# What Big Tech is doing NOTE: I'm not a journalist, and my citations are neither exhaustive nor comprehensive. The infractions go back farther than I'm writing here, and they will go farther into the future than I'll ever write. This is just to show the scope within a window of time as someone in the "biz" about what I've run across, and for brevity's sake I cut off the news at the end of 2023. [Hackers](hacking.md) aren't the only groups that individual users should be concerned about. Large organizations have tremendous information power. Since the beginning of [the American Military-Industrial Complex](https://gainedin.site/here-2/) focusing on [decrypting](encryption.md) German submarines in World War II, the complexity of computers has meant there have always been [huge, monolithic organizations](groups-large.md) that design most of the software/hardware. Then, a horde of various smaller public and private organizations design smaller things around it or create [open-source alternatives](legal-ip-floss.md): - In the 1960s, everyone called the big players "Big Blue and the Seven Dwarves", with the computer industry run by 8 companies: - IBM ("Big Blue") - [Burroughs](http://www.dvorak.org/blog/ibm-and-the-seven-dwarfs-dwarf-one-burroughs/) (which eventually renamed to Unisys) - [Sperry-Rand](https://web.archive.org/web/20210812050106/http://www.dvorak.org/blog/ibm-and-the-seven-dwarfs-dwarf-two-sperry-rand/) (which merged its computer-based operations with Unisys in the 1980s) - [Control Data](https://web.archive.org/web/20210812061630/http://www.dvorak.org/blog/ibm-and-the-seven-dwarfs-dwarf-three-control-data/) (which split up and part of it becoming Ceridian) - [Honeywell](https://web.archive.org/web/20211126055223/http://www.dvorak.org/blog/ibm-and-the-seven-dwarfs-dwarf-four-honeywell/) (which suffered many strange changes of ownership and is no longer in the general-purpose computer business) - [General Electric](https://web.archive.org/web/20210824194943/http://www.dvorak.org/blog/ibm-and-the-seven-dwarfs-dwarf-five-ge/) (which sold its computer-based business to Honeywell) - [RCA](https://web.archive.org/web/20220120124729/http://www.dvorak.org/blog/ibm-and-the-seven-dwarfs-dwarf-six-rca/) (who got out of computers altogether and focused strictly on [radio](engineering-radio.md) technology) - [NCR](https://web.archive.org/web/20210930081728/http://www.dvorak.org/blog/ibm-and-the-seven-dwarfs-dwarf-seven-ncr/) (which was bought out by AT&T and then spun off again) - In the 1970s, the government broke up AT&T in an antitrust lawsuit. A few years later, Microsoft signed a non-exclusive contract with IBM and happened to sit in that power vacuum. As the company gained control, he continued to use fierce monopolistic tactics to drive out or absorb competitors, and Microsoft practically owned the market through the 1990s and 2000s. They practically destroyed the shareware industry in the process, and most Microsoft Windows features that most users take for granted were blatantly copied from third-party utilities. Microsoft famously [had to pay Apple $150 million for stealing code for Apple's QuickTime](https://web.archive.org/web/20160304134720/https://thisdayintechhistory.com/12/06/apple-sues-over-quicktime/). - During the dot-com boom in the 1990s, computers shifted to becoming [internet](computers-sofware-webdev.md)-centric, and a few tech companies rose to the top in their respective specializations once mobile devices became ubiquitous. in the mid-1990's, Microsoft almost entirely used Internet Explorer 6 to turn the internet into a Microsoft-themed walled garden. - After the dot-com crash, FAANG emerged after a decade: Facebook/Meta, Apple, Amazon, Netflix, and Google/Alphabet, but other companies like Tencent (owned by China) and Microsoft still fit into it as well. - Given the tremendous power that comes from all the data extraction, governments can often fit into this as well, so this issue isn't strictly a matter of corporate power. - Lately, the acronym is more accurately Facebook/Apple/Microsoft/Amazon/Government, or FAMAG. - Most recently, in the 2020s, there has been significant public attention toward [privacy](people-boundaries.md), and new [AI technology](computers-ai.md) in the 2020s has been released on an open-source license, so corporations have been scrambling to find ways to profit while also *not* losing customers. The largest difference between the computers of today and of decades ago (besides processing speed) comes in how networked they all are. Up to the internet becoming popular, computers were stand-alone, so the information couldn't be used as quickly, and often required physically inserting a disk into the computer. Now, the