Facebook wants you to share as much information about yourself as possible. It wants your friends to do the same. After all, the more personal details you feed into the network, the less likely you are to pack your data suitcase and leave. Advertisers tend to like all that data too. All this means your default privacy settings probably don’t jibe with how you want to actually share your information.
Luckily, you’re not defenseless. With a few small setting adjustments, you can take back control and make sure you share only what you want with the world.
One key thing to remember before we proceed though: The Internet is forever. Once you have posted something online, it does not belong to you anymore. If you’ve shared a photo or status update with anyone, it’s possible that they could screenshot it and share it with the world. So when in doubt, don’t post it.
via Use These Facebook Privacy Settings to Eradicate Over-Sharing | Gadget Lab | Wired.com.
One of those methods, though, is hinted at in the Clapper summary — and it’s interesting. Clapper briefly notes some programs the intelligence agencies are closing or scaling back, as well as those they’re pouring additional funds into. Overhead imagery captured by spy satellites was slated for reduction, for example, while SIGINT, the electronic spying that’s been the focus of the Snowden leaks, got a fresh infusion.
“Also,” Clapper writes in a line marked “top secret,” “we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit internet traffic.”
The Post’s article doesn’t detail the “groundbreaking cryptanalytic capabilities” Clapper mentions, and there’s no elaboration in the portion of the document published by the paper. But the document shows that 21 percent of the intelligence budget — around $11 billion — is dedicated to the Consolidated Cryptologic Program that staffs 35,000 employees in the NSA and the armed forces.
via New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking | Threat Level | Wired.com.
The Tor network operates by rerouting your Web traffic around the world before delivering it to you. Doing this prevents your identity from ever being attached to your browsing history, so its easy to see why it became a popular choice in browser after the PRISM news.
via Tor and PRISM – Business Insider.
Boy, if ever there was testimony that should have IT departments running from any Google product, it’s coming from a lawsuit alleging that Google has violated wiretapping laws by probing private messages to target ads.
Google’s defense? Users—that’s you and me—have no reasonable expectation of privacy when using a third-party service like Gmail. Since Google provides a variety of third-party services to businesses that are partially or completely funded by ads, this policy statement should give IT folks cold chills.
via Google’s Invasions of Privacy, Free But Flawed Products Show Its Arrogance – CIO.com.
We won’t add facial recognition features to our products without having strong privacy protections in place.” Google also stressed that this is not an especially new policy, and indeed two weeks ago Steve Lee, director of product management for Google Glass, made a statement along similar lines: “We’ve consistently said that we won’t add new face recognition features to our services unless we have strong privacy protections in place.”
via Google won’t approve facial recognition Glass apps until it has ‘privacy protections in place’ | The Verge.
Google’s brief said: “Just as a sender of a letter to a business colleague cannot be surprised that the recipient’s assistant opens the letter, people who use web-based email today cannot be surprised if their emails are processed by the recipient’s [email provider] in the course of delivery. Indeed, ‘a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.’” (Motion to dismiss, Page 19)
Read Google’s motion to dismiss here:
“Google has finally admitted they don’t respect privacy,” said John M. Simpson, Consumer Watchdog’s Privacy Project director. “People should take them at their word; if you care about your email correspondents’ privacy don’t use Gmail.”
Google made the statement that people can’t expect privacy when sending a message to a Gmail address in a response to a class action complaint filed in multi-district litigation. The suit says Google violates federal and state wiretap laws when the company reads emails to determine what ads to serve based on the message’s content. The class action complaint was filed under seal because it details many of Google’s business practices about the way it handles email.
via Google Tells Court You Cannot Expect Privacy When Sending Messages to Gmail — People Who Care About Privacy Should Not Use Service, Consumer Watchdog Says | Consumer Watchdog.
Young doesn’t know it, but she’s a lab rat. Alongside 70 million others, she scurries around in virtual space, her every move monitored by the omnipresent eye of Pandora’s massive and complex music intelligence algorithm. Just like in a real laboratory, scientists–in this case, data scientists–constantly tweak variables to see how she responds. To Young, the change in repetition felt subtle. Coincidental, even. It wasn’t. Changes like this are part of Pandora’s ongoing experimentation in how best to deliver music to its listeners.
via At Pandora, Every Listener Is A Test Subject ⚙ Co.Labs ⚙ code + community.
“I wish that I could legally share with you the events that led to my decision,” Levison writes. “I cannot. I feel you deserve to know what’s going on – the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise.”
National Security Letters can be written by U.S. investigatory agencies compelling recipients to turn over information the agencies want and preventing them from discussing even that they had received such letters.
The bottom line for customers, Levison says, is this: “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
via Encrypted Email Vendor: Don’t Trust Private Data to Companies with Physical Ties to the U.S. – CIO.com.
Experts say there’s simply no way to ever be completely sure your data will remain secure once you’ve moved it to the cloud.
“You have no way of knowing. You can’t trust anybody. Everybody is lying to you,” Security expert Bruce Schneier said. “How do you know which platform to trust? They could even be lying because the U.S. Government has forced them to.”
via No, Your Data Isn’t Secure in the Cloud – CIO.com.
According to figures published by a major tech provider, the Internet carries 1,826 Petabytes of information per day. In its foreign intelligence mission, NSA touches about 1.6% of that. However, of the 1.6% of the data, only 0.025% is actually selected for review. The net effect is that NSA analysts look at 0.00004% of the world’s traffic in conducting their mission—that’s less than one part in a million. Put another way, if a standard basketball court represented the global collection would be represented by an area smaller than a dime on that basketball court.”
via NSA: We read .00004% of Web traffic – CNN.com.