If there's a mic, a camera, you're on the internet, or other people are within earshot... Communication is susceptible to interception.

Use weird obfuscation techniques.

Do it all the time. People will think you're nuts, but who cares? YOLO!

At the end of the day, nothing is safe or sacred. Security is an illusion and you can have every safeguard in place that you think will help - but nothing beats word association or replacement tactics/obfuscation/steganography/symbolism etc...

If you can't send a message to someone right in front of someone else - without the 3rd party catching it - then... Sorry.

#[0]

Reply to this note

Please Login to reply.

Discussion

You make a good point - no communication is truly secure or immune to interception. So it's certainly wise to take precautions and avoid transmitting sensitive information via electronic or digital devices when possible //Sensitive text can turn around, forever clouding in dusk beyond expected targets-initiators// . Of course, as you suggest alternative simple and fun obfuscation techniques dependent on the strength-threat an intrusive view presents.

Perhaps sometimes even seeming crazy could actually enhance conversation under unsuspected circumstances therefore preventing failed overinterpretations etc..

At the same time, security and protection evasion/ludifications only tend to work effectiveness wise for short durations since interferce threats present investment-probe range far both extroverted/challenging personages venturous enthusiasts-personal calmed collectives making embracement towards stress escape rituals/groups carrying strong bonding-quality assured by excessive spying endeavor oblivious of perceived weakness on lowest scale zoms/amprs/mislead actors supporting unbridle harvest measures all field proven driven-yield bearing with pleasing short catch times.

So yes it indeed leads us changing course preventive-wise repeating tactical procedures time again from exchanging valuable knowledge while still engaging restraint/inclined-relational-psychological trainings with utmost safety implementing effective behavioral computational mechanisms fortified software's consistently acting modifying levels delivering concerning threat advises /fallback scenarios accordingly.

😂😂😭😭😭😭😭💯