background preloader

I'm Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web - Alexis C. Madrigal

I'm Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web - Alexis C. Madrigal
Who are these companies and what do they want from me? A voyage into the invisible business that funds the web. This morning, if you opened your browser and went to, an amazing thing happened in the milliseconds between your click and when the news about North Korea and James Murdoch appeared on your screen. Data from this single visit was sent to 10 different companies, including Microsoft and Google subsidiaries, a gaggle of traffic-logging sites, and other, smaller ad firms. There's nothing necessarily sinister about this subterranean data exchange: this is, after all, the advertising ecosystem that supports free online content. Even if you're generally familiar with the idea of data collection for targeted advertising, the number and variety of these data collectors will probably astonish you. And that's just the As. To be clear, these companies gather data without attaching it to your name; they use that data to show you ads you're statistically more likely to click. Related:  ControlBIG BROTHER & Co. are WATCHING us....

Snowden Uncovers Shocking Truth Behind Chemtrails Share This Article With Others Edward Snowden, the hacker who gained access to every secret corner of the Internet during his tenure at the NSA, has come forward with details of a classified project to alter the world’s climate. The shocking truth, as he says, is that chemtrails are part of a benevolent program aimed at countering global warming. By cooperating in secret with jet fuel manufacturers, government agents have carefully kept the massive chemtrail efforts completely under wraps. Snowden added, “I am only revealing this program because there is no oversight in the scientific community, no public discussion, and little concern for the side-effects which are well known only to a few privileged people interested in continuing the decades-long chemtrail program in secret.” According to Snowden, chemtrails are the only thing keeping the US from global warming incineration, but at what price? Source: Eddie (1897 Posts) Eddie L. is the founder and owner of WorldTruth.TV.

One Per Cent: Anonymous members tricked into giving up bank details Jacob Aron, technology reporter (Image: Isopix/Rex Features) Members of Anonymous regularly band together to take down websites owned by those they don't like, but security firm Symantec reports that a recent attack could actually have backfired, putting amateur hacktavists' bank accounts at risk. Anonymous uses tools such as the Low Orbit Ion Cannon or Slowloris to perform distributed denial-of-service (DDoS) attacks against its targets, with sympathetic Anons downloading the software to become part of a voluntary botnet. In January the group decided to hit the websites of the US Department of Justice and various media companies in response to the takedown of file storage site Megaupload, providing a guide on Pastebin for those who wished to take part in the attacks. Computers infected with the malware still took part in the Anonymous DDoS attacks, but were also secretly sending online bank account and webmail logins back to the attacker.

Consumers Are Ready To Manage Their Own Data - Fatemeh Khatibloo by Fatemeh Khatibloo | 9:09 AM October 6, 2011 Facebook’s rollout of its new Timeline interface made plenty of waves both in the media and across the Facebook user base. But I’m most fascinated by how Timeline plugs in to Facebook Connect to create a new class of empowered consumers who are willing to share their personal data with marketers in exchange for convenience, a personalized experience, and value. Imagine this: I’m in the market for a new car, and I know a friend recently purchased a Subaru she’s enamored of. Now I’m ready to make a purchase, and I’ve shared my interest with a couple of different dealerships. Soon, a number of relevant offers come in, and I make my decision. We’re closer to this reality than most people imagine. Operationally, PIDM is comprised of two components: personal data lockers (PDLs) and authorization managers (AMs). Strategically, businesses will need to embrace five key concepts if they want to engage with consumers in a meaningful way.

Brazil looks to break from US-centric Internet (Update 2) Brazil plans to divorce itself from the U.S.-centric Internet over Washington's widespread online spying, a move that many experts fear will be a potentially dangerous first step toward fracturing a global network built with minimal interference by governments. President Dilma Rousseff ordered a series of measures aimed at greater Brazilian online independence and security following revelations that the U.S. The leader is so angered by the espionage that on Tuesday she postponed next month's scheduled trip to Washington, where she was to be honored with a state dinner. Internet security and policy experts say the Brazilian government's reaction to information leaked by former NSA contractor Edward Snowden is understandable, but warn it could set the Internet on a course of Balkanization. While Brazil isn't proposing to bar its citizens from U.S. Rousseff says she intends to push for international rules on privacy and security in hardware and software during the U.N.

Introduction and overview of responses Introduction and overview of responses A high-impact cover story in Wired magazine in 2010 asserted in its title: “The Web Is Dead. Long Live the Internet.” Anderson and Wolff stated their case this way: As much as we love the open, unfettered Web, we’re abandoning it for simpler, sleeker services that just work ….This is not a trivial distinction. Because the screens are smaller, such mobile traffic tends to be driven by specialty software, mostly apps, designed for a single purpose. This was all inevitable. The wide-open Web of peer production, the so-called generative Web where everyone is free to create what they want, continues to thrive, driven by the nonmonetary incentives of expression, attention, reputation, and the like. They clearly forecast the rise of the mobile Web, but the debate they launched with the apps vs. The trends are quite clear. According to estimates by Cisco, by 2016 there will be 10 billion mobile Internet devices in use globally. The case for the Web

Walnuts Are Drugs, Says FDA Diamond’s transgression was to make “financial investments to educate the public and supply them with walnuts,” as William Faloon of Life Extension magazine put it. On its website and packaging, the company stated that the omega-3 fatty acids found in walnuts have been shown to have certain health benefits, including reduced risk of heart disease and some types of cancer. These claims, Faloon notes, are well supported by scientific research: “Life Extension has published 57 articles that describe the health benefits of walnuts”; and “The US National Library of Medicine database contains no fewer than 35 peer-reviewed published papers supporting a claim that ingesting walnuts improves vascular health and may reduce heart attack risk.” This evidence was apparently not good enough for the FDA, which told Diamond that its walnuts were “misbranded” because the “product bears health claims that are not authorized by the FDA.” Faloon thinks he knows why this is the case.

Think Again: Cyberwar -- By Thomas Rid "Cyberwar Is Already Upon Us." No way. "Cyberwar is coming!" John Arquilla and David Ronfeldt predicted in a celebrated Rand paper back in 1993. Since then, it seems to have arrived -- at least by the account of the U.S. military establishment, which is busy competing over who should get what share of the fight. Cyberspace is "a domain in which the Air Force flies and fights," Air Force Secretary Michael Wynne claimed in 2006. Time for a reality check: Cyberwar is still more hype than hazard. Take the dubious story of a Soviet pipeline explosion back in 1982, much cited by cyberwar's true believers as the most destructive cyberattack ever. But did it really happen? Most other commonly cited cases of cyberwar are even less remarkable. Despite his analogies, the attack was no act of war. Indeed, there is no known cyberattack that has caused the loss of human life. Illustration by Francesco Bongiorni for FP "A Digital Pearl Harbor Is Only a Matter of Time." Keep waiting. Just the opposite.

High-Tech : Google paie les internautes pour scruter leur vie privée Le géant de l'Internet propose de rémunérer ses utilisateurs en échange d'un accès complet aux sites qu'ils visitent. Google vient de présenter son programme Screenwise, qui permet de suivre à la trace les internautes en échange d'une rémunération pouvant monter «jusqu'à 25 dollars en cartes cadeau». Tous les utilisateurs américains du navigateur Chrome de plus de 13 ans, disposant déjà d'un compte Google, peuvent s'inscrire à ce programme qui, selon l'entreprise, l'aidera à «améliorer ses produits et services et à créer une meilleure expérience en ligne pour tout le monde». Concrètement, après l'inscription, les utilisateurs devront installer une extension sur leur navigateur. Parallèlement à cette extension espionne, Google propose à ses utilisateurs, dans le cadre d'un partenariat avec l'institut Knowledge Networks, d'installer à leur domicile un routeur Cisco permettant d'analyser les données web du foyer et de les communiquer à des tiers.

Brazilian president Rousseff: US surveillance a 'breach of international law' | World news Brazil's president, Dilma Rousseff, has launched a blistering attack on US espionage at the UN general assembly, accusing the NSA of violating international law by its indiscriminate collection of personal information of Brazilian citizens and economic espionage targeted on the country's strategic industries. Rousseff's angry speech was a direct challenge to President Barack Obama, who was waiting in the wings to deliver his own address to the UN general assembly, and represented the most serious diplomatic fallout to date from the revelations by former NSA contractor Edward Snowden. Rousseff had already put off a planned visit to Washington in protest at US spying, after NSA documents leaked by Snowden revealed that the US electronic eavesdropping agency had monitored the Brazilian president's phone calls, as well as Brazilian embassies and spied on the state oil corporation, Petrobras. "Personal data of citizens was intercepted indiscriminately.

quoi ressemble l’internet en 2012 Voilà 20 ans que le web existe. Conçu par Tim Berners-Lee à la fin des années 80, les premiers sites web sont apparus en 1992. Vingt ans plus tard, Internet est devenu l’un des canaux de communication les plus utilisé, et très certainement le média de référence du XXIème siècle. Je pars du principe que vous avez tous une bonne connaissance du web et de ce que l’on peut en faire, par contre avez-vous à votre disposition des données chiffrées récentes ? C’est justement ce que je me propose de faire avec cette compilation de nombreuses études statistiques et sociologiques publiées en fin d’année. La France compte près de 49 millions d’internautes, soit 75% de sa population. Concernant les sites web en eux-mêmes, la société Email-Brokers dans son baromètre de l’Internet comptabilisait plus de 2,6 millions de sites dont la majorité sont à caractère professionnel (ils ne comptent donc pas dedans les blogs). L’étude nous fournit d’autres chiffres :

The Conspiracy Theory Is True: Agents Infiltrate Websites Intending To "Manipulate, Deceive, And Destroy Reputations" Republished from By Tyler Durden In the annals of internet conspiracy theories, none is more pervasive than the one speculating paid government plants infiltrate websites, social network sites, and comment sections with an intent to sow discord, troll, and generally manipulate, deceive and destroy reputations. Guess what: it was all true. And this time we have a pretty slideshow of formerly confidential data prepared by the UK NSA equivalent, the GCHQ, to confirm it, and Edward Snowden to thank for disclosing it. Greenwald's latest revelation focuses on GCHQ’s previously secret unit, the JTRIG (Joint Threat Research Intelligence Group). Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. The Art of Deception