Social networking sites are Skinner boxes designed to train you to undervalue your privacy. Since all the compromising facts of your life add less than a dollar to the market-cap of the average social network, they all push to add more "sharing" by default, with the result that unless you devote your life to it, you're going to find your personal info shared ever-more-widely by G+, Facebook, Linkedin, and other "social" services.
Arvind Narayanan has proposed a solution to this problem: a two-part system through which privacy researchers publish a steady stream of updates about new privacy vulnerabilities introduced by the social networking companies (part one), and your computer sifts through these and presents you with a small subset of the alerts that pertain to you and your own network use.
Here’s how we could build a “privacy alert” system that solves these problems. It has two components. The first is a privacy “vulnerability tracker” similar to well-established security vulnerability trackers (1, 2, 3). Each privacy threat is tagged with severity, products or demographics affected, and includes a list of steps users can take. The second component is a user-facing privacy tool that knows the user’s product choices, overall privacy preferences, etc., and uses this to filter the vulnerability database and generate alerts tailored to the user.
While the core design is very simple, we can imagine a number of bells and whistles. The vulnerability database could utilize crowdsourcing to increase coverage and expediency, and offer an open API so that anyone can utilize the data. If the user-facing tool taps into browsing history and other personal information, it can automatically infer which vulnerabilities are relevant to the user. Of course, this raises its own privacy concerns, so the tool would have to be offered by a company or organization that the user trusts.
Eternal vigilance is a solvable technology problem: A proposal for streamlined privacy alerts [Arvind Narayanan/Freedom to Tinker]
Earlier this month, I gave the afternoon keynote at the Internet Archive’s Decentralized Web Summit, and my talk was about how the people who founded the web with the idea of having an open, decentralized system ended up building a system that is increasingly monopolized by a few companies — and how we can prevent the same things from happening next time.
Corrections Corporation of America (CCA) is one of the world’s largest private jailers; it runs prisons and immigration detention centers across the USA (and is diversifying into halfway houses, mental health center, and surveillance for poor neighborhoods). Mother Jones’s Shane Bauer went undercover at CCA’s Winn Prison in Louisiana, the state with the highest incarceration […]
Steven Levy is in characteristic excellent form in a long piece on Medium about the internal vogue for machine learning at Google; drawing on the contacts he made with In the Plex, his must-read 2012 biography of the company, Levy paints a picture of a company that’s being utterly remade around newly ascendant machine learning […]
Some people say magic tricks are nerdy and best left to your 12-year-old asthmatic cousin. But others see value in perfecting the slight of hand and showmanship associated with a perfectly executed routine. We’re firmly in the latter camp. And now, we’re giving you the ability to put a few parlor tricks up your sleeve with the Penguin […]
Bluetooth speakers may be convenient to use, but many of them just aren’t that powerful. Sure, it may be fine if you’re seated in front of the speaker. But move across the room, and you may strain to hear what’s coming from those tiny drivers.There’s a reason why the G-BOOM Wireless Bluetooth Boombox (now $79.99 in the Boing […]
If you’re working to build your web programming knowledge, you know you have a lot of ground to cover. With literally dozens of languages, platforms and environments available to coders, mastering all those technologies can be a daunting task.Up-and-coming coders can start learning some of the most fundamental programming study areas with this Web Hacker course bundle – and […]