Blown into Bits chapters 2,5,7,8
Jhoan Muy
Blown into Bits Chapters:2,5,7,8
Chapter 2 Overview:
In this chapter it grabbed my attention, privacy is long abandoned and we really have none of it. It gave an example where someone was charged over a thousand dollars when he was expected to be charged $150 because he violated a rule. To his knowledge the car dealership would have never known but they did because of the cars global positioning system which allowed them to know where exactly the car is and that you can say is violating his 14th amendment of freedom of unreasonable searches but no. We are losing more and more freedoms as technology is advancing and it is really affecting us.
Chapter 5 Overview:
This chapter talks about coding and encryption how you should use in in all forms to protect yourself from harmful hackers. It is known, everything is sent over the internet and you can't just send your credit card number through an email your basically calling yourself to get hacked. Use encryption in order to protect yourself from these hackers which will now not be able to decode and make sense of your encryption.
Chapter 7 Overview:
This chapter brings light to what you can't say. We are guarded by internet protectors and laws were made to protect people from internet predators which take advantage of the use of the internet and use it for bad. Acts were made by woman organizations to further prevent these such things from ever happening again .
Chapter 8 Overview:
These chapter brings light to the restrictions of speech on what is said on radio and other public systems which have great power to send stuff which can reach all. The FCC expects to restrict more things which are said on radio since it is basically a big tool which can be used to promote anything. Restrictions are being made and are questioning do all really have the freedom of speech.
Blown into Bits Chapters:2,5,7,8
Chapter 2 Overview:
In this chapter it grabbed my attention, privacy is long abandoned and we really have none of it. It gave an example where someone was charged over a thousand dollars when he was expected to be charged $150 because he violated a rule. To his knowledge the car dealership would have never known but they did because of the cars global positioning system which allowed them to know where exactly the car is and that you can say is violating his 14th amendment of freedom of unreasonable searches but no. We are losing more and more freedoms as technology is advancing and it is really affecting us.
Chapter 5 Overview:
This chapter talks about coding and encryption how you should use in in all forms to protect yourself from harmful hackers. It is known, everything is sent over the internet and you can't just send your credit card number through an email your basically calling yourself to get hacked. Use encryption in order to protect yourself from these hackers which will now not be able to decode and make sense of your encryption.
Chapter 7 Overview:
This chapter brings light to what you can't say. We are guarded by internet protectors and laws were made to protect people from internet predators which take advantage of the use of the internet and use it for bad. Acts were made by woman organizations to further prevent these such things from ever happening again .
Chapter 8 Overview:
These chapter brings light to the restrictions of speech on what is said on radio and other public systems which have great power to send stuff which can reach all. The FCC expects to restrict more things which are said on radio since it is basically a big tool which can be used to promote anything. Restrictions are being made and are questioning do all really have the freedom of speech.
Comments
Post a Comment