ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

High Tech Eugenics

Updated on May 6, 2014
In 1822, Charles Babbage laid down plans for a mechanical computer calculating machine that he called a difference engine. This was the first true analog computer. We have come a long way since.
In 1822, Charles Babbage laid down plans for a mechanical computer calculating machine that he called a difference engine. This was the first true analog computer. We have come a long way since. | Source

How Addiction to Electronics is Our Swan Song

There are people alive right now in the developed world, who never had a computer when they were young. They grew into them as they became available within their lives at some point. There are young people who do not know a world outside of computers. Though they play sports and go to school as older folk did in days gone by, the school rooms of today are radically different than those of recent history. In most of the world, the situation is much the same as it was before computers became readily available. Given the source of computers, being the state and the military industrial complex, we should appreciate that beginning and what it means to us now in the rapidly evolving world of complex computer technologies. Today, they form the “brains” of everything from cars we drive, to cell phones, televisions, watches, music players, calculators, robots, planes, drones, missiles, ships, satellites, planetary probes, medical equipment and life support devices and a lot else.

From the time of Charles Babbage who began developing his analog mechanical computer called the difference engine in 1822 (1), to the 1823 jacquard system (2) of coding, the military industrial complex to the modern internet now accessed wireless by cell phones and wifi computers have been undergoing change and are still one of the fastest changing and volatile sectors of our technological experience. At one time, the computer was the reserve of the scientist and the military. Then it filtered down to business such as banks, the taxation department and insurance corporations. Since the early 1981 the personal computer (PC) with MS DOS (3) became available to the general public. The first ones were not very powerful and the owners had to do their own coding. The first public computers were 8 bit machines. The next in line were 16 bit, then 32 bit and now we operate with 64 bit. There are still 32 bit machines being made, but the standard today is 64 bit. All this changed rapidly and continues to do so. By 1985, Microsoft Windows became available and it exploded from their. The DNS system that became the base of the modern internet was born in the same year. Dot coms were to have their start in the same year (4). In 1992, the modern internet ISOC (Internet Society) was born and it has exploded in complexity ever since. 1994 was the year that the full text search engine became available. 1998 was the year that is considered that the web we see today with Yahoo and Google became the base which most people used on the internet. Out of this came millions of different applications and web based services searchable by Yahoo and Google. This exponentially increasing complexity was to be matched by ever more sophisticated computer hardware. There is a weak underbelly though, and this becomes even more pronounced with ever increasing hardware complexity. These facts are made plain when we analyze the following.

  • Coding a disaster

  • The profit motive

  • Planned Obsolescence

  • Massive pollution of the planet and the threat of ecocide

  • Selling the internet as ultimate democracy

  • Backdoor government and military entry

  • Insecure security protection

  • Upgrade Alienation

  • The Steep and winding learning curve

  • Hackers, hackers everywhere

  • The Virus is in the anti-virus package as a Trojan

  • Corruption, chance and design

  • Wired for life and death, cell phones, life support systems etc.

  • Consenting to Electronic Eavesdropping

  • False flag type manipulated expiry and crashes

  • Virtual traps

  • Issues of sensitivity, that quantum rabbit

  • EMP and the end of civilization as we have come to know it

From the very beginning in 1822 to now, computers require coding in order to function. Big software developers have rooms full of people coding complex software. All of it is based on a binary code of 1's and 0's, on and off.
From the very beginning in 1822 to now, computers require coding in order to function. Big software developers have rooms full of people coding complex software. All of it is based on a binary code of 1's and 0's, on and off. | Source

From the very outset of coding, there has been a building disaster from the simple beginning programs of personal coders in PCs to the massive codes of today that are subject to a lot of risks internally and externally. Among these risks are implanted modules that are triggered by timing events. These may be in the form of malware or embedded code to insure that the coding jobber keeps their position in the software development firm. Despite what you may have been told about computers being perfect, that is far from the truth as computers are only as good as their software and that is only as good as the coder who wrote the code who is a human being with varying skills in this area. Today, codes are subject to constant upgrades and bugs. For reasons that will be developed later, code can change spontaneously in a single bit that can have long term and serious consequences. In addition, mass produced computers may be identical on the assembly line, but the moment they are all used for different purposes, they become individual and no two are alike. Coding comes in all forms, from word processing, to graphic interface, to complex calculating algorithms, security ware, anti-virus ware, Tojans, Malware, viruses and more, it has become a virtual jungle. Indeed, if you load a computer with various source codes for programs, they may not be compatible and at best, they will not work and at worst, totally crash the system. As the internet causes plenty of interaction, the potential for coding a disaster magnifies exponentially.

At the bottom of the exponential mushrooming computer network comes a huge amount of profitability. Profits come from form any direction you can think of. There are many internet sites that now require the registering of your credit card information. Some very popular sites like Paypal, Itunes, Netflix, E-bay, Amazon among plenty of others all require preregistered credit information. This immediate excludes those who do not have a valid credit card. Credit card being the new debt currency is a trap in itself and subject to lots of abuse in all directions. Not only Joe or Jane Average use credit on the internet, but huge multi-billion dollar transfers are made by the stock markets and banks around the world. Losses can come in huge amounts at lightning speed and this has happened in computer driven trade on the stock market. Computer profits come from hardware and software and that industry is volatile. Hardware becomes obsolete in about a year and software can be obsoleted in a matter of months. To keep up, one needs the cash in order to remain cutting edge. But there is a cost to keeping up and that is staying on the learning curve. No sooner have you learned to use one form of software than you are set back to the beginning with some new update that does not have any similarity to what one is used to. This can be a source of tension and frustration, especially in the high tension workplace of today.

Broken down computers wind up as "e-waste" and some of it goes to landfills. Some goes to Asia for recycling. There is a lot of it due to upgrading and breakdowns.
Broken down computers wind up as "e-waste" and some of it goes to landfills. Some goes to Asia for recycling. There is a lot of it due to upgrading and breakdowns. | Source

The bane of the environment is planned obsolescence (5). It is also a bane on ones increasing indebtedness. The short story is one of deliberately under-engineering of products so that they become outdated and/or useless within a certain limited period of time. Most products are also made so that they will generally fall apart or break down shortly after the expiry of the warranty period. This has all been carefully worked out and applied in order to maximize profits. What happens to all that outdated and broken down stuff when people want new items or the latest and jazziest version? Most of it winds up in the landfill and a little is recycled. Some of the landfill winds up being washed downriver to the oceans. This has a tremendous and negative impact on the environment both in the air and in the oceans. This reflects back on us up through the food chain, especially from the five gyres (6) in the oceans around the world that act as the garbage collection sites from around the landmasses of the world where humanity dumps mostly plastic garbage in the developed and developing world. Much of computer refuse from plastic wrap to plastic parts wind up in the ocean if they are not caught and recycled. The amount of pollution in production and broken down products threatens civilization and humanity with ecocide.

In the 1980s, the fledgling internet was sold as the ultimate in democracy and freedom of speech. This was to be quickly proven to be a lie. The two proofs were those without access to computers due to backwardness and/or poverty and increasing censorship at the hand of the power elites of various countries and regions (7). What has evolved is a battle between those who struggle for freedom of information and those who want to impose strict controls. Of course, if one has the cash or credit, they can buy any form of expression. The rest who have access in a combined and uneven way, have to struggle continually to express their minds. One telling example is the fate of Aaron Swartz who paid with his life to disseminate what should be freely available information, but which others plot to place behind a pay-wall (8). He was not associated with Wikileaks but was instrumentals in overturning two controversial pieces of legislation in 2012 known as SOPA and PIPA. These two laws were designed to impose a control and kind of censorship on the net and set up a pay-wall around which most people would not be able to negotiate. The selling the internet as the ultimate in democracy was enough to encourage a huge interest on the part of hundreds of millions of people. It also encouraged the development of social networks such as My Space and Facebook (9). Some of these have roots in the CIA. All of it has roots in the military industrial complex.

There is not now, nor has there ever been or ever will be anything such as privacy on computers, even before the internet. The concept of privacy only applies to powerful corporations. At the very outset, the design was well thought out so that the elite could access anything they wanted. The Personal Computer designers created a secret backdoor so that governments and military had an easy route of entry, but was kept “top secret” from the public. The addition of the internet has made the task effortless. They no longer have to bash down your door to gain entry in order to find out what one is doing based on independent testimony. Now they just gather evidence via internet back doors and then bash down one's home front door. After that under the protection of The National Defence Authorization Act (NDAA) (10) debated extensively in 2011, 2012 and signed into law in early 2013 by Barrack Obama, anyone can be arrested without charge and held indefinitely to be interrogated by a grand jury. This applies world wide, making the whole world the equivalent of Guantanamo Bay (11). Via the internet, when anyone types catch words in any application, they are monitored by scanning software. If something “suspicious” is detected by the software, a human agent takes over and then one can be eavesdropped by the CIA, FBI, CSIS, MOUSSAD or other agency that uses that software to catch their suspects and then the suspect is placed under further and tighter investigation and surveillance. Some of the many watched catch words are contained in this very article! If there is cause for someone to be further investigated, who is perceived as a threat, they will call you in the dead of night by smashing in your door on some pretext and there are plenty of those to hand out. Today, the favoured excuse is a weapons cache or child pornography. Both are an automatic death sentence. In the case of weapons, the “callers” will come with assault rifles at the ready, locked and loaded. In the case of child pornography, there is an automatic process to send the state identified perpetrator to jail where other inmates will do the job of liquidation. They can also shut down your system and/or plant incriminating material on your machine without your knowledge. No plea is sufficient to sway the judge against the found evidence as presented by the prosecuting attorney. There is no publicly available security software anywhere that can prevent this back door access. It is simply not permitted unless you obtain an illegal hacker patch, but even this is not foolproof. What is available is for front door control only and it is an illusion of security. They have your number and if you did like most people, you bought your machine with a credit card and your IP is listed with your information and address when you paid with credit. It is all automated and instantaneous. Before you even get the machine in your front door, it is already registered with a central tracking agency for your address. This is why the FBI have kicked in doors and arrested children for “hacking” forbidden sites. That may or may not be true in the case by case scenario, but if you turn the spotlight on them, look out! The keepers of secrets do not want to be exposed even when they expose their suspect even if that exposure is a false flag. The only sure protection in this instance is to use internet cafe computers and change what you use constantly. This will help somewhat in anonymity, but the secret police are aware of this and watch these places closely, especially if there is activity that alerts them at various locations. Internet cafes after all, also have addresses where their IP numbers are registered. There is a recent case where someone was tracked and arrested at such a location.

There is no such thing as perfect security. Somewhere, sometime, if someone really wants to break into some location or site of perceived value, it will be done! Top level secured sites have already been breached and more occur everyday. For every security advance, a hacker or hacktivist out there will be able to breach it, keep what they want and dump whatever they want, whether that is the site itself or the contents into the public domain, such as in the case of Wikileaks (12). The opposite is also true. No matter what precautions you want to take, someone who wants your information, will break in and take what they want. Not only are there con games, there are ways to break through low level security and firewalls to obtain your secret information. As more people use on line financing, the attraction to accessing your accounts increases. Neither type of criminal really cares for who is on the other end as long as they can gain and get away with it and this new kind of crime has very little control at this time. The watchword is “caveat emptor”, or buyer beware. Treat anything with suspicion to which you have no real knowledge or control. There is another threat that comes from planted information that could prove of interest to the authorities who are “tipped off”. Anything is possible in the wild territory of the world wide web. There is even such a thing as betrayal that can land anyone in hot water with the authorities. We have already examined the idea of planted information. Hackers can do it to and if one is you enemy, look out!

As the development of computers and software accelerates, the learning curve steepens to the point where it is impossible to absorb new information fast enough. This represents a serious threat to ones career.
As the development of computers and software accelerates, the learning curve steepens to the point where it is impossible to absorb new information fast enough. This represents a serious threat to ones career. | Source

Computer frustration and alienation can literally drive some of us nuts!

One of the banes of the workplace is the incessant upgrade and the perpetual learning curve most of us wind up on (13). This single reality has become a powerful force for alienation. As upgrades increase in pace, it does not take long for a person to be put back into the place of the complete ignoramus. Recall that hardware is upgraded almost on a yearly basis and software more often than that. What this means on the street is that the kids who got the latest gizmo a year ago are behind the ones who just got the latest gizmo for this year. The differences can be so great so as to make the two groups a year apart incapable of communicating with each other based on two different sets of information. Often, the upgrade is not backwards compatible, meaning that you can't run anything made last year with stuff made this year. This is alienation on a quickening pace. There is a comparable scenario in the video world. Within a single century from 1912 to 2012 we see, flip card books for generating the illusion of movement, the 8, 16 and 32 mm film projector with film, the BETA and VHS tape systems, the DVD, Blue-ray, the MP3, M4A and their variations, flash drives and now complete on line video downloads with nothing more than a web address and space on a flash drive. Almost none of them are easily cross translatable. However, if one has the cash, they can translate anything to any other media. There are parts of the world that still have not caught up with the very first of the foregoing list. The latest developments have a plethora of variations and sub-types.

Upgrades always include a learning curve and sometimes it is steep, especially in the context of the production driven electronic enhanced workplace. Software is constantly being upgraded and there are often major changes that leave all the old learning in the dust. It is therefore incumbent upon the person, private or corporate (also defined as a private individual) who uses the new software to upgrade their knowledge accordingly and immediately. The code took a host of developers months or years to create, but the user is often expected to learn immediately. Some learning curves are gentle and some are steep as a precipice. As we live in an accelerating productive expectation by employers, those employees that cannot adapt fast enough to the tough, competitive and rigorous pace, are shown the egress and left to face the host of ills in the modern world of austerity. This is virtually a death sentence. It is equivalent to Nazis killing school kids who fell below the demanded expectation of the state (14).

There are hackers everywhere and this is becoming the new rage for whatever purpose one wants, whether exposing the crimes of big corporations and governments, or breaking into popular sites to render them useless or stealing your personal information. There are now hacker groups like Anonymous (15) who could wind up involving most of us one way or another in their schemes. Some of the caught hactivists as they call themselves are children and teenagers who were born while the internet as we know it as in its beginning stages. They know it better than almost anyone else their senior. By now, we have all been touched by hactivists. As we all have enemies, and if one of them is a hactivist, you and I could be in serious trouble. A PC is much easier to hack than corporate or military computers and these very items have already been hacked in 2012 (15).

Malware, Trojans, worms, viruses and destructive coding, sometimes hidden in documents, pictures and e-mails, come with the so called blessing of the computer age. It has recently been proven that malware and anti-virus software come in the same package and forms parts of the same program (16). Some anti-virus programs redirect your computer to virus infected sites where viruses are sent to your computer to do a variety of things, most commonly to commander your computer and get you to by their ready made solution. In a timely manner, one's computer can become infected and then you will have to pay someone to disinfect the computer. This can happen again and again and quickly cost a small fortune. There are anti-virus programs out there that will seize your computer and then demand a ransom by credit card in order to free it up. In the meantime, you will not be able to do anything until the ransom is paid to free up your computer. This can be cycled over and over once critical information is released to the perpetrator. The author is personally familiar with this particular variant. A major anti-virus company was recently implicated in selling programs that contained malware to encourage sales, again with credit cards, which have become the main currency of the internet.

Computer users see messages like this and also ones like 404 error and File not found, etc. These result from corruption and other issues.
Computer users see messages like this and also ones like 404 error and File not found, etc. These result from corruption and other issues. | Source

Anyone who uses computers knows the corrupt file message by now. Corrupt files originate by wear and tear, programming faults and by design. Due to planned obsolescence, wear and tear becomes an issue almost from the day one acquires a new computer. Programs have become so sophisticated, corruption is almost to be expected. A corrupt file will betray it presence when an alert shows up, either in the day to day use of the program or when one attempts to retrieve some project that was being worked on and no longer can be accessed. Corrupt files in critical areas can render a program and all its files inaccessible. Much of the corruption is a chance thing that may result from a program writing to bad disc sectors. This is the chance side of the equation and the most frequent corrupt file woe. There are those that are designed to corrupt files at a specific time. This tactic used to be popular when coders sought a type of insurance to keep their jobs. In this case, there is a way to retrieve corrupt files, but it may cost in order to obtain the solution. There was an incident by Microsoft with MS Word that had a time limiting function that locked document files if a person used the word processor during the grace period but failed to make the payment before the grace period ran out. The result was a plethora of locked files to which the user who produced them, no longer had access. This presumably was an encouragement to cough up the $600 USD to get a registered download version, or even just to register the existing program in order to once more gain access to ones own work. This forms a kind of censorship by level of income and credit. It is also a kind of alienation as described earlier.

A horrific scenario was recently revealed. As most of modern technology is computerized today, it is susceptible to hacking. The nature of this horror story is such that medical equipment like pace makers and insulin pumps can be hacked and turned against the patient with fatal results (17). The story went on to describe a hacker turning a pacemaker into the equivalent of a taser with fatal results. Similarly, the insulin pump can be hacked to dump the entire contents of the device into the blood stream which would then induce a very painful death by insulin overdose. It is not limited to these two devices, but also includes all medical aids both in hospital and on the street. Electric wheelchairs have been known to suddenly take off into oncoming traffic without the rider's input with disastrous results. There are specific warnings in today's hospitals to shut off cell phones due to RF cross interference with medical equipment of all kinds. Those among us who are wired for life, may suddenly discover that the very equipment designed to support life, becomes their death knell instead. There is also such a thing as RF interference, and one has to design the placement of electronic gadgets to minimize cross interference. At the very least, if two items have to be placed in contact proximity, it is best to isolate them with a sheet of aluminium foil. Many electronic devices are designed to withstand some back scatter of their own incipient radiation, but there is such a thing as overload from exterior sources that can make any other electronics go hey-wire.

Electronic eavesdropping is a fact of contemporary life. There is just no getting around it. In some places, a person just going about their daily routine, will be videoed at least 500 times. They use cell phones that can be far more easily tapped than the land line versions. Cell phone eavesdropping in an era of anti-terrorism has become endemic. All cell calls are monitored electronically by CIA and FBI computers that listen for buzz words that could bring in a human eavesdropper. Words from a long list like terrorism, bomb, ballistic, threats and a host more are enough to generate a signal that will bring in a human listener. Recall, that computers were initially developed for and are still in used by the military. This includes all by products and spinoffs of the computer that use like technology. Cell phones today can access and download from the internet as easily as any lap top or desk top computer and the same kind of content, proving the point that modern cell phones are computer driven complete with the software and all its problems as detailed in the foregoing. In addition to this, the frequency of wireless devices is incompatible with human brain frequencies, causing disruption of biological processes and can result in strange outcomes. There are a host of new ideas that extensive cell phone use can cause disease symptoms in the user including cancers (18). We saw a similar story emerge with people who lived near high tension power lines (19).

False flags are meant to divert your attention away from the real culprit toward a patsy. This is done so that while the patsy is being hounded, the real perpetrator can get away with even bigger crimes in plain sight while blaming the patsy.
False flags are meant to divert your attention away from the real culprit toward a patsy. This is done so that while the patsy is being hounded, the real perpetrator can get away with even bigger crimes in plain sight while blaming the patsy. | Source
What is stopping you from obtaining information on the internet. Chances are it is either censorship or a paywall where you have to pay a fee for a service that was once free.
What is stopping you from obtaining information on the internet. Chances are it is either censorship or a paywall where you have to pay a fee for a service that was once free. | Source

We live in an era of disaster capitalism, false flags and black ops. How this works out in the virtual world is by manipulating crashes and expiration from the outside. Your computer can even be highjacked and held for ransom, meaning it can be locked from the outside and then you are requested to pay a sum by credit card in order to gain access to your own files. Once the credit card information is sent, the card can then be maxed out without your knowledge. If you can't or don't, the computer remains in the condition until you resolve the issue one way or another. This often catches people unaware and they find out at the point of the disaster. Of all the prognostications about Armageddon, the announced ones always fail, but the real ones always comes unannounced and unexpected.

Virtual traps abound and can work effectively to sequester and remove people by way of distraction. We are inundated by all kinds of aps by the internet, gaming and on cell phones that are little more than distractions to deflect people away from doing real things. They are like an addiction. Whether we are looking at people texting while driving or walking or playing internet games, this is a sure way to keep people busy. If they are busy, they won't pop up and do something else that might be considered “low level terrorism” such as protesting over injustice as defined by the FBI (20, 21). If they don't pop up in the wrong place and time instead of at work, at home or shopping, the corporate state can go about its business, however that may be defined, unmolested and without bothersome confrontations.

As computers become smaller, more powerful and shrunk to the point of quantum computing, the threat of crashes due to quantum based events magnifies exponentially. All it takes to destroy a good program is the change of a single bit. The more sophisticated and compact the computer RAM, the more it becomes subject to random quantum events. A single encounter with a chance quantum event that flips a bit to its opposite mode is enough to cause a building cascade of events that eventually corrupts the entire program and brings it to a crash. We cannot control when quantum events will happen that can flip a bit from off to on or vice versa. Now sophisticated programmers are aware of this and may include back up modules to overcome these shortcomings, but that is not typical and such coders probably work for the government and/or military. Most coders who work for the majority of companies are on an agenda to knock off code with little quality control as can be managed to create software that functions on the first go at minimal requirements. These programs are thus sensitive to quantum influences and can eventually arrive at a non working state. These facts prompt continual development and serve as another driver to create ever more sophisticated software to overcome such problems. There is plenty of competition form the various software companies that exist, which adds to the problem. The coder that cannot produce knock offs fast enough, are subject to job termination. There are already enough problems with current non quantum technology upon which most 64 bit software is run. They can be triggered by any number of ways. A power surge or drop is enough to corrupt a running program. Then there are disk errors and programming errors that multiply and slow down or crash computers. Sometimes these crashes are deliberately induced from the outside. At best, even a secured computer that is not even physically or wirelessly connected to the internet is vulnerable. With the development of particle accelerators and particle beams, it is even possible to create destructive quantum events.

The threat that most people are not prepared for is Electromagnetic Pulse (EMP) (22). EMP weapons have already been tested and used as early as the late 1940s during the heyday of atomic atmospheric testing. Technology has gone a long way beyond that now and does not require and atomic triggering episode. EMP can even be selective, targeting a specific locale while leaving everything else intact (23). But this is a last resort that will only be used if all information has already been appropriated and the target requires silencing in the view of the elite.

One way or another, as we become increasingly dependant on high tech, we expose ourselves to an addiction to something that can be used against us collectively in a program of eugenics. Our increasing ignorance on how to live without electronics becomes our swan song by that very dependency on electronics. We can be targeted individually or collectively. One device that has become popular is the flash mob (24), but even this can be used against a lot of people all at once by orchestrating a false flag flash mob. As people show up one by one in a false flag flash mob, the state lies in wait to round them up and disappear them. With all the foregoing, we need to be aware of things actual and potential. It has become a highly dangerous world out there. Be informed, keep your eyes and ears open and play safe! This does not mean shut up, it does mean that care and discretion is necessary in all interactions, real and virtual.

References:

  1. http://en.wikipedia.org/wiki/Difference_engine

  2. http://www.makingthemodernworld.org.uk/icons_of_invention/technology/1820-1880/IC.031/

  3. http://inventors.about.com/library/blcoindex.htm

  4. http://en.wikipedia.org/wiki/History_of_the_Internet

  5. http://5gyres.org/

  6. http://courses.cs.vt.edu/cs3604/lib/Censorship/notes.html

  7. http://www.theglobeandmail.com/news/national/education/aaron-swartz-a-julian-assange-for-the-academic-crowd/article7544023/

  8. http://www.digitaltrends.com/features/the-history-of-social-networking/

  9. http://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2012

  10. http://ccrjustice.org/learn-more/reports/report%3A-torture-and-cruel,-inhuman,-and-degrading-treatment-prisoners-guantanamo-

  11. http://wikileaks.org/

  12. http://www.shmula.com/the-learning-curve/362/

  13. *

  14. http://www.bleepingcomputer.com/forums/topic204619.html

  15. http://healthland.time.com/2012/10/22/wireless-medical-devices-vulnerable-to-hacking/

  16. http://www.cancer.gov/cancertopics/factsheet/Risk/cellphones

  17. http://hps.org/hpspublications/articles/powerlines.html

  18. http://www.zengardner.com/pentagon-says-protests-are-acts-of-low-level-terrorism/

  19. http://open.salon.com/blog/dennis_loo/2009/06/14/dod_training_manual_protests_are_low-level_terrorism

  20. http://www.wnd.com/2012/12/how-to-for-emp-weapon-stunningly-accessible/

  21. http://www.amazing1.com/emp.htm

  22. http://en.wikipedia.org/wiki/Flash_mob

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)