recentpopularlog in

juliusbeezer : privacy   149

« earlier  
Jeff Bezos Protests Invasion of His Privacy, as Amazon Builds Surveillance State
On Thursday, Bezos published emails in which the Enquirer’s parent company explicitly threatened to publish intimate photographs of Bezos and his mistress, which were apparently exchanged between the two through their iPhones, unless Bezos agreed to a series of demands involving silence about the company’s conduct.

In a perfect world, none of the sexually salacious material the Enquirer was threatening to release would be incriminating or embarrassing to Bezos: it involves consensual sex between adults...
If Bezos were the political victim of surveillance state abuses, it would be scandalous and dangerous. It would also be deeply ironic.

That’s because Amazon, the company that has made Bezos the planet’s richest human being, is a critical partner for the U.S. Government in building an ever-more invasive, militarized and sprawling surveillance state. Indeed, one of the largest components of Amazon’s business, and thus one of the most important sources of Bezos’ vast wealth and power, is working with the Pentagon and the NSA to empower the U.S. Government with more potent and more sophisticated weapons, including surveillance weapons.
privacy  surveillance  amazon  irony  politics  us 
february 2019 by juliusbeezer
Opinion | How Silicon Valley Puts the ‘Con’ in Consent - The New York Times
The average person would have to spend 76 working days reading all of the digital privacy policies they agree to in the span of a year. Reading Amazon’s terms and conditions alone out loud takes approximately nine hours.

Why would anyone read the terms of service when they don’t feel as though they have a choice in the first place? It’s not as though a user can call up Mark Zuckerberg and negotiate his or her own privacy policy. The “I agree” button should have long ago been renamed “Meh, whatever.”
attention  internet  privacy  google  facebook  amazon 
february 2019 by juliusbeezer
Google fined record £44m by French data protection watchdog | Technology | The Guardian
The fine was levied, CNIL said, because Google made it too difficult for users to find essential information, “such as the data-processing purposes, the data storage periods or the categories of personal data used for the ads personalisation”, by splitting them across multiple documents, help pages and settings screens.
google  privacy  france 
january 2019 by juliusbeezer
Librem 5 – A Security and Privacy Focused Phone – Purism
Librem 5, the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers.

A fully standards-based freedom-oriented system, based on Debian and many other upstream projects, has never been done before–we will be the first to seriously attempt this.

The Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication over the Internet.
telephony  android  linux  privacy 
october 2018 by juliusbeezer
A Modest Privacy Protection Proposal – Member Feature Stories – Medium
A bitcoin freak lists effective measures to defend his privacy in the contemporary era. The bill: $15k/year and mucho mucho mucho hassle.
privacy  surveillance  bitcoin 
october 2018 by juliusbeezer
Over $119bn wiped off Facebook's market cap after growth shock | Technology | The Guardian
More than $119bn (£90.8bn) has been wiped off Facebook’s market value, which includes a $17bn hit to the fortune of its founder, Mark Zuckerberg, after the company told investors that user growth had slowed in the wake of the Cambridge Analytica scandal.

Facebook’s shares plunged 19% on Thursday in New York, a day after the Silicon Valley company revealed that 3 million users in Europe had abandoned the social network since the Observer revealed the Cambridge Analytica breach of 87m Facebook profiles and the introduction of strict European Union data protection legislation.

The collapse of Facebook’s share price is the biggest ever one-day drop in a company’s market value. Shares fell to $176, valuing the company at $510bn, a drop of $119bn from a record high of nearly $630bn on Wednesday.
facebook  socialmedia  finance  privacy  politics 
july 2018 by juliusbeezer
Facebook patents system that can use your phone's mic to monitor TV habits | Technology | The Guardian
Facebook has patented a system that can remotely activate the microphone on someone’s phone using inaudible signals broadcast via a television.

The patent application describes a system where an audio fingerprint embedded in TV shows or ads, inaudible to human ears, would trigger the phone, tablet or long-rumoured smart speaker to turn on the microphone and start recording “ambient audio of the content item”. The recording could then be matched to a database of content to allow Facebook to identify what the individual was watching – like Shazam for TV, but without the individual choosing to activate the system.
facebook  surveillance  privacy 
june 2018 by juliusbeezer
Alternatives to Google Products (Complete List) | Restore Privacy
It’s been fun Google, but it’s time to say goodbye.

Have you noticed?

Google’s entire business model is based on you surrendering to their corporate surveillance. That’s it. All they do is repackage mass corporate surveillance into convenient, free, trendy applications that suck up all your data. Your private data helps Google dominate the online advertising market.

You are the product.

The other key issue to consider here is that Google is tracking and recording your activity in order to build a user profile, which can be used for various purposes. Google has many ways to track your activity, even if you are not logged into a Google account:
google  privacy  internet 
june 2018 by juliusbeezer
Facebook knows a ton about your health. Now they want to make money off it.
Let’s say you like a Facebook page devoted to breast cancer survivors. It has been a useful forum for comparing treatment options with others who have dealt with similar health issues. There’s only one problem: Facebook has now categorized you as a patient, and you constantly receive precisely targeted ads about cancer services available near you. They are showing up on your computer screen at work, for all your co-workers to see, right when you’re up for a big promotion...

In early April, CNBC reported that Facebook recently launched a project based in its secretive “Building 8” group to get hospitals to share anonymized patient data with them. The project was reportedly put on hold in the wake of the current scandal, but the stated plan was to match hospitals’ patient data on diagnoses and prescription information with Facebook so the company could combine that data with its own to construct digital profiles of patients.
facebook  healthcarerecordsystems  health  confidentiality  privacy 
april 2018 by juliusbeezer
NHS chiefs urged to stop giving patient data to immigration officials | Society | The Guardian
Dr Sarah Wollaston, the chair of the House of Commons health select committee, has written to NHS Digital calling for an immediate halt to the handing over of confidential details of more than 8,000 patients a year. The MPs say the situation is unacceptable and they have serious concerns about the way the NHS has approached its duty to respect and promote confidentiality.

A memorandum of understanding (MOU) between the Home Office and NHS Digital highlighted by the Guardian last year requires non-clinical details of patients, including their last known address, date of birth, details of their GP and date registered with a doctor, to be handed to immigration officials to help trace potential offenders.
healthcarerecordsystems  privacy  uk 
january 2018 by juliusbeezer
Abine Blur: passwords, payments, & privacy
Blur was created with one simple mission: to make it easier
to manage and protect your identity without sacrificing convenience.
security  identity  privacy  tools  finance 
october 2017 by juliusbeezer
Social Media Needs A Travel Mode (Idle Words)
Both Facebook and Google make lofty claims about user safety, but they’ve done little to show they take the darkening political climate around the world seriously. A ‘trip mode’ would be a chance for them to demonstrate their commitment to user safety beyond press releases and anodyne letters of support.

What’s required is a small amount of engineering, a good marketing effort, and the conviction that any company that makes its fortune hoarding user data has a moral responsibility to protect its users.
facebook  google  privacy  politics  us  surveillance 
may 2017 by juliusbeezer
Ten simple rules for responsible big data research
The beneficial possibilities for big data in science and industry are tempered by new challenges facing researchers that often lie outside their training and comfort zone. Social scientists now grapple with data structures and cloud computing, while computer scientists must contend with human subject protocols and institutional review boards (IRBs). While the connection between individual datum and actual human beings can appear quite abstract, the scope, scale, and complexity of many forms of big data creates a rich ecosystem in which human participants and their communities are deeply embedded and susceptible to harm. This complexity challenges any normative set of rules and makes devising universal guidelines difficult.
opendata  sciencepublishing  ethics  research  privacy 
april 2017 by juliusbeezer
How to set up a VPN in 10 minutes for free (and why you urgently need one)
The most common way people get VPNs is through a monthly service. There are a ton of these. Ultimately, you must trust the company running the VPN, because there’s no way to know what they’re doing with your data.

As I said, some VPNs are improperly configured, and may leak personally identifying data.

Before you buy a VPN, read up on how it compares to others here. Once you buy a VPN, the best way to double check that it’s working properly is to visit while using the VPN.
privacy  security 
april 2017 by juliusbeezer
How to Run a Rogue Government Twitter Account With an Anonymous Email Address and a Burner Phone
Using Tor Browser is the easiest way to get started, but it’s not perfect. For instance, a hacker who knows about a vulnerability in Tor Browser can discover your real IP address by tricking you into visiting a website they control, and exploiting that vulnerability — the FBI has done this in the past. For this reason, it’s important to always immediately update Tor Browser when you get prompted.

You can also protect yourself from Tor Browser security bugs by using an operating system that’s designed to protect your anonymity, such as Tails or Qubes with Whonix, (I’ve written about the latter here). This is more work for you, but it might be worth it. Personally, I’m using Qubes with Whonix.
security  privacy  twitter 
february 2017 by juliusbeezer
Basic Security Guide (Tech Solidarity)
Basic security precautions for non-profits and journalists in the United States, early 2017.

Don't send any sensitive information by email.
journalism  security  privacy 
february 2017 by juliusbeezer
Porn videos secretly hidden on YouTube as pirates bypass Google's sexual content controls | The Independent
uploading video and not publicly listing it, which means that they can embed it on their own site. That means that it gets served to users straight from Google, but won't be seen on YouTube or by the company's Content-ID system or administrators.

Since the videos can still be embedded into external sites, pirates and others are still able to host them on their own pages and get the traffic and ad revenue from doing so.
google  video  privacy 
january 2017 by juliusbeezer
Can we have medical privacy, cloud computing and genomics all at the same time? | Isaac Newton Institute for Mathematical Sciences
"The collection, linking and use of data in biomedical research and health care: ethical issues" is a report from the Nuffield Bioethics Council, published last year. It took over a year to write. Our working group came from the medical profession, academics, insurers and drug companies. As the information we gave to our doctors in private to help them treat us is now collected and treated as an industrial raw material, there has been scandal after scandal. From failures of anonymisation through unethical sales to the catastrophe, things just seem to get worse. Where is it all going, and what must a medical data user do to behave ethically?

We put forward four principles. First, respect persons; do not treat their confidential data like were coal or bauxite. Second, respect established human-rights and data-protection law, rather than trying to find ways round it. Third, consult people who’ll be affected or who have morally relevant interests. And fourth, tell them what you’ve done – including errors and security breaches.

Since medicine is the canary in the mine, we hope that the privacy lessons can be of value elsewhere – from consumer data to law enforcement and human rights.
healthcarerecordsystems  privacy  security  uk  politics  eu 
january 2017 by juliusbeezer
NSA Watchdog Removed for Whistleblower Retaliation
given the official finding that Ellard retaliated against an NSA whistleblower, the credibility of Ellard’s argument that Snowden could have come to him is gravely undermined. More generally, there are few if any incentives for intelligence whistleblowers to report problems through designated authorities when the IG of NSA is found to have retaliated against such an individual.
surveillance  privacy  politics  us 
december 2016 by juliusbeezer
Panopticlick | About
Setting your browser to unblock ads from websites that commit to respecting Do Not Track rewards companies that are respecting user privacy, incentivizing more companies to respect Do Not Track in order to have their ads shown at all. By preserving privacy-friendly ads, sites that rely on advertising funding can continue to thrive without adjusting their core business model, even as they respect users’ privacy choices.

Over time, we believe we can shift the norms on the Web to ensure privacy and respect for users comes first. But that can only happen if online advertisers are incentivized to respect user choices.

You can help us by installing EFF’s Privacy Badger.
Is it possible to defend against browser fingerprinting?

Browser fingerprinting is quite a powerful method of tracking users around the Internet. There are some defensive measures that can be taken with existing browsers, but none of them are ideal. In practice, the most realistic protection is using the Tor Browser, which has put a lot of effort into reducing browser fingerprintability.
security  privacy  tools  internet 
december 2016 by juliusbeezer
Trump Meets Tech Industry Leaders With Effusive Greeting - The New York Times
President-elect Donald J. Trump, who had criticized them and who they, in turn, had criticized. The executives did not acknowledge or speak to the press on the way in.

First everyone went around the room and introduced themselves — Jeff Bezos, of Amazon; Elon Musk, of Tesla; Tim Cook, of Apple; Sheryl Sandberg, of Facebook; Larry Page of Alphabet, Google’s parent company; Satya Nadella, of Microsoft, and other tech leaders. Mr. Trump was seated next to Peter Thiel, the tech investor who is a member of the president-elect’s transition team. Three of Mr. Trump’s children also attended.
The technology world had been in turmoil as the meeting drew near. Some argued the chief executives should boycott the event to show their disdain for Mr. Trump’s values. Others maintained they should go and forthrightly make their values clear. And still others thought they should attend and make their accommodations with the new reality.

“There is a wide spectrum of feeling in the Valley,” said Aaron Levie, chief executive of the cloud storage company Box.

Complicating the debate was the fact that the most fervently anti-Trump elements in Silicon Valley seem to be the start-ups and venture capitalists, few of which were invited to the meeting.
politics  internet  us  privacy 
december 2016 by juliusbeezer
Reflecting on the Right to be Forgotten
But some Data Protection Authorities argued that people could still find delisted links by searching on a non-European version of Google such as So in March 2016, in response to the concerns of a number of Data Protection Authorities, we made some changes. As a result, people using Google from the same country as the person who requested the removal can no longer find the delisted link, even on,, or

But one Data Protection Authority, the French Commission Nationale de l'Informatique et des Libertés (the CNIL), has ordered Google to go much further, effectively instructing us to apply the French balance between privacy and free expression in every country by delisting French right to be forgotten removals for users everywhere. Ultimately, we might have to implement French standards on Google search sites from Australia ( to Zambia ( and everywhere in between. And any such precedent would open the door to countries around the world, including non-democratic countries, to demand the same global power.
privacy  search  google  france 
december 2016 by juliusbeezer
No one should be diagnosed at a distance – even Donald Trump | Hannah Jane Parkinson | Opinion | The Guardian
Today, that article might have been “10 reasons why Barry Goldwater is too crazy for the Oval Office”. Then it was “The unconscious of a conservative: a special issue on the mind of Barry Goldwater”. The case led to the establishment of a 1973 edict (Section 7.3) that psychiatrists should not diagnose individuals they have not personally treated. The American Psychiatric Association (APA) sets out the Goldwater rule thus: “On occasion psychiatrists are asked for an opinion about an individual who is in the light of public attention or who has disclosed information about himself/herself through public media. In such circumstances, a psychiatrist may share with the public his or her expertise about psychiatric issues in general. However, it is unethical for a psychiatrist to offer a professional opinion unless he or she has conducted an examination and has been granted proper authorisation for such a statement.”
psychology  journalism  medicine  privacy  ethics 
december 2016 by juliusbeezer
How Much Surveillance Can Democracy Withstand? - GNU Project - Free Software Foundation
For the state to find criminals, it needs to be able to investigate specific crimes, or specific suspected planned crimes, under a court order. With the Internet, the power to tap phone conversations would naturally extend to the power to tap Internet connections. This power is easy to abuse for political reasons, but it is also necessary. Fortunately, this won't make it possible to find whistleblowers after the fact, if (as I recommend) we prevent digital systems from accumulating massive dossiers before the fact.

Individuals with special state-granted power, such as police, forfeit their right to privacy and must be monitored. (In fact, police have their own jargon term for perjury, “testilying,” since they do it so frequently, particularly about protesters and photographers.) One city in California that required police to wear video cameras all the time found their use of force fell by 60%. The ACLU is in favor of this.

Corporations are not people, and not entitled to human rights. It is legitimate to require businesses to publish the details of processes that might cause chemical, biological, nuclear, fiscal, computational (e.g., DRM) or political (e.g., lobbying) hazards to society, to whatever level is needed for public well-being. The danger of these operations (consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism.

However, journalism must be protected from surveillance even when it is carried out as part of a business.
privacy  police  surveillance  humanrights  law 
november 2016 by juliusbeezer
How to encrypt your entire life in less than an hour
In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption. In a single sitting, you can make great strides toward securing your privacy.
privacy  security 
november 2016 by juliusbeezer
Why the Investigatory Powers Act is a privacy disaster waiting to happen | Ars Technica UK
The mere existence of ICRs is problematic, since it represents continuous surveillance of everything we do online. Ready access to ICRs by the police, without the need for a warrant, is clearly troubling from a privacy point of view. But even setting those issues aside, there's another major problem that has barely been discussed, probably because the politicians simply don't understand the technology that will be involved in implementing the system...
The government factsheet quoted above explains that ICRs are created and held by ISPs and telecoms. However, the government intends to create centralised software that will allow queries to be made across multiple databases using "request filters". That presumably means that a single program will have access to all ICR databases, creating a tempting target for those wishing to gain access to the information stored in the UK's ICRs.
privacy  security 
november 2016 by juliusbeezer
Where’s Big Brother When You Need Him? – Reclaim Magazine – Medium
And what about my phone? Not only does it know when I’m getting into my car, but it also guesses my destination and pings my smart watch, which gives me the traffic report and tells me how long it’ll take me to get there. Yet even though it knows everything I’m doing, it won’t tell me when I’m speeding, or lock its keypad when I’m driving so I can’t text and get distracted. And forget about giving the police information about how I was driving before a crash.

Why this far into the 21st century do I not have to enter some sort of authentication code to confirm that my privilege to drive is still valid before I can start my car? Think about how often you’ve read a story about a driver with a suspended license maiming or killing somebody. If only we secured our cars half as vigorously as we do our premium entertainment, then at least some of these tragedies might never have happened.
privacy  road_safety 
november 2016 by juliusbeezer
Your Government Wants to Militarize Social Media to Influence Your Beliefs | Motherboard
From 2013 to 2015, Thales partnered with the National Research Council (NRC) of Canada and MediaMiser, an Ottawa-based media monitoring company, to develop tools for security agencies “to automatically process the huge amounts of textual information circulating at any given time, in any number of languages, on blogs, news feeds, social networks and the like.”
The tool is all about “real-time surveillance”: social media information coming into the system is “immediately analysed” using Big Data algorithms and techniques “to detect changes, trends or anomalies” and “identify potentially dangerous entities”.

The tool is already so powerful, claims Thales, that it takes just 5 to 10 seconds for new information appearing on the web “to show up in the system, so intelligence analysts have up-to-the minute insights into situations as they evolve.”
privacy  security  socialmedia  facebook  twitter 
november 2016 by juliusbeezer
» Licensing, ethics and patient privacy
In the specific case here we’re talking about an identifiable image of a child, where the parents had apparently given permission for the image to appear “in a scientific journal” but hadn’t realised that this would be widely available. When they did realise this some years later they withdrew permission and the article was retracted, with the image blacked out in the retracted version. This is unfortunate and there are issues with the specific story but in some ways its a story of things working well. Permission was sought and given, when it was revoked the image was removed and the issue noted...
Why am I focussed on access control when this was an Open Access article? For me, the issue was a lack of appropriate clarity in the consenting for the use of the image. If the participant’s expectation is that an image or data will only be made available to professional medical staff or to researchers, then it should never go in a journal article of any kind. Journal articles are publicly accessible, in different ways, we cannot guarantee to prevent a journalist who has access to a research library taking a copy of an image from a print subscription journal and using that in an article. If the concern is public view or commercial use then once its in a journal we cannot guarantee that will not happen.
privacy  confidentiality  sciencepublishing  openaccess  copyright 
november 2016 by juliusbeezer
Should Google be scrubbing servers to prepare for President Trump? - The Verge
a lesser-known CEO was suggesting a more unorthodox response for tech companies in the Trump era: stop collecting so much data.

The comments came from Pinboard CEO Maciej Ceglowski, a longtime critic of data collection on the web. According to Ceglowski, the only sane response to a Trump presidency was to get rid of as much stored user data as possible. “If you work at Google or Facebook,” he wrote on Pinboard’s Twitter account, “please start a meaningful internal conversation about giving people tools to scrub their behavioral data.” Both companies declined to comment.
security  privacy  pinboard 
november 2016 by juliusbeezer
‘I was so embarrassed I cried’: do parents share too much online? | Life and style | The Guardian
Excessive sharing about your children has long incited disapproval, but recently the disapproval has begun to acquire a proto-legal tinge. In March, French police warned parents against posting photos of their children on social media; according to social media analyst Eric Delcroix, the children could soon be able to sue them for posting inappropriate pictures, under the country’s privacy laws. The treasurer of the UK’s Human Rights Lawyers Association, Leanne Targett-Parker, echoes the idea that it is only a matter of time before children mount legal challenges against oversharing parents. “You can’t imagine it not being something that starts to develop within the next five to 10 years,” she says. “I can’t see how there can’t be attempts at suing people for putting up posts that they’re unhappy with.”
privacy  internet  facebook 
november 2016 by juliusbeezer
Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking - ProPublica
for nearly a decade, Google did in fact keep DoubleClick’s massive database of web-browsing records separate by default from the names and other personally identifiable information Google has collected from Gmail and its other login accounts.

But this summer, Google quietly erased that last privacy line in the sand – literally crossing out the lines in its privacy policy that promised to keep the two pots of data separate by default. In its place, Google substituted new language that says browsing habits “may be” combined with what the company learns from the use Gmail and other tools.
google  privacy  surveillance  advertising 
october 2016 by juliusbeezer
AP: Across US, police officers abuse confidential databases
Police officers across the country misuse confidential law enforcement databases to get information on romantic partners, business associates, neighbors, journalists and others for reasons that have nothing to do with daily police work, an Associated Press investigation has found.

Criminal-history and driver databases give officers critical information about people they encounter on the job. But the AP's review shows how those systems also can be exploited by officers who, motivated by romantic quarrels, personal conflicts or voyeuristic curiosity, sidestep policies and sometimes the law by snooping. In the most egregious cases, officers have used information to stalk or harass, or have tampered with or sold records they obtained.

No single agency tracks how often the abuse happens nationwide, and record-keeping inconsistencies make it impossible to know how many violations occur.

But the AP, through records requests to state agencies and big-city police departments, found law enforcement officers and employees who misused databases were fired, suspended or resigned more than 325 times between 2013 and 2015. They received reprimands, counseling or lesser discipline in more than 250 instances, the review found.
police  privacy 
september 2016 by juliusbeezer
Internet mapping turned a remote farm into a digital hell | Fusion
IP mapping isn’t an exact science. At its most precise, an IP address can be mapped to a house. (You can try to map your own IP address here.) At its least precise, it can be mapped only to a country. In order to deal with that imprecision, MaxMind decided to set default locations at the city, state and country level for when it knows only roughly where the IP address lives. If it knows only that an IP address is somewhere in the U.S., and can’t figure out anything more about where it is, it will point to the center of the country.

As any geography nerd knows, the precise center of the United States is in northern Kansas, near the Nebraska border. Technically, the latitudinal and longitudinal coordinates of the center spot are 39°50′N 98°35′W. In digital maps, that number is an ugly one: 39.8333333,-98.585522. So back in 2002, when MaxMind was first choosing the default point on its digital map for the center of the U.S., it decided to clean up the measurements and go with a simpler, nearby latitude and longitude: 38°N 97°W or 38.0000,-97.0000.

As a result, for the last 14 years, every time MaxMind’s database has been queried about the location of an IP address in the United States it can’t identify, it has spit out the default location of a spot two hours away from the geographic center of the country. This happens a lot: 5,000 companies rely on MaxMind’s IP mapping information, and in all, there are now over 600 million IP addresses associated with that default coordinate. If any of those IP addresses are used by a scammer, or a computer thief, or a suicidal person contacting a help line, MaxMind’s database places them at the same spot: 38.0000,-97.0000.

Which happens to be in the front yard of Joyce Taylor’s house
us  maps  internet  bizarre  privacy 
april 2016 by juliusbeezer
Panama Papers: Have the media censored the story? - Al Jazeera English
The International Consortium of Investigative Journalism, a non-profit group in the US, coordinated the reporting with 376 journalists from 109 news organisations and 76 countries poring over the files.

Such multi-newsroom collaborations are growing more common in an age of big data leaks, partly because newsrooms are shrinking while the influential players they are trying to hold accountable are growing in size, power and complexity.

But despite the success of the collaboration, the select group of media organisations that had access to the data have been criticised for how they tackled the story.

One of the main criticisms has been the way they went after wealthy business figures and some political leaders while largely shying away from the corporate side of the story that has enabled trillions of dollars, euros, pounds and rubles to be hidden offshore.

This has in turn raised a larger question: can the corporate-owned news media really be expected to hold the corporate world to account?
journalism  wikileaks  assange  socialmedia  privacy  germany  PanamaPapers 
april 2016 by juliusbeezer
Revealed: what can happen when a Named Person reports on your children - The Scotsman
Is having a Named Person making notes about thumb-sucking, nappy rash and emotional wellbeing a sensible precaution when families face difficult circumstances – or is it an insidious invasion of privacy?

Tragic cases like that of 11-week-old Caleb Ness, the Edinburgh baby killed by his father despite the involvement of social work and health staff, have convinced the Scottish Government that action has to be taken. Indeed, the Named Person approach has the support of many organisations within civic Scotland, including children’s charities and teaching unions, who believe it will help struggling families and prevent tragedies.

Opponents claim it is impractical. In general, health visitors will act as Named Persons for pre-school children, with head teachers taking up the mantle as they get older. But how, for example, is a head supposed to keep an eye on hundreds of pupils? And how will blame be apportioned when things go wrong?
healthcarerecordsystems  privacy  scotland 
april 2016 by juliusbeezer
‘Chilling Effect’ of Mass Surveillance Is Silencing Dissent Online, Study Says | Motherboard
Participants were asked to answer questions relating to media use, political attitudes, and personality traits. Different subsets of the sample were exposed to different messaging on US government surveillance to test their responses to the same fictional Facebook post about the US decision to continue airstrikes against the Islamic State of Iraq and Syria (ISIS).

