Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged applications

Rss Feed Group items tagged

Andra Keay

PJF's Pages - Journal - Dark Stalking on Facebook - 0 views

  •  
    PJFenwick is doing a PhD on facebook privacy and his explorations have shown that even when you lock up your settings, your friends (and friends of) can leak your information all over the place. "But by far the most interesting part of all of this have been dark users. Like dark matter, these users are not directly observable, usually because they've completely disabled API access. In fact, some of these users are completely dark unless you're a friend. They don't show up in search results. They don't show up on friends' lists. You can't send them messages. If you try to navigate to their user page (assuming you know it exists), you get redirected back to your homepage. These users have their privacy settings turned up real high, and are supposed to be hard to find. However like dark matter, dark users are observable due to their effects on the rest of the universe. If a dark user comments on a stream entry, I can see that comment. More importantly, I can see their user-ID, and I can generate a URL to a page that will contain their name. I can then watch for their activities elsewhere. Granted, I can't directly search for their activity, but I can observe their effects on my friends. For want of a better term, I've been calling this "dark stalking". What makes this all rather chilling is that I'm doing all of this via the application API. If your friend has installed an application, then it can access quite a lot of information about you, unless you turn it off. If your friend has granted the application the read_stream privilege, then it can read your status stream. Even if a friend of a friend has done this, and you comment on your friend's status entries, it's possible to infer your existence and retrieve those discussions through dark stalking."
rack bank

Dedicated Server Hosting in India - 0 views

  •  
    Dedicated Server Hosting Solutions support a wide range of dedicated workloads which requires a high performance like remote desktop, dedicated email servers, virtualization, high volume real time database applications and telephony. Rackbank offer dedicated server with the configurations which perfectly suits your business requirement.
Tamsin Lloyd

One Laptop Per Child jumps on tablet bandwagon - 0 views

  •  
    Interesting article applicable to the issues with the digital divide. Most notable is the way that many developing countries are 'skipping' over technology-steps: ie, going straight to mobiles without any landline infrastructure or going straight to tablet computers without ever having desktops.
César Albarrán Torres

Google Person Finder: Chile Earthquake - 1 views

  •  
    Google launches an application to find people affected by the Chilean earthquake. Note disclaimer.  "PLEASE NOTE: All data entered will be available to the public and viewable and usable by anyone. Google does not review or verify the accuracy of this data."
César Albarrán Torres

It's Time to Declare War Against Apple's Censorship - Apple - Gizmodo - 2 views

  • The App Store censorship horse may have been beaten to death, but mainstream German media—whose iPhone applications have been censored by Apple because of its content—are not surrendering. I'm glad. In fact, I hope they win this war.
  • The censorship problem is not only about the 5,000 titillating apps that fell down in flames after Apple's latest puritanic raid
  • Apple took down Stern's iPhone app without notice. Stern—a very large weekly news magazine—published a gallery of erotic photos as part of its editorial content.
  • ...2 more annotations...
  • They learnt their lesson, since they haven't published any other material that may offend Apple's "moral police"
  • And it doesn't have to be about Apple or tits. There are plenty of applications that have been deemed blasphemous or offensive by Apple, and banned from publication. Would publications showing a caricature of Prophet Mohamed be taken down as well? That would get Phil Schiller plenty of complaint letters.
  •  
    Apple has taken down two apps from German media, as they were considered offensive. This moves towards censorship could extend to a larger control of editorial content. Do media have to comply? 
Tamsin Lloyd

Where does privacy fit in the online video revolution? | Victor Keegan | Technology | g... - 1 views

  •  
    We all know video content is one of the most popular types of content on the web, driving some of the most innovative and popular web based applications (for example Skype, ChatRoulette, YouTube). However, new video-centric applications, which combine real-time, social networking and broadcasting are putting an even more intense spotlight on questions of privacy than ever before. This particular article profiles examples that are surely just web minutes away from the tipping point, giving users the chance to broadcast their lives in ways Twitter can only dream of. Surprisingly, the article only touches on privacy issues, suggesting that we are too willing to post personal information about ourselves. Reader comments rightly point out we are moving into very murky territory where the attitude seems to be that anything posted on the web is fair game and can be used against the person who posted it.
  •  
    What does it mean for both your privacy and personal reputation if you are putting everything online? If governments/corporations/employers etc can access so much personal information about you, how will this affect your life and the 'control' that such organisations have?
anonymous

China-Based Hackers may Have used Twitter, Google to Attack Dalai Lama - 0 views

  •  
    This article (posted yesterday) is about the announcement of a huge China-based cyber espionage which stole thousands of documents - including classified information, visa applications, and personal identities - from "politically sensitive targets" around the world using platforms such as Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo Mail to maintain persistent control of infected computers. Among the targets: the offices of the Dalai Lama, the United Nations as well as Indian and Pakistani government officials. Also available in this article, a report document of 58 pages about "Investigating Cyber Espionnage" (scribd application)
Bujuanes Livermore

China creates another new rule: domain name registrants to now provide the Chinese gove... - 1 views

  •  
    GoDaddy.com, the world's largest domain name registration company is taking similar action to Google by deciding to not conduct further business in China. This decision is a reaction to China now demanding that applicants of domain names are to provide additional personal information, including a full colour head shot photograph. While China maintains forcing applicants to register extensive personal information will curb the creation of unsavoury sites (namely pornography) everyone else outside of the Chinese government believes such detailed personal information will equip the government to target any individual (to what extent - who knows) displaying any content that the government does not support. Is this an invasion of privacy? Should people be able to exercise multiple personas on the internet, or should you be who you are? If a government is to collect such information who will ensure the information it collects isn't abused? Do we answer these questions differently when thinking of China i.e. what would the answers be if Australia was to introduce such a law? At the very least, it's a relief to see companies realising that China is compromising the values of the internet and are reacting suitably by taking their services out of the country. More need to participate in the retalliation.
Tiana Stefanic

Adobe vs. Apple is going to get uglier | ITworld - 0 views

  •  
    Apparently the showdown between Adobe and Apple might result in a lawsuit in the weeks to come. Adobe has 95% Web browser market penetration, whilst apparently Apple has a monopoly on mobile applications, to the tune of 99.4% of downloads. It seems like some sort of synergy must be reached between the two companies.
Anne Zozo

Always-on iPhone apps raise new promises, perils for location privacy | VentureBeat - 0 views

  •  
    Apple announced that it will be now possible to run different apps on the iPhone at the same time and keep them constantly running in the background. This means for application providers that they coud now constantly get information on the whereabouts of their users instead of the sporadic data they got so far. Exciting new opportunities for Apple's new "iAd" that offers targeted advertising. At the same time there are privacy concerns on several fronts.
lacey walker

Why 'location' aps haven't gone main stream - 0 views

  •  
    Ahhhh location applications....the possibilities, the privacy issues. Why wouldn't everyone want their GPS location displayed as public record? A good explanation of why only 7% of Americans are currently using location aps. The important things for consumers to know would be who could access their data and for what purposes. Not only who and for what purpose but another question for consideration is who would have policing authority over the data.
M M

University to Provide Online Reputation Management to Graduates - 0 views

  •  
    A university in the U.S. has provided an online reputation management program for all its graduating seniors. Since majority of companies are performing background checks on job applicants, this will allow students to clean up their Facebook and Twitter profiles. This step made by the university seems very beneficial, since for majority of the younger generation who don't know how it is not to have the Internet, the separation between online and real-life identities is a fine line. 
Alaian Higgins

Short Term Cash Loans Today - Easily Fulfill Your Urgent Daily Expenditures Quickly - 0 views

  •  
    You have almost an empty pocket in end of the month or If you find difficulty in cracking your financial problems, get applied with cash loans today. This is the finest monetary solution that offers quick relief from financial worries. So you can go online for the affordable and reasonable deal of all.
Qi Li

The First Internet President - 0 views

  •  
    This article has explored the successful application of internet in Obama's political campaign. Obama's is said to be the first internet president. This article analyzes the advantage of the new media internet campared to the traditional media such as Newspaper, Television, radio, newspaper and so on. As is listed in the article the main advantages of the internet for the campaign use are including the ability to focus on specific demographic segment, and the convenience to create a place for participant to donate, and as is said by the author Samuel Greengard "Obama's staff could conduct polls, solicit ideas and opinions, and hold online town,hall meetings." However this article does not explore the reasons why Internet has this power deeply enough. Behind this power, in my opinoin, it is the "recursive public" that exerts impacts, it would be better if the author also to the "social capital" theory to analyze the power of the internet.
Andra Keay

artists nude image fee - 0 views

  •  
    Australian censorship laws reach a new level.
  •  
    I'm not certain how this fits into the RC internet filtering, but by requiring artists to lodge a $500 application for expert appraisal to certify an image 'art' as opposed to any old image that is subject to child pornography laws, you implicity RC everything else.
Bec Crew

When Cyber Bullying Goes Too Far - 0 views

  •  
    An article about cyber bullying via Facebook groups. Notes that it doesn't just happen between peers, but adults can be the victim too, citing an example of a Facebook group created by students to bully a teacher. The article outlines the procedure that it taken to deal with this kind of bullying and the applicable laws on place to curb it.
Elizabeth Gan

Hackers: not just geeks, but activists - 0 views

  •  
    It's quite interesting that the term "hackers" was often deemed negative. However, in this following article, the discussion of "White hat" hackers vs. "Black hat" introduces the idea that cyber security/cyber espionage in the online world can also be saved by the same breed that seek to do criminal activies. These white hat hackers were able to uncover a Chinese-based espionage ring that had been gleaning sensitive information: visa applications. People no longer simply hold posters chanting and marching against the "man," rather, they stick it to them, by strengthening the masses in the online world.
Sandra Rivera

WhiteHouse.gov Releases Open Source Code | The White House - 1 views

  • As part of our ongoing effort to develop an open platform for WhiteHouse.gov, we're releasing some of the custom code we've developed. This code is available for anyone to review, use, or modify. We're excited to see how developers across the world put our work to good use in their own applications.
  •  
    The Whitehouse released the code of the open platform developed for whitehouse.org, to encourage reviews and improvements to the platform
Louise McClean

Apple faces patent suits over iTunes Store, Safari, Mac OS X - 0 views

  •  
    Apple is one of several companies being sued for an alleged iTunes patent breach of an idea which is an online store for music downloads, some of Apple's other applications are also being sued for other patent breaches. Apple's operating Systems & Safari are also being sued by a Monkeymedia for breaching patents which dictate ways of displaying varying amounts of data through user control.
1 - 20 of 24 Next ›
Showing 20 items per page