gwijthoff + privacy   75

‘Do Not Track’ Privacy Tool Doesn’t Do Anything
“Do Not Track” is like spray-on sunscreen, a product that makes you feel safe while doing little to actually protect you.
privacy 
23 days ago by gwijthoff
Just Don’t Call It Privacy - The New York Times
In a surveillance economy where companies track, analyze and capitalize on our clicks, the issue at hand isn’t privacy. The problem is unfettered data exploitation and its potential deleterious consequences — among them, unequal consumer treatment, financial fraud, identity theft, manipulative marketing and discrimination.

In other words, asking companies whose business models revolve around exploiting data-based consumer-influence techniques to explain their privacy policies seems about as useful as asking sharks to hold forth on veganism.
privacy  surveillance  techlash  regulation 
8 weeks ago by gwijthoff
Banks and Retailers Are Tracking How You Type, Swipe and Tap - The New York Times
When clients log in to their Royal Bank of Scotland accounts, software begins recording more than 2,000 different interactive gestures. On phones, it measures the angle at which people hold their devices, the fingers they use to swipe and tap, the pressure they apply and how quickly they scroll. On a computer, the software records the rhythm of their keystrokes and the way they wiggle their mouse.
privacy  gesture  habit 
august 2018 by gwijthoff
Princeton WebTAP – Web Transparency & Accountability Project @ Princeton
Measure Threats
We monitor websites and services to find out what user data companies collect, how they collect it, and what they do with it. With our measurement platform, we study privacy, security, and ethics of consumer data usage.

Create Change
Our external oversight exposes the privacy practices of companies and forces them to make improvements. In addition, the data and studies that we produce assist regulators and privacy tool developers in their efforts.
privacy 
august 2018 by gwijthoff
Facebook Wanted Us to Kill This Investigative Tool
The episode demonstrated a huge problem to us: Journalists need to probe technological platforms in order to understand how unseen and little understood algorithms influence the experiences of hundreds of millions of people—whether it’s to better understand creepy friend recommendations, to uncover the potential for discrimination in housing ads, to understand how the fake follower economy operates, or to see how social networks respond to imposter accounts. Yet journalistic projects that require scraping information from tech platforms or creating fictitious accounts generally violate these sites’ terms of service.
privacy  facebook  tech_journalism 
august 2018 by gwijthoff
Find Out What Google and Facebook Know About You – Trust Issues – Medium
How to do a data detox, in a zillion easy steps

Baratunde Thurston
privacy 
june 2018 by gwijthoff
Why aren’t privacy groups fighting to regulate Facebook?
Even before I left the world of internet-freedom advocacy, I disagreed with its emphasis on constitutional abstractions over real-world harm to communities, and it’s a tension that I think helps explain why the major internet-privacy groups are so silent about Facebook’s mess now.
privacy  facebook 
may 2018 by gwijthoff
The Personal Data of 346,000 People, Hung on a Museum Wall - The New York Times
Deng Yufeng wanted to create art that prods people to question their lack of data privacy. What better way, he reasoned, than to buy the personal information of more than 300,000 Chinese people off the internet and display it in a public exhibition?

The police did not appreciate the irony.
privacy  self  media_art 
april 2018 by gwijthoff
Here's my plan to save Twitter: let's buy it | Nathan Schneider | Opinion | The Guardian
This is the kind of thinking at work in the growing movement for platform cooperativism – a series of experiments in shared ownership and governance for online platforms. But it’s an old idea, too. When I mentioned a Twitter buyout to co-op and crowdfunding veteran Danny Spitzberg, he reminded me of the Green Bay Packers. Have you ever wondered why the small-ish city of Green Bay has held on to its really good football team? It’s because, rather than being traded around by billionaires, the team started selling shares to its fans, starting in 1923. That has resulted in sold-out games, affordable ticket prices, tasteful stadium advertising, and an all-around successful, sustainable business model for generations.
socialism  twitter  socialmedia  privacy 
march 2018 by gwijthoff
Watch It, Facebook: New EU Data Rules May Have Broad Impact - The New York Times
GDPR, the right to privacy, and the possibility that Facebook, Google, etc. will be run differently in Europe than the rest of the world to meet regulations.

the European Union's new General Data Protection Regulation, which will be enforced from May 25. The rules, approved two years ago, also make it easier for consumers to give and withdraw consent for the use of their data and apply to any company that uses the data of EU residents, no matter where it is based.
privacy  regulation  information_policy  information_economy 
march 2018 by gwijthoff
Corporate Surveillance in Everyday Life | Cracked Labs
Report: How thousands of companies monitor, analyze, and influence the lives of billions. Who are the main players in today’s digital tracking? What can they infer from our purchases, phone calls, web searches, and Facebook likes? How do online platforms, tech companies, and data brokers collect, trade, and make use of personal data?
privacy  surveillance  facebook 
march 2018 by gwijthoff
10 Breakthrough Technologies 2018 - MIT Technology Review
The tool is an emerging cryptographic protocol called a zero-­knowledge proof. Though researchers have worked on it for decades, interest has exploded in the past year, thanks in part to the growing obsession with cryptocurrencies, most of which aren’t private.
future2.0  2018  privacy 
february 2018 by gwijthoff
The Center for Humane Technology Doesn’t Want Your Attention - Cyborgology
In the mean time, the Center may find useful resources and ground-up expertise among those who have already been building movements for users to take control of their digital lives such as:

Article 19; Bits of Freedom; Coding Rights; Committee to Protect Journalists; Cryptoparty; Data Detox Kit; Derechos Digitales; Digital Rights Foundation; Electronic Frontier Foundation; Freedom of the Press Foundation; The Glass Room; Gobo.Social; Internet Freedom Festival; Mozilla Internet Health Project; Privacy International; Responsible Data Project; Security in a Box; Share Lab; Simply Secure; Surveillance Self Defence Kit; Tactical Technology Collective; Take Back The Tech.
privacy  dh_pedagogy 
february 2018 by gwijthoff
Cryptocat
Cryptocat is free software with a simple mission: everyone should be able to chat with their friends in privacy.

Open source. All Cryptocat software is published transparently.
Encrypted by default. Every message is encrypted, always.
Forward secure. Chats are safe even if your keys are stolen.
Multiple devices. Devices receive messages even when offline.
File sharing. Securely share files with friends.
privacy 
february 2018 by gwijthoff
WebChoices: Digital Advertising Alliance's Consumer Choice Tool for Web (Beta)
Bulk opt out of all advertising/tracking companies

The companies participating in the WebChoices tool provide transparency and choice under the DAA Principles. We are evaluating this browser's compatibility with the WebChoices tool and verifying its opt-out status.
privacy  exercises 
february 2018 by gwijthoff
What Is Threat Modeling? - VICE Video: Documentaries, Films, News Videos
Motherboard's Lorenzo Franceschi-Bicchierai explains what threat modeling is, and how it can keep you - and your data - safe.
privacy 
january 2018 by gwijthoff
MyData Hubs - MyData.org
OK, but what does it mean to be a “Local hub”?

Hubs can be in all sizes and in all forms, what fits best to you. Our proposed action points would be to gather people from businesses, public and third sector to common meetups, work together on the MyData declaration as starting point for discussions and develop further strategies based on shared interest.

After the first meetups, it is highly recommended to define a clear mission, which should be aligned also with MyData mission. After some time, we should also be able to have some objective measures to track your contributions to the network, like meetups or events that you run, use cases that you collect, materials you produce, etc. We’d like to also see the key drivers of the hubs taking part of the Global network meetings.

 

Cool, it goes well with my ideas. I’d like to start a local MyData initiative in … What’s my next move?

Great! You are most welcome to join our global network and we are happy to help you kickoff this in your local area. Here’s what you can do as your first moves:
philadelphia  getting_out  privacy 
january 2018 by gwijthoff
Homepage - MyData.org
An international community for advancing human-centric personal data #mydata Organiser of the MyData Conference.
privacy 
january 2018 by gwijthoff
ReCon: Watch who is watching you, and block unwanted privacy leaks
Have you ever wondered who or what is tracking you and/or stealing your personal information? Unfortunately, your mobile devices currently give you little or no way to tell if this is the case. Even if they did, they don't give you any way to control it except to decline to install an app. With ReCon, we give you a way to see how your personal information is transmitted to other parties, and allow you to block or modify it with fine granularity. A demo is shown in the video and you can learn more details in this tutorial.
privacy  digital_media 
january 2018 by gwijthoff
Harvest | documentary
Harvest is a short documentary that was filmed over seven days in March of 2016 and follows the daily life of a woman named Jenni, exploring the simple patterns that define her.  As we get to know her, we also come to understand the extent to which her seemingly ordinary life is of great interest to people she has never met.

Prior to its release online, Harvest screened at a variety of 2017 film festivals including, Aspen Shortsfest, Hotdocs, Seattle International Film Festival, BAMCinemafest, and the Rooftop Films Summer Series.

Learn more about the technology used in the film at ReCon.
gadgetry  gps  privacy 
january 2018 by gwijthoff
Andrew Pilsch Blog - MLA Talk: Security Through Transparency: Minimal Computing in the Jungle of the Real
The screencast and transcript from my talk, "Security Through Transparency: Minimal Computing in the Jungle of the Real," is up on the blog, in case you also didn't make it #mla18

The talk is on software complexity, functional programming, and minimal computing.
privacy  minimal_computing 
january 2018 by gwijthoff
MLA 18 – Info Sec
Commonsense Information Security for Academics
Andrew Pilsch
privacy  security 
january 2018 by gwijthoff
A Groundbreaking Case May Force Controversial Data Firm Cambridge Analytica to Reveal Trump Secrets – Mother Jones
The results were unsettling for Carroll and also for his thousands of Twitter followers, who he had been updating on his data-request efforts. It turned out a wide expanse of personal information about Carroll’s behavior was being connected to his voter file and shared with “commercial entities,” “research partners,” “political campaigns,” and other groups, according to the letter he received. “People were kind of terrified that this information was accurate,” Carroll says. “People had a visceral reaction that their voter files aren’t being protected like they ought to be.” While some of his followers said what he got was “typical data for the industry” or “no big surprise,” others called it “scary” and “deeply disturbing.”
privacy 
december 2017 by gwijthoff
PersonalData.IO – Your data protection & privacy agent
a startup that helps individuals request their data from companies like Tinder, Uber, and Facebook
privacy 
december 2017 by gwijthoff
Privacy Tools - Encryption Against Global Mass Surveillance
This is a collection of privacy related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser.
Preparation:
Enter "about:config" in the firefox address bar and press enter.
Press the button "I'll be careful, I promise!"
Follow the instructions below...
privacy  browser  fireox 
december 2017 by gwijthoff
The Art of Paolo Cirio: Exposing New Myths of Big Data StructuresTheory, Culture & Society - Sunil Manghani, 2017
As part of this, the article considers how ‘anonymity’ underlies subversive art practices of the 20th century and contemporary protest groups, but that this anonymity arguably undermines attempts to effect change.
privacy  anonymity  media_art 
october 2017 by gwijthoff
Power, Subjectivity, and Data | October 27, 2017 – Uprising 13/13
How are contemporary practices of surveillance, social media,
digital-ness, and data transforming the contours of subjectivity?
What modes of power and knowledge are operating on our networked
selves?  How do these powers and rationalities work on a minute
technical level to reshape our identities and our identity categories?
These questions have enormous stakes in our contemporary age of big
data and mass surveillance.  Their investigation can be a site of
productive critique today, both interrogating the conditions of
possibility of subjectivity and also reinvigorating the terms of
critical scholarship.  Following the lead of Michel Foucault’s
“history of the present” this workshop is focused on the possibilities
for critical philosophy today in the midst of emergent forms of power,
knowledge, and subjectivity.
surveillance  dh_pedagogy  subjectivity  self  privacy 
october 2017 by gwijthoff
[no title]
Global Partners Digital, Encryption Policy for Human Rights Defenders
privacy  encryption  dh_tutorials 
october 2017 by gwijthoff
Data Selfie _ Home
Data Selfie is a browser extension that tracks you while you are on Facebook to show you your own data traces and reveal how machine learning algorithms use your data to gain insights about your personality.
facebook  privacy  digital_media 
july 2017 by gwijthoff
Op-ed for The Wall Street Journal: Settling a Bureaucratic Turf War in Online Privacy Rules - Op-Eds - United States Senator Jeff Flake
Senator Jeff Flake's (R-AZ) op-ed defending his bill to allow ISPs to sell user browsing history, framing the problem as one of regulatory overreach by the FCC, stepping on the toes of the FTC.
privacy  regulation  conservatism 
march 2017 by gwijthoff
These are the 17 House Representatives that introduced a bill to let telecoms sell your personal internet history | Privacy Online News
Most Americans don’t know that telecoms and internet service providers store the internet history of their users; even more don’t know that recently introduced legislation aims to do away with privacy protections on this high value data. For years, the telecom industry has lobbied the government for the ability to sell your internet history to the highest bidder. On 3/7/17, Senator Jeff Flake and 22 other co-sponsors introduced S.J.Res 34, which would use the Congressional Review Act to strip away privacy protections voted in by the FCC last year and allow telecoms to sell the private internet history which they have on each of their Internet subscribers. One day later, on 3/8/17, Representative Marsha Blackburn introduced the House version of the bill (H.J.Res 86).
privacy 
march 2017 by gwijthoff
MP01 dumb phone | Punkt. Mobile Phone by Jasper Morrison
A company that runs "digital detox" campaigns

