www.aclu.org/blog/technology-and-liberty/apples-persistent-device-id-threat-privacy, posted Sep '12 by peter in apple crapification mobile privacy
The unique IDs that Apple bakes into iOS mobile devices, such as iPhones and iPads, have long been the subject of criticism by privacy experts. In contrast to the cookies used to track consumers on the web, which can be deleted (at least by those consumers tech-savvy enough to navigate to obscure browser settings), UDIDs cannot be deleted or removed. As long as the consumer uses a particular iPhone, the UDID will stay the same. Unsurprisingly, advertising companies embraced the UDID as a way to effectively track and target users of mobile Apps.
What does this mean for you? Well, if need be, the government can read your email, Facebook messages, forum postings, web history, pretty much anything you’ve ever done on the internet. You may believe that as you’re not a terrorist or child pornographer, the government should have no reason to, but the problem is the language in this bill is so loose, they can access your information for almost any reason at all. Ever visited a torrent site or watched an unofficial YouTube video of copyrighted material? Ever reposted a picture without the explicit permission of the rights holder? Well, you’re now tangentially related to a cybersecurity crime, and your entire internet history is fair game for careful examination. And don’t think Google Chrome Incognito mode will save you.
33bits.org/2012/02/20/is-writing-style-sufficient-to-deanonymize-material-posted-online/, posted Apr '12 by peter in language nlp privacy science
So what exactly did we achieve? Our research has dramatically increased the number of authors that can be distinguished using writing-style analysis: from about 300 to 100,000. More importantly, the accuracy of our algorithms drops off gently as the number of authors increases, so we can be confident that they will continue to perform well as we scale the problem even further. Our work is therefore the first time that stylometry has been shown to have to have serious implications for online anonymity.
Even though Android is mostly Free Software, devices usually come with proprietary software and services that prevent people from using them in an independent and autonomous way. Liberate your Android device: learn how to regain control of your data, with a free operating system and free apps!
När politiker i Sverige och andra västländer stiftar övervakningslagar skapas en marknad för teknik som sedan blir farliga vapen i händerna på diktatorer. Det menar Evgeny Morozov, ett av de tyngsta namnen i den internationella debatten om politiken kring internet. DN.se har träffat honom.
– Varför finns det en marknad för de här teknikerna? Jo för att USA och Europa anser att man behöver dem och beställer dem till sina underrättelsetjänster och polis. Diktaturerna är en slags andrahandsmarknad för verktyg som kommit till i väst, säger Evgeny Morozov till DN.se.
Ahead of the anniversary of Iran’s revolution Saturday, the country’s government has locked down its already-censored Internet, blocking access to many services and in some cases cutting off all encrypted traffic on the Web of the kind used by secure email, social networking and banking sites. In response, the information-freedom-focused Tor Project is testing a new idea: Encrypted connections that don’t look encrypted. To skirt the so called “deep packet inspection” filters Iran’s government has deployed to block all Secure Sockets Layer and Transport Layer Security (SSL and TLS) encryption that protesters might use to communicate privately, Tor is trying a new kind of bridge to the Web, one the group is calling “obfsproxy,” or obfuscated proxy.
https://www.eff.org/deeplinks/2012/02/what-actually-changed-google_s-privacy-policy, posted Feb '12 by peter in google privacy social toread
In fact, it took a letter from eight Representatives to persuade them to provide straightforward answers to the public about their new policy.
Here’s what you need to know about the substantive changes in the new policy:
Serval enables mobile communications no matter what your circumstance: mobile communications in the face of disaster, in the face of poverty, in the face of isolation, in the face of civil unrest, or in the face of network black-spots. In short, Serval provides resilient mobile communications for all people, anywhere in the universe.
Serval technology bridges the digital divide. We have proved that it is possible, using open source technology to create a mobile communications platform that benefits everyone, for all time, and changes the nature of telecommunications forever.
falkvinge.net/2011/07/01/lawfully-good-lawfully-evil/, posted Sep '11 by peter in opinion philosophy politics privacy
There’s a big difference in how activists and bureaucrats view the world. In the view of bureaucrats, anything lawful is right by definition. In contrast, activists don’t care whether something is lawful, they care whether it’s good and just. Bureaucrats generally do not understand the difference.
blogs.forbes.com/timothylee/2011/07/14/how-private-are-bitcoin-transactions/, posted Jul '11 by peter in business opinion privacy
In other words, Bitcoin’s alleged privacy benefits mostly reflect the fact that the government isn’t really trying to spy on Bitcoin users. It hasn’t built the kind of surveillance infrastructure the government has for tracking dollar-denominated transactions. And to be clear, I would rather that infrastructure not exist. But if Bitcoin becomes popular, the government will build precisely the same infrastructure for spying on the Bitcoin network. And when they do, it will become clear that for ordinary users, Bitcoin is, if anything, less surveillance-resistent than traditional cash.