NotesThe fundamental problem is that in using most modern consumer-oriented applications, we lose control of the data we share with those applications. In creating documents, writing emails, or tracking our exercise or other activities, we share data with an application that’s useful for a particular purpose, but also allow the data live in a database controlled by the application’s owner. With the data outside of our control, it can then be restricted, lost, leaked, sold, resold, and exploited. The groups that control these databases accrue most of the benefits, and we accrue most of the costs.FeedUnfurl
NotesConsent-O-Matic is a browser extension that recognizes CMP (Consent Management Provider) pop-ups that have become ubiquitous on the web and automatically fills them out based on your preferences – even if you meet a dark pattern design.Unfurl
Notes All of this is a long way of saying that I was totally unprepared for today's bombshell revelations describing the NSA's efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be true, but it's true on a scale I couldn't even imagine. I'm no longer the crank. I wasn't even close to cranky enough.FeedEmbedUnfurl
NotesIt’s also worth pointing out that we do take certain technical measures to limit the data we collect. We’ve designed Persona so that the identity provider – including the fallback Identity Provider that we run – does not learn your browsing history. We consider that a good security practice, not specifically because of surveillance, but generally because collecting data without a user benefit just creates risk.Unfurl
NotesDave asks some great questions about why the people who had power over these networks didn't blow the whistle instead of some anonymous insider having to do it. Here's one possible answer.Unfurl
NotesAt Chase Bank, we recognize the value of online banking—it’s quick, convenient, and available any time you need it. Unfortunately, though, the threats posed by malware and identity theft are very real and all too common nowadays. That’s why, when you’re finished with your online banking session, we recommend three simple steps to protect your personal information: log out of your account, close your web browser, and then charter a seafaring vessel to take you 30 miles out into the open ocean and throw your computer overboard.Unfurl
NotesIf you are unlucky enough to have your computer infected with a RAT, prepare to be sold or traded to the kind of person who enters forums to ask, "Can I get some slaves for my rat please? I got 2 bucks lol I will give it to you :b" At that point, the indignities you will suffer—and the horrific website images you may see—will be limited only by the imagination of that most terrifying person: a 14-year-old boy with an unsupervised Internet connection.Unfurl
NotesThe reason? Siri ships everything you say to her to a big data center in Maiden, North Carolina. And the story of what really happens to all of your Siri-launched searches, e-mail messages and inappropriate jokes is a bit of a black box.Unfurl
Notes"(The student now) fears that the school could make her give up her passwords at a moment's notice, at any time, for any reason," the lawsuit claims. It also alleges that password prying is standard practice at the Minnewaska Middle School, which the student still attends. "(Officials) have compelled other students to disclose their private information and have accessed students' online accounts on multiple occasions," it states.Unfurl
NotesWell, no, not really. Because in the past the user only had to decide whether to share something they just read, but now they have to think about every single article before they even read it. If I read this article, then everyone will know I read it, and do I really want people to know I read it?Unfurl
NotesThe reason that Incognito is such a great feature for Google to build is that over time it will reduce the cookie deletion rate of web browsers.Unfurl
NotesMozilla’s mission is to give users this choice and control over their browsing experience. We won’t turn on Do Not Track by default because then it would be Mozilla making the choice, not the individual. Since this is a choice for the user to make, we cannot send the signal automatically but will empower them with the tools they need to do it.FeedEmbedUnfurl
Notes"personalization framework for the web are discussed, and contrasted with the requirements for a federated digital identity system. A set of design goals for personalization frameworks is developed and discussed. User identification requirements for personalization are isolated and found to be more limited than in the digital identity arena. Privacy implications for personalization frameworks are discussed. Based on all of this an architecture is proposed for detailed design and implementation."Unfurl
Notes"There’s risk in confusing broadband and Internet. If the National Broadband Plan starts from the premise that the U.S. needs the innovation, increased productivity, new ideas and freedoms of expression that the Internet affords, then the Plan will be shaped around the Internet. If, instead, the Plan is premised on a need for broadband, it fails to address the ARRA’s mandated objectives directly. More importantly, the premise that broadband is the primary goal entertains the remaking of the Internet in ways that could put its benefits at risk. The primary goal of the Plan should be broadband connections to the Internet."Unfurl
Notes"The Star-Telegram has a report on the tight security surrounding George W. and Laura Bush’s move into their Dallas home. Police officers have been turning away vehicles trying to enter the Preston Hollow neighborhood, “explaining that it is closed to the general public.”"Unfurl
Notes"The whole package—music, message, meme, media—comes together nicely. Like the best cultural phenomena, this can be enjoyed at several levels of participation—at least one of which involves a dance floor."Unfurl
Notes"A security researcher has a devised a novel attack on online anonymity systems in which he literally takes a computer's temperature over the internet."Unfurl
Notes"I have spoken to about a dozen agents, and they all roll their eyes and indicate disgust with the man-years of wasted effort being put into physically examining NSA "leads." "Unfurl
Notes"For if we are observed in all matters, we are constantly under threat of correction, judgment, criticism, even plagiarism of our own uniqueness."Unfurl
Notes"It is particularly important that the freedom of the Internet be protected against either the encroachment of government or efforts at control by large media conglomerates. The future of our democracy depends on it."Unfurl
Notes"In the weeks after 9/11, while America and the world were grieving, Bush built a legal rationale for a dictatorship. Then he immediately started using it to avoid the law."Unfurl
Notes"It is not known exactly how Kennedy became mixed up in a national terrorist database - whether by accident, or as a practical joke, or as a Republican dirty trick to keep him out of Boston during the Democratic National Convention."Unfurl
Notes"In the brave new future, Big Brother will watch our every move. But that's OK, because we'll be watching him too." Brin beats the transparent society drum again. I, for one, welcome my own personal traffic cam.Unfurl
NotesWell, they don't *really* know us - which is why it's so scary that they could have the power to deny things to us based on credit reports, health history, etc.Unfurl