Skip to main content

Home/ Internetni praktikum/ Group items tagged details

Rss Feed Group items tagged

Jernej Prodnik

Google raises privacy fears as personal details are released to app developers | Techno... - 0 views

  • Google raises privacy fears as personal details are released to app developers Campaigner says tech giant's policies don't make it clear that Google Play users who buy apps give over information
  • Charles Arthur guardian.co.uk, Monday 25 February 2013 14.39 GMT
  • Google Play: the personal details of app buyers are released to developers Google could face a third privacy row in a two years, after a leading campaigner called for the US government to investigate the fact that the names, geographic region and email addresses of people who buy apps from its Play store are passed on to the app developers without users' explicit permission.
  • ...5 more annotations...
  • Ben Edelman, an associate professor at Harvard Business School, says that analysis of Google's terms and conditions relating to its Google Play store and Google Wallet transaction system (used for buying apps) doesn't show any clauses where users are specifically told that their emails will be sent on to the developer. He also warns that developers could use that information to "track and harass" people who have given apps low ratings or requested refunds. And hackers – or malicious developers – could create personalised emails to send out to people to steal passwords (phishing) or install "updates" that were actually malware.
  • Google says it has to provide some location data about which country apps are bought in so developers can calculate the correct amount of tax to pay. But that does not explain why it passes on buyers' names and email addresses, which together with a postcode could be used to identify a person's location and address."Google's prior privacy blunders have put [it] under higher scrutiny," Edelman says, pointing to the 20-year consent order with the US Federal Trade Commission that Google signed in March 2011 in the wake of its Buzz social network fiasco – followed by a record $22.5m fine in August 2012 for hacking Apple users' browsers to install tracking cookies. It has also been fiercely criticised in Europe for its changes in March 2012 to its privacy policies, which data protection chiefs said could mean "uncontrolled" use of personal data.
  • Eric Butler, a freelance software developer of the Tapchat and Farebot apps, tweeted in July 2012 "I wonder if most Android users realise that when you buy an app in the Play Store the seller [of the app] can see your name, email address and phone."Following the row, he has noted on his blog that "Because the entire experience of purchasing Android apps is so sloppy, it's not unreasonable to assume that this privacy issue was actually an oversight." But, he says, "Google should follow Apple's lead and offer users and developers better privacy protection."
  • Another developer, Jesse Wilson, pointed out the same problem in November on Google+, and was quickly echoed by Chris Lacy, who said that "as a developer I never asked for this information, I have no need for it, and I simply do not want to be a custodian of such information."Lacy added that "As a consumer, this is distressing on many levels: there is no fair warning that this information will be transferred … trusting my personal information to Google is one thing. But with this system, users are unknowingly having to trust their information to a third party. There's no way to know what security measures that third party might have in place." He added that it meant that the app developer "has gained my personal information without requesting the appropriate permissions via the app."
  • Google has said that passing on the details does not breach its privacy conditions. In a quote to Siliconvalley.com, a representative told the site that "Google Wallet shares the information necessary to process a transaction, which is clearly spelled out in the Google Wallet privacy notice."
petra funtek

Social networks: after privacy, beyond friendship | openDemocracy - 0 views

  • irst, research shows that social-networking sites are a serious risk when accessed at work.
  • Facebook at work". It may sound ridiculous, but the purpose is to ensure that employees are not putting their personal and corporate data out to tender.
  • The second reason is that once uploaded, personal details can become public possession - and not just for now but, effectively, forever. News Corp bought MySpace to exploit what previously had been unthinkable to advertisers: customers telling you what they want without you even asking.
  • ...2 more annotations...
  • he irony in all this is that Facebook - which in September 2007 overtook MySpace in Britain as the preferred site for individual users - was originally set up to mirror rather than overturn the "intimacy" and exclusiveness of real-world, face-to-face networks. Andrew McCollum, one of the founders of Facebook, explained to me that they based the project on a pretty closed community, namely university colleges.
  • Social networks: after privacy, beyond friendship
petra funtek

After Leveson: the internet needs regulation to halt 'information terrorism' | Media | ... - 1 views

  • After Leveson: the internet needs regulation to halt 'information terrorism'
  • We are heading into a future of no regulation with the internet where its monoliths will have plenty of clout, pretty well unfettered by democratic national governments (but not totalitarian ones, like China).
  • How does information terrorism work?What's coming in the future could be far more deadly, involving widespread smears, character assassinations and the destruction of companies and maybe even institutions. And by then we may not have a vigorous press to hold it to account.
  • ...4 more annotations...
  • it is no longer reasonable for the big players - the Googles, Facebooks, YouTubes and Twitters - to say: "Nothing to do with us, guv, we only provide the pipes. What goes through them, that's up to the folk who put it there."
  • To illustrate an example of information misuse, it's worth recounting the alarming experience of a work colleague at the hands of Facebook. Someone he did not know took his name and set up a Facebook page purporting to be his, along with a photo and several intimate details, some true, some false.
  • Citing "freedom of expression", which like motherhood and apple pie is impossible to attack, they will host their anonymous contributors' bullying, lies, smears, breathtaking invasions of privacy
  • An entirely new information world is rising in which each of us can be readers and editors, contributors and subscribers, and maybe even proprietors, at the same time.
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
sintija

BBC News - Google told to fix privacy policy by EU data regulators - 0 views

  • Google told to fix privacy policy by EU data regulators
  • consolidate 60 separate privacy policies into a single agreement.
  • Google has been told it should give clearer information about what data is being collected and for what purpose. It has also been told to give users more control over how the information is combined.
  • ...4 more annotations...
  • Google
  • has been accused of providing "incomplete and approximate" details raising "deep concerns about data protection and the respect of the European law".
  • It said that EU data protection laws place limits on such activities and proposed the following changes:
  • Google must "reinforce users' consent". It suggests this could be done by allowing its members to choose under what circumstances data about them was combined by asking them to click on dedicated buttons. The firm should offer a centralised opt-out tool and allow users to decide which of Google's services provided data about them. Google should adapt its own tools so that it could limit data use to authorised purposes. For example, it should be able to use a person's collated data to improve security efforts but not to target advertising.
Katja Saje

Readers' privacy is under threat in the digital age | Books | The Guardian - 1 views

  • Every time you read a newspaper on your computer or buy an ebook, you can leave an electronic trail behind you. That trail is potentially lucrative for business, and is a new source of surveillance for government and law enforcement.
  • Retailers and search engines, most notably Amazon and Google, can now gather an astonishingly detailed portrait of our book-reading habits: what we buy, what we browse, the amount of time we spend on a page and even the annotations we make in an ebook.
  • Amazon also reserves the right to disclose information when it "believes release is appropriate to comply with the law". A stronger protection for our privacy should require a warrant before personal data is released.
  • ...2 more annotations...
  • Awareness of the problem is growing, from Google's catastrophic launch of its social network Buzz in 2010, which shared users' contacts without their permission, to the revelation last year that Facebook was still tracking users' browsing information after they had logged out.
  • The new possibilities for surveillance undermine the fundamental privacy of the act of reading.
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Neža Zidanič

Warning over social networking 'snooping' technology - Telegraph - 0 views

  • New stalking software capable of tracking people’s movements and predicting future behaviour using data from social networking websites has been developed, it emerged today.
  • The sophisticated technology relies on websites such as Facebook and Twitter to build a detailed picture of people’s lives in a move that could raise concerns over breach of privacy and civil liberties.
  • t was claimed that the technology could be transformed into a "Google for spies" and used by governments as a means of monitoring and controlling people online.
  • ...1 more annotation...
  • Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search."
Veronika Lavrenčič

Birth of the Web Browser, World Wide Web | Article by Sonet Digital - 1 views

  • Birth of the Web Browser
  • im Berners-Lee (now Sir Tim)
  • in 1980
  • ...21 more annotations...
  • 'Enquire-Within-Upon-Everything'
  • He needed some means
  • he set to work to resolve the problems associated with diverse communities of scientists sharing data between themselves
  • By 1989, the Internet was well established
  • he World Wide Web came into being.
  • To view retrieved documents he wrote a browser
  • and to store and transmit them, the first web server.
  • 'WorldWideWeb'
  • Nexus
  • Tim Berners-Lee submitted a paper to CERN's board for evaluation, 'Information Management: A Proposal', wherein he detailed and encouraged the adoption of hypertext as the means to manage and collate the vast sum of information
  • distribute web server and browser software on the Internet.
  • The browser
  • tied to a specific make of computer,
  • Soon browsers for different platforms started appearing,
  • Mosaic took off in popularity to such an extent that it made front page of the New York Times' technical section in late 1993,
  • CompuServe, AOL and Prodigy begin offering dial-up internet access
  • Andreessen
  • Jim Clark
  • Silicon Graphics Inc.)
  • Mosaic Communications Corporation
  • had to start from scratch
  •  
    Tretji del serije člankov, ki govorijo o preteklosti in sedanjosti interneta.
petra funtek

EBSCOhost: RIAA, MPAA, and the Digital Piracy Issue: Comparing Public Relations Strate... - 1 views

  • The downloading of copyrighted content has been a common concern for the motion picture and music recording industries, but their public relations response has been quite different.
  • A significant, moderate correlation of attributes used to frame this issue was found between the RIAA press releases and media coverage, but not between the MPAA press releases and the media.
petra funtek

EBSCOhost: Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets ... - 2 views

  • Downloading?
  • Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets Television
  • This paper explores the Brazilian cultural practices of illegal downloading of American television programs. Through research on television show forums, fandom websites, fan communities in the social networking website Orkut, the networks' homepages and literature review, piracy is shown to be related to cultural practices and an inadequate broadcasting system. It seems Brazilian fans persist in breaking the law when downloading television shows from unauthorized sources, regardless of the severe legal penalties to transgressors. They use a popular 'problem-solving strategy' (Duarte, 2006) called jeitinho brasileiro to respond to the delay or unavailability of U.S. programming on Brazilian cable and free to air television. The jeitinho brasileiro is exemplified by the fans having organized systems for file sharing of the episodes in Orkut fan communities. The study looks at a group of fans named legenders, who produce subtitles for the downloaded shows as a hobby, also despite of the Brazilian legislation on intellectual property protection. Furthermore, the paper explains why Brazilians who download television shows do not respect the law in reference to cultural, economic and political contexts. It concludes with the idea that the broadcasting industry must update and adapt its television programming distribution system, taking into account the particular context of each country, such as in Brazil.
1 - 14 of 14
Showing 20 items per page