public marks

PUBLIC MARKS from sbrothier with tag privacy

June 2014

The Web We Want: An Open Letter - YouTube

The Web is our largest shared resource. Let's keep it free and open for us, and for the next generation.

Informatique : rapport Nora - Vidéo Ina.fr

Dans le prolongement de la remise au président ce jour, du rapport Nora intitulé "L'informatisation de la société ou la télématique" (rapport écrit par Simon NORA et Alain MINC), ce reportage est consacré à la télématique (informatique et telecommunication) et ses différentes implications. Explication de François de Closets sur des animations et des images d'illustration : évocation de la communication à distance via des satellites et de la fusion de plusieurs techniques via un seul et unique réseau. Ce rapport évoque également les problèmes inhérents à ces changements : l'emploi, la centralisation des informations, l'autonomie individuelle.

Opt Out From Online Behavioral Advertising By Participating Companies (BETA)

Welcome to the consumer opt out page for the Self-Regulatory Program for Online Behavioral Advertising. Our participating companies are committed to transparency and choice. Some of the ads you receive on Web pages are customized based on predictions about your interests generated from your visits over time and across different Web sites. This type of ad customization — sometimes called "online behavioral" or "interest-based" advertising — is enabled through your computer browser and browser cookies. Such online advertising helps support the free content, products and services you get online.

Ars tests Internet surveillance—by spying on an NPR reporter | Ars Technica

For one week, while Henn researched a story, he allowed himself to be watched—acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?

May 2014

Digital era confounds the courts - Tal Kopan - POLITICO.com

(via)
Courts have long struggled to deal with key questions at the intersection of individual privacy and ever-advancing technology with little guidance from the Constitution or from prior cases – now judges and experts are hoping that’s about to change.

Technology law will soon be reshaped by people who don't use email | Trevor Timm | Comment is free | theguardian.com

The US supreme court doesn't understand the internet. Laugh all you want, but when NSA, Pandora and privacy cases hit the docket, the lack of tech savvy on the bench gets scary

This is what comes after search - Quartz

Search is, in essence, a command-line interface for the web. Command-line interfaces are what came before the “graphical user interface” popularized by the Macintosh and Microsoft Windows, and they’re popular among the engineers who actually build the web. So it’s no surprise that the world’s first universal interface for the web was, after all, simply a box into which you type some text, and can even append operators like “site:cnn.com” or “filetype:pdf.”

EverythingMe | The Perfect Phone. Every Time.

by 1 other
Imagine a phone that delivers exactly what you need, right when you need it.

How much is your personal data worth? - FT.com

Explore how valuable your data are with this interactive calculator. While the multibillion-dollar data broker industry profits from the trade of thousands of details about individuals, those bits of information are often sold for a fraction of a penny apiece, according to industry pricing data viewed by the Financial Times.

April 2014

Professional car plate number blockers!

by 2 others
I think this happens only in Tehran. Some people get paid to walk behind your car, so the traffic cameras can not capture your plate number when you enter the restricted traffic areas!

Welcome to i273.com - Creator of Hack RUN®

Ever wanted to be a hacker? Hack your way into the heart of a mysterious organization to uncover their secrets..

AboutTheData.com

by 1 other
Ever wonder what kind of information determines the ads you see or the offers you receive? You’ve come to the right place. About The Data brings you answers to questions about the data that fuels marketing and helps ensure you see offers on things that mean the most to you and your family.

Twitter buys social data provider Gnip, stock soars | Reuters

The company previously allowed third-party firms such as Gnip, Datasift and Dataminr to buy access to the tweets and then re-sell that data to corporate clients.

Heartbleed Bug

by 1 other (via)
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

February 2014

What They Know - WSJ

by 1 other
Marketers are spying on Internet users -- observing and remembering people's clicks, and building and selling detailed dossiers of their activities and interests. The Wall Street Journal's What They Know series documents the new, cutting-edge uses of this Internet-tracking technology. The Journal analyzed the tracking files installed on people's computers by the 50 most popular U.S. websites, plus WSJ.com. The Journal also built an "exposure index" -- to determine the degree to which each site exposes visitors to monitoring -- by studying the tracking technologies they install and the privacy policies that guide their use.

Arne Svenson - The Neighbors

The Neighbors by Arne Svenson Opening Saturday, January 12, 2013; 6-8PM Western Project 2762 S La Cienega Blvd Los Angeles, CA 90034 310 838 0609

Equivalence > Pavillon > European Photography

(via)
European Photography 90: Privacy features 17 international artists with their views on private matters: Florian Ruiz, Jana Romanova, Dante Busquets, Chad States, Dennis Rito, Rania Matar, Kurt Caviezel, Marco Lachi, Kasia Bielska, Margo Ovcharenko, Lorena Morin, Marina Kruglyakova, Nils Klinger, Gerald Förster, Oscar Monzón, WassinkLundgren, and Hester Scheurwater.

Hester Scheurwater

The Self-obsessed photo series, which explores Hester Scheurwater's desires, obsessions and fears sparked media hype in the Netherlands. The explicit imagery shocked many and fueled debate on the sexualization of society. But the editor of Scheurwater’s first book of photography, SHOOTING BACK, defends her work. Zurich-based curator, writer and contemporary photography specialist Walter Keller compares it to Rober Mapplethorpe’s sexually-charged imagery or Francesca Woodman’s erotic mise-en-scene.”Scheurwater’s visual self-explorations extend the boundaries of another main topic in art history and photography – the pose. But in her pictures, model and artist are one,” says Keller. “Yes, this is sexually explicit work, but even more, it is a curious and smart research about herself, where the artist looks at herself from both sides of the mirror.” www.hesterscheurwater.com All images on this website are copyright protected. If you are interested to publish any of these images, please contact [email protected] for current rates.

Kurt Caviezel

My collection of webcam images has been put together over a period of 13 years. The archive contains more than 3 million images, downloads from all continents - the world wide web provides a lot. I photograph the world, using publicly accessible netcams, which give access to public and private space.

Unlimitxt - Dennis Rito

Mobile phones are impacting societies around the world. Here in the Philippines, text messaging is considered to be the most exploited service due to its affordability, convenience and immediacy. According to industry estimates, 2 billion text messages were sent everyday from the 60 percent of the population of 90 million who uses mobile phones. This has led to the popular notion of the Philippines as the “texting capital of the world”

Are teenagers really careless about online privacy? | Technology | The Guardian

Are teenagers really careless about online privacy? As Facebook lifts its sharing restrictions on 13-to-17-year-olds, Jon Henley finds that young people know exactly what to do with their privacy settings – especially where Mum is concerned

danah boyd | apophenia » Social Steganography: Learning to Hide in Plain Sight

Carmen and her mother are close. As far as Carmen’s concerned, she has nothing to hide from her mother so she’s happy to have her mom as her ‘friend’ on Facebook. Of course, Carmen’s mom doesn’t always understand the social protocols on Facebook and Carmen sometimes gets frustrated. She hates that her mom comments on nearly every post, because it “scares everyone away…Everyone kind of disappears after the mom post…It’s just uncool having your mom all over your wall. That’s just lame.” Still, she knows that her mom means well and she sometimes uses this pattern to her advantage. While Carmen welcomes her mother’s presence, she also knows her mother overreacts. In order to avoid a freak out, Carmen will avoid posting things that have a high likelihood of mother misinterpretation. This can make communication tricky at times and Carmen must work to write in ways that are interpreted differently by different people.

The Return Of The Anonymous Internet

It’s not fair to judge a new social network (or app) right after it launches; it’s like dismissing a restaurant for its irritating clientele on opening night, when the only people eating are the owner’s friends and the press. But I don’t think it’s the first-night crowd that makes Secret, a new semi-anonymous confession app, an utterly paralyzing nightmare. It’s something deeper: It’s that the app shows us, for the first time, what anonymity looks and feels like on a post-Facebook internet.