background preloader

Facebook's Zuckerberg Says The Age of Privacy is Over

Facebook's Zuckerberg Says The Age of Privacy is Over
Facebook founder Mark Zuckerberg told a live audience yesterday that if he were to create Facebook again today, user information would by default be public, not private as it was for years until the company changed dramatically in December. In a six-minute interview on stage with TechCrunch founder Michael Arrington, Zuckerberg spent 60 seconds talking about Facebook's privacy policies. His statements were of major importance for the world's largest social network - and his arguments in favor of an about-face on privacy deserve close scrutiny. Zuckerberg offered roughly 8 sentences in response to Arrington's question about where privacy was going on Facebook and around the web. See also: Why Facebook is Wrong: Privacy is Still Important Zuckerberg: "When I got started in my dorm room at Harvard, the question a lot of people asked was 'why would I want to put any information on the Internet at all? That's Not a Believable Explanation Perhaps the new privacy controls will prove sufficient. Related:  Privacy

TSA Groping Out Of Control Everything you need to know about the security takeover and why airport oppression is already being rolled out on the streets Paul Joseph Watson & Alex JonesPrison Planet.com Monday, November 8, 2010 TSA abuse in airports is completely out of control with more and more cases of security workers groping women, fondling children, abusing naked body scanners, and interrogating passengers emerging every week, and yet the government’s answer to the epidemic of oppression is to hand TSA thugs more power with which to harass American citizens. The story of Infowars employee Michelle, who along with her child was sexually assaulted by TSA staff after refusing to go through a naked body scanner, has gone viral on the Internet after it was picked up by the Drudge Report, a website leading the charge in the backlash against airport oppression at the hands of the TSA that has now led to the world’s largest pilot’s association boycotting the use of naked body scanners. A d v e r t i s e m e n t BUSTED!

Classroom 2.0 One Hundred Naked Citizens: One Hundred Leaked Body Scans Odysen, Hassle Free Collaboration ACLU of Northern California : Don't Hide Your Gun in Your iPhone(?!) In a case with chilling privacy implications, the California Supreme Court recently held that police officers can search the entire contents of a cell phone whenever they arrest someone, no matter how small the suspected crime or how relevant the cell phone contents might be. Why? Because it's just like a backpack, according to the Court, and previous cases have stated that backpacks can be searched "incident to arrest" without a warrant. The problem, of course, is that cell phones and backpacks are very different. For one thing, it's awfully hard to hide a weapon in a cell phone! It's also awfully easy to keep someone from destroying evidence on a cell phone -- just confiscate it and turn it off until you get a warrant to actually search it. But the "big" difference is in size. As technology advances, privacy must not be left behind. It's too bad the California Supreme Court forgot that—so please join us and help remind them!

petewarden/iPhoneTracker @ GitHub This open-source application maps the information that your iPhone is recording about your movements. It doesn't record anything itself, it only displays files that are already hidden on your computer. Download the application Read the FAQ Authors Alasdair Allan (alasdair@babilim.co.uk) @aallan on Twitter Pete Warden (pete@petewarden.com) @petewarden on Twitter This application relies on map tiles from the volunteer-run OpenStreetMap project, so please consider supporting their great work. Download Source You can download this project in either zip or tar formats. You can also clone the project with Git by running: $ git clone Is there a Windows version? Is there a Windows version? The file exists on PCs too, but we haven't written a version of the application that runs on Windows ourselves. How does the application work? How can I examine the data without running the application? ~/Downloads/iphonels.py | grep "consolidated" No. It’s unclear.

Interviews - Mark Klein | Spying On The Home Front | FRONTLINE What did you do for AT&T? How long did you work there? I worked at AT&T for 22 and a half years. My job was basically to keep the systems going. They were computer systems, network communication systems, Internet equipment, Voice over Internet [Protocol (VoIP)] equipment. So you handled the hottest high-tech stuff that AT&T had. That's right. What goes on inside the building on Folsom Street [in San Francisco]? While I was there we worked on three floors which belonged to AT&T. So this is an operations center. Well, this is an important hub for the Bay Area in terms of if you're talking about Internet. And then of course there's also the traditional phone switch, which is doing what it's been doing since before the Internet. Handling millions of calls. ... Handling millions and millions of phone calls, right. So this is a big hub. It's a big hub, yes. Take me back to the summer of 2002. ... Don Henry? Sometime later, maybe a few weeks -- I don't remember exactly -- he did show up. Yes. ... No.

Aurora critics can remain anonymous, judge rules In a decision with broader implications for online privacy, a judge has ruled not to force the identification of anonymous bloggers who wrote critical web posts about former Aurora mayor Phyllis Morris. The Ontario Superior Court ruling, which Ms. Morris intends to appeal, is a major blow to her $6-million defamation action, which targets three individuals who authored anonymous posts on the Aurora Citizen website, along with the site's moderators. In her decision, Judge Carole Brown weighed Ms. Morris's allegations against the fundamental right to freedom of speech and found the former mayor's case wanting. "The public interest favouring disclosure [of the bloggers' names] clearly does not outweigh the legitimate interests in freedom of expression and the right to privacy of the persons sought to be identified," Judge Brown wrote, noting the three anonymous defendants, who chose to make comments on the site using pseudonyms, had "a reasonable expectation of anonymity." Ms. Ms.

House panel approves broadened ISP snooping bill | Privacy Inc. Internet providers would be forced to keep logs of their customers' activities for one year--in case police want to review them in the future--under legislation that a U.S. House of Representatives committee approved today. The 19 to 10 vote represents a victory for conservative Republicans, who made data retention their first major technology initiative after last fall's elections, and the Justice Department officials who have quietly lobbied for the sweeping new requirements, a development first reported by CNET. A last-minute rewrite of the bill expands the information that commercial Internet providers are required to store to include customers' names, addresses, phone numbers, credit card numbers, bank account numbers, and temporarily-assigned IP addresses, some committee members suggested. It represents "a data bank of every digital act by every American" that would "let us find out where every single American visited Web sites," said Rep. "The bill is mislabeled," said Rep. Rep.

The Legislation That Could Kill Internet Privacy for Good - Conor Friedersdorf - Politics An overzealous bill that claims to be about stopping child pornography turns every Web user into a person to monitor Every right-thinking person abhors child pornography. To combat it, legislators have brought through committee a poorly conceived, over-broad Congressional bill, The Protecting Children from Internet Pornographers Act of 2011. It is arguably the biggest threat to civil liberties now under consideration in the United States. The potential victims: everyone who uses the Internet. The good news? The bad news: it already made it through committee. In the early 20th Century, a different moral panic gripped the United States: a rural nation was rapidly moving to anonymous cities, sexual mores were changing, and Americans became convinced that an epidemic of white female slavery was sweeping the land. That name is what brought the anecdote back to me. I kid you not -- that's it. Among those risks: blackmail. You'd thing that Rep. But they haven't.

Microsoft Patents 'Legal Intercept' Technology, Will Skype Have A Backdoor? — TheTelecomBlog.com Microsoft and Skype may represent a match made in mobile heaven but they’ve been in the news for all the wrong reasons of late. Skype outages have become a norm rather than an exception. Skype protocol has been cracked through reverse engineering and published as an open source project. And now a newly patented Microsoft technology called ‘Legal Intercept‘ that would allow the company to secretly intercept, monitor and record Skype calls is stoking privacy concerns. The technology would allow Microsoft to silently record communications on VoIP networks such as Skype. Though the patent was filed well before Microsoft’s acquisition of Skype, it mentions Skype explicitly as an example application for this technology. Clearly, the implications of the technology would be severe, especially in the enterprise world. Microsoft says that ‘Legal Intercept’ can be used by the US government or “one of its agencies”. Did you like this post?

Court Says Warrantless Mobile Phone Tracking Is Unconstitutional In an amazingly short and to the point ruling (embedded below), a judge in a district court in Southern Texas, Lynn Hughes, ruled that letting the government get mobile phone data without a warrant was unconstitutional: When the government requests records from cellular services, data disclosing the location of the telephone at the time of particular calls may be acquired only by a warrant issued on probable cause. U.S. Of course, there are a number of cases out there that have ruled on similar issues... and come to different conclusions.

Related: