Janet Vertesi, assistant professor of sociology at Princeton University, had heard many people apologize for commercial online surveillance by saying that people who didn't want to give their data away should just not give their data away -- they should opt out. So when she got pregnant, she and her husband decided to keep the fact secret from marketing companies (but not their friends and family). She quickly discovered that this was nearly impossible, even while she used Tor, ad blockers, and cash-purchased Amazon cards that paid for baby-stuff shipped to anonymous PO boxes.
We ordered everything baby-related on Tor. I’ve used a lot of browser plugins and software on my career. A lot of people just asked if I downloaded an ad blocker. But I wasn’t worried about the ads; I was worried about the data collection that fuels the advertising. If I had an ad blocker, I wouldn’t be able to see what the internet knew about me. So we used a traceless browser for baby things. Everything else, I did on my normal browser. We got everything in cash that we could. We’d do research online, using Tor, and then go out and buy things in cash in person. For some purchases online, we made through Amazon, and we set up an Amazon account from a private email account and had it deliver to a local locker in Manhattan, so it wasn’t associated with our address. We stocked it with Amazon gift cards that we bought with cash. So we did those kinds of things to draw a distinction between our online lives and our offline lives.
Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data [Jessica Goldstein/Think Progress]
(Image: pregnant woman, Teza Harinaivo Ramiandrisoa, CC-BY-SA)
In 2013, Lavabit — famous for being the privacy-oriented email service chosen by Edward Snowden to make contact with journalists while he was contracting for the NSA — shut down under mysterious, abrupt circumstances, leaving 410,000 users wondering what had just happened to their email addresses.
A new phishing attack hops from one Gmail account to the next by searching through compromised users’ previous emails for messages with attachments, then replies them from the compromised account, replacing the link to the attachment with a lookalike that sends you to a fake Google login page (they use some trickery to hide the […]
An anonymous editor from Crimethinc writes, “As 2017 opens, we face new challenges in an increasingly volatile world. Since last summer, we’ve been hard at work expanding our networks and updating our infrastructure to prepare for the global situation that is now unfolding. Over the next month, we’ll be announcing several ambitious new projects.”
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]