Skip to main content

I Was Part of a Study for a Major Streaming Service

 
 
 It is my dream to have a 'working relationship' with companies and tell them "This is great, I especially like x,y, and z." or "Err on the side of caution when doing this - It could be misinterpreted." 

So when a certain company said "Do that, for us, for a few days." I said "Happy to help."

"And we'll pay you!"

"Even happier to help!"
 
I will not give specifics on information gathered and shared beyond "habits", as I signed a contract.

And when I sign a contract, I consider this contract work. So I will absolutely drop in conversation, "Hey, I consulted for ... someone I can't say... for 🌟10 Days🌟!"

This is about my experience - And I'm happy to say it was pleasant.

The project-runners were clearly people who valued our insight.

Here's a story about them that has nothing to do with the study, but this post should be a little longer.



Like many, my e-mail account was part of a breach. Again. Also, like many, I use the same e-mail for various services. I log into this service on multiple devices.

During the latest breach my e-mail was part of (that was rumored to have taken place in around late 2017 and just announced), I found my account compromised.

Luckily, I haven't used the upper tier features for a few years. I had since removed my cards.

Still...someone in a region of the world was in my account, and that's no good. As of Summer 2020 the service has returned to several of those countries, so I hope the person got their own account soon.*

*I know someone probably paid 5 Bitcoin for a list of e-mail addresses, created a script to insert them + passwords into a login screen. The real lesson is; Get a password manager to manage complicated passwords - Which I have.
Or it's totally possible they were using a VPN. 

I e-mailed the company support and quickly got a genuine response, asking for devices I use, location, and other data about habits. Within 1 hour, my account was restored to me, password reset.

Easily the quickest a problem has been resolved through any medium.


  Retweet? 

 

Reputable companies who are hiring for similar roles are free to ask for more details.

Comments

Popular posts from this blog

What Do You Need? [AKA; List of Offered Services / My Next Role] (2020)

I am a trusted outsourced remote consultant for your company.   I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me .  3 Services Offered Writing :      You want to pay me to write more of *waves hand* this blog? I am game .     I write B2C e-mails going out to over 280 people weekly. [ Example Job Description ]        Auditing :        Something doesn't work on your page. I can find it, or you can lose business. [ Here ] [ Example Job Description ]   Technical: Still as-needed, always remote, contract, or temporary. IT Operations Tech [ Example Job Description ]     Hardware and SaaS support.     Cisco routing and switching (Networking). CCNA, A+, Sec+, Azure certified WORKING ON: Junos Networking Cloud Technician     Azure [ See tag ]  Support [Web: Example Job Description ] [Text : Example

Portfolio of UX/Product Feedback [Vol. 1]

Have You Looked at Your Webpage From the Customer's View Lately? You have probably been linked here from a form or my resume. If you have any questions about what I'm looking for in a role, click here .   This post is not to shame, but to point out errors and hopefully make my talent for finding and documenting such mistakes clear to someone hiring. Contents: Instances where I offer constructive feedback on someone's website, logo, or app. Actions that were taken by the developers or artists.  I'm glad you want your webpages to be the best they can be with my help; If you need your sites audited, e-mail me . Latest Update -  November 20th, 2020.   Vol. 2 is here .

Wireless Diagnostics on Mac OS; Packet Sniffing on a WLAN

There's a post sitting in my drafts about Wireshark and how to sniff packets out of the air that was going to be about sniffing for authentication packets for Wi-Fi hotspots that aren't broadcasting SSID (Which you shouldn't do apparently! It's still not safe). I was watching this video to find a little more information about how to properly use Monitoring mode on my Macbook to sniff for WLAN packets on the network. So when he said "Just open up Wireless Diagnostics and sniff your network (check your width and channel)." It was shocking to me.