mfioretti: privacy* + tff*

Bookmarks on this page are managed by an admin user.

60 bookmark(s) - Sort by: Date ↓ / Title / Voting / - Bookmarks from other users for this tag

  1. There was once a very financially-rewarding global business built on selling people’s bodies.

    We called it slavery.

    Today, we frown upon that particular practice in polite company. It’s about time to ask ourselves, however, what are we to call the business of selling everything about a person that makes them who they are apart from their body?

    If the question makes you feel uncomfortable, good.

    If just thinking about it makes you feel uncomfortable, imagine how living within a system where this business model is a monopoly will make you feel. Then imagine what a society shaped by its ramifications will look like. Imagine its effects on equality, human rights, and democracy.

    You don’t have to try too hard to imagine any of this because we are already living in the early days of just such a world today.

    And yet it’s still early enough that I’m hopeful we can challenge the unfettered progress of this Silicon Valley model that is toxic to our human rights and threatens the very pillars of democracy itself.

    The digital imperialism of Silicon Valley robs us of the ownership and control of our most personal and intimate spaces while simultaneously depriving us of a core democratic instrument: the public sphere.

    The Silicon Valley model fosters the illusion of expanding the public sphere into the virtual realm while actually contributing to its destruction. It does so by replacing traditionally public spaces with privately-owned digital alternatives of its own design.

    We see Twitter, for example, as a public sphere that furthers democratic ideals. It looks very much like a global park where everyone gets a Speakers’ Corner. In reality, however, it is actually a private space much like a shopping mall.

    Just as the owners of a shopping mall are well within their rights to throw me off their private property if they don’t like the message on the t-shirt I’m wearing, Twitter is well within its rights to decide what you can and cannot say on its private property. It is not a public sphere. It is not part of the commons.

    Twitter is as much a public space as a McDonald’s
    Voting 0
  2. I switched from using a BlackBerry to an Android phone a few years ago it really irked me that the only way to keep my contacts info on the phone was to also let Google sync them into their cloud. This may not be true universally (I think some samsung phones will let you store contacts to the SD card) but it was true for phone I was using then and is true on the Nexus 4 I'm using now. It took a lot of painful digging through Android source and googling, but I successfully ended up writing a bunch of code to get around this.

    I've been meaning to put up the code and post this for a while, but kept procrastinating because the code wasn't generic/pretty enough to publish. It still isn't but it's better to post it anyway in case somebody finds it useful, so that's what I'm doing.

    In a nutshell, what I wrote is an Android app that includes (a) an account authenticator, (b) a contacts sync adapter and (c) a calendar sync adapter. On a stock Android phone this will allow you to create an "account" on the device and add contacts/calendar entries to it.

    Note that I wrote this to interface with the way I already have my data stored, so the account creation process actually tries to validate the entered credentials against a webhost, and the the contacts sync adapter is actually a working one-way sync adapter that will download contact info from a remote server in vcard format and update the local database. The calendar sync adapter, though, is just a dummy. You're encouraged to rip out the parts that you don't want and use the rest as you see fit. It's mostly meant to be a working example of how this can be accomplished.

    The net effect is that you can store contacts and calendar entries on the device so they don't get synced to Google, but you can still use the built-in contacts and calendar apps to manipulate them. This benefits from much better integration with the rest of the OS than if you were to use a third-party contacts or calendar app.
    Voting 0
  3. Researchers from UCL, Stanford Engineering, Google, Chalmers and Mozilla Research have built a new system that protects Internet users' privacy whilst increasing the flexibility for web developers to build web applications that combine data from different web sites, dramatically improving the safety of surfing the web.
    Tags: , , , , , by M. Fioretti (2014-10-14)
    Voting 0
  4. One of the more common responses we've seen to all of the revelations about all of that NSA surveillance, is the response that "Well, I don't think the NSA really cares about what I'm doing." A perfect example of that is long-time NSA defender Ben Wittes, who recently wrote about why he's not too worried that the NSA is spying on him at all, basically comparing it to the fact that he's confident that law enforcement isn't spying on him either:

    As I type these words, I have to take on faith that the Washington D.C. police, the FBI, the DEA, and the Secret Service are not raiding my house. I also have to take on faith that federal and state law enforcement authorities are not tapping my various phones. I have no way of knowing they are not doing these things. They certainly have the technical capability to do them. And there’s historical reason to be concerned. Indeed, there is enough history of government abuse in the search and seizure realm that the Founders specifically regulated the area in the Bill of Rights. Yet I sit here remarkably confident that these things are not happening while my back is turned—and so do an enormous number of other Americans.

    The reason is that the technical capability for a surveillance event to take place does not alone amount to the reality—or likelihood—of that event’s taking place....

    For much the same reason as I am not rushing home to guard my house, I have a great deal of confidence that the National Security Agency is not spying on me. No doubt it has any number of capabilities to do so. No doubt those capabilities are awesome—in the wrong hands the tools of a police state. But there are laws and rules that protect me, and there are compliance mechanisms that ensure that the NSA follows those laws and rules. These systems are, to be sure, different from those that restrain the D.C. cops, but they are robust enough to reassure me.

