https://www.newyorker.com/magazine/2019/12/02/big-techs-big-defector
Posts Tagged ‘privacy’
Big Tech’s Big Defector | The New Yorker
December 20, 2019Forget the new iPhones: Apple’s best product is now privacy
September 30, 2019QT:{{”
“In iOS 12 Apple is also introducing anti-fingerprinting technology in Safari. Fingerprinting is a tracking technology advertisers and data firms use to identify your movements online. They do this by recording characteristics about the device you are using–such as hard drive size, screen resolution, fonts, installed, and more–and then recording a log of that device’s movements. Though fingerprinting doesn’t give the firms access to your name, they know what the owner of a specific device does online and can build a profile around those actions. Well, again, until Apple shut that down with iOS 12 by stripping the unique characteristics of your device away from advertisers’ tracking software. These same benefits are also found in Apple’s latest MacOS Mojave, by the way.”
“}}
Forget the new iPhones: Apple’s best product is now privacy
https://www.fastcompany.com/90236195/forget-the-new-iphones-apples-best-product-is-now-privacy
Sent from my iPad
DNA methylation-based forensic age prediction using artificial neural networks and next generation sequencing
September 30, 2019DNA methylation-based forensic age prediction using artificial neural networks and next generation sequencing
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5392537/
You Can Soon Get Your DNA Sequenced Anonymously | WIRED
September 24, 2019https://www.wired.com/story/you-can-soon-get-your-dna-sequenced-anonymously/
also
https://nebula.org/anonymous-sequencing
Data privacy in the age of personal genomics
Dennis Grishin, Kamal Obbad & George M. Church
Nature Biotechnology (2019)
https://www.nature.com/articles/s41587-019-0271-3
nat-biotech-privacy
in labdropbox
GDPR vs. Existing Frameworks: Overlaps, Differences, and Filling the Gaps – Threat Stack
September 10, 2019SKS Keyserver Network Under Attack
July 5, 2019a good example of a hypothetical attack that now becomes real
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f QT:{{”
“The number one use of OpenPGP today is to verify downloaded packages for Linux-based operating systems, usually using a software tool called GnuPG. If someone were to poison a vendor’s public certificate and upload it to the keyserver network, the next time a system administrator refreshed their keyring from the keyserver network the vendor’s now-poisoned certificate would be downloaded. At that point upgrades become impossible because the authenticity of downloaded packages cannot be verified. Even downloading the vendor’s certificate and re-importing it would be of no use, because GnuPG would choke trying to import the new certificate. It is not hard to imagine how motivated adversaries could employ this against a Linux-based computer network.”
“}}
genopri’19 in Boston
June 1, 20196th International Workshop on
Genome Privacy and Security (GenoPri’19)
October 21-22, 2019, Boston, USA
Co-located with GA4GH 7th Plenary Meeting, The Hynes Convention Center, Boston, USA October 21-23, 2019
Google Gmail tracks purchase history — how to delete it
May 17, 2019https://myaccount.google.com/purchases?pli=1
Google Gmail tracks purchase history — how to delete it
https://www.cnbc.com/2019/05/17/google-gmail-tracks-purchase-history-how-to-delete-it.html
https://www.cnbc.com/amp/2019/05/17/google-gmail-tracks-purchase-history-how-to-delete-it.html