- Life Inside the Aaron Swartz Investigation — do hard things and risk failure. What else are we on this earth for?
- Steve Mann: My Augmediated Life (IEEE) — Until recently, most people tended to regard me and my work with mild curiosity and bemusement. Nobody really thought much about what this technology might mean for society at large. But increasingly, smartphone owners are using various sorts of augmented-reality apps. And just about all mobile-phone users have helped to make video and audio recording capabilities pervasive. Our laws and culture haven’t even caught up with that. Imagine if hundreds of thousands, maybe millions, of people had video cameras constantly poised on their heads. If that happens, my experiences should take on new relevance.
- The Google Glass Feature No-One Is Talking About — The most important Google Glass experience is not the user experience – it’s the experience of everyone else. The experience of being a citizen, in public, is about to change.
ENTRIES TAGGED "privacy"
Inside the Aaron Swartz Investigation, Multivariate Dataset Exploration, Augmediated Life, and Public Experience
SCADA 0-Day, Complexity Course, ToS Tracking, and Custom Manufacturing Prostheses
- Tridium Niagara (Wired) — A critical vulnerability discovered in an industrial control system used widely by the military, hospitals and others would allow attackers to remotely control electronic door locks, lighting systems, elevators, electricity and boiler systems, video surveillance cameras, alarms and other critical building facilities, say two security researchers. cf the SANS SCADA conference.
- Santa Fe Institute Course: Introduction to Complexity — 11 week course on understanding complex systems: dynamics, chaos, fractals, information theory, self-organization, agent-based modeling, and networks. (via BoingBoing)
- Terms of Service Changes — a site that tracks changes to terms of service. (via Andy Baio)
- 3D Printing a Replacement Hand for a 5 Year Old Boy (Ars Technica) — the designs are on Thingiverse. For more, see their blog.
Enlightened Tinkering, In-Browser Tor Proxy, Dark Patterns, and Subjective Data
- Hands on Learning (HuffPo) — Unfortunately, engaged and enlightened tinkering is disappearing from contemporary American childhood. (via BoingBoing)
- Dark Patterns (Slideshare) — User interfaces to trick people. (via Beta Knowledge)
- Bill Gates is Naive: Data Are Not Objective (Math Babe) — examples at the end of biased models/data should be on the wall of everyone analyzing data. (via Karl Fisch)
Data Jurisdiction, TimBL Frowns, Google Transparency, and Secure Tools
- FISA Amendment Hits Non-Citizens — FISAAA essentially makes it lawful for the US to conduct purely political surveillance on foreigners’ data accessible in US Cloud providers. [...] [A] US judiciary subcommittee on FISAAA in 2008 stated that the Fourth Amendment has no relevance to non-US persons. Americans, think about how you’d feel keeping your email, CRM, accounts, and presentations on Russian or Chinese servers given the trust you have in those regimes. That’s how the rest of the world feels about American-provided services. Which jurisdiction isn’t constantly into invasive snooping, yet still has great bandwidth?
- Tim Berners-Lee Opposes Government Snooping — “The whole thing seems to me fraught with massive dangers and I don’t think it’s a good idea,” he said in reply to a question about the Australian government’s data retention plan.
- Google’s Approach to Government Requests for Information (Google Blog) — they’ve raised the dialogue about civil liberties by being so open about the requests for information they receive. Telcos and banks still regard these requests as a dirty secret that can’t be talked about, whereas Google gets headlines in NPR and CBS for it.
- Open Internet Tools Project — supports and incubates a collection of free and open source projects that enable anonymous, secure, reliable, and unrestricted communication on the Internet. Its goal is to enable people to talk directly to each other without being censored, surveilled or restricted.
The open web depends on my ability to have a permanent address. However, my privacy depends on my ability to hide who I am. At least sometimes.
Internet of Copters, Privacy Game, Visualizing Data, Secure Configs
- Tilt-to-Fly Controller and Copter (Kickstarter) — This looks totally awesome and hackable. The controller has a USB port, the protocol is documented, and you can even connect your own electronics payload, like an Arduino, camera, or homebrewed project to the auxiliary serial (UART + power) port.
- The Privacy Game (The Open University) — This game is designed to highlight how privacy and consent work online. Players make decisions about which information they reveal, who they reveal it to and why. For example, you may decide to trade some information for gifts when shopping on a website; or you may decide to keep other information secret when posting on a social networking site. (via BoingBoing)
- statwing — very easy analysis and visualization of data.
- duraconf — a collection of hardened configuration files for SSL/TLS services. It’s easy to reduce crypto effectiveness with crappy choices and options, so it’s good to have solid configurations to go from.
We need checks and balances to ensure data-driven predictions don't become prejudices.
3D Printed Drones, When Pacemakers Attack, N-Gram Updated, and Deanonymizing Datasets
- Home-made 3D-Printed Drones — if only they used computer-vision to sequence DNA, they’d be the perfect storm of O’Reilly memes :-)
- Hacking Pacemakers For Death — IOActive researcher Barnaby Jack has reverse-engineered a pacemaker transmitter to make it possible to deliver deadly electric shocks to pacemakers within 30 feet and rewrite their firmware.
- Google N-Gram Viewer Updated — now with more books, better OCR, parts of speech, and complex queries. e.g., the declining ratio of sex to drugs. Awesome work by Friend of O’Reilly, Jon Orwant.
- Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel — a set of location traces can be deanonymized given an easily obtained social network graph. [...] Our experiments [on standard datasets] show that 80% of users are identiﬁed precisely, while only 8% are identiﬁed incorrectly, with the remainder mapped to a small set of users. (via Network World)