Here’s what you need to know about the substantive changes in the new policy:
1. Up until March 1, 2012, the data Google collected on you when you used YouTube was carefully cabined away from your other Google products. So, in effect, Google could use data they collected on YouTube to improve and customize the users’ YouTube experience, but couldn’t use the data to customize and improve user experience on, say, Google+.
2. The same siloing took place for your search history. Previously, Google search data was kept separate from other products. Even when users were logged in, Google promised not to share the information they gathered about you from your Google search history when customizing their other products. Considering how uniquely sensitive user search history can be (indicating vital facts about your location, interests, age, sexual orientation, religion, health concerns, and much more), this was an important privacy protection.
I used to have Firefox plugin that turned off my Google cookie unless I was visiting a service where I wanted to be logged in -- that is, I could automatically log in to Gmail and Google Docs, but I wasn't logged in for searches, YouTube, and BlogSpot. It disappeared a few versions back. Does anyone know of a contemporary equivalent? Post it in the comments.
Most people don’t look at any news, or at one news site; using social media a lot (even without the intention of looking for news) means that sometimes you’ll end up clicking a news link — so heavy social media users, on average, are consuming a wider media diet than those who do not use […]
In 2012, Google introduced Certificate Transparency, an internet-wide tripwire system designed to catch cryptographic “certificate authorities” who abused their position to produce counterfeit credentials that would allow criminals, governments and police to spy on and tamper with secure internet connections.
Yesterday’s massive ransomware outbreak of a mutant, NSA-supercharged strain of the Petya malware is still spreading, but the malware’s author made a mere $10K off it and will likely not see a penny more, because Posteo, the German email provider the crook used for ransom payment negotiations, shut down their account.
Between election hacks, ransomware, and Devil’s Ivy, the cybersecurity space is booming as malware and hackers become more sophisticated. If you’re interested in pursuing a career in ethical hacking, or just want to secure your own devices, The Super-Sized Ethical Hacking Bundle is a great resource.In this bundle, you’ll learn the fundamental skills of ethical hacking, prepare […]
The TREBLAB X11 Earphones are versatile, offer great sound, and are currently $32.99 in the Boing Boing Store.These Bluetooth earbuds are a great workout companion. They’re totally sweat proof and their ear-fins keep them snugly in place during high activity — something that Apple’s AirPods can only do if you were blessed with precisely the […]
Whether you’re a seasoned entertainment industry veteran or a student working on your first spec script, having the right tool for the job will make a huge difference in your focus and productivity.Final Draft 10 is far and away the world’s best screenwriting software, used extensively by professional film and TV writers at top production […]