Facebook can gain direct access to a person’s mobile and take pictures or make videos at any time without explicit consent, British MPs warn as they call on social media companies to si
Kurt Laitner's insight:
via Jean Lievens, the title is misleading, commentary by irish mp about byzantine tou's and apps that require more permissions than they need - developing voluntary code which could lead to legislation - I hope this spreads
Verizon users might want to start looking for another provider. In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker. This tracker, included in an HTTP header called X-UIDH, is sent to every unencrypted website a Verizon customer visits from a mobile device.
Kurt Laitner's insight:
The day is coming soon when you will need to own your own network (the whole stack)
Researchers at Lancaster University, UK have taken a hint from the way the human lungs and heart constantly communicate with each other, to devise an innovative, highly flexible encryption algorithm that they claim can't be broken using the traditional methods of cyberattack.
Information can be encrypted with an array of different algorithms, but the question of which method is the most secure is far from trivial. Such algorithms need a "key" to encrypt and decrypt information; the algorithms typically generate their keys using a well-known set of rules that can only admit a very large, but nonetheless finite number of possible keys. This means that in principle, given enough time and computing power, prying eyes can always break the code eventually.
The researchers, led by Dr. Tomislav Stankovski, created an encryption mechanism that can generate a truly unlimited number of keys, which they say vastly increases the security of the communication. To do so, they took inspiration from the anatomy of the human body.
NSA and GCHQ developing capabilities to piggyback on commercial data from apps including Angry Birds for their own purposes
Kurt Laitner's insight:
I have been consistently annoyed with the privileges that mobile apps ask for, this needs to be reigned in such that I can choose which permissions to give the app, and see for myself whether the app still functions adequately without them. Also, there is an app that monitors other apps for leakage, I think I posted here..
You've probably heard politicians or pundits say that “metadata doesn't matter.” They argue that police and intelligence agencies shouldn't need probable cause warrants to collect information about our communications.
Henry Story of W3C WebID incubator group explains WebID in a series of videos. WebId is a browser implemented TLS based identity service that obviates the need to login to each web site with a separate user name and password, and allows central management of access to profile metadata, along with easily used multiple personas
Db on the utility of multiple personas, the practical mapping of personas to services (in my mind because those services do not provide multiple personas as a core feature - based on advertisement models they want to have a single bio person identity to aggregate against as that is the buying agent) - further commentary on the social norms baked into technology and the value of forgetful systems
Mike is a 2013 blogging resident visiting us from his home blog Omniorthogonal. This series of posts has explored a variety of ways in which agency – the ability of something to initiate action – can be rethought, redistributed, and refactored.
Recent reports have revealed that several companies are currently pushing “intelligent street lights” that are capable of being loaded with various kinds of sensors including, as Reuters reported late last month, sensors for moisture, ambient...
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.