public marks

PUBLIC MARKS from sbrothier with tag privacy

January 2016

The high-tech cop of the future is here today

In November 2015, a video was released to the public showing 17-year-old Laquan McDonald— a black kid who went to school in Chicago’s South Side—being shot 16 times in less than 15 seconds by Jason Van Dyke, a white officer with the Chicago Police Department. Protests erupted around the country, and to this day, protests continue in Chicago. Not only was this an example of an officer brazenly ignoring protocol and killing another human being with wanton disregard for the law, it was also evidence of an apparent cover-up: McDonald was killed in October 2014, and it took at least one lawsuit and 13 months for the city to hand over the video—seemingly an inherently public record—to journalists and lawyers working the case.

May 2015

Unfit-Bits

Free your fitness data from yourself. Earn insurance discounts! A guide to fitness tracker solutions.

Sharelock

Sharelock.io is an OSS project that provides you with a simple and secure way to share secrets.

April 2015

« Do Not Track » : vous reprendrez bien un peu de cookies - Rue89 - L'Obs

by 1 other
Alors pour devenir des citoyens avertis, rendez-vous toutes affaires cessantes sur la plateforme « Do Not Track », non sans avoir autorisé les cookies à vous suivre, tout de même...

bbc.com web cookies report | WebCookies.info | 1317273

WebCookies.info provides free audit of web cookies used by a website. See how websites are tracking user activities using web cookies, obtain an easy to understand cookie usage summary and find out about compliance with new EU privacy law. No additional software installation is required.

September 2014

Barbarians At The Password Gate | TechCrunch

We’re now using the Internet for a wide range of everyday activities, including online banking, stock trading, online shopping, bill paying, socializing, gaming, entertainment and online research. In the last few years there’s been a massive growth in the number of social networking sites such as Facebook, Linkedin, Twitter, Craigslist, Instagram, Tumblr. We share all kinds of personal details on these sites as well as music, pictures and videos, most of which we would certainly prefer to protect, safeguard and keep private. Unfortunately, all of these sites have been “cracked” by hackers who exposed passwords and other personal information from thousands of users. If you haven’t had your password hijacked, it’s really just a matter of time.

August 2014

Behind The Banner

by 1 other
The entire ad placement network is one of the most complex computational systems on the planet. Behind The Banner is an attempt to understand the underlying interactions that define this ecosystem, and how they impact our daily use of the web.

Floodwatch

by 1 other
We spend hours a day online, and we see ads on every webpage we visit. But we don’t have any way of tracking the ads we’re being served — we don’t even know how many ads the average person sees in a given day.

July 2014

I Was Hidden on This Guy’s Hard Drive for Over 6 Years

I’m sure people have always been on paths that quietly and unknowingly intersect. Now, with people sharing their passions and experiences more than ever, we can be sure that we’ll meet yet again — or sometime in the future — whether we know it or not.

Ed Park: “Slide to Unlock” : The New Yorker

u cycle through your passwords. They tell the secret story. What’s most important to you, the things you think can’t be deciphered. Words and numbers stored in the lining of your heart.

13 ways the NSA spies on us - Vox

Over the last year, through the revelations of Ed Snowden and independent reporting by others, we've learned more and more about the National Security Agency's spying programs. Indeed, there have now been so many revelations that it can be hard to keep them straight. So here's a handy guide to the most significant ways the NSA spies on people in the United States and around the world.

Dragnet Nation: Available Now | Julia Angwin

My book, Dragnet Nation: A Quest for Privacy, Security and Freedom in a World of Relentless Surveillance is now available on Amazon.com, Barnes & Noble and IndieBound. Here’s the description and some review

Net Threats | Pew Research Center's Internet & American Life Project

Because of governance issues (and the international implications of the NSA reveals), data sharing will get geographically fragmented in challenging ways. The next few years are going to be about control. — DANAH BOYD

June 2014

A Phone That Lies for You: An Android Hack Allows Users to Put Decoy Data on a Smartphone - Scientific American

A new programming technique could bring these scenarios to life. Computer scientist Karl-Johan Karlsson has reprogrammed a phone to lie. By modifying the operating system of an Android-based smartphone, he was able to put decoy data on it—innocent numbers, for example—so that the real data escape forensics. He presented the hack in January at the Hawaii International Conference on System Sciences.

Beware: Your chocolate chip cookie is spying on you | MNN - Mother Nature Network

The White House may be asking food marketers to be responsible when it comes to marketing to kids, but the snack food industry still needs to keep increasing its profits. Mondelez International, the company that owns brands like Chips Ahoy and Ritz, is going about it in an intrusive and rather creepy way. This is something you need to be aware of.

Skybox Imaging - Skybox Imaging + Google

We’re thrilled to announce that Skybox Imaging has entered into an agreement to be acquired by Google! Five years ago, we began the Skybox journey to revolutionize access to information about the changes happening across the surface of the Earth. We’ve made great strides in the pursuit of that vision. We’ve built and launched the world’s smallest high­-resolution imaging satellite, which collects beautiful and useful images and video every day. We have built an incredible team and empowered them to push the state­-of­-the-­art in imaging to new heights. The time is right to join a company who can challenge us to think even bigger and bolder, and who can support us in accelerating our ambitious vision.

Meet 2011 TR35 Winner Dan Berkenstock | MIT Video

Berkenstock describes his work at EmTech 2011: Cheaper satellite pictures. Skybox Imaging Dan Berkenstock, cofounder and chief product officer of Skybox Imaging, wants to let "anyone know what's happening anywhere in the world at any time." Next year the company plans to launch the first of what it hopes will be a constellation of 12 to 24 satellites taking high-­resolution pictures of Earth. Each satellite should cost about a tenth as much as the $250 million to $500 million imaging satellites operated by companies like DigitalGlobe and GeoEye.

How to Anonymize Everything You Do Online | Threat Level | WIRED

One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It’s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.

Huge Win For Internet Privacy! - YouTube

The Supreme Court threw Stephen Harper and Company a curve this week when Justice Thomas Cromwell and the court issued a strong endorsement of Internet privacy, emphasizing the privacy importance of subscriber information, the right to anonymity, and the need for police to obtain a warrant for subscriber information

Two-Granularity Tracking

Abstract We want to segment and track objects occluding each other in crowded scenes. We propose a tracking framework that mediates grouping cues from two levels of tracking granularities: coarse-grain detection tracklets and fine-grain point trajectories. Each tracking granularity proposes corresponding grouping cues: trajectories with similar long-term motion and disparity attract each other, detections overlapping in time repulse each other. Tracking is formulated as selection-clustering in the joint detection and trajectory space. Affinities of trajectories and detections will be contradictory in cases of false alarm detections or accidental motion similarity of trajectories. We resolve such contradictions in a steering-clustering framework where confident detections change trajectory affinities, by inducing repulsions between trajectories claimed by repulsive detection tracklets. Two-granularity tracking offers a unified representation for object segmentation and tracking independent of what objects to track, how occluded they are, whether monocular or binocular input or whether camera is moving or not.

Facebook turns user tracking 'bug' into data mining 'feature' for advertisers | ZDNet

(via)
Facebook announced changes to its privacy and advertising policies on its company blog last Thursday, extending Facebook's ability to track users outside of Facebook -- undoing previous assurances it "does not track users across the web."

8 | The More You Expose Yourself Online, The More This Bustier Exposes Your Bare Skin | Co.Exist | ideas + impact

"I felt like digitally I was already being exposed, and physically, I just felt like that was a apart of the statement," Chen says. "While wearing it, just the amount of activity that happened made me realize how much it was showing off."

The Complete Guide to Anonymous Apps -- NYMag

Anonymity came back into vogue. Today, there are literally dozens of anonymous sharing apps that allow you to vent, confess, or share secrets with strangers while going incognito. These apps are so popular, in fact, that it's hard to keep track of them all. In an attempt to catalogue the emerging trend, I downloaded 25 different anonymous apps to my phone — every one I could find on the App Store — and tested each one. Here's the complete, exhaustive rundown: