Share
Secured Communications
Comm mode where the recipient network/processor records messages for analysis before forwarding them to recipients so that this information can then be used in other ways, some benign and some otherwise, with or without the permission or knowledge of the network users and with or without some degree of personal privacy, according to the desires of whoever controls the network. The very long list of such uses includes madvert targeting, security analysis, cliological research, megastructure or city adjustments to anticipate needs, police work, blackmail, and conformity (or diversity) memegineering.
 
Appears in Topics
 
Development Notes
Text by John B
additions by Stephen Inniss
Initially published on 29 September 2003.

 
 
>