Bookmark
Writer Evan Ratliff Tried to Vanish: Here’s What Happened | Vanish | Wired.com
www.wired.com/vanish/2009/11/ff_vanish2/1/, posted 2009 by peter in privacy toread
It’s one thing to report on the phenomenon of people disappearing. But to really understand it, I figured that I had to try it myself. So I decided to vanish. I would leave behind my loved ones, my home, and my name. I wasn’t going off the grid, dropping out to live in a cabin. Rather, I would actually try to drop my life and pick up another.
Bookmark
Facebook: Mafia Wars CEO Brags About Scamming Users From Day One
consumerist.com/5400720/mafia-wars-ceo-brags-about-scamming-users-from-day-one, posted 2009 by peter in business privacy scam social video
In games like Mafia Wars, Farmville, YoVille and Vampires Live, you know, some of the major sources of all those garbage announcements cluttering up your Facebook, players compete to complete missions and level up. By leveling up, you can complete more difficult missions and fight off weaker opponents. You can wait for your various energies to regenerate naturally over time, or you can purchase with real money in-game boosts. Or, you can complete various lead generation offers, many of which are of the "answer page after page of questions and opt in and out of receiving various kinds of spam" variety. Some of them install malware and adware that is impossible to remove. And some of them secretly subscribe you to monthly recurring $9.99 credit card charges.
Bookmark
Andrew Patrick » Identity theft is usually an equal opportunity, unsophisticated crime
www.andrewpatrick.ca/security-and-privacy/id-theft-criminals, posted 2009 by peter in privacy security toread
ID theft is often considered a “white-collar” crime because it is committed during the course of normal employment duties (e.g., a bank employee gathering personal information), or the crime does not usually involve any physical harm. Identity thieves are often portrayed as sophisticated computer specialists, hackers, or organized networks. But, is this the reality?
A recent research report by Heith Copes (U Alabama at Birmingham) and Lynne Vieraitis (U Texas at Austin) has shed some light on this issue.
Bookmark
"Anonymized" data really isn't—and here's why not - Ars Technica
arstechnica.com/tech-policy/news/2009/09/your-secrets-live-online-in-databases-of-ruin.ars, posted 2009 by peter in privacy recovery security
Companies continue to store and sometimes release vast databases of "anonymized" information about users. But, as Netflix, AOL, and the State of Massachusetts have learned, "anonymized" data can often be cracked in surprising ways, revealing the hidden secrets each of us are assembling in online "databases of ruin."
Bookmark
philosecurity » Blog Archive » What Does DHS Know About You?
philosecurity.org/2009/09/07/what-does-dhs-know-about-you, posted 2009 by peter in fascism privacy terrorism travel usa
Here’s a real copy of an American citizen’s DHS Travel Record retrieved from the U.S. Customs and Border Patrol’s Automated Targeting System (ATS). This was obtained through a FOIA/Privacy Act request and sent in by an anonymous reader (thanks!)
The document reveals that the DHS is storing the reader’s:
* Credit card number and expiration (really) * IP address used to make web travel reservations * Hotel information and itinerary * Full Name, birth date and passport number * Full airline itinerary, including flight numbers and seat numbers * Cruise ship itinerary * Phone numbers, incl. business, home & cell * Every frequent flyer and hotel number associated with the subject, even ones not used for the specific reservation
Bookmark
Services' E-Mail Hacking Illegal, but Officials Need More Than That to Prosecute - washingtonpost.com
www.washingtonpost.com/wp-dyn/content/article/2009/09/06/AR2009090602238.html, posted 2009 by peter in business cloudcomputing communication email messaging privacy security
But such services as YourHackerz.com are still active and plentiful, with clever names like "piratecrackers.com" and "hackmail.net." They boast of having little trouble hacking into such Web-based e-mail systems as AOL, Yahoo, Gmail, Facebook and Hotmail, and they advertise openly.
Bookmark
Blog of Rights: Official Blog of the American Civil Liberties Union » Quiz: What Do Facebook Quizzes Know About You?
blog.aclu.org/2009/06/11/quiz-what-do-facebook-quizzes-know-about-you/, posted 2009 by peter in community privacy security social
By default, Facebook’s privacy settings let applications access information on your profile even if you have restricted access to a specific network or friend group (as application privacy settings are separate from profile privacy settings). In addition, Facebook’s default settings allow applications run by your friends to pull information from your profile. Surprised? Check out your settings and see for yourself!
Bookmark
Offhand but on record | The Japan Times Online
search.japantimes.co.jp/cgi-bin/nc20090819a1.html, posted 2009 by peter in opinion privacy security
The lesson in all of this is that little we do is ephemeral anymore. We leave electronic audit trails everywhere we go, with everything we do. This won't change: We can't turn back technology. But as technology makes our conversations less ephemeral, we need laws to step in and safeguard our privacy. We need comprehensive data privacy laws, protecting our data and communications regardless of where it is stored or how it is processed. We need laws forcing companies to keep it private and delete it as soon as it is no longer needed, and laws giving us the right to delete our data from third-party sites. And we need international cooperation to ensure that companies cannot flaunt data privacy laws simply by moving themselves offshore.
Bookmark
Facebook privacy: a guide - Ars Technica
arstechnica.com/web/news/2009/08/meshing-social-networking-and-privacy-on-facebook.ars, posted 2009 by peter in howto privacy social
Facebook has decent privacy controls, but most users don't realize how to take full advantage of them. Ars guides you through Facebook's privacy settings so that you can be both social and respectable at the same time.
Bookmark
Facebook can use your pictures for ads, no permission required : Opinion L.A. : Los Angeles Times
opinion.latimes.com/opinionla/2009/07/facebook-can-use-your-pictures-for-ads-no-permission-required.html, posted 2009 by peter in advertising business copyright msm privacy
On its face, Facebook's actions seem like a classic case of misappropriation, or the intentional, illegal use of the property of someone else for one's own use or some other unauthorized purpose. Facebook admits in its terms of service that all Intellectual Property content, like photos and videos, belong to you, the user. But the fine print essentially allows Facebook to do what its pleases with such content, with some limitations.
|< First < Previous 101–110 (151) Next > Last >|