Tech Industry Insider/Journalist Rex M. Lee Exposes Illegal and Harmful business practices associated with Intrusive, addictive, manipulative, and harmful technologies developed by Silicon Valley tech giants.
This Shocking VideoCast exposes the fact that Google, Facebook, and others developers use addictive and manipulative technologies for the purpose of High-jacking their end user’s brain in order to manipulate and control their end user while exploiting the end user for profits at the expense of privacy & safety whether the end user is an adult, teen, or child.
Tech industry professional and insider Rex M. Lee exposes predatory surveillance and data mining business practices employed by tech and telecom giants.
Viewers will learn that Surveillance Capitalism is an intrusive, exploitive, and predatory business model associated with apps/platforms developed by companies Such as Google, Apple, Microsoft, Amazon, Facebook, ByteDance (TikTok-China).
Apps Are A Threat To Business & Personal Information. Did You Know That Most Popular Apps Are Considered "Legal Malware" enabling the app developer, including those from China & Russia, to monitor, track, & data mine end users by way of smartphones, tablet PCs, connected vehicles, smartTVs, PCs, wearable tech, voice automated assistants, and connected products..
Intrusive apps are a threat due to the fact that a single app developed by tech giants, that include Google, Apple, Microsoft, Meta (Facebook), ByteDance (TikTok-China), and Amazon, enable the app developer to collect over 5,000 highly confidential data points associated with the end user's business, personal, employment, medical, legal, and family information whether the end user is an adult, teen, child, or business professional.
Tech giants, including those from China & Russia, are collecting highly confidential business, employment, and personal information from apps that support connected products such as smartphones, tablet PCs, connected products, and PCs supported by the Android OS, Apple iOS, & Windows OS posing numerous threats to end users, businesses, government agencies, networks, and critical infrastructure.
My Smart Privacy provides end point cybersecurity, intelligence, and privacy advisory services centered on threats posed by intrusive, addictive, and manipulative apps developed by multinational app developers.
My Smart Privacy will provide your business, organization, or government agency with an overview of the threat landscape, needs analysis, and consulting services to mitigate and/or eliminate all threats through policy management, best practices, privacy products, and customized solutions to fit your needs.
Contact Rex M. Lee, Cybersecurity, Intelligence, and Privacy Advisor for Details:
Tech giants, including those from China & Russia, are collecting highly confidential business, employment, and personal information from apps that support connected products such as smartphones, tablet PCs, connected products, and PCs supported by the Android OS, Apple iOS, & Windows OS posing numerous threats to end users, businesses, government agencies, networks, and critical infrastructure.
My Smart Privacy provides end point cybersecurity, intelligence, and privacy advisory services centered on threats posed by intrusive, addictive, and manipulative apps developed by multinational app developers.
My Smart Privacy will provide your business, organization, or government agency with an overview of the threat landscape, needs analysis, and consulting services to mitigate and/or eliminate all threats through policy management, best practices, privacy products, and customized solutions to fit your needs.
Contact Rex M. Lee, Cybersecurity, Intelligence, and Privacy Advisor for Details:
Tech giants, including those from China & Russia, are collecting highly confidential business, employment, and personal information from apps that support connected products such as smartphones, tablet PCs, connected products, and PCs supported by the Android OS, Apple iOS, & Windows OS posing numerous threats to end users, businesses, government agencies, networks, and critical infrastructure.
My Smart Privacy provides end point cybersecurity, intelligence, and privacy advisory services centered on threats posed by intrusive, addictive, and manipulative apps developed by multinational app developers.
My Smart Privacy will provide your business, organization, or government agency with an overview of the threat landscape, needs analysis, and consulting services to mitigate and/or eliminate all threats through policy management, best practices, privacy products, and customized solutions to fit your needs.
Contact Rex M. Lee, Cybersecurity, Intelligence, and Privacy Advisor for Details:
Tech giants, including those from China & Russia, are collecting highly confidential business, employment, and personal information from apps that support connected products such as smartphones, tablet PCs, connected products, and PCs supported by the Android OS, Apple iOS, & Windows OS posing numerous threats to end users, businesses, government agencies, networks, and critical infrastructure.
My Smart Privacy provides end point cybersecurity, intelligence, and privacy advisory services centered on threats posed by intrusive, addictive, and manipulative apps developed by multinational app developers.
My Smart Privacy will provide your business, organization, or government agency with an overview of the threat landscape, needs analysis, and consulting services to mitigate and/or eliminate all threats through policy management, best practices, privacy products, and customized solutions to fit your needs.
Contact Rex M. Lee, Cybersecurity, Intelligence, and Privacy Advisor for Details:
Multinational app developers pose numerous threats to end user information (business & personal), networks, and critical infrastructure, due to intrusive and dangerous technologies used in the development of operating systems, apps, & platforms developed by Google, Apple, Microsoft, and other app developers, including those from China and Russia.
App developers such as Google, Apple, Microsoft, Meta (Facebook), ByteDance (TikTok- China), and Tencent (WeChat- China) are in the "Information Trafficking Business" which means they have adopted "Predatory Surveillance & Data Mining Business Practices" supported by intrusive, addictive, and manipulative apps that pose massive threats to:
Intrusive app developers such as Alphabet (Google) & Tencent (China) compete in hundreds of industries worldwide yet the U.S. Government enables these intrusive tech giants to surveil and data mine citizens, including business professionals, teens, & children, by way of intrusive apps that support smartphones, tablet PCs, connected products, and PCs supported by the android OS, Apple iOS, and Microsoft Windows OS posing numerous threats to OS end users.
Learn more about the Threat Landscape by clicking on the button below:
John & Rex Discuss:
Understanding The Threat Landscape!
Intrusive apps, social media platforms and leaky operating systems pose numerous threats to end user information, confidential business information, classified information and networks, including critical infrastructure, due to predatory surveillance and data mining technology employed by Google, Apple, and Microsoft, plus their app developer partners, including those from China and Russia.
Intrusive apps, social media platforms and leaky operating systems enable Google, Apple, Microsoft and international app developers to collect highly confidential business, medical, legal, employment and personal information from smartphones, tablet PCs, connected products and PCs supported by the Microsoft OS, Android OS and Apple iOS.
Intrusive apps/social media platforms and leaky operating systems pose numerous privacy and cybersecurity threats to end users, businesses, medical institutions, schools/colleges and government agencies, including the military and law enforcement.
Intrusive apps/social media platforms also pose numerous safety threats to adults, teens and children due to highly addictive and manipulative technologies used in the development process as admitted by Meta (Facebook) Cofounder Sean Parker and former Google product designer, Tristan Harris (Netflix Documentary- The Social Dilemma).
Nation-state hackers from China, Russia, Iran, and North Korea are using intrusive apps and leaky operating systems to launch attacks on networks, including critical infrastructure posing threats to businesses, cities, states, and the federal government.
Executive Briefing & Speaker Services!
My Smart Privacy will provide your business, educational institution, association, organization, medical institution or government agency with an executive briefing centered on the threat landscape and how to implement best practices centered on cybersecurity, privacy and safety.
Contact Cybersecurity and Privacy Advisor Rex M. Lee for More Information- See Contact Information Below:
Multinational corporations such as AT&T, Google, Microsoft, Meta (Facebook), Bank of America, and MasterCard are exploiting their paying customer/end user's business and personal information for profits at the expense of privacy.
Predatory corporations have been exploiting their customers/end users for profits by banking of the fact that their customers/end users are unaware of the fact that individuals own the rights to their information (business/personal).
Consumers can now stop companies, including multinational corporations, from exploiting their confidential business and personal information for financial gain by enforcing their digital rights which will enable individuals to control how their confidential information is used.
You have the power over your information, now we give you a resource to exercise your digital rights and stop your valuable information from being exploited for financial gain at the expense of your privacy, after all you are the customer not the product.
Your information rights are the great equalizer. Make businesses stop using your information by opting-out of "secondary purposes" until they are forced to license your valuable information for use.
As your authorized agent working on your behalf, The Privacy CO-OP will tell them to stop, and then negotiate a license for all of our opt-ins per our Terms and Conditions.
As a nonprofit co-op, we split all profits as equals. You can stay opted-out of whatever business you like.
Copyright © 2024 RML Business Consulting, LLC - All Rights Reserved.