Sep 262015

NV7C6Y    “intro & overall”

  1. NV7CAX  ‘This {post & its comments}’s ‘TOU(Terms Of Use) including copyright ©, confidentiality/privacy, info’s allowed use’ is’s default TOU(Terms Of Use) except: none.
  2. ‘Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say’ --Edward Snowden

    1. NV8KRL  Good article on this excellent quote by leading whistleblower Edward Snowden.
    2. NV8LKY  Apparent image source.
    3. NV8LLD   ‘nothing to say’ really should be ‘nothing controversial to say’ –yes, that’s not as strong, but accurate-so-fair & still makes the point.

    NV7CBW  post name:

    ‘‘under construction: ‘purchasing & servicing privacy’ + ‘common problems’ of ‘items where purchasing or servicing can inadvertently compromise the privacy of its owner(s) & users(s)’ ’NV7C6Y

    1. NV7GIJ  ‘‘section history additional’ ‘in reverse start order’:’ name…
      1. NV7GGR    now originally to next:
        1. NV7GIW    “per post name, add post to categories”
          1. NVAY9W  
  3. NV7CVH    To reply & discuss, please use’s default methods (click) except: none.
  4. NV7CXU  table of contents overall for remainder: ‘definition’ + ‘post history additional’

  5.  NV7CK9  ‘definition’:
    1. NV8PCS  ‘purchasing & servicing privacy’
      1. NV8VJA  This section I wrote to help lawfully & especially morally acting people…
        1. NV8VJP   to easily explain to their associates by just pointing them to this article
          1. NV8VNL  why they their customer, responsibly
            1. NV8VQ9   …doesn’t want to them to know what is being asked for only giving pseudonym(s) for the customer used just for the device’s selling/servicing
            2. NV8VXT   TBA
      2. NV7D6G   By design this item is commonly if not normally linked to personal info,

        1. NV7E7J  so to maximally protect the privacy of that info, 
          1. NV7FSZ

            those selling & servicing this item (but not owners or their normal users of it) should not-at-all else minimally be able to specifically identify the item’s owner(s) & user(s) in any context other than {that job of selling & servicing ‘that item et al’}

            1. NV7DZK   in other words (which to so far seem to be equivalent to me), when it comes to who owns & uses ‘that item et al’, those selling & servicing this item (but not owners or their normal users of it) should only to know absolute need-to-know info, specifically so they could only-minimally and ideally could-not specifically identify the user(s) or/and owner(s) in other contexts.
            2. NV7QKN   where ‘that item et al’ is defined: ‘that item & likely service/seller replacements & maybe other items the same make/seller/servicer’ has explanation:
              1. NV7QUY   Limiting to ‘that item’ is top privacy as then every item appears to have its own owner(s)/user(s), so no automatic way to link owner/user info of/from one item to another.
                1. NV7R8O  for top privacy, we could sell or just dispose the item(s) which are no longer working for him/her, then buy some others as replacements
                  1. NV7R9D   This avoids having trail between devices.
                  2. NV7R90  per most famous & seemingly-extreme example burner phone
                    1. NV7X28   where generally the item (phone) is still technically working except the phone #/id is now suspected to be known by undesirable tail(s), so it’s rid and other used.
              2. NV7QXQ   adding ‘service/seller replacements’ (of ‘that item’), a likely addition, covers the case when item(s) needs to replaced with other(s) by the seller/servicer/make/provider,
                1. NV7XR7  which happens routinely when at least 1:
                  1. NV7XRR  an item is broken, and the servicer elects to replace instead of repair, which in many cases is the servicer’s choice as part of their TOS
                  2. NV7XSX   an upgrade/downgrade of it is desired.
                2. NV7XTX   however, since here we’re going to the trouble of replacement items, it occurs to me: why not give the replacement items their own owner/user identities, unassociated to any others, for top security?
                  1. NV7RIR   But this requires having the servicer/seller send the replacement item(s) to another identity, which has problems as:
                    1. NV7ROO  A trail is still left, via the servicer’s records, unless the servicer broke the trail, which seems likely they’ll refuse to do or can’t do.
                    2. NV7RNP   I’ve never heard of a servicer/seller set up to do this
                    3.  NV7RQO   the server may decide to instead fix the item, indeed as may be their right, in which case the item stays the same so no trail breaking achieved but we do achieve the confusion as the customer now has to track where the final item will be/was sent to.
                  2. NV7RUY   so here it’s simpler to just use the same identity for both the item(s) and their replacement(s)
              3. NV7RZK   adding ‘other items by the same make/seller/servicer’, a maybe, makes sense when the privacy lack of doing that is tolerable
                1. NV7S22   for instance, a most clean example: if a RAID hard drive array is built out of say 5 hard drives, where then by definition every drive gets a seemingly-random portion of the same data, and the drive is fully-erased for servicing, then the same customer pseudonym can be used for all the drives in this array, at least for a few drive replacements, as these drive uses link only to each other (the same use) not to any other items nor activities of the customer.
            3. NV80C1  Obviously the foremost way to protect against identity theft and all identity abuse is to NOT be collecting & giving global personal identifiers (aka PII) in the first place!
              NV8JV8  More on this at the ‘mitigated’ paragraph in here.

              NV7G71  so

              1. NV7E87   {such device/service} sellers & servicers, starting first with their order & service-request forms, should NOT require, and ideally not even ask-for and not record & remember, any info which could reveal who owns & uses the item which exactly identifies owner(s)/user(s) in other contexts, aka is anything beyond pseudonym(s) used just for the device’s selling/servicing}.
                1. NV8PT6   Consequently we vote on your order & service-request forms and other customer questions, that you NOT require any potentially optional fields/info, as First & Last name, specifically you NOT require any field which would globally personally identify the customer
                  1. NV8PZC   except of course as required by law, and then, along side your asking, also cite the exact law text requiring this info
                    1. NV8QUJ  –quote the text or/and its section ID including provide the URL to it
                    2. NV8QV0  so the customer can verify & read the law find its justification plus contact appropriate governmental officials if the law needs correction
                    3. NV8QHT   within the US, the biggest example is from the CIP(Customer Identification Program) of the Patriot Act
                      1. NV8QQU  such as law CIP § 103.121 ‘(i) Customer information required’
                2. NV7YUL   Some notable examples
                  1. NV7ZW8   in online services
                    1. NV7ZTK   WordPress site accounts by default don’t even require an account name, just an email address to cut down on spam & verify the account holder is reachable.
                    2. NV7ZAC   Google accounts allow the account holder’s name to be fictitious; but infamously not Facebook accounts.
                  2. NV7Z9O  in pre-paid mobile {phone & data} service:
                    1. NV8RR2  it seems most if not all carriers now get this except for servicing.
                      1. NV8RY2  for purchasing: yes: one can use cash and not give any names and definitely not ID, including to start up & continue service.
                      2. NV8RZ3  but for equipment-servicing, except for MetroPCS seemingly, seems one is still required to do that via mail including to provide a valid mailing address, so typically also a valid name, though (tough) workarounds.
                    2. NV8SAG   Walmart’s prepaid phones/mobile-devices are from nearly every carrier and…
                      1. NV8SC0  can all be bought with cash & no IDing.
                      2. NV8S5O   but for servicing, even via their warranty program (New), stores told me 2015.01~ one must do that by mail, so expose a valid address
                      3. NV8SFN   but have some of the best deals in mobile service
                        1. NV8SZV  especially T-Mobile service via their devices sold by Walmart-only regularly give unbeatable deals for mobile data: example 1+example 2 (latest)
                    3. NV8RPE   T-Mobile slowly got this for at least purchasing their pre-paid phone service.
                      1. NV7YUX   In 2013, when witnessing the registering of a Walmart’s T-Mobile’s Samsung Exhibit II, I was delighted to see T-Mobile’s signup web form did NOT ask for account owner’s name, just an email address plus {a DOB for password recovery so which could be filled out with any date}.
                      2. NV8S3Z   But for servicing devices, T-Mobile stores told me 2015.01~ one must do that by mail, so expose a valid address
                    4. NV8RN7 MetroPCS got it seemingly all along. Specifically,
                      1. NV7Z4U   In 2011~, 7 of 7  MetroPCS stores told me the customer could fill in the name & address fields with whatever information they choose, and indeed when buying a phone there, at our request, the rep made up a name and  for the address, filled in the Metro PCS headquarters address.
                      2. NV8RNG   Also at that time, I recall they also said they processed their payment card payments by 3rd party processor which did not then reveal to them the name on payment card.
                      3. NV8RVX   In 2014, a local MetroPCS store told me that at any store, a customer could drop off broken equipment for repair or possibly immediate replacement, so then get the phone serviced without ever having to show ID.
              2. NV7DV2  selling & servicing the item should be via pseudonyms for the customer used only for selling & service of ‘that item et al’ 
                1.  NV8PPD   For proper privacy protection, names & contacts for the customer are pseudonyms used only ‘that item et al’ sale & serving
                2. NV7KZ8  where, the customer/user can keep track of what pseudonym she uses for each organization or/and item
                  1. NV7KZG   via a Google Spreadsheet (JotHere’s intro)
                    1. NV7L36  this is the best solution I’ve found, and works very well
                    2. NV7L3J   more TBA
                3. NV7HSU   where, for the customer’s/user’s…
                  1. NV7HTK   name,
                    1. NV7HUG   it should not be asked but if required, should be generated (good example) just for that purchase/service
                  2. NV7L5K   phone number
                    1. NV7L5Z   it should not be asked as an ‘email address’ is more permanent (can last infinitely at 0 cost), is dramatically less costly per address (as pennies per month, if that, compared to ~$5/mo min), and ‘Discussion via electronic writing preferred wherever that can be made do the job best’
                    2. NV7LF1   if it is asked but not truly needed, reply with
                      1. NV7LFF   ‘please email’ –but sometimes that will be refused, so the
                      2. NV7LL2  else ‘1.[your area code].000.0000’
                      3. NV7LG0   else ‘1.[your area code].555.[4 random digits]’
                      4. NV7LJ3   else ‘1.[your area code].[7 random digits]’
                        1. NV7LN1   except here, if the number might actually be called, please ensure you pick a number which is not actually in use and ideally won’t be in use while you use the #, as to not upset the # owner nor allow the # owner get your information/items.
                    3. NV8T2Y   phone calls to even toll-free numbers without revealing any meaningful caller ID
                      1. NV8T9E   is regularly useful for dealing with orgs, especially business, which won’t operate properly any other way (but by phone calls) but you’re legitimately not ready now/ever to give them a phone # for you.
                      2. NV8T84  can be done by methods including:
                        1. NV8T4N   Skype buy buying Skype Out (Skype dialing minutes) without buying Skype In aka Skype phone #(s) –works well.
                        2. NV8TDH   unfortunately seemingly NOT Google Voice (as impossible to hide outgoing caller ID)
                          1. NV8TFH  but I’ve heard but not tried workarounds.
                  3. NV7HZ7   ‘email address’
                    1. NV7HZT   should be generated just that purchase/service.
                      1. NV7I0N   doing this is tricky but can be streamlined & done fast.
                    2. NV7KAQ   username should be non-identifying, probably best just a sequentially assigned alphanumeric counter; KCGUIDs work great.
                    3. NV7KDQ   domain should be one not particularly tied to you (the receiver) and ideally used by many people.
                    4. NV7KEZ   incoming mail to this address should, by default, be forwarded to you (the receiver) infinitely, only turned off as truly required, as from unmanageable spam.
                      1. NV7KIS   unlike the common disposable email address as the goal is NOT to cut off communications, just to protect identity of the address user.
                    5. NV7KM6   sending from this address
                      1. NV7KQV   –the setup of this–
                        1. NV7KML    can be deferred until it’s actually required
                        2. NV7KSI   can be well (but slowly) done by having the domain’s email settings create an email box with a password for it, then have your email client, as Gmail service, set up to send from that email including by providing that password.
                      2. NV7KOQ  is typically NOT required, most services just want/need an email address to notify you or/and to verify it’s you or that they can reach you, not have you send anything to them via it.
                  4. NV7IN7   mailing/shipping address (as a pseudonym)
                    1. NV7INS   is hard
                    2. NV7IOX   if required but not going to be used, as a gift-card registration, seems best to use a random nearby actual address (but not the same name) found by or similar.
                    3. NV7IQM   if going to be used, possible solutions are:
                      1. NV7J1M   use the address of an associate who is minimally linked to you but will still give you the package when it arrives.
                        1. NV7J59   Unfortunately, many people don’t understand the legitimate need for this,
                          1. NV7J6M  so you might want to show them this article
                          2. NV7J74   so, until folks do,  you may have to use someone who is more linked to you than is desirable (as a friend)
                        2. NV7J8N   What you need to the person.
                          1. NV7JCX   should be minimal so the addressing used to send you the package can’t be tracked back to you except for this package.
                          2. NV7JG1   your physical address or even mailing address –NO, if avoidable, Rather you, or better someone on your behalf, picks up the package from them.
                          3. NV7J9E   Who the package will be from (if you know, which you generally will)  –generally tell that.
                          4. NV7JB1   who the package is to actually you may NOT need to say, as the other description is enough, and then
                      2. NV7IRT   a nearby regional UPS center doesn’t work, as it requires, to pick up the package, a valid photo ID matching the picker-upper appearance with the package recipient name, probably as result of a Patriot Act.
                      3. NV7IXG  a POB doesn’t seem good, even someone else is, because the PO is to & may reject the package if the recipient name isn’t officially listed on the box, which requires the a matching valid photo ID.
                4. NV7Q47 ‘‘section history additional’ ‘in reverse start order’:’ name…
                  1. NV7Q4O   its & its parent’s title is based on seeing form NS0N9T.pdf saying ‘[By its design, product is linked to personal info; so its servicing is requested via pseudonyms used for only its servicing: ]’
            4. NV7G5G   so the customer’s accessing the item, especially purchasing & significant-service requests, should be from an anonymized IP.
            5. NV7F15   so purchasing of & payments for the item should be done via a highly anonymous payment method
              1. NV7F3C   as
                1.  NV7F4H   cash
                2. NV7F5C   gift card, as notably Simon Gift Card, bought by an anonymous payment method and not registered else registered to a fictitious name
                  1. NV7IJT  some more similar-sounding details at
                3. NV7I8X  in when bank or equivalent can be trusted (questionable) plus maybe other lower privacy needs, maybe controlled payment number aka virtual card number as  BofA ShopSafe® but…
                  1. NV7JPO  I have no experience here
                  2. NV7JNJ   first note warnings as perhaps
          2. NVAYDF  aside: per section title, add post to category: ‘privacy ensuring N0BV66’
        2. NV7LT2   where ‘device/service linked to personal info’
          1. NV7LV6  is increasingly & extremely common today: see the items list
          2. NVAKW0
          3. NV7NXF  readily cause abuses if (the personal info) is linkedcan can cause significant inadvertant consequences if a 3rd party (as seller/servicer)  knows  normal identities of the item’s user(s) or owner(s) by:
            1. NV7N5K   Example: ‘Oh my god, this item belongs to…’ ‘a celerity’ or ‘someone I don’t like’ or ‘someone I want to control’ or ‘someone I’m real curious about’.  ‘So let me leak what I found.  Indeed, let me dig thru it for more info.’
            2. NV7N6E   Example: ‘Oh, they guy left is credit card #s. Since I’ve also got his name & address, I’ll go sell that’
            3. NV7PGD   Example: ‘Oh, I see by her document here this gal’s about do a whistleblowing on us or our friends. Well now that I know her normal identity and even physical address, we’ll put an end to that! Starting with a personal investigator to dig up dirt on her. And if gets real bad, as we can’t blackmail her to stop, then a hitman –now that we know where to send him.’
            4. NV7PV2   ‘Example: Oh, look: this guy’s a pot grower. Yeah drugs may be legalizing but pot still isn’t yet legal here; and my brother became a pot addict. So now we’ve go his name & identity, let’s report this guy to police.’
          4. NV7DGB   can be by 1 or more often subtle methods:
            1. NV7NAR  If the item seller told the buyer(s) or user(s) normal identity, she may tell, indeed may be required to tell, the maker, servicer, government, payment processor, and/or other service provider(s) they collaborate with, along with the item’s exact identity
              1. NV7NFN   most notable example is mobile phones (ESIN & phone # reporting), but there are many others.
            2. NV7DHS   If device or service stores personal info, so unless it also well encrypts that info including from the service/device providers & services (rare claimed example: SpiderOak), many getting access to the device/service, especially its internals, can not only get that personal info, but link that personal info with the owners/users.
              1. NV7MWZ   If item maker/server is given a normal identity of the owner(s) or user(s) of the device, 1 or more bads can happen:
                1. NV7N25   s/he may abuse the info found on the device/service:
                2. NV7N84   The maker/servicer’s security, especially data security, can be breached and their customer records, or access to cusotmer’s property, compromised
                  1. NV7NI8   some real examples:
                    1. NV7NIJ   I’ve heard T-Mobile’s customer records were hacked 3x.
                    2. NV7NJ6   Target’s customer records were hacked
                3. NV7NOL   if the item is ever physically acquired by un-trusted party (as it or its password being being lost or stolen or others) and it’s data hasn’t been sanitized, that party can not only get that data
            3. the seller/servicer or  that party may be exploit that personal info by using the the device’s {serial #(s)  that personal info can link to
            4. it may gather & store it.

      3. NV7GUJ   ‘items where purchasing or servicing can inadvertently compromise the privacy of its owner(s) & users(s)’
        1. NV7GWR   are generally:
          1. NV7HKN   online services notably wherever the user logs in
          2. NV7HJZ  communication services
          3. NV7M2F   software unless {verified against such privacy violations, which typically requires: {open-source or/and popular} and where {you run it yourself so can insure no mods to it}}
          4. NV7HKD  computing devices including mobile computers
          5. NV7HK5   mobile phones
          6. NV7HPK   {image or/and audio {capturers/gatherers including recorders/cameras/scanners/fax} or/and renderers including printers/{players & tuners, including TVs & DVRs & including {Roku & Chromecast}-like, even disc players}} if user data they {store or/and especially ‘transmit to outside parties’transmit to outside parties {parts (as titles of what played/recorded) or/and  with service/device/user identifiers} to outside parties as the maker/servicer}}
          7. NV7MHV   info storage devices/services except: {after the user data has been sanitized as removed or redacted} and {the device didn’t transmit its ID(s) in a way which could compromise this privacy}
          8. NV7HR0   other devices & services which process info, especially
            1. NV7MJV   process personal info
            2. NV7MKJ  store info
            3. NV7MLX  contains computer(s)
            4. NV7MM7  ‘transmit to outside parties’
              1. NV8J1J   where ‘outside parties’ is typically the maker/servicer or {other affiliates as {reviewers as rating agencies as Nielson or government as PRISM}}
              2. NV8J34  data as 1 or more of:
                1. NV8J62  identifiers as {serial number or/and similar exact-item identifier(s)}, user, owner
                2. NV8J6D   user data, which is often just parts as titles/channels played (for Neilson) or ‘phone numbers called and e-mail addresses[ sent to]’ for PRISM
      4. NVAYL8 aside: per section topic, add post to category
        1. NVAYHK  ‘information service NPUZRF’
        2. NVAYKV  ‘info device MJQ0HI’
    2. NV8G1K   ‘common problems’:
      1. NV8G20   I write up also per my mission (my profile), specifically to save many others from having to write this up especially given the combo:
        1. NV8GKU   the writeup often is best done via web post (due to the inherent the complexity & detail, which is a pain & time-waste to get right & complete every time such service request comes up) however
        2. NV8GMK   unlike me, still so far few people have a privacy & security talk pseudonym for posting, indeed it’s enough for them to just create a pseudonym for the service request, so then they writing up the web post (which they would then have to point the servicer to) would compromise their privacy here, as the servicer could see by their web post a normal identity for them so know who would was making the service request.
      2. NV8H1T   ~‘failure of electrical connector from bad product design’ –new post TBA
      3. NV8HGL  more TBA
    3. NV7D2O   1st draft of text which was to be sent, quote:
      1. subject: NV7AHD: USB input internally broke from normal use
        body: NV7AIP: …as the way the USB input is placed and especially with {the USB cable provided, where the plug notably sticks straight out}, the internal USB connector is exposed to high torque stress under even normal use, so this is a fault of common but still bad product design, so really should be repaired at no else minimal cost to me. How much to repair? If the soldering or similar is not too tricky, I can do it myself with direction and necessary part(s). Fortunately by externally charging the battery (which is fortunately removable) plus removing the scans by the other normal means provided, I can mostly still use the the unit, but I can’t upgrade the firmware. I use the unit every ~3 days, so being without a unit for longer than that is a problem; I’d rather pay for working unit then, when received, send you my broken unit unit for a refund of that charge. Due to the fact that type of device, by design, gathers & stores very personal information, for proper privacy protection, all names & contacts for us here are pseudonyms used only for this repair; and we vote you, on your service requests as this, make NOT-required potentially optional fields/info, as First & Last name,
  6. NVAMHQ   ‘due to our info society’: due to our increasingly information-based society including for our economy + socializing
  7. NVAMBE   Privacy breach  
    1. NVAMEX   avoidance
      1. NVAMFC   has become complex very much & still increasingly
        1. NVAMNY  ‘due to our info society’
        2. NVAMOG   that many people, especially including seemingly most individuals, have just “thrown up their hands” and said ‘({the right to privacy} has become a joke as with all our cameras & data correlation & sharing) there is no privacy any more, at least not individually, so just accept that
          1. NVAMQM   however that appears a serious mistake as:
            1. NVAMS9   larger organizations plus individuals with money can & typically do work to protect their privacy, as they still have the money & resources to buy privacy (which has become expensive), then putting them in a position undue power, which will be on average destructive given humans aren’t ready for that.
              1. NVAVOS   Indeed the job of whistleblower is by definition to expose hurtful secrets kept by these few in power.
            2. NVAMVZ   for everyone, humans are not yet evolved, both by nurture & especially nature, to properly handle being given so much info on other people.
              1. NVAT4O   There is much to be said on this topic; this section is just in its beginnings.
              2. NVATAD   Fortunately it now (2015) feels most people are in agreement on this when it comes with at least the keys our info info castles –passwords & PINs are to really be kept secret; plus no one any more seriously uses providing a SS# as the password to an account.  But as late as ~2003 it felt people still were often okay with sharing passwords, phone lines, email accounts, and the like, plus even until 2005 phone companies took a caller providing the account holder’s SS# as then that must be the account holder, from then not fully seeing the importance and abuse possibility & reality in our increasingly info-based world.  But there is much more to go.
              3. NVAN9D  examples
                1. NVANAG   an associate I well know put up a web profile of himself…
                  1. NVANSC  where
                    1. NVANSC   it was true & complete, including:
                      1. NVANTW  it gave his legal name, and even his home address
                      2. NVANSV   for all he could think of, it listed all his strengths & weakness and what he liked & disliked in business & government & friends & even romance, etc, in explicit detail
                        1. NVANY0   where these details about him were very logical so nothing shocking for an intelligent mature person,
                          1. NVAPEY   especially to compared to many personal web profiles on the web today, a significant number even with the goal to shock to draw attention to themselves.
                    2. NVAOJ8   for a time, like a personal resume, to those he met in person who he wanted to get to know, so they could fast learn about him, too, he would often freely give them a printout of  key portions of  his web profile (and which also included the URLs to those portions so the person could see the full & latest profile online)
                  2. NVAPO6  but it was pioneering in sharing personal details, indeed way ahead of its time there, as:
                    1. NVAPQH   foremost, no one generally shares that much of themselves with the world and often with anyone, especially  including the real bad, too, and balanced, especially in those days and still today (though that’s slowly reducing, most notably by folks coming out as LGBT), but it just made sense to him that ‘humans come with instructions’, indeed which he said in the profile.
                    2. NVANX6    when: about 4 years before MySpace, so then ~8 years before Facebook, so that many years before hardly anyone put up a web profile on him/herself except maybe a paragraph bio for business/academics they were sharing.
                    3. NVAQ2I   a personal resume in still not yet taken seriously
                      1. NVAQ66  though Facebook’s timeline may be starting to move people in that direction (minus Facebook drawbacks plus such a service {allowing gaps} plus {inability to include content from other providers})
                    4. NVAQ3U   it even trusted legal name & home address, a kind of trust which has long been lost.
                  3. NVAQI3   so the reaction he got was 100% negative and life-shaping painful, most notably 2 incidents:
                    1. NVAQN9   his profile got featured on the now-defunct website, a website dedicated cruelly publicizing and laughing at weird-appearing people found on the web, which generated so many visitors on his personal profile with people gawking him that it brought to a crawl the DSL connection hosting his web profile.
                    2. NVAQZH   at 2 of 2 of the local colleges where he would occasionally visit, including one because his parents for decades worked there, indeed why he was born & raised there, to a handful of the people he had met there who he thought he might want to know so had given that prinout per its design; none of them said any objection but
                      1. NVARHS  a significant portion, acting in complete negative prejudice, behind his back handed the printout to campus safety.
                      2. NVARIM   the campus safety offices took these mis-reports seriously enough to save the printouts, even though they didn’t know him,  and then also behind his back,
                        1. NVARKO   did not contact him, notably to investigate if it were true, even though the printout featured not just his legal name but his phone # & email right there.
                        2. NVARNH   {the one at the college where his parents worked at for decades so why he was born there} also mis-banned him from campus(!) over this, including making fake report against him in the campus newspaper to announce & justify it, and again without ever contacting him. Yes when someone knowing him saw his name in the newspaper so properly informed him, he able to get the ban thrown out –though never an apology nor amends—, and about 2 decades later he also learned, from the present assistant head of the office, that the head who had done this had a history of such abuses and was eventually & pleasingly no longer in that job, but, especially without those amends, for those 2 decades the experience gave him great undeserved pain, especially coming from the local college of his parents & childhood.
                2. NVANA4   more examples TBA
              4. NVASW1  One reason humans aren’t ready is because else related-to-the fact many if not most humans are still mislead by gossip.
                1. NVASSF   The reason gossip does so much damage is people hearing it act it without insuring they’ve gotten the full & reliable story.
                2. NVAT14   Well privacy breaches typically expose incomplete pictures or matters which we aren’t used to having revealed to us, so which humans then act on as they would gossip.
    2. NVAL1O    consequences
      1. NVAL8O  are increasingly significant ‘due to our info society’
      2. NVAL2S   being good or bad or mixed
        1. NVAUZF  varies according to situation and is quite complex with no clear explanation that I know
        2. NVALXA being notably bad
          1. NVALWG   for society on average
            1. NVAV8A   is believed by many, including:
              1. NVAWLV   probably by most whistleblowers, including:
                1. NVAWHM   By me: at least some of my big reasons.
                2. NVAWKL  by Snowden,
        3. NVAV0R   depends on which party, specifically side of the fence, where
          1. NVAV1T   for the party loosing privacy
            1. NVAV2W   it’s generally bad…
              1. NVAV4F  unless in many/most cases when the party was/is doing a bad thing.
                1. NVAY38   notably in cases when the party becomes eventually grateful that they were caught.
          2. NVAV5Z  for the party gaining the breached info
            1. NVAW2I   their gain/loss here
              1. NVAW3M  varies and is hard to say
              2. NVAVZ6   can be somewhat good
                1. NVAW5W   especially if what was being done was bad
                  1. NVAW6U   as the case for all notable whisleblowings.
                2. NVAWBA   but generally only short-term
                  1. NVAW58   if the party then abuses the info
                    1. NVAW93   consciously, as using a stolen pin or credit card to steal money
                    2. NVAXZ5   unconsciously, as some cases of mis-taking their own hurt out on others.
              3. NVAM5S   can be bad
                1. NVAWDO as notably when they mis-react, as overreact, from it

  8. NV7CW6  ‘post history additional’‘‘post history additional’ ‘in reverse start order’:’
    1. NWA3G6 ‘{post.status.snapshot{;date ’20151015Thu1326pst‘;after ID ’minutes 0‘;revision ’4‘;version0.4‘;words ’5042‘;as ’much TODOs but continue to publish‘;do ’Publish 2‘}}’
    2. NW498R   {add this post to category ‘whistleblowing NT5T70’ due to its notable mentions of it}; +spellcheck;{update IDs to latest format: 253 replacements}
    3. NVAZ21  ‘{post.status.snapshot{;date ’20150926Sat1415pst‘;after ID ’minutes 0‘;revision ’3‘;version0.3‘;words ’4981‘;as ’much TODOs and no more time to work on now but a significant start so want to get it out there before starting new stuff‘;do ’Publish 1‘}}’
    4. NVAUTO   TODO: complete 1st draft; verify links:
    5. NV8W1X   starting ~15min ago, continue edits…
    6. NV8TKA   ‘{post.status.snapshot{;date ’20150925Fri1022pst‘;after ID ’minutes 0‘;revision ’1‘;version0.1‘;words ’3565‘;as ’lots of additions but out of time now to do more‘;do ’Save Draft 1‘}}’
    7. NV7BXM   ‘{post.status.snapshot: date ’20150924Thu1503pst‘;after ID’ minutes 0‘;revision ’0‘;version ’0.0‘;words ’261‘;as ’I saw someone struggling here on a product repair request and so thought do this to help such requests‘;do ’minutes ago, to get a reasonable template only (no source text), from pick the post with the highest #, so (so last revision NV5JX7) but can’t there do “Copy to a new draft” due its privacy, so created fresh this post then admins filled in the content by 1st doing “cut {all its content not to be reused here, so the content just applying to the template, so all the posts’ fully stated points including their KCGUIDs} replacing with new ones.”‘}’.