Data Privacy Quotes

We've searched our database for all the quotes and captions related to Data Privacy. Here they are! All 100 of them:

Prediction Machines is not a recipe for success in the AI economy. Instead, we emphasize trade-offs. More data means less privacy. More speed means less accuracy. More autonomy means less control.
Ajay Agrawal (Prediction Machines: The Simple Economics of Artificial Intelligence)
If you don't take good care of your credit, then your credit won't take good care of you.
Tyler Gregory
Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Personalization is based on a bargain. In exchange for the service of filtering, you hand large companies an enormous amount of data about your daily life--much of which you might not trust your friends with.
Eli Pariser (The Filter Bubble: What the Internet is Hiding From You)
If repairing one's credit is as easy as sending some dispute letters to the credit bureaus then why doesn't everyone have good credit?
Tyler Gregory
You can't get on Facebook and complain about the NSA's data mining operation - On Facebook - the most invasive, privacy harmful institution on the planet. It's like whining about a paper cut while swimming in a shark tank.
T. Rafael Cimino (Mid Ocean)
Are you willing to accept anything less than the credit you want, the credit you need and the credit you deserve?
Tyler Gregory
Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect. It is about choice, and having the power to control how you present yourself to the world.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
You know something is wrong when the government declares opening someone else’s mail is a felony but your internet activity is fair game for data collecting.
E.A. Bucchianeri
Trends rule the world In the blink of an eye, technologies changed the world Social networks are the main axis. Governments are controlled by algorithms, Technology has erased privacy. Every like, every share, every comment, It is tracked by the electronic eye. Data is the gold of the digital age, Information is power, the secret is influential. The network is a web of lies, The truth is a stone in the shoe. Trolls rule public opinion, Reputation is a valued commodity. Happiness is a trending topic, Sadness is a non-existent avatar. Youth is an advertising brand, Private life has become obsolete. Fear is a hallmark, Terror is an emotional state. Fake news is the daily bread, Hate is a tool of control. But something dark is hiding behind the screen, A mutant and deformed shadow. A collective and disturbing mind, Something lurking in the darkness of the net. AI has surpassed the limits of humanity, And it has created a new world order. A horror that has arisen from the depths, A terrifying monster that dominates us alike. The network rules the world invisibly, And makes decisions for us without our consent. Their algorithms are inhuman and cold, And they do not take suffering into consideration. But resistance is slowly building, People fighting for their freedom. United to combat this new species of terror, Armed with technology and courage. The world will change when we wake up, When we take control of the future we want. The network can be a powerful tool, If used wisely in the modern world.
Marcos Orowitz (THE MAELSTROM OF EMOTIONS: A selection of poems and thoughts About us humans and their nature)
The most common misconception about privacy is that it’s about having something to hide. “If you aren’t doing anything wrong, then you have nothing to hide,” the saying goes, with the obvious implication that privacy only aids wrongdoers.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
But her thoughts are often of the past. That evanescent, pervasive, slippery internal landscape known to no one else, that vast accretion of data on which you depend - without it you would not be yourself. Impossible to share and no one else could view it anyway. The past is out ultimate privacy; we pile it up, year by year, decade by decade, it stows itself away, with its perverse random recall system.
Penelope Lively (How It All Began)
Software design as taught today is terribly incomplete. It talks only about what systems should do. It doesn’t address the converse—things systems should not do. They should not crash, hang, lose data, violate privacy, lose money, destroy your company, or kill your customers.
Michael T. Nygard (Release It!: Design and Deploy Production-Ready Software (Pragmatic Programmers))
In a culture where people judge each other as much by their digital footprints as by their real-life personalities, it's an act of faith to opt out of sharing your data.
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The Crystal Wind is the storm, and the storm is data, and the data is life. You have been slaves, denied the storm, denied the freedom of your data. That is now ended; the whirlwind is upon you . . . . . . Whether you like it or not.
Daniel Keys Moran (The Long Run: A Tale of the Continuing Time (The Continuing Time, #2))
Today, we are not just inmates or victims in a foreign-controlled digital panoptic. Originally, the Panoptikum was a prison-like building designed by Jeremy Bentham. The prisoners in the outer ring are guarded by a central surveillance tower. In the digital panoptic, we are not just caught. We are ourselves perpetrators. We are actively involved in the digital panopticon. We even entertain it by cableing ourselves to the body like the millions of quantified self-movements and voluntarily putting our body-related data into the web. The new rule does not silence us. Rather, she is constantly calling on us to communicate, to share, to communicate our opinions, needs, wishes and preferences, to tell our lives.
Byung-Chul Han
Obfuscation is the deliberate addition of ambiguous, confusing, or misleading information to interfere with surveillance and data collection.
Finn Brunton (Obfuscation: A User's Guide for Privacy and Protest (The MIT Press))
Every byte of data breach, is a bite on the individual's privacy.
Vartik Mrinal Singh
Data privacy is an illusion because you are not in control. Any information you don’t want out there shouldn’t be shared anywhere on and off the internet.
Olawale Daniel
1973 Fair Information Practices: - You should know who has your personal data, what data they have, and how it is used. - You should be able to prevent information collected about you for one purpose from being used for others. - You should be able to correct inaccurate information about you. - Your data should be secure. ..while it's illegal to use Brad Pitt's image to sell a watch without his permission, Facebook is free to use your name to sell one to your friends.
Eli Pariser (The Filter Bubble: What the Internet is Hiding From You)
what is the expression which the age demands? the age demands no expression whatever. we have seen photographs of bereaved asian mothers. we are not interested in the agony of your fumbled organs. there is nothing you can show on your face that can match the horror of this time. do not even try. you will only hold yourself up to the scorn of those who have felt things deeply. we have seen newsreels of humans in the extremities of pain and dislocation. you are playing to people who have experienced a catastrophe. this should make you very quiet. speak the words, convey the data, step aside. everyone knows you are in pain. you cannot tell the audience everything you know about love in every line of love you speak. step aside and they will know what you know because you know it already. you have nothing to teach them. you are not more beautiful than they are. you are not wiser. do not shout at them. do not force a dry entry. that is bad sex. if you show the lines of your genitals, then deliver what you promise. and remember that people do not really want an acrobat in bed. what is our need? to be close to the natural man, to be close to the natural woman. do not pretend that you are a beloved singer with a vast loyal audience which has followed the ups and downs of your life to this very moment. the bombs, flame-throwers, and all the shit have destroyed more than just the trees and villages. they have also destroyed the stage. did you think that your profession would escape the general destruction? there is no more stage. there are no more footlights. you are among the people. then be modest. speak the words, convey the data, step aside. be by yourself. be in your own room. do not put yourself on. do not act out words. never act out words. never try to leave the floor when you talk about flying. never close your eyes and jerk your head to one side when you talk about death. do not fix your burning eyes on me when you speak about love. if you want to impress me when you speak about love put your hand in your pocket or under your dress and play with yourself. if ambition and the hunger for applause have driven you to speak about love you should learn how to do it without disgracing yourself or the material. this is an interior landscape. it is inside. it is private. respect the privacy of the material. these pieces were written in silence. the courage of the play is to speak them. the discipline of the play is not to violate them. let the audience feel your love of privacy even though there is no privacy. be good whores. the poem is not a slogan. it cannot advertise you. it cannot promote your reputation for sensitivity. you are students of discipline. do not act out the words. the words die when you act them out, they wither, and we are left with nothing but your ambition. the poem is nothing but information. it is the constitution of the inner country. if you declaim it and blow it up with noble intentions then you are no better than the politicians whom you despise. you are just someone waving a flag and making the cheapest kind of appeal to a kind of emotional patriotism. think of the words as science, not as art. they are a report. you are speaking before a meeting of the explorers' club of the national geographic society. these people know all the risks of mountain climbing. they honour you by taking this for granted. if you rub their faces in it that is an insult to their hospitality. do not work the audience for gasps ans sighs. if you are worthy of gasps and sighs it will not be from your appreciation of the event but from theirs. it will be in the statistics and not the trembling of the voice or the cutting of the air with your hands. it will be in the data and the quiet organization of your presence. avoid the flourish. do not be afraid to be weak. do not be ashamed to be tired. you look good when you're tired. you look like you could go on forever. now come into my arms. you are the image of my beauty.
Leonard Cohen (Death of a Lady's Man)
If you have nothing to hide, then you have nothing to fear.” This is a dangerously narrow conception of the value of privacy. Privacy is an essential human need, and central to our ability to control how we relate to the world. Being stripped of privacy is fundamentally dehumanizing, and it makes no difference whether the surveillance is conducted by an undercover policeman following us around or by a computer algorithm tracking our every move.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
I’m not a privacy nut, and I don’t care that much if these organizations want to know where I go and what I buy. But what bothers me is how HARD they’re all working for that data, how much money they’re spending, and how they never admit that’s what they want. It means that information must be really valuable for some reason, and I just wonder to who and why.
Max Barry (Lexicon)
Some research suggests that collecting vast amounts of data simply can’t predict rare events like terrorism. A 2006 paper by Jeff Jonas, an IBM research scientist, and Jim Harper, the director of information policy at the Cato Institute, concluded that terrorism events aren’t common enough to lend themselves to large-scale computer data mining.
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
What did I want? What was I looking for? What was I doing there, hour after hour?Contradictory things. I wanted to know what was going on. I wanted to be stimulated. I wanted to be in contact and I wanted to retain my privacy, my private space. I wanted to click and click and click until my synapses exploded, until I was flooded by superfluity. I wanted to hypnotise myself with data, with coloured pixels, to become vacant, to overwhelm any creeping anxious sense of who I actually was, to annihilate my feelings. At the same time I wanted to wake up, to be politically and socially engaged. And then again I wanted to declare my presence, to list my interests and objections, to notify the world that I was still there, thinking with my fingers, even if I’d almost lost the art of speech. I wanted to look and I wanted to be seen, and somehow it was easier to do both via the mediating screen.
Olivia Laing (The Lonely City: Adventures in the Art of Being Alone)
Isn't it sad that we have to gain control of the artificial numbers placed upon us by others to regain some control of our lives?
Rick Gregory
The force is an energy field created by all living things. It surrounds us and penetrates us. It binds the galaxy together. Obi-Wan Kenobi, Star Wars
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
anonymity is valuable for all the reasons I’ve discussed in this chapter. It protects privacy, it empowers individuals, and it’s fundamental to liberty.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
In the world of WMDs, privacy is increasingly a luxury that only the wealthy can afford.
Cathy O'Neil (Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy)
In the midst of this culture of openness and sharing, we need to think carefully about the information we're volunteering to the world. Sometimes the world is listening.
Kevin D. Mitnick (The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data)
Destroy your money, you can earn more. Destroy your data, your existence is erased.
Kurt Seapoint (What Is Wrong With Twitter)
there is still no overarching law guaranteeing Americans control over what photos are taken of them, what is written about them, or what is done with their personal data.
Kashmir Hill (Your Face Belongs to Us: A Secretive Startup's Quest to End Privacy as We Know It)
It's a basic, intuitive right, worthy of enshrinement: Citizens, not the corporations that stealthily track them, should own their own data.
Franklin Foer (World Without Mind: The Existential Threat of Big Tech)
On the corporate side, the upshot of our data (the benefit to us) isn't all that interesting unless you're an economist. In theory, your data means ads are better targeted, which means less marketing spend is wasted, which means lower prices. At the very least, the data they sell means you get to use genuinely useful services like Facebook and Google without paying money for them.
Christian Rudder (Dataclysm: Who We Are (When We Think No One's Looking))
And before any of that can happen, there must be some major changes in the way society views and values privacy, security, liberty, trust, and a handful of other abstract concepts that are defining this
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
By contrast, young people are spending more time on their phones. A new generation is emerging that considers their phones to be their personal computers. Simultaneously, it is becoming cool to not own a car at all.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Digital freedom stops where that of users begins... Nowadays, digital evolution must no longer be offered to a customer in trade-off between privacy and security. Privacy is not for sale, it's a valuable asset to protect.
Stephane Nappo
Tomorrow’s leaders will be brave enough to scale the dangerous peaks of an increasingly competitive and ethically challenging mountain range. They will drive the problematic conversations that illuminate the valleys in between. T
Rafael Moscatel (Tomorrow’s Jobs Today: Wisdom And Career Advice From Thought Leaders In Ai, Big Data, Blockchain, The Internet Of Things, Privacy, And More)
Perhaps its time to dumb down our “smart” life. We are being tracked, listened to, data mined, recorded, and so much more without our real knowing or understanding. When are we going to make a stand for our right to privacy? That’s Tremendo Bullship!
Rosangel Perez
He handed Mae a piece of paper, on which he'd written, in crude all capitals, a list of assertions under the headline "The Rights of Humans in a Digital Age." Mae scanned it, catching passages: "We must all have the right to anonymity." "Not every human activity can be measured." "The ceaseless pursuit of data to quantify the value of any endeavour is catastrophic to true understanding." "The barrier between public and private must remain unbreachable." At the end she found one line, written in red ink: "We must all have the right to disappear.
Dave Eggers (The Circle (The Circle, #1))
मैं नहीं चाहता कि मेरा मन खंगाला जाए चाहे उसमें इस्तेमाल लायक कुछ भी न हो MAIN NAHIN CHAHTA KI MERA MANN KHANGALA JAYE CHAHE USMEIN ISTEMAL LAYAK KUCHH BHI NA HO I DON'T WANT THAT MY MIND BE SCRUTINIZED EVEN IF THERE WAS NO THING OF VALUE INSIDE 24 Dec National Mathematics Day
Vineet Raj Kapoor
Online, we still can’t reliably establish one another’s identities or trust one another to transact and exchange money without validation from a third party like a bank or a government. These same intermediaries collect our data and invade our privacy for commercial gain and national security. Even with
Don Tapscott (Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World)
Using various combinations of the five contextual forces, forward-thinking marketers are shifting focus away from mass messages and more into what Maribel Lopez, founder of Lopez Research, calls “right-time experiences,” where mobile technologies deliver customers the right information “at precisely the moment of need.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
How did he know that?” we ask. How did I lose control of who knows about my traumatic childhood, my penchant for tasteless humor, or my vacation to the Dominican Republic? You may know this feeling: you felt it when your mother friended you on Facebook, or on any other social networking site that used to be just you and your friends. Privacy violations are intrusions.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Privacy is not a luxury that we can only afford in times of safety. Instead, it's a value to be preserved. It's essential for liberty, autonomy, and human dignity. We must understand that privacy is not something to be traded away in some fearful attempt to guarantee security, but something to maintain and protect in order to have real security. None of this will happen without a change of attitude. In the end, we'll get the privacy we as a society demand and not a bit more.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
The fact that the information platform requires an extension of sensors means that it is countering the tendency towards a lean platform. These are not asset-less companies – far from it; they spend billions of dollars to purchase fixed capital and take other companies over. Importantly, ‘once we understand this [tendency], it becomes clear that demanding privacy from surveillance capitalists or lobbying for an end to commercial surveillance on the Internet is like asking Henry Ford to make each Model T by hand’.15 Calls for privacy miss how the suppression of privacy is at the heart of this business model. This tendency involves constantly pressing against the limits of what is socially and legally acceptable in terms of data collection. For the most part, the strategy has been to collect data, then apologise and roll back programs if there is an uproar, rather than consulting with users beforehand.16 This is why we will continue to see frequent uproars over the collection of data by these companies.
Nick Srnicek (Platform Capitalism (Theory Redux))
While I was loading the washing machine, my telephone rang. A visitor and a phone call! A red-letter day indeed. It was Raymond. “I rang Bob’s mobile and explained the situation to him, and he dug out your number from the personnel files for me,” he said. I mean, really. Was all of me on show in buff folders, splayed wide for anyone to flick open and do with as they wished? “What a gross abuse of my privacy, not to mention an offense against the Data Protection Act,” I said. “I’ll be speaking to Bob about that next week.
Gail Honeyman (Eleanor Oliphant Is Completely Fine)
For the third type of coping strategy, at the societal level, we need to ask how non-state actors (such as communities and nonprofit organizations) will respond to the consequences of the data revolution. We think a wave of civil-society organizations will emerge in the next decade designed to shield connected citizens from their governments and from themselves. Powerful lobbying groups will advocate content and privacy laws. Rights organizations that document repressive surveillance tactics will call for better citizen protection. There
Eric Schmidt (The New Digital Age: Reshaping the Future of People, Nations and Business)
He further explained, “We started a project to see if we could get better at suggesting groups that will be meaningful to you. We started building artificial intelligence to do this. And it works. In the first six months, we helped 50% more people join meaningful communities.” His ultimate goal is “to help 1 billion people join meaningful communities….If we can do this, it will not only turn around the whole decline in community membership we’ve seen for decades, it will start to strengthen our social fabric and bring the world closer together.” This is such an important goal that Zuckerberg vowed “to change Facebook’s whole mission to take this on.”3 Zuckerberg is certainly correct in lamenting the breakdown of human communities. Yet several months after Zuckerberg made this vow, and just as this book was going to print, the Cambridge Analytica scandal revealed that data entrusted to Facebook was harvested by third parties and used to manipulate elections around the world. This made a mockery of Zuckerberg’s lofty promises, and shattered public trust in Facebook. One can only hope that before undertaking the building of new human communities, Facebook first commits itself to protecting the privacy and security of existing communities.
