think women are not going to stick around and they always keep their options open until a women clearly commits. Women think that men move too fast so they wait for a slow one, but they rarely come. Both genders are wired different so it never really works out until one or the other lets their defenses down.”


“Don’t attack people who ask you for a picture and do have a picture ready to go. Having a digital picture ready to go is considered to be the number one “rule” of the web. Don’t go online to date unless you already have one on your hard drive or you will just be creating a terribly frustrating experience for people you contact and most of them will be upset that you don’t have a picture. The only difference in meeting people on the web or in person is that you have no visual context. Most people make their primary assessment based on appearance, even if they deny that they do, it is a natural human process to seek visual confirmation. On the same note, don’t judge a book by its cover. Many “pretty” people who seek only “pretty” people often find shallowness and vanity and no substance for that very relationship they seek…try a normal looking person, you will usually be surprised.”


“There are no weirdos and no normal people on the internet. There aren’t people at all, Just words and text. You have to realize it is a digital environment and employ it as an initiation place and then follow-up in the real-world. The unique thing about open network communication is that it has no established social order or boundaries so people are naturally supported in their theatrical creation. The difficult aspect of this is that there is nobody to reference you as you microscopically grow bigger or into other tangents of a character without even noticing it. So; people tend to be more flexible with the facts or narrative because they feel like they are co-writing a novel with some

one in real time.”


“Match.com proves that girls and guys can never be “just Friends. (Harry met Sally) if neither is physically attracted to the other. If one is and the other isn’t it will almost never work. In the case of one person being attracted but wanted to be friends, many of those people will either be in denial or embarrassed to acknowledge their attraction.”


“Realize that time doesn’t exist on the internet. What is a timely response or an appropriate development of social expectations will be too slow or too fast to the other person. Most internet socializing tends to move at “warp speed”…because it can.”


“Whether you’re searching for romance in cyberspace or at a Speed-Dating event, the rules can be complicated and downright frustrating. Following are a few that real singles have used to navigate this brave new world of dating:

– Rule No. 1: Asking a woman out for a Saturday night date is a big deal.

If you ask some women out for a Monday or even a Thursday evening, beware. You could have the phone receiver slammed in your ear. “A woman takes it very seriously when she is not asked out on a Saturday night,” said Dawn Sidney, who met her husband at a Chicago Jewish federation event. “She has a different attitude. She thinks the guy doesn’t think she’s special.”

– Rule No. 2: Fools shouldn’t rush in.

To Shawna Gooze, a human resources assistant, it doesn’t matter what day of the week a guy wants to see her. What happens after the date is more important. “I went out with a very good-looking, nice guy I met at a bar, but he started e-mailing me so much after the first date, it was a turn-off,” she said. “In the beginning, it’s better not to rush a relationship or come on too strong.”

– Rule No. 3: When you move an online romance offline, go public.

When trying to find a date in cyberspace, a set of unwritten rules applies, and some online daters simply make the rules up as they go along, according to Leslie Zimmer, who works for a Chicago-area synagogue and has tried several Jewish online dating services.

Zimmer, whose online dating odyssey has most been both frustrating and humorous, followed two main rules. First, she didn’t disclose personal information such as home address, telephone number or work location. Second, she met an online date at a public place such as a coffee shop or restaurant. She also chose to have a few “phone dates” with an online dater before meeting him in person.

Hoping to attract a Jewish John Travolta, she began her personal ad with, “Shall we dance?” One guy responded with a cute, clever message that discussed their common interest in dancing. For their first date, they agreed to meet at local nightclub to show off some fancy footwork.

“There was definitely a chemistry,” she said. “We spent three hours dancing, talking and laughing. “After we danced, he just said, ‘Good night.’ I was dumbfounded. I happen to have a lot of moxie, so I e-mailed him. He e-mailed back that he just didn’t feel any chemistry. I thought, when he finds someone with chemistry, it must be like an explosion!”

