Wastholm.com

We'd like to think of ourselves as dynamic, unpredictable individuals, but according to new research, that's not the case at all. In a study published in last week's Science, researchers looked at customer location data culled from cellular service providers. By looking at how customers moved around, the authors of the study found that it may be possible to predict human movement patterns and location up to 93 percent of the time. These findings may be useful in multiple fields, including city planning, mobile communication resource management, and anticipating the spread of viruses.

Let's just say it: Nobody has changed the way we interact with technology like Apple has over the last 10 years. Even if the iPad turns out to be the disaster that many are anticipating, Steve Jobs will still be seen as the hero who turns top-end technology into friendly little gadgets even your grandma can use.

But recently, a faint chorus has been growing--thousands of tech geeks suggesting that if you look under Apple's shiny white veneer, you'll find some practices that are less than user friendly. In fact, some of the things Jobs and Apple are being accused of are so over the top, Lex Luthor would have to take off his hat ... and then use it to cover the dark stain spreading across the front of his pants.

In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: "I've got nothing to hide." According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to hide argument and exposes its faulty underpinnings.

TrackMeNot runs in Firefox as a low-priority background process that periodically issues randomized search-queries to popular search engines, e.g., AOL, Yahoo!, Google, and Bing. It hides users' actual search trails in a cloud of 'ghost' queries, significantly increasing the difficulty of aggregating such data into accurate or identifying user profiles. To better simulate user behavior TrackMeNot uses a dynamic query mechanism to 'evolve' each client (uniquely) over time, parsing the results of its searches for 'logical' future query terms with which to replace those already used.

The new Microsoft WAT [Windows Activation Technologies] regime relies upon a series of autonomous "cradle to grave" authentication verification connections to a central and ever-expanding Microsoft piracy signature database, even in the absence of major hardware changes or other significant configuration alterations that might otherwise cause the OS or local applications to query the user for explicit permission to reauthenticate.

Microsoft will trigger forced downgrading to non-genuine status if they believe a Windows 7 system is potentially pirated based on their "phone home" checks that will occur at (for now) 90 day intervals during the entire life of Windows 7 on a given PC, even months or years after purchase.

EU-parlamentet röstade i dag ned det omstridda Swiftavtalet. Den konservativa gruppen försökte in i det sista få omröstningen uppskjuten – men nejsidan segrade. Välinformerade källor säger dock till DN.se att USA oavsett detta kommer att skaffa sig tillgång till sekretssbelagda uppgifter från europeiska banker.

...

Men EU-parlamentets skepsis mot Swiftavtalet ingår också dragkampen med ministerrådet och kommissionen om hur makten ska fördelas nu när Lissabonfördragets nya regler trätt i kraft. Fördraget ger parlamentet väsentligt mer makt, men hur det kommer att se ut på detaljnivå är inte klart.

En av dessa saker är argumentet om att den som har rent mjöl i påsen inte har något att frukta. Det är ett sånt där argument som 'vanligt hederligt' folk går med på, och kanske till och med använder själva lite då och då. Problemet med det här argumentet är dock att det inte är ett argument. Det är inte heller ett pseudoargument. Det är - och jag gör här ett noggrant och väl avvägt urval av de många begrepp jag har lärt mig använda under mina år på universitetet - ett skitargument.

Members of a European Parliament subcommittee dealt a blow to US-EU relations by voting to reject a proposed bank data sharing deal between the US and Europe in a preliminary vote on Thursday.

The agreement allows the US to access information gathered by the Society for Worldwide Interbank Financial Telecommunication (SWIFT) about bank transfers within Europe. SWIFT manages global transactions between thousands of financial institutions in over 200 countries.

Members of the parliament's civil liberties committee voted by 29 votes to 23 to reject the SWIFT deal, arguing that the deal fails to protect the privacy of EU citizens.

US authorities say access to bank details is vital to counterterrorism efforts, but many in Europe object to the widespread invasion of privacy.

It is now compulsory for people selected for a scan to take part, or they will not be allowed to fly.

The new security rules have been introduced following the attempt to blow up a plane over Detroit on Christmas Day.

There have been concerns the scanners breach passengers' rights to privacy.

Transport Secretary Lord Adonis said in the immediate future only a small proportion of airline passengers would be selected for scanning.

In a written statement to the House of Commons, he said: "If a passenger is selected for scanning, and declines, they will not be permitted to fly."

Bookmark

BrowserSpy.dk

browserspy.dk/, posted 2010 by peter in development privacy security

Did you know that all websites that you visit can find out which fonts you have installed? It's also possible to find out if you have a range of programs installed. These include Adobe Reader, OpenOffice.org, Google Chrome and Microsoft Silverlight. Perhaps even which sites you have visited lately can be detected!

When you surf around the internet your browser leaves behind a trail of digital footprints. Websites can use these footprints to check your system. BrowserSpy.dk is a service where you can check just what information it's possible to gather from your system, just by visiting a website.

|< First   < Previous   84–93 (151)   Next >   Last >|