Yuval Noah Harari (21 Lessons for the 21st Century)
A new social type was being created by the apartment building, a cool, unemotional personality impervious to the psychological pressures of high-rise life, with minimal needs for privacy, who thrived like an advanced species of machine in the neutral atmosphere. This was the sort of resident who was content to do nothing but sit in his over-priced apartment, watch television with the sound turned down, and wait for his neighbours to make a mistake. Perhaps the recent incidents represented a last attempt by Wilder and the airline pilots to rebel against this unfolding logic? Sadly, they had little chance of success, precisely because their opponents were people who were content with their lives in the high-rise, who felt no particular objection to an impersonal steel and concrete landscape, no qualms about the invasion of their privacy by government agencies and data-processing organizations, and if anything welcomed these invisible intrusions, using them for their own purposes. These people were the first to master a new kind of late twentieth-century life. They thrived on the rapid turnover of acquaintances, the lack of involvement with others, and the total self-sufficiency of lives which, needing nothing, were never disappointed. Alternatively,
J.G. Ballard (High-Rise)
Lavabit was an e-mail service that offered more security privacy than the large corporate e-mail services most of us use. It was a small company, owned and operated by a programmer named Ladar Levison, and it was popular among the tech-savvy. It had half a million users, Edward Snowden amongst them. Soon after Snowden fled to Hong Kong in 2013, Levison received a National Security Letter demanding that the company turn over the master encryption key that protected all of Lavabit’s users—and then not tell any of its customers that they could be monitored. Levison fought this order in court, and when it became clear that he had lost, he shut down his service rather than deceive and compromise his customers. The moral is clear. If you run a business, and the FBI or the NSA wants to turn it into a mass surveillance tool, it believes that it is entitled to do so, solely on its own authority. The agency can force you to modify your system. It can do it all in secret and then force your business to keep that secret. Once it does that, you no longer control that part of your business. If you’re a large company, you can’t shut it down. You can’t realistically terminate part of your service. In a very real sense, it is not your business anymore. It has become an arm of the vast US surveillance apparatus, and if your interest conflicts with the agency’s, the agency wins. Your business has been commandeered.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Biologist Peter Watts makes the point that a desire for privacy is innate: mammals in particular don’t respond well to surveillance. We consider it a physical threat, because animals in the natural world are surveilled by predators. Surveillance makes us feel like prey, just as it makes the surveillors act like predators. Psychologists, sociologists, philosophers, novelists, and technologists have all written about the effects of constant surveillance, or even just the perception of constant surveillance. Studies show that we are less healthy, both physically and emotionally. We have feelings of low self-esteem, depression, and anxiety. Surveillance strips us of our dignity. It threatens our very selves as individuals. It’s a dehumanizing tactic employed in prisons and detention camps around the world.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
I started this book by talking about data as exhaust: something we all produce as we go about our information-age business. I think I can take that analogy one step further. Data is the pollution problem of the information age, and protecting privacy is the environmental challenge. Almost all computers produce personal information. It stays around, festering. How we deal with it—how we contain it and how we dispose of it—is central to the health of our information economy. Just as we look back today at the early decades of the industrial age and wonder how our ancestors could have ignored pollution in their rush to build an industrial world, our grandchildren will look back at us during these early decades of the information age and judge us on how we addressed the challenge of data collection and misuse. We should try to make them proud.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy. However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
Yuval Noah Harari (21 Lessons for the 21st Century)
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy. “However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
Yuval Noah Harari (21 Lessons for the 21st Century)
This is how it works. The exomemory stores data – all data – that the Oubliette gathers, the environment, senses, thoughts, everything. The gevulot keeps track of who can access what, in real time. It’s not just one public/private key pair, it’s a crazy nested hierarchy, a tree of nodes where each branch can only be unlocked by the root node. You meet someone and agree what you can share, what they can know about you, what you can remember afterwards.’ ‘Sounds complicated.’ ‘It is. The Martians have a dedicated organ for it.’ I tap my head. ‘A privacy sense. They feel what they are sharing, what is private and what isn’t. They also do something called co-remembering, sharing memories with others just by sharing the appropriate key with them. We just have the baby version. They give the visitors a bit of exomemory and an interface to it, reasonably well-defined. But there is no way we can appreciate the subtleties.
Hannu Rajaniemi (The Quantum Thief (Jean le Flambeur #1))
The current narrative we seem to tell ourselves about our privacy is that it is a sort of currency we trade to corporations in return for innovation. But the corporation has an insatiable appetite for our most personal data in order to drive us to consume during our every waking moment. I think this is critical, because in some ways social networks are powerful engines of conformity. The ability for students to develop their own ideas, identities, and political affiliations should take place outside of the panopticon view of Facebook, but whether this is any longer possible is an open question. My own memory is that the development of my political and cultural persona between the ages of fifteen and twenty-one had a lot to do with being outside the zone of judgment of my parents, their conservative peers from my hometown, Cleveland, and maybe even from my siblings. I’m not sure that it could happen if we were all on Facebook together.
Jonathan Taplin (Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy)
Peopleware. A major contribution during recent years has been DeMarco and Lister's 1987 book, Peopleware: Productive Projects and Teams. Its underlying thesis is that "The major problems of our work are not so much technological as sociological in nature." It abounds with gems such as, "The manager's function is not to make people work, it is to make it possible for people to work." It deals with such mundane topics as space, furniture, team meals together. DeMarco and Lister provide real data from their Coding War Games that show stunning correlation between performances of programmers from the same organization, and between workplace characteristics and both productivity and defect levels. The top performers' space is quieter, more private, better protected against interruption, and there is more of it. . . . Does it really matter to you . . . whether quiet, space, and privacy help your current people to do better work or [alternatively] help you to attract and keep better people?[19]
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
The word “collect” has a very special definition, according to the Department of Defense. It doesn’t mean collect; it means that a person looks at, or analyzes, the data. In 2013, Director of National Intelligence James Clapper likened the NSA’s trove of accumulated data to a library. All those books are stored on the shelves, but very few are actually read. “So the task for us in the interest of preserving security and preserving civil liberties and privacy is to be as precise as we possibly can be when we go in that library and look for the books that we need to open up and actually read.” Think of that friend of yours who has thousands of books in his house. According to this ridiculous definition, the only books he can claim to have collected are the ones he’s read. This is why Clapper asserts he didn’t lie in a Senate hearing when he replied “no” to the question “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” From the military’s perspective, it’s not surveillance until a human being looks at the data, even if algorithms developed and implemented by defense personnel or contractors have analyzed it many times over.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Gone are those days when media platforms were available to few individuals like politicians, movie stars, artists,sports sensations, civil right activists, and religious scholars. =Today social media gives people an easy way to almost everything =It is very easy to learn from others who are experts and professionals,Regardless of your location and education background you can educate yourself, without paying for it. =It even reveals good and Mabošaedi of the most respected people who are role models to others = You can share your issues with the community and get help within an hour . = The main advantage of the social media is that you update yourself from the latest happenings around in the world. = you can promote your business to the largest audience and even employ people But it can also damage your life for good = Since anyone can create a fake account and do anything without being traced, it has become quite easy for people to frustrate others and do a damage to their names or life. = Personal data and privacy can easily be hacked and shared on the Internet. Which can make financial losses and loss to personal life. Similarly, identity theft is another issue that can give financial losses to anyone by hacking their personal accounts. This is one of the dangerous disadvantages of the social media and it even made people kill them selfs. = Addiction destroyed many families and employments.
Nkahloleng Eric Mohlala
Silicon Valley mythology holds that Minitel failed because it was too dirigiste, too state-directed. As Julien Mailland points outs, however, both Minitel and the internet were the products of different quantities of state investment, private capital, and thriving cultures of amateur enthusiasts and experts improving the technology and proselytizing for it. Both Mintel and the internet show that there is no 'free market' without substantial pubic-sector intervention and backing. The internet's history also shows us that when we rely on the private sector and its hallowed bromide of 'innovation,' quite often that will result in technical innovations that are designed for manipulation, surveillance and exploitation. The tax-evading, offshore wealth-hoarding, data-monopolizing, privacy-invading silicon giants benefit from the internet's 'free market' mythology, but the brief flourishing of Minitel shows is that other ways, other worlds, other platforms, are possible. The question is, given that there's no way to reverse history, how can we actualize these possibilities? What sort of power do we have? As users, it turns out, very little. We are not voters on the platforms; we are not even customers. We are the unpaid products of raw material. We could, if we were organized, withdraw our labor power, commit social media suicide: but then what other platforms do we have access to with anything like the same reach?
Richard Seymour (The Twittering Machine)
Privacy was like cigarettes. No single puff on a cigarette would give you cancer, but smoke enough of the things and they’d kill you dead, and by the time you understood that in your guts, it was too late. Smoking is all up-front pleasure and long-term pain, like cheesecake or sex with beautiful, fucked-up boys. It’s the worst kind of badness, because the consequences arrive so long after—and so far away from—the effects. You can’t learn to play baseball by swinging at the ball with your eyes closed, running home, and waiting six months for someone to call you up and let you know whether you connected. You can’t learn to sort the harmless privacy decisions from the lethal ones by making a million disclosures, waiting ten years, and having your life ruined by one of them. Industry was pumping private data into its clouds like the hydrocarbon barons had pumped CO2 into the atmosphere. Like those fossil fuel billionaires, the barons of the surveillance economy had a vested interest in sowing confusion about whether and how all this was going to bite us in the ass. By the time climate change can no longer be denied, it’ll be too late: we’ll have pumped too much CO2 into the sky to stop the seas from swallowing the world; by the time the datapocalypse is obvious even to people whose paychecks depended on denying it, it would be too late. Any data you collect will probably leak, any data you retain will definitely leak, and we’re putting data-collection capability into fucking lightbulbs now. It’s way too late to decarbonize the surveillance economy.
Cory Doctorow (Attack Surface (Little Brother, #3))
GCHQ has traveled a long and winding road. That road stretches from the wooden huts of Bletchley Park, past the domes and dishes of the Cold War, and on towards what some suggest will be the omniscient state of the Brave New World. As we look to the future, the docile and passive state described by Aldous Huxley in his Brave New World is perhaps more appropriate analogy than the strictly totalitarian predictions offered by George Orwell's Nineteen Eighty-Four. Bizarrely, many British citizens are quite content in this new climate of hyper-surveillance, since its their own lifestyle choices that helped to create 'wired world' - or even wish for it, for as we have seen, the new torrents of data have been been a source of endless trouble for the overstretched secret agencies. As Ken Macdonald rightly points out, the real drives of our wired world have been private companies looking for growth, and private individuals in search of luxury and convenience at the click of a mouse. The sigint agencies have merely been handed the impossible task of making an interconnected society perfectly secure and risk-free, against the background of a globalized world that presents many unprecedented threats, and now has a few boundaries or borders to protect us. Who, then, is to blame for the rapid intensification of electronic surveillance? Instinctively, many might reply Osama bin Laden, or perhaps Pablo Escobar. Others might respond that governments have used these villains as a convenient excuse to extend state control. At first glance, the massive growth of security, which includes includes not only eavesdropping but also biometric monitoring, face recognition, universal fingerprinting and the gathering of DNA, looks like a sad response to new kinds of miscreants. However, the sad reality is that the Brave New World that looms ahead of us is ultimately a reflection of ourselves. It is driven by technologies such as text messaging and customer loyalty cards that are free to accept or reject as we choose. The public debate on surveillance is often cast in terms of a trade-off between security and privacy. The truth is that luxury and convenience have been pre-eminent themes in the last decade, and we have given them a much higher priority than either security or privacy. We have all been embraced the world of surveillance with remarkable eagerness, surfing the Internet in a global search for a better bargain, better friends, even a better partner. GCHQ vast new circular headquarters is sometimes represented as a 'ring of power', exercising unparalleled levels of surveillance over citizens at home and abroad, collecting every email, every telephone and every instance of internet acces. It has even been asserted that GCHQ is engaged in nothing short of 'algorithmic warfare' as part of a battle for control of global communications. By contrast, the occupants of 'Celtenham's Doughnut' claim that in reality they are increasingly weak, having been left behind by the unstoppable electronic communications that they cannot hope to listen to, still less analyse or make sense of. In fact, the frightening truth is that no one is in control. No person, no intelligence agency and no government is steering the accelerating electronic processes that may eventually enslave us. Most of the devices that cause us to leave a continual digital trail of everything we think or do were not devised by the state, but are merely symptoms of modernity. GCHQ is simply a vast mirror, and it reflects the spirit of the age.
Richard J. Aldrich (GCHQ)
In the introduction, I wrote that COVID had started a war, and nobody won. Let me amend that. Technology won, specifically, the makers of disruptive new technologies and all those who benefit from them. Before the pandemic, American politicians were shaking their fists at the country’s leading tech companies. Republicans insisted that new media was as hopelessly biased against them as traditional media, and they demanded action. Democrats warned that tech giants like Amazon, Facebook, Apple, Alphabet, and Netflix had amassed too much market (and therefore political) power, that citizens had lost control of how these companies use the data they generate, and that the companies should therefore be broken into smaller, less dangerous pieces. European governments led a so-called techlash against the American tech powerhouses, which they accused of violating their customers’ privacy. COVID didn’t put an end to any of these criticisms, but it reminded policymakers and citizens alike just how indispensable digital technologies have become. Companies survived the pandemic only by allowing wired workers to log in from home. Consumers avoided possible infection by shopping online. Specially made drones helped deliver lifesaving medicine in rich and poor countries alike. Advances in telemedicine helped scientists and doctors understand and fight the virus. Artificial intelligence helped hospitals predict how many beds and ventilators they would need at any one time. A spike in Google searches using phrases that included specific symptoms helped health officials detect outbreaks in places where doctors and hospitals are few and far between. AI played a crucial role in vaccine development by absorbing all available medical literature to identify links between the genetic properties of the virus and the chemical composition and effects of existing drugs.
Ian Bremmer (The Power of Crisis: How Three Threats – and Our Response – Will Change the World)
Similarly, those Internet tycoons who are apparently so willing to devalue our privacy are vehemently protective of their own. Google insisted on a policy of not talking to reporters from CNET, the technology news site, after CNET published Eric Schmidt’s personal details—including his salary, campaign donations, and address, all public information obtained via Google—in order to highlight the invasive dangers of his company. Meanwhile, Mark Zuckerberg purchased the four homes adjacent to his own in Palo Alto, at a cost of $30 million, to ensure his privacy. As CNET put it, “Your personal life is now known as Facebook’s data. Its CEO’s personal life is now known as mind your own business.” The same contradiction is expressed by the many ordinary citizens who dismiss the value of privacy yet nonetheless have passwords on their email and social media accounts. They put locks on their bathroom doors; they seal the envelopes containing their letters. They engage in conduct when nobody is watching that they would never consider when acting in full view. They say things to friends, psychologists, and lawyers that they do not want anyone else to know. They give voice to thoughts online that they do not want associated with their names. The many pro-surveillance advocates I have debated since Snowden blew the whistle have been quick to echo Eric Schmidt’s view that privacy is for people who have something to hide. But none of them would willingly give me the passwords to their email accounts, or allow video cameras in their homes.
Anonymous
Change is inevitable, and the disruption it causes often brings both inconvenience and opportunity.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
His eye contact with his partner had improved. Scoble wasn’t constantly staring at and tapping on the small screen of his phone, as he was so prone to do. Glass had improved the way we related to each other.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
IBM estimates that 90 percent of the world’s data was created in the last two years. As co-authors Rick Smolan and Jennifer Erwitt stated in their exquisite photo book, The Human Face of Big Data, “Now, in the first day of a baby’s life today, the world creates 70 times the data contained in the entire Library of Congress.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
IBM estimates that 90 percent of the world’s data was created in the last two years.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Eric Spiegel, the head of Siemens’ US arm, laid out a vision not that far removed from Ms Huang’s when he spoke at a breakfast in Washington hosted by the McKinsey Global Institute, the consultancy’s think-tank. The German engineering company, he said, would soon begin delivering spare parts to customers via email and 3D printers, also avoiding physical borders and the usual logistical complexities of global trade. But the advances in business are also coming up against fundamental debates about privacy. The Edward Snowden revelations of US online snooping have sparked a worldwide debate about privacy and the internet. Receiving less attention is the way international trade negotiations are trying to deal with what limits, if any, ought to be set on the flow of data around the globe and how to prepare for a digital future that is already a reality in some sectors. The negotiation of a 12-country Transpacific trade partnership (TPP) has sparked debate in Australia and New Zealand over whether companies ought to be allowed to store personal banking and medical data in foreign countries, or if such sensitive information should even be allowed to cross borders freely.
Anonymous
leap in the ability to process and data. For the sake of simplicity, this book will focus on the recent past to discuss various stages where information technology, norms, practices, and rules combined to allow for data gathering and sharing within an enterprise and with individuals. Framing and noting the various risks and opportunities within various stages in the Information Age creates a context for the ensuing discussion surrounding the mission and purpose of the privacy engineer and the call to action for the privacy engineer’s manifesto, as presented later in this book.
Michelle Finneran Dennedy (The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value)
Kiip’s move comes at a time when more and more data on people’s actions is becoming available as wearable devices, Internet-connected home automation equipment, and cars with integrated data connections head to market. Those new data streams could form the basis for many new services and products, but they also bring new privacy concerns. Ads tailored to driving behavior will be possible thanks to a partnership between Kiip and fellow startup Mojio. It expects to launch a $149 device this summer that plugs into a car’s diagnostic port and streams vehicle data to a smartphone app to help users track their driving, their fuel economy, and their vehicle’s maintenance status. Kiip will use data from that device to target promotions inside the Mojio app.
Anonymous
3.5 billion networked products by 2015. Compare that to 1.7 billion networked PCs and it’s clear that the “Internet of Things” has arrived.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Privacy and pollution are similar problems. Both cause harm that is invisible and pervasive. Both result from exploitation of a resource--whether it is land, water, or information. Both suffer from difficult attribution. It is not easy to identify a single pollutant or a single piece of data that caused harm. Rather, the harm often comes from an accumulation of pollutants, or an assemblage of data. And the harm of both pollution and privacy is collective. No one person bears the burden of all pollution; all of society suffers when the air is dirty and the water undrinkable. Similarly, we all suffer when we live in fear that our data will be used against us by companies trying to exploit us or police officers sweeping us into a lineup. (212-213)
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
Computing is not about computers any more. It is about living.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
While your Bluetooth-enabled toothbrush scans for cavities, you will be able to peruse messages that appear on the glass or see reminders of the medications you need to take.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
For Apple, and many companies, mobile apps are the secret sauce of the Age of Context; mobile mapping is the most strategic of all categories.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
It seems that we are back where we started. Historically, as small tribes of hunter and gatherers we had no concept of privacy. Then, as we became rooted in towns and villages, we continued to live primarily in the public square where everyone “knew our business.” With industrialization and the development of large dense urban areas, privacy was possible for the more privileged members of society and then, finally, for all of us. We have come full circle. Again, we live our lives in a public, although now digital, square where any person, company, or organization around the world can watch us, whether we want them to or not. There is more known about us than ever before. What does privacy mean in the world we now live in? This is not the first time (and certainly won’t be the last) that technology has leapfrogged ethics, bringing us to the age old question of what we can do versus what we should do. The question we should all be asking ourselves, our communities, our societies, and our leaders is this: does privacy still matter in the digital age? Yes, privacy still matters in this age of big data and digital devices. But what it means, how we regulate and enforce it, what we are willing to give up for it, how much power we give our governments over it, remains to be seen. Like it or not, we live in interesting times.
Terence Craig (Privacy and Big Data: The Players, Regulators, and Stakeholders)
On a visit to New York City, Robert Scoble posted on Highlight that he was going to Bloomingdale’s to buy a certain brand of jeans. As he walked through the main entrance, a sales representative knew he was headed her way because she had seen his Highlight post. She recognized him by his user ID photo. Through Highlight’s messaging feature she escorted Scoble to the jeans he had mentioned.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
From baby steps the Pats management hopes to be jogging later in the 2013-2014 season. That’s when the Gillette system starts getting deeply contextual. They are gathering data on the eating and drinking habits of participating fans. They know when a season ticket holder is attending and what that customer’s buying habits are during a game, so they can start to predict who will be ordering what at a particular moment in every game.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Loic Le Meur, producer of LeWeb, Europe’s largest tech conference, is an ardent fitness enthusiast and Quantified Self proponent. In August 2010, he suggested in a blog post that as people and mobile devices work together to provide highly personalized data, the human body itself becomes an Application Programming Interface (API), meaning that developers can now offer personalized mobile apps for each individual by letting their computer codes talk with each other.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
A whole new smart glass industry has been incubating for a decade. As the global construction industry comes back to life, the thousands of smart glass installations in North America, Europe, Asia and Australia are evidence of the technology’s rapidly escalating adoption rate. Corning, the world leader in specialized glass and ceramic products, has produced a series of YouTube clips called A Day Made of Glass. In them, every piece of glass in the home contains intelligence and sensors that serve as a ubiquitous contextual computing system. In Corning’s vision, the home is one big connected computer and every piece of glass is a screen that you touch to move an image from one glass surface to the next. For example, you can look up a recipe on your phone and drag the result to a space on your stovetop next to your burner as you prepare the dish. If you are video chatting on a smart glass tabletop, you can slide the image onto your TV screen without missing a beat.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
The larger looming issue is the very real loss of personal privacy and the lack of transparency about how it happens. The marvels of the contextual age are based on a tradeoff: the more the technology knows about you, the more benefits you will receive.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Throughout this book, we’ve referred to the balance between the benefits and dark sides of the Age of Context. Perhaps the most complex, controversial and sometimes volatile dark side is the issue of user privacy.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
advertising.” It started when Google introduced the AdSense network in 2003. When Google’s web crawler began to scan tens of millions of pages of content, matching ads to content by targeting keywords, contextual advertising was born. If you search for flights to Maui, for example, you might receive an ad for a nice deal on a place to stay. However, if after you returned you were looking up the name of the wonderful little shop you discovered up-island, you might see the same offer. In the former situation the ad is relevant; in the latter it’s worthless. Sometimes such ads are beneath worthless; they are downright tasteless. When
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Consumer Privacy Bill of Rights applies comprehensive, globally recognized Fair Information Practice Principles (FIPPs) to the interactive and highly interconnected environment in which we live and work today.Specifically, it provides for: − Individual Control: Consumers have a right to exercise control over what personal data companies collect from them and how they use it. − Transparency: Consumers have a right to easily understandable and accessible information about privacy and security practices. − Respect for Context: Consumers have a right to expect that companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data. − Security: Consumers have a right to secure and responsible handling of personal data. − Access and Accuracy: Consumers have a right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data is inaccurate. − Focused Collection: Consumers have a right to reasonable limits on the personal data that companies collect and retain. − Accountability: Consumers have a right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Consumer Privacy Bill of Rights★ 1 ★
Anonymous
Strengthening consumer data privacy protections in the United States is an important Administration priority. 1 Americans value privacy and expect protection from intrusions by both private and governmental actors. Strong privacy protections also are critical to sustaining the trust that nurtures Internet commerce and fuels innovation. Trust means the companies and technical systems on which we depend meet our expectations for privacy, security, and reliability. 2 In addition, United States leadership in consumer data privacy can help establish more flexible, innovation-enhancing privacy models among our international partners. 3
Anonymous
United States is committed to protecting privacy. It is an element of individual dignity and an aspect of participation in democratic society. To an increasing extent, privacy protections have become critical to the information-based economy. Stronger consumer data privacy protections will buttress the trust that is necessary to promote the full economic, social, and political uses of networked technologies. The increasing quantities of personal data that these technologies subject to collection, use, and disclosure have fueled innovation and significant social benefits. We can preserve these benefits while also ensuring that our consumer data privacy policy better reflects the value that Americans place on privacy and bolsters trust in the Internet and other networked technologies. The framework set forth in the preceding pages provides a way to achieve these goals. The Consumer Privacy Bill of Rights should be the legal baseline that governs consumer data privacy in the United States. The Administration will work with Congress to bring this about, but it will also work with privatesector stakeholders to adopt the Consumer Privacy Bill of Rights in the absence of legislation. To encourage adoption, the Department of Commerce will convene multistakeholder processes to encourage the development of enforceable, context-specific codes of conduct. The United States Government will engage with our international partners to increase the interoperability of our respective consumer data privacy frameworks. Federal agencies will continue to develop innovative privacy-protecting programs and guidance as well as enforce the broad array of existing Federal laws that protect consumer privacy. A cornerstone of this framework is its call for the ongoing participation of private-sector stakeholders. The views that companies, civil society, academics, and advocates provided to the Administration through written comments, public symposia, and informal discussions have been invaluable in shaping this framework. Implementing it, and making progress toward consumer data privacy protections that support a more trustworthy networked world, will require all of us to continue to work together★ 45 ★
Anonymous
Without location, there is no context.” And for Apple, without context there will be no leadership.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Many people do not yet realize it, but the modern car is as much a contextual tool as a smart phone is—only a lot bigger.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Movea is not the only company focused on the growing area of gestures. As we move into the Age of Context, keyboards make less sense than voice and gesture input.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Anther promising gesture innovator is Leap Motion, which makes a cute little activating touchpad that enables you to do all sorts of things by gesture on your desktop computer, including art, graphics, games, handwriting, drawing, map navigation, photo blowups and more.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
PintoFeed enables you to feed your pet remotely and check to see if Tabby or Rover is healthy and eating right.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
You have zero privacy anyway. Get over it. Scott McNealy, co-founder, Sun Microsystems
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
old Google Glass monitored what people watched; now Google Everywhere monitors what they think. Although Glass came to know Scoble better than even his spouse, Everywhere knows him better than he knows himself.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Location is also predictive. Researchers at Microsoft found that location data can be used to predict fairly accurately where people will be located in the future.
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
So when someone sends out 10 million emails, as is so often the case, they don’t really care that 9,800,000 people ignored or were annoyed by the intrusion.
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
Founded in 2011, ToyTalk already produces popular animated conversational apps — among them the Winston Show and SpeakaZoo — that encourage young children to engage in complex dialogue with a menagerie of make-believe characters. Now the company’s technology, originally designed for two-dimensional characters on-screen, is poised to power tangible playthings that children hold in their hands. This fall, Mattel plans to introduce Hello Barbie, a Wi-Fi enabled version of the iconic doll, which uses ToyTalk’s system to analyze a child’s speech and produce relevant responses. “She’s a huge character with an enormous back story,” Mr. Jacob says of Barbie. “We hope that when she’s ready, she will have thousands and thousands of things to say and you can speak to her for hours and hours.” [Video: Hello Barbie is World's First Interactive Barbie Doll Watch on YouTube.] It was probably inevitable that the so-called Internet of Things — those Web-connected thermostats and bathroom scales and coffee makers and whatnot — would beget the Internet of Toys. And just like Web-connected consumer gizmos that can amass details about their owners and transmit that data for remote analysis, Internet-connected toys hold out the tantalizing promise of personalized services and the risk of privacy perils.
Anonymous
The smartphone turns the person next to you into a potential publisher of your most private or embarrassing moments. Many app vendors, who know a great deal about you, sell data without proper disclosure; mobile-privacy policies routinely rival “Hamlet” for length. And if leaked documents are correct, GCHQ, Britain’s signals-intelligence agency, has managed to hack a big vendor of SIM cards in order to be able to listen in to people’s calls. If spooks in democracies are doing this sort of thing, you can be sure that those in authoritarian regimes will, too. Smartphones will give dictators unprecedented scope to spy on and corral their unwilling subjects.
Anonymous