An Illinois bill that sought to empower average people to file lawsuits against tech companies for recording them without their knowledge via microphone-enabled devices was defanged this week after lobbying from trade associations representing Silicon Valley giants.
eBay is training its artificial intelligence using photos harvested from a social network popular among teenage girls for sharing photographs of their outfits without their knowledge or consent. The online marketplace uses pictures uploaded by unsuspecting users of Chictopia, a popular “style” sharing website headquartered in San Francisco.
EFF has for years urged technology companies and legislators to do a better job at protecting the privacy of every person. Californians last year took an important step in the right direction, by enacting the California Consumer Privacy Act (CCPA).
"Telecom giants broke the law by selling detailed location data" that was "meant for use only by emergency services," consumer advocacy group Public Knowledge said last week in a blog post that urged the Federal Communications Commission to punish the carriers.
We saw the experimental development of this new “means of behavioural modification” in Facebook’s contagion experiments and the Google-incubated augmented reality game Pokémon Go. Democracy has slept, while surveillance capitalists amassed unprecedented concentrations of knowledge and power It is no longer enough to automate information flows about us; the goal now is to automate us.
While Swift is rightly concerned for her safety, the increasing use of facial recognition in public spaces, like concerts or protests, is deeply disturbing.
As explored in our new report with the International Committee of the Red Cross - The humanitarian metadata problem: ‘Doing no harm’ in the digital era, metadata is generated by humanitarian organisations as they coordinate responses, communicate with staff, and engage with the people they serve.
These messages are from hackers, and their goal is to get your friends and family to click links or visit sites where malicious software can automatically infect their devices as well. Data usage that suddenly spikes with no reasonable explanation is another sign that you have been hacked.
But for years, Quora has also explicitly forbidden the Internet Archive from indexing their site. Quora could do literally nothing, and the Internet Archive would actively preserve the work of their millions of users for the future, but they’ve chosen to exclude their site from being archived.
Although the choice between iOS and Android may sometimes seem like a question of aesthetics, the reality is that the different business models of Apple and Google lead to fundamental differences for your privacy.
These are the top 10 data brokers, click on each company to have them erase your data by sending a GDPR Erasure Request. Opt Out is a free service which lets you get thousands of organisation to erase your personal data by automating the process of sending GDPR erasure (right to be forgotten) requests.
Earlier, Google announced a redesign of Google Images, which aimed to use a new ranking algorithm to help users more easily find what they were looking for. Lens in Images is also aimed at helping users more easily find things they’re interested in buying.
We would like to emphasis the general concept behind this approach which is based on the postulate whereby there is a differentiation between knowledge when it comes to privacy, and then its multiple applications in specific fields of activity.
From a close reading of much of this prior work, my colleagues and I identified three inter-related high level barriers that may explain why advice about security and privacy is often ignored and why many security and privacy tools go largely unused: awareness, motivation, and knowledge.
One email from Kavanaugh, who was working at the White House at the time, to John Yoo at the Justice Department in September 2001, appears to directly contradict Kavanaugh's claims (made under oath) not to have heard about the warrantless surveillance program known as Stellar Wind until it was exposed in an article in 2005.