recentpopularlog in

pierredv : privacy   229

« earlier  
Zoom Teleconferencing Service & Privacy - Consumer Reports, Mar 2020
"Videos and notes can be used by companies and hosts. Here are some tips to protect yourself."

"Zoom collects personal information about its users and doesn't provide a lot of detail about how it's used for advertising, marketing, or other business purposes."

"Zoom video conferences are started by what the company calls a “host.” Unlike other services you may have used, Zoom provides the host with rights that might not be immediately apparent to other participants—or, in some cases, to the hosts themselves."
Zoom  privacy  surveillance 
yesterday by pierredv
Catalyzing Privacy Law by Anupam Chander, Margot E. Kaminski, William McGeveran :: SSRN 2019
Our close comparison of the GDPR and California’s privacy law reveals that the California law is not GDPR-lite: it retains a fundamentally American approach to information privacy. Reviewing the literature on regulatory competition, we argue that California, not Brussels, is catalyzing privacy law across the United States. And what is happening is not a simple story of powerful state actors. It is more accurately characterized as the result of individual networked norm entrepreneurs, influenced and even empowered by data globalization. Our study helps explain the puzzle of why Europe’s data privacy approach failed to spur US legislation for over two decades. Finally, our study answers critical questions of practical interest to individuals—who will protect my privacy?—and to businesses—whose rules should I follow?
SSRN  privacy  law  stories  narrative  GDPR  California 
7 weeks ago by pierredv
"Can You Trust Apple? Facebook? Google?" on YouTube
"Right now, three of the biggest companies on earth - Facebook, Google, and Apple - are
telling vastly different, conflicting stories about your privacy. So, who can you really trust? Marketing 101: Every company is telling a story."

"Today, the only difference is that each company [Apple and Google] is much more actively trying to step on the other, with their mutually-exclusive stories about collecting your data."

In practice, the "stories" he's rehearsing here are theories/models in the Shiller vein.

"First, Google, embraces it - arguing that you shouldn’t just tolerate their using your data, you should want it. One because giving your phone more information makes it more useful. [...] And, two, because all this data, in aggregate, makes these services better, cheaper, and more accessible to, say, people in poverty."

"Tim Cook argues that’s a fake trade-off designed to justify a business model where you are the product, not the customer. Not only does your iPhone not need your data to be useful, it says, it doesn’t even want it. For Apple, storing your information is only a liability.
Now, whether you buy that logic or not, you have to stop and admire its genius. Because, if Google says your data is what allows it to sell cheaper products, then Apple can argue it’s higher prices are a feature."

"And, finally, Facebook, denies it. “The Future is Private”, it says, so while the old website emphasized the News Feed – an open, public place to talk, the “Town Square” is becoming more like a “living room”. Now, with the redesign, it’s all about private groups and communities. Notice, by “private” it means ‘exclusive’ or ‘separate’, not necessarily “your data stays between you and your device, or you and the receiver”. In other words, it gets to capitalize on the buzzword - like ‘Cloud’, ‘AI’ or ‘blockchain’ before it, without having to make any significant changes."
Facebook  Apple  Google  privacy  video  YouTube  PolyMatter  stories  narrative 
9 weeks ago by pierredv
How A 'Deviant' Philosopher Built Palantir, A CIA-Funded Data-Mining Juggernaut - Forbes 2013
It's not easy for a man in Karp's position to be a deviant in the modern world. And with tools like Palantir in the hands of the government, deviance may not be easy for the rest of us, either. With or without safeguards, the "complete anonymity" Karp savors may be a 20th-century luxury.
Forbes  privacy  CIA  Palantir  stories  biography  surveillance  VC 
december 2019 by pierredv
Health data goes to Google: How society digests risks and rewards | American Enterprise Institute - AEI Nov 2019
When news broke recently that Google and Catholic health care provider Ascension were working together on data processing, it caused a stir. A whistleblower’s allegation of minor deviations from federal privacy regulations helped make the story newsworthy. But after the initial shock, a return to calm is ongoing as various actors unpack the grab bag of risks and rewards that flow from processing health data.
risk  healthcare  privacy  Google  AEI 
december 2019 by pierredv
Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information | Pew Research Center
"Majorities think their personal data is less secure now, that data collection poses more risks than benefits, and believe it is not possible to go through daily life without being tracked"
PewResearch  polls  surveys  privacy 
november 2019 by pierredv
Voice tech and the question of trust | World Economic Forum
Via Amie Stepanovich, who's a member of the WEF Global Future Council on Consumption

