Eikonal Blog

2013.02.26

Facebook sinking even deeper

  • “Why I’m quitting Facebook” by Douglas Rushkoff (CNN; 2013.02.25) – http://www.cnn.com/2013/02/25/opinion/rushkoff-why-im-quitting-facebook/index.html?iid=article_sidebar
    • I have always argued for engaging with technology as conscious human beings and dispensing with technologies that take that agency away.

      Facebook is just such a technology. It does things on our behalf when we’re not even there. It actively misrepresents us to our friends, and worse misrepresents those who have befriended us to still others. To enable this dysfunctional situation — I call it “digiphrenia” — would be at the very least hypocritical.

    • Facebook does not exist to help us make friends, but to turn our network of connections, brand preferences and activities over time — our “social graphs” — into money for others.
    • The true end users of Facebook are the marketers who want to reach and influence us. They are Facebook’s paying customers; we are the product. And we are its workers. The countless hours that we — and the young, particularly — spend on our profiles are the unpaid labor on which Facebook justifies its stock valuation.
  • “Facebook Is Recycling Your Likes To Promote Stories You’ve Never Seen To All Your Friends” by Anthony Wing Kosner (Forbes; 2013.01.21) – http://www.forbes.com/sites/anthonykosner/2013/01/21/facebook-is-recycling-your-likes-to-promote-stories-youve-never-seen-to-all-your-friends/
  • “Why are dead people liking stuff on Facebook?” by Bernard Meisler (ReadWrite > Social; 2012.12.11) – http://readwrite.com/2012/12/11/why-are-dead-people-liking-stuff-on-facebook

2011.11.29

Oh well

Filed under: censorship, opression, propaganda, surveillance — Tags: — sandokan65 @ 14:11

2011.05.20

Reputation management

Filed under: FaceBook, infosec, opression, privacy, surveillance, tracking — Tags: , , , — sandokan65 @ 14:32

2011.04.21

Geotracking and surveillance

And everyone else (and his dog) is on the game, too …

Androids, too …

iPhone doing surveilance, on whose behalf?

Old and unrelated (or, is it?):

  • The Snitch in Your Pocket (Law enforcement is tracking Americans’ cell phones in real time—without the benefit of a warrant), by Michael Isikoff (NEWSWEEK; Feb 19, 2010.02.19; from the magazine issue dated 2010.03.01): http://www.newsweek.com/id/233916

Related: Geolocation – https://eikonal.wordpress.com/2011/04/08/geolocation/

2011.04.08

Geolocation

  • “SimpleGeo Makes Location Data Free, Complicates Smartphone Tracking Worries” by Kit Eaton (Fast Company; 2011.04.22) – http://www.fastcompany.com/1749262/simplegeo-makes-location-data-free-complicates-smartphone-tracking-worries
  • “Involuntary Geolocation To Within One Kilometer” 9SlashDot; 2011.04.08) – http://yro.slashdot.org/story/11/04/08/1245244/Involuntary-Geolocation-To-Within-One-Kilometer
      Schneier’s blog tips an article about research into geolocation that can track down a computer’s location from its IP address to within 690 meters on average without voluntary disclosure from the target. Quoting: “The first stage measures the time it takes to send a data packet to the target and converts it into a distance – a common geolocation technique that narrows the target’s possible location to a radius of around 200 kilometers. Wang and colleagues then send data packets to the known Google Maps landmark servers in this large area to find which routers they pass through. When a landmark machine and the target computer have shared a router, the researchers can compare how long a packet takes to reach each machine from the router; converted into an estimate of distance, this time difference narrows the search down further. ‘We shrink the size of the area where the target potentially is,’ explains Wang. Finally, they repeat the landmark search at this more fine-grained level: comparing delay times once more, they establish which landmark server is closest to the target.”
  • “Internet probe can track you down to within 690 metres” by Jacob Aron(NewScientist; 2011.04.05) – http://www.newscientist.com/article/dn20336-internet-probe-can-track-you-down-to-within-690-metres.html
      Online adverts could soon start stalking you. A new way of working out where you are by looking at your internet connection could pin down your current location to within a few hundred metres.
  • “Pinpointing a Computer to Within 690 Meters” by Bruce Schneier (2011.04.08) – http://www.schneier.com/blog/archives/2011/04/pinpointing_a_c.html

Related here:

2011.03.09

Privacy articles

  • Report: “Dispelling the Myths Surrounding De-identification” (Anonymization can still work) by Lauren Weinstein (Lauren Buzz; 2011.06.16) – http://bit.ly/lbH5PE by Information and Privacy Commissioner of Canada [PDF]
      “Recently, the value of de-identification of personal information as a tool to protect privacy has come into question. Repeated claims have been made regarding the ease of re-identification. We consider this to be most unfortunate because it leaves the mistaken impression that there is no point in attempting to de-identify personal information, especially in cases where de-identified information would be sufficient for subsequent use, as in the case of health research. The goal of this paper is to dispel this myth – the fear of re-identification is greatly overblown. As long as proper de-identification techniques, combined with re-identification risk measurement procedures, are used, de-identification remains a crucial tool in the protection of privacy.”
  • AOL search data scandal (WikiPedia) – http://en.wikipedia.org/wiki/AOL_search_data_scandal
  • “What the know” series of articles (The Wall Street Journal) – http://online.wsj.com/public/page/what-they-know-digital-privacy.html
  • “The privacy covenant is an illusion: How to regain control” by Chad Perrin (Tech Republic; 2011.04.18) – http://www.techrepublic.com/blog/security/the-privacy-covenant-is-an-illusion-how-to-regain-control/5351?tag=nl.e036

Related pages here: Privacy and digital liberties – https://eikonal.wordpress.com/2010/11/01/privacy-and-digital-liberties/|Personal computer security – https://eikonal.wordpress.com/2011/02/28/personal-computer-security/ | Online privacy tools – https://eikonal.wordpress.com/2010/12/25/online-privacy-tools/ | Unending stream of Facebook privacy news – https://eikonal.wordpress.com/2010/11/22/unending-stream-of-facebook-privacy-news/ | TSA folies – https://eikonal.wordpress.com/2010/11/16/tsa-folies/

2011.01.13

Declawing Cookies


Disabling Flash cookies (LSOs)

2010.12.29

WikiLeaks 2010

  • CableSearch – http://cablesearch.org/an attempt for an user friendly search engine of already published documents from Wikileaks.

On the leaks

Contents of leaks


Related here: Information disclosure sites – https://eikonal.wordpress.com/2010/02/25/information-disclosure-sites/ | ACTA – https://eikonal.wordpress.com/2010/07/16/acta/ | Law vs Technology – https://eikonal.wordpress.com/2012/05/16/law-vs-technology/

.

2010.11.23

X-Ray Vans on US streets

It is time for tin-foil hats … and (tin-foil) whole-body uniforms.


Related here: “Surveillance, wiretapping, tracking, etc.” – https://eikonal.wordpress.com/2010/09/27/surveilance-wiretapping-etc/.

2010.11.22

Unending stream of Facebook privacy news

Filed under: FaceBook, privacy, surveillance — Tags: — sandokan65 @ 10:47

2010.11.16

TSA folies

Government sanctioned groping


Elsewhere:

2010.09.27

Surveillance, wiretapping, tracking, etc.

There are (at least) 4 types of big brothers:

  • Type I: (True Big Brother) Governments and their services. They track population in order to prevent, detect, undercut and punish political dissent, frequently under pretense of enforcing various laws. They have full latitude to amend existing or generate the new laws (DMCA, ACTA, …) in order to legislate-out undesirable behaviors. Due to instrumentation of governments by certain well organized holders of the money (industry: e.g. RIAA, MPAA, etc), they frequently act as a suppressors of behaviors, groups and individuals that these branches of industry consider undesirable.
  • Type II: (Small Big Brother) Commercial industry. There are two main motivations here: 1) suppression of threats to their current business model, and 2) acquisition of consumer data with intent to somehow monetarize collected information (e.g. by cross-pollination with other databases, targeted advertising, profiling the households, etc).
  • Type III: (Wannabe Big Brother) Non-legal entities that look for (mainly) monetary gain by use of users data. This include various criminal groups, unaligned individuals, etc.
  • Type IV: (Not-really Big Brother) family members, stalkers, etc

Surveillance by Type I Big Brothers

USA:


Surveillance by Type II Big Brothers

DNA registry for whole population

Misc

2010.09.22

Facebook monkeying again with user trust model

Filed under: FaceBook, information disclosure, opression, surveillance — Tags: , — sandokan65 @ 10:30

TechCrunch has an article on the one more underhanded switch that Facebook did to the user trust model: “Facebook Has Quietly Implemented A De-Facto Follow Feature” by MG Siegler (2010.09.20) – http://techcrunch.com/2010/09/20/facebook-not-now-follow/. It is as if the Facebook is run an manned by bunch of evil minds trying to find new ways how to screw users’ trust and shatter any remaining semblance/bit of privacy.
Following two paragraphs are capturing the essence of this new change:

    “You see, when someone requests to be your friend on Facebook, this automatically subscribes them to all of your public (“Everyone”) posts in their News Feed. Facebook doesn’t talk about this much, but it’s a very real feature, which we reported on in July of last year. You see these posts until this person rejects you (because obviously if they accept you as a friend, you’ll keep seeing them). So with this new Not Now button, and the removal of the simple rejection mechanism, Facebook has basically created a de-facto follow feature.

    With the Not Now button, Facebook took what was a one-step rejection and made it at least two steps — and that’s only if you want to truly block somebody (after you click the Not Now button, they ask “Don’t know XXXX XXXX?” and if you click that, it will block them from making any further friend requests). If you just want to deny a person’s request without blocking them, you have to go to the Requests page — the limbo area that Facebook sends the Not Now people to. This area isn’t particularly easy to find; it’s buried in the Friends -> Find Friends area. In other words, it’s now quite a few steps simply to reject a person’s friend request as you previously could.”

2010.07.16

ACTA

Filed under: ACTA, opression, surveillance — Tags: , , , , — sandokan65 @ 12:17

Related here: Law vs Technology – https://eikonal.wordpress.com/2012/05/16/law-vs-technology/

| Information disclosure sites – https://eikonal.wordpress.com/2010/02/25/information-disclosure-sites/ | WikiLeaks 2010 – https://eikonal.wordpress.com/2010/12/29/wikileaks-2010/

2010.05.13

RFID against privacy

Filed under: privacy, RFID, surveillance — Tags: — sandokan65 @ 13:23

2010.02.25

With a little help of the government

Filed under: opression, surveillance — Tags: — sandokan65 @ 11:07

Universal surveillance:

  • The Snitch in Your Pocket (Law enforcement is tracking Americans’ cell phones in real time—without the benefit of a warrant), by Michael Isikoff (NEWSWEEK; Feb 19, 2010.02.19; from the magazine issue dated 2010.03.01): http://www.newsweek.com/id/233916

Dirty deeds:

  • “The Chemist’s War” (The little-told story of how the U.S. government poisoned alcohol during Prohibition with deadly consequences.), by Deborah Blum (Friday, Feb. 19, 2010, at 10:00 AM ET) – http://www.slate.com/id/2245188/

2010.02.17

PanoptiClick

Filed under: surveillance — sandokan65 @ 15:46

Browser fingeprinting: http://panopticlick.eff.org/

Blog at WordPress.com.