With technology invading the parts of our lives that we have grown to be accustomed to as private, we may well uncover it increasingly tough to trust our important other. Today’s Social Technologies has made it substantially less difficult for people today with ulterior motives in society to create false identities. Among the most well-liked motives for false identities is infidelity. Since most locate it easiest to engage in an affair by creating the illusion that 1 is out there and single, tools to help this illusion are of fantastic value to such men and women.
Before Social Media Internet websites for instance MySpace and Facebook, only the wealthy could effectively create such an illusion. As an example, a wealthy person could rent an apartment their spouse would have no information of, or fly out of town for a rendezvous under the false-pretense of a business meeting (while the topic of your affair believes he/she is in town on enterprise too). Arguably, these are stereo-typical procedures of pre-social media web days in which these kinds of folks would quench their want to complete such an issue. Most individuals nowadays could agree that the technologies with the internet have produced producing such illusions accessible to just about everyone, not just the wealthy.
Currently, social media is but only one tool out there for use in the devious intentions to engage in extra-marital affairs. VoIP technology also has its place in making such illusions. The very first element that can’t be more than looked could be the price tag. An Engineer from Baltimore, Maryland (who asked to remain anonymous so we will contact him Freddy) explained, “I convinced my wife to move from our classic analog telephone to a VoIP program, with the new system I secretly got an added line for a little much less than $10 and with that came a softphone.”
The softphone (abbreviation for application phone) is a software program that does all the things that a normal telephone can do. “I just installed the softphone on my laptop to ensure that anywhere that I take my laptop and can get access to a broadband internet connection, I have an immediate property telephone line, when in fact I am calling from a library or Starbucks” explained Freddy. Freddy further bragged that his softphone account leaves no paper trail in the type of a bill and so he doesn’t must hide anything from his wife.
Freddy went on to share that he had been caught previously when participating in such activity, the only difference was at the time he was making use of a pre-paid cellular telephone. “One day my fiancé and I were at the house watching television and my pre-paid cellular telephone rang, needless to say there was no excellent reason that I could uncover to justify obtaining that in my possession so I was busted.” Freddy admitted that he and his then fiancé broke up not long after that.
Another player (no pun intended) within the VoIP-veiled-extra-curricular-romance arena is a young woman that we will call Sarah (She also asked to stay anonymous). Sarah has successfully navigated 3 affairs over the past 2 years and hasn’t raised the slightest suspicion to her husband. “I have found that most of my girlfriends have been caught by their husbands simply because they are always whispering on the phone and/ or hanging up when their husband would enter the room, my solution to such a situation is having my VoIP service email me text versions of my voicemails.
This cuts down on the time it would take for me to initially listen to the message then producing the attempt to call my lover back.” Sarah is speaking of the voice-to-text features a lot of on the VoIP services offer. VoIP technology is a robust technology in the context of converting data into multiple formats for consumption (voicemail, text messages, email); such messages could be interpolated into the text because the VoIP uses data-packets just as a net browser does to communicate more than the world wide web. Such data is already digital so for application to convert digital information into text is a very short but logical interval. Sarah also explained that she found pleasure in being able to break her relationships off with ease. Sarah’s VoIP account allows her to set up rules and input the telephone number of her ex-lover to ensure that if a contact comes in from the number on the estranged lover it will not allow the contact to undergo to voicemail or the telephone device.
As society gains huge benefits with every new technological discovery it should not be left unsaid that there is the distinct probability for latent-dysfunctions. Though we obtain greater ways to communicate with each other, we also expand our inability to trust each other. Together with the breakdown of these aspects of our society, it is mere proof that these technologies function and are as effective as they promise. But this effectiveness comes at a cost. One concept that many may choose to agree on and can put most of our minds at ease is that in any case, the technologies itself is not the enemy; it’s the intentions of the person working with it.