"Voice technology is becoming more ubiquitous, integrating into tools and services by major corporations, startups, governments, and public sector players. But if these tools are to gain broad public acceptance, these actors will need to demonstrate that they are being used in a trustworthy manner, with respect for human rights."

"While most experts predict a positive growth trajectory for virtual assistants, this trust gap will likely hinder truly universal adoption. "

"Three foundational issues sit at the heart of the issue of trustworthiness and voice tech and will need to be addressed: data protection and transparency, privacy, and fraud."

Deep fakes. ... "Big technology firms all over the world are developing technology to clone anyone’s voice"
WEF  voice-technology  AI  voice-recognition  trust  privacy  fraud  deep-fakes 
october 2019 by pierredv
No one can be truly anonymous ever again thanks to genetic sequencing | New Scientist Jun 2019, issue 3232
"In 2013, a judge ruled that Perlmutter had a reasonable right to assume his genetic information on the lip of a water bottle wouldn’t be surreptitiously swiped, and that doing so deprived him of his “rights of ownership, possession, control, and privacy”, according to the case documents.

The Perlmutter case changed the conventional wisdom that genetics isn’t property, Jessica Roberts of the University of Houston in Texas told me at the meeting. It sets a precedent that could rein in police investigations.

It could also protect prominent people from a new kind of snooping."
NewScientist  law  surveillance  privacy  biotech  genetics 
october 2019 by pierredv
Whom does your DNA belong to? Hint, it’s not just you. - The Christian Science Monitor Daily for May 6, 2019
“When you make this individual choice to upload a genetic sample to a site, you’ve brought along everybody you’re directly related to, as well as potentially your current or future children and grandchildren, and presumably you have not asked any of those people for their consent.”
CSMonitor  biotech  genetics  genetic-testing  privacy 
may 2019 by pierredv
ToRPEDO Privacy Attack on 4G/5G Networks Affects All U.S. Carriers | Threatpost | Feb 2019
"Privacy-breaking flaws in the 4G and 5G mobile protocols could allow attackers to intercept calls, send fake amber alerts or other notifications, track location and more, according to a research team from Purdue University and the University of Iowa."

"The researchers uncovered three connected types of attacks that use this paging mechanism. The primary attack, dubbed ToRPEDO (short for TRacking via Paging mEssage DistributiOn), can be used to verify the location of a specific device. Attackers could also inject fake paging messages and mount denial-of-service (DoS) attacks, the team said.

Two other attacks enabled by ToRPEDO, the IMSI-Cracking attack and PIERCER (short for Persistent Information ExposuRe by the CorE netwoRk), allow an adversary to fully uncover the victim’s unique International Mobile Subscriber Identity (IMSI) number, if the phone number is known — opening the door to targeted user location-tracking."

"The TMSI is randomly assigned by the MME and is used to cloak the IMSI from side-channel attacks. The TMSI is supposed to change on a regular basis; however, previous sniffing attacks have been demonstrated that take advantage of the fact that this is not always the case."

"Beyond imprecise location-tracking and device status, ToRPEDO opens the door to much more serious attacks. For instance, once the attacker knows the victim’s paging occasion from ToRPEDO, the attacker can hijack the victim’s paging channel."

"Also, the researchers were able to validate that a tweet mentioning the victim’s Twitter handle triggers paging if the victim sets the Twitter app with push notifications on. This allows the attacker to associate a Twitter persona with a specific phone and phone number – and this likely extends to other services with push notifications, allowing he or she to start building a personal profile of the victim."

"Fortunately, each of the attacks have specific inherent mitigations."

In a paper presented at Mobile World Congress in Barcelona this week, the researchers explained that the issues arise from weaknesses in the cellular paging (broadcast) protocol. They started with the fact that when a mobile device is in its idle, low-power state, it will conserve battery life partly by polling for pending services only periodically.
5G  4G  privacy  IMSI  sniffing  surveillance  cyber-spectrum  spectrum-vulnerability 
february 2019 by pierredv
Protecting your online privacy is tough—but here's a start — Quartz, Katarzyna Szymielewicz, Jan 2019
"Many decisions that affect your life are now dictated by the interpretation of your data profile rather than personal interactions. "

"The bad news is that when it comes to your digital profile, the data you choose to share is just the tip of an iceberg. We do not see the rest that is hidden under the water of the friendly interfaces of mobile apps and online services. The most valuable data about us is inferred beyond our control and without our consent. It’s these deeper layers we can’t control that really make the decisions, not us."

First layer: "data you feed into social media and mobile applications"

"The second layer is made of behavioral observations. ... It contains things that you probably do not want to share with everybody, like your real-time location and a detailed understanding of your intimate and professional relationships. "

"The third layer is composed of interpretations of the first and second. This layer infers conclusions about not just what we do but who we are based on our behavior and metadata. ... The task of these profile-mapping algorithms is to guess things that you are not likely to willingly reveal."

"Binding decisions made by banks, insurers, employers, and public officers are made by big data and algorithms, not people. "

"... China. As part of their “social credit score” system, every citizen is ranked on professional and personal interactions, online activity, and public appearances. Fail to pay a parking ticket? Look up banned topics online? Your actions in real life have lasting effects, such as your ability to buy train tickets or send your kids to good schools."
Quartz  privacy  data  surveillance  behavior  China 
february 2019 by pierredv
Privacy and Data Security Harms - Daniel Solove 20014
"I recently wrote a series of posts on LinkedIn exploring privacy and data security harms. I thought I’d share them here, so I am re-posting all four of these posts together in one rather long post."
law  privacy 
february 2019 by pierredv
Privacy and Data Security Violations: What’s the Harm? - Daniel Solove, Jun 2014
"Courts have struggled greatly with the issue of harms for data violations, and not much progress has been made. We desperately need a better understanding and approach to these harms.

I am going to explore the issue and explain why it is so difficult. Both theoretical and practical considerations are intertwined here, and there is tremendous incoherence in the law as well as fogginess in thinking about the issue of data harms."
LinkedIn  law  privacy 
february 2019 by pierredv
T-Mobile, Sprint, and AT&T Are Selling Customers' Real-Time Location Data, And It's Falling Into the Wrong Hands, Motherboard Jan 2019
"T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country."

"The bounty hunter did this all without deploying a hacking tool or having any previous knowledge of the phone’s whereabouts. Instead, the tracking tool relies on real-time location data sold to bounty hunters that ultimately originated from the telcos themselves, including T-Mobile, AT&T, and Sprint, a Motherboard investigation has found. These surveillance capabilities are sometimes sold through word-of-mouth networks."

"at least one company, called Microbilt, is selling phone geolocation services with little oversight to a spread of different private industries, ranging from car salesmen and property managers to bail bondsmen and bounty hunters"
surveillance  security  privacy  T-Mobile  Sprint  AT&T  cellular 
january 2019 by pierredv
APNewsBreak: US suspects cellphone spying devices in DC, Apr 2018
"For the first time, the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages."

Christopher Krebs, DHS, “noted in the letter that DHS lacks the equipment and funding to detect Stingrays”

"Every embassy “worth their salt” has a cell tower simulator installed, Turner said. They use them “to track interesting people that come toward their embassies.” The Russians’ equipment is so powerful it can track targets a mile away, he said."

