renaissancechambara + privacy   1613

Experts react to Google's Brexit-driven decision to move UK data to the US - Business Insider
- also probably Google trying to avoid double-jeopardy between EU and UK law presented by UK consumers being out of the EU
alphabet  uk  privacy  legal 
4 hours ago by renaissancechambara
Thread by @thezedwards on speech recognition / natural language processing
- interesting how it can be used (whether or not it is used is another matter) for marketing, surveillance etc
voice  advertising  privacy  machinelearning 
9 days ago by renaissancechambara
MBS Taunted Jeff Bezos Over Secret Affair Before National Enquirer Expose | Daily Beast
- surprised that Bezos didn't have multiple numbers and and handsets - private and business. Also that they handsets weren't scrubbed regularly
informationsecurity  hacking  privacy  saudiarabia  wireless 
29 days ago by renaissancechambara
Framed — Pixel Envy
- three paragraphs in and it is already setting up the idea that personal privacy and public safety are two opposing ends of a gradient. That’s simply not true. A society that has less personal privacy does not inherently have better public safety; Russia and Saudi Arabia are countries with respectable HDI scores, brutal censorship and surveillance, and higher murder rates than Australia, Denmark, France, and the United Kingdom
privacy  us  legal 
5 weeks ago by renaissancechambara
Revealed: UK concealed failure to alert EU over 75,000 criminal convictions | UK news | The Guardian
Sophie in ’t Veld, a Dutch MEP on the European parliament’s committee on civil liberties, justice and home affairs, told the Guardian there was a wealth of evidence that the UK could not be trusted. “This is yet another scandal that casts a very dark shadow over security and law enforcement cooperation,” she said. “After the revelations of deliberate abuse of the Schengen Information System, and earlier scandals like the hack of [the Belgian telecoms provider] Proximus by GCHQ, it is clear that the principle of ‘mutual trust’ will not work. “This revelation of the failure to alert authorities on criminals and the cover up afterwards casts serious doubts on the UK as a reliable partner
uk  informationsecurity  privacy 
5 weeks ago by renaissancechambara
NYT: Russian hackers successfully targeted Ukrainian gas company Burisma - Axios
Public awareness of the Burisma hack cuts both ways politically. For former Vice President Joe Biden's campaign, it means document dumps could happen at any time, with accompanying media frenzy and potentially damaging revelations. For the Trump campaign, it means that any such revelations will come pre-tainted with a Russian label
russia  us  Ukraine  hacking  informationsecurity  privacy 
5 weeks ago by renaissancechambara
Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence by Nouns, Liccardi, Veal, Karger and Kagal
The results of our empirical survey of CMPs today illustrates the extent to which illegal practices prevail, with vendors of CMPs turning a blind eye to — or worse, incentivising —- clearly illegal configurations of their systems. Enforcement in this area is sorely lacking. Data protection authorities should make use of automated tools like the one we have designed to expedite discovery and enforcement. Designers might help here to design tools for regulators, rather than just for users or for websites. Reg- ulators should also work further upstream and consider placing requirements on the vendors of CMPs to only allow compliant designs to be placed on the market. (PDF)
legal  eu  privacy  design  userexperience  ux 
5 weeks ago by renaissancechambara
How Much Are Cars Spying On Their Owners? - Slashdot
On a recent drive, a 2017 Chevrolet collected my precise location. It stored my phone's ID and the people I called. It judged my acceleration and braking style, beaming back reports to its maker General Motors over an always-on Internet connection... Modern vehicles don't just have one computer. There are multiple, interconnected brains that can generate up to 25 gigabytes of data per hour from sensors all over the car... Most hide what they're collecting and sharing behind privacy policies written in the kind of language only a lawyer's mother could love...

The Tesla Model 3 can collect video snippets from the car's many cameras. Coming next: face data, used to personalize the vehicle and track driver attention... Coming 5G cellular networks promise to link cars to the Internet with ultra-fast, ultra-high-capacity connections. As wireless connections get cheaper and data becomes more valuable, anything the car knows about you is fair game. GM's view, echoed by many other automakers, is that we gave them permission for all of this...

Five years ago, 20 automakers signed on to volunteer privacy standards, pledging to "provide customers with clear, meaningful information about the types of information collected and how it is used," as well as "ways for customers to manage their data." But when I called eight of the largest automakers, not even one offered a dashboard for customers to look at, download and control their data.... GM's privacy policy, which the company says it will update before the end of 2019, says it may "use anonymized information or share it with third parties for any legitimate business purpose." Such as whom? "The details of those third-party relationships are confidential," said GM spokesman David Caldwell.
privacy  automotive  informationsecurity 
8 weeks ago by renaissancechambara
Facebook awaits EU opinion in privacy case | Financial Times
- interesting how wide the impact of this case could be in terms of things like credit card transaction data etc.
eu  privacy  legal  regulatory 
9 weeks ago by renaissancechambara
A Surveillance Net Blankets China’s Cities, Giving Police Vast Powers - The New York Times
- Chinese authorities are knitting together old and state-of-the-art technologies — phone scanners, facial-recognition cameras, face and fingerprint databases and many others — into sweeping tools for authoritarian control, according to police and private databases examined by The New York Times. Once combined and fully operational, the tools can help police grab the identities of people as they walk down the street, find out who they are meeting with and identify who does and doesn’t belong to the Communist Party. The United States and other countries use some of the same techniques to track terrorists or drug lords. Chinese cities want to use them to track everybody.
china  privacy  surveillance  bigdata  legal 
9 weeks ago by renaissancechambara
The “New” Private Security Industry, the Private Policing of Cyberspace and the Regulatory Questions - Mark Button,
he growth of the “new” private security industry and private policing arrangements, policing cyberspace. It argues there has been a significant change in policing which is equivalent to the “quiet revolution” associated with private policing that Shearing and Stenning observed in the 1970s and 1980s, marking the “second quiet revolution.” The article then explores some of the regulatory questions that arise from these changes, which have been largely ignored to date by scholars of policing and policy-makers
legal  privacy  online 
9 weeks ago by renaissancechambara
Privacy, People, and Markets | Ethics & International Affairs | Cambridge Core
- Most current work on privacy understands it according to an economic model: individuals trade personal information for access to desired services and websites. This sounds good in theory. In practice, it has meant that online access to almost anything requires handing over vast amounts of personal information to the service provider with little control over what happens to it next. The two books considered in this essay both work against that economic model. In Privacy as Trust, Ari Ezra Waldman argues for a new model of privacy that starts not with putatively autonomous individuals but with an awareness that managing information flows is part of how people create and navigate social boundaries with one another. Jennifer Rothman's Right of Publicity confronts the explosive growth of publicity rights—the rights of individuals to control and profit from commercial use of their name and public image—and, in so doing, she exposes the poverty of treating information disclosure merely as a matter of economic calculation
privacy  ethics  analysis 
9 weeks ago by renaissancechambara
China’s social credit system: The Chinese citizens perspective | UCL ASSA
The question of who to trust, and social trust more broadly is one that is pertinent to every modern society, not just China. Although the idea of someone being ‘trustworthy’ (chengxin) has long existed in the Chinese traditional moral system, it is widely believed this was fundamentally damaged in the past 50 years, starting with Mao’s Cultural Revolution (1966-76), now seen as a period characterised by the ‘breakdown of public morality’.  A turbulent period characterised by families turning on each other and being forced to denounce any friends or family members deemed counter-revolutionary, the Cultural Revolution has also had the effect of eroding the concept of chengxin and therefore also mutual trust over time
china  privacy  trust 
9 weeks ago by renaissancechambara
Inside the Podcast that Hacks Ring Camera Owners Live on Air - VICE
- this was bound to happen, what about all the people who are covering their tracks rather than just doing it for the LULz?
hacking  iot  privacy  informationsecurity 
9 weeks ago by renaissancechambara
Hackers scraped data of plus-sized women for targeted ads, scams - Business Insider
- to be fair if it wasn't for GDPR some e-commerce experts would be up for buying this data set for enrichment of CRM campaigns
e-tailing  legal  hacking  informationsecurity  privacy 
11 weeks ago by renaissancechambara
« earlier      
per page:    204080120160

related tags

5g  adultentertainment  advertising  africa  airlines  alphabet  amazon  analysis  analytics  android  antitrust  api  apple  apps  ar  audi  audio  australia  authentication  automation  automotive  avast  banking  behaviouraltargeting  belarus  bigdata  bigpharma  bing  biodata  biometrics  bittorrent  blackberry  blog  blogging  blogit  branding  brazil  browsers  bruceschneier  bt  business  bytedance  canada  careers  cathaypacific  cctv  cdt  censorship  china  chinese  civilliberties  civilrights  cloud  consumerbehaviour  content  context  cool  copyright  crime  crowdsourcing  cryptocurrency  cryptography  culture  cyberpunk  darkweb  data  database  democracy  denmark  design  dev  digital  digitalbritain  dna  drupal  duckduckgo  e-tailing  eBay  economics  edm  electronics  email  encryption  enterprise  enterprise2.0  ethical  ethics  eu  europe  evernote  eyes  facebook  facialrecognition  fance  fav  finance  firefox  fiveforfriday  form  foursquare  france  Free  freedom  freedomofspeech  future  gaming  gdpr  gen-y  gen-z  geo  geotagging  german  germany  googlebuzz  googleglass  government  GPS  grindr  hack  hacking  hacks  hacktivism  hardware  health  health2.0  highlights  history  honey  hongkong  howto  huawei  ibm  id  ideas  identity  im  immersion  india  indonesia  infomationseccurity  infomationsecurity  infor  information  informationarchitecture  informationsecurity  informatonsecurity  infornationsecurity  infosecurity  innovation  insights  inspiration  instagram  internet  internetsecurity  iOS  iot  ip  iPhone  ireland  irish  israel  japan  jargonwatch  journalism  junipernetworks  kakaotalk  korea  korean  law  lega  legal  life  lifehack  lifehacks  linkedin  linyi  local  logistics  london  luxury  m-commerce  machinelearning  macOS  mapping  maps  marketing  measurement  media  meme  mems  messaging  metadata  microsoft  middleeast  mobile  nec  Netherlands  netneutrality  networkandtelecoms  networking  networks  networktheory  neuro  News  newyork  newzealand  nokia  norway  nsa  Ocado  octopus  oilandgas  online  onlinetooffline  open  openid  opensource  oracle  os  oss  ott  pakistan  patternrecognition  payments  philosophy  phorm  photography  pinterest  planitir  plugin  policies  politics  pr  pr2.0  presentations  privacy  process  producitivity  productivity  profile  proxy  psychology  publicaffairs  quantumcomputing  reference  regulation  regulatory  relevance  reputation  reputationmanagement  research  resources  retailing  revolution  rfid  rim  robotics  russia  samsung  saudiarabia  sci-tech  search  security  semiconductors  seo  services  sharp  shipping  signal  siliconvalley  singapore  Skype  slack  social  socialapplications  socialgraph  socialmedia  socialnetworking  socialnetworks  socialsoftware  society  software  sony  space  spain  spam  standards  superhuman  supplier  surveillance  sweden  swedish  switzerland  talk  targeting  tcl  tech  technology  telegram  tencent  terrorism  tinder  tips  to  todo  tools  tor  totwitter  towitter  tracking  trainwreck  transparency  travel  travel2.0  trends  trust  turkey  twitter  uae  uber  uk  Ukraine  unitedarabemirates  us  usb  userexperience  utilities  ux  verizon  verizonmedia  video  vista  visualisation  vodafone  voice  voip  vpn  vr  wacom  war  wearables  web  web2.0  web3.0  webdesign  webdev  webofnoweb  wechat  whastspp  whatsapp  where2.0  wifi  windows10  wireless  wordpress  X  yahoo  yandex  yonder  zoom 

Copy this bookmark:



description:


tags: