Best suggestions for the future of PIA

edited November 2014 in Feedback
I would like to add some feedbacks for your note. 
Firstly when there is a troubleshooting regarding connectivity please develop a software patch for each operating system that help solves all the minimal connectivity that PIA needs through an executable file. If this  doesn't works fine allow the entire web channel workflow from an  add-on  on my browser where i have already login through normal PIA website rights.

Secondly, let there be regular check of vulnerability which is notified as popups on user window and enhancing the details while there is an online connectivity from different application for the sensitive information leaks. If PIA is installed in an server it must notify the administrator who can work on any client but by  recognizing the authenticating connectivity. The administrator must be provided an log that helps semi-drafting  new checks on the entire enterprise platform. 

Thirdly, without suitable authority on my system, there must no access for internet connectivity on my personal computer and there must be an unique avatar like my ip address which can contribute for regular checks and only I should be able to access the online reference.

 Fourthly, there must be a list of regular website and some local service  restriction  that is valid must be detailed in a simple menu bookmark when I work anywhere using any utility only I can sense the credentials that is not stored but there is a portable web access. How the user want must be the genuine draft for the entire session that may only reveal the end user from vulnerability protecting my privacy? Everyone so unique but can check through searching any resource available in public domain for the entire PIA community that ease the difficulty in finding one source of my list that can be  e-marked  for more  retrieval. 

Fifth, if there is a simple custom for my online checks  referring many websites,let there me a mention for the same. If there is availability for making logs on the client system which they only can access, the use pertains towards storing any breach of conduct that PIA may analyse for more efficiency. There is no mention of updates in this application settings and that is serious issue. 

Sixth, PIA must protect my taste of online activity. Importance must be given for the display of family settings when I use the application at home and work. When PIA addons is activated, i can use independent tag for opening any online experience that help generate the similar activity like the way I may not need to click and start the same procedural makeups. 

Seventh, i can prefer Why dont you make this location specific where I start my regular usage and mention my inauthenticity through email if I am the same person who use this application granting permissions? We work anywhere and inside my view there must be an avatar for me while the cloud changes the way I redesign for my productivity while using a portable PIA with which I can authorize my identity through password accessible through my mobile QR codes. It is so simple like any change I would like this development solving a story telling puzzle in the world of cloud cognitive computing that starts windows from sleep mode through login indirectly a portable PIA gadget? There is a question mark as I have a simple answer for this login process integrated with each user accounts. We need technology as simple as possible without pointing what we work around as we roam around into a world of connectivity touching our resources timeline limitlessly reaching human perceptions inside the background with machine communication of human mind over this simple platform in many names of user operation.

Eight, can I use two or more ip address one for public and other for home in the same system without creating the vulnerability. The public stands for maintaining usual activity process and private might be the same which is my nearest ISP suite and this is required when I make monetary transactions online and simultaneously listening to a music from another local restricted website. 

Ninth, I like bookkeeping of the website I usually visit and the screen must provide minimum time for connectivity without the hassle of going on the personal patterns but redesigning while I work. 

Tenth, what might been seen is the destruction of cookies that is not stored on the local end user system but levels my usability for successful favorites that can sidelined. Let my system rejects cookies which PIA can bypass from storage and allow myself test what can never go so wrong. I really havent made lot of homework while I have written this uniqueness. 

Right now I am working and I dont know if I will receive at least the simple solution why I have written this much. You may send me the required patch for me through email. I will also be glad if you can send me an sms at my bsnl kerala mobile number 00919496742581. You will be checking my details online and I have always added this fortune in my homepage : http://www.booksie.com/abyskaria . You can note my email : [email protected] . My initiative would be solving solutions that never existed before. May be I hope you will help me solve this simple issue at hand. Let me reassure you that I have written this column not out of a science fiction movie but a real situation I have the true formula for the solution.

Your opinion is invited and we can make every online computing better than the best in  all  anonymous networks. More we contribute better will be our global internet security. Help each other collectively. :)

Comments

  • edited November 2014
    Wow, please edit that to add paragraphs.

    edit: thanks for adding paragraphs. :)
  • Wow, please edit that to add paragraphs.
    Let me know the missing in this simple feedback. How would you like an insight model that captures your online media without sharing resources but only across two ends directly yet better question hollow tunneling distinguish more productivity only in the simple PIA suite for more challenges that we can solve repeatedly through research when exchanging human linguistics transfer online as web gestures identified only as advantage of strong presence with remotest avatars that is interlinked across internet? Look into the research motivated by University of Washington by few scholars of scientific community without censoring private privacy of personal internet access. Can we solve this solution near this new year 2014? How about this virtual communication solve this art or science of human innovation that you can think about with what we have got today? I know this is a simple step towards the best ever created. Can we not contribute why we are posting this message? lol :)
  • edited November 2014
    It is good that this is written in paragraphs. The grammar could be improved. Just saying.

    There is already a wishlist topic;

    https://www.privateinternetaccess.com/forum/discussion/4121/wishlist-for-pia-3/p1


  • edited November 2014
    It is good that this is written in paragraphs. The grammar could be improved. Just saying.

    There is already a wishlist topic;

    https://www.privateinternetaccess.com/forum/discussion/4121/wishlist-for-pia-3/p1


    Your post extends detecting anonymous anti-censoring proxy routing stack cache buffering in reverse dns scanning lookup without interpreting traffic across geolocational on-premise cloud infrastructure across bypassing firewall inside office network left for justification that multi IPV6  bidirectional transmission channels through a virtual artificial digital  intelligence in online environment can contribute for digital avatars in the near future. We do have other concern like complex default boundary for this new architecture on simple guidelines that anyone who like extending anti-piracy remain in cloud avatars with the virtual content never censored for smarter possibility. How will this suite connects multipurpose portability across any virtual session application just the way I can essential free security risk that states in my plain language for 100%   anonymous security for one global village? If the solutions we define as the final wishlist might be that this  does not result in antisocial activity promotions as the online ethics note that we must follow the path of feedbacks in continuous improvement. This is something we all have in might regarding anti-surveillance. I know this is a general information. If we resolve in making this happen just read what is detailed for the rest in the link I have already noted. 

    Please leave a feedback on the best suggestion for the future of PIA. The link mentioned is : https://www.privateinternetaccess.com/forum/discussion/4424/best-suggestions-for-the-future-of-pia   . Have a look. 

    I like your personal comment if you can contribute further. Anyway, your wishlist is so  exceptional. It has more towards a real vision why PIA exists. Thanks one again for your work.  
Sign In or Register to comment.