Pt and Limor write,
The New York Times asked Adafruit's founder and engineer, Limor 'Ladyada' Fried to contribute to an article series called ROOM for DEBATE. We believe Internet of Things devices should all come with a well established expectation of what they will and will not do with consumer's data. In the article we put together the start of what we hope will help this effort: Minimizing Risk Is Easy: Adopt a Bill of Rights
We are inviting everyone to post comments here on the blog post or on the comments at the Google+ post. The document will live here once it's in a solid place and we'll ask other companies that make "Internet of Things" devices to sign on.
There are a few core principles:
· Open is better than closed; this ensures portability between Internet of Things devices.
· Consumers, not companies, own the data collected by Internet of Things devices.
· Internet of Things devices that collect public data must share that data.
· Users have the right to keep their data private.
· Users can delete or back up data collected by Internet of Things devices.
These are all reasonable consumer rights. Smart companies will adopt these as the standard, and open-source code and hardware will help keep abuses low and security strong when everything is connected to the Internet.
Minimizing Risk Is Easy: Adopt a Bill of Rights
(Thanks, Pt and Limor!)
(Image: FlyPort Ethernet Module, a Creative Commons Attribution (2.0) image from openpicus's photostream)
Most people don’t look at any news, or at one news site; using social media a lot (even without the intention of looking for news) means that sometimes you’ll end up clicking a news link — so heavy social media users, on average, are consuming a wider media diet than those who do not use […]
In 2012, Google introduced Certificate Transparency, an internet-wide tripwire system designed to catch cryptographic “certificate authorities” who abused their position to produce counterfeit credentials that would allow criminals, governments and police to spy on and tamper with secure internet connections.
Yesterday’s massive ransomware outbreak of a mutant, NSA-supercharged strain of the Petya malware is still spreading, but the malware’s author made a mere $10K off it and will likely not see a penny more, because Posteo, the German email provider the crook used for ransom payment negotiations, shut down their account.
Between election hacks, ransomware, and Devil’s Ivy, the cybersecurity space is booming as malware and hackers become more sophisticated. If you’re interested in pursuing a career in ethical hacking, or just want to secure your own devices, The Super-Sized Ethical Hacking Bundle is a great resource.In this bundle, you’ll learn the fundamental skills of ethical hacking, prepare […]
The TREBLAB X11 Earphones are versatile, offer great sound, and are currently $32.99 in the Boing Boing Store.These Bluetooth earbuds are a great workout companion. They’re totally sweat proof and their ear-fins keep them snugly in place during high activity — something that Apple’s AirPods can only do if you were blessed with precisely the […]
Whether you’re a seasoned entertainment industry veteran or a student working on your first spec script, having the right tool for the job will make a huge difference in your focus and productivity.Final Draft 10 is far and away the world’s best screenwriting software, used extensively by professional film and TV writers at top production […]