>>512067421It is tracked already. Everything already is. Has been for a long time.
There are ways around it all but you know, shhh. Work it out yourself. Fictitious persons. Hint.
And your proximity data is all tracked too. All of it, all of the time.
Your file doesn’t exist until it’s needed, at that point with nothing more than your phone number the algorithm is accessed and WHAM you now have a file, kinda. Because all the data is already there.
I’ve been telling you how it works for ten years+ so you really have no excuses for still being like
>you know, i’m a little suspicious about this you know, hmm, ponder, hmm, ponder. I used to do private security and similar shenanigans and accessed your shite via your phone number.
Here’s the rub, the interdasting point of reference - have you ever used big tech sites like Twitter & Facefook? If you haven’t I couldn’t getcha. Because when you did use them, when you clicked that sweet sweet user agreement you didn’t read you agreed that private corporations could access the algorithm in regard to you. And so all i used to do was be the corporation, which was very easy. I used to impress clients by asking them if they have an enemy and if they want all of their enemies darkest secrets revealled there and then on the spot, more info than their spouses or families would ever know, every dark little bit of it - it took me literally 1 minute or less all i needed was your phone number.
*I don’t do that any more. I don’t do zip any more. Had a dangerous youth and I’ve been cozy for a long time now.