"Is the effort to cover up the links in Google's engine leaving detectable tracks? And if so, can the process to discover them be automated? It seems to me this would be very useful for our effort to more effectively compete."
"But what you are suggesting means that a given link is likely to no longer be valid once it is detected by the Deception Machine crew?"
"Yes, but it tends to verify just how rigorous the effort is to hide the indirect manipulation.
"We first discovered this technique when important links became invalid once word started getting out that they existed. But sometimes using Google's search engine, cached copies had the target content."
"To think these tactics go back a century or more is truly amazing. Just because the information technology changes does not necessarily mean that a particular misuse of it does also."
"But what you are suggesting means that a given link is likely to no longer be valid once it is detected by the Deception Machine crew?"
"Yes, but it tends to verify just how rigorous the effort is to hide the indirect manipulation.
"We first discovered this technique when important links became invalid once word started getting out that they existed. But sometimes using Google's search engine, cached copies had the target content."
"To think these tactics go back a century or more is truly amazing. Just because the information technology changes does not necessarily mean that a particular misuse of it does also."
© 2011 Buzz Hill
No comments:
Post a Comment