    Julian Sanchez has a blistering response to that, appropriately entitled Check Your Privilege, which highlights that while Wittes, a well-paid, white, DC-based policy think tank worker, may be confident of those things, plenty of other folks are not nearly so confident, and that the NSA has made it pretty clear that they shouldn't be so confident.
    Voting 0
  5. le variabili socio-demografiche come sesso, età, e istruzione, non incidono sulla gestione delle informazioni. Segna, invece, il grado di mobilità. Spiega Staiano: "Più l'utente si sposta durante il giorno, più tende a considerare i suoi dati importanti. La geolocalizzazione è considerata la notizia più personale e, quindi, più privata". "M'inquieta far sapere dove sono stato", "non voglio essere geolocalizzato": sono le frasi che il team ha sentito ripetere più spesso. "Tutto, si presuppone, che avvenga a un livello inconscio. Abbiamo poi notato delle anomalie: giorni in cui i volontari chiedevano, in cambio, una somma di denaro più alta". Si trattava di momenti particolari, in cui si sfuggiva alla solita routine: l'otto dicembre, giorno dell'Immacolata Concezione, e una mattina in cui a Trento c'era stata una tempesta che aveva bloccato il traffico. "Anche in quei casi, però, le persone monitorate non hanno chiesto che pochi euro e la cifra si abbassava tra chi era abituato a usare più applicazioni".

    i cosiddetti data broker, che grazie a smartphone, social network, cookies e sensori collezionano informazioni su chi siamo, chi conosciamo, dove siamo, dove siamo stati e persino dove progettiamo di andare. Con l'obiettivo di rivenderle, a nostra insaputa e con buona pace della privacy, alle grandi compagnie commerciali, assicurative e finanziarie pronte a usarle per pubblicità, polizze e crediti su misura. Il prezzo è di circa 0.0005 centesimi di dollari l'una, ha stimato il Financial Times lo scorso anno, ma la valenza è molto più alta perché, come avverte un report del World Economic Forum del 2011, minando e analizzando i gigabyte disseminati in rete e non solo è possibile "avere l'abilità di capire e persino predire dove gli umani focalizzeranno la loro attenzione e le loro attività a livello individuale, di gruppi, e globale", quindi anche che cosa compreranno.

    Uno scambio difficile da fermare e controllare: impossibile dire con esattezza che cosa finisce nelle mani di chi; una sola certezza: "L'unico a non aver alcuna voce in capitolo è proprio chi produce le notizie, cioè gli utenti",
    Voting 0
  6. n pratica, se l’utente utilizza l’app di Facebook per chattare presto dovrà per forza scaricare l’app di Messenger. Lo «switch» avverrà inizialmente in Europa e interesserà gli smartphone che usano Android e gli iPhone Apple, ma non è ancora stata fornita una data. Gli utenti cliccheranno su un’icona messaggio e saranno reindirizzati sull’app Messenger tramite la quale potranno mandare un messaggio, foto o fare chiamate gratis. Quindi tutti su Messenger e, in molti, già si chiedono: cosa ne sarà di WhatsApp? Perché il fondatore di Facebook dopo aver appena acquistato una app di messaggistica mobile multi-piattaforma, punta con così tanta decisione su Messenger? Cosa abbia intenzione di fare realmente Zuckerberg, al momento, non è dato sapere ma Facebook continua a smentire le voci di un consolidamento delle due applicazioni. Messenger non si unirà con WhatsApp. Per ora.
    Voting 0
  7. The next threat to your privacy could be hovering over head while you walk down the street.

    Hackers have developed a drone that can steal the contents of your smartphone -- from your location data to your Amazon (AMZN, Fortune 500) password -- and they've been testing it out in the skies of London. The research will be presented next week at the Black Hat Asia cybersecurity conference in Singapore.
    Tags: , , , , by M. Fioretti (2014-03-26)
    Voting 0
  8. 1. Facebook has a track record of not keeping its promises to users. 2. The ethos of both companies when it comes to privacy is diametrically opposite. 3. The probability that WhatsApp messages and content will be intercepted because of Facebook's participation in NSA's PRISM spying programme. 4.Facebook slurping WhatsApp's large repository of phone numbers. 5. Two hundred trackers already monitor your internet use when you are not using Facebook and now they tracking mobile use much more granularly. This week the Indian competition regulator (CCI) also told the media that the acquisition would be subject to scrutiny. However, unlike the US regulator the Indian regulator does not have the mandate to examine the acquisition from a privacy perspective.
    Voting 0
  9. Indeed, the question in this case can more properly be styled as follows: When do present-day evolutions in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies become so thoroughly unlike those considered by the Supreme Court thirty-four years ago that a precedent like Smith simply does not apply? The answer, unfortunately for the Government, is now.
    Voting 0
  10. A moment ago, it looked as though Google cared about this massive privacy problem. Now we have our doubts. The only way to dispel them, frankly, is for Google to urgently reenable the App Ops interface, as well as adding some polish and completing the fundamental pieces that it is missing:

    * Android users should be able to disable all collection of trackable identifiers by an app with a single switch, including data like phone numbers, IMEIs, information about the user's accounts.

    * There should be a way to disable an app's network access entirely. It is clear that a large fraction of apps (including flashlights, wallpapers, UI skins, many games) simply don't need network access and, as we saw last week, are prone to abuse it.

    * The App Ops interface needs to be smoothed out an properly integrated into the main OS user interface, including the Settings->Apps menus and the Play Store. There are numerous ways to make App Ops work for developers. Pick one, and deploy it.

    In the mean time, we're not sure what to say to Android users. If app privacy is especially important to you — if, for instance, you want to be able to install an app like Shazam or Skype or Brightest Flashlight without giving it permission to know your location — we would have to advise you not to accept the update to 4.4.2. But this is also a catastrophic situation, because the update to Android 4.4.2 contains fixes to security and denial-of-service bugs. So, for the time being, users will need to chose between either privacy or security on the Android devices, but not both.

    Google, the right thing to do here is obvious.
    Tags: , , , , by M. Fioretti (2013-12-16)
    Voting 0

Top of the page

First / Previous / Next / Last / Page 1 of 6 Online Bookmarks of M. Fioretti: Tags: privacy + tff

About - Propulsed by SemanticScuttle