– Rule No. 4: If you’re a woman seeking cyber-romance, don’t be afraid to initiate the first cyber-contact.

The anonymity of online dating makes it easier to sever a bad connection, said Michael Slater, 25, a regional sales manager for a Chicago-based corporate relocation company. In other ways, it’s leveled the playing field by making it acceptable for a woman to initiate cyber-contact. “I know from several friends using Jdate.com that women are e-mailing guys and asking them out,” he said.

– Rule No. 5: Seek advice from a trusted friend if you’re stuck in the dating doldrums.

While it’s clear the Internet has changed the rules of dating, some things never change. Singles still seek advice and support from friends and family, said Slater, who is currently attached.

“Sometimes a friend will ask me what I think of a woman’s profile, and I’ll say, ‘You’re not going to know unless you try.’ They just need an extra boost to click that ‘send’ button,” he said.

“I don’t want to be known as a yenta [matchmaker], but I just give my friends a push in the right direction. They’ve done the same for me.”

– Rule No. 6: Unfortunately, there are no hard-and-fast formulas that guarantee romantic success, except maybe: Love like you’ve never been hurt before, and be yourself”


“1.) Never give out more than your first name over the Internet. Never tell anyone your address.

2.) It is fairly safe to exchange phone numbers although you should remember that your phone number can be used to find you. You can tell a lot about a person from their voice. If a person gives you their work telephone number instead of their home telephone number, they are probably already involved.

3.) If you have found someone you would like to meet, always arrange to meet in a public place such as a bookstore or coffee shop.

4.) Unless, someone looks frightening, always acknowledge the person you came to meet and have coffee or whatever. Never leave just because you don’t like a person’s appearance. It just isn’t nice to leave someone waiting and wondering!

5.) Be honest. If you are not interested thank the person for meeting you and tell them in a nice way that you don’t feel you have as much in common as you had hoped. A kind up front rejection is easier on you both.

6.) Always ask to see the persons drivers license. If they hesitate or don’t give you their identification, they have their reason’s. Get rid of them FAST! And, don’t let them follow you home!

7.) Call home or a friend and tell them the person’s name, address and license number which is on their license.

8.) A man has every right to request to see a woman’s drivers license as well. There are a few dingy women in this world.

9.) If a woman fails to ask for your ID don’t date her. Find another one because the one who didn’t ask will show bad judgement in other aspects of life as well!

10.) In sexual matters follow the dictates of the religion of your preference. You will always be glad you did.

11.) Should you decide to become physically involved, never do so until you know the person well.

12.) You do not know a person well until you have seen them in their normal environment and have met their friends. Practice safe sex!

13.) If a person seems to have no friends or associations be very suspicious. A person will rarely abuse someone known to their friends. There is a social price to pay.

14.) Always trust your instincts. If you are uneasy about someone there is probably a good reason.

15.) Remember, that all you owe anyone on the first meeting, is courtesy for a very short period of time. You have a lot to gain and very little to lose by meeting new people as long as you use common sense!”



A Bigger Issue: Real Estate Scams

Identity theft. If a criminal can get their hands on your personally identifiable information, including your Social Security number, they can potentially trick a bank or a mortgage broker into thinking they are you and take out a mortgage loan in your name.

For example, in late 2021, seven individuals were sent to prison for stealing the identities of absent homeowners with no mortgages, falsifying loan documents, and opening bank accounts in their names. They then used the loan money to buy luxury cars and other expensive items.

Deed fraud. Using personal information found online, criminals can impersonate a homeowner to transfer the title of their home to themselves. While abandoned and vacation homes are the prime targets for this scam, some criminals will go after occupied homes as well. In the latter scenario, a homeowner may not realize what has happened until they go to sell the home or receive notice of eviction. In 2020 deed theft netted scammers $547 million.

Once a criminal has obtained a person’s home title, they can:


  • Live there. Although this is rare, it does happen with unoccupied properties.
  • Rent or sell the property. Once again targeting unoccupied properties, this type of scam can provide criminals with regular monthly payments from clueless tenants or profit from a home sale to a legitimate buyer.
  • Apply for a home equity line of credit. Opened in the victim’s name, this allows the criminal to take out equity against a home and not make the payment.
  • Refinance a mortgage. Here, criminals cash out the equity, taking the difference. Because criminals won’t pay the new mortgage, victims can end up facing foreclosure.

Foreclosure rescue scam. This scam starts with criminals identifying homeowners that have fallen behind on their mortgage payments through the internet or public foreclosure notices in newspapers. The criminal (or “rescuer”) then contacts the homeowner, assuring them that they can help them save their home. In the end, they usually make a profit from fees or direct mortgage payments, while the victim loses their home to foreclosure.

How to Avoid Real Estate Scams

  • Keep an eye on your property deed’s status. Do this regularly to ensure no one is attempting to take over your ownership rights. If you notice any suspicious paperwork or a signature that isn’t yours, look into it immediately.
  • Review your home equity line of credit. Periodically check your credit reports to confirm that criminals have not opened a home equity line of credit in your name.
  • Question all unusual communications. If you’re contacted by a mortgage company you don’t recognize, investigate the matter further, even if the mail is addressed to someone else. Reading what she thought was “junk mail” is exactly how one woman discovered her home was stolen.
  • Be wary of missing bills. Missing bills or automatic withdrawals that no longer happen could indicate a change in deed status. If you don’t live in a property, get your bills redirected to you.
  • Keep your personal information off the web. Don’t overshare on social media, be wary of the things you post on forums like Reddit, and continuously remove your name from data brokers and people search sites. The less you share online, the less information data brokers will be able to acquire about you, making you a less attractive target for identity theft.

Recommended Reads

Our recent favorites to keep you up to date in today’s digital privacy landscape.

Apple Is Working on Air Tags’ Privacy Features After Reports of Stalking

By connecting to nearby Apple devices, Apple AirTag trackers can help people find their keys and wallets. However, they are also increasingly being used to stalk individuals without their consent and steal luxury vehicles. In response, Apple has issued a statement notifying iPhone users of upcoming software updates that will alert them of unknown AirTags and make it easier to locate them.
Google Plans to Stop Cross-App Tracking Android Users
Following in Apple’s steps, Google recently announced that it would end cross-app tracking on Android devices. Instead, the tech giant is designing a new system that it claims will promote user privacy while at the same time keeping advertisers happy. However, Google made it clear that nothing will change for at least two years, giving the advertising industry ample time to prepare.
LinkedIn Phishing Scams Up by 232% Since February
LinkedIn phishing scams have grown by a whopping 232% since February 1st, 2022. Taking advantage of “The Great Resignation,” scammers are replicating LinkedIn email messages. Although the emails look a lot like they come from the social media site (with subject lines like “You appeared in 4 searches this week.”), the webmail address is obviously fake, and clicking on the malicious link brings victims to a site that harvests their LinkedIn credentials.
500 e-Commerce Sites Compromised with Credit Card Skimmers
Hackers compromised around 500 e-commerce shops, including Segway, by installing credit card skimmers on sites running an outdated version of the e-commerce platform Magento CMS. When shoppers entered their credit card details, the information was sent to attacker-controlled servers. The frequency of these types of attacks has grown in the past five years, as has their sophistication.

You Asked, We Answered

Here is a question one of our readers asked us last month.

Q: When logging in to a site, is it better to use an existing social media account (like Facebook or Google) or email address?

A: Logging in with an existing account may be easier, and from a security perspective, it may even be safer. However, from a privacy perspective, it is not recommended.

The reason why is that when you log in to a website with another account, you are, in most cases, permitting data sharing between the two sites. For example, when you use Facebook to log onto a site/app, it can ask Facebook for up to 40 different permissions, including access to your timeline, photos, and friends’ list.

Clearly, then, you should only use social media sign in with sites/apps you trust. It’s also a good practice to keep a close eye on your preferred social network’s privacy policy.

If, however, you’re worried about giving away your email address (which, with scams and phishing attacks soaring, is totally justifiable), consider using a masked email when signing up for sites/apps you don’t entirely trust.

Q: What are dark patterns? Are they actually bad?

A: Dark patterns are practices that trick users into taking action on a website/app/email/form/etc. that they didn’t necessarily intend to/want to take.

Sometimes, dark patterns can be attributed to poorly designed UI and UX experiences rather than deliberate manipulation. Other times, these deceptive practices are intentionally built into the UI.

Examples of dark patterns include:

  • A streaming service that automatically charges you after a trial expires.
  • An ad that pops up on a website/app and that you can’t exit because the “x” is too small for you to see.
  • A sign-up process that makes you think you have to provide certain personal data to create an account with a website/app, when, in fact, you do not (for instance, the messaging board Reddit asks you for your email address, but few people realize they can just click “Continue” to register without one).
  • A countdown clock that manipulates users into making quick decisions (popular on e-commerce sites).
  • A pop up that guilts you into signing up for something or makes you feel stupid for not doing so (for example, a 20% discount code that you can get by sharing your email. The alternative is to click “I don’t want 20% off.”)

You can see more types of dark patterns on darkpatterns.org, a website by UX specialist Harry Brignull who came up with the term in 2010, with real-world examples (“Hall of Shame”) from Google, Facebook, Amazon, LinkedIn, Apple, and more.

Back to You

We’d love to hear your thoughts about all things data privacy.

Get in touch with us. We love getting emails from our readers (or tweet us @Abine or @DeleteMe).

Don’t forget to share! If you know someone who might enjoy learning more about data privacy, feel free to forward them this newsletter. If you’d like to subscribe to the newsletter, use this link.

Data Brokers: The Middlemen of Capitalism

Here’s what we’re talking about this month:
  • Data brokers. Their business model is rooted in collecting as much data about you as possible and then selling it to third parties. How does this impact you? And is there anything you can do to stop them?
  • Recommended reads including “Meta Makes It Harder for Users to Doxx One Another.”
  • Q&A: I know it’s not okay to reuse passwords, but what about usernames? Should we have a different username for each account, or can we use the same one?
And more!
If you know someone who might enjoy learning more about data privacy, feel free to forward them this newsletter.
“If you’re not paying for it, you’re the product.” It’s a famous saying that most of us are familiar with. However, as we browse the internet, few of us realize the true extent to which we are being tracked online—and how our personal data is monetized.

The “Middlemen of Surveillance Capitalism”

Vice describes it as the “Industry That Unmasks People at Scale.” Wired calls the firms within the sector the “…middlemen of surveillance capitalism.” So what are data brokers?

Data brokers are companies that aggregate people’s personal information from various online and offline sources and sell this data to third parties.

  • The data these firms have on you can include your gender, age, sexual orientation, income, home address, if you’re married/divorced, your political affiliation, what kind of laundry detergent you prefer, whether you purchase adult material, and so on.
  • Data brokers get this data from: third-party cookies that track you across the web, public sources such as voter registration information, retailers’ purchase histories, social media, apps that track your location, and other data brokers.

Are You an “Affluent Baby Boomer” or a “Working Class Mom”?

Not only do data brokers collect all this information about us, but they also put people into specific categories.

As noted by the Federal Trade Commission, some of these categories, like “Dog Owner,” may seem benign. However, others are much more intrusive.

How would you feel if you found out that you were tagged as “Rural Everlasting,” a single person over the age of 66 with “low educational attainment and low net worth”? What about “Bible Lifestyle,” “Help Needed—I Am 90 Days Behind with Bills,” or “Diabetes Interest”?

That last one (“Diabetes Interest”) is especially interesting. If medical information is protected under HIPAA, how on earth do data brokers find out people are pregnant or have cancer? The answer is surprisingly simple: while the information you share with your physician is indeed confidential, your online health-related searches are not.

Why Your Insurance May Suddenly Be Higher

It’s not just marketers who want to better target their ads that data brokers sell your information to.
Data brokers have a vast and varied client base that includes individual consumers, insurance companies, financial services firms, real estate services, and technology companies, among others.
For example, if you notice that your insurance bill has gone up for no apparent reason, it could be that your lifestyle/health has resulted in data brokers placing you in a specific category, i.e., “Cholesterol Focus” or “Biking Enthusiast.”
Granted, the information that data brokers have on you and sell to others may not even be correct. For example, you may have searched online for information on cholesterol because a family member or friend has an issue, not you.
  • A few years back, a reporter for The Atlantic requested to see the data that a data broker had on her. As it turned out, almost 50% of the information was incorrect.
  • Unfortunately, data brokers do not allow individuals to edit their profiles.
  • A man who took a data broker to court in 2017 said that the erroneous information they had on him might have cost him job opportunities.

A Way to Circumvent or Break the Law

For government entities, data broker firms provide a way to get around the Fourth Amendment protection against “…unreasonable searches and seizures.” Federal agencies from the IRS to the FBI and US Immigration and Customs Enforcement have been found to regularly purchase this data without warrants or public disclosures.
Data brokers are also increasingly being used by:
  1. Cybercriminals who are looking for data to personalize their social engineering campaigns.
  2. Scammers who can use this information to trick vulnerable people. In 2021, the data broker Epsilon was told to pay $127.5 million for helping scammers carry out elder fraud schemes.
  3. Stalkers who want to find their victims’ addresses and phone numbers.

What Are Data Brokers Saying?

Data brokers claim that the data they sell is “anonymized,” i.e., it can’t be linked to actual individuals.

Although that may sound reassuring, the reality is that data brokers provide enough information to connect data to people. Not long ago, researchers outlined a method that, according to them, allows to successfully re-identify 99.98% of Americans in any dataset based on just 15 demographic attributes.

That anonymized data is never really anonymous was proven before. In 2006, the internet company AOL published anonymized search records of its users for research purposes. None of the users were identified. Instead, they were assigned account numbers. Still, many of the searches did contain personally identifiable information. Based on searches like “60 single men,” “landscapers in Lilburn, Ga,” and “numb fingers,” The New York Times was able to unveil the identity of person no. 4417749 as a widow living in Lilburn, Ga.

How Is Data Brokerage Still Legal?

Because data brokers get much of their information from public sources, their business model is technically legal. And although several states have passed legislation to rein them in, a comprehensive federal law hasn’t yet happened.
There are many reasons why.
  1. For starters, data brokers are spending millions of dollars lobbying Congress.
  2. But also, many politicians use data broker services themselves to drive their campaigns, from deciding whom to target and where to campaign and even the exact wording of their campaign messages.

How to Stop Data Brokers From Selling Your Information

Use a private web browser and search engine. To avoid trackers as you browse the internet, use a browser that takes privacy seriously, like Brave or Firefox, or a search engine like DuckDuckGo (which just launched a browser for macOS, currently in beta). Brave and DuckDuckGo now also block Google’s Accelerated Mobile Pages (AMP). Through AMP, a publishing technology, Google hosts content on its own servers, which makes pages load faster. However, privacy advocates say that AMP lets Google collect even more information about people’s browsing habits.

Avoid sharing information on social media and forums. Data brokers scrape social media platforms and even password-protected forums for personal information. The latest court ruling deems this practice legal. The only way to avoid this is to refrain from oversharing online.

Keep the number of apps you have on your phone to a minimum. Like websites, many apps have trackers that send you information, including your location data, to data brokers. If you’re an iPhone user, know that this happens even with Apple’s privacy policies in place.

Disable location tracking on your phone. Whether you’re using an Android phone or an iPhone, you can disable location tracking on your phone.

Know your rights. Depending on where you live, you may be able to see the kind of information data brokers hold on you. For example, under the California Consumer Privacy Act, residents of the state can opt-out of data collection and ask data brokers to delete any information they have on them.

Opt-out of data brokers. Data brokers don’t have to honor your request to opt out, but many do. We have a free guide on how to remove yourself from the most popular data brokers. However, the process varies from data broker to data broker. While some let you fill in a form, others may require you to create an account with them, mail your opt-out request or verify your request over the phone. Remember that data brokers will relist your data after a while, so it’s important to be on this task continuously. For those who don’t have the time to go through this process repeatedly but still value their privacy, DeleteMe’s data broker removal service can remove your information from these sites on your behalf.

Recommended Reads

Our recent favorites to keep you up to date in today’s digital privacy landscape.
LinkedIn Most Imitated Brand in Phishing Campaigns
The employment-oriented social media platform LinkedIn is now the most imitated site by social engineers. It accounted for 52% of phishing attacks across the world in Q1 of 2022. That’s a 44% increase from the last quarter. Other brands threat actors like to hide behind include DHL (14%), Google (7%), Microsoft (6%), FedEx (6%), WhatsApp (4%), Amazon (2%), Maersk (1%), AliExpress (0.8%), and Apple (0.8%).
Louis Vuitton Accused of Violating Illinois BIPA with Virtual Try-On Feature
The North American unit of the French luxury fashion house Louis Vuitton was sued for unlawfully collecting and storing consumer biometric data through its “Virtual Try-On” tool. The tool, which allows users to virtually try on eyeglasses, allegedly collects customers’ facial scans and other sensitive biometric identifiers and information without first informing users or getting their permission.
Clearview AI to Offer Its Services to Banks and Private Businesses
The controversial face recognition company Clearview AI is branching out. The company best known for selling its software to law enforcement agencies is now planning to provide its technology to banks and other private businesses. In this way, it hopes to compete with tech giants like Microsoft and Amazon in facial recognition verification. The company claims that the technology will not rely on its 20 billion image database used by the police.
Meta Makes It Harder for Users to Doxx One Another
By the end of the year, Meta (formerly Facebook) will end an exception to its policy that lets users post people’s residential information on the platform if it is publicly available. This is in response to a recommendation from Facebook’s own Oversight Board. On the other hand, Meta users will be able to post photos of home exteriors if they’re featured in a news story, except if it’s in the context of protests against residents.

You Asked, We Answered

Here is a question one of our readers asked us last month.
Q: I know it’s not okay to reuse passwords, but what about usernames? Should we have a different username for each account, or can we use the same one?

A: If you use the same username across different accounts, then it is easier for malicious individuals to track you across the internet.

For example, if a stalker or cybercriminal knows your username on one social networking site, they can type in that username into Google and see your other accounts, including those on other social media (Instagram, Twitter, YouTube, etc.) and online forums.

In doing so, they can build an entire profile on you (i.e., where you live and work, who you’re friends with, what your interests are, and so on.)

Consequently, reusing your username — even if it doesn’t include identifying information like your name and surname — increases your risk of account hijacking, stalking, doxxing, identity theft, and social engineering attacks.

Q: Will doing a factory reset of my device reset my personal information?
A: That depends on the device. For computers and laptops with flash storage or solid-state drive (SSD), you’ll also want to encrypt the drive before formatting the storage drive and resetting the operating system.
Wirecutter has a step-by-step guide on how to do this based on your operating system. You can skip the encryption step with computers and laptops that have a mechanical hard drive.
Since iPhones and iPads are encrypted by default, all you need to do is disable Find My Device before you do a factory reset. Most Android phones are also encrypted by default, but you should ensure this is enabled before resetting your phone.