professor
Just saying. There are “trusted” sites and there are other sites looking to exploit.
Understanding the difference is obviously key.
Not all of the internet is designed to explore and exploit user information.
But when a specific avenue of the internet has a proven history of exploiting user information and data, then all bets are off.
Most forms of exploitation are happening via social media. That simply cannot be argued against.
Social media is the “smallpox” of the current day generation. And most don’t realize this until after they’ve been afflicted.
$.02