The more our phones do, the more they demand of us. Sometimes it’s good to take a break. But until now, the only alternative to hyper-connected smartphones has been the kind of phone you find at the back of a drawer.

The Punkt. MP 01 is a stylish, well-crafted mobile phone which focuses on modern simplicity, inside and out. It makes phone calls and sends texts. That’s all.
dumbphone  stuff  design  gadgetry-handy  privacy  mobility 
february 2017 by gwijthoff
VPN Secure sale
Boing boing sale, $39 lifetime
vpn  privacy  proxy 
january 2017 by gwijthoff
Keybase Wants To Make Serious Encryption Accessible To Mere Mortals | Fast Company | Business + Innovation
People now have online identities scattered all over, most of which individually provide no reassurance that someone is who they say they are. Supposedly real names associated with accounts may not be accurate. And even if they are, a given account could be hijacked at any point.

Keybase pairs cryptographic proofs with social networks and other online "property," like domain names, Bitcoin, and websites to create a nexus that's also tracked for integrity over time. Keybase doesn't even ask that users trust it: it uses a variety of methods to publish its verifications.

Coyne and his partner Max Krohn built the open-source codebase on top of all the authentication that people already have in their lives. After creating a Keybase account, you upload or generate a public/private key pair associated with the account.
security  privacy  pgp  encryption  dh_pedagogy 
december 2016 by gwijthoff
Ken Bone Reddit porn and internet privacy today.
I’m not scolding Gizmodo for publishing the Bone exposé or its many readers for enjoying it. I enjoyed it! But as I skimmed the comments, I began to think of Bone less as a bumbling goofball and more as a casualty of our new media landscape. He got himself on television for a few minutes and capitalized on his ephemeral fame. When he was a kid, accomplishing that feat meant you had a good story at parties. Today, it means your entire web history will be ransacked and presented to the world. Ken Bone is a lesson, a reminder that your internet history is only as private as you are. Enter the public realm and your weird porn comments likely will, too. That is the media landscape we live in today. And after Ken Bone, there is no turning back.
privacy 
october 2016 by gwijthoff
Your Social Media Fingerprint
Without your consent most major web platforms leak whether you are logged in. This allows any website to detect on which platforms you're signed up. Since there are lots of platforms with specific demographics an attacker could reason about your personality, too.
lifelogging  privacy  socialmedia 
october 2016 by gwijthoff
Facebook To Share Users' Home Addresses, Phone Numbers With External Sites
Facebook will be moving forward with a controversial plan to give third-party developers and external websites the ability to access users' home addresses and cellphone numbers in the face of criticism from privacy experts, users, and even congressmen.

Facebook quietly announced the new policy in a note posted to its Developer Blog in January. It suspended the feature just three days later following user outcry, while promising that it would be "re-enabling this improved feature in the next few weeks."

In response to a letter penned by Representatives Edward Markey (D-Mass.) and Joe Barton (R-Texas) expressing concern over the new functionality, Facebook reaffirmed that it will be allowing third parties to request access to users' addresses and phone numbers.
facebook  privacy 
march 2011 by gwijthoff
The Race to Fix the Classification System - FAS Project on Government Secrecy
Wikileaks assault on secrecy - not whistleblowing, not historical truth, not anti-war
wikileaks  privacy 
november 2010 by gwijthoff

Copy this bookmark:



description:


tags: