How is it Legal to Use Addictive, Intrusive and Harmful Technology Designed to Exploit Technology Users For Financial Gain at the Expense of Privacy?
Many technology users have no idea that they are agreeing to:
Connected products such as smartphones are supported by well over a hundred intrusive and exploitive preinstalled application permission statements of which many contain nontransparent application product warnings.
Click here to learn more about intrusive apps & hidden application permission statements:
To learn more, read technology articles authored by Rex M. Lee at:
To return to services click on the button:
Contact Rex M. Lee to learn more at: Rlee@MySmartPrivacy.com or (210) 639.6035
Site under Construction- We appreciate your patronage and patience as information is edited and new information is posted
All Rights Reserved RML Business Consulting, LLC 2018
Surveillance Capitalism- The Biggest Data Theft in the History of the World!
Technology users have become "uncompensated information producers" who are being exploited by the very companies they patronize with their trust, loyalty and hard earned money.
Technology product users do not realize that their personal and professional surveillance data (e.g. location data) and sensitive user data is considered to be the most valuable commodity in today's connected world.
Data driven technology providers use Addictive, Harmful, Intrusive and Exploitive preinstalled ("rooted") technology to surveil and data mine technology users for financial gain at the expense of the product user's civil liberties, privacy, cyber security and safety.
Don't take my word for any of this, former and current senior executives and application developers for Google, Facebook and Spotify publically admit that they develop addictive, harmful and intrusive technology so that they can exploit the product user for financial gain regardless if the user is an adult, child or business professional: