# Privacy Footprint To start, there was very little of me on the internet when you searched my name, and could only get to me through clicking subcategories in images and videos. I'm sure if you go deep into the sites you would also be able to find me. But when it came to the TruePeopleSearch, there was nothing about me (name or number). The browsers had very little information, basically just my IP and my computer model/ battery, which is easy for software. Google was interesting. It didn't say much about my security, but it obviously had all of my recent searches, as it contains the information. There was nothing on the timeline though, which was surprising. The ad preferences were also somewhat off, although it had my age and gender. # Reading Response So, after all, they really don’t listen to us! However, what they do is so much worse than that! What do they look at, well, “ 'Everything that makes your phone useful, like knowing where you are, taking photos, enabling online shopping and banking – these are exactly where the potential weaknesses and vulnerabilities are,’” (Capin qtd. in Haridy 2019), and it makes sense. When I searched Google, I saw basketball, and from there it was my name and my high school. At first, I was confused, but then remembered I probably have images from that or even watched videos of it on this device. ![Google Search](https://i.imgur.com/JntlQMJ.png) (The mini sections over the images) However, I was nowhere to be found when I did the TruePeopleSearch. Not by name, not by number, nowhere. I was shocked, but I was even more shocked when the man who owned my number previously was still there, and I wasn’t. I wasn’t necessarily shocked with the idea that every browser knew my computer make, software, and battery, as that is probably really easy as the computer probably shows that off. When Kernighan said, “Every bit of this stream of personal data is collected,” (Kernighan 2017) when talking about every minor thing we do on our devices, I knew what was being said. But then Google really showed me that: ![Ad Preference](https://i.imgur.com/4TtUaEV.png) They were able to get most of the information right, with some wrong obviously, but I was a little impressed. Should I have been? Probably not, but I still was. Computers and devices really do have the power to access whatever, and like Haridy mentioned that they can screenshot the screen, it is very scary to think about. So where are the lines drawn? What are the limitations? Both Kernighan and Haridy mentioned that they’re able to do so much (Kernighan with tracking, search, data mining etc., Haridy with the screenshots, keywords, etc.) I believe websites, browsers, apps, and devices in general have too much access to what is on them.