Rational countersurveillance

Suddenly, a mail arrived. It was from a company, detailing all the various ways they use and have been using data collected, past and present. Specifically, it detailed the ways in which this data had been collected: which vectors, which methods and, with surprising granularity, which apps. The mail also included a form contract which, when broken down to its base components, involved the following: a checkbox labelled “I approve the use of the methodologies described herein”, and a place where a signature could be conveniently written.

Reading through the list of surveillance methods, he began to notice something very irregular. For one, it went over in great detail everything gleaned about his life in personality through his smart phone usage. While on a general level he supposed this might be a good way to go about these things, it was ever so slightly compounded by the fact that he did not have a phone even remotely approaching the evolutionary tendency towards intelligence. Thus, the information gathered – and the conclusions made from it – painted a picture of a completely different person than himself. Combined with the fact that the general impression overall seemed to be so out of touch with reality as to constitute speculative fiction, he did the only rational thing he could think of:

He signed the form and sent it in.

%d bloggers like this: