Evolving Privacy ...
Follow
Find
2.2K views | +0 today
 
Scooped by Kami Huyse
onto Evolving Privacy in Social Media
Scoop.it!

Facebook and You : You’re not the customer, you’re the product

Facebook and You : You’re not the customer, you’re the product | Evolving Privacy in Social Media | Scoop.it
Facebook and You : If you’re not paying for it, you’re not the customer. You’re the product being sold.
more...
No comment yet.

From around the web

Evolving Privacy in Social Media
How social networks are changing our tolerance for privacy
Curated by Kami Huyse
Your new post is loading...
Your new post is loading...
Scooped by Kami Huyse
Scoop.it!

Online Harassment

Online Harassment | Evolving Privacy in Social Media | Scoop.it
40% of internet users have personally experienced online harassment, from the mild to the severe; 73% have witnessed it happen to others.
Kami Huyse's insight:

It's time to do something about this.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Q&A: How Yik Yak wants to weed out abuse and become the next Twitter

Q&A: How Yik Yak wants to weed out abuse and become the next Twitter | Evolving Privacy in Social Media | Scoop.it
IDG: Your app has also come under fire at colleges and universities due to abuse, even some death threats. What, if anything, are you guys doing to combat abuse?

Droll: Anonymity can sometimes breed not the best behavior online. We err on the side of ‘take stuff off as quickly as possible.’ First, we have ‘down-votes.’ You can down-vote posts, and once it gets to minus-five, it’s deleted. That gets bad content off very quickly. Beyond that, users can report messages. And on our end, we have a team of moderators working and we have filters running in the background. They’re checking for names, comments, cyberbullying, racist and homophobic slurs, and general inappropriate content.

IDG: How quick are you to jump on a flagged post?

Buffington: We have moderators who review flagged posts. But we err on the side of, pretty much when something is flagged, it’s almost always taken off, if it contains a lot of these key things we’re looking for. That’s usually an indication it’s a bad post.
Kami Huyse's insight:

Since we had the post up about how bad YiKYak is for one student, I thought I would balance it with this one of the founders talking about how they are approaching this issue.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Snapsaved Admits Photo Hack Exposed Snapchat Users

Users on 4Chan, the image board via which many of the iCloud celebrity photos were shared, have been abuzz with what has been dubbed “The Snappening” – a reference to iCloud leak “The Fappening.”
Kami Huyse's insight:

More confirmation that Snapchat is not the anonymous bastion it claims to be. Outside apps make true ephemeral data impossible to guarantee. 


Snapsaved.com, a web-based client that allows users to access Snapchat images, admitted it was to blame for the leak, but moved quickly to dampen speculation about the size of the data dump and the nature of the content.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

New York Times: Facebook Developing Anonymous App

New York Times: Facebook Developing Anonymous App | Evolving Privacy in Social Media | Scoop.it
According to The New York Times, Facebook is only a few weeks away from releasing a standalone mobile app that will allow users to interact with each other without having to use their real names. According to the Times, the app could be used as a Reddit-like tool that allows users to have frank and…
Kami Huyse's insight:

A very interesting development.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Grooming Students for A Lifetime of Surveillance

The same technologists who protest against the NSA’s metadata collection programs are the ones profiting the most from the widespread surveillance of students.
Kami Huyse's insight:

The dark side of technology and Big Data.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

10 Things To Do Differently *Before* You Lose Your Temper

10 Things To Do Differently *Before* You Lose Your Temper | Evolving Privacy in Social Media | Scoop.it
Kami Huyse's insight:

This is a great collection of tips from a Christian worldview, but anyone can get something out of this. Don't blog your fuse, read this!

more...
No comment yet.
Suggested by Julien Rio
Scoop.it!

crypture.it: encrypt your sensitive data into pictures

crypture.it: encrypt your sensitive data into pictures | Evolving Privacy in Social Media | Scoop.it
Working smart and being organized in your work is important but all your efforts get wasted if you are unable to protect your confidential information.
Kami Huyse's insight:

Great list of ways to encrypt data and some nice tool suggestions, too.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Facebook Requires Real Names. What Does That Mean For Drag Queens?

Facebook Requires Real Names. What Does That Mean For Drag Queens? | Evolving Privacy in Social Media | Scoop.it
Dozens of queens' profiles were deactivated recently because they used stage names. Facebook says requiring real names curbs abuse, but LGBT groups say it's restricting — for drag queens and others.
Kami Huyse's insight:

A number of drag queens had their pages shut down this past month. Some say using birth names on profiles can put them at risk.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

How To Stay Anonymous Online: Best Tools for 2014

How To Stay Anonymous Online: Best Tools for 2014 | Evolving Privacy in Social Media | Scoop.it
Here's the best guide ever on how to stay anonymous online. An easy round up of tools you can use in 2014 to leave the least trail possible ... infographic.
more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Mobile phones not smart about protecting privacy | Mind The Gap Public Relations, LLC

Mobile phones not smart about protecting privacy | Mind The Gap Public Relations, LLC | Evolving Privacy in Social Media | Scoop.it
Mobile app privacy is becoming a growing concern with over 90 million people owning smart phones.
more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Twitter possibly used to target Vancouver restaurant shooting victims

Twitter possibly used to target Vancouver restaurant shooting victims | Evolving Privacy in Social Media | Scoop.it
Did the shooter who wounded two men outside a popular downtown restaurant last weekend learn of their whereabouts through Twitter?
more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Ghostery

Ghostery | Evolving Privacy in Social Media | Scoop.it

Ghostery sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Concurring Opinions » The Year in Privacy Books 2011

Concurring Opinions » The Year in Privacy Books 2011 | Evolving Privacy in Social Media | Scoop.it

Here is a list of privacy published in 2011.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Detective honored for using social media in solving crimes

Detective honored for using social media in solving crimes | Evolving Privacy in Social Media | Scoop.it
Sometimes, that something is all she needs. She recalled a gas station robbery she solved when, acting on a tip, she went to the suspect’s Facebook page and saw he had the same tattoo as the masked perpetrator on the security camera recording.

Detective Zale can use social media in all of its forms and is the go-to person in her department for anyone with questions about them. A 23-year veteran of the Oregon Police Department, she has been a detective for 10 years.
Kami Huyse's insight:

Very interesting story about how law enforcement uses social media to solve crimes. 

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Why Yik Yak Is Probably The Worst Thing To Ever Happen To College Campuses

Why Yik Yak Is Probably The Worst Thing To Ever Happen To College Campuses | Evolving Privacy in Social Media | Scoop.it
See, what I’ve learned is that when people don’t have to take responsibility for what they say, they will say ANYTHING. There are no filters. No one asks, “What if this hurts someone’s feelings?” It’s just, “I can say what I want, because no one can trace it back to me.” And frankly, it’s sickening. I’ve seen racist, homophobic, sexist, disgusting posts, all because people know that no one can say for sure who posted it. It’s all terribly entertaining until it’s about you. Until it’s your name they’re posting, your reputation they’re trashing. And then you look at it and see how destructive and how horrible it can really be.
Kami Huyse's insight:

A really insightful article by a college student about this troubling app.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

With This Tiny Box, You Can Anonymize Everything You Do Online | WIRED

With This Tiny Box, You Can Anonymize Everything You Do Online | WIRED | Evolving Privacy in Social Media | Scoop.it
Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the user’s IP address and skirting censorship. It’s also small enough to hide two in a pack of cigarettes. Anonabox’s tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfills its security promises, is that it could become significantly easier to anonymize all your traffic with Tor—not just Web browsing, but email, instant messaging, filesharing and all the other miscellaneous digital exhaust that your computer leaves behind online.
Kami Huyse's insight:

A very interesting new product under development.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

CDC Tracks Cell Phone Location Data to Halt Ebola

CDC Tracks Cell Phone Location Data to Halt Ebola | Evolving Privacy in Social Media | Scoop.it
Nordlund, the CDC spokeswoman, said officials can only see that a call was made to the “4455” Ebola response number and the location of the tower it came through. No personal information is collected, she added – “just total calls per time period by tower.”

Using Esri mapping software, public health officials intend to layer the call data over census information, such as population densities and hospital locations.

"When you have a dense urban setting where the health system is struggling to cope with an outbreak like this,” such geography tools “become crucial to help guide the limited health care resources,” Geraghty said.
Kami Huyse's insight:

This is a novel use of cell tower data, but also could be looked at from a privacy lens.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Journalist Talks Confidential Sources, Getting Subpoenaed And His New Book

Journalist Talks Confidential Sources, Getting Subpoenaed And His New Book | Evolving Privacy in Social Media | Scoop.it
NSA has the ability to take facial recognition, facial images that they get from, you know, say your Facebook page or email or text message or whatever - wherever, you know, imagery passes through the Internet, then they can link that up with a signals intelligence, which is the communications that they intercept - either phone metadata or email metadata or content of communications. And they can marry that up and then begin to create a massive profile of an individual. And find - basically find where you are, what you're doing, who you're seeing and virtually anything about you in real time. And at looking at, you know, passport photos, for instance, and all those kind of border-crossing information or travel records or flight records. The mosaic that they can create about your life is pretty incredible.
Kami Huyse's insight:

I found this interview with James Risen fascinating. He is a New York Times investigative reporter, could face prison for refusing to reveal his source for a story about a botched CIA operation intended to sabotage Iran's nuclear weapons program.  His description of how NSA creates a digital profile is noteworthy, but it is important to say that the NSA isn't the only one with this capability, though they might have access to more "private" data. However, a good deal of publicly available data can now be stitched together with little effort and a few off-the-shelf tools. 

more...
No comment yet.
Suggested by Matt Cilderman
Scoop.it!

Google Now: Trading Your Privacy For The Future

Google Now: Trading Your Privacy For The Future | Evolving Privacy in Social Media | Scoop.it
If you surveyed a few people on the street and asked them what Google Inc. (NASDAQ:GOOG) does, most people would say "search" and maybe a few others would talk about their other really cool, free services like Chrom
Kami Huyse's insight:

If you don't pay money for a service, you are paying with your personal information. So true.

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Google has removed 170,000-plus URLs under “right to be forgotten” edict

Google has removed 170,000-plus URLs under “right to be forgotten” edict | Evolving Privacy in Social Media | Scoop.it
Google weighs public interest, accuracy and relevance.
Kami Huyse's insight:

Not everything will be removed, but this is a great tool to get heard, but you have to be a European.


"A woman requested that we remove a decades-old article about her husband’s murder, which included her name. The page has been removed from search results for her name," Google said. Another one read, "A financial professional asked us to remove more than 10 links to pages reporting on his arrest and conviction for financial crimes. We did not remove the pages from search results."

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

How to hide your nudes on iOS 8, and why they’re not really hidden | Apple | Geek.com

How to hide your nudes on iOS 8, and why they’re not really hidden | Apple | Geek.com | Evolving Privacy in Social Media | Scoop.it
Last night, you dressed your cat in a lion’s mane and took a super hilarious photo that you couldn’t wait to show your coworkers today. However, after handing them your phone with the photo [...]
Kami Huyse's insight:

Honestly, I wish that people would get a clue. You can't put nude photos out there and hope they don't get seen.

 

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About Facebook Privacy [Update] | Cult of Mac

This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About Facebook Privacy [Update] | Cult of Mac | Evolving Privacy in Social Media | Scoop.it

These are all girls with publicly visible Facebook profiles who have checked into these locations recently using Foursquare. Girls Around Me then shows you a map where all the girls in your area trackable by Foursquare area. If there’s more than one girl at a location, you see the number of girls there in a red bubble. Click on that, and you can see pictures of all the girls who are at that location at any given time. The pictures you are seeing are their social network profile pictures.”

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say) | Evolving Privacy in Social Media | Scoop.it
The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits...
more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Google Patents Technology to Serve Ads Based on Background Noise | PCWorld Business Center

Google Patents Technology to Serve Ads Based on Background Noise | PCWorld Business Center | Evolving Privacy in Social Media | Scoop.it

A new Google patent could enable the search giant to base advertising on background noise during phone conversations...

more...
No comment yet.
Scooped by Kami Huyse
Scoop.it!

Facebook is Using You - The New York Times

The bits and bytes about your life can easily be used against you. Whether you can obtain a job, credit or insurance can be based on your digital doppelgänger — and you may never know why you’ve been turned down.

more...
No comment yet.