Please enter your username below and press the send button.A password reset link will be sent to you.
If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.
This link recently saved by hjl on October 24, 2012
Future of Privacy Forum is pleased to share the third annual “Privacy Papers for Policy Makers,” showcasing leading analytical thinking about current and emerging privacy issues.
Leading Privacy Papers:
Bringing the Gap Between Privacy and Design
Deirdre Mulligan and Jennifer King
‘Going Dark’ Versus a ‘Golden Age for Surveillance’
Peter Swire and Kenesa Ahmad
“How Come I’m Allowing Strangers to Go Through My Phone”?: Smart Phones and Privacy Expectations
Mobile Payments: Consumer Benefits & New Privacy Concerns
Chris Jay Hoofnagle, Jennifer M. Urban, and Su Li
Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising
Blase Ur, Pedro G. Leon, Lorrie Faith Cranor, Richard Shay and Yang Wang
The ‘Re-Identification’ of Governor William Weld’s Medical Information: A Critical
Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now
Privacy by Design: A Counterfactual Analysis of Google and Facebook Pri
This link recently saved by hjl on October 22, 2012
The Federal Trade Commission today released a staff report "Facing Facts: Best Practices for Common Uses of Facial Recognition Technologies" for the increasing number of companies using facial recognition technologies, to help them protect consumers’ privacy as they use the technologies to create innovative new commercial products and services.
Facial recognition technologies have been adopted in a variety of contexts, ranging from online social networks and mobile apps to digital signs, the FTC staff report states. They have a number of potential uses, such as determining an individual’s age range and gender in order to deliver targeted advertising; assessing viewers’ emotions to see if they are engaged in a video game or a movie; or matching faces and identifying anonymous individuals in images.
Facial recognition also has raised a variety of privacy concerns because – for example – it holds the prospect of identifying anonymous individuals in public, and because the data collect
This link recently saved by hjl on October 22, 2012
There are two cases where the FTC believes that companies need to get a consumer’s “affirmative express consent,” that is, an “opt-in,” before using information captured via facial recognition: When identifying anonymous individuals to third parties that wouldn’t otherwise know who they were, and when using any data or imagery captured via facial recognition for purposes outside of what was initially stated by the company.
In case companies weren’t already aware, the FTC also points out that what’s okay under U.S. law concerning facial recognition technologies might be illegal in other countries.
This link recently saved by hjl on August 22, 2012
With the help of a company called Picocomputing, Marlinspike has developed a processing server which is able to test 18 billion keys per second – a feat which would normally require 80,000 CPUs. The server is equipped with 48 programmable processing units known as field programmable gate arrays (FPGA). Each FPGA is programmed to provide 40 parallel processing units, each with a clock speed of 450 MHz, for cracking DES. Users who want to take advantage of the service will first have to extract the client-server handshake from a record of the network traffic. Marlinspike has developed an open source tool called chapcrack for this purpose.
This link recently saved by hjl on August 13, 2012
“Transparency is not about restoring trust in institutions. Transparency is the politics of managing mistrust,” says Krastev. He suggests that when officials are watched with an eagle eye, fewer talented people will want to enter the field of governance. And transparency is relative: “Any unveiling is also veiling. No matter how transparent our governments want to be, governments will be selectively transparent.”
This link recently saved by hjl on June 07, 2012
Google’s Knowledge Graph derives from Freebase, a proprietary graph database acquired by Google in 2010 when it bought Metaweb. Google's Thakur, who is technical lead on Knowledge Graph, says that significant additional development has been done to get the database up to Google’s required capacity. Based on some of the architecture discussed by Google, Knowledge Graph may also rely on some batch processes powered by Google’s Pregel graph engine, the high-performance graph processing tool that Google developed to handle many of its Web indexing tasks—though Thakur declined to discuss those sorts of details.
Microsoft’s Satori (named after a Zen Buddhist term for enlightenment) is a graph-based repository that comes out of Microsoft Research’s Trinity graph database and computing platform. It uses the Resource Description Framework and the SPARQL query language, and it was designed to handle billions of RDF “triples” (or entities). For a sense of scale, the 2010 US Census in RDF form ha
This link recently saved by hjl on June 06, 2012
How does society get better at preserving privacy online? As Lawrence Lessig pointed out in his book Code and Other Laws of Cyberspace, there are four possible mechanisms: norms, law, code, and markets.
So far, we've been pretty terrible on all counts. Take norms: our primary normative mechanism for improving privacy decisions is a kind of pious finger-wagging, especially directed at kids. "You spend too much time on those Interwebs!" And yet schools and libraries and parents use network spyware to trap every click, status update, and IM from kids, in the name of protecting them from other adults. In other words: your privacy is infinitely valuable, unless I'm violating it. (Oh, and if you do anything to get around our network surveillance, you're in deep trouble.)
What about laws? In the United States, there's a legal vogue for something called "Do Not Track": users can instruct their browsers to transmit a tag that says, "Don't collect information on my user." But there's no built-
This link recently saved by hjl on February 17, 2012
Using an inexpensive phone and open source software, the researchers were able to track the location of cell phone users without their knowledge on the Global System for Mobile Communications (GSM) network, the predominant worldwide network.
In a field test, the research group was able to track the location of a test subject within a 10-block area as the subject traveled across an area of Minneapolis at a walking pace. The researchers used readily available equipment and no direct help from the service provider.
This link recently saved by hjl on December 22, 2011
Report of Data Protection Audit of Facebook Ireland Published
The Office of the Data Protection Commissioner, Ireland today 21 December 2011 published the outcome of its audit of Facebook Ireland(FB-I) which was conducted over the last three months including on-site in Facebook Irelandě°˝€™s Headquarters in Dublin. The Report is a comprehensive assessment of Facebook Irelandě°˝€™s compliance with Irish Data Protection law and by extension EU law in this area.
The report is available in 2 parts: the main body of the report, including recommendations and the appendices.
This link recently saved by hjl on September 28, 2011
Overview of EU personal data request response from Facebook.
01. About Me
02. Account End Date
03. Account Status History
05. Alternate Name
10. Credit Cards
12. Current City
13. Date of Birth
18. Favourite Quotes
19. Friend Requests
24. Last Location
25. Linked Accounts
32. Name Changes
35. Notification Settings
38. Phone Numbers
40. Physical Tokens
42. Political Views
43. Privacy Settings
44. Profile Blurb
45. Realtime Activities
46. Recent Activities
47. Registration Date
49. Religious Views
50. Removed Friends
51. Screen Names
53. Status Updates