Location-Based Security — The researchers have created a customized version of Android controlled by a “policy engine” on a server. The Android devices use Bluetooth and near-field communications infrastructure to determine the location of the user, and what level of access they have to what kind of information, as well as the level of functionality of their device. Security, however, is defined not by what you can do but by what the bad guys can’t do, and this seems very dependent upon external triggers (wifi and bluetooth) which are readily faked.
Google Puts a Price on Privacy — I’d never realized before that https and referer information are only loosely compatible: Google has to go to efforts to restore referer information because browsers don’t pass the referer tag on when going from https (e.g., google.com) to http (e.g., your web site).
The Internet of Things That Do What You Tell Them: Cory Doctorow passionately explains how computers are already entwined in our lives, which means laws that support lock-in are much more than inconveniences.