Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Friday, August 03, 2012

Privacy, Security And Consensus



There is more room for mischief in mobile. The average person is not aware how much they are already giving away.

Study Reveals a Confused View of Mobile Phone Privacy and Security
Smartphones store a wealth of valuable personal data—photos, videos, e-mail, texts, app data, GPS locations, and Web browsing habits—that is increasingly falling into the hands of advertisers, app makers, law enforcement, and crooks...... The majority of respondents also said they believed their mobile phone to be as private as their personal computer. .... millions of people already provide mobile data to marketers, business analysts, and law enforcement, often without their knowledge or consent
Enhanced by Zemanta

Thursday, July 26, 2012

The Enemy Knows

Arab Spring [LP]
Arab Spring [LP] (Photo credit: Painted Tapes)
How Pro-Regime Forces Use Spyware to Target Arab Spring RebelsHow Pro-Regime Forces Use Spyware to Target Arab Spring Rebels
pro-regime forces have been using fake messages to install malware on activists’ computers that would allow them to monitor keystrokes and other activity .... “off the shelf” surveillance products for governments and law enforcement .... Fin Fisher could be installed by “sending fake software updates for popular software.” ..... “Compromised Skype accounts of trusted friends is very popular,” he said, as activists have looked to the Internet telephony service because they don’t trust the state phone systems. ..... “It pays to be especially cautious when downloading files over the Internet, even from links that are purportedly sent by friends”
It is not surprising that the authoritarian regimes would get sophisticated in their use of information technology. After all they have much resources at their disposal. But this just adds to the sort of training the pro liberation forces should subject themselves to. Easier said than done. In countries like the US that are more literate, it is hard to get people to not click on suspicious links.

The regimes use way more sophisticated stuff than this one. Surveillance tools at the disposal of the Chinese authorities, for example, have been manufactured by some of the biggest names in tech.

Just like companies used to be barred from doing business with the apartheid regime in South Africa, tech companies ought to be barred from selling stuff to authoritarian regimes that get used to suppress dissent.
Enhanced by Zemanta

Tuesday, July 24, 2012

Customized Threats

Image representing Symantec as depicted in Cru...
Image via CrunchBase
The Latest Threat: A Virus Made Just for You
a refinement to the technique could make automated analysis of malware nearly impossible ..... The makers of antivirus software regularly collect samples of malware and then use automated analysis to generate a collection of identifying characteristics, commonly called a signature. .... polymorphism—a technique for changing programs each time they are copied to a new machine ..... The database of malware maintained by Symantec includes about 19 million signatures. In its annual Internet Security Threat Report released earlier this year, Symantec stated that its automated analysis systems analyzed 403 million unique variants of malicious programs in 2011, a 41 percent increase from the 286 million analyzed in 2010. Without automation, this task would be much harder.
The devil has time on his hands, looks like. The fight between good and evil continues. This reminds me of This World dictators beating the protesters in their use of information technology. Like in Burma several years back the authorities encouraged protesters to go out in the streets and take pictures and upload them online. Then they coldly downloaded them to identify and punish individual protesters.


Enhanced by Zemanta

Saturday, February 12, 2011

The Chrome Notebook Needs No Anti Virus B.S.

Image representing Microsoft as depicted in Cr...Image via CrunchBaseChrome Notebook Pilot User?

There's nothing to infect. What are you going to infect? There is no desktop. It is like every time you start your machine, you are loading the operating system afresh.

That is such relief. The anti virus business has always felt like a scam to me. I have always felt like that annual 45 bucks ought to go to Microsoft instead and Windows ought to be free.

I told them. They did not listen. And now the Chrome OS is going to kill Windows.

Wednesday, October 13, 2010

A Sophisticated Like Button

ReadWriteWeb: I Like to Dislike! Facebook Introduces Comment Voting, Threads: now allows users to up- and down-vote other comments ..... comments are not only threaded, meaning each user can reply directly to another user, but more information is shown on each person, including their job and company, or network, and their comment record. The system also allows for up- and down-voting ..... Each comment begins with one point and a vote up or down raises or lowers that rating by a point. .... your comment stays at the top, so you can manage your comment and conversation ..... the move certainly encroaches on the territory of commenting systems like Disqus, Echo and Intense Debate. .... with more active posts rising to the top and negating the usual newest to oldest order. Allowing users to vote on posts and on individual comments could really alter the entire dynamic of Facebook.
It was only a matter of time. I knew something like this was bound to happen. The like button was going to be more sophisticated. And it is getting there. The open graph just became more useful. Facebook comments just became more useful. Now it has become more possible to navigate updates that might collect hundreds of comments. This is called scaling.
The Facebook Blog: More Ways to Stay Secure: If you have any concerns about security of the computer you're using while accessing Facebook, we can text you a one-time password to use instead of your regular password. ..... Simply text "otp" to 32665 on your mobile phone (U.S. only), and you'll immediately receive a password that can be used only once and expires in 20 minutes. ..... the ability to sign out of Facebook remotely

Enhanced by Zemanta

Monday, September 06, 2010

Privacy Anxieties And The Web Of Intent

GigaOm: The Web Of Intent Is Coming (Sooner Than You Think): more robust content filtering tools and the Web of Intent will arrive sooner than you think, based on the implicit messages in users’ actions..... The Web of Intent will be largely driven by consumers’ actions and interests..... They will be able to quickly transform their content operations beyond articles and blog posts into data and interest-centric publishing structures that allow consumers to follow topics and ongoing stories of interest. ..... a Web of Intent rich in data and profiling based on their audiences’ interests. ...... will offer newer and more robust targeting opportunities and will ultimately provide publishers new opportunities for monetization beyond pure advertising ..... make their sites more “intent-friendly”

This intent talk is at the other end of the privacy spectrum. You do want the site to know who you are, what your interests are, what you want, so the site can better serve you.

We want privacy, but we also want the web of intent, and I don't see a clash there. Just like it is possible to be for economic growth and for the environment at the same time.

Privacy is a value, but it is also a technological challenge. The web of intent is a major technological challenge. Now all websites pretty much have blogs, and Facebook and Twitter presences. The web of intent will similarly permeate.

We will get to keep our cake and eat it too, for the most part. There are always some standard deviations.

Privacy, Digital Literacy, Technology, Social Values

Enhanced by Zemanta

Privacy, Digital Literacy, Technology, Social Values

JP Rangaswami / BTImage by Ribbit Voice via Flickr
Confused Of Calcutta: JP Rangaswami: Musing About A New Kind Of Literacy: There’s a new game in town, where the surveillance is all digital. Where everything we do is monitored and recorded and analysed and used, ostensibly to help us. Ostensibly. A world of digital fingerprints...... We’ve gotten used to the idea of people “following” us in a digital world, subscribing to stuff we publish. Here we know that others are watching us. ..... Many of the things we do are recorded, and we know about it. Many of the things we do are recorded, and we give permission for that recording to take place. Some of the things we do are recorded with our permission and we don’t understand enough about it..... A new kind of literacy is needed.

This post by JP, the guy who introduced me to Twitter, (@jobsworth) touches upon a topic that took Facebook by storm not long back. So what is privacy? What does it mean today? Does it mean any different than it used to?

Privacy is not a technological breakthrough, it is a social value. The ongoing debate on privacy is an interesting intersection point between technology, its possibilities, and a fundamental social value.

We do want our search results to be smart. We want out smartphone to know us like it is nice to have our barber know us. It feels like a privilege. Bloggers wanting page hits are not exactly trying to hide, and that is most bloggers, almost all bloggers. Sharing of ideas is about getting out into the open. And perhaps that is why blogging in my personal favorite social media tool. You can't give me too many page hits. There is no ceiling I have in mind. I am not complaining.

But there are personal details I would not want to share, and I don't put those online. But my propensity to mostly stick to ideas means I don't have to get overly cautious. Come, let's talk.

Facebook's privacy options are not even that complicated. But the fact that the average person rose up in arms on the issue shows that which JP calls "literacy" is for real. People need to be educated about what is going on and what their options are.

People have the option to share. People have the option to not share. And they need to know. But just like universal literacy in the old sense was never really achieved, I don't see how digital literacy will be any different. In which case we have to be watchful of instances of abuse and possibly even criminal activity. I guess the online world is not all that different from its offline counterpart then.

Enhanced by Zemanta