Unique in the Crowd: The privacy bounds of human mobility, a Nature Scientific Reports paper by MIT researchers and colleagues at Belgium's Universite Catholique de Louvain, documents that 95% of "anonymous" location data from cellphone towers can be de-anonymized to the individual level. That is, given data from a region's cellular towers, the researchers can ascribe individuals to 95% of the data-points.
“We show that the uniqueness of human mobility traces is high, thereby emphasizing the importance of the idiosyncrasy of human movements for individual privacy,” they explain. “Indeed, this uniqueness means that little outside information is needed to re-identify the trace of a targeted individual even in a sparse, large-scale, and coarse mobility dataset. Given the amount of information that can be inferred from mobility data, as well as the potentially large number of simply anonymized mobility datasets available, this is a growing concern.”
The data they studied involved users in an unidentified European country, possibly Belgium, and involved anonymized data collected by their carriers between 2006 and 2007.
Anonymized Phone Location Data Not So Anonymous, Researchers Find [Wired/Kim Zetter]
Paul Strasburger sits in the House of Lords as a Libdem peer; he sits on the Joint Select Committee that is the latest Parliamentary group to scrutinise the Investigatory Powers Bill (AKA the Snoopers Charter) and, as with the previous investigations, he’s concluded that the spying bill is a dangerous, poorly drafted, overbroad dog’s breakfast.
Rocky Houston was a felon in possession of a gun, and is headed to jail for years for that crime. How did they catch him? They installed a video camera on a utility pole near a family-owned property until useful footage was captured. A federal appeals court upheld his conviction this week, with Judge John […]
A basic best-practice for email servers is to use TLS (Transport Layer Security) when they connect to one another, which guards against “man in the middle” attacks that would allow attackers to read or change emails while they travel between mail-servers.
Projects will always need management. And now with the tech gold rush it feels like there are more projects than ever with fewer managers than there’s demand for. But it takes too much time and money to go back to school full time so luckily the Project Management Professional certification training course is now 96% […]
If you’ve been blessed enough to avoid them yourself, you’ve definitely heard the horror stories. Late night, crushing out a ton of work, writing, coding, anything, then boom – your computer crashes. The battery blows, you spill water or coffee all over the place, or it just shuts down with no explanation, and you’re screwed. […]
You travel around a lot. It might be that jet set life from New York to LA to London to Tokyo, or it might be back and forth from the coffee shop to the office, or from the kitchen to the couch. Any which way, you’re mobile and that’s the way to live. When you […]