2012 Nov 11, 1:26
Moral: laws should cover behavior not specific technologies. The implementation can change, laws shouldn’t take such dependencies.
2012 Mar 9, 3:30
show up with unfortunate results in web searches. Information is too easily copyable and archive-able to make removing these results a viable option, so clearly the solution is to create more
Create fake profiles on Facebook using your name but with a different photo, different date of birth, and different hometown. Create enough doppelgangers to add noise to the search results for
your name. And have them share embarrassing stories on their blogs. The goal is to ensure that the din of your alternates drowns out anything embarrassing showing up for you.
Although it will look suspicious if you're the only name on Google with such chaff. So clearly you must also do this for your friends and family. Really you'll be doing them a favor.
2012 Feb 17, 12:17
What Target discovered fairly quickly is that it creeped people out that the company knew about their pregnancies in advance.
“If we send someone a catalog and say, ‘Congratulations on your first child!’ and they’ve never told us they’re pregnant, that’s going to make some people uncomfortable,” Pole told me. “We are
very conservative about compliance with all privacy laws. But even if you’re following the law, you can do things where people get queasy.”
2011 Dec 10, 6:49
Public site that tracks who (by IP address) downloads what and lets anyone view this.
2011 Nov 30, 4:22
“TechCrunch and others are reporting that a program called “Carrier IQ”
that comes pre-installed on Sprint phones has some pretty amazing spyware capabilities, right down to keylogging everything you do on the phone.”
2011 Jun 20, 2:09
"Why did the hackers at Lulz Security ("LulzSec") invade Sony Pictures websites, take down cia.gov, and release 60,000+ e-mail addresses and passwords? For the lulz, of course—but what might look
lulzy to one person could certainly enrage another. In honor of its 1,000th tweet, the witty wankers of LulzSec released a manifesto of sorts, defending their actions to the angry Internets."
2011 Apr 27, 2:23
"The gradual disappearance of open wireless networks is a tragedy of the commons, with a confusing twist of privacy and security debate. This essay explains why the progressive locking of wireless
networks is harmful — for convenience, for privacy and for efficient use of the electromagnetic spectrum."
2011 Apr 8, 2:07
"On average their method gets to within 690 metres of the target and can be as close as 100 metres – good enough to identify the target computer's location to within a few streets.", "When a landmark
machine and the target computer have shared a router, the researchers can compare how long a packet takes to reach each machine from the router; converted into an estimate of distance, this time
difference narrows the search down further."
2011 Mar 29, 2:52 2011 Mar 10, 6:14
Polar bears destroy hiddern cameras (filming them for Science!) It is a well known fact that polar bears are very protective of their rights to privacy.
2010 Jun 25, 2:58
"... all you need to do is specify the /W switch and the file or folder you want to overwrite—after you have already deleted it. cipher /W:C:\Path\To\Folder"
2010 May 27, 8:53
2010 May 27, 8:52
Time to stock up on prepaid anonymous cell phones before its too late! Or just use the call encryption Android application...
2010 May 24, 6:26
"What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors," by Jon Howell and Stuart Schechter.
"We introduce the sensor-access widget, a graphical user interface element that resides within an application's display. The widget provides an animated representation of the personal data being
collected by its corresponding sensor, calling attention to the application's attempt to collect the data."
Not sure how well that scales...
2010 May 23, 4:32
"The ability to detect visitors' browsing history requires just a few lines of code. Armed with a list of websites to check for, a malicious webmaster can scan over 25 thousand links per second (1.5
million links per minute) in almost every recent browser."
2010 May 6, 7:25
developers with all the functionality they need, and to protect our users' privacy at the same time."
2010 Apr 26, 3:03
"Find out what personal data Facebook publishes about people by entering their Facebook username here: zesty.ca/facebook."
2010 Apr 21, 6:49
"OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end-user). It also provides a process for end-users to authorize
third-party access to their server resources without sharing their credentials (typically, a username and password pair), using user-agent redirections."
2010 Apr 21, 6:47
"After years of secrecy (and the occasional leak), a draft of the Anti-Counterfeiting Trade Agreement (ACTA) treaty has finally been released by negotiators. We've delved deep into the treaty,
highlighting its numerous problems. Indeed, there's a lot not to like about the treaty: Internet disconnections, anticircumvention prohibitions, and even the ability for rightsholders to get
injunctions if they can show infringement is imminent."
2010 Mar 9, 5:35
Comparison of US claim 'the tort of appropriation' to Google video case in Italy.