I’m learning a language, I speak it in public to other people who do. I don’t research the language, because I have some old text books on it. My partner doesn’t speak it and doesn’t research it on their devices. I don’t normally have my phone on me in public, but my partner does. It took about 4 months of publicly speaking in the language before they got ads

What do you think this means?

::edit::

It was a Reddit ad and my city has embraced those AI smart cameras, so I assume some of those are Google owned which makes sense with Reddit and Google’s recent alliance. This is assuming our devices aren’t listening to us without our permission and AI cameras are mining data on passersby

Other theories are that since cellphones are involved it doesn’t matter if I nor my partner ever searched for the language, at some point my phone or partner’s phone was near someone who spoke that language and the data brokers/ad sellers inferred from there

Seems like the consensus is that I must have posted in the language on some social media or used Google to research it or made some new friends who speak the language and that’s why

  • aviation_hydrated@infosec.pubOP
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    What I’m saying is I don’t have an internet profile like they do. I have never researched this language on the internet and have only purchased books for it in cash without a cellphone on me, so this specific overlap is weird

    I’m not saying “oh wow, the NSA has a profile on me, how??”, I’m saying, I have kept this specific data private from my direct internet connection, how are the data brokers targeting family member devices

    • fishos@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      Says the person with a Lemmy profile. Do you pay bills online? Do you search things? Use maps?

      Congrats, you have a shadow profile out there logging all the data about you.

      You didn’t keep shit private if you’re carrying a GPS tracker on you at all times, which you are(your phone). You are VASTLY misunderstanding digital privacy and how statistics works. You don’t have to type a single foreign language word for them to know you speak it. Just go to places and hang around people that it knows speaks it and it’ll make the assumption. Every person you interact with who shares EVERYTHING is, congrats, basically a snitch on you as well.

      It’s statistics, like I said.

        • otp@sh.itjust.works
          link
          fedilink
          arrow-up
          0
          ·
          5 months ago

          That sounds legit. If your GPS location is on at all times (assuming this is on your cellphone), then they’ve got enough geolocation data to associate you to your partner.

          And if it’s off? Your SIM card is acting like a GPS (though a less-accurate one than your phone). Do you trust your mobile service provider to not be selling this data? (And this would be even more of a factor if they’re also your partner’s service provider, and/or your ISP)

          • aviation_hydrated@infosec.pubOP
            link
            fedilink
            English
            arrow-up
            0
            ·
            5 months ago

            Yeah, so a mitigation would be to remove the GSM chip and be WiFi only, with a Faraday cage to ensure the WiFi is not on by accident or the software is backdoored. Also would need to remove the mic and speakers to avoid any cross chatter

            But at that point might as well just have a laptop with external WiFi only

            • FierySpectre@lemmy.world
              link
              fedilink
              arrow-up
              0
              ·
              5 months ago

              Anddd… You use wifi to connect to their servers, so they’ll have your residential ip (unless you got a VPN on at all times… And even then there’s probs some way to fingerprint you enough). Partner uses the same wifi network and your profiles are linked again…

              There really just is no way to completely escape. Blocking all ads and trackers on a DNS level (using a pi-hole or external service like nextdns[paid, but its pretty good]). Is a good solution though, at least you won’t need to actually see ads