Gun Zone Deals

Help me buy an IPad please

The #1 community for Gun Owners in Texas

Member Benefits:

  • Fewer Ads!
  • Discuss all aspects of firearm ownership
  • Discuss anti-gun legislation
  • Buy, sell, and trade in the classified section
  • Chat with Local gun shops, ranges, trainers & other businesses
  • Discover free outdoor shooting areas
  • View up to date on firearm-related events
  • Share photos & video with other members
  • ...and so much more!
  • Davetex

    TGT Addict
    Rating - 100%
    6   0   0
    Mar 27, 2010
    8,451
    96
    Greers Ferry Lake
    I have an Amazon Fire tablet, it'' very basic, nothing fancy, but it works fine for me. Just surfing web, watching videos, just simple stuff. And it didn't cost much.
    Guns International
     

    Sam7sf

    TGT Addict
    Lifetime Member
    Rating - 100%
    10   0   0
    Apr 13, 2018
    12,466
    96
    Texas
    Whoah. You're not just wrong, you're WAY wrong.
    even though their encryption is strong, I don't like the concept of the cloud. Why have it? So apple can spy on you? Feel free to tell me why I'm wrong. Considering I don't use social media, my text msg are encrypted, I use a proxy if need be. As a comment from someone else mentioned Google and mining...this has been going on for a long time. I was just simply trying to say I can hide on an android pretty easy. But I have also been a pc and droid guy for a long time.

    None of these devices are truly trust worthy. If its got a speaker someone can listen. Data mining...like that's really the big problem.
     

    Ole Cowboy

    TGT Addict
    Rating - 0%
    0   0   0
    May 23, 2013
    4,061
    96
    17 Oaks Ranch
    I want to buy an Ipad , just to surf the web at home mainly.
    I just want the wifi version, not the 3g and I like the Pro size. I just don't know what a good deal is on one. My son bought a refurbished one on Amazon for school for $400, it came in and looked and worked like brand new
    I just don't want to buy one and find out it was made in 2012 or something.
    I would like to keep it under $500
    Any advice you can give me would be apprecitated

    https://www.apple.com/shop/browse/home/specialdeals/ipad
     

    Grundy1133

    Born on a Monday
    Lifetime Member
    Rating - 0%
    0   0   0
    Mar 25, 2018
    241
    26
    Gainesville, TX
    This 100%. Apple, if anything resisted that garbage. That doesn't mean they still don't data mine for themselves. However, Google is open that they use your information. In the end, get what you want. I've been in the IT industry for a long time, if you are worried about personal data being mined or shared, get rid of anything network based eletrical, optical, RF, or otherwise.
    you guys are naive if you think apple doesnt whore your info out to the highest bidder ;)
    edit: ack i was trying to include the person you quoted as well but it didn't work.. and i agree with you if youre worried about your info being leaked get rid of all electric devices and credit/debit cards. every time you swipe your card or buy from amazon, your info is floating around on the web... i read an article recently that said EVERY SINGLE PERSON who has ever bought something online has their info breached... its only a matter of time before your info gets sold and then its used to try and steal your indentity... the only way to 100% make sure you arent compromised is to completely unplug from any network (including cell phones and credit cards.)
     

    TexasBrandon

    TGT Addict
    Rating - 100%
    4   0   0
    Jul 14, 2011
    4,471
    66
    Salado
    you guys are naive if you think apple doesnt whore your info out to the highest bidder ;)
    I never said they didn't I said they resisted when it came to government intrusion. They do indeed use data for their own advancement and their partners as does every other tech company out there.
     

    TexasBrandon

    TGT Addict
    Rating - 100%
    4   0   0
    Jul 14, 2011
    4,471
    66
    Salado
    How are they then if I don't use facebook, use duckduckgo, and am behind a proxy?
    You don't need Facebook for Google to mine services from an operating system they designed (technically bought out). A proxy simply forwards on your behalf for any web services, applications, the phone itself, and a myriad of other back-end processes forward information to Google. Proxies are 1. not invincible 2. terminate somewhere, and 3. not invulnerable to their own server side issues with exploits and possible private key leaks. You wouldn't even know unless someone told you. Additionally, some proxies actually still act as a middleman. The only true way to completely avoid data mining is to pay in cash and not use an sort of network based device. Encryption can help but again, with keys that get leaked and the Poodle vulnerabilities that some hosts don't fix, you are still at risk along with a myriad of other things. I do IT security, networks, and VoIP for a living, I've seen my share of things occur at this point.
     

    TexasBrandon

    TGT Addict
    Rating - 100%
    4   0   0
    Jul 14, 2011
    4,471
    66
    Salado
    yeah i messed up the tag. i edited my post lol
    Yep that information used with debit cards can and will be correlated to you in the form of your phone number, house address, and a myriad of other things. Getting way off topic here. Vmax, get what pleases you the most, the iPad would probably be the best if you are not tech savvy.
     

    Sam7sf

    TGT Addict
    Lifetime Member
    Rating - 100%
    10   0   0
    Apr 13, 2018
    12,466
    96
    Texas
    You don't need Facebook for Google to mine services from an operating system they designed (technically bought out). A proxy simply forwards on your behalf for any web services, applications, the phone itself, and a myriad of other back-end processes forward information to Google. Proxies are 1. not invincible 2. terminate somewhere, and 3. not invulnerable to their own server side issues with exploits and possible private key leaks. You wouldn't even know unless someone told you. Additionally, some proxies actually still act as a middleman. The only true way to completely avoid data mining is to pay in cash and not use an sort of network based device. Encryption can help but again, with keys that get leaked and the Poodle vulnerabilities that some hosts don't fix, you are still at risk along with a myriad of other things. I do IT security, networks, and VoIP for a living, I've seen my share of things occur at this point.
    Thanks for sharing. Good info. I still think ultimate security comes in the form of not relying on a device for anything other than communication and on top of that always assume its listening. I left the world of computers behind. I was a web designer and if you want to date me (here's your out of context quote) I was at my peak in the beginning of flash. Anyway way before that were talking c++ days, I played with remote interface. Lol we will call it that. My teacher was cool with it. He considered anything a means to learn. Anyway even back in the late 90s I was shocked how easy it was to listen in on people vie two way computer speakers. I grew out of it. I knew technology would be harmful to us. So with my phone I don't do banking on it, I don't order stuff. I pay cash at stores. Most importantly I don't use social media. Computers are only good for spying, communication, and porn.
     

    Grundy1133

    Born on a Monday
    Lifetime Member
    Rating - 0%
    0   0   0
    Mar 25, 2018
    241
    26
    Gainesville, TX
    You don't need Facebook for Google to mine services from an operating system they designed (technically bought out). A proxy simply forwards on your behalf for any web services, applications, the phone itself, and a myriad of other back-end processes forward information to Google. Proxies are 1. not invincible 2. terminate somewhere, and 3. not invulnerable to their own server side issues with exploits and possible private key leaks. You wouldn't even know unless someone told you. Additionally, some proxies actually still act as a middleman. The only true way to completely avoid data mining is to pay in cash and not use an sort of network based device. Encryption can help but again, with keys that get leaked and the Poodle vulnerabilities that some hosts don't fix, you are still at risk along with a myriad of other things. I do IT security, networks, and VoIP for a living, I've seen my share of things occur at this point.
    IT security.... are you OSCP? I wanna become OSCP certified. right now i just piddle around with kali learning as much as i can. wanna take a few classes at the locoal college here. :) also on the topic of payment methods.... cryptocurrency for the win. its not 100% anonymous but it's very hard to track someone down if you do it properly. (not using the same key twice, using a cold storage wallet, etc)
     

    Brains

    One of the idiots
    Rating - 100%
    3   0   0
    Apr 9, 2013
    6,904
    96
    Spring
    even though their encryption is strong, I don't like the concept of the cloud. Why have it? So apple can spy on you? Feel free to tell me why I'm wrong. Considering I don't use social media, my text msg are encrypted, I use a proxy if need be. As a comment from someone else mentioned Google and mining...this has been going on for a long time. I was just simply trying to say I can hide on an android pretty easy. But I have also been a pc and droid guy for a long time.

    None of these devices are truly trust worthy. If its got a speaker someone can listen. Data mining...like that's really the big problem.
    I'll give you a little intro, you can do the research on your own based on how deep you personally feel like diving. I don't want to turn this into a total propeller-head thread ;)

    "Android" is not an operating system, it's an operating environment sitting on top of the OS. A virtual machine if you will, where everything is hosted on a Linux OS but running (well, mostly) in Dalvik (pre 4.4) or the Android Runtime (4.4 to current). As such, all of your interactions with the device, every touch, every key press, every network packet, all input and output, are subject to the whims of Google. Or worse, anyone who can exploit any flaw in the platform. I don't care what level of encryption the device or your apps have, if you have access to the privilege level beneath the entire environment you own the fort. Period. Game over.
     

    Sam7sf

    TGT Addict
    Lifetime Member
    Rating - 100%
    10   0   0
    Apr 13, 2018
    12,466
    96
    Texas
    I'll give you a little intro, you can do the research on your own based on how deep you personally feel like diving. I don't want to turn this into a total propeller-head thread ;)

    "Android" is not an operating system, it's an operating environment sitting on top of the OS. A virtual machine if you will, where everything is hosted on a Linux OS but running (well, mostly) in Dalvik (pre 4.4) or the Android Runtime (4.4 to current). As such, all of your interactions with the device, every touch, every key press, every network packet, all input and output, are subject to the whims of Google. Or worse, anyone who can exploit any flaw in the platform. I don't care what level of encryption the device or your apps have, if you have access to the privilege level beneath the entire environment you own the fort. Period. Game over.
    I'm way behind but that's ok. I gave that up long ago. Good info.
     
    Top Bottom