Websites: please stop blocking password managers
This Wired article asks a number of major companies why they block password managers, which help users create and manage strong passwords instead of weak ones, and gets a range of answers.
security  passwords 
5 days ago
Why the Internet of Things encourages dominance
In this Guardian article, Julia Powles and Jat Singh argue that the complexity of IoT systems will of necessity reinforce hierarchies and centralized dominance.
internetofthings  centralization 
5 days ago
The world's first hack: the telegraph and the invention of privacy
In the Guardian, Thomas McMullan follows in Tom Standage's footsteps and invokes the telegraph as prior art, recounting the capture of murderer John Tawell, Nevil Maskelyne's hack of Marconi's demonstration (recounted by Paul Marks in New Scientist in 2011), and the use of codes and ciphers to protect text.
telegraph  hacking 
16 days ago
When algorithms discrminate
In the NY Times, Claire Cain Miller examines the widely held belief that algorithms are neutral, reviewing research from CMU (that showed that men were more frequently shown ads for high-paying executive jobs than women). Deirdre Mulligan suggests what coded discrimination is tolerated in such cases is a matter of public policy.
advertising  CMU  google  algorithmicliving  bigdata  discrimination  Mulligan 
16 days ago
The case of the amazing gay-marriage data
Science of Us reports on the efforts of graduate student David Broockman to stand up - and eventually expose fraud in - a study that appeared to show that personal canvassing works to change hearts and minds about gay marriage when the canvasser themselves is gay.
science  sciencefraud 
6 weeks ago
There's an Uber for everything now
While Uber faces regulatory issues in various locations, the Wall Street Journal reports that in San Francisco, at least temporarily, there's a service for almost everything - many of them more useful than it might first appear.
apps  sharingeconomy 
9 weeks ago
Screen time versus play time: what tech leaders won't let their own kids do
The Guardian interviews a number of tech leaders to find out how they approach technology with their kids. Many favor Waldorf schools (which limit screen time) and other techniques to let their kids explore the physical world rather than the virtual world.
education  children 
9 weeks ago
Tiny updates to tech can present obstacles for disabled people
Paul Kotler, who struggles with autism and apraxia, writes in Wired about the opportunities and challenges tech presents. Both are largely by-products of mass market design.
access  disabilities 
9 weeks ago
EFF's 404 Report on copyright
EFF examines the 2014 report of the US Trade Representative under S301 - the one under which USTR dubs nations like Canada "rogue nations" for not enacting the copyright laws the US wants. EFF counters with short case studies from myriad countries about the chilling effects of copyright extremism.
EFF  copyright  UStrade 
12 weeks ago
FBI admits flaws in hair analysis over decades
The Washington Post reports that the FBI has been systematically offering "flawed testimony" in cases featuring hair analysis that favored prosecutors for decades.
fbi  forensics  judicialabuse 
12 weeks ago
Bitcoin is disrupting the Argentine economy
The impact of bitcoin is best seen in places where financial services don't work as well as they do in most of the UK/EU/US. Nicholas Popper examines one such case: Argentina.
bitcoin  money  argentina 
12 weeks ago
Can the Internet Be Saved without Harming Democracy?
29 policy influencers publish a report arguing for the protection and promotion of human rights online. They include Michael Chertoff (first director of the Department of Homeland Security) and David Omand (former director of GCHQ).
internetgovernance  gchq 
april 2015
The Cyber-Threat of Things
My piece at Infosecurity Magazine on the coming security threats posed by the internet of Things as cyberspace invades the physical world.
security  internetofthings  wg 
april 2015
Network Analysis of Third-Party Tracking
This research from Microsoft shows that 99.5% of users (across the world) are captured by the ad tracking networks within 30 clicks.
advertising  tracking 
march 2015
The Cost of Paying Attention
Matthew B. Crawford comments on the privatization of public space and the loss of silence as a resource: in modern airports and elsewhere advertising is creeping into everything from the bins at security to the walls of the London tube (at least there the video is silent; in Rome it includes audio). Silence in such places is increasingly a luxury only the wealthy can afford (for example, by paying admission to airline clubs).
privacy  peace  silence  nytimes 
march 2015
How One Stupid Tweet Ruined Justice Sacco's Life
Jon Ronson writes about interviewing the victims of global public shaming, mostly via Twitter. For most, the experience has been severely traumatic, and recovery very slow. (From conversations I've had with people who've also been through this mill, it can indeed be very scarring.)
publicshaming  twitter  nytimes 
march 2015
Secret History of Silicon Valley
By Steve Blank.
The Secret History of Silicon Valley – Backstory
• Part 1: The Vietnam War
• Part 2: B-52’s and the Soviet Air Defense System
• Part 3: Bill Perry/ESL and the Cold War
• Part 4: Undisclosed Locations
• Part 5: Silicon Valley, the 2nd 100 years
• Part 6: Stanford, Terman and WWII
• Part 7: Stanford, Terman and the Cold War
• Part 8: Stanford and the rise of Cold War Entrepreneurship
• Part 9: Stanford and Electronic Intelligence
• Part 10: Stanford and Weapons Systems
• Part 11: The Rise of Venture Capital
• Part 12: The First Valley IPO’s
• Part 13: Startups with Nuclear Missiles
• Part 14: Spy Satellites in Silicon Valley
• Part 15: Lockheed – Silicon Valley largest employer
• Part 16: Balloon Wars
siliconvalley  history 
february 2015
It's the labels, not Spotify, that are screwing over artists
Pando analyzes streaming revenues to show that while streaming services are often blamed for the small amounts of money they pay artists the reason is that 73% of those revenues go to the labels. The article also says music industry revenues has halved since 2000.
musicbusiness  music  copyright 
february 2015
Inadevertent algorithmic cruelty
In this blog posting - and be sure to read both the comments and the <a href="">follow-up</a> - Meyerweb considers the social theoughtlessness of (social media) algorithms such as the one that assumed they would like to see a summary of their year, which included, prominently pictured, their dead child.
algorithmicliving  facebook 
december 2014
The Fall of the Banner Ad
Farhad Manjoo in the NY Times writes about the rise and now - finally - decline of the ubiquitous banner ad, now being replaced by native ads that load quicker and clutter less.
advertising  media 
november 2014
The decade-long quest to stop Spamford Wallace
The story of trying to bring the notorious 1990s spammer, Sanford Wallace, to justice (arstechnica).
november 2014
Frank Tirole and "Platform Competition in Two-Sided Markets"
Vox discusses Tirole's Nobel prize and his 2002 paper, which does much to explain the "free" service model that drives Google, Facebook, and so many other Internet businesses.
economics  privacy  google  Facebook  dataprotection 
november 2014
The Dark Market for Personal Data
UMD prof Frank Pasquale, writing in the New York Times, advocates a change in the law to regulate the US's estimated 4,000 data brokers, whose services animate all sorts of secret - and often unfair - decisions about all aspects of individuals' lives. A prelude to the release of his "The Black Box Society".
scoring  dataprotection  privacy 
november 2014
Australia's metadata grab
PI's Carly Nyst, writing in the Guardian, discusses Australia's adoption of data retention.
dataretention  surveillance  australia 
november 2014
Be grateful for drizzle (the risks of high-frequency trading)
This piece from the LRB discusses the speed with which the entire market can disappear due to high-frequency trading. Of particular interest is the fact that the company for which a former trader worked had been running automated checks to eliminate bugs such as the sign error that set off an exponential series of trades that, stopped 20 second later than it was, would have bankrupted the firm (and then the clearing house and the market). The firm had stopped running the checks because the company losing the speed race.
automation  risks  finance 
november 2014
Delusions of Big Data and Other Huge Engineering Efforts
UC Berkeley prof Michael Jordan discusses the limitations of machine learning with Lee Gomes.
november 2014
EFF Surveillance Self-Defense Guide
The EFF has updated its guide to privacy and security for Internet users.
privacy  security  eff  surveillance 
november 2014
Google's Right to be Forgotten meeting 2014-10-17
Video of the 4+ hour meeting of the Google Advisory Council in London on the right to be forgotten.
google  dataprotection  righttobeforgotten 
november 2014
Why Google's Self-Driving Car May Never Happen
Lee Gomes, who has written about the Google cars for Slate, discusses all the things that Google's cars currently cannot do: find potholes, respond to ad hoc changes in traffic signals and road layouts, and travel unfamiliar landscapes, which means all but a few thousand miles of the US. The cars rely heavily in inch-perfect maps, which are expensive to collect and even more so to keep up to date.
google  robots  ai 
october 2014
Why kids sext
The Atlantic studies a case of mass uploads of teen sexts and discovers that sexting has become part of the ordinary teen experience. Discusses when and how the law should be involved.
teens  sex  lawenforcement 
october 2014
The complete Feynman lectures on physics
Terrific resource for learning the subject.
physics  education 
august 2014
Not a Tea Party - A Confederate Party
An interesting take on the current state of US politics, which sees the present situation as a reflection of confederate victory in the Civil War. Not the way most people see it, but he argues that we're wrong.
uspolitics  teaparty 
august 2014
Sherlock Holmes: not too "complex" for the public domain
A US 7th Circuit Court judge has ruled against the Doyle estate's argument that because new information about Sherlock Holmes continued to appear in the later stories the earlier stories are still copyrighted, thereby demanding licensing fees from an author compiling a set of modern pastiches by various authors.
copyright  greatdetectives 
june 2014
CFP2014: Debate on the right to be forgotten
Debate features Judith Rauhofer, with possibly the clearest explanation of the ECJ's decision in Google vs Spain you will ever see, Mike Godwin (Internews), and Emma Llanso (CDT).
privacy  freespeech  dataprotection  google 
june 2014
Ghostwriting for Julian Assange - Andrew O'Hagan's account
This is Andrew O'Hagan's lengthy and detailed story of what went wrong in the efforts to produce what eventually was published by Canongate as Julian Assange's "unauthorized autobiography".
Wikileaks  JulianAssange 
february 2014
Fanboys: Have you ever loved something so much it hurt?
Fascinating article examining the pathology and behavior of people who get so obsessed with a particular (smart phone) vendor that they attack anyone who disagrees even a little bit. These are the modern successors to the folks we used to call "Amigoids".
obsession  Google  Apple 
january 2014
Did refrigerators form a spam-sending botnet? Possibly not
At Ars Technica, Dan Goodin picks apart the technical details in the report that 100,000 smart refrigerators have been hacked to form a botnet to send spam. Yes, it *could* happen and security researchers are already warning about the Internet of Things - but *did* it happen?
internetofthings  security  smartliving 
january 2014
Are the technoriche really ruining San Francisco?
This interview with Rebecca Solnit brings her previous essay on the topic up to date. She compares Google's choice to run luxury buses for its employees rather than push and contribute funds to better public transportation to the effect of bottled water on a city with pollution in the public water supply. San Frncisco, the city where many worked just enough to fund idealistic activism, is becoming a bedroom community for (mostly) young (mostly) men with little investment in the city itself, like a company town. For prior art, see also Paulina Borsook's Mother Jones essay (later book) Cyberselfish.
google  socialjustice  siliconvalley 
january 2014
Analysis of the data retention directive opinion
This blog posting from Freedom to Tinker has a helpful analysis of the data retention directive judgment and its compatibility with human rights - and it also has a helpful analysis of EU vs US privacy law and misconceptions.
privacy  dataretention  ecthr 
december 2013
Wikipedia's lamest edit wars
As seen on Slashdot. Many don't seem entirely lame: they tackle questions of classification and principle that librarians have probably wrestled with since time immemorial. Might have made sense to adopt the librarians' solutions, though.
december 2013
Watching a bitcoin heist in real time
Internet users chase the thief of 96,000 bitcoins.
december 2013
A robot walks into a bar...
A profile of Data, the robot comedian. Can robots be funny?
december 2013
The Big Data Brain Drain: Why Science Is in Trouble
Argues that the skills scientific research needs are increasingly the same ones that succeed in industry and proposes some ways that academia needs to change to keep up.
bigdata  science  research 
october 2013
eLifeSciences annual report
One year of open access after its founding, eLife Sciences reports.
october 2013
Privacy fears grow as cities increase surveillance
The New York Times reports on surveillance systems originally deployed for anti-terrorism that are being used for increased surveillance.
privacy  surveillance  functioncreep 
october 2013
Somebody stole 7 milliseconds from the Federal Reserve
Mother Jones covers the story that in the 7ms it took the Fed's news that it would not be tapering its bond-buying program to get out, huge orders were placed. Two problems: 1) the leak of information enabling someone to game the markets; 2) the way high-speed automated trading now dominates and distorts the markets.
finance  security  equalopportunity 
september 2013
Scary search engine finds baby monitors, webcams, power plants...
The search engine Shodan finds Internet-connected devices that can then be taken over and controlled. As the Internet of Things gets deployed, this sort of thing will be a major concern.
securty  surveillance  search 
september 2013
Streaming music: how much are artists paid?
This article looks at the royalties artists are paid for streaming music, based on data Zoe Keating has published on her blog detailing what she's been paid by the various services. Keating would like to see the services provide artists with their raw listener data - as she says, everyone is entitled to that *except* the artists on whose work these services are built. I would agree: instead of recreating the music business in the image of the past, we have the chance to give artists much better understanding of their audiences and doing so should be a standard element of the T&Cs under which the services are allowed to use artists' music.
music  streaming  copyright  musicbusiness 
august 2013
Ideas to get women involved in tech sector
The Guardian considers the reasons for decreasing numbers of women in technology. Meanwhile, at Consulting Adult - - Nancy Householder Hauge reminisces about the various manifestations of sexism she encountered in her early days at Sun.
women  sexualharassment 
august 2013
Russia's response to Snowden leaks: control the Net
The New York Times reports that Snowden's revelations about the NSA have given Russia new impetus to pursue control over the Internet via the ITU.
Russia  nsa  internetgovernance  ITU 
july 2013
Ellen Ullman: How to Be a Woman Programmer
Ullman, a former software engineer, essayist, and novelist, talks about how to prosper in the endemic sexism of geek culture.
women  software 
july 2013
TweetMeme, DataSift, and the shutdown of the Twitter API
Sheds light on the little-known area of Twitter data: DataSift is one of only two authorized resellers of Twitter's firehose. It also performs and sells analytics on, Facebook, forums, logs...overall, it claims to digest most than 90% of the Net's social media data.
socialnetworks  dataprotection  twitter  algorithmicliving 
june 2013
A Cyberattack Campaign for Syria (NY Times)
This is just scarily wrong in so many ways. It is disturbing that it's written by a former cybersecurity advisor to Obam, now consulting for the Department of Defense.
security  dcpolitics  badideas 
may 2013
Mapping exploits on the Internet
Over the course of a year, a researcher messaged almost 4 billion IP addresses. At least 100 million replied - traffic lights, ships at sea - building a pattern of resources available to exploit.
security  internetofthings 
may 2013
Forbes interviews Ray Kurzweil
What could Google and Ray Kurzweil possibly want with each other? Kurweil explains, in some detail, what he'll be working on.
AI  google  kurzweil 
may 2013
When Your Data Wanders to Places You’ve Never Been
Fill out a few online surveys...start getting direct postal mail offering help for your MS. The membrane between online and offline identities gets ever thinner. This piece tries to trace the why and how of a mistaken profile.
privacy  bigdata 
april 2013
Do telepresence robot need visas? (from We Robot 2013)
Technology Review looks at a different aspect of the We Robot discussions: Willow Garage's experiment with allowing remote Internet followers to drive a robot to wash their dishes, and telepresence workers at Mozilla. Both experiments were ended because of concerns over legal issues like liability and who pays taxes where.
robots  werobot  law 
april 2013
Why ITIF rejects Do Not Track
This Web site openly rejects Do Not Track settings (if you have this turned on you'll see a pop-up advising you) on the basis that long-term targeted advertising (and therefore tracking) is necessary to pay for "free" content. The action raises the possibility that more of the Internet will be walled off by "DoNotTrackwalls" to go with paywalls...
intellectualproperty  advertising  tracking  privacy 
march 2013
Life expectancy of Google Keep
Charles Arthur looks at the history of Google products and finds that the average time-to-live of cancelled products is around four years. Something to consider before investing your notes in Google Keep.
march 2013
Facebook, Twitter deleting photo metadata
This piece raises some interesting issues with respect to photographs, the right to identification for copyright purposes (as opposed to the right to privacy!), and ongoing proposals for orphan works. Photographers have long been arguing that the orphan works proposals effectively legalize ripping off their work (by commercial organizations, not just personal use copying), and this is a prime example of what they're talking about.
intellectualproperty  orphanworks  photography  facebook  socialnetworks 
march 2013
Bruce Schneier - The Web is a Surveillance State (CNN)
"One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period."
privacy  surveillance 
march 2013
Which crypto tool would you use to bring down a government?
A really interesting look at four different crypto tools intended for use by those in hostile situations. Matthew Green concludes they all suffer from the same vulnerability: the host platform.
crypto  security  privacy  tools 
march 2013
What data brokers know about you
Pro Publica looks at the murky world of data brokers, behind-the-scenes players most people don't even know exist.
dataprotection  privacy 
march 2013
Amazon makes a play for .book
Robert X. Cringely discusses ICANN's new generic top-level domains and in particular the plays by Google and Amazon to own the currently up-for-grabs .book and .author - something book authors and competing booksellers oppose.
ICANN  dns  intellectualproperty 
march 2013
Dewayne Hendricks explains the National Information Infrastructure
In this podcast at Community Broadband Bits, Dewayne Hendricks talks about the vision behind and history of the now-forgotten NII, which focused on ad-hoc community networks. It should surprise no one that Apple was an early visionary. The vision broke down in part because of the lack of fiber into communities, and then the spectrum went to wifi. Today's national broadband plan has nothing of the same vision about a national architecture that would include both commercial parts (telcos) and municipal/public parts. You can download the MP3 directly from:
infrastructure  internethistory  dwaynehendricks 
march 2013
FM/AM radio to disappear from US car dashboards within five years?
This is the prediction made by this conference panel, who claim that car manufacturers are telling them they no longer see FM/AM radio as something "young people" want. (via Dewayne Hendricks)
radio  media 
march 2013
Accenture survey shows that most doctors oppose giving patients full access to medical records (PDF)
The existence of the self-quantified movement and several new start-ups enabling individuals to study, analyze, and share their medical data ought to show that at least some percentage of patients feel it's important to have full access to their health records. This study shows that doctors are slow to catch up: only a third of doctors surveyed across 8 countries including the US and UK think patients should have write access to their own records. The study suggests that there is beginning to be evidence that the benefits of patient-write-access outweigh the costs/risks, and it seems likely these will only become more obvious over time.
health  self-quantified  openaccess 
march 2013
US Appeals Court: 4th Amendment does apply at the border
Wired (and many others) reports that the federal 9th Circuit Court of Appeals has ruled 8-3 that electronic devices such as cellphones, tablets, and laptops may not be subjected to forensic examination without a "reasonable suspicion" of wrongdoing. Previously, US courts had held that electronic could be seized for any reason whatsoever. So: progress.
privacy  security  borders 
march 2013
Google Glass presents new privacy challenges
Writing in the Guardian, Charles Arthur discusses the privacy implications of Google Glass: people walking around filming those around them at will, undetectably. This is a problem privacy advocates have thought about for some years now, and that is familiar to anyone who's been near Steve Mann, who's been decked out in gradually shrinking camera/recording/computing equipment for a couple of decades now (look up "sousveillance" and David Brin's book The Transparent Society).
privacy  surveillance  google  wearablecomputing 
march 2013
How a (truly offensive) T-shirt gets into Amazon Marketplace
This blog posting explains how an automated algorithm generates T-shirt slogans and puts them up for sale on Amazon, to be printed and created only if they're actually ordered. Sounds like a nice, low-cost business with little risk - until the T-shirt slogan is offensive enough to spark outrage.
automation  algorithmicliving  robots  Amazon 
march 2013
The post-crypto world
In the early 1990s, such was the passion surrounding legalizing the use, deployment, and export of strong crypto that it took science fiction writer Bruce Sterling to remind everyone (at the 1994 CFP conference) that "mathematics is not your friend". The crypto advocates largely won in the sense that crypto got legalized (it was essential for ecommerce), but largely lost in the sense that for most communications it has remained too difficult for most people to want to bother with. But the attackers' rule has long been: go around the crypto. Adi Shamir, the "S" in RSA (the company and the most widely used public key cryptography algorithm), here says crypto is becoming less and less important in protecting data. The basic problem is that data must always be decrypted at the point of use/consumption. If attackers have infiltrated your network and are monitoring everything in progress, they've got it.
crypto  security  newthreats 
february 2013
Social Resilience in Online Communities: An Autopsy of Friendster (PDF)
This paper by three Swiss researchers analyzes five online communities - Friendster, Livejournal, Facebook, Orkut, and Myspace - to find the common factors that make them decline. Among the conclusions: networks where many people have few friends are more vulnerable to collapse, as do sudden changes in the technological infrastructure.
virtualcommunities  socialnetworks  Facebook 
february 2013
CDT on Mozilla's decision to block 3rd party cookies in Firefox by default
"Choice architects" will tell you that defaults matter. In this blog post, CDT's Justin Brookman analyzes Mozilla's decision to block third-party cookies in Firefox by default, escalating the "war" between ad-wary consumers and tracking-happy advertising networks to the next level.
privacy  advertising  tracking 
february 2013
The Internet in Africa - how bad is it?
This piece from IEEE Spectrum examines the state of Internet access across Africa as measured by the PingER project. Connectivity is getting better, but still significantly lags the rest of the world.
Africa  digitaldivide  access 
february 2013
APT1: Exposing One of China's Cyber Espionage Units
Mandiant studies the inner workings of hundreds of "advanced persistent threat" cyberattacks and concludes the evidence backs up the claim that "the groups conducting these activities are based
primarily in China and that the Chinese Government is aware of them". Mandiant says there are dozens of APT groups around the world, more than 20 of which have origins in China. APT1 is the most prolific of these groups and it's this group the report focuses on. Note that Symantec warns that spam email apparently targeting would-be readers of this report have been disseminating malware-infected links; you should download the report only from Mandiant's own site. Mandiant believes APT1 has direct government support.
security  cyberattacks 
february 2013
Is everything we (think we) know about password stealing wrong?
In this analysis of incentives and price structures, Microsoft Research's Cormac Herley and Dinei Florencio argue that the low price of user credentials implies that password theft is merely the first step in a lengthy and difficult process. The more important bottlenecks are back-end fraud detection systems in banks and the recruitment of mules, who add a layer of untraceability and anonymity for the thieves and ultimately are the real victims of thefts from user bank accounts.
security  identityfraud  passwords  money 
february 2013
What's a Facebook user worth?
This article from AdWeek looks at a promotional campaign that values Facebook users at $1 to $4 - which seems expensive. A rare insight into the internal workings of the trade in personal data.
advertising  dataprotection 
february 2013
Google not partnering with credit card companies to stop piracy
This article from The Verge is countering an earlier article on the BBC's site alleging that Google is working with credit card companies to block the flow of advertising money to sites offering unauthorized copies of copyrighted content. If strangling those sites' funding in that way - such as was done to Wikipedia - is a public policy goal, then it should be properly publicly discussed. It's clearly not Google's place to do it - and in this story Google seems to agree.
google  intellectualproperty  funding 
february 2013
Music industry accuses Google of using its own techniques to challenge copyright law
This Telegraph article provides a nice example of corporate "projection": various music industry bodies accuse Google of lobbying to change copyright law to suit its own special interests by chumming up with the UK govt and commissioning academic research favoring its own point of view. Google says it now removes 14 million links a month in answer to requests alleging copyright infringement, up from 330,000 a year ago.
Google  intellectualproperty  music 
february 2013
« earlier      
access advertising africa ai algorithmicliving amazon apple apps argentina australia automation badideas bigdata bitcoin borders canada centralization children china cmu copyright crypto cyberattacks dataprotection dataretention dcpolitics digitaldivide disabilities discrimination dmca dns dwaynehendricks economics ecthr education eff equalopportunity facebook fbi finance forensics freespeech functioncreep funding gchq google greatdetectives hacking health history icann identityfraud infrastructure intellectualproperty internetgovernance internethistory internetofthings itu judicialabuse julianassange kurzweil law lawenforcement media money mulligan music musicbusiness newthreats nsa nytimes obsession openaccess orphanworks passwords peace photography physics piracy porn privacy publicshaming radio research righttobeforgotten risks robots russia science sciencefraud scoring search security securty self-quantified sex sexualharassment sharingeconomy silence siliconvalley smartliving socialjustice socialnetworks software spain spam streaming surveillance teaparty teens telegraph tools tracking twitter uavs uspolitics ustrade virtualcommunities wearablecomputing werobot wg wikileaks wikipedia women

Copy this bookmark: