Privacy Protection
1.6K views | +0 today
Follow
Privacy Protection
Your new post is loading...
Your new post is loading...
Scooped by Apptimate
Scoop.it!

What is the difference between privacy and security?

What is the difference between privacy and security? | Privacy Protection | Scoop.it
Understanding the difference between privacy and security will explain why a privacy program is dependent upon a security program, thereby making a cooperative, interdependent relationship between the teams (and the Chief Privacy Officer and Chief Security Officer) a necessity.
Apptimate's insight:

You cannot have privacy protection without strong cyber security.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

NSA whistleblower Snowden: Google Allo without default encryption is 'dangerous' | ZDNet

NSA whistleblower Snowden: Google Allo without default encryption is 'dangerous' | ZDNet | Privacy Protection | Scoop.it
While NSA whistleblower Edward Snowden weighs into Allo controversy, Google 'cyber overlord' Thai Duong argues end-to-encryption is nice but what people really want is disappearing messages.
Apptimate's insight:

Disappearing messages is adressering a basic human communication need, to be spontaneous and private. But, without proper end-2-end encryption that privacy is just a scam, like Snapchat. Tricking people into thinking that their whims will disappear makes people honest and such honesty should be protected and private. You don't have to go further than to all the breaches of Snapchat to see what people want to use such a service for. Of the record, often means highly sensitive and private  messaging, including highly private pictures.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Spies, tech companies and 50 shades of encryption | ZDNet

Spies, tech companies and 50 shades of encryption | ZDNet | Privacy Protection | Scoop.it
Can a compromise ever be reached over the use of end-to-end encryption? Perhaps, but it's not down to the intelligence agencies or the tech companies to decide.
Apptimate's insight:

Encryption is a necessity for a working and trust worthy Internet. Everyone can agree on that. The problem is the misuse of encryption. Misuse for criminal or terrorism intent. But also misuse by government agencies that want the public to trust Internet while they develop methods of mass surveillance.

 

The whole is situation is created by the governmental misguided use of mass surveillance, as well as the idea of using Internet as a weapon in cyberwar between states.

 

We have to make a choice; shall we as a society accept that there are people that use this tool for criminal activity, while protecting the majority, or should we plan for a police state of mass control? 

 

Interesting though, that this is a non-issue when it comes to the weapons and arms industry. Everyone seems to agree that we need arms and military to protect us, while there still are people using guns to kill each other. We hear the argument "it's not the gun that kills". The same goes for encryption. It's not encryption that enables terror and criminality. It is bad people, and sometimes oppressive systems.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Yes, your smart toaster really will be spying on you for the government | ZDNet

Yes, your smart toaster really will be spying on you for the government | ZDNet | Privacy Protection | Scoop.it
US intelligence chief says the Internet of Things will create new opportunities for surveillance and hacking.
Apptimate's insight:

When you buy a connected house appliance, be very selective. Google. Read blogs. Don't buy things from shady manufacturers. Here is actually an opportunity for all those price comparison sites, open a department for security comparisons in relation to the price, and maybe the manufacturers will wake up.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Harvard Report Debunks Claim Surveillance Is “Going Dark”

Harvard Report Debunks Claim Surveillance Is “Going Dark” | Privacy Protection | Scoop.it
Since the 2013 Snowden disclosures revealed the extent of government surveillance programs it's been a standard claim by intelligence agencies, seeking to..
Apptimate's insight:

With unprotected IoT devices surveillance is "going light". This will be especially true if you install a device that is harvesting your data, for whatever purpose. Harvested data means harvested data, open for any external hacking and access.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Your boss can snoop on your messages - even private ones, says European Court of Human Rights | ZDNet

Your boss can snoop on your messages - even private ones, says European Court of Human Rights | ZDNet | Privacy Protection | Scoop.it
The court has ruled that it's reasonable for a company to check employees' email and instant messaging and that doing so doesn't violate their right to confidential correspondence.
Apptimate's insight:

This ruling just point at the fact that company provided tools are company owned, and that if they have a policy to not allow company tools to be used for private matters, they are allowed to control and enforce these rules. It says nothing about the modern business landscape with for instance BYOD.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

A Wake-Up Call To Fight Government Surveillance

A Wake-Up Call To Fight Government Surveillance | Privacy Protection | Scoop.it
Look around any crowded place nowadays and it’s quite clear that many of us have literally become prisoners of our own devices: smartphones, tablets,..
Apptimate's insight:

Data is data disregarding if it's online or not and should be protected from corporate or government misuse. Why are law makers always so late in their understanding and action taking?

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

ISIS members have developed a mobile app for its communications — Medium

ISIS members have developed a mobile app for its communications — Medium | Privacy Protection | Scoop.it
Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure…
Apptimate's insight:

The market drive to make app development simple, makes it possible for anyone to develop their own app. Including terrorist organisations. So, the idea of preventing commercial apps from using encryption will not prevent any unwanted communication. Then you must also ban app development. Or mobile phones.


The encryption tech is also needed to protect ordinary people, corporations as well as governments. It is a crucial tool for normal police investigative work with informers and infiltration which happens to be the only tactic that really works. That's why the US government has supported the development of TOR. They need secure channels for their field agents to communicate without being too obvious, a way to hide the old crypto machine in plain sight.


Mass surveillance cannot compete with old fashion police work.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

This Hidden Facebook Page Has All Sorts Of Weird Info On You

This Hidden Facebook Page Has All Sorts Of Weird Info On You | Privacy Protection | Scoop.it
This is how they come up with those bizarre ads you see. 
Apptimate's insight:

Wonder what Facebook knows about you? Here is a hint.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Why citizens need encryption as a fundamental human right - TechRepublic

Why citizens need encryption as a fundamental human right - TechRepublic | Privacy Protection | Scoop.it
Some government agencies use terrorist attacks to justify limiting encryption. TechRepublic spoke with two UN reporters who explained why encryption is critically important for all citizens.
Apptimate's insight:

Like any tool encryption can be misused for bad things. But, encryption is essential for protecting people from criminals stealing assets, your identity and your privacy. Also democracy is built upon the freedom of speech and freedom of thinking. Even if you have thoughts that are negative for the society.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Edward Snowden Divulges the 5 Easiest Ways to Protect Yourself Online | Big Think

Edward Snowden Divulges the 5 Easiest Ways to Protect Yourself Online | Big Think | Privacy Protection | Scoop.it
Edward Snowden lists services that will protect your privacy with just a few downloads.
Apptimate's insight:

Snowden makes his recommendations. You don't have to use the same apps but you should consider using the same type of apps. The positive side effect is that you do not only protect your privacy, you also protect yourself from hackers, cyber criminals, identity theft, etc.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

While US and UK governments oppose encryption, Germany promotes it. Why? | ZDNet

While US and UK governments oppose encryption, Germany promotes it. Why? | ZDNet | Privacy Protection | Scoop.it
Germany wants to become global encryption leader -- but the reasons for its stance are complex.
Apptimate's insight:

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” — Edward Snowden


Privacy is a fundamental cornerstone of free speech, and thus a fundamental cornerstone of democracy. 

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Facebook Will Now Alert You If A Country Is Trying To Hack You

Facebook Will Now Alert You If A Country Is Trying To Hack You | Privacy Protection | Scoop.it
If you see this notification, it might be time to buy a new computer.
Apptimate's insight:

Facebook want to protect your data with a new security notification. Good work Facebook! But it's not only about protecting your data. They are actually protecting their data. By keeping your account clean and accurate, they know that the data is accurate for their own monetization. 


Anyway, it is still a step in the right direction. And remember to turn on their two-factor authentication.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Think you're not being tracked? Now websites turn to audio fingerprinting to follow you | ZDNet

Think you're not being tracked? Now websites turn to audio fingerprinting to follow you | ZDNet | Privacy Protection | Scoop.it
Online trackers add audio fingerprinting to their arsenal of tools to identify and follow people on the web.
Apptimate's insight:

User tracking for advertising gets more and more intrusive. The technology can seem harmless enough but it can also be used as a very potent surveillance technology.

 

And advertisers wonder why people use ad blockers?

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Businesses and consumers increasingly concerned about data privacy: Deloitte | ZDNet

Businesses and consumers increasingly concerned about data privacy: Deloitte | ZDNet | Privacy Protection | Scoop.it
The latest survey from Deloitte has revealed businesses that respect the privacy of its customers are more likely to be trusted.
Apptimate's insight:

Caring for your customers include caring about their data and privacy. Businesses that respect the privacy of its customers are more likely to be trusted, and who wants to do business with someone they don't trust?

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Snowden: FBI Claim That Only Apple Can Unlock Phone Is “Bullshit”

Snowden: FBI Claim That Only Apple Can Unlock Phone Is “Bullshit” | Privacy Protection | Scoop.it
The NSA whistleblower expressed strong doubts about the FBI's insistence that Apple has the exclusive technical means to unlock a terrorist's iPhone.
Apptimate's insight:

This case seems more be about politics than about abilities. Should a corporation be able to refuse the whims of government agencies?

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

5 Reasons Why Encryption Won't Be Enough to Protect Your Data

5 Reasons Why Encryption Won't Be Enough to Protect Your Data | Privacy Protection | Scoop.it
If you want to protect your data, privacy, and communications from corporations, government snoops, or hackers, end-to-end encryption is a great way to start. It's the type of encryption Apple and Google added to their mobile devices and smartphones...
Apptimate's insight:

Products subsidized by harvesting your data will prevail. You will have to pay the full prize for a product or service if you want to be protected and private. There is no such thing as a free service or lunch.

more...
Rêve's curator insight, March 21, 10:05 AM

Products subsidized by harvesting your data will prevail. You will have to pay the full prize for a product or service if you want to be protected and private. There is no such thing as a free service or lunch.

Scooped by Apptimate
Scoop.it!

Google's creepy plan to kill the password

Google's creepy plan to kill the password | Privacy Protection | Scoop.it
In the grab bag of Google/Alphabet's big projects for 2016 is Project Abacus. It's basically the company's plot to kill the password in cold blood, by replacing...
Apptimate's insight:

Strong authentication is much needed and good, but harvesting all your personal data is bad. You can create the most sophisticated AI based entry system, but it will still be of no use when the communication and central servers and clouds are still open holes for exploitation.


Google will now have an even better profile of you that they will sell to the highest bidder.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Apple, Google, Microsoft attack government hacking plans | ZDNet

Apple, Google, Microsoft attack government hacking plans | ZDNet | Privacy Protection | Scoop.it
Tech industry hits back at plans to create legal framework for hacking by spies, military and police.
Apptimate's insight:

A backdoor for one agency means a backdoor for any agency, country or cyber criminal. It also means that communication will become point-2-point encrypted and secure with backend offered by more insightful states that care about privacy, like the Netherlands for instance. We will see a huge shift in competitive power from US and to safe havens. Of course US tech CEOs are worried.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

These cloud-connected devices are totally spying on you (or just letting others do it) - TechRepublic

These cloud-connected devices are totally spying on you (or just letting others do it) - TechRepublic | Privacy Protection | Scoop.it
Data-rustling appliances can tell their makers all about you. And they are.
Apptimate's insight:

The first generation of connected appliances, toys and devices are moving in to your home, and they are, from a security and privacy protection point of view, real crap!


In fact, you are unknowingly bugging your own home, inviting hackers, burglars, perverts and governments (your own and all others) for dinner.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

5 Companies Secretly Tracking You Right Now - Dark5 - YouTube

The greatest mysteries of this world and beyond... a curated repository of knowledge featuring the darkest, strangest, weirdest, and most amazing of science,...
Apptimate's insight:

Is your TV or smartphone spying on you right now? There may be no escape... even when you're offline. Dark5 presents 5 corporations that may be secretly tracking you and mining your personal data for profit.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

The Birth And Death Of Privacy: 3,000 Years of History Told Through 46 Images — The Ferenstein Wire — Medium

The Birth And Death Of Privacy: 3,000 Years of History Told Through 46 Images - The Ferenstein Wire - Medium
2-Minute Summary ¶

Privacy, as we understand it, is only about 150 years old.
Apptimate's insight:

Privacy is something we take for granted today, as a cornerstone of democracy. But as with true democracy it is a fairly new concept. 

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

The End of the Internet Dream? — Backchannel — Medium

The End of the Internet Dream? - Backchannel - Medium
Blackhat’s keynote speaker says it’s up to us to make sure the Net is our liberator, not our oppressor
Apptimate's insight:

Will Internet be centralized and controlled by corporations and governments, resembling state controlled TV? Or will it be freely accessible to grow global democracy and freedom? Will it be a closed system or something in between?


A most important speech. If you think it's too long to read, there is also a video of it: https://www.youtube.com/watch?v=Tjvw5fz_GuA.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC

Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC | Privacy Protection | Scoop.it
Privacy advocates warn feds about surreptitious cross-device tracking.
Apptimate's insight:

Ad companies gets sneakier by the day in the ways they try to harvest your data for their targeted ads business. One can just speculate who else use this kind of technology, since much is derived from the latest malware and hacking developments.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Apple removes apps that collected users' private data

Apple removes apps that collected users' private data | Privacy Protection | Scoop.it
Apple has pulled several apps from its store, following security researchers' findings that hundreds of iOS apps have been accessing users' private data.
Apptimate's insight:

Apple shows that they are taking privacy seriously by cracking down on apps developed using a shady 3rd party SDK.


This again proves the point that developers must be more on top of security and privacy issues. Even if you are a small independent developer. And it's for this type of developer we developed apptimate.io.

more...
No comment yet.