ramonsang

95 Flips | 2 Magazines | 3 Likes | 2 Following | 20 Followers | @ramonsang | Keep up with ramonsang on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “ramonsang”

The Algorithm and the Watchtower

<i>The form of power that Big Data employs is not so much panoptic as it is pan-analytic.</i>At this very moment, the phone, tablet, or computer on which …

Surveillance

Framing the “Big Data Industry”

For all its hype, discussions about Big Data often still devolve into debates about buzzwords and concepts like business intelligence, data …

Framing

Don’t Panic Over The Rise In Personal Data Theft

Ben Dickson Contributor<p>Ben Dickson is a software engineer and the founder of TechTalks.<p>More posts by this contributor:<p>Unlocking the potential of eye tracking technology<br>• Can you trust crypto-token crowdfunding?<p>As internet and mobile services continue to rise in power and prominence in our personal …

Artist Trevor Paglen Talks to Jameel Jaffer About the Aesthetics of NSA Surveillance

<i>On Friday, a federal court in Alexandria, Virginia, will hear argument in Wikimedia v. NSA, a challenge to the lawfulness of “upstream” surveillance</i> …

Surveillance

From Radio to Porn, British Spies Track Web Users’ Online Identities

THERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the internet.”<p>Before …

What Happens Next Will Amaze You

Idle Words > Talks > What Happens Next Will Amaze You<p>This is the text version of a talk I gave on September 14, 2015, at the FREMTIDENS INTERNET …

Darkode

It would seem that hackers today can do just about anything they want - from turning on the cellphone in your pocket to holding your life's work …

Black Hat

Shopping for Privacy on the Internet

J. CONS. AFFAIRS, Vol. 41, pp. 351-65, 2007<p>13 Pages Posted: 9 Sep 2011 Last revised: 11 Mar 2014<p>Indiana University Robert H. McKinney School of …

How cookies can be used for global surveillance

Today we present an updated version of our paper [0] examining how the ubiquitous use of online tracking cookies can allow an adversary conducting …

Art that shows us what mass surveillance actually looks like

When you walk into the Metro Pictures gallery in New York's Chelsea, your eyes will immediately get tangled up in blue. Hanging on the wall is a …

Forbes Welcome

Miles Davis

Judge, jury and executioner: the unaccountable algorithm – Frank Pasquale

In a recent podcast series called <i>Instaserfs</i>, a former Uber driver named Mansour gave a chilling description of the new, computer-mediated workplace. …

Big Data

With Virtual Machines, Getting Hacked Doesn’t Have to Be That Bad

ALL MAJOR CONSUMER operating systems, including Windows, Mac OS X, and Linux, are way too easy to hack. One mishap — opening the wrong email …

Linux

The most popular paid iPhone app right now is an ad blocker

<i>This post has been updated.</i><p>Apple’s iOS 9 update, which launched yesterday (Sept. 16), allows users to block ads, trackers, and other content in its mobile Safari web browser for the first time. An initial crop of ad-blocking apps is already proving to be popular.<p>Ad blockers are currently the no. 1, …

Apps

The Facebook of the Future Has Privacy Implications Today

It’s well established that joining a social network means trading privacy for information. Your Facebook friends, for example, get to see that …

Home | Web We Want

FALSE POSITIVE by Mark Shepard, Moritz Stefaner

It is not just the trust we place in network infrastructure but also our willingness to trade bits of personal data for access to online services …

REVISION: Information Privacy Law Scholars' Brief in Spokeo, Inc. v. Robins

This brief, submitted to the Supreme Court of the United States by 15 information privacy law scholars in the case of Spokeo, Inc. v. Robins (No …

Privacy

Draft online platforms consultation tackles transparency, open access to data

Ready to go Pro?<p>POLITICO Pro provides the most distinct coverage of Brussels and beyond, and thousands of politics and policy professionals depend on …

Marioneta, una nueva herramienta contra la censura en internet

Un equipo de investigadores ha desarrollado una herramienta para evitar la censura y el control de la información que muchos gobiernos mantienen en …

Privacy Concerns Raised Over Kids’ Apps And Websites

Given the sophisticated tracking technologies embedded into so many digital products and services as a matter of course, it should come as no surprise that a global privacy audit of children’s websites and apps has highlighted big concerns about the collection and use of kids’ data. That doesn’t …

'Stingray' Phone Tracker Fuels Constitutional Clash

For more than a year, federal authorities pursued a man they called simply "the Hacker." Only after using a little known cellphone-tracking device—a stingray—were they able to zero in on a California home and make the arrest.<p>Stingrays are designed to locate a mobile phone even when it's not being …

Surveillance

Defensa personal del correo electrónico: una guía para la lucha contra la vigilancia con el cifrado GnuPG

Ahora intercambiarás mensajes de prueba con un programa informático llamado Edward que sabe cómo usar el cifrado. Salvo que se indique otra cosa, son …

FSC Home - Free and Safe in Cyberspace

MISSION Since its first Edition in 2015, the Free and Safe in CyberSpace event series – with editions in Brussles, New York and Brazil, and the …

What happens when policy is made by corporations? Your privacy is seen as a barrier to economic growth

The latest trade deal to be passed by the EU will see us sacrifice our commitment to data protection<p>With all eyes on Greece, the European parliament has quietly passed a non-binding resolution on the Transatlantic Trade and Investment Partnership (TTIP), the controversial trade liberalisation …

Economics

Ashley Madison: Two women explain how hack changed their lives

<b>When infidelity dating site Ashley Madison was hacked, the details of 33 million user accounts were published on the web.</b><p>The BBC has spoken to two women, one whose fiance used the site and one who used it herself.<p>Neither wanted to be identified, but their stories give some hint of just how dramatic …

Relationships

Spotify pide disculpas por sus cambios en la política de privacidad

Los cambios en sus normas soliviantaron a la comunidad<p>¿Para qué querría una aplicación de música acceder a las fotos y los contactos de sus usuarios? …

"Qué risa lo de Ashley Madison, es cosa de señores de mediana edad infieles, que se jodan por hipócritas" http://t.co/7FIRUk6vv6