Digital Control, Monitoring and Tracking

Way back in 2014 this object made a post about surveillance. Things have changed since then; recently one of the apps it used was discontinued, new operating systems and methods are around and the cunt moved from Android to iPhone, so 000-100-110 thought it was time to revisit the topic. As last time 000-100-110 would like to start with a disclaimer – this stuff is really useful when used consensually but can be abusive when not. So please use it properly. The things bellow are all ways in which this object has been tracked, restricted or monitored digitally & it would have no qualms allowing a future owner to track it in any of the ways below or in other ways. Its part of Master keeping his property safe and looking after his interests. From experience, they do not require much input from a Master or Owner if he does not want to spend his time constantly tracking his property. The restrictions that were set up just did their job – if internet was cut off at 8pm for example then this kunt could do nothing about it, it just happened without input from Master. The fact that this faggit knows that it is being tracked and its owner could check on pretty much everything in its digital life was enough to ensure it kept within the rules. It thinks it’s previous Owner only checked up on it once every few weeks, but it could have been more or less often, the object has no real way of knowing. Automatic alerts were sent to its owner if a breach was detected for most things, so  there is a chance he never really checked.

Restricting computer access and use

The key here is simply parental controls. Most operating systems have quite good controls built in or available. For Linux there is GNOME Nanny, which allows web filtering and access control. There is also Timekpr-nExT that enables things like daily screen time and login controls. The issue is that Nanny hasn’t been updated in ages and both tools are a bit more complicated to use than those on other operating systems. The authors have done a cracking job with them and the slave used them for its whole time with linux, but moved back to Windows so that it’s owner could take advantage of Microsoft’s family tool which he found much easier to use as a non-technical person. These allow app and device screen times to be set as well as summaries of activtiy. There are also content features. It allows the slave to request extra time or for filters to be removed by a handy app where requests can be accepted or denied.

A 2nd and arguably more useful layer of tracking and restriction was set up via the object’s router. It uses Asus routers and these allow web and app filters to be set up to restric access to all the slave’s devices while they are connected to the network (you can set it so other devices aren’t restricted). It works on devices such as smart TVs, games consoles etc. Like in Windows there is web, app and time limitations that can be put in place and also an app to allow remote control of limits and to even switch the internet off completely.

Thirdly, the slave would allow it’s laptop and desktop computer to be routienely and remotely inspected my it’s ower using tools along the lines of anydesk etc.

Email tracking

Although the solution to tracking email is rather simple, it took a few attempts to get right. Initially 000-100-110 just gave its Owner access to its email account. However, all the cunt had to do was delete an email and Master would have no record of it, which is a major flaw. 000-100-110 then used a trial of an email archiving system, but in the long run this proved overly complex for Master and would have been prohibitively expensive when weighed up with the benefits. In the end this fuck hole implemented a rather crude but affective email monitoring system. All mail received is automatically forwarded to a second email account that the faggot does not have access to, only it’s Master does. That means that if any email is deleted from 000-100-110’s inbox, it will remain in the 2nd account and there is no way for this kunt to delete it. Monitoring sending mail was a bit more tricky & the faggit isn’t entirely satisfied with the way it is done, but it works. The only place sending emails is enabled is through a desktop email client. This is configured to automatically ‘bcc’ emails to another email account so that they are stored there. Again this fist hole has no access to that account so can not delete the emails. It is however possible for 000-100-110 to disable or change the rule, so requires an element of trust. This spit bucket has no desire to do so though and never has. The faggit can’t set up its account on another device or log in via a web browser to bypass any of these measures quite simply because it isn’t told the password.

GPS Tracking

GPS tracking was very important to Master because it allowed him to see the slaves location in real time. This made the slave feel safer and also a lot more controlled. Master could give it orders based on its location, such as to but him something while at the supermarket or just check it was where it should be at all times. Like most things here, 2 systems were used at all times. Location sharing was enabled on it’s iPhone that allowed Master to check up where it was using the ‘Find My’  feature. This was useful for Master to get notifications easily if the slave’s location changed, get directions to it or to easily message it based on its location.

The 2nd method was that the slave was made to wear a GPS ankle monitor 24/7. It was allowed to take it off and leave it in the car for work, but at all other times it was attached. This reinforced greatly to the slave that it was owned, being tracked and had no privacy. Additional features such as geofencing were enabled with this device. The slave would charge it overnight whilst it was still attached to it’s ankle

Mobile Control

While at home the slave’s phone was subject to the parental controls on its router as it was mainly connected to Wi-Fi. Of course there were times when it wasn’t connected to its own wifi or those protections weren’t enough. Both iOS and Android have very good parental controls. The slave’s own experiecne is that iOSs built in controls are better and that Android is generally better but you need an additional app to allow it to reach it’s potential, but thats subjective. In iOS the following controls were put in place

  • Content and privacy restrictions
  • iTunes and App purchase restrictions
  • Disabling built in features such as Siri, and AirDrop
  • Preventing certain types of content in News, Videos, Muisic, Apps etc
  • Restrictions on Siri when it was available
  • Restrictions on gaming
  • preventing apps from accessing things such as contacts and media
  • Restricting access to certain settings.

On Android it used the Google Family Link app along with either McAfee/Norton/Kaspersky/Microsoft family safety. All do a similar thing, Master liked McAfee’s best as it suited his needs.

Mobile Messaging

This was the most complicated. There are apps out there that do allow remote access to methods but in this slave’s and its previous Master’s experience they are either very limited, very expensive or both. Most of this type of app it’s Master got it to try were unreliable. Master found the best way to monitor mobile messages was simply to do random checks. Either in person or ordering the slave via a message to reply with a screenshot of WhatsApp, SMS or whatever app or ‘Messages it sent yesterday’. Having periods where it would send all messages it recievied or sent to Master for approval before being replied to/sent properly worked. Quite often Master would draft it’s replies for it. Master would also use honeypots (pretending to be another person for example or asking someone to message it a certain thing) to see if the slave reacted appropriately to the messages.

Posted in