Skip to main content

Home/ TOK Friends/ Group items tagged delete

Rss Feed Group items tagged

gszumel

North Korea Deletes 350,000 Articles From Its Highly Reliable State-Run News Site - Yah... - 1 views

  •  
    North Korea attempting to alter history by deleting it.
Javier E

I Downloaded the Information That Facebook Has on Me. Yikes. - The New York Times - 0 views

  • When I downloaded a copy of my Facebook data last week, I didn’t expect to see much. My profile is sparse, I rarely post anything on the site, and I seldom click on ads
  • With a few clicks, I learned that about 500 advertisers — many that I had never heard of, like Bad Dad, a motorcycle parts store, and Space Jesus, an electronica band — had my contact information
  • Facebook also had my entire phone book, including the number to ring my apartment buzzer. The social network had even kept a permanent record of the roughly 100 people I had deleted from my friends list over the last 14 years, including my exes.
  • ...16 more annotations...
  • During his testimony, Mr. Zuckerberg repeatedly said Facebook has a tool for downloading your data that “allows people to see and take out all the information they’ve put into Facebook.”
  • Most basic information, like my birthday, could not be deleted. More important, the pieces of data that I found objectionable, like the record of people I had unfriended, could not be removed from Facebook, either.
  • “They don’t delete anything, and that’s a general policy,” said Gabriel Weinberg, the founder of DuckDuckGo, which offers internet privacy tools. He added that data was kept around to eventually help brands serve targeted ads.
  • When you download a copy of your Facebook data, you will see a folder containing multiple subfolders and files. The most important one is the “index” file, which is essentially a raw data set of your Facebook account, where you can click through your profile, friends list, timeline and messages, among other features.
  • Upon closer inspection, it turned out that Facebook had stored my entire phone book because I had uploaded it when setting up Facebook’s messaging app, Messenger.
  • Facebook also kept a history of each time I opened Facebook over the last two years, including which device and web browser I used. On some days, it even logged my locations, like when I was at a hospital two years ago or when I visited Tokyo last year.
  • what bothered me was the data that I had explicitly deleted but that lingered in plain sight. On my friends list, Facebook had a record of “Removed Friends,” a dossier of the 112 people I had removed along with the date I clicked the “Unfriend” button. Why should Facebook remember the people I’ve cut off from my life?
  • Facebook said unfamiliar advertisers might appear on the list because they might have obtained my contact information from elsewhere, compiled it into a list of people they wanted to target and uploaded that list into Facebook
  • Brands can obtain your information in many different ways. Those include:
  • ■ Buying information from a data provider like Acxiom, which has amassed one of the world’s largest commercial databases on consumers. Brands can buy different types of customer data sets from a provider, like contact information for people who belong to a certain demographic, and take that information to Facebook to serve targeted ads
  • ■ Using tracking technologies like web cookies and invisible pixels that load in your web browser to collect information about your browsing activities. There are many different trackers on the web, and Facebook offers 10 different trackers to help brands harvest your information, according to Ghostery, which offers privacy tools that block ads and trackers.
  • ■ Getting your information in simpler ways, too. Someone you shared information with could share it with another entity. Your credit card loyalty program, for example
  • I also downloaded copies of my Google data with a tool called Google Takeout. The data sets were exponentially larger than my Facebook data.
  • For my personal email account alone, Google’s archive of my data measured eight gigabytes, enough to hold about 2,000 hours of music. By comparison, my Facebook data was about 650 megabytes, the equivalent of about 160 hours of music.
  • In a folder labeled Ads, Google kept a history of many news articles I had read, like a Newsweek story about Apple employees walking into glass walls and a New York Times story about the editor of our Modern Love column. I didn’t click on ads for either of these stories, but the search giant logged them because the sites had loaded ads served by Google.
  • In another folder, labeled Android, Google had a record of apps I had opened on an Android phone since 2015, along with the date and time. This felt like an extraordinary level of detail.
Javier E

This is what it's like to grow up in the age of likes, lols and longing | The Washingto... - 1 views

  • She slides into the car, and even before she buckles her seat belt, her phone is alight in her hands. A 13-year-old girl after a day of eighth grade.
  • She doesn’t respond, her thumb on Instagram. A Barbara Walters meme is on the screen. She scrolls, and another meme appears. Then another meme, and she closes the app. She opens BuzzFeed. There’s a story about Florida Gov. Rick Scott, which she scrolls past to get to a story about Janet Jackson, then “28 Things You’ll Understand If You’re Both British and American.” She closes it. She opens Instagram. She opens the NBA app. She shuts the screen off. She turns it back on. She opens Spotify. Opens Fitbit. She has 7,427 steps. Opens Instagram again. Opens Snapchat. She watches a sparkly rainbow flow from her friend’s mouth. She watches a YouTube star make pouty faces at the camera. She watches a tutorial on nail art. She feels the bump of the driveway and looks up. They’re home. Twelve minutes have passed.
  • Katherine Pommerening’s iPhone is the place where all of her friends are always hanging out. So it’s the place where she is, too.
  • ...19 more annotations...
  • “Over 100 likes is good, for me. And comments. You just comment to make a joke or tag someone.”
  • The best thing is the little notification box, which means someone liked, tagged or followed her on Instagram. She has 604 followers. There are only 25 photos on her page because she deletes most of what she posts. The ones that don’t get enough likes, don’t have good enough lighting or don’t show the coolest moments in her life must be deleted.
  • Sociologists, advertisers, stock market analysts – everyone wants to know what happens when the generation born glued to screens has to look up and interact with the world.
  • “It kind of, almost, promotes you as a good person. If someone says, ‘tbh you’re nice and pretty,’ that kind of, like, validates you in the comments. Then people can look at it and say ‘Oh, she’s nice and pretty.’ ”
  • School is where she thrives: She is beloved by her teachers, will soon star as young Simba in the eighth-grade performance of “The Lion King” musical, and gets straight A’s. Her school doesn’t offer a math course challenging enough for her, so she takes honors algebra online through Johns Hopkins University.
  • “Happy birthday posts are a pretty big deal,” she says. “It really shows who cares enough to put you on their page.”
  • He checks the phone bill to see who she’s called and how much she’s been texting, but she barely calls anyone and chats mostly through Snapchat, where her messages disappear.
  • Some of Katherine’s very best friends have never been to her house, or she to theirs. To Dave, it seems like they rarely hang out, but he knows that to her, it seems like they’re together all the time.
  • Dave Pommerening wants to figure out how to get her to use it less. One month, she ate up 18 gigabytes of data. Most large plans max out at 10. He intervened and capped her at four GB. “I don’t want to crimp it too much,” he says. “That’s something, from my perspective, I’m going to have to figure out, how to get my arms around that.”
  • Even if her dad tried snooping around her apps, the true dramas of teenage girl life are not written in the comments. Like how sometimes, Katherine’s friends will borrow her phone just to un-like all the Instagram photos of girls they don’t like. Katherine can’t go back to those girls’ pages and re-like the photos because that would be stalking, which is forbidden.
  • Or how last week, at the middle school dance, her friends got the phone numbers of 10 boys, but then they had to delete five of them because they were seventh-graders. And before she could add the boys on Snapchat, she realized she had to change her username because it was her childhood nickname and that was totally embarrassing.
  • Then, because she changed her username, her Snapchat score reverted to zero. The app awards about one point for every snap you send and receive. It’s also totally embarrassing and stressful to have a low Snapchat score. So in one day, she sent enough snaps to earn 1,000 points.
  • Snapchat is where flirting happens. She doesn’t know anyone who has sent a naked picture to a boy, but she knows it happens with older girls, who know they have met the right guy.
  • Nothing her dad could find on her phone shows that for as good as Katherine is at math, basketball and singing, she wants to get better at her phone. To be one of the girls who knows what to post, how to caption it, when to like, what to comment.
  • Katherine doesn’t need magazines or billboards to see computer-perfect women. They’re right on her phone, all the time, in between photos of her normal-looking friends. There’s Aisha, there’s Kendall Jenner’s butt. There’s Olivia, there’s YouTube star Jenna Marbles in lingerie.
  • The whole world is at her fingertips and has been for years. This, Katherine offers as a theory one day, is why she doesn’t feel like she’s 13 years old at all. She’s probably, like, 16.
  • “I don’t feel like a child anymore” she says. “I’m not doing anything childish. At the end of sixth grade” — when all her friends got phones and downloaded Snapchat, Instagram and Twitter — “I just stopped doing everything I normally did. Playing games at recess, playing with toys, all of it, done.”
  • Her scooter sat in the garage, covered in dust. Her stuffed animals were passed down to Lila. The wooden playground in the back yard stood empty. She kept her skateboard with neon yellow wheels, because riding it is still cool to her friends.
  • On the morning of her 14th birthday, Katherine wakes up to an alarm ringing on her phone. It’s 6:30 a.m. She rolls over and shuts it off in the dark. Her grandparents, here to celebrate the end of her first year of teenagehood, are sleeping in the guest room down the hall. She can hear the dogs shuffling across the hardwood downstairs, waiting to be fed. Propping herself up on her peace-sign-covered pillow, she opens Instagram. Later, Lila will give her a Starbucks gift card. Her dad will bring doughnuts to her class. Her grandparents will take her to the Melting Pot for dinner. But first, her friends will decide whether to post pictures of Katherine for her birthday. Whether they like her enough to put a picture of her on their page. Those pictures, if they come, will get likes and maybe tbhs. They should be posted in the morning, any minute now. She scrolls past a friend posing in a bikini on the beach. Then a picture posted by Kendall Jenner. A selfie with coffee. A basketball Vine. A selfie with a girl’s tongue out. She scrolls, she waits. For that little notification box to appear.
markfrankel18

Erasing History in the Internet Era - NYTimes.com - 1 views

  • Lorraine Martin, a nurse in Greenwich, was arrested in 2010 with her two grown sons when police raided her home and found a small stash of marijuana, scales and plastic bags. The case against her was tossed out when she agreed to take some drug classes, and the official record was automatically purged. It was, the law seemed to assure her, as if it had never happened.
  • Defamation is the publication of information that is both damaging and false. The arrest story was obviously true when it was first published. But Connecticut’s erasure law has already established that truth can be fungible. Martin, her suit says, was “deemed never to have been arrested.” And therefore the news story had metamorphosed into a falsehood.
  • They debate the difference between “historical fact” and “legal fact.” They dispute whether something that was true when it happened can become not just private but actually untrue, so untrue you can swear an oath that it never happened and, in the eyes of the law, you’ll be telling the truth.
  • ...7 more annotations...
  • Google’s latest transparency report shows a sharp rise in requests from governments and courts to take down potentially damaging material.
  • In Europe, where press freedoms are less sacred and the right to privacy is more ensconced, the idea has taken hold that individuals have a “right to be forgotten,” and those who want their online particulars expunged tend to have the government on their side. In Germany or Spain, Lorraine Martin might have a winning case.
  • The Connecticut case is just one manifestation of an anxious backlash against the invasive power of the Internet, a world of Big Data and ever more powerful search engines, in which it seems almost everything is permanently recorded and accessible to almost anyone — potential employers, landlords, dates, predators
  • The Times’s policy is not to censor history, because it’s history. The paper will update an arrest story if presented with evidence of an acquittal or dismissal, completing the story but not deleting the story.
  • Owen Tripp, a co-founder of Reputation.com, which has made a business out of helping clients manage their digital profile, advocated a “right to be forgotten” in a YouTube video. Tripp said everyone is entitled to a bit of space to grow up, to experiment, to make mistakes.
  • “This is not just a privacy problem,” said Viktor Mayer-Schönberger, a professor at the Oxford Internet Institute, and author of “Delete: The Virtue of Forgetting in the Digital Age.” “If we are continually reminded about people’s mistakes, we are not able to judge them for who they are in the present. We need some way to put a speed-brake on the omnipresence of the past.”
  • would like to see search engine companies — the parties that benefit the most financially from amassing our information — offer the kind of reputation-protecting tools that are now available only to those who can afford paid services like those of Reputation.com. Google, he points out, already takes down five million items a week because of claims that they violate copyrights. Why shouldn’t we expect Google to give users an option — and a simple process — to have news stories about them down-ranked or omitted from future search results? Good question. What’s so sacred about a search algorithm, anyway?
sissij

Sleeping Wipes Out Certain Memories - And That's a Good Thing, Reveal Studies | Big Think - 0 views

  • But what is its evolutionary purpose – what kind of changes do our brains undergo when we sleep?
  • suggest our brains undergo a pruning cycle while we rest.
  • Its important to note these studies are still in their early stages. The tests were done on mice.
  • ...3 more annotations...
  • letting us forget the less relevant information while strengthening memories that may be important.
  • However, modern humans don't abide by a natural sleep cycle anymore – we look at our phones before bed and expose ourselves to things that cause our brains to think sleep is not on the menu.
  • they might not require a chemical crutch to get some rest.
  •  
    This article shows that how unreliable our memory is. Every night when we go to sleep, our memory is edited and our brain would delete some irrelevant things. So our memory is not a primary source and I think the words of witnesses on the court can only be a reference, not a direct evidence. Also, in this article, the author states the uncertainties and limits of the experiment, showing that the result of the experiment in this stage can only serves as a suggestion, not a direct evidence. --Sissi (2/7/2017)
grayton downing

BBC News - Y chromosome: Why men contribute so little - 0 views

  • "The Y chromosome is a symbol of maleness," lead researcher Professor Monika Ward told the BBC.
  • "may be possible to eliminate the Y chromosome" if the role of these genes could be reproduced in a different way, but added a world without men would be "crazy" and "science fiction".
  • "But on a practical level it shows that after large deletions of the Y chromosome it is still possible to reproduce, which potentially gives hope to men with these large deletions,
  • ...2 more annotations...
  • "The experiments are elegant and seem to show that in the mouse sperm production can be achieved when only two genes from the Y-chromosomes are present.
  • "Whilst this is of limited use in understanding human fertility, this kind of work is important if we are to unravel to complexities of how genes control fertility."
manhefnawi

How the Brain Deletes Old Memories | Science | AAAS - 0 views

  • Although the precise role of neurogenesis in memory is still controversial, more than a decade of research has demonstrated that boosting neurogenesis with exercise and antidepressants such as Prozac can increase rodents' ability to learn new information about places and events. A few years ago, however, neuroscientist Paul Frankland of the Hospital for Sick Children in Toronto, Canada, noticed that some of the animals in his experiment actually did worse on certain memory tasks when their neuron birth rates had been ramped up. In particular, they performed poorly on tests that required them to retain details about past events.
  • It is difficult to completely eliminate the birth of new neurons in infant mice, but by genetically engineering dividing neural stem cells to self-destruct the team was able to achieve about a 50% reduction of neurogenesis in the animals, Frankland says. With less neurogenesis, the young rodents acted more like adult mice in the experiment. They froze when first placed in the box for roughly a week, rather than just 1 day, after receiving the foot shocks.
Javier E

Daily Dot | After a half-decade, massive Wikipedia hoax finally exposed - 1 views

  • the Bicholim Conflict was still labelled a "Good Article," a status it had received just two months after being created in July, 2007. That status is a step down from featured, but still a designation given to less than 1 percent of all English-language articles on the site.
  • A half-decade sounds like a long time. But while impressive, seven other Wikipedia hoaxes have actually lived longer. These include an article on a supposed torture device called "Crocodile Shears" (which persisted for six years and four months) and one on Chen Fang, a Harvard University student who, intent to demonstrate the limitations of Wikipedia, named himself the mayor of a small Chinese town. It took more than seven years for Wikipedia editors to finally strip Chen of that mayorship.
Javier E

Concern Over Colin Powell's Hacked Emails Becomes a Fear of Being Next - The New York T... - 0 views

  • The latest hack could well spur a new rash of email deletions across the country as millions of people scan their sent mail for anything compromising, humiliating or career-destroying. It adds to the sense that everyone is vulnerable.
  • “I think more and more people are realizing that there isn’t a thing you can say in an email that isn’t likely to be hackable or discoverable at some later point,”
  • Washington may be behind other big cities in learning that lesson. Bankers on Wall Street have favored very brief emails since their conversations were splashed across front pages because of lawsuits filed after the financial crisis. In 2010, Goldman Sachs executives used the acronym “LDL,” for “let’s discuss live,” when a conversation turned at all sensitive.
  • ...3 more annotations...
  • Similar precautions have been common in Silicon Valley since a 2009 Chinese state cyberattack on servers at Google and other tech companies.
  • Hank Paulson, a former Goldman Sachs chief executive, refuses to use email. Ben S. Bernanke, a former chairman of the Federal Reserve, once set up an email account under the pseudonym Edward Quince in the hopes of greater privacy.
  • In Hollywood, a breach at Sony Pictures in 2014 spilled out gossipy secrets and persuaded film crews, actors and executives alike to adopt security measures they once considered paranoid. Studios have turned to a new class of companies with names like WatchDox that wrap screenplays with encryption, passwords and monitoring systems that can track who has access to confidential files.
Javier E

Fact Check: This Pizzeria Is Not a Child-Trafficking Site - The New York Times - 0 views

  • images, pilfered from the restaurant’s social media pages and the personal accounts of friends who had “liked” Comet Ping Pong online. Those photos have been used across dozens of websites. Parents, who declined to talk publicly for fear of retribution, have hired lawyers to get the photos removed.
  • Musicians who have performed at Comet Ping Pong have been pulled in, too. Amanda Kleinman, whose band, Heavy Breathing, has performed there several times, deleted her Twitter account after the abusive comments became overwhelming. Similar comments have flooded her YouTube music clips
  • “We are at a dangerous place in American culture where a good percentage of people aren’t distinguishing what is a real news source based on real reporting and fact-checking and only reinforcing pre-existing ideas they have,” Ms. Kleinman said.
  • ...2 more annotations...
  • The frustration has been compounded by the lack of recourse for Mr. Alefantis, his friends and employees. Yelp blocked the comments sections of Comet Ping Pong’s review page after reports of abusive comments and fake news in reviews. YouTube said it prohibits threats, harassment and hate speech and has tools for flagging violations and filing complaints for the site to take further action, but has largely not blocked comments on these videos. Twitter declined to comment, and Facebook did not have any further comment.
  • After employees and Mr. Alefantis complained to Reddit about how Comet Ping Pong was being targeted on the site, the #pizzagate discussion thread posted a warning that revealing personal information about individuals was prohibited.“We know that we have more work to do and we take our responsibility to address online abuse seriously,” Reddit said in a statement
Javier E

In This Snapchat Campaign, Election News Is Big and Then It's Gone - The New York Times - 1 views

  • Every modern presidential election is at least in part defined by the cool new media breakthrough of its moment.
  • In 2000, there was email, and by golly was that a big change from the fax. The campaigns could get their messages in front of print and cable news reporters — who could still dominate the campaign narrative — at will,
  • Then 2008: Facebook made it that much easier for campaigns to reach millions of people directly,
  • ...17 more annotations...
  • The 2004 campaign was the year of the “Web log,” or blog, when mainstream reporters and campaigns officially began losing any control they may have had over political new
  • Marco Rubio’s campaign marched into the election season ready to fight the usual news-cycle-by-news-cycle skirmishes. It was surprised to learn that, lo and behold, “There was no news cycle — everything was one big fire hose,” Alex Conant, a senior Rubio strategist, told me. “News was constantly breaking and at the end of the day hardly anything mattered. Things would happen; 24 hours later, everyone was talking about something else.”
  • Snapchat represents a change to something else: the longevity of news, how durably it keeps in our brain cells and our servers.
  • Snapchat is recording the here and the now, playing for today. Tomorrow will bring something new that renders today obsolete. It’s a digital Tibetan sand painting made in the image of the millennial mind.
  • Snapchat executives say they set up the app this way because this is what their tens of millions of younger users want; it’s how they live.
  • They can’t possibly have enough bandwidth to process all the incoming information and still dwell on what already was, can they?
  • Experienced strategists and their candidates, who could always work through their election plans methodically — promoting their candidacies one foot in front of the other, adjusting here and there for the unexpected — suddenly found that they couldn’t operate the way they always did.
  • The question this year has been whether 2016 will be the “Snapchat election,
  • Then there was Jeb Bush, expecting to press ahead by presenting what he saw as leading-edge policy proposals that would set off a prolonged back-and-forth. When Mr. Bush rolled out a fairly sweeping plan to upend the college loan system, the poor guy thought this was going to become a big thing.
  • It drew only modest coverage and was quickly buried by the latest bit from Donald Trump.
  • In this “hit refresh” political culture, damaging news does not have to stick around for long, either. The next development, good or bad, replaces it almost immediately.
  • Mr. Miller pointed to a recent episode in which Mr. Trump said a protester at a rally had “ties to ISIS,” after that protester charged the stage. No such ties existed. “He says ‘ISIS is attacking me’; this was debunked in eight minutes by Twitter,” Mr. Miller said. “Cable talked about it for three hours and it went away.”
  • “Hillary Clinton said that she was under sniper fire in Bosnia” — she wasn’t — “and that has stuck with her for 20 years,”
  • Mr. Trump has mastered this era of short attention spans in politics by realizing that if you’re the one regularly feeding the stream, you can forever move past your latest trouble, and hasten the mass amnesia.
  • It was with this in mind that The Washington Post ran an editorial late last week reminding its readers of some of Mr. Trump’s more outlandish statements and policy positions
  • The Post urged its readers to “remember” more than two dozen items from Mr. Trump’s record, including that he promised “to round up 11 million undocumented immigrants and deport them,” and “lied about President Obama’s birth certificate.”
  • as the media habits of the young drive everybody else’s, I’m reminded of that old saw about those who forget history. Now, what was I saying?
Javier E

The Flight From Conversation - NYTimes.com - 0 views

  • we have sacrificed conversation for mere connection.
  • the little devices most of us carry around are so powerful that they change not only what we do, but also who we are.
  • A businessman laments that he no longer has colleagues at work. He doesn’t stop by to talk; he doesn’t call. He says that he doesn’t want to interrupt them. He says they’re “too busy on their e-mail.”
  • ...19 more annotations...
  • We want to customize our lives. We want to move in and out of where we are because the thing we value most is control over where we focus our attention. We have gotten used to the idea of being in a tribe of one, loyal to our own party.
  • We are tempted to think that our little “sips” of online connection add up to a big gulp of real conversation. But they don’t.
  • “Someday, someday, but certainly not now, I’d like to learn how to have a conversation.”
  • We can’t get enough of one another if we can use technology to keep one another at distances we can control: not too close, not too far, just right. I think of it as a Goldilocks effect. Texting and e-mail and posting let us present the self we want to be. This means we can edit. And if we wish to, we can delete. Or retouch: the voice, the flesh, the face, the body. Not too much, not too little — just right.
  • Human relationships are rich; they’re messy and demanding. We have learned the habit of cleaning them up with technology.
  • I have often heard the sentiment “No one is listening to me.” I believe this feeling helps explain why it is so appealing to have a Facebook page or a Twitter feed — each provides so many automatic listeners. And it helps explain why — against all reason — so many of us are willing to talk to machines that seem to care about us. Researchers around the world are busy inventing sociable robots, designed to be companions to the elderly, to children, to all of us.
  • Connecting in sips may work for gathering discrete bits of information or for saying, “I am thinking about you.” Or even for saying, “I love you.” But connecting in sips doesn’t work as well when it comes to understanding and knowing one another. In conversation we tend to one another.
  • We can attend to tone and nuance. In conversation, we are called upon to see things from another’s point of view.
  • I’m the one who doesn’t want to be interrupted. I think I should. But I’d rather just do things on my BlackBerry.
  • And we use conversation with others to learn to converse with ourselves. So our flight from conversation can mean diminished chances to learn skills of self-reflection
  • we have little motivation to say something truly self-reflective. Self-reflection in conversation requires trust. It’s hard to do anything with 3,000 Facebook friends except connect.
  • we seem almost willing to dispense with people altogether. Serious people muse about the future of computer programs as psychiatrists. A high school sophomore confides to me that he wishes he could talk to an artificial intelligence program instead of his dad about dating; he says the A.I. would have so much more in its database. Indeed, many people tell me they hope that as Siri, the digital assistant on Apple’s iPhone, becomes more advanced, “she” will be more and more like a best friend — one who will listen when others won’t.
  • FACE-TO-FACE conversation unfolds slowly. It teaches patience. When we communicate on our digital devices, we learn different habits. As we ramp up the volume and velocity of online connections, we start to expect faster answers. To get these, we ask one another simpler questions; we dumb down our communications, even on the most important matters.
  • WE expect more from technology and less from one another and seem increasingly drawn to technologies that provide the illusion of companionship without the demands of relationship. Always-on/always-on-you devices provide three powerful fantasies: that we will always be heard; that we can put our attention wherever we want it to be; and that we never have to be alone. Indeed our new devices have turned being alone into a problem that can be solved.
  • When people are alone, even for a few moments, they fidget and reach for a device. Here connection works like a symptom, not a cure, and our constant, reflexive impulse to connect shapes a new way of being.
  • Think of it as “I share, therefore I am.” We use technology to define ourselves by sharing our thoughts and feelings as we’re having them. We used to think, “I have a feeling; I want to make a call.” Now our impulse is, “I want to have a feeling; I need to send a text.”
  • Lacking the capacity for solitude, we turn to other people but don’t experience them as they are. It is as though we use them, need them as spare parts to support our increasingly fragile selves.
  • If we are unable to be alone, we are far more likely to be lonely. If we don’t teach our children to be alone, they will know only how to be lonely.
  • I am a partisan for conversation. To make room for it, I see some first, deliberate steps. At home, we can create sacred spaces: the kitchen, the dining room. We can make our cars “device-free zones.”
Javier E

Austrian Law Student Faces Down Facebook - NYTimes.com - 0 views

  • The plan put forward by Viviane Reding, the European justice commissioner, would give E.U. residents the right to opt out more easily of standard data collection practices used by businesses like Facebook. It would also compel companies to expunge all personal data, permanently, at a consumer’s request. Both elements have the potential to hamper the data-harvesting engine that is at the heart of Facebook’s advertising-driven business, and of its value.
  • Mr. Schrems appeared on Facebook’s radar last June when he filed a complaint against the company with the Irish regulator, the office of the Irish Data Protection Commissioner, in Port Arlington, Ireland. He alleged 22 violations of European law. Mr. Schrems filed the grievance after using a provision of Irish law to obtain from Facebook a copy of all of the information the company had been keeping on him. Facebook sent Mr. Schrems a computer disc containing 1,222 pages of information.
  • The disc, Mr. Schrems said, showed that Facebook was routinely collecting data that he had never consented to give, like his physical location, which he assumes was determined from his computer’s unique address identifiers, which can be traced geographically. Facebook was also retaining data he had deleted, Mr. Schrems said.
Javier E

Clear Your Google Web History - Wired How-To Wiki - 0 views

  • On March 1st, 2012, Google will implement a new, unified privacy policy. The new policy is retroactive, meaning it will affect any data Google has collected on you prior to that date, as well as any data it gathers afterward.
  • Basically, under the new policy, your Google Web History (all of your searches and the sites you clicked through to) can be combined with other data Google has gathered about you from other services — Gmail, Google+, etc.
  • If you'd like to keep your personal data a good distance away from Google, you'll need to delete your existing search history and prevent Google from using that history in the future.
  • ...4 more annotations...
  • in this case, however, a little time spent changing your settings can provide invaluable peace of mind knowing that Google can't exploit your personal tendencies for its own purposes.
  • First sign into your Google account and head to the history page. Click the button labeled Remove all Web History. Then click Okay to confirm. Note that this also pauses your web history going forward, and Google won't start listening to your history again unless you let it.
  • This will not stop Google from gathering data when you search. To do that you would need to block Google cookies completely. However, while it will still gather the data, Google will not use it to serve targeted ads or do anything other than use it for internal purposes. Also, with Web History disabled, your data is at least partially anonymized after 18 months (if you leave Web History on, Google will keep your search records indefinitely).
  • On the negative side, bear in mind that while this won't prevent Google from making search suggestions, it will prevent you from getting personalized suggestions based on your previous searches.
Javier E

Disruptions: Internet's Sad Legacy: No More Secrets - NYTimes.com - 0 views

  • many services that claim to offer that rarest of digital commodities — privacy — don’t really deliver. Read the fine print.
  • Snapchat’s privacy page explains that private images are stored on someone’s phone — and on its own servers. “Forensically, even after they are deleted,” Snapchat says, those images can be retrieved. Whisper’s privacy page says the company owns the intellectual property, both images and text, that people post; Whisper reserves the right to sell that stuff to third parties. And Telegram, while seemingly less innocuous with its claims, nonetheless leaves out something you might want to know: someone can just take a screenshot or picture of that “private” conversation.
  • Don’t have a smartphone yet? They still know where you are and where you’ve been. The American Civil Liberties Union released a report this year that found that technologies that let governments scan license plates are being used to build databases of vehicle locations across the United States.
  • ...1 more annotation...
  • A new book by Harvey Silverglate, a lawyer in Massachusetts, titled “Three Felonies a Day,” claims the average professional in the United States commits at least three crimes every day. How? While academics, lawyers and even government officials don’t actually know how many laws exist in today’s judicial system, it’s estimated that there are from 10,000 to 300,000 federal regulations that could be enforced criminally.
carolinewren

Bridgegate scandal coverage puts media 'bias' on 'full display,' Christie says | NJ.com - 0 views

  • Gov. Chris Christie insisted during his latest trip to New Hampshire that the fallout from the George Washington Bridge scandal wouldn't have been as nearly as intense if he were a Democrat.
  • argued to early-primary voters Hillary Clinton escaped scrutiny for clearing the private server housing emails from her tenure as secretary of state because she's a Democrat and he declared "bias is on full display" when that's compared to his own controversy.
  • "Could you imagine if my response the day after
  • ...8 more annotations...
  • "As you all know, I went through a really fun time the last 15 months with lots of different people investigating me too, right?"
  • "There is a bias," Christie insisted
  • all of that happened last January was, 'Oh, by the way, ... I have a private email server and all my emails were on this private server and I deleted a bunch of them, but they were only personal, and you're going to have to take my word for it cause the servers gone."
  • not the first time the governor suggested media bias was to blame for the fallout of the George Washington Bridge lane closure controversy.
  • December 2013, a month before the now infamous "time for some traffic problems in Fort Lee" email from a top Christie staffer was revealed, Christie brushed off questions about the lane closures during a Statehouse news conference
  • "I know you guys are obsessed with this, I'm not. I'm really not. It's not that big a deal," Christie insisted. "Just because press runs around and writes about it, both here and nationally, I know why that is and so do you, let's not pretend it's because of the gravity of the issue. It's because I am a national figure and anything like this will be written a lot about now, so let's not pretend this is some grave thing."
  • Christie signaled in New Hampshire he's intent on pressing Clinton, the Democratic frontrunner in the 2016 presidential race, on the attacks in Benghazi, Libya that's been a lighting rod for Clinton critics just as the governor declared during a recent trip here that he's done "apologizing" for the Bridgegate scandal
  • "I don't think there's been nearly enough questions asked about this," Christie said. "We need to ask a lot more questions about Benghazi. We need to get to the bottom of what happened because it does matter, madam secretary."
Javier E

How to Invent a Person Online - Curtis Wallen - The Atlantic - 2 views

  • Social networks and data brokers use algorithms and probabilities to reconstruct our identities, and then try to influence the way we think and feel and make decisions.
  • t’s not an exaggeration to say everything you do online is being followed. And the more precisely a company can tailor your online experience, the more money it can make from advertisers.
  • After Edward Snowden’s leaks about NSA surveillance, Tucker and Marthews found, the frequency of these sensitive search terms declined—suggesting that Internet users have become less likely to explore "search terms that they [believe] might get them in trouble with the U.S. government." The study also found that people have become less likely to search "embarrassing" topics
  • ...7 more annotations...
  • In other words, people are doing their best to blend in with the crowd.
  • The challenge of achieving true anonymity, though, is that evading surveillance makes your behavior anomalous—and anomalies stick out. As the Japanese proverb says, "A nail that sticks out gets hammered down." Glenn Greenwald explained recently that simply using encryption can make you a target. For me, this was all the more motivation to disappear.
  • For those of us who feel confident that we have nothing to hide, the future of Internet security might not seem like a major concern. But we underestimate the many ways in which our online identities can be manipulated.
  • The U.S. Department of Defense has also figured out how influential Facebook and Twitter can be. In 2011, it announced a new “Social Media in Strategic Communication” (SMISC) program to detect and counter information the U.S. government deemed dangerous. “Since everyone is potentially an influencer on social media and is capable of spreading information,” one researcher involved in a SMISC study told The Guardian, “our work aims to identify and engage the right people at the right time on social media to help propagate information when needed.”
  • Private companies are also using personal information in hidden ways. They don’t simply learn our tastes and habits, offering us more of what want and less of what we don’t. As Michael Fertik wrote in a 2013 Scientific American article titled “The Rich See a Different Internet Than the Poor,” credit lenders have the ability to hide their offers from people who may need loans the most. And Google now has a patent to change its prices based on who’s buying. 
  • It is essentially impossible to achieve anonymity online. It requires a complete operational posture that extends from the digital to the physical. Downloading a secure messaging app and using Tor won’t all of a sudden make you “NSA-proof.” And doing it right is really, really hard.
  • Weighing these trade-offs in my day-to-day life led to a few behavioral changes, but I have a mostly normal relationship with the Internet—I deleted my Facebook account, I encrypt my emails whenever I can, and I use a handful of privacy minded browser extensions. But even those are steps many people are unwilling, or unable, to take.
Javier E

A Push to Redefine Knowledge at Wikipedia - NYTimes.com - 0 views

  • lately Wikipedia has been criticized from without and within for reflecting a Western, male-dominated mindset similar to the perspective behind the encyclopedias it has replaced.
  • If Wikipedia purports to collect the “sum of all human knowledge,” in the words of one of its founders, Jimmy Wales, that, by definition, means more than printed knowledge
  • the article would have been deleted from English Wikipedia if it didn’t have any sources to cite. Those are the rules of the game, and those are the rules he would like to change, or at least bend, or, if all else fails, work around.
  • ...6 more annotations...
  • There are whole cultures, he said, that have little to no printed material to cite as proof about the way life is lived.
  • he and the video’s directors, Priya Sen and Zen Marie, spoke with people in African and Indian villages either in person or over the phone and had them describe basic activities. These recordings were then uploaded and linked to the article as sources, and suddenly an article that seems like it could be a personal riff looks a bit more academic.
  • After a series of hoaxes, culminating in a Wikipedia article in 2005 that maligned the newspaper editor John Seigenthaler for no discernible reason other than because a Wikipedia contributor could, the site tried to ensure that every statement could be traced to a source.
  • Then there is the rule “no original research,” which was meant to say that Wikipedia doesn’t care if you are writing about the subway station you visit every day, find someone who has written reliably on the color of the walls there.
  • Perhaps Mr. Prabhala’s most challenging argument is that by being text-focused, and being locked into the Encyclopedia Britannica model, Wikipedia risks being behind the times.
  • An 18-year-old is comfortable using “objects of trust that have been created on the Internet,” he said, and “Wikipedia isn’t taking advantage of that.”
Javier E

Newspaper in Israel Scrubs Women From a Photo of Paris Unity Rally - NYTimes.com - 0 views

  • “It is rather embarrassing when, at a time that the Western world is rallying against manifestations of religious extremism, our extremists manage to take the stage,” Allison Kaplan Sommer commented on a blog for Israel’s left-leaning newspaper Haaretz. She berated HaMevaser for “denying the fact that in the wider world, beyond the ultra-Orthodox Jewish community, women do stand on the world stage and shape events.”
  • Apparently deleted along with Ms. Merkel were: the mayor of Paris, Anne Hidalgo; a European Union official; and Simonetta Sommaruga, the president of Switzerland.
  • “It’s very, very, very, very, very hard for a nonreligious person to understand the purity of eyes,” Ms. Burshtein said. “By us, men don’t look at women’s photos, period. As long as you don’t know that, then it sounds ridiculous, or changing history or events. But we’re not here to get the events the way they are. We are here to keep the eyes.”
anonymous

Getting Started with Chrome extension - Diigo help - 0 views

  • Use the “Save” option to bookmark a page. Bookmarking saves a link to the page in your online Diigo library, allowing you to easily access it later.
  • Highlighting can also be accomplished from the context pop-up. After the Chrome extension is installed, whenever you select text on a webpage, the context pop-up will appear, allowing you to accomplish text-related annotation. Highlight Pop-up Menu – After you highlight some text, position your mouse cursor over it and the highlight pop-up menu will appear. The highlight pop-up menu allows you to add notes to, share, or delete the highlight.
  • Sticky Note Click the middle icon on the annotation toolbar to add a sticky note to the page. With a sticky note, you can write your thoughts anywhere on a web page.
1 - 20 of 38 Next ›
Showing 20 items per page