“The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices to interacting with devices we have no control over and no knowledge that we are generating data. [In this article,] we outline 10 ways in which this exploitation and manipulation is already happening.
—Privacy International. “Invisible Manipulation.” Medium.com. September 4, 2017.