Identity and Privacy
Follow
Find
102 views | +0 today
 
Scooped by Kurt Laitner
onto Identity and Privacy
Scoop.it!

Google Experiments with a Ring that Acts as Your Password | MIT Technology Review

Google Experiments with a Ring that Acts as Your Password | MIT Technology Review | Identity and Privacy | Scoop.it
The world’s largest search engine is now experimenting with jewelry that would eliminate the need to remember dozens of passwords.
Kurt Laitner's insight:

we looked at this as a way to manage digital rights for a media server we developed in 2000, but this is taking it even further and making it 'wearable' encourages always nearby behavior - some concerns here

more...
No comment yet.
Identity and Privacy
The nature of identity and privacy in hyperconnectivity
Curated by Kurt Laitner
Your new post is loading...
Your new post is loading...
Scooped by Kurt Laitner
Scoop.it!

Identity Wars: Why Apple Pay Is About More Than Payments

Identity Wars: Why Apple Pay Is About More Than Payments | Identity and Privacy | Scoop.it
With their array of shiny new features, bigger screens, and better hardware, there’s been no shortage of attention paid to the launch of the new iPhones...
Kurt Laitner's insight:
via Peter van der Auwera
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Henry Story's Home Page

Kurt Laitner's insight:

Henry Story of W3C WebID incubator group explains WebID in a series of videos.  WebId is a browser implemented TLS based identity service that obviates the need to login to each web site with a separate user name and password, and allows central management of access to profile metadata, along with easily used multiple personas

more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Your Next Passport Could Be On The Blockchain | TechCrunch

Your Next Passport Could Be On The Blockchain | TechCrunch | Identity and Privacy | Scoop.it
A blockchain tinkerer named Chris Ellis has created a system to build an actual digital passport that, through use of the Bitcoin blockchain and some..
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Effects of Algorithm Awareness - P2P Foundation

Effects of Algorithm Awareness - P2P Foundation | Identity and Privacy | Scoop.it
Kurt Laitner's insight:
positive affordances of privacy include an unobstructed view
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Free App Lets the Next Snowden Send Big Files Securely and Anonymously | Threat Level | WIRED

Free App Lets the Next Snowden Send Big Files Securely and Anonymously | Threat Level | WIRED | Identity and Privacy | Scoop.it
Onionshare is simple, free software designed to let anyone send files securely and anonymously.
Kurt Laitner's insight:

Possibly a useful tool, if you trust the publisher.

more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Everything Is Broken

Everything Is Broken | Identity and Privacy | Scoop.it
Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piec…
Kurt Laitner's insight:
great romp through security issues
more...
No comment yet.
Rescooped by Kurt Laitner from Digital Footprint
Scoop.it!

The era of Facebook is an anomaly

The era of Facebook is an anomaly | Identity and Privacy | Scoop.it
danah boyd’s SXSW keynote is sold out. When it’s over, a dozen fans rush the stage.

These fans aren’t young groupies hoping to get a closer glimpse at their favorite rock star, but...

Via Peter Vander Auwera
Kurt Laitner's insight:

Db on the utility of multiple personas, the practical mapping of personas to services (in my mind because those services do not provide multiple personas as a core feature - based on advertisement models they want to have a single bio person identity to aggregate against as that is the buying agent) - further commentary on the social norms baked into technology and the value of forgetful systems

more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Privacy Metaphors

Privacy Metaphors | Identity and Privacy | Scoop.it
We are living through a privacy tipping point. Technology is dramatically changing what is possible in terms of surveillance, monitoring, persistence, analysis. We are cracking open the lid of Pa...
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Morality for Exploded Minds

Morality for Exploded Minds | Identity and Privacy | Scoop.it
Mike is a 2013 blogging resident visiting us from his home blog Omniorthogonal. This series of posts has explored a variety of ways in which agency – the ability of something to initiate action – can be rethought, redistributed, and refactored.
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

The Three Dimensions of the Privacy Apocalypse

The Three Dimensions of the Privacy Apocalypse | Identity and Privacy | Scoop.it
Recent reports have revealed that several companies are currently pushing “intelligent street lights” that are capable of being loaded with various kinds of sensors including, as Reuters reported late last month, sensors for moisture, ambient...
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

What is Tor and why does it matter?

What is Tor and why does it matter? | Identity and Privacy | Scoop.it
We all live in public, at least as far as the US National Security Agency is concerned. As Internet users and global citizens become more aware of surveillance activities that the US ...
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Who Really Owns Your Personal Data?

Who Really Owns Your Personal Data? | Identity and Privacy | Scoop.it
Thanks to an exploding number of wellness apps and wearable devices, you may be beaming biodata into the cloud right now. As the Quantified Self movement picks up steam, who stands to profit?
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Facebook can access your mobile, take pictures and video - warning - Independent.ie

Facebook can access your mobile, take pictures and video - warning - Independent.ie | Identity and Privacy | Scoop.it
Facebook can gain direct access to a person’s mobile and take pictures or make videos at any time without explicit consent, British MPs warn as they call on social media companies to si
Kurt Laitner's insight:
via Jean Lievens, the title is misleading, commentary by irish mp about byzantine tou's and apps that require more permissions than they need - developing voluntary code which could lead to legislation - I hope this spreads
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls

Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls | Identity and Privacy | Scoop.it
Verizon users might want to start looking for another provider. In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker. This tracker, included in an HTTP header called X-UIDH, is sent to every unencrypted website a Verizon customer visits from a mobile device.
Kurt Laitner's insight:

The day is coming soon when you will need to own your own network (the whole stack)

more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Facebook Wants You to Vote on Tuesday. Here's How It Messed With Your Feed in 2012. | Mother Jones

Facebook Wants You to Vote on Tuesday. Here's How It Messed With Your Feed in 2012. | Mother Jones | Identity and Privacy | Scoop.it
The social network tries to promote voting, but it also has conducted tests that affect users' voting behavior—without telling them.
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Meet the Online Tracking Device That is Virtually Impossible to Block

Meet the Online Tracking Device That is Virtually Impossible to Block | Identity and Privacy | Scoop.it
A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

By Design : Our Irrefutable Right to be Remembered & Forgotten

By Design : Our Irrefutable Right to be Remembered & Forgotten | Identity and Privacy | Scoop.it
"Every great and just struggle you care to mention, has been necessitated in order to address a wholesale abuse of power." For years I have considered the interrelationship between power and streng...
Kurt Laitner's insight:

interesting conflation of a number of themes, influence, privacy, leadership, power etc - many questionable positions but interesting nonetheless

more...
No comment yet.
Rescooped by Kurt Laitner from Cyborg Lives
Scoop.it!

Human biology inspires "unbreakable" encryption

Human biology inspires "unbreakable" encryption | Identity and Privacy | Scoop.it

Researchers at Lancaster University, UK have taken a hint from the way the human lungs and heart constantly communicate with each other, to devise an innovative, highly flexible encryption algorithm that they claim can't be broken using the traditional methods of cyberattack.

Information can be encrypted with an array of different algorithms, but the question of which method is the most secure is far from trivial. Such algorithms need a "key" to encrypt and decrypt information; the algorithms typically generate their keys using a well-known set of rules that can only admit a very large, but nonetheless finite number of possible keys. This means that in principle, given enough time and computing power, prying eyes can always break the code eventually.

The researchers, led by Dr. Tomislav Stankovski, created an encryption mechanism that can generate a truly unlimited number of keys, which they say vastly increases the security of the communication. To do so, they took inspiration from the anatomy of the human body.


Via Wildcat2030
more...
Scooped by Kurt Laitner
Scoop.it!

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data | Identity and Privacy | Scoop.it
NSA and GCHQ developing capabilities to piggyback on commercial data from apps including Angry Birds for their own purposes
Kurt Laitner's insight:

I have been consistently annoyed with the privileges that mobile apps ask for, this needs to be reigned in such that I can choose which permissions to give the app, and see for myself whether the app still functions adequately without them.  Also, there is an app that monitors other apps for leakage, I think I posted here..

more...
No comment yet.
Rescooped by Kurt Laitner from Digital Footprint
Scoop.it!

Graphs by MIT Students Show the Enormously Intrusive Nature of Metadata

Graphs by MIT Students Show the Enormously Intrusive Nature of Metadata | Identity and Privacy | Scoop.it
You've probably heard politicians or pundits say that “metadata doesn't matter.” They argue that police and intelligence agencies shouldn't need probable cause warrants to collect information about our communications.

Via Peter Vander Auwera
Kurt Laitner's insight:

Try the tool, speaks more than my words could

more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Local Police Departments Have Been Driving Fake Cell Towers Into Neighborhoods To Collect Phone Data

Local Police Departments Have Been Driving Fake Cell Towers Into Neighborhoods To Collect Phone Data | Identity and Privacy | Scoop.it
Kelly reports it's not clear how long the data is retained, and the secrecy with which makes it difficult to exact oversight over the departments.
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.com

Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.com | Identity and Privacy | Scoop.it
The internet backbone -- the infrastructure of networks upon which internet traffic travels -- went from being a passive infrastructure for communication to an active weapon for attacks.
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

NSA surveillance: A guide to staying secure

NSA surveillance: A guide to staying secure | Identity and Privacy | Scoop.it
Bruce Schneier: The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways we can protect ourselves
more...
No comment yet.
Scooped by Kurt Laitner
Scoop.it!

This Week in Cybercrime: Jay-Z and Samsung Face the Music Over Data Privacy Violations - IEEE Spectrum

This Week in Cybercrime: Jay-Z and Samsung Face the Music Over Data Privacy Violations - IEEE Spectrum | Identity and Privacy | Scoop.it
Plus: Stock exchanges under cyberattack; India’s cybercops
Kurt Laitner's insight:

Hopefully this sets a precedent that will require app developers to have 'appropriate' access just sufficient to support the app's funtionality rather than asking for everything in return for using an app.  Of course a user can choose not to use an application because of the permissions, but they likely will not.  This is especially true of applications that are increasingly becoming 'must use' applications due to the weight of the community using them.  For example, if you had to not use google or facebook products due to disagreeing with their privacy policy would this be akin to committing social suicide, or linkedin professional suicide?  I would suggest it is much better to regulate data privacy 'over-reach' rather than expect users to opt out of pseudo-essential applications.  I can see arguments against this position of course, this is a philosphical position.  A middle ground would be to require apps to tie permissions to functionality and allow users to opt out of specific permissions and subsequently lose that aspect of the application (which assumes over-reach regulation, to separate essential access from spurious ones).  This would create a clear quid pro quo where the app developer would be required to show the cost benefit on a function to privacy release basis, clarifying the value proposition of a given app's information access requirements.

more...
No comment yet.