Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 11 July 2013

My opinion of Data Dealer.

Posted on 05:57 by Unknown
Anyone who has been a loyal reader of my blog for some time will know that this will not be an ordinary post. Far from it, as a matter of fact.

But I very recently discovered an online game that first gathered my attention because of the fact that it turns the tables and allows you to think a little bit like the kind of people who I fight against when I blog. Not that you can really get into the mindset of said person when you are biased against that side, but this game gives you a decent chance to try without causing harm.

The game: Data Dealer
The objective: To become someone who steals data from consumers via the use of hackers and fake websites designed to gather information.

In this game, you start out collecting data from ventures such as a sweepstakes, an online dating website, and a loyalty program. Data collected can be in the form of first and last names, zip codes, medical information, etc. You also have access to informants who work in low paying jobs and need extra money. These informants tend to have access to useful information such as tanning booth sessions, debts, income, and other useful information.

You then sell this information to companies that pay high dollar for information on consumers who they may offer a service or product to. And as you collect more information from your ventures and your informants, companies pay more for the data that you now have more of. This cycle goes on and on.

But you also have to be cautious, because if you gather too much attention, you can find privacy supporters or government officials after you. You stave this risk off by being careful when and at what point you use informants to gather data.

You can also stave the risk off by buying certain upgrades to your ventures. Some upgrades such as a TV ad will reduce the risk you take when you invest in a venture. Of course, this also spreads word around about your venture, which leads to more users of the service that venture is offering. This in turn, leads to more data collected from more people.

As the only game available is a demo, I really cannot offer more information except from my personal opinion.

My personal opinion is that this game may be fraught with satire, but the message that it sends is exceptionally clear.

And while it may be akin to PRISM, it nonetheless is quite fun and addictive.

You can find out more information and play the demo here

Thank You for reading, I invite users to comment with any questions or comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ▼  July (26)
      • Spotlight on Malware: ZeroAccess Rootkit.
      • Hitman Pro: What is it, and what does it do?
      • Posts of the Month: July 2013
      • To the spammers of my blog, past, present, and fut...
      • How to remove Attentive Antivirus (Rogue)
      • Explaining the fine line between Annoying Software...
      • Malware Now Taking Advantage of Royal Baby News.
      • How to remove the New Zealand E-Crime Lab Ransomware.
      • Mac OS X Ransomware going global.
      • How to remove the Ministry of Public Safety Canada...
      • How the web works: The Technology
      • How the web works: The History
      • How to remove the SweetPacks/SweetIM toolbar.
      • F.B.I. Ransomware now targeting Mac OS X
      • How to remove the Mandiant U.S.A. Cyber Security R...
      • How to remove Antivirus System (Rogue Antivirus)
      • First Q&A session details.
      • What to keep in mind when choosing your antivirus ...
      • My opinion of Data Dealer.
      • Spotlight On Malware: The Koobface Worm
      • Back To Basics.
      • Typosquatting: What it is and how to avoid it.
      • My opinion of Microsoft Windows Defender.
      • Spotlight on Malware: The Happy 99 worm.
      • Symbiosis in malware
      • Spotlight On Malware: Zeus
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile