A Quote by Edward Snowden

If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. — © Edward Snowden
If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.
The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.
These 'free' applications ask for permission to read your emails, your text messages, listen to your phone calls, record video from your phone. Why else would someone spend millions developing an application which they then give away? Kind-hearted, maybe? Get real.
Like most people, I'm on my phone a lot during the day, there are always work emails coming in or emails persuading me to buy more shoes. Honestly, I'm probably on my phone a bit too much. I'm addicted to Twitter and Instagram.
The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone - if a hacker or something images your phone - they can't read what's on the phone itself, they can't look at your pictures, they can't see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example.
You're a kid, your whole life is awesome. It's awesome, right? You had no money, no ID, no cell phone, no nothing, no keys to the house. You just ran outside into the woods. You weren't scared of nothing. I challenge you to do that as an adult. All your IDs, all your credit cards - just run out of the house with no phone, turn the corner where you can't see your house, and not have a full on panic attack.
There are organizations like Southern Poverty Law Center, there are some private investigators that work for the Republican Establishment, that actually use technology to hack into your phone. ... Secure your phone. Black Phone by the makers of Silent Circle is probably the most secure phone out there.
When you wake up, instead of checking emails on your phone, or counting your retweets, pick up a pen and scratch a few sentences into a notebook.
I'm exceptionally email un-savvy, so to reply to my emails is like a torture. It's like literally, half of all my emails, I get my secretary to type out for me. And the personal ones, I avoid and just pick up the phone and call them.
There's great value to knitting or digging up your garden or chopping up vegetables for soup, because you're taking some time away from turning the pages, answering your emails, talking to people on the phone, and you're letting your brain process whatever is stuck up in there.
We're surrounded by distractions. Whether it's emails, phone calls, text messages, social media notifications, or people entering and leaving your workspace, those distractions end up eating a good portion of your time.
If you were watching CNN, they were saying the NSA is listening to your phone calls. It's reading your emails. When you call your grandma in Arkansas, the NSA knows. All total bulls - t. They made the public more concerned about the privacy issue than the legitimate facts should have done.
I love flying so much. I even airplane food. No one bothers you and your phone never goes off and you can't have emails go through. It's undisturbed.
If you spend your time away from work looking at emails and making sure your inbox went down to zero, that's not an effective way to spend your time as a CEO or an entrepreneur. Often times, those emails aren't that important.
I love flying so much. I even like airplane food. No one bothers you and your phone never goes off and you can't have emails go through. It's undisturbed.
Every day, I absorb countless data bits through emails, phone calls, and articles; process the data; and transmit back new bits through more emails, phone calls, and articles. I don't really know where I fit into the great scheme of things and how my bits of data connect with the bits produced by billions of other humans and computers.
In the black-and-white world of a girl in her late teens, I thought of things like Internet etiquette as obvious, rule-bound institutions. Facebook was Facebook, texts were texts, emails were emails, chats were chats, webcamming was webcamming, phone calls were phone calls.
This site uses cookies to ensure you get the best experience. More info...
Got it!