They were then asked about their willingness to express their opinions about this publicly—including how they would respond on Facebook to the post; how strongly they personally supported or opposed continued airstrikes; their perceptions of the views of other Americans; and whether they supported or opposed online surveillance.

The study used a regression model—a statistical method to estimate the relationships between different variables—to test how well a person’s decisions to express their opinion could be predicted based on the nature of their opinion, their perceptions of prevailing viewpoints, and their attitude to surveillance.

This sort of model doesn’t produce simple percentages, but provides a statistical basis to explain variances in the factors being tested. In this case, the study found that “35% of the variance in an individuals’ willingness to self-censor” could be explained by their perceptions of whether surveillance is justified.

For the majority of respondents, the study concluded, being aware of government surveillance “significantly reduced the likelihood of speaking out in hostile opinion climates.”
surveillance  privacy  freedom  humanrights  politics  us 
march 2016 by juliusbeezer
Apple Encryption Engineers, if Ordered to Unlock iPhone, Might Resist - The New York Times
“The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe,” Mr. Cook wrote.

Apple declined to comment.

The fear of losing a paycheck may not have much of an impact on security engineers whose skills are in high demand. Indeed, hiring them could be a badge of honor among other tech companies that share Apple’s skepticism of the government’s intentions.

“If someone attempts to force them to work on something that’s outside their personal values, they can expect to find a position that’s a better fit somewhere else,” said Window Snyder, the chief security officer at the start-up Fastly and a former senior product manager in Apple’s security and privacy division.
software  programming  us  security  privacy  apple 
march 2016 by juliusbeezer
Why Mass Surveillance Can't, Won't, And Never Has Stopped A Terrorist - Digg
even highly accurate terrorism prediction systems will be so flooded with false alarms that they will be useless.

The reason lies in the mathematics of detection. All detection systems have errors, and system designers can tune them to minimize either false positives or false negatives. In a terrorist-detection system, a false positive occurs when the system mistakenly identifies something harmless as a threat. A false negative occurs when the system misses an actual attack. Depending on how you “tune” your detection system, you can increase the number of false positives to assure you are less likely to miss an attack, or you can reduce the number of false positives at the expense of missing attacks.

Because terrorist attacks are so rare, false positives completely overwhelm the system, no matter how well you tune. And I mean completely: millions of people will be falsely accused for every real terrorist plot the system finds, if it ever finds any.
privacy  surveillance  politics  statistics 
november 2015 by juliusbeezer
The Snooper’s Charter would devastate computer security research in the UK | Ars Technica UK
What would I do if I found that backdoor today? The ethical thing is to check my results with trusted colleagues, tell my client, determine what the best remedial action is, tell whoever is in charge of that aspect of the router software, allow time for a patch to propagate out, then tell the world what happened. It’s interesting, but not immediately important, to work out who did the attack. Fix first, ask questions later.

Let’s look at that in a world where the Snooper's Charter has become law. I find the backdoor and tell a colleague. She doesn’t answer my e-mail, but I get a knock at the door—turns out that GCHQ was behind the attack. I am now banned forever from mentioning to anyone what I found—or that I found anything. The backdoor is later exploited by the bad guys and my client is hit. Why didn’t you find it, they ask? I can only shrug. Soon, my consultancy is in disarray. If I’m sued for incompetence, I cannot defend myself. I can write no papers, warn no people.
surveillance  privacy  security  uk  politics 
november 2015 by juliusbeezer
Five uncomfortable facts about the CJEU Safe Harbour decision » The Privacy Surgeon
There’s still a huge chunk of the US that believes data protection is a load of rubbish. European notions of privacy, they say, are out of date and restrictive. What some US officials want to see is the data equivalent of the second amendment. This view is by no means universal, but there are enough dinosaurs out there on the Beltway and elsewhere to ensure that large swathes of US business are motivated to an ambivalent view of data protection.
privacy  internet 
october 2015 by juliusbeezer
The PM, the Pig and musings on Power | @robfahey
the details are relatively simple; billionaire tax exile and former Conservative party deputy chairman Lord Michael Ashcroft has co-written, with journalist Isabel Oakeshott, an unauthorised biography of David Cameron. It is not flattering, and includes allegations of drug-taking among other things, but the attention-grabbing assertion is that during an initiation ceremony for an Oxford student society, Cameron “put a private part of his anatomy” in the mouth of a dead pig – and that photographic proof of this deed exists...
not all control is financial. The control exerted by elite networks is based on long-standing trust and loyalty, but also, in some cases at least, by a black and rotten heart of what is, in effect, life-long blackmail. Britain’s establishment, at least in part, can be visualised (for those of strong stomach) as a group of powerful men standing close together, each with the balls of the man next to him held in a powerful grip. Michael Ashcroft just squeezed, very publicly indeed
politics  uk  privacy 
september 2015 by juliusbeezer
The Facebook of the Future Has Privacy Implications Today
“Facebook’s story is that we trade privacy for access to its service,” says Cory Doctorow, a best-selling author, co-editor of the pioneering futurist blog Boing Boing, and consultant for the civil liberties group Electronic Frontier Foundation. “But it’s clear that none of us really know what we’re trading. People are really bad at pricing out the future value of today’s privacy disclosure. … It’s nothing like any other marketplace. … In a market, buyers and sellers bargain. In Facebook’s ‘market,’ it gets to treat your private data as an all-you-can-eat buffet and help itself to whatever it wants.”
facebook  privacy 
september 2015 by juliusbeezer
When using an archive could put it in danger | Webstory: Peter Webster's blog
“At some point after the content in question was removed from the original website, the [Conservative] party added the content in question to their robots.txt file. As the practice of the Internet Archive is to observe robots.txt retrospectively, it began to withhold its copies, which had been made before the party implemented robots.txt on the archive of speeches. Since then, the party has reversed that decision, and the Internet Archive copies are live once again.

Courtesy of wfryer on, CC BY-SA 2.0 :

Courtesy of wfryer on, CC BY-SA 2.0 :

As public engagement lead for the UK Web Archive at the time, I was happily able to use the episode to draw attention to holdings of the same content in UKWA that were not retrospectively affected by a change to the robots.txt of the original site.
archiving  agnotology  censorship  privacy 
august 2015 by juliusbeezer
Digital surveillance 'worse than Orwell', says new UN privacy chief | Technology | The Guardian
Joseph Cannataci singled out British surveillance oversight as being “a joke”, and said the situation is worse than anything George Orwell could have foreseen.

He added that he doesn’t use Facebook or Twitter, and said it was regrettable that vast numbers of people sign away their digital rights without thinking about it.

“Some people were complaining because they couldn’t find me on Facebook. They couldn’t find me on Twitter. But since I believe in privacy, I’ve never felt the need for it,” Cannataci, a professor of law at the University of Malta, said.
privacy  surveillance  law  google  twitter  facebook 
august 2015 by juliusbeezer
A Linguist Explains the Syntax of the F-Word
although the various authors aren’t particularly aiming for a consensus, quite a few of them end up noting that our current inventory of parts of speech is just inadequate to deal with swear words. McCawley, alias Quang, proposes a category of quasi-verbs, which Bopp expands to quasi-adjectives and quasi-adverbs, while Shad goes as far as proposing an entirely separate category of “frigatives”, to contain all and only swears.

Where are we now? Strange to say, but it doesn’t seem like the syntactic study of swear words has really progressed much beyond these obscure, semi-satirical papers from the 60s and 70s. I found a long-ass list on the “anal emphatic,” a sociolinguistics paper on fuck in the British National Corpus, a paper on taboo-term predicates in ASL, and some semantics papers on “that bastard” and on “fucking brilliant” (here’s an accessible overview of the semantics side) but otherwise not much has been written and it’s permeated even less into popular culture.
language  english  funny  satire  anonymity  privacy  grammar 
august 2015 by juliusbeezer
Troy Hunt: Here’s what Ashley Madison members have told me
Interesting review of web security expert's correspondence around Ashley Madison data breach
privacy  security 
august 2015 by juliusbeezer
Pressé par les Etats, Twitter fait la police - Libération
Les requêtes des autorités transmises à Twitter sont de plus en plus nombreuses. C'est ce que montre le dernier rapport de transparence publié aujourd’hui par le réseau social. Les demandes d’informations concernant des comptes ainsi que les demandes de suppression sont en augmentation par rapport aux périodes précédentes.

Les demandes de suppression de contenus sont en hausse : 1003 au premier semestre 2015, contre 796 entre juillet et décembre 2014.
twitter  france  humanrights  privacy  surveillance 
august 2015 by juliusbeezer
The NSA and American Spies Targeted SPIEGEL - SPIEGEL ONLINE
Germany's highest court ruled in 2007 that press freedom is a "constituent part of a free and democratic order." The court held that reporting can no longer be considered free if it entails a risk that journalists will be spied on during their reporting and that the federal government will be informed of the people they speak to.

"Freedom of the press also offers protection from the intrusion of the state in the confidentiality of the editorial process as well as the relationship of confidentiality between the media and its informants," the court wrote in its ruling. Freedom of the press also provides special protection to the "the secrecy of sources of information and the relationship of confidentiality between the press, including broadcasters, and the source."
journalism  freedom  surveillance  privacy  assange  wikileaks  us  germany 
july 2015 by juliusbeezer
British spies betrayed to Russians and Chinese -
A senior Downing Street source said: “It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information. There is no evidence of anyone being harmed.”
surveillance  privacy  journalism  archiving 
june 2015 by juliusbeezer
How Companies Turn Your Facebook Activity Into a Credit Score | The Nation
rather than overt discrimination, companies can smuggle proxies for race, sex, indebtedness, and so on into big-data sets and then draw correlations and conclusions that have discriminatory effects. For example, Latanya Sweeney, former chief technologist at the Federal Trade Commission, uncovered racial bias on the basis of Google searches: black-identifying names yielded a higher incidence of ads associated with “arrest” than white-identifying names. It’s discrimination committed not by an individual ad buyer, banker, or insurance broker, but by a bot. This is likely what happened to Nicole: Facebook’s huge repository of data has strong indicators of users’ socioeconomic status—where they attend school, where they work, who their friends are, and more—and the company targets them accordingly.
google  facebook  privacy  finance  advertising 
june 2015 by juliusbeezer
Courts docs show how Google slices users into “millions of buckets” — Medium
This wild west of unrestrained online profiling can’t go on indefinitely. It is particularly ironic that the National Security Agency — despite all the recent controversy — is subject to far tighter legal oversight than online advertisers like Google or Facebook.
google  facebook  privacy  surveillance  irony 
may 2015 by juliusbeezer
Privacy Badger | Electronic Frontier Foundation
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. If an advertiser seems to be tracking you across multiple websites without your permission, Privacy Badger automatically blocks that advertiser from loading any more content in your browser. To the advertiser, it's like you suddenly disappeared.
tools  browsers  privacy 
april 2015 by juliusbeezer
Questions over Labour peer's letters to care home boy | Politics | The Guardian
The Observer has also learned that information held by Conservative whips – including details of any sexual misdemeanours – has been shredded since 1996, meaning the Butler-Sloss inquiry is highly unlikely to be able to access much of the secret information logged about the private lives of Tory MPs.
agnotology  censorship  privacy  surveillance 
april 2015 by juliusbeezer
JAMA Network | JAMA | Ethical Implications of Patients and Families Secretly Recording Conversations With Physicians
With recent advances in technology, smartphones can become recording devices with the touch of a button. This technological capability gives patients and their families the ability to easily and surreptitiously record conversations with physicians. The frequency of such recordings or whether they even occur is unknown. The ubiquity of smartphones, however, suggests the potential for secret recordings to occur. As of January 2014, 58% of Americans owned a smartphone, including 83% of young adults.1 Although recording conversations with physicians may provide some benefit for patients and their families, secret recordings can undermine patient-physician relationships and ultimately affect the provision of health care.
medicine  ethics  privacy  confidentiality  gronkulation  technology  internet 
march 2015 by juliusbeezer
How to Leak to The Intercept - The Intercept
ever since The Intercept launched, our staff has tried to put the best technology in place to protect our sources. Our website has been protected with HTTPS encryption from the beginning. All of our journalists publish their PGP keys on their staff profiles so that readers can send them encrypted email. And we’ve been running a SecureDrop server, an open source whistleblower submission system, to make it simpler and more secure for anonymous sources to get in touch with us.
surveillance  privacy  journalism 
january 2015 by juliusbeezer
Hackers can’t solve Surveillance |
The visions of a free, uncensorable cyberspace envisioned by Barlow, Gilmore and others was incompatible with the needs of Capital, and as thus the libertarian impulses that drives Silicon valley caused a change in tune. Cyberspace was no longer a new world, declared independent with its own unalienable rights, it was now an untamed frontier, a wild-west where spooks and cypherpunks do battle and your worth is measured by your crypto slinging skills and operational security. Rather than united denizens of a new terrain, we are now crypto individualists homesteading in hostile territory...
Users themselves are responsible for their privacy and safety online. No more unalienable rights, not more censorship resistant mass networks, no more expressing beliefs without fear of being silenced. Hack or be hacked.

Since libertarian ideology is often at odds with social solutions, holding private enterprise as an ideal and viewing private provisioning as best, the solutions presented are often pushing more entrepreneurship and voluntarism and ever more responsibilization. We just need a new start-up, or some new code, or some magical new business model! This is what Evgeny Morozov calls Solutionism,
internet  privacy  surveillance  politics  community 
january 2015 by juliusbeezer
People trust NSA more than Google, survey says - CNET
On a scale of 1 to 10 (10 being "I am shivering uncontrollably with fear") the idea of Google or a similar concern having access to all your private data got a concerned score of 7.39.

The idea of the NSA having its eyes and hands all over you? 7.06. What about your boss snooping? That merited a mere 6.85. While the notion of your parents knowing it all got a 5.93.

Of the options open to the respondents, they were most relaxed about their spouse or significant other seeing their everyday warts. This idea scored a mere 4.55.
privacy  facebook  google 
december 2014 by juliusbeezer
Clearing the air around Tor | PandoDaily
The highly technical nature of this project makes it hard to understand that it’s a generalized piece of infrastructure, and in the end, the federal funding of it is about as spooky as federal funding for a highway bridge. There are, of course, plenty of questions to ask about funding priorities and corruption in just about all federal funding, but few people would ask if the bridge was a trick bridge that would drop undesirable cars into the water. Personally I see Tor as a tiny part of the State Department’s budget, a drop in the pail, which really does build a great piece of infrastructure for net freedom.

The brilliance of what Roger did is that he’s remained neutral on every side and so has his code. He’s advocated it to be as much a tool for law enforcement as rebellion, a tool that gets around corporate content filters, national firewalls, hostile surveillance, whatever. He’s a roadbuilder who has remained agnostic about who drives on his road. The problem with Roger and the team he built, who are remarkable in many ways, is that they’re terrible at communicating with the public, and this confusion about funding isn’t the worst consequence of that. The worst consequence (to my mind) is the rogue exit node problem. A rogue node can spy on and collect all the Tor traffic going in of out of it, and probably a very high number of them do.
security  privacy  tor 
december 2014 by juliusbeezer
Tor Developer Suspects NSA Interception of Amazon Purchase
Andrea Shepard, a Seattle-based core developer for the Tor Project, suspects her recently ordered keyboard may have been intercepted by the NSA.

Following the purchase of a new IBM Thinkpad Keyboard from, Shepard discovered her package to be taking a strange detour to the East Coast, revealed by a screenshot of her shipment tracking information.
surveillance  privacy  spectacle 
december 2014 by juliusbeezer
Slavoj Zizek on Wikileaks | Dazed
in our daily lives, we more and more resemble baboons. That is to say, why do baboons have big, protruding, hairless red butts? The main reason seems to be that the buttocks of a female in heat will swell so the male knows that she is ready to mate. It also functions as a sign of submission, where one animal turns and presents its rump to the other, implicitly saying, ‘I know you’re stronger than me, so let’s not fight anymore!’ The baboons with the redder, more hairless butts attract more mates and have more offspring, and, in their turn, the offspring are favoured because, on average, they have redder, more hairless butts than the rest. Is this not how the struggle for ideological hegemony also looks? Individuals display their hairless protruding butts, offering themselves to be penetrated by ideological messages. There is no need for violent imposition; the victim voluntarily offers itself – as was made clear when we recently found out about the massive digital control of our lives.
zizek  funny  privacy  surveillance 
december 2014 by juliusbeezer
Schneier on Security: Over 700 Million People Taking Steps to Avoid NSA Surveillance
I calculate that 706 million people have changed their behavior on the Internet because of what the NSA and GCHQ are doing...
Name another news story that has caused over ten percent of the world's population to change their behavior in the past year?
privacy  surveillance  spectacle 
december 2014 by juliusbeezer
Forgetting the Lesson of Cypherpunk History: Cryptography Is Underhanded
Universal encryption as a panacea is an appealing canard because it offers the chimera of a quick fix, an escape from more onerous and labor-intensive solutions - not to mention the opportunity for entrepreneurs to sell us things. "Genuine security? Wow, let me break out my check book!"

The surveillance state is motivated by the desire for power, the power to subvert technology and raise up an Eye of Providence behind a shroud of official secrecy. Power is rooted in politics. To put all of your eggs in the encryption basket is to chase after an illusion conjured artfully by propagandists.
surveillance  privacy  funny 
december 2014 by juliusbeezer
Plebgate fallout: police appear to have declared war on journalists | Media | The Guardian
the group [of journalists] complain that, quite apart from being monitored, they have been persistently stopped, searched and assaulted by police officers. Five of them have successfully sued the police in the past, winning damages or apologies from the force. These frontline confrontations have something of a history, but they are also suggestive of the growing antagonism between officers and journalists.
police  uk  surveillance  privacy 
december 2014 by juliusbeezer
Generation Why? by Zadie Smith | The New York Review of Books
Why Facebook? Why this format? Why do it like that? Why not do it another way? The striking thing about the real Zuckerberg, in video and in print, is the relative banality of his ideas concerning the “Why” of Facebook. He uses the word “connect” as believers use the word “Jesus,” as if it were sacred in and of itself: “So the idea is really that, um, the site helps everyone connect with people and share information with the people they want to stay connected with….” Connection is the goal. The quality of that connection, the quality of the information that passes through it, the quality of the relationship that connection permits—none of this is important. That a lot of social networking software explicitly encourages people to make weak, superficial connections with each other (as Malcolm Gladwell has recently argued1), and that this might not be an entirely positive thing, seem to never have occurred to him.
In Zuckerberg’s New Yorker profile it is revealed that his own Facebook page lists, among his interests, Minimalism, revolutions, and “eliminating desire.”2 We also learn of his affection for the culture and writings of ancient Greece. Perhaps this is the disjunct between real Zuckerberg and fake Zuckerberg: the movie places him in the Roman world of betrayal and excess, but the real Zuckerberg may belong in the Greek, perhaps with the Stoics (“eliminating desire”?)
facebook  privacy  philosophy 
november 2014 by juliusbeezer
Why Was the NSA Chief Playing the Market?
At the same time that he was running the United States' biggest intelligence-gathering organization, former National Security Agency Director Keith Alexander owned and sold shares in commodities linked to China and Russia, two countries that the NSA was spying on heavily.

At the time, Alexander was a three-star general whose financial portfolio otherwise consisted almost entirely of run-of-the-mill mutual funds and a handful of technology stocks. Why he was engaged in commodities trades, including trades in one market that experts describe as being run by an opaque "cartel" that can befuddle even experienced professionals, remains unclear. When contacted, Alexander had no comment about his financial transactions, which are documented in recently released financial disclosure forms that he was required to file while in government. The NSA also had no comment.
security  surveillance  privacy  government  politics  conflict_of_interest 
october 2014 by juliusbeezer
The Dark Market for Personal Data -
The World Privacy Forum, a research and advocacy organization, estimates that there are about 4,000 data brokers. They range from giants like Acxiom, a publicly traded company that helps marketers target consumer segments, to boutiques like Paramount Lists, which has compiled lists of addicts and debtors. Companies like these vacuum up data from just about any source imaginable: consumer health websites, payday lenders, online surveys, warranty registrations, Internet sweepstakes, loyalty-card data from retailers, charities’ donor lists, magazine subscription lists, and information from public records.
privacy  database 
october 2014 by juliusbeezer
Exclusive: NSA reviewing deal between official, ex-spy agency head | Reuters
The U.S. National Security Agency has launched an internal review of a senior official’s part-time work for a private venture started by former NSA director Keith Alexander that raises questions over the blurring of lines between government and business.

Under the arrangement, which was confirmed by Alexander and current intelligence officials, NSA's Chief Technical Officer, Patrick Dowd, is allowed to work up to 20 hours a week at IronNet Cybersecurity Inc, the private firm led by Alexander, a retired Army general and his former boss.
surveillance  privacy  politics  conflict_of_interest 
october 2014 by juliusbeezer
Laura Poitras on the Crypto Tools That Made Her Snowden Film Possible | WIRED
When she realized the depth of Snowden’s leaks, she went so far as to buy a new laptop—with cash—and to use it only with the Tails operating system. That free software is designed to leave no trace of your communications on your computer and to route all network data over the Tor anonymity network. Poitras says she used that Tails computer only to communicate with Snowden, and only in public places with Wifi connections—never her home or office.
privacy  security  surveillance 
october 2014 by juliusbeezer
Bahraini Activists Hacked by Their Government Go After UK Spyware Maker | WIRED
“For too long companies like [Gamma] have been able to shield themselves behind a state like Bahrain and throw their hands up in the air and say ‘It wasn’t us, it was Bahrain that perpetrated these abuses,’” says Adriana Edmeades, legal officer for Privacy International. “But these companies are making blood money off the fact that they are selling pernicious technology that has extraordinary capabilities to states they know are repressive, human-rights-abusing states. They can’t put that kind of technological capacity in the hands of these states and then … act surprised when states like Bahrain then go after individuals like Moosa, Saeed, and Jaafar and perpetrate the kind of extraterritorial repression that they’re doing here in the UK.”

The group is seeking a formal investigation into Gamma International’s role in facilitating the surveillance.
privacy  surveillance 
october 2014 by juliusbeezer
Online service that seems to have the intention of making public key encryption more generally usable
security  privacy  tools 
october 2014 by juliusbeezer
Adobe is Spying on Users, Collecting Data on Their eBook Libraries - The Digital Reader
A hacker acquaintance of mine has tipped me to a huge security and privacy violation on the part of Adobe. That anonymous acquaintance was examining Adobe’s DRm for educational purposes when they noticed that Digital Editions 4, the newest version of Adobe’s Epub app, seemed to be sending an awful lot of data to Adobe’s servers.
privacy  security 
october 2014 by juliusbeezer
How Hong Kong Protesters Are Connecting, Without Cell Or Wi-Fi Networks : All Tech Considered : NPR
pen Garden, the company that made FireChat and an Android mesh networking app also called Open Garden, has bigger ambitions for mesh networking:
networking  privacy  internet 
october 2014 by juliusbeezer
Power, knowledge, and the subjects of privacy: understanding privacy as the ally of surveillance (2014) | Foucault News
The aim of this article is to argue that privacy, rather than serving only as a countermeasure against surveillance, can also be seen as its ‘partner-in-crime’. Normative statements made by governments and companies on privacy can be regarded as a tool of governance in service of informational capitalism. Initially defined as a fundamental freedom, privacy has become a precondition for a blossoming economy in the context of the information society. The notion of privacy, as a critique of information society, has been assimilated and reshaped by and in favour of informational capitalism, notably by being over-individualized through the self-determination principle. To develop this idea, this article builds on the results of a study on the loyalty programmes run by the four biggest retailers of Switzerland and on the Foucauldian concept of biopower.
surveillance  privacy 
september 2014 by juliusbeezer
Devonian Times » We’re opting out of Google Analytics
In the last few years we used Google Analytics on our website. It helps us to learn more about our visitors, which pages they look at, and where they come from. But, being a Google product, Analytics also comes with many privacy concerns. Starting today we’ve removed all Analytics code from our website and replaced it with Piwik.

Contrary to Analytics, which runs on Google’s servers, Piwik is installed locally. We host it, we own the database it uses, and we control the data it collects. It doesn’t share any data with anyone outside of our company. Also, Piwik respects when you don’t want to be tracked (click here to learn how to activate this feature of modern web browsers).

Please feel free to install the excellent and free Ghostery web browser extension, too.
search  google  privacy  surveillance  software  tools 
september 2014 by juliusbeezer
Texte intégral — Guide d'autodéfense numérique : Tome 1 — hors connexions
Guide d'autodéfense numérique : Tome 1 — hors connexions
via philippe/B17
security  privacy 
september 2014 by juliusbeezer
Inside DuckDuckGo, Google's Tiniest, Fiercest Competitor ⚙ Co.Labs ⚙ code + community
very year, we've grown 200-500%," Weinberg says. "The numbers keep getting bigger." As of early February, DuckDuckGo was seeing more than 4 million search queries per day. One year ago, that number had just barely broken 1 million.
search  duckduckgo  privacy  goldsmith  google 
september 2014 by juliusbeezer
« earlier      
per page:    204080120160

Copy this bookmark:

to read