Quantcast
Channel: Comments on Superhuman is Spying on You
Browsing all 18 articles
Browse latest View live

By: Maybe Upton Sinclair

It is difficult to get a man to understand something when his salary depends upon his not understanding it.

View Article



By: Greg

This is an interesting article, I assume that as a professional journalist you would have validated your many assumptions with the company – can you confirm that? Regards Greg

View Article

By: Steve

Steve: Greg, why the need to validate assumptions? I believe it was clear in the original write up that the assumptions were just assumptions. Hence why I believed the headline was over the top given...

View Article

By: Sander van Dragt

Here’s a thought experiment: Would people disagreeing with this post be happy sending the author a list of times and locations where they opened this post? By the way even Google Analytics doesn’t let...

View Article

By: David K

And yet, a HUGE portion of our GDP is now basically this. Facebook, Google, Amazon, all the telecoms and the ISP’s: everyone is collecting everything they can, and selling access to slices of it to...

View Article


By: Mark

Dear Mike, It is but surprising as well as worrying to read about the spying techniques superhuman uses to spy on us using our emails. Your vivid article on the same has helped in bringing to light the...

View Article

By: mcw

Great post. (Honestly, I think two out of the three use-cases for why tracking is bad are weak — Pedo/Terrorist/Criminal arguments are too often used to decrease privacy, and thus have some structural...

View Article

By: Disappointed

Everybody knows about viruses and malware. Therefore it’s no longer the fault of virus or malware maufacturers or distributors, nor should they be called out or villified for this behaviour. “Others do...

View Article


By: Steve Walker

I have had automatic loading of images turned off for years now, but have to turn many on as they are emails that I need to see, but much of the information (often what they are about) is hidden in...

View Article


By: David

Mike, thank you for writing this. Great stuff! I got here from Mike Monteiro’s article over on Modus/Medium ‘It Might Be Time to Start Flipping Tables’ From your screengrabs with the shrugger-investors...

View Article

By: Neil Schwartzman

Mik, As the long-time Executive Director of the Coalition Against Unsolicited Commercial Email, and a fellow privacy advocate, I SALUTE YOU. So very well constructed and said. Respect.

View Article

By: LilBkrBabe

You mentioned that Superhuman requires access to all email. Does that mean Superhuman personnel can read the content of the email, or just the code/grpahics needed to track send and receive activity?...

View Article

By: LilBkrBabe

*graphics

View Article


By: Markus Diersbock

The article states that “geolocation” information is gathered from the recipient This is FALSE The location is that of the Internet Provider, NOT to the user Not sure how an Ex or a Stalker could find...

View Article

By: Wallflux Clearinghouse

Could somebody maybe send an example tracked mail to contact@wallflux.com? I can then adjust the Wallflux Clearinghouse Google app script to catch superhuman-tracked email to remove the tracking pixel....

View Article


By: Tony

I find it interesting that John use the analogy “Creepy people will track you no matter the tool you are using. Just because creepy people use cars to follow other people it doesn’t mean cars are...

View Article

By: Mike D.

Tony: Good examples, and I agree with all of your points. At the same time, however, the technology here was created *expressly* to give people the power to pry without their recipients knowing. It...

View Article


By: bliss

Excellent analysis. By default my mail clients don’t load images. Especially for commercial messages I generally don’t care enough about the contents to view it with “proper” formatting and tracking...

View Article
Browsing all 18 articles
Browse latest View live


Latest Images