Posts Tagged ‘privacy’

Unroll.me Service Faces Backlash Over a Widespread Practice: Selling User Data

May 1, 2017

Unroll.me…Faces Backlash Over a Widespread Practice: Selling User
Data https://www.NYTimes.com/2017/04/24/technology/personal-data-firm-slice-unroll-me-backlash-uber.html Gmail add-on tabulated usage @Uber v @Lyft

QT:{{”
“Slice Intelligence, a data firm that uses an email management program called Unroll.me to scan people’s inboxes for information, faced an outcry that began on Sunday after The New York Times reported that Uber had used Slice’s data to keep tabs on its ride-hailing rival Lyft.”
“}}

Here, there and everywhere | The Economist

April 2, 2017

Here, there & everywhere
http://www.Economist.com/technology-quarterly/2017-03-09/quantum-devices Overview of #quantum computing mentions using it to #encrypt transmission of genomic data

QT:{{”
Thanks to the development of ever more secure links, quantum cryptography has recently been deployed more widely. ID Quantique has installed quantum links between data centres of KPN, a Dutch telecoms firm; of Battelle, an American non-profit research firm; and of Hyposwiss and Notenstein, two Swiss private banks. It offers links between financial institutions in Geneva and a disaster-recovery centre 50km away. In 2015 researchers at Toshiba in Japan began sending quantum-encrypted genomic data from a research facility in Sendai to Tohoku University, 7km away.
“}}

How the Bitcoin protocol actually works | DDI

April 2, 2017

How…#Bitcoin…works, by @michael_nielsen
http://www.michaelnielsen.org/ddi/how-the-bitcoin-protocol-actually-works Overview focusing on why in addition to how; highlights #privacy issues

QT:{{”
How anonymous is Bitcoin? Many people claim that Bitcoin can be used anonymously. This claim has led to the formation of marketplaces such as Silk Road (and various successors), which specialize in illegal goods. However, the claim that Bitcoin is anonymous is a myth. The block chain is public, meaning that it’s possible for anyone to see every Bitcoin transaction ever. Although Bitcoin addresses aren’t immediately associated to real-world identities, computer scientists have done a great deal of work figuring out how to de-anonymize “anonymous” social networks. The block chain is a marvellous target for these techniques. I will be extremely surprised if the great majority of Bitcoin users are not identified with relatively high confidence and ease in the near future. The confidence won’t be high enough to achieve convictions, but will be high enough to identify likely targets. Furthermore, identification will be retrospective, meaning that someone who bought drugs on Silk Road in 2011 will still be identifiable on the basis of the block chain in, say, 2020. These de-anonymization techniques are well known to computer scientists, and, one presumes, therefore to the NSA. I would not be at all surprised if the NSA and other agencies have already de-anonymized many users. It is, in fact, ironic that Bitcoin is often touted as anonymous. It’s not. Bitcoin is, instead, perhaps the most open and transparent financial instrument the world has ever seen.
“}}

WikiLeaks Shows How the CIA Can Hack a Mac’s Hidden Code

March 25, 2017

WikiLeaks Shows How the CIA Can Hack a Mac
https://www.wired.com/2017/03/wikileaks-shows-cia-can-hack-macs-hidden-code/ Modifying the firmware of Thunderbolt adapters to make spyware implanters

QT:{{”
“The CIA’s documents describe a series of tools that agents can use to install “implants” on target machines, capable of silently monitoring everything that occurs within its operating system and transmitting it to a remote operator. One manual explains how to modify the firmware of a standard Apple Thunderbolt-to-ethernet adapter, turniing it into an spyware-planting tool the CIA calls “Sonic Screwdriver.” When plugged in, the altered adapter can trick a Mac into thinking it’s booting its operating from a spoofed network source that the adapter impersonates, allowing tweaks to its firmware even in the rare cases when the user has set a password for any changes to that deep-seated code.”
“}}

Yahoo discloses hack of 1 billion accounts

January 10, 2017

Yahoo discloses #hack of 1 billion accounts
http://social.techcrunch.com/2016/12/14/yahoo-discloses-hack-of-1-billion-accounts/ Seems the scale of this affects a large fraction of all Internet users

The Amazon Echo’s always-listening feature entangles it in a murder case | PCWorld

January 6, 2017

The $AMZN Echo’s always-listening feature entangles it in a murder
case http://www.pcworld.com/article/3152899/smart-appliance/the-amazon-echos-always-listening-feature-entangles-it-in-a-murder-case.html Did the victim say “#Alexa, call the cops”

To bring a divided country together, start with a little spit – The Washington Post

January 5, 2017

To bring a divided country together, start w…spit by
@SusanSvrlugahttps://www.washingtonpost.com/news/grade-point/wp/2016/12/24/to-bring-a-divided-country-together-start-with-a-little-spit Prominent piece on frosh #personalgenomics

@SusanSvrluga Surprised there’s so little discussion of #privacy, consent & ethics in this prominent piece

Worried About the Privacy of Your Messages? Download Signal – NYTimes.com

January 3, 2017

Worried About…#Privacy? Download Signal http://www.nytimes.com/2016/12/07/technology/personaltech/worried-about-the-privacy-of-your-messages-download-signal.html V. strong endorsement from @NYTimes. Perhaps useful for protecting sources

What If Apple Is Wrong?

December 23, 2016

What If $AAPL Is Wrong?
https://www.technologyreview.com/s/601145/what-if-apple-is-wrong/ The risks of too much #privacy (ie of too strongly locking down our phones)

IHEC Consortium Papers (Cell + other journals)

November 28, 2016

#IHECpapers rollout http://www.Cell.com/consortium/ihec Gr8 work! incl. #privacy, normal breast epigenetics, ETG links, deconvolution, #allelic activity