Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

The group represents the latest and largest effort by Torontonians to start having the kinds of public conversations, teach-ins, and debates that should have “taken place last year, when this project was first announced,” according to Bianca Wylie, co-founder of Tech Reset Canada and one of the lead organizers of the opposition to Sidewalk Toronto.

Australian bill spells trouble for data privacy around the world

Australian bill spells trouble for data privacy around the world

An unlikely alliance of tech companies, start-ups and digital consumer rights groups has locked horns with the Australian government over its proposed anti-data encryption law, currently under review by the Parliamentary Joint Committee on Intelligence and Security (PJCIS).

We Need to Have an Honest Talk About Our Data

We Need to Have an Honest Talk About Our Data

So if you look at Netflix’s ability to start a subscription business, I think it gives you hope that business models can change, and if people are used to free things, they actually can be persuaded that a paid model makes the world better.

I'm Voting for Net Neutrality!

I'm Voting for Net Neutrality!

Tell the world you’re voting for net neutrality Big Cable’s lobbyists are telling Congress that no one cares about net neutrality. Take a photo with our #VoteForNetNeutrality badge to tell your representatives you expect them to vote for the free and open Internet.

Starting November 1st, Chinese police can go to any Chinese ISP to copy your data

Starting November 1st, Chinese police can go to any Chinese ISP to copy your data

It goes on top of a law passed in 2016 that mandates ISPs store 6 months of IP address connection data and makes it very clear that your internet traffic is available to be monitored.

How 'free' Wi-Fi hotspots can track your location even when you aren't connected

How 'free' Wi-Fi hotspots can track your location even when you aren't connected

What distinguishes location-based marketing hotspot providers like Zenreach and Euclid from standard third-party hotspot providers is that the personal information you enter in the captive portal—like your email address, phone number, or social media profile—can be linked to your laptop or smartphone’s Media Access Control (MAC) address.

Father of Web says tech giants may have to be split up

Father of Web says tech giants may have to be split up

Tim Berners-Lee, a London-born computer scientist who invented the Web in 1989, said he was disappointed with the current state of the internet, following scandals over the abuse of personal data and the use of social media to spread hate.

Spy and police chiefs demand passage of Australian encryption access law

Spy and police chiefs demand passage of Australian encryption access law

Without providing any evidence, Australian Security Intelligence Organisation (ASIO) chief Duncan Lewis told a parliamentary committee hearing on October 19 that suspected terrorists were using encrypted messages to plan potential attacks.

The Facebook Dilemma

The Facebook Dilemma

On Monday, Oct. 29, and Tuesday, Oct. 30, 2018, FRONTLINE presents The Facebook Dilemma. With dozens of original interviews and rare footage, The Facebook Dilemma examines the powerful social media platform’s impact on privacy and democracy in the U.S. and around the world.

To regulate AI we need new laws, not just a code of ethics | Paul Chadwick

To regulate AI we need new laws, not just a code of ethics | Paul Chadwick

“We need a new culture of technology and business development for the age of AI which we call ‘rule of law, democracy and human rights by design’,” Nemitz writes.

Smart Cities for Dumb Humans

Smart Cities for Dumb Humans

This is how Google makes money: It collects data on people, places, and patterns of activity, on which it then runs advanced algorithms designed by some of the smartest and most innovative coders and engineers in the world, to create targeted advertising or to optimize efficiencies in processes.

Tim Cook calls for GDPR-style privacy laws in the US

Tim Cook calls for GDPR-style privacy laws in the US

"Platforms and algorithms that promised to improve our lives can actually magnify our worst human tendencies," said Cook. Cook praised Europe's "successful implementation" of privacy law GDPR, and said that "It is time for the rest of the world ...

Tim Cook: Personal data collection is being 'weaponized against us with military efficiency'

Tim Cook: Personal data collection is being 'weaponized against us with military efficiency'

And those of us who believe in technology's potential for good must not shrink from this moment," Cook said. They may say to you, "Our companies will never achieve technology's true potential if they are constrained with privacy regulation." But this notion isn't just wrong, it is destructive.

From Adam and Eve to Facebook, an history of Privacy

From Adam and Eve to Facebook, an history of Privacy

In this article we will look closely at the tension between the growing awareness towards cases in which privacy is abused; to our legitimate desire to share content, purchase and sell goods, play, research and enjoy all the marvelous opportunities of the world wide web.

The Real Reason You Should Be Responsible Online

The Real Reason You Should Be Responsible Online

But let’s forget about your thousands of followers for a while and think about the companies that allow you to share your thoughts, beliefs, and experiences online. Here’s another reason not to post inappropriate stuff online: hackers.

Blockchain Hype — Time to get Real – Sankalp Shangari – Medium

Blockchain Hype — Time to get Real – Sankalp Shangari – Medium

Adoption of Blockchain in various industries especially in startups is like the first carbon atom of a diamond. Blockchains over the time can become a core component that will effectively function as the backbone of different industries.

#WeHearYouKhashoggi

#WeHearYouKhashoggi

The disappearance of the journalist Jamal Khashoggi is becoming a major international incident as Western governments line up to cast doubt on the implausible and inconsistent story offered by Saudi Arabia about his death.

A Cypherpunk's Manifesto

Therefore, privacy in an open society requires anonymous transaction systems. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.

Digital IDs Are More Dangerous Than You Think

Digital IDs Are More Dangerous Than You Think

In the design and deployment of Digital ID systems, we must advocate for the principles of data minimization, decentralization, consent, and limited access that reinforce our fundamental rights.

Revealed: Israel's Cyber-spy Industry Helps World Dictators Hunt Dissidents and Gays

Revealed: Israel's Cyber-spy Industry Helps World Dictators Hunt Dissidents and Gays

Revealed: Israel's Cyber-spy Industry Helps World Dictators Hunt Dissidents and Gays Haaretz investigation spanning 100 sources in 15 countries reveals Israel has become a leading exporter of tools for spying on civilians.

A Beginner’s Guide to Staying Safe Online

A Beginner’s Guide to Staying Safe Online

Encrypting your email, being elusive with your social media information, and avoiding the lure of “checking in” are good starting points for protecting your online data privacy.

Four Puzzling Issues Of Identity Authentication In The Digital Era

Four Puzzling Issues Of Identity Authentication In The Digital Era

Password-less Authentication Use of PIN to eliminate passwords Biometrics in two/multi-factor authentication for better security Advantage of physical tokens as against onetime codes by SMS

The Autocracy App

The Autocracy App

Unless social media companies follow Lanier’s prompt to shift their business model to user fees, we’ll need to restrain their exploitation of data through regulation.

Invisible Manipulation: 10 ways our data is being used against us

Invisible Manipulation: 10 ways our data is being used against us

As society heads toward an ever more connected world, the ability for individuals to protect and manage the invisible data that companies and third parties hold about them, becomes increasingly difficult.

German Unity Day: Today Is the Day We Got Rid of the Surveillance State GDR.

German Unity Day: Today Is the Day We Got Rid of the Surveillance State GDR.

If you want to know how it feels like to live in a surveillance state, you need to talk to people who did. Let's fight against surveillance online to protect our freedom of speech and our right to privacy!

Schneier on Security

The primary reason computers are insecure is that most buyers aren't willing to pay -- in money, features, or time to market -- for security to be built into the products and services they want.

Decentralization for a better tomorrow – Sankalp Shangari – Medium

Decentralization for a better tomorrow – Sankalp Shangari – Medium

Blockchain technology lies at the heart of decentralization because it’s an immutable, transparent, hack-proof and distributed ledger that stores data in multiple nodes. Implication of this technology in financial institutions will reduce the time and costs exhausted by manual labor that is employed for smooth processing of data.

Facebook's and Google’s Breaches Show It’s Time for an Internet Bill of Rights

Facebook's and Google’s Breaches Show It’s Time for an Internet Bill of Rights

Instead of only focusing on privacy and the right to protect one’s own identity and data, I included principles ensuring net neutrality and universal access to the Internet. Seventh, you should be able to access the Internet without the collection of data that is unnecessary for providing the requested service.

The Demise Of Google+ Again Highlights Rampant Mismanagement At Mountain View

The Demise Of Google+ Again Highlights Rampant Mismanagement At Mountain View

Google+ could have given Facebook a run for its money: if it didn’t, it wasn’t because of product design problems or because Facebook was smarter: it was because of the obvious inability of its managers.

Leaked Transcript of Private Meeting Contradicts Google’s Official Story on China

Leaked Transcript of Private Meeting Contradicts Google’s Official Story on China

It was Wednesday, July 18, and Gomes was addressing a team of Google employees who were working on a secretive project to develop a censored search engine for China, which would blacklist phrases like “human rights,” “student protest,” and “Nobel Prize.”

More