Tag: Privacy


  • Someone copying the name of another person on social media is annoying, but I don’t think of it as hacking. Anyone can make an account. Social media companies made verification methods precisely because clones are easy to make and when do so about someone famous, it could lead to a devaluation of a brand. For…

  • I found this case interesting: The facts of the case are pretty simple: The cops have a warrant for an e-mail account for someone they suspect is involved in selling drugs. They go to Microsoft to get the information. Microsoft says they’ll give law enforcement the information they have stored in Washington [State], but the…

  • This is essentially the issue of the Friends of Friends post. In this case, I am not really interested in expanding the audience. Say I publish a friends only post. Victor, my friend, makes a comment tagging Roberta, not my friend, and asks a question directed at her. She is not notified about the tag.…

  • James Fallows has an interesting piece in the Atlantic called Why NSA Surveillance Will Be More Damaging Than You Think discussing trust in the US for the info-infrastructure of the Internet is part of why we have Google, Facebook, Amazon, and Apple. As that trust gets eroded by the behavior of the US government, users may…

  • The EFF posted an article with screenshots on how to remove your Google web/search history. This is because their new privacy policy exposes what you have searched for in the past to your connections. They say to use the Remove all Web History button. Instead, I am using this as an opportunity to learn about…

  • Privacy and Technology

    Isaac Asimov has an interesting pre-World-Wide Web quote, “The advance of civilization is nothing but an exercise in the limiting of privacy.” Janov Pelorat in Foundation’s Edge (1982). Think about the word “civilization”. The root, civil, means to treat others well. In one ideal world, everyone would treat everyone else well for no reason. In hunter-gather…

  • Sunday at brunch we had an interesting conversation about Facebook. Establishing the appropriate privacy levels to the various constituents see appropriate material is hard. So hard it takes a long pages of text and screenshots to just paint a picture of what to review for the top 10 Facebook privacy settings. We were discussing how…

  • On the BLKBRD-L email list is a discussion about proving students are cheating. Any time the topic comes up, someone says a human in a room is the only way to be sure. Naturally, someone else responds with the latest and greatest technology to detect cheating. In this case, Acxiom offers identity verification: By matching…

  • Glenn asked: “What is it about Twitter that makes it more of a time sink than Facebook?” I consider a time sink something where I invest a high value of time for boring and poor value. My contacts mostly duplicate in Twitter what they provide in Facebook. The time I spend reading Twitter posts I’ve…