17 KiB
published |
---|
false |
Privacy
- Apple vs (or plus) Adtech, Part II 2021-05-30 Doc Searls
To review… in Settings—> Privacy—> Tracking, is a single OFF/ON switch for “Allow Ads to Request to Track.” It is by default set to ON.
- Reciprocal Negotiated Accountability 2021-06-21 Phil Windley
The self-sovereign internet underscores a tension between those who desire perfect oversight of society and those who desire perfect privacy. In this post, I explore a method for conditional legibility of private communications.
- Did You Know School Apps Often Share Student Data with Third Parties? 2021-05-12 Me2Ba
Me2B Alliance (Me2BA) research recently found that 60% of the school apps we reviewed were sending student data to potentially high-risk third parties without knowledge or consent.
- Decentralized Digital Identity: Shaping the Future of Privacy 2021-04-24 Open Nodes
In May, Tribe held a Clubhouse session with the Dutch Blockchain Coalition (DBC), in partnership with the Singapore Infocomm Media Development Authority (IMDA). Together with representatives from Affinidi, SITA, and Sphereon, the industry players shared their insights on how blockchain is being used to shape the future of privacy, and some practical applications of decentralized digital identity.
- [Literature] Privacy Risks With Opioid Recovery Apps 2021-07-07 ExpressVPN
Perhaps the most alarming revelation from our study of ten opioid addiction treatment and recovery apps is the consistent access of unique identifiers, given the sensitivity of privacy around health and substance use issues.
- Links Between Privacy and Disinformation: Julia Angwin 2021-07
Privacy, as we know, is a complex topic. When it converges with technology, it becomes more complicated. One aspect of this complexity is where privacy fits in with disinformation—false or misleading information spread intentionally to confuse or manipulate people.
- Why Privacy by (Re)Design Better Defines Responsibility for Privacy 2021-09 Anonyome
Where privacy by design puts the onus on app developers to be proactive about data privacy, privacy by (re)design redesigns the “app ecosystem to address data sharing”, spreading the burden.
- IDnow AutoIdent will soon be usable according to German TKG 2021-10-14 IDNow
Automated identification procedures ensure seamless processes without media disruption and increase cost efficiency. By modernizing laws that allow these procedures, many cases can be simplified and modernized in the future.
- Kids PRIVCY ACT 2022-01-10 Me2BA
We’re proud to support a bill that will:
- Strengthen the legal protections afforded to children under COPPA, and extend COPPA protections to adolescents ages 13 to 17, who have long gone without privacy protections online, while creating new rights for families.
- Prohibit surveillance advertising and other harmful uses of data on all digital services likely to be accessed by children, rather than limiting protection to ineffectual notice and consent on “child-directed sites.”
- Exposed documents reveal how the powerful clean up their digital past using a reputation laundering firm 2022-02 Rest of World
Reputation firms like Eliminalia use legal threats and copyright notices to have material taken down around the world.
From the we can’t talk about ourselves without ®’s camp
- What is Privacy? 2022-03 Phil Windley
The International Association of Privacy Professionals (IAPP) defines four classes of privacy:
- Bodily Privacy—The protection of a person's physical being and any invasion thereof. This includes practices like genetic testing, drug testing, or body cavity searches.
- Communications Privacy—The protection of the means of correspondence, including postal mail, telephone conversations, electronic mail, and other forms of communication.
- Information Privacy—The claim of individuals, groups, or organizations to determine for themselves when, how, and to what extent information about them is communicated to others.
- Territorial Privacy—Placing limitations on the ability of others to intrude into an individual's environment. Environment can be more than just the home, including workplaces, vehicles, and public spaces. Intrusions of territorial privacy can include video surveillance or ID checks.
- The business of Privacy is Booming 2021-11-09
Investors and consumers show growing enthusiasm for privacy-focused alternatives to Google and Facebook amid renewed scrutiny over the real cost of their "free" services.
- The Rising Consumer Demand for Data Privacy and Autonomy 2021-11-19 Sequoia
Increased supply of user-friendly private tech and increased demand for privacy have converged, creating a moment of unprecedented opportunity for founders with a vision for privacy-first online experiences.
- Agency By Design (Privacy is not Enough) 2021-05-06 Adrian Gropper
I’m not a fan of Privacy by Design.
In the industry are only concerned about compliance, very rarely talk about Human Agency
Privacy by Default is the opposite in some sense to privacy by design
The problem is that It conflict with community in many cases. (e.g. social credit score)
Cultural differences (EU accepts better centralization than US)
Delegation and agency are one the same thing
Agency is a much bigger thing and delegation is a mechanism that supports it
I want my fiduciaries to know as much as possible of me (e.g. my doctor, my lawyer)
Model Agency as hierarchy and delegation is the mean to have it. - Self-Sovereign Identity - The Nash Equilibrium Point of the Personal Identity Information Game 2021-05-07 ThoughtWorks
"A silent war is ongoing between users and companies over the control of data."
- Privacy or convenience is a question
- SSI is the answer to this question
- Privacy, Authenticity, and Confidentiality 2022-03 Phil Windley
Authenticity allows parties to a conversation to know to whom they are talking. Confidentiality ensures that the content of the conversation is protected from others. These three create a tradespace because you can't achieve all three at the same time.
- Verifiable credentials are key to the future of online privacy 2021-07-26 Helpnet
they offer a few advantages that we don’t get with paper records. Whereas a physical document (let’s say, a vaccine card) can be forged and passed off as authentic, the security mechanisms behind a verifiable credential means that it can never be tampered with and that anyone shown the credential will be able to immediately verify who issued it and to whom it was issued. 2021-06-08
- Self Sovereign e-ID Schemes & Privacy Challenges 2021-12-13 Crypto Valley Conference 2021
Kurt Nielsen & Nagib Aouini from Partisia Blockchain
- Data Privacy: does anyone care? 2021-09-15 Meeco
The compelling data and research suggest that my original question now needs to be reframed. People most certainly do care about their data privacy. The question now is: how are organisations going to bridge this data privacy chasm?
- UNDP LEGAL IDENTITY AGENDA ONLINE FORUM: PRIVATE SECTOR ENGAGEMENT ROUNDTABLES: DATA PROTECTION AND PRIVACY 2022-07-13 UNStats
A second Private Sector Engagement Roundtable was held on February 10, 2022 building on the first roundtable held in May 2021. The forum drew 74 virtual participants. Hosted by the UN Legal Identity Agenda (LIA) Task Force1, the roundtable with members of UN entities and the private technology sector addressed, core questions about data protection and privacy, as well as policy issues concerning legal identity systems.
- Google Sued for Misleading Users Over Location Data Privacy 2022-03 Anonyme
“Google falsely led consumers to believe that changing their account and device settings would allow customers to protect their privacy and control what personal data the company could access. The truth is that contrary to Google’s representations it continues to systematically surveil customers and profit from customer data.”
- Revoke
Revoke allows you to send requests to retrieve and/or delete your data.
- Each company has 30 days to respond under the GDPR.
- Revoke gives you full visibility and control of what to do with that information.
- Easy to use app helps you discover who hold yours personal information.
- Someone could be tracking you through your headphones 2021-09-02 NRK Beta
- At least 9149 products with Bluetooth transmitters were uniquely recognized at least 24 hours apart.
- At least 129 headphones could be tracked in the dataset for longer than 24 hours.
- Popular headphones models from Bose, Bang & Olufsen, Jabra, Sennheiser and JBL can be tracked over longer periods of time.
- Can Consent Ever Play a Valuable Role in Consumer Privacy? 2021-08 Anonyme
Can we rely on ‘informed consent’ if the informed part is largely missing?
Consent doesn’t scale well from the consumer’s perspective. - the personalization privacy paradox 2021-05-25
“Zero party data is that which a customer intentionally and proactively shares with a brand. It can include preference center data, purchase intentions, personal context, and how the individual wants the brand to recognize her.”
- How the cookie poisoned the Web 2021-05-14 Doc Searls
Have you wondered why you have no more privacy on the Web than what other parties grant you (which is none at all), and that you can only opt in or out of choices that others provide—while the only controls you have over your privacy are to skulk around like a criminal (thank you, Edward Snowden and Russell Brand, for that analogy) or to stay offline completely?
- Me2BA Product Testing Spotlight Report Published: Data Sharing in Primary & Secondary School Mobile Apps 2021-05-04 Me2Ba
60% of School Apps are Sending Student Data to Potentially High-risk Third Parties Without Knowledge or Consent According to New Research from Me2B Alliance
- The new age of privacy 2021-01-06 Ben Werdmuller
Privacy is a human right. Surveillance has a chilling effect on free speech and freedom of association, which we consider to be fundamental tenets of democracy. Sure, you can make a bunch of money by learning everything you can about an individual and selling access to their attention. But not everything that is profitable should be permissible.
- Letter to Attorney General Becerra Re: FinCen Proposed Rule Privacy concerns 2021-02-23 Ally Medina BlockAdvocacy
Our concerns with the consumer privacy implications of this proposed rule are twofold:
First, the proposed rule’s requirement that MSB’s collect identifying information associated with wallet addresses will create reporting that extends well beyond the intent of the rule or the transaction.
- Privacy Harms • Daniel Solove Teach Privacy
This article makes two central contributions. The first is the construction of a road map for courts to understand harm so that privacy violations can be tackled and remedied in a meaningful way.
- Provisional Authenticity and Functional Privacy 2022-03 Phil Windley
Provisional authenticity and confidentiality can help us manage the trade offs between privacy and authenticity to support online accountability along with functional privacy.
- Use Sudo Platform’ Decentralized Identity Capabilities to Rapidly Deliver Customer Privacy Solutions 2022-04 Anonyme
In this 5-part series, we’ll look at how enterprises can rapidly deliver customer privacy solutions with the Sudo Platform digital identities and decentralized identity capabilities.
- Identity is evolving — but the battle for privacy has only just begun 2022-03-10 Avast
But with challenges in the offing and platforms preparing to do battle, we must all support initiatives that support privacy and security, as well as the services that will bolster it. We must expect better and support the solutions that help us do better. That’s the only way to create a future where privacy and security are at the core of our collective digital experiences.
- Top 5 Must Read Articles on Data Privacy 2022-04-18 Affinidi
To help you get a good grasp of the data privacy concepts and what it means for you, we have put together some relevant articles that make for an interesting read. These articles are sure to give you a whole new perspective of data privacy.
- John Oliver on Surveillance Capitalism 2022-04 Phil Windley
In researching this story, we realized that there is any number of perfectly legal bits of f—kery that we could engage in. We could, for example, use data brokers to go phishing for members of congress, by creating a demographic group consisting of men, age 45 and up, in a 5-mile radius of the U.S. Capitol, who had previously visited sites regarding or searched for terms including divorce, massage, hair loss and mid-life crisis.
- Understand the ORGANS Framework Before Building Privacy-Preserving Apps 2022-08-23 Affinidi
- O -> Open Standards
- R -> Revocable by individuals
- G -> Granular
- A -> Auditable
- N -> Notice to all parties involved
- S -> Secure