All items about privacy

Posts
Thumbnailed

One step away from lost privacy?

Imagine you’re out in town one day. You feel free and anonymous, so when the opportunity arises and you have an illicit cigarette, pop into a sex shop or have coffee with an ex, you assume no-one will know. But with technology that already exists today, this basic right to keep your actions secret could be gone. Here’s how it will happen: Read more »

Links

Leon Walker could face up to 5 years in prison for reading his wife's e-mail, despite uncovering her affair.

In Michigan, a man has been charged with a felony after reading his wife’s email without permission. If convicted, this could set the precedent that anyone reading a family member’s private mail would be committing a crime.

In some cases this might seem reasonable, but could it mark the beginning of a slippery slope? What about parents who have legitimate reasons to monitor their childrens’ internet usage – could they soon be deemed criminals?

Read the full story at the Detroit Free Press.

Posts

Human 2.0 Holiday Highlights

What better way to ring in the New Year than to put your feet up and enjoy a few re-runs? Here are some of our most popular posts from the last year or so as well as a few you might have missed…

1. Posthumanity and digital superpowers

From http://www.flickr.com/photos/jdm1979uk/3607288494

We’ve been blogging about Human 2.0 for over two years now, but it was this April that we split off from Bitcurrent and launched this site. We kicked off with two launch posts… a high-level scene-setter called Welcome to posthumanity:

“We’re becoming a new species–one that can hack its own cognition and edit its own biology. We’re all getting an upgrade, like it or not. This is the most important subject of the century, but it’s still hiding in academia and science fiction. We hope to change that.”

Ten superpowers the Internet gave us

…and a look at some of the tangible ways in which the Internet gives us superpowers:

We may not realize it, but the Internet has given us superhuman abilities. Technology lets us to do things that were impossible 30 years ago – from speaking foreign languages and armchair travel to global messaging and virtual worlds. Welcome, Human 2.0, these are your superpowers.

2. It’s all about the data

Read more »

Links

39 years after it began, Internet-based electronic mail has finally been granted the same recognition as other forms of communication, meaning that it cannot be intercepted by authorities without a warrant. It’s nice to see some privacy rights being given back in a time when much of our privacy is being eroded in the name of fighting terrorism. The interesting question now is whether this will affect Project Echelon and its routine monitoring of e-mail traffic. It will also be interesting to see if it serves as a precedent for other countries.

Read more at Geekosystem.

Posts
Video
Featured

Periodicity

I have a rather awkward subject to discuss. The last time I brought it up in mixed company, someone slapped me. But I’m going to do it anyway, because it’s worth discussing.

Natural language processing and semantic analysis allows us to extract sentiment from documents. Marketing organizations and community managers rely on tools from Scoutlabs, Radian6, and others that try to understand how online communities feel about their brands and products.

As we share more of our lives online, there’s more to analyze. Researchers from Northeastern University and Harvard University analyzed Twitter’s mood over the day. This kind of sentiment analysis can look at someone’s online messages and decide whether they’re angry or content, happy or sad. Given data over time, it can likely recognize patterns of mood, even cycles.

Such as those that occur every twenty-eight days.

(It’s at this point that my dinner companion launched a well-aimed palm at my somewhat scruffy chin.)
Read more »

Posts
Video
Featured
Thumbnailed

As we move online, the definition of a community changes. Our neighbors aren’t just those people physically near us, but those we hang out with. This flexible definition of a community has serious repercussions for law and social morals: when we find kindred spirits online, we start thinking that everyone is just like us. At the same time, different communities hold us to different standards, and now that those communities leak into one another we need to apply context to our judgement.

In the 1970s bestseller The Joy Of Sex, we learn about a man who could only be aroused in a bathtub full of spaghetti. Back then, he probably led a lonely, normal life — albeit one in which he bought a lot of pasta and had a higher water bill than his neighbors. It’s unlikely that he had friends who shared his particular turn-on. Read more »

Posts

Pulling SMS data from used phonesAt the HCI 2010 conference in Dundee, Scotland, researchers from Glasgow University announced preliminary results that show that a high number of re-sold mobile phones contain personal information left by previous owners. In some cases the data was highly sensitive or incriminating – and in some cases was believed deleted, but still recoverable. Read more »

Posts
Thumbnailed

September, 2014 was unusually cold for Boston. The chill from the Charles drifted in through an open window and slid across the floor of the one-bedroom apartment. Special Agent Ross took in the mess of books, records, and DVDs scattered around the room, framing the dead body of Janet Somers.

Back at the office, he started filing in the forms of the homicide report, detailing the execution-style killing—one shot to the back of the head—and signs of struggle. He’d barely had time to fetch a fresh cup of coffee when the PDA on his hip started buzzing. “Ross.” he answered curtly, annoyed by yet another interruption in what was already looking like a long day.

“This is Mike Lynch. I work for the U.S. Marshals,” explained the caller. “You filed the homicide report on Janet Somers, right?”

“Sure. You knew her?” asked Ross.

“Detective Ross, I work in Witness Protection. It’s not that I knew her, so much as I tried to make the world forget her. Based on what happened today, it sounds like I failed,” said Lynch.

“Yeah, it looked like a professional job: one shot to the back of the head at close range. What’s up?” asked Ross.

“I need you to tell me what music Janet listened to,” Lynch replied.

Ross scowled at the thought of spending hours in Janet’s frosty apartment. “Oh, come on. She’s dead. What difference does that make?”

“Listen, we’ve had six other killings this week. Same M.O. I need your help here.” replied Lynch.

And I thought I was having a bad week, muttered Ross under his breath.  “All these victims were under your protection?”

“Nope, none of them were,” said Lynch. “But the other six victims were all women in their mid-thirties, like Janet. They were all killed, execution-style, late at night, just as Janet was. And most importantly, all six of them liked the same music.

Ross took a sip of coffee and furrowed his brow. “I don’t get it,” he said, “what does their music have to do with it? You don’t shoot people for bad taste.”

“Listen, Ross,” growled Lynch, clearly annoyed. “If Janet liked the same music as the other six, then that means the killer’s using wishlists, iTunes, Last.fm and other online services to find people we’ve spent years working to hide.” The Marshal paused, letting it sink in. “We can change their faces, their cities, their jobs — but we can’t stop them listening to shitty music. And that might just get them killed.”

The US Witness Protection Program has hidden nearly 20,000 people since it was launched in the 1970s. So far, nobody in its custody has been harmed, despite Hollywood’s love of this plot device. Witnesses change their names, their appearance, and even their jobs — anything to hide their past. But can we hide who we really are?

Read more »

Links

Open social data is a Wild West for many companies, with Google, Facebook, and dozens of social monitoring tools rushing to map our relationships and lives before legislation catches up with them. But by mapping data captured across open Wifi while taking Street View maps, Google may have triggered our legislative immune system.

Australian joins German police in investigating the privacy breach (which is nothing new — war-driving is a common practice; it’s just been hard to prosecute people for it.) Australia seems an unlikely defender of surfers’ rights, since it’s busy blocking Internet access; by contrast, Germany’s enforcing safe surfing by its citizens, making Wifi passwords mandatory — which would have prevented the Google breach. This is also the first step in making Wifi owners accountable for everything that crosses their network.

Links

The social graph land grab

The map of how humans know one another will be a tremendously valuable thing. Internet giants like Facebook and Google know how valuable the data will be — it will govern everything from how we advertise to how we give people security clearances. We’re in the middle of the biggest social graph land grab in history.

In the absence of clear guidelines or legislation with teeth, however, the industry is taking an ask-for-forgiveness-not-permission approach to social mapping.

Google has had to pivot quickly in recent months from mapping the web to mapping its users. At least it’s transparent about what it knows: the company publishes its social network mapping, showing who it knows you relate to and how.

Others aren’t so up-front. A Facebook gaffe installed applications when you visited other sites. As this piece points out, when apps install themselves it’s called malware; but on Facebook it’s a feature.

There’s little to discourage Internet giants from building this map, and if you’re online in any way, you probably can’t hide. On today’s Internet, everybody knows you’re a dog.

Powered by WordPress, based on Mina theme.