"Shutting down rogue Stingrays is an expensive proposition that would require wireless network upgrades the industry has been loath to pay for, security experts say. It could also lead to conflict with U.S. intelligence and law enforcement."
surveillance  security  privacy  sellular  StingRay  cellular  cyber-spectrum 
january 2019 by pierredv
The CLOUD Act was just signed into law: Here’s what you need to know - ExpressVPN Mar 2018
Tucked discreetly amid the 2,232-page government spending bill is a small provision that promises catastrophic consequences. Known as the CLOUD Act (Clarifying Lawful Overseas Use of Data), this legislature reverses any incremental progress governments have taken toward global privacy over the last few years.
ExpressVPN  privacy  surveillance  legislation 
january 2019 by pierredv
Opinion | Our Cellphones Aren’t Safe - The New York Times, Dec 2018
America’s cellular network is as vital to society as the highway system and power grids. Vulnerabilities in the mobile phone infrastructure threaten not only personal privacy and security, but also the country’s. According to intelligence reports, spies are eavesdropping on President Trump’s cellphone conversations and using fake cellular towers in Washington to intercept phone calls. Cellular communication infrastructure, the system at the heart of modern communication, commerce and governance, is woefully insecure. And we are doing nothing to fix it.
technology  security  privacy  NYT  EFF  opinion  cyber-spectrum  cellular 
december 2018 by pierredv
Exclusive: After massive hack, Marriott pledges to pay for new passports if fraud has taken place - MarketWatch
“With your passport number, name, and date of birth, anyone can apply for a new passport by reporting the existing one stolen, use it as a proof of identity to open a new bank account or access an existing one,” he said. “Your passport number is an integral part of your identity, along with your name and date of birth and it can cause immense damage in the wrong hands.”
security  privacy  passport  cybersecurity  identity-theft 
december 2018 by pierredv
Google’s smart city dream is turning into a privacy nightmare, Engadget Oct 2018
"Sidewalk Labs, an Alphabet division focused on smart cities, is caught in a battle over information privacy. The team has lost its lead expert and consultant, Ann Cavoukian, over a proposed data trust that would approve and manage the collection of information inside Quayside, a conceptual smart neighborhood in Toronto. Cavoukian, the former information and privacy commissioner for Ontario, disagrees with the current plan because it would give the trust power to approve data collection that isn't anonymized or "de-identified" at the source."

"Sidewalk Labs published some initial proposals for data governance in Quayside last week. The bottom line: It wants someone else to handle the issue."
engadget  Google  Alphabet  privacy 
october 2018 by pierredv
Genome Hackers Show No One’s DNA Is Anonymous Anymore | WIRED, Oct 2018
"Those interlocking family trees, connecting people through bits of DNA, have now grown so big that they can be used to find more than half the US population. In fact, according to new research led by Erlich, published today in Science, more than 60 percent of Americans with European ancestry can be identified through their DNA using open genetic genealogy databases, regardless of whether they’ve ever sent in a spit kit."
privacy  genomics  Wired 
october 2018 by pierredv
Most Americans Continue to Have Privacy and Security Concerns, NTIA Survey Finds | National Telecommunications and Information Administration, Aug 2018
"Nearly three-quarters of Internet-using households had significant concerns about online privacy and security risks in 2017, while a third said these worries caused them to hold back from some online activities. About 20 percent said they had experienced an online security breach, identity theft, or a similar crime during the past year.

However, the 2017 survey showed a decline in households reporting concerns and avoiding certain online activities compared with the 2015 survey, which first asked these questions."

"An analysis of the 2017 data reveals that the decrease in reported privacy and security concerns was driven in large part by a reduction in the number of households specifically naming identify theft as a concern. "
NTIA  privacy  US  trends 
august 2018 by pierredv
Security Flaws On Comcast’s Login Page Exposed Customers’ Personal Information - BuzzFeed aug 2018
Comcast Xfinity inadvertently exposed the partial home addresses and Social Security numbers of more than 26.5 million customers, according to security researcher Ryan Stevenson, who discovered the security flaws. Two previously unreported vulnerabilities in the high-speed internet service provider’s online customer portal made it easy for even an unsophisticated hacker to access this sensitive information.
BuzzFeed  security  privacy  Comcast  spoofing 
august 2018 by pierredv
Google Analytics Opt-out Browser Add-on Download Page
To provide website visitors the ability to prevent their data from being used by Google Analytics, we have developed the Google Analytics opt-out browser add-on for the Google Analytics JavaScript (ga.js, analytics.js, dc.js).
privacy  advertising  opt-out  tools  browser  marketing  cookies  tracking  Google 
july 2018 by pierredv
Your Online Choices | EDAA
Welcome to a guide to online behavioural advertising and online privacy.

On this website you'll find information about how behavioural advertising works, further information about cookies and the steps you can take to protect your privacy on the internet.

This website is written and funded by the internet advertising industry and supports a pan-European industry initiative to enhance transparency and control for online behavioural advertising. See here for further details.
privacy  advertising  opt-out  tools  browser  cookies 
july 2018 by pierredv
Orlando Airport Becomes 1st In US To Require Face Scan Of All Int’l Travelers – Talking Points Memo
The expected announcement Thursday at Orlando International Airport alarms some privacy advocates who say there are no formal rules in place for handling data gleaned from the scans, nor formal guidelines on what should happen if a passenger is wrongly prevented from boarding.
TPM  aviation  surveillance  facial-recognition  privacy 
july 2018 by pierredv
CEO of Facial Recognition Company Kairos Argues that the Technology's Bias and Capacity For Abuse Make It Too Dangerous For Use By Law Enforcement - Slashdot
Brian Brackeen, chief executive officer of the facial recognition software developer Kairos, writes in an op-ed:
Recent news of Amazon's engagement with law enforcement to provide facial recognition surveillance (branded "Rekognition"), along with the almost unbelievable news of China's use of the technology, means that the technology industry needs to address the darker, more offensive side of some of its more spectacular advancements. Facial recognition technologies, used in the identification of suspects, negatively affects people of color. To deny this fact would be a lie. And clearly, facial recognition-powered government surveillance is an extraordinary invasion of the privacy of all citizens -- and a slippery slope to losing control of our identities altogether.
Slashdot  facial-recognition  surveillance  privacy 
july 2018 by pierredv
Mobile Giants: Please Don’t Share the Where — Krebs on Security, May 2018
the major mobile providers in the United States — AT&T, Sprint, T-Mobile and Verizon — are selling this location information to third party companies — in real time — without your consent or a court order, and with apparently zero accountability for how this data will be used, stored, shared or protected.
privacy  geospatial  Brian-Krebs  surveillance  cellular 
may 2018 by pierredv
Do Algorithms Rule the World? Algorithmic Decision-Making and Data Protection in the Framework of the GDPR and Beyond – Economic and Policy Implications of AI, Blog Post #2 | The Technology Policy Institute Apr 2018
"a summary of Do Algorithms Rule the World? Algorithmic Decision-Making and Data Protection in the Framework of the GDPR and Beyond by Dr. Maja Brkan. This paper was presented at the Technology Policy Institute Conference on The Economics and Policy Implications of Artificial Intelligence, February 22, 2018."

"Article 22 of the GDPR gives individuals the right not to be subject to a decision based solely on automated processing and prohibits automated decision-making that produces binding effects."
TPI  privacy  AI  GDPR 
april 2018 by pierredv
CLOUD Act Creates New Framework for Cross-Border Data Access | Global Policy Watch Mar 2018
"On March 23, 2018, Congress passed, and President Trump signed into law, the Clarifying Lawful Overseas Use of Data (“CLOUD”) Act, which creates a new framework for government access to data held by technology companies worldwide.The CLOUD Act, enacted as part of the Consolidated Appropriations Act, has two components."

Part I:  Extraterritorial Reach of U.S. Orders and Comity Rights for Providers

Part II: Framework for Bilateral Agreements on Cross-Border Data Requests
Covington  data  cybersecurity  legislation  privacy 
march 2018 by pierredv
Canvas Defender browser extension (canvas fingerprint blocker) | Multiloginapp
Via John Helm

Canvas fingerprint is the result of data transformation performed by your computer. A website sends a set of drawing instructions to your browser. Your browser transforms it into an image. Due to discrepancies in hardware and software, the resulting image produced on different machines contains minor differences. Those differences can be memorized by websites and compared to each other like fingerprints.

Canvas Defender adds a persistent “noise” to the resulting image, thus altering it and making different from what your genuine canvas fingerprint would be. This alone does not make your machine untraceable but allows to drop the fingerprint at will. More information can be found in our article “How Canvas Fingerprint Blockers Make You Easily Trackable”.
browser  privacy 
march 2018 by pierredv
Replacing Social Security Numbers Is Harder Than You Think - Motherboard, Steven Bellovin, Oct 2017
"This is only the latest of many data breaches; why have we not learned better? Using SSNs like this seems like an obviously bad idea—even the White House is considering a proposal to replace them—but solving the problem is a lot harder than it seems. Furthermore, alternatives are often worse in other respects."

"The massive personal databases used by credit reporting agencies are rightly controversial, but it's hard to see how a modern economy can function without something like them. Credit bureaus are much older than computers; the correct answer is stricter controls on what information can be kept and on how it can be used."

"If that guess is correct, it suggests that the real solution is regulatory: make credit providers liable for the full damages, including ongoing inconvenience, suffered by victims of identity theft. SSNs are not the problem; authentication commensurate with the risk to all parties, including especially individuals, is."
identity  cybersecurity  security  privacy  SSN  Motherboard  credit-reporting-agencies  Steven-Bellovin 
october 2017 by pierredv
Whose Drone Was That Anyway? - IEEE Spectrum
"The Chinese company’s proposal attempts to balance the public’s interest in being able to identify who is using a drone at a particular place and time with the privacy interests of the drone’s owner or operator."
drones  privacy  IEEE-Spectrum 
april 2017 by pierredv
Boy Bye Bot – Fake number for real fuckbois
A CHATBOT THAT CREEPS CAN TEXT INSTEAD OF BUGGING YOU.

Encounter creep and/or fuckboi.
Give them this number: 1-626-466-3293 (1 626 GOODBYE))
When creep texts the number (thinking it’s you), a chatbot replies with craaazy texts, links to Jezebel articles, and urges them to donate to Planned Parenthood.
Sit back and watch what they text in: Creepers vs. The Bot
privacy  humor 
march 2017 by pierredv
Internet of Things Teddy Bear Leaked 2 Million Parent and Kids Message Recordings - Motherboard
"A company that sells “smart” teddy bears leaked 800,000 user account credentials—and then hackers locked it and held it for ransom."
privacy  security  cybersecurity  IoT 
february 2017 by pierredv
Security and Privacy Guidelines for the Internet of Things - Schneier on Security - Feb 2017
"Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found:"
privacy  security  IoT  Bruce-Schneier 
february 2017 by pierredv
Op-ed: I’m throwing in the towel on PGP, and I work in security | Ars Technica - Filipps Valsorda Dec 2016
“If you need to securely contact me... DM me asking for my Signal number.”
"If we meet in person and need to set up a secure channel, we will just exchange a secret passphrase to use with what's most appropriate: OTR, Pond, Ricochet."
"All in all, I should be the perfect user for PGP: competent, enthusiast, embedded in a similar community. But it just didn't work."
"A long-term key is as secure as the minimum common denominator of your security practices over its lifetime. It's the weak link."
PGP  privacy  cybersecurity  ArsTechnica  opinion  Signal  * 
december 2016 by pierredv
Maybe Drone Privacy Shouldn't Be a Federal Case - IEEE Spectrum
"Yesterday, the U.S. Federal Aviation Administration’s new drone rules went into effect. While many drone enthusiasts were pleased to see some long-awaited progress on this front, the folks at the Electronic Privacy Information Center (EPIC), a privacy advocacy organization in Washington, D.C., don’t count in that group. They’ve been wrangling in court with the FAA over the lack of privacy safeguards in the new regulations—an issue that has dogged drone regulation for years."
"Causby’s legal case went all the way to the Supreme Court in 1946, where the justices found that despite need for public airspace, landowners still commanded rights to “the immediate reaches of the enveloping atmosphere.” In Causby’s case, those immediate reaches went all the way up to 365 feet above ground level. We’re talking prime drone territory here."
IEEE-Spectrum  drones  privacy  FAA  law  opinion 
september 2016 by pierredv
Facebook Timeline Cleaner
"Facebook Timeline Cleaner works such that a user logs in to the Facebook Timeline, and navigates over the TimeLine to the 'Activity Log' section."
Facebook  Greasyfork  scripts  Firefox  privacy 
may 2016 by pierredv
Using Billboards, Company Will Collect Personal Information To Help Advertisers : The Two-Way : NPR Mar 2016
"Clear Channel Outdoor — one of the largest outdoor advertising companies in the U.S. — is starting a new program called Radar that will use billboards to map real-world habits and behaviors from nearby consumers."
NPR  privacy  surveillance  advertising  ClearChannel 
march 2016 by pierredv
Inside China’s plan to give every citizen a character score - New Scientist 17 Oct 2015
"In the first instalment in a two-part special into how our data is used or misused, New Scientist looks at China’s ambitious Social Credit System" "WHERE you go, what you buy, who you know, how many points are on your driving licence: these are just a few of the details that the Chinese government will track – to give scores to all its citizens. China’s Social Credit System (SCS) will come up with these ratings by linking up personal data held by banks, e-commerce sites and social networks. The scores will serve not just to indicate an individual’s credit risk, for example, but could be used by potential landlords, employers and even romantic partners to gauge an individual’s character." "The Chinese government already has a website that will eventually allow any citizen to check out another’s credit rating. Run with help from Baidu, China’s main search engine, it uses data from 37 central government departments and also displays interactions with the state, such as any court ju"
NewScientist  China  surveillance  privacy 
december 2015 by pierredv
A Slow Boat to Fast Data: Why is Palestine Still Waiting for 3G? | Electronic Frontier Foundation Nov 2015
"What might improve communications privacy for Palestine? Upgrading to 3G will certainly help: their current national networks are slow and simple to intercept, while faster networks operated by Israeli companies are vulnerable to Israeli surveillance. But 3G doesn't guarantee privacy."
privacy  surveillance  2G  3G  Israel  Palestine  EFF 
november 2015 by pierredv
3 dead trolls - The privacy song - YouTube
"Whatever you do, when they're talking to you: For god's sakes, lie!" "We can beat them back with bullshit" "They can take away or privacy, but they can't have the truth"
privacy  video  music  quotations 
november 2015 by pierredv
FTC Chair Edith Ramirez outlines concerns about Big Data - SiliconBeat Oct 2015
"Ramirez called out data brokers and the dangers of algorithms to stereotype people. Algorithms can come with “embedded assumptions that lead to adverse impacts, that reinforce inequality,” she said. For example, algorithms can direct certain services to some students who the algorithms think are more likely to go to college, leaving out students who might also benefit from the information." The agency is concerned about “algorithmic transparency,” she said, and how “algorithms can be manipulated.”
SiliconBeat  FTC  privacy  BigData 
november 2015 by pierredv
EU’s Highest Court Invalidates Safe Harbor with Immediate Effect - Covington & Burling Oct 2015
"Yesterday, the Court of Justice of the European Union (the “CJEU”) invalidated the European Commission’s Decision on the EU-U.S. Safe Harbor arrangement (Commission Decision 2000/520 – see here). The Court responded to pre-judicial questions put forward by the Irish High Court in the so-called Schrems case. More specifically, the High Court had enquired, in particular, about the powers of European data protection authorities (“DPAs”) to suspend transfers of personal data that take place under the existing Safe Harbor arrangement. The CJEU ruled both on the DPAs’ powers and the validity of the Safe Harbor, finding that national data protection authorities do have the power to investigate in these circumstances, and further, that the Commission decision finding Safe Harbor adequate is invalid. This decision affects all companies that rely on Safe Harbor. They now need to consider alternative data transfer mechanisms."
privacy  EU  SafeHarbor  Covington 
october 2015 by pierredv
MS researchers claim to crack encrypted database with old simple trick | Ars Technica
A team of Microsoft researchers led by Seny Kamara claims to have been successful at recovering a substantial amount of data from health records stored in CryptDB (PDF), a database technology that uses layers of encryption to allow users to search through encrypted data without exposing its contents.
ArsTechnica  encryption  privacy  de-anonymization  anonymity  Microsoft  MSR  SQL  CryptDB 
september 2015 by pierredv
NASA-backed collaborative project may revolutionise spectrum monitoring - POlicyTracker May 2015
"BigWhoop, the brainchild of Space Apps Stuttgart, which won a US National Aeronautical and Space Administration (NASA) space applications challenge, aims to create an open-source aircraft and satellite tracking system and much more, developer Andreas Hornig told PolicyTracker. The system will continuously monitor the spectrum between 50 MHz and 2 GHz, using a sensor network with software-defined radio (SDR) devices for ground-based monitoring, according to the abstract of a paper to be presented at the International Astronautical Congress 2015. It's a “citizen science project” limited only by people's imagination people and regulation, Hornig said."
PolicyTracker  BigWhoop  crowdsourcing  RF  sensors  NASA  privacy  surveillance 
june 2015 by pierredv
Europe pivots between safety and privacy online - CSMonitor.com - Jan 2015
John Emerson: “What’s the first thing an American says when [he or she] sees Google Street View? ... An American will go, ‘Hey, there’s Billy in the front yard.’ The German reaction is, ‘Oh my God, how can they do that?’ ” "Yet all of Europe, [member of the European Parliament] Mr. Moraes says, agrees on one point that sets it apart from the US: If Americans value freedom of speech as an inalienable right that sometimes must trump privacy, in Europe the right to privacy is so fundamental that all national laws must consider it. . . We often appreciate the companies we are interacting with. The issue is about the principles of bulk collection, issues of trust, issues of mass surveillance, and issues of accountability."
CSMonitor  privacy  Europe 
february 2015 by pierredv
Using NYC Taxi Data to identify Muslim taxi drivers » The Interdisciplinary Internet Institute
"Remember that NYC Taxi data set that allowed you to see who visited a gentlemen’s clubs and which celebrity took a taxi where? Reddit user uluman now seems to have found a way to distinguish Muslim taxi drivers from the set" by looking at gaps at prayer times
privacy  datamining  surveillance  religion 
january 2015 by pierredv
Datacoup - Reclaim your personal data
"Unlock the Value of Your Personal Data - Introducing the world's first personal data marketplace" via Linda Doyle, Oct 2014
data  data-market  commerce  privacy 
october 2014 by pierredv
Apple, Google, and Congress: The smartphone encryption standoff - TechPolicDaily Oct 2014
"Given the harsh reaction of top US government officials to Apple and Google’s announcements that they would install encryption protection in their smart phones, both companies (particularly Apple officials) have reason to feel the sting of Pogo’s famous lament. Their proposed encryptions would allow only users – and no outside individual or public official – to unblock their devices. Departing Attorney General Eric Holder called out (without specifically naming) the two companies, stating that it is “worrisome to see some companies thwarting our ability” to quickly identify and apprehend child sex abusers."
Apple  Google  FBI  NSA  smartphone  encryption  TechPolicyDaily  privacy  security  AEI 
october 2014 by pierredv
What are you revealing online? Much more than you think | ideas.ted.com
via Linda Chang, Jul 2014 "What can be guessed about you from your online behavior? Two computer privacy experts — economist Alessandro Acquisti and computer scientist Jennifer Golbeck — on how little we know about how much others know."
TED  privacy  surveillance  Alessandro-Acquisti  Jennifer-Golbeck 
august 2014 by pierredv
« earlier      
per page:    204080120160

Copy this bookmark:





to read