Privacy

It took Reddit one day to pull down Sony hack data — and a week to remove nude celebrity photos

It took Reddit one day to pull down Sony hack data — and a week to remove nude celebrity photos:

It’s true that Sony does have more legal weight behind it than Jennifer Lawrence would when demanding that hacked material come down. But Reddit’s actions in these two situations — one where it moved quickly, and another where the company dragged its feet — do make one thing unbearably clear: Reddit is a site that values a corporation more than it values women.

That’s a reach. Reddit seems to have done a good job ending “the fappening” as it was called. There are still celeb picture leaks but they have been pushed off reddit and onto the dark web.

I think the NSA story was the tipping point. When JLaws leaked pictures ended up on the net, many started to evaluate privacy with the NSA stories in mind.

Say hello to men who hate NSA spying but blame women for being spied on

Say hello to men who hate NSA spying but blame women for being spied on:

At ground zero of Reddit’s celebrity nude leak, where, as you are reading this, an orgy of men are sharing and ogling and re-sharing and re-ogling, lies this placard:

DO NOT POST ANY INFORMATION, TRUE OR FALSE, ABOUT THE IDENTITY OF THE PERSON(S) LEAKING THESE PHOTOGRAPHS AND VIDEOS. IF YOU DO THAT YOU WILL BE BANNED FROM THIS SUBREDDIT.

Somewhere in some hotel room is a 20 something actress who is crying because the whole internet saw her naked. And they rush to protect the privacy of the person who hacked into her account.

2011: The Year Intellectual Property Trumped Civil Liberties

2011: The Year Intellectual Property Trumped Civil Liberties

"This dichotomy played itself out over and again in 2011, as lawmakers - Democrats and Republicans alike - turned a blind eye to important civil liberties issues, including Patriot Act reform, and instead paid heed to the content industry's desires to stop piracy."

Interesting article, worth a read.

Study Says Chips in ID Tags Are Vulnerable to Viruses

A group of European computer researchers have demonstrated that it is possible to insert a software virus into radio frequency identification tags, part of a microchip-based tracking technology in growing use in commercial and security applications.
From New York Times

In the age of cell-phone viri, it was only a matter of time before smart objects become carriers for malicious computer code. But this article makes me wonder if that RFID virus is real.

The Torn-Up Credit Card Application

I get a heck of a lot of credit card applications in the mail. A bunch for Visa, quite a few from Mastercard and tons of them from American Express.
I almost always tear them in half and throw them away.
Sometimes, if I am feeling particularly paranoid, I’ll tear them into little bitty pieces.
Is that good enough? Could a determined and dexterous criminal gather all the bits, tape them together and apply for a card in my name? Would a credit card company balk when confronted with an obviously resurrected application?
From The Torn-Up Credit Card Application

How on earth did a bank approve an application that looked like that?

yet another catch-22

Calling the Domestic Spying the Terrorist Surveillance Program doesn’t change the inherit problem.

  • If you don’t have enough evidence to get a warrant, how can you know they are a terrorist?
  • If you know they are a terrorist, why can’t you get a warrant?

Why isn’t the press discussing this contradiction?

Lastly, how can anyone take this administration’s complaints about the leaking of classified information seriously when they haven’t fired Karl Rove for doing just that?

privacy, wiretaps and ironic small government

WASHINGTON, Dec. 26 (UPI) — U.S. President George Bush decided to skip seeking warrants for international wiretaps because the court was challenging him at an unprecedented rate.
From UPI

This right-wing spin on this is amazing. Bush’s comment that If al Qaeda is calling you, we want to know why was just sad. Honestly, if you knew al Qaeda was going to call, why not get a warrant so the call would be admissible in court?.

She did not look like someone who would have downloaded songs like Incubus’ “Nowhere Fast,” Godsmack’s “Whatever” and Third Eye Blind’s “Semi-Charmed Life,” all of which were allegedly found on her computer.
From CNN

While I can tolerate the NSA monitoring the Internet for reasons of national security, why is the RIAA monitoring the private on-line activity of people who have not consented to such monitoring? I am really hoping this makes it to the supreme court, with the hope that the court agrees that the government does not have the authority to allow private industry to conduct unwarranted searches. And where at those GOP champions of Small Government? How can they reconcile their beliefs in private property yet allow the RIAA to violate the property rights of computer users?

Cases like this make me realize why the EFF is so important.