- Our Blog
People sending nude photos have come up with ways to try to lessen the risk of those photos going public, including not including their face; sending a password-protected, encrypted nude selfie; and setting the photo to self-destruct after delivery. But it doesn’t matter what security techniques you use if the person to whom you’re sending them stores them insecurely.
Andrew Ledvina used to be a data scientist at Facebook. He recently made the mistake of talking to a reporter about that, notably telling a WSJ reporter that when he was there from 2012 to 2014, there was no internal review board that might have had qualms about Facebook's now infamous emotion manipulation study, that he and other data scientists were allowed to run any test ...
FBI director James Comey on 60 Minutes FBI director James Comey really likes car analogies. Last week, in the first of a two-part interview on 60 Minutes, he called the Internet the “most dangerous parking lot imaginable,” meaning, I think, that you should be prepared to Taser any menacing email attachment that sneaks up behind you.
Global law enforcement conducted a massive raid of the Dark Web this week. It started with the FBI takedown of Silk Road 2.0 and the arrest of its alleged operator Blake Benthall in San Francisco on Wednesday. But it quickly exploded from there, as European counterparts seized over 400 black market ‘hidden sites’ and arrested 19 other people alleged to be involved in their operation.
Taser International CEO Rick Smith modeling his company's gear When Rick Smith is on an airplane and a seatmate asks him what he does for a living, he usually goes vague: “I sell industrial electronics.” He knows if he admits he is the founder and CEO of Taser International he’ll have to endure a flight trapped in a heated conversation about cavalier cops, cardiac deaths and ...
This is what Whisper sent to the Department of Defense Last month, the Guardian did a hard-hitting piece on Whisper, reporting that the start-up that offered users the cover of anonymity to voice their deepest secrets was actually tracking interesting users, storing user data and making it searchable for editorial and research use by outside organizations (like the Guardian), and “sharing info.
How the Verizon tracking works, according to privacy technologist Jonathan Mayer This week, researchers discovered that smartphone carriers have started inserting a unique code into their customers’ network activity so that their customers can be tracked as they browse the Web and use smartphone apps; Verizon uses a customer’s unique tag to deliver personalized ads to users, and AT&T AT&am.
Phone carriers want to get into the mobile ad delivery business, using what they know about their smartphone-addicted customers to profile them for advertisers to deliver on-the-nose, or rather on-the-finger, ads. Researchers recently took a close look at the privacy toll of carriers Verizon and AT&T AT&T rolling this out: they’re tagging their customers with unique c ...
How the Verizon tracking works, according to privacy technologist Jonathan Mayer The generally accepted trade-off on the Internet is that you give up your privacy to get free stuff. It’s summed up by a frequently repeated adage, “If you’re not paying for it, you’re the product.” But sometimes you’re paying for it, and you’re still the product.
The Jetsetting Terrorist has been watchlisted for 5 years for misdemeanor "animal enterprise terrorism" -- i.e., freeing minks from fur farms “I’m a convicted terrorist. I fly a lot. And the TSA won’t leave me alone.” That’s the tagline for the “Jetsetting Terrorist,” a blog launched last month in which a frequent flying hipster who has been watchlisted writes (humorously) ab ...
The sites Europeans want search engines to forget When Google Google released its famed transparency report this month, it included a new category of disclosure: how many ‘forget this’ requests it has received from European citizens since they were granted the “right to be forgotten” in May. Google included a round-up of the ‘most forgotten’ sites.
Edward Snowden in Laura Poitras's 'Citizenfour' Many rave reviews of Laura Poitras’s new documentary ‘Citizenfour’ have already been written. The film tackles the large and difficult subject of government information collection, which can no longer be easily referred to as the “sprawling surveillance state” because it involves so many different states, often acting in concert.
Communication tool Slack is slacking when it comes to privacy practices. The tool for online group chatter in workplaces had a pretty nasty privacy flaw. A company using the tool creates different team accounts to use for particular topics of conversation. Slack exposes those different names to anyone who pops an email address with the domain for that company into the Slack s ...
Public phone booths have become an anachronistic feature of urban landscapes thanks to everyone carrying phones in their pockets, but they still have at least one important function: a display booth for advertising. And now, in New York City, that advertising has been equipped with a technology called beacons that use Bluetooth to emit signals that activate receptive apps on ...
Uber CEO Travis Kalanick shows attendees at Uber's Chicago Launch Party a city's Uber heat map in September 2011 (Via Uber's Facebook page) When Uber launches its black car and ride-sharing service in a new, large city, it likes to mark the occasion with a lavish launch party. The company invites the local tech glitterati for craft cocktails, canapes, and a presentation by Ub ...
The six-week-old social network Ello has a manifesto: no ads, no data-mining, no algorithms, no turning users into products. If you hit the “I agree” button after the manifesto, the site puts you on the waiting list for an invitation. If you click “disagree,” it sends you to Facebook’s privacy page.
Kashmir Hill's stories. The Not-So Private Parts: Welcome to The Not-So Private Parts where technology & privacy collide