"Apple, Google and the other big tech companies should acknowledge that millions of their customers regularly use their products to engage in sensitive, intimate activities. These companies can and should offer a ‘private photo’ option for sensitive photos that prevents them from being uploaded to the cloud. More importantly, they should treat their customers like grownups and educate them about how they can use their products and services to engage in intimate activities, as safely as possible."
"Existing censorship measurement platforms frequently suffer from poor adoption, insufficient geographic coverage, and scalability problems. In order to outline an analytical framework and
data collection needs for future ubiquitous measurements initiatives, we build on top of the existent and widely-deployed RIPE Atlas platform. In particular, we propose methods for monitoring the
reachability of vital services through an algorithm that balances timeliness, diversity, and cost. We then use Atlas to investigate blocking events in Turkey and Russia. Our measurements identify under-
examined forms of interference and provide evidence of cooperation between a well-known blogging platform and government authorities for purposes of blocking hosted content."
"Big Data entails a challenge to key privacy principles. Some claim that it will be impossible to enforce these principles in an age characterised by Big Data. According to this view, the
protection of privacy must primarily be safeguarded through enterprises providing clear and comprehensive information on how personal data is handled. The Working Group is of the opinion, however, that
the protection of privacy is more important than ever at a time when increasing amounts of information are collected about individuals. The privacy principles constitute our guarantee that we will not be
subjected to extensive profiling in an ever increasing array of new contexts. A watering down of key privacy principles, in combination with more extensive use of Big Data, may have adverse consequences
for the protection of privacy and other important values in society such as freedom of expression and the conditions for exchange of ideas."
"This guide explains how the Data Protection Act (DPA) applies to journalism, advises on good practice, and clarifies the role of the Information Commissioner’s Office (ICO). It does not have
any formal legal status and cannot set any new rules, but it will help those working in the media understand and comply with existing law in this area."
"Their argument: Since the tech industry is populated by meritocratic rationalists, it would be impossible for a talented female engineer not to rise to the top. Therefore, if few women are in
the industry, the problem is not sexism but the absence of some innate capacity or interest on the part of (most) women. In other words, the dearth of women in tech is only natural. […] The proportion
of programmers in India who are women is at least 30 percent. In the US it’s 21 percent. And this despite the fact that by most indexes - economic opportunity, educational attainment, health - women in
India have access to a narrower set of opportunities than women in the United States. So unless nature is working contrarily in South Asia, something about the culture of the Indian educational system and
tech industry is more hospitable to women than the American one. If we can figure out what that difference is, we can begin to change things for the better in the US."
"As legal systems differ throughout the world there are significant differences in how Free and Open Source Software licenses are treated in different countries, and it can be difficult to
obtain reliable information on national interpretations. The International Free and Open Source Software Law Book engages with this by providing a clear yet thorough analysis of Free and Open Source legal
matters written and maintained by local experts, and by inviting everyone to assist in improving or expanding the content."
"The thought process behind non-anonymity is simple, in that anyone who has their identity attached to their comments will be more careful about what they say in a digital forum because it can
be traced back to their family and career. But to believe that a system of name verification would deter uncivil discourse, we’d have to believe that all off-color comments are the results of malicious
intent, that is, comments specifically for the purpose of aggravation, to cause harm or instill fear. Purposefully hurtful comments would be embarrassing or harmful to attach to your name, the opinions
you want to hide from your family and job. But, the truth is that many vitriolic comments come from readers who are proud to associate these views with their identity."
"The fiasco I want to talk about is the World Wide Web, specifically, the advertising-supported, ‘free as in beer’ constellation of social networks, services, and content that represents so
much of the present day web industry. I’ve been thinking of this world, one I’ve worked in for over 20 years, as a fiasco since reading a lecture by Maciej Cegłowski, delivered at the Beyond Tellerrand
web design conference. Cegłowski is an important and influential programmer and an enviably talented writer. His talk is a patient explanation of how we’ve ended up with surveillance as the default, if
not sole, internet business model. The talk is hilarious and insightful, and poignant precisely for the reasons Carlson’s story is. The internet spies at us at every twist and turn not because Zuckerberg,
Brin, and Page are scheming, sinister masterminds, but due to good intentions gone awry."
"There is a clear trend in the discourse surrounding surveillance: new technologies are analogised to a less powerful, pervasive and intrusive technology by only considering a single common function. This narrow logic strips the technology of important capabilities and novel contexts in which it can be used. It is not that analogies are inherently problematic, but rather significant problems arise when they are used by courts to only focus on a single dimension of the technology. Such analogies generate a cursory understanding and subsequently, courts ignore areas of warranted concern. As a recent encouraging US Supreme Court opinion puts it in perhaps the most appropriate use of an analogy, likening a search of a cell phone to a container ‘is like saying a ride on horseback is materially indistinguishable from a flight to the moon. Both are ways of getting from point A to point B, but little else justifies lumping them together."
"An informed citizenry depends on people’s exposure to information on important political issues and on their willingness to discuss these issues with those around them. The rise of social media, such as Facebook and Twitter, has introduced new spaces where political discussion and debate can take place. This report explores the degree to which social media affects a long-established human attribute—that those who think they hold minority opinions often self-censor, failing to speak out for fear of ostracism or ridicule. It is called the ‘spiral of silence.’"
"Do Not Track, or more specifically the Tracking Preference Expression and Tracking Compliance and Scope specifications, is an internet privacy standard that allows users to signal their preferences for being tracked or not online. The standard is a mess, an epic farrago unfolding in slow motion. It’s unfinished and the subject of fundamental disagreement, but also, strangely, in active use. It’s never actually failed but it can never succeed. Like a giant glacier it’s slowly melting away beneath us. Eventually we’ll notice we’re stood on bare rock and it’s gone completely but until then we’ll wake up each day with nothing more interesting to wonder at than an occasional dampness in our shoes."
"The fact that computers, external file storage and cloud servers are employed does not require one to alter the high threshold that must be met to justify government intrusion. Each new
technology that affords a different type of private place to preserve private communications does not require a different standard for the search and seizure of its contents than is constitutionally
required for the search of a file cabinet or the search of a home. What is different is the amount of private information that can be improperly searched and the substantially greater intrusion upon
privacy and Fourth Amendment interests that may result. One must look to the Fourth Amendment to define the limits of such searches and then ask whether the existing policies, procedures and guidelines
applied to the technologies of the day appropriately mirror our fundamental constitutional values. Currently, they do not. The starting point cannot be that everything is fair game."
"Hosts must be able to access other hosts in an automated fashion, often with very high privileges, for a variety of reasons, including file transfers, disaster recovery, privileged access
management, software and patch management, and dynamic cloud provisioning. This is often accomplished using the Secure Shell (SSH) protocol. The SSH protocol supports several mechanisms for
authentication, with public key authentication being recommended for automated access with SSH. Management of automated access requires proper provisioning, termination, and monitoring processes, just as
interactive access by normal users does. However, the security of SSH-based automated access has been largely ignored to date. This publication assists organizations in understanding the basics of SSH
automated access management in an enterprise, focusing on the management of SSH access tokens."
"Existing research on the extensive Chinese censorship organization uses observational methods with well-known limitations. We conducted the first large-scale experimental study of censorship
by creating accounts on numerous social media sites, randomly submitting different texts, and observing from a worldwide network of computers which texts were censored and which were not. We also
supplemented interviews with confidential sources by creating our own social media site, contracting with Chinese firms to install the same censoring technologies as existing sites, and - with their
software, documentation, and even customer support - reverse-engineering how it all works. Our results offer rigorous support for the recent hypothesis that criticisms of the state, its leaders, and their
policies are published, whereas posts about real-world events with collective action potential are censored."
"Without even realising it, many of you may already be sitting next to a device which is arguably part of the Internet of Things. While Smart TVs are still relatively expensive they are quickly coming down in price and allow you not only to browse websites, but access tailored apps and games, plus of course stream TV programmes on-demand. However, new research published by the consumer group Which? has highlighted that with greater capability, come potential threats to your privacy. […] While the results show that the information being exchanged is not particularly sensitive, in many cases it can be classed as personal information. This means that companies will routinely be using your information to tailor the services you receive. This might be through useful features such as suggesting upcoming programmes that you might like to watch, but will also include services you may be less keen to receive, such as targeted advertising – a practice that all but one of the manufacturers surveyed by Which? currently carries out."