computers are all linked together, communicating exponentially more information, and *constantly*. The story with Microsoft [isn't entirely over](https://web.archive.org/web/20210903220336/http://ecis.eu/documents/Finalversion_Consumerchoicepaper.pdf), either. There was [irrefutable evidence in 1998 that Microsoft was suppressing competition](https://web.archive.org/web/20220121071930/https://en.wikipedia.org/wiki/Halloween_documents) with a [Court's Findings of Fact in 1999](https://www.justice.gov/atr/us-v-microsoft-courts-findings-fact) and [a full-on antitrust case in 2001](https://web.archive.org/web/20131109175337/https://en.wikipedia.org/wiki/United_States_v._Microsoft_Corp.), but the company was never formally broken up. To this day, they're still trying to affect the [open-source](legal-ip-floss.md) industry adversely with things like [walling off the Hot Reload feature in non-proprietary versions of .NET as of 2021](https://web.archive.org/web/20220205053209/https://dusted.codes/can-we-trust-microsoft-with-open-source). ## Merging Most of the power of huge private organizations comes through a few harmonizing realities: 1. The invention of [the corporation](https://gainedin.site/here/) over a century ago, which is a legally living thing that never technically dies and can hold assets forever for tax reasons. 2. These corporations have accrued *tons* of [power](power-types.md), often before anyone presently alive was born. 3. The business entities gain ever-more power through many, many mergers and acquisitions (e.g., [2021-08 AT&T presently owns many, many entities](https://web.archive.org/web/20210817095525/https://en.wikipedia.org/wiki/Category:AT%26T_subsidiaries), Facebook/Meta presently owns Instagram and WhatsApp). This is ongoing while antitrust litigation interprets favorably to allow large corporations to continuously merge and acquire without regulation. Many of them are [now as powerful as small countries](politics-monopolies.md). Generally, gigantic all-powerful industry players persist in the USA because the definition has loosely been defined as *acting* against smaller competitors. As long as the organizations have [competition with other organizations](politics-monopolies.md), there aren't any issues. Any government oversight needs contrasting oversight of *those* oversight-holders (i.e., "Who will watch the watchers?"). In practice, the only thing a government can do is stop or break up monopolies. Further litigation can create [crony capitalism](mgmt-badsystems.md) by preventing other new startups to enter that domain. In technology industries specifically, antitrust litigation is more difficult than normal because the definition of "monopoly" is very difficult to pin down, even if you simply say "over X% control of an industry": - Google, for example, does *not* consider themselves a monopoly because they define their industry as the information market, and they certainly don't own more than 5% of all human information. - With the right angle, entire *industries* are difficult to clarify. Even if Amazon controls 90% of all [web servers](computers-distsys-enterprise.md), is it a monopoly when someone else can theoretically [spin up their own](computers-distsys-enterprise.md)? - More specialized technology means more capacity to gain complete dominance. For example, in a classical sense most social media is a feed-based [database](database.md), with granted [permissions](computers-cysec-authentication.md) being defined as following/subscribing/friends. [A few examples of the results of this power consolidation](faang-merging.md). ## Privacy/spying Very often, apps/programs have built-in features that collect information the user isn't aware of: - "Trackers" designed to collect specific targeted data (e.g., geographical location, phone call length). - Elevated "permissions" about pretty much anything (recording video, writing to external storage, etc.). While much of the collected data is necessary for [debugging](computers-software-redesign.md), the organization collecting it can abuse it, especially if the user doesn't conform to the same social/political views as that app's organization. Generally, the larger and more powerful the organization and the more features the software has, the more trackers and permissions it'll ask for. Unfortunately, many [operating systems](computers-os.md) design software permissions as opt-in with no timeout, so that one time you use a voice recording feature may mean the organization will track everything you say for the functional life of the device. Most countries around the world [have their systems](https://en.wikipedia.org/wiki/Global_surveillance) to [monitor everyone's activities](faang-spying.md), and they can often use that information in their governance. This isn't always without merit. For example, the battle for intel is why [the US and China fight over naval dominance over undersea network cables](https://web.archive.org/web/20230324115141/https://www.reuters.com/investigates/special-report/us-china-tech-cables/). As time goes on and technologies improve, it becomes increasingly trivial for large organizations to surveil the masses, such as [through Wi-Fi](https://arxiv.org/abs/2405.14975). ### E2E One of the best ways to stay private is using end-to-end [encryption](encryption.md), which means only the sender and intended recipient can see the content. This means anyone who intercepts or holds it (e.g., the company that holds the [cloud storage](computers-distsys-cloud.md), a government official) won't be able to see what it is. [Many entities don't like this](faang-e2e.md). There's plenty of reason for governments to rally support for their cause, so they'll [distort the truth](image-distortion.md) and shut down E2E as much as they can. This is a battle worth fighting for, which is why some groups like [Signal](https://web.archive.org/web/20221018145152/https://www.theverge.com/23409716/signal-encryption-messaging-sms-meredith-whittaker-imessage-whatsapp-china) and [Matrix](https://web.archive.org/web/20200506153643/https://matrix.org/blog/2020/05/06/cross-signing-and-end-to-end-encryption-by-default-is-here/) won't back down on it. ### Tons of user data Large organizations can track *tons* of seemingly unimportant user information. Depending on the organization, this gives them a tremendous amount of power over individuals' lives. Even when an organization doesn't have your name, they will often attach an ID to you. That ID can contain a "shadow profile", which can include all sorts of seemingly private information such as your personal preferences, lifestyle patterns, and political views. The easiest way to do this (though it's becoming harder) is through small files called "cookies". While most of them can be benign (e.g., you don't have to re-enter your [password](encryption.md) every time you go there) some work across websites and can record anonymized user data of where you went. Private organizations can often customize an algorithm to created personalized targeted [advertising](marketing.md) by cross-referencing your interests to find other interests that people like you have liked. Simply permitting an app to access your contacts is enough for them to create a [social graph](data-structures.md) of you and everyone you know. Those systems can be terrifyingly accurate across millions of people, and with a [surprisingly small amount of information](https://web.archive.org/web/20220219225855/https://www.cesifo.org/en/publikationen/2022/working-paper/facebook-shadow-profiles). They can essentially tailor behaviors to 3-5 people they know who are just like you, then provide a precisely tailored [marketing experience](marketing.md) that works to their best interests. There is [a multi-*billion* dollar industry for this user data](https://web.archive.org/web/20210930121000/https://themarkup.org/privacy/2021/09/30/theres-a-multibillion-dollar-market-for-your-phones-location-data), so the allure to sell it is [too much for most companies to turn down](faang-userdata.md). However, they don't want you observing them doing it: - [2021-05 Facebook doesn't want targeted advertisements that display the information that directs those targeted advertisements](https://web.archive.org/web/20210504180702/https://signal.org/blog/the-instagram-ads-you-will-never-see/). - [2023-01 The Interactive Advertising Bureau tracks users all day, but doesn't like users taking steps to observe it](https://web.archive.org/web/20230116123505/https://shkspr.mobi/blog/2023/01/the-iab-loves-tracking-users-but-it-hates-users-tracking-them/). ### Data mining/AI training Occasionally, an organization will abuse private individuals' trust by using their computers' resources without [permission](people-contracts.md) for their use. The most profitable purpose for this is [cryptocurrency](computers-blockchain.md) mining by running the [CPU](computers-cpu.md) at full speed without the user's consent even when the user isn't using their computer, though [AI](computers-ai.md) can also function for that purpose. Microsoft has found another alternative use of user data through GitHub Copilot [since 2021](https://web.archive.org/web/20210709152026/https://twitter.com/NoraDotCodes/status/1412741339771461635). By funneling *all* the code stored in its [Git libraries](computers-software-versionctrl.md), it regurgitates that code through an [AI algorithm](computers-ai.md) (often [copyright-protected](legal-ip.md) or [GPL](legal-ip-floss.md)) then [charges for the service](https://web.archive.org/web/20220621162350/https://github.blog/2022-06-21-github-copilot-is-generally-available-to-all-developers/). It violates copyright and intellectual property law proportionally to how much AI-generated content inspired by copyrighted works is lawful. It's worth noting that machine learning can provide a whole new plethora of tools to stifle free speech. The issue, in all cases, is [using the computer resources without the users' explicit consent](faang-distsys.md). ## Cyberbullying Powerful organizations don't like a few things: - Threats to that organization's power (or that organization's partners' power). - Differing [political views](power-types.md) that may work against the desires of that organization. If you trust large organizations on the presumption that "larger is more secure", don't be surprised when you face tremendous banning/blocking/silencing. They'll very frequently create [horrifying bureaucratic automated systems](mgmt-badsystems.md) to [enforce those policies](faang-bullying.md), where there's little to no chance for individuals to question or appeal their unique situation without public defamation on social media. ## Cyber-coercion They'll also use systems like [dark patterns](engineering-design.md) and tailored data to promote things that people wouldn't normally choose. There are different versions of this: - Google bombing - making a website's search engine results irrelevant to bury that information - Googlewashing - changing the perception of a term by manipulating search engine results - Privacy washing - claiming to protect individuals' privacy while not doing it Another mechanism to manipulate the situation is to prevent net neutrality: 1. By its nature, a computer should be unaware of what it sends and receives on the [lower networking layers](networks-computer.md). 2. Software *in the computer itself* should monitor that information for risks (i.e., layers 5 and up). 3. Internet service providers are giving the lowest network layers (i.e., levels up to 4), so they shouldn't monitor that information. 4. However, there is plenty of political incentive to allow prioritized web traffic for some websites over others. 5. If implemented, the internet service provider both gets to see everything someone does, and also steer traffic as they wish. [There are many examples of this](faang-deception.md). ## The right to repair One closely connected aspect, beyond gathering data, is making more money through inferior products. 1. Consumers obviously want high-quality products, so manufacturers build better products to stay ahead of the competition. 2. However, if those products are *too* good, they can last a long time. Singer sewing machines, for example, became so robust that grandmothers were handing them down to their granddaughters. 3. Computer parts are no exception to this reality, and manufacturers make them with "planned obsolescence", which are engineered to break down after a predictable period of time, typically a few months outside the window of the warranty period presuming typical use. This is a [scientifically proven trend with electronics](https://web.archive.org/web/20200303095638/https://www.endseurope.com/article/1646040/electronic-goods-life-spans-shrinking-study-indicates). For example, [Western Digital budget hard drives are arbitrarily slowed-down by up to 50% as of 2021](https://web.archive.org/web/20210826122849/https://arstechnica.com/gadgets/2021/08/silent-changes-to-western-digitals-budget-ssd-may-lower-speeds-by-up-to-50/). Users can push back on this by learning [how to replace parts](https://adequate.life/fix/), meaning an aftermarket battery or hard drive can often make devices last *years* beyond when the company wants them to buy another product. Since the consumers aren't making large companies any money by doing this, they often try to thwart the users' "[right](people-boundaries.md) to repair" by [inserting arbitrary barriers to the product or obstructing the users' rights](faang-r2r.md). This makes general sense about why people accept this situation. As computers get [cheaper and smaller](computers-embedded.md), they become more commodities than tools. However, it means people can't repair their things, meaning that companies can ratchet up prices with consumers being stuck either paying for it or living without it. It also means it creates more waste. ## Incompetence Of course, large organizations are made of many people, and humanity is prone to fallacy. Sometimes, things fall through the cracks in [large, unwieldy systems](mgmt-badsystems.md) with [zero malicious intent](faang-incompetence.md):