OS And Software Analysis- Apps, Widgets And Other Content

Personal and Professional Digital DNA- A Valuable Commodity!


Data driven technology providers such as Google, Apple, Microsoft, Facebook, Amazon and other tech giants are in the business of harvesting personal and professional information known as a person’s “Digital DNA” from technology users to exploit for financial gain at the expense of the user's civil liberties, privacy, cyber security and safety.

Personal and professional Digital DNA is a valuable commodity worth trillions of dollars on the open market.  The value of companies such as Google, Apple, Microsoft, Samsung, Amazon, Facebook and other tech giants is based on their ability to collect, use, share, sell, purchase and aggregate personal and professional Digital DNA for profits.


Wall street loves indiscriminate surveillance and data mining business practices due to the pure profit made off of a person's Digital DNA due to the fact that the product user is not compensated for their personal and professional Digital DNA even when the product user has paid for connected products such as smartphones, tablet PCs, TVs, voice automated products (a.g. Amazon Alexa), vehicles and other products that require payment to participate.


Most of the stock value of a data driven technology providers is based on the profits made off of technology user's personal and professional Digital DNA.  Operating system ("OS") developers such as Google, Apple and Microsoft control access to the technology product user due to their dominance of the OS market which enables the OS developer to control most the content that is pre-loaded into connected products that are supported by the android OS, Apple iOS and Microsoft Windows OS.


Tech giants will say they do not sell their customer's "identifiable" personal and professional Digital DNA to third-parties such as advertisers or other companies such as data brokers., however, what they do not make transparent is the fact that each company sells access to their customers by way of uncontrollable preinstalled content such as apps, widgets, emoji's and other content.  In addition, tech giants enable access to their customer's via app stores on the internet.


Content such as apps are broken out into categories that include preinstalled apps, install-by-update and third-party apps that are acquired from sources such as app stores on the internet.  Preinstalled and install-by-update content by the most part cannot be uninstalled, controlled or disabled. 


Some OSs give the perception that apps can be uninstalled, controlled or disabled but the reality is if the device is defaulted back to ordinal settings apps the user thought they uninstalled or disabled will re-appear and default setting will enable disabled apps to become active again.


Most apps, widgets, emoji's and other content are intentionally designed to enable the developers to monitor, track and data mine the product user.  In addition, the apps, widgets, emoji's and other content are designed to enable the developers to fully control the functionality of the device and hardware such as the camera and microphone without the knowledge or consent of the product user.  Don't take our word for this, read the unpublished (hidden in device) android application legalese:


























Intrusive content such as apps can be considered to be Trojan Horse Malware enabling the developers to surveil the product user while collecting, using, sharing selling and aggregating a person's personal and professional Digital DNA for financial gain at the expense the product user's civil liberties, privacy, cyber security and safety since the developers do not indemnify (protect) the product user from harm even if the developer is negligent with the user's Digital DNA.


My Smart Privacy will provide individuals and organizations with a complete content (apps, widgets, etc.) analysis to help understand:


  • Which preinstalled and third-party content poses the highest threats to civil liberties, privacy, cyber security and safety.


  • The difference between end user licensing agreements ("EULAs") and preinstalled content legalese such as application permission statements.


  • Published (online) terms of use and unpublished (hidden in device) terms of use.


  • Which OS can be harden for the best privacy, cyber security and safety.


  • Which security and mobile device management ("MDM") apps provide the best security.


For more information contact Rex M. Lee at: Rlee@MySmartPrivacy.com or read articles written by Rex M. Lee at: