Tag Archives: Privacy

🖖🏻 Internet 2022 – What’s the ONE thing you can do to make it better?

Way back in 2019 (BC), I summarized why, in 2016, I stopped writing about tech and the Internet. TLDR: I felt like I was always writing and reporting about Negative stuff. Ironically, I never published that blog because it seemed way too negative. 🤣 Today we revisit the Internet to see what has changed, and I will give you TechWite’s ONE Suggestion for Making the Internet Better.

Back in the previous decade, before Covid and so much else, I saw the once promising Internet turning into the mess covered in the categories below:

  1. Bad Manners, Shaming, and Other Rotten Behavior
  2. Facebook
  3. Hacking, Swindling, Blackmail, & Ransom
  4. Harassment and Sexism
  5. Amazon, Uber, Monopoly and the New Workplace Overlords
  6. Net Neutrality
  7. New Technologies
  8. Privacy
  9. Resistance
  10. Trends

* DATB – (Details at the Bottom) For details, scroll down and read the article titles (with links) that I collected at the time.

None of these issues have gone away —except maybe Net Neutrality—and regular readers will note that I even see some hope here and there. In fact, before I dive into the worst of it, I want to add a couple more hopeful signs:

Old Data Never Dies“—Or maybe it does! Some companies are actually cleaning up their accounts — allegedly, they respect your privacy and won’t keep your information forever! Here are two examples:

Realism about Likes and Engagement? — There is the whole Elon thing, and I’m not going to give the guy another stage for his drama; we knew months ago that Twitter didn’t have as many users as they claim. So maybe people are catching on to the fakeness of it all?? One can hope. 🙂

eBooks have a future? — Not addressed elsewhere in TechWite, but a long-time issue for me is the limitations of purchased eBooks when copy-protected by Amazon, Apple, et al. They’re often not cheaper than paper, they have some great tech advantages, but basically if you buy an eBook, you are the only person who ever gets to use it. You can’t loan it, share it, give it away, or sell it. So why buy it? I thought Blockchain might be a way that people could “own” eBooks and have all the options of selling, sharing etc. One company is planning to sell textbooks as NFTs. Of course they want to protect the book as their asset, but the technology could be used to allow individuals to OWN and sell eBooks just as if they were “real”.

Pearson plans to sell its textbooks as NFTs | Publishing | The Guardian
Educational publisher’s move into non-fungible tokens is intended to claw back some of the income lost to secondhand sales
— Read on www.theguardian.com/books/2022/aug/02/pearson-plans-to-sell-its-textbooks-as-nfts

The rest of this stuff sounds much like it did in 2017…

#Hacking and #NoPrivacy

LastPass, a Password Manager With Millions of Users, Is Hacked – WSJ
The company said no information was stolen from its more than 33 million users after an unauthorized party accessed its development environment
— Read on www.wsj.com/articles/lastpass-a-password-manager-with-millions-of-users-is-hacked-11661524398

FTC Sues Over Tracking Data That Could Expose Visits to Abortion Clinics – The New York Times
Federal regulators said the sale of geolocation information on tens of millions of smartphones could expose people’s visits to private places.
— Read on www.nytimes.com/2022/08/29/business/ftc-lawsuit-tracking-data-abortion.html

Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret – The New York Times (2018)
Dozens of companies use smartphone locations to help advertisers and even hedge funds. They say it’s anonymous, but the data shows how personal it is.
— Read on www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html

And then there’s Facebook...

Read this Felix Krause blog from just the other day. (It’s not much different than the 10 articles about Facebook in the DATB.)

iOS Privacy: Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause
— Read on krausefx.com/blog/ios-privacy-instagram-and-facebook-can-track-anything-you-do-on-any-website-in-their-in-app-browser

Facebook, Meta, Zuckerburg and everything he owns represent the biggest threat to creativity, safety, security on the Internet, and life as we would like to know it. For all the times he and the company have been caught lying, stealing data, selling it illegally, monopolizing, crushing competition, etc. etc. etc., they’ve never admitted culpability. Oops! We’ll have to do better! Poor Mark! He wakes up every day to find somebody wants to put him down. He’s a victim!! Right.

So What’s the one thing you could do to make the Internet a better place? Delete Facebook. I don’t mean sign out and stay off for a few weeks or months and write an article about how you “Quit Facebook” (you’ll find these all over the Internet). They’re fake quitters. I’m saying DELETE FACEBOOK and never go back to it, never. (Most people don’t understand all the thieving corrosive technology behind the “friendly” interface of Fakebook. I don’t. But I AM TECHWITE, and I know enough to tell you to avoid it.)

Facebook is a time wasting, drama-generating cesspool of scammers and criminals that encourages people to treat each other badly. Never, ever, ever use Facebook or have it installed on your phone or iPad. If you are tempted to go to Facebook via a web browser, don’t. Before you do, learn all about private browsing and clearing your cache, and all the other stuff you have to do to wipe the digital leeches that Facebook will attach to your identity just by using a browser. Unfortunately, this probably applies to Instagram and Mark’s Metaverse, and every other company or product he buys and corrupts or destroys. But let’s keep it simple. #DeleteFacebook

—TechWite Peace Out 🤙🏻

*DATB (below)

BAD MANNERS, SHAMING, AND OTHER ROTTEN BEHAVIOR circa 2017


Jon Ronson: When online shaming goes too far | TED Talk | TED.com
AT&T and Johnson & Johnson Pull Ads From YouTube – The New York Times
‘Missing Richard Simmons,’ the Morally Suspect Podcast – The New York Times
U-cant-talk-to-ur-professor-like-this – The New York Times

FACEBOOK


Don’t Let Facebook Make You Feel Miserable – The New York Times
‘10 Concerts’ Facebook Meme May Reveal More Than Musical Tastes – The New York Times
After Posting of Violent Videos, Facebook Will Add 3,000 Content Monitors – WSJ
Can Facebook Fix Its Own Worst Bug? – The New York Times
Why Facebook Keeps Beating Every Rival: It’s the Network, of Course – The New York Times
Cleveland Police Seek Suspect After a Killing Seen on Facebook – The New York Times
Facebook denies targeting insecure users – BBC News
Millions duped by Facebook Live video – BBC News
Facebook Live ‘broadcasts gang rape’ of woman in Sweden – BBC News
‘Sex assault’ streamed on Facebook Live – BBC News

 

HACKING, SWINDLING, BLACKMAIL, & RANSOM


Password manager OneLogin hacked, exposing sensitive customer data | ZDNet
Disney hack: Ransom demanded for stolen film
Russian Cyberforgers Steal Millions a Day With Fake Sites – The New York Times
How to Make $80,000 Per Month on the Apple App Store – Medium
India’s Call-Center Talents Put to a Criminal Use: Swindling Americans – The New York Times
In Cyber Attack Where does Microsoft’s Responsibility Lie? – The New York Times
U.S. Far-Right Activists Promote Hacking Attack Against Macron – The New York Times
Hacking Attack Has Security Experts Scrambling to Contain Fallout – The New York Times
Hackers Hide Cyber Attacks in Social Media Posts – The New York Times  
No, Your Phone Didn’t Ring. So Why Voice Mail From a Telemarketer? – The New York Times

HARASSMENT AND SEXISM


Women in Tech Speak Frankly on Culture of Harassment – The New …
Here are 6 of Our Favorite iOS 11 ARKit Demonstrations – The Mac …
Jake Paul, a Reality Villain for the YouTube Generation – The New …

 

Amazon, UBER, Monopoly and the NEW WORKPLACE OVERLORDS


Amazon’s Move Signals End of Line for Many Cashiers – The New …
How Uber Uses Psychological Tricks to Push Its Drivers’ Buttons – The New York Times
Uber to Repay Millions to Drivers, Who Could Be Owed Far More – The New York Times
The Online Marketplace That’s a Portal to the Future of Capitalism – The New York Times

NET NEUTRALITY


FCC and Congress Work to Roll Back Net Neutrality – TidBITS
F.C.C. Chairman Pushes Sweeping Changes to Net Neutrality Rules – The New York Times

 

NEW TECHNOLOGIES


IoT Opens New Door for DDoS Attacks – CIO Journal – WSJ
Google Wants Driverless Cars, but Do We? – The New York Times

 

PRIVACY


Microchip Implants for Employees? One Company Says Yes – The …
Sonos says users must accept new privacy policy or devices … – ZDNet
Your Roomba May Be Mapping Your Home, Collecting Data That …
Clearing Out the App Stores: Government Censorship Made Easier – The New York Times

 

RESISTANCE


Resist the Internet – The New York Times
Hooked on Our Smartphones – The New York Times
Leave Your Laptops at the Door to My Classroom – The New York Times

TRENDS


Mossberg: The Disappearing Computer – Recode
As Coding Boot Camps Close, the Field Faces a Reality Check – The New York Times
Maybe We’ve Been Thinking About the Productivity Slump All Wrong …
How Technology Has Failed to Improve Your Airline Experience – The New York Times
Platform Companies Are Becoming More Powerful — but What Exactly Do They Want? – The New York Times
Valuation Shell Game: Silicon Valley’s Dirty Secret – The New York Times

#ResisttheInternet #AvoidtheInternet Protect your #Privacy #DeleteFacebook — Why I stopped writing about Tech

🙏🏻QR Code Controversy? Really? Calm down America.

Since Covid, QR Codes have become popular, especially as a “no-touch” tool to view a restaurant menu using a cell phone. Sometimes you can even order and pay using your cell phone. Although this New York Times article doesn’t outright suggest that using QR codes is risky or dangerous or a threat to your online privacy, it doesn’t do much to explain how a QR Code works, leading many readers to assume that the QR Code is some sinister new technology that will steal their identity, or worse.

Reader reactions to the article were just off-the-charts, paranoid-whacko. I tried to help out with this soothing comment:

“QR codes save you typing in a URL to get to a web page. As suggested by others here, any “damage” to privacy etc., results from the security threats already present on web sites and the internet. If this idea drives you to action, then get off Facebook and Amazon, both of which do far more damage than a restaurant web page.”

Christopher Plummer, Reader Comment, on article “QR Codes Are Here to Stay”, NYT, 7/26/2021

By this evening, there were almost 300 more comments about the article, mostly paranoid-whacko comparisons to the dystopias of Huxley and Orwell and horrified exclamations of former customers who swear they’ll never go to a restaurant again…and so on.

America, calm down! There are plenty of reasons to #AvoidtheInternet, but QR Codes used by restaurants are not one of them. If you use the simple camera connection in your phone or tablet that recognizes a QR Code, it:

  1. Translates the text that the “code” represents
  2. Recognizes that text as a URL (the kind you would type in your web browser)
  3. Passes that URL to your browser
  4. And opens your browser to that specific web page

That’s all that is happening! QR Codes can contain other information—addresses, phone numbers—but if all you’re doing is reading the code with the camera on your device (and NOT using a 3rd party QR app), then the not-sinister QR Code is saving you some keystrokes to get you to a web site. THAT’S ALL.

As I imply, once you get to the web site in question, your security and privacy is entirely up to you, and contains the same risks as any other commerce web site that may use trackers, cookies, spy pixels, profiling, blah, blah, blah, all the reasons you have to be smart and consider that you might want to #AvoidTheInternet, #DeleteFacebook, and so on. But please, don’t blame the QR Code.

This code takes you to a photograph I took.

Be Careful Out there! 🙂

—TechWite

Old Data Never Dies… 🤙

Ladders Bad Data

Date: September 3, 2017 at 8:00:43 AM EDT
Subject:Notice of Updated Terms of Use & Privacy Policy – September 2017
Reply-To: jobs

Somewhere, somebody is looking at a report about job hunters on “the Ladders”. My personal information there is obsolete. There’s a number in that report that represents my ancient sign up on their site as a participant and job seeker, which is bogus. Because? I am not a participant in “the Ladders”, nor an active member, nor a  job seeker, nor have I been for years.

Don’t they take any responsibility for the “freshness” of their data? Of course! They send out Policy and Terms of Use update notices. Obviously anyone who doesn’t respond is still a valid member, desires to remain on their roles, and agrees to the Policy changes. That’s how everyone expresses agreement right, by silence?

This is not just a “Ladders” issue; it’s another example of the convoluted backward logic and misleading or outright fraudulent data that permeates the Internet. It’s in a company’s interest to have more users, more members, more eyeballs, more job seekers. Those numbers are important—everyone knows they are inflated, don’t they? (THAT’s a rhetorical question. NO, I don’t think “they” do.)

A responsible Internet company will periodically roll-off and clear out that data (making the assumption that true data would be more valuable). Most even have a mechanism in place to do this. How? The former job seeker/member logs in and updates his/her information or maybe even closes the account.

But, relying on the user? Asking someone to clean up an old login they used more than a few years ago? This is worse than getting off a snail-mail catalog subscription, where you can usually call an 800 number! If the user has to login, or send mail from an old or non-existent email address, or go through an annoying and time-consuming password upgrade process? Too much work! It’s not happening.

If companies were serious about truthful data, they would make this process easy. How? Notify the user that the account is about to expire, and the data will be expunged or otherwise no longer considered “active”. No response: assume that the data should be cleared, and clear it!

They’d rather have bigger numbers. True data is good, but to these jokers more data is better. More members even if they are imaginary. The companies want your data, even if it is wrong, and they are getting more obstinate about keeping it.

🤙🏻

— TechWite

(And no, I’m not nuts about this. Maybe someone has a reason not to be online and away for…a few months, or years? So put a mechanism in place to put everything in “suspend” or “archive” mode first, before it disappears permanantly. These issues are not that difficult.)

Guys!

How the NSA’s Firmware Hacking Works and Why It’s So Unsettling | WIRED.

Guys, I really don’t want to spend all my time reading and writing about security. Can we just agree that the NSA has pretty much hacked every PC down to the metal? That there are other government and NGEs (non-government entities) that have done, or want to do the same? That it is inevitable that people will discover what was done by all these jokers and all the gaps will be compromised? And, finally, that the NSA is bad for USA businesses, but good for foreign Anti-Spyware companies like Kaspersky? Ok. That’s the current state of non-security.

So can we go back to writing about Mac tips and alien abductions please?

Surprise! Your Yoga has some holes in it.

Researcher Discovers Superfish Spyware Installed on Lenovo PCs – NYTimes.com

Surprise! Your “Yoga”, has some holes in it. Designed to be as attractive and useful as any Apple device (and marketed unconvincingly as a replacement for your MacBook Air), the Yoga unfortunately came (past tense, according to Lenovo) with Superfish Spyware pre-installed. “Adware” and “Bloatware” – collectively known as “crapware” – are de rigueur for Windows purchasers, but Superfish takes this to a new level with an unsigned certificate providing easy access to your data for anyone who knows how to use it.

I met an insider years ago (p.s. – Pre-Snowden), who told me he was convinced Lenovo had code embedded in the computer ROM that allowed Chinese authorities full access to the device. He gave up on trying to expose this security “flaw” after everyone, including the FBI, told him he was paranoid. So, who’s paranoid now?

Tip: Savvy computer buyers shop for those “special” Windows computers without crapware. Or buy Macs.

 

Obama Heads to Tech Security Talks Amid Tensions – NYTimes.com

Obama Heads to Tech Security Talks Amid Tensions – NYTimes.com.

No back doors. Encrypt everything.

If that’s the view of my Silicon Valley business; if that’s what I deem as the best way to protect my customers privacy, and thereby keep the customer satisfied, does that make me an anarchist?  A supporter of organized crime? Or anti-American?

Or let’s say I’m doing business in China, and I want to do business in China, but now the Chinese government wants access to my code, back doors, encryption keys. And for the sake of my customers, and my own integrity, and to protect my business “secrets”, I say, “No.”  Does it mean my company is a monopoly? Does it mean I am anti-Communist? Or anti-Chinese?

Folks, this is getting crazy. Take a step back. From the perspective of national interests the NSA of the USA is supposed to have access to all my private information, conversations, and data? Just in case I might be a criminal or terrorist? And basically, China wants control of the Internet, access to data, pretty much the same thing, “justified” by what the USA and NSA have already done? This is so obviously nuts! Do I really have to explain this?

The NSA and all the many other governement agencies that are on the cyber-security gravy train, funded by our tax dollars, billions of our tax dollars, should get off their asses and help us protect our data. From everyone. Including themselves. Not just lock down the banks, and utilities, and insurance companies, and major corporations. Make sure that individuals have control of their own privacy. No backdoors for anybody. Then law enforcement and homeland security would have to do their investigative work the old-fashioned, pre-Bush Era way, by sticking to Constitutional restraints and using good detective work and communication.

Because if Apple and Google and other companies are encrypting our data so well that even they (much less the FBI) can’t read it without our consent or cooperation, then they’re protecting our privacy, and their business interests, and by extension, our national interests—better than our own government.

Zero Day that.

@War: Insights into the Sony Hacking

@War: The Rise of the Military-Internet Complex: Shane Harris: 9780544251793: Amazon.com: Books.

Read this book – Shane Harris’s “@War” is an informative read that will give you some keen insights into hacking and cyber warfare and the evolving stance of the US government and the agencies engaged in the struggle for power and funding in this arena. Though by its nature this book is destined to become an accounting of history, it is current enough to explain much of what is going on right now. Such as:

Why the NSA doesn’t do more to help protect the hacking of business interests? Has it even tried? And just what are “hackbacks” and are they really illegal?

Why is the FBI (instead of the NSA or US Cyber Command) making proclamations about North Korean culpability? One answer, the FBI’s DITU (Data Intercept Technology Unit) acquires the international “data” from domestic sources, that is passed to the NSA. (The FBI, traditionally tasked with domestic crime, now has more staff involved in collection and analysis of digital information than in “traditional” domestic crime investigations.)

Who stands to benefit from an increased fear of Internet crime, hacking, and warfare? Welcome to the new frontier—same as the old frontier—agencies, companies, and contractors vying for billions of dollars in taxpayer funds. Just watch as President Obama and congress find lots of reasons to put more and more resources into “Cyber Warfare”. (Why we have to be threatened with some kind of “war” to make our data more secure is another question. Haven’t all the hacks of banks and corporations and thefts of personal data given us some personal priorities of what really needs to be protected? Apparently not…)

Depending on how much you already pay attention to this topic you may be shocked, surprised, or affirmed by the level at which our Internet is already watched and controlled, and how much more control these players would like to have. This is not just a regurgitation of Edward Snowden’s whistleblowing. Without judging or indulging in politics of the left or right, it’s investigative journalism, with many cited sources, notes, and a thorough index. Best of all, it reads well.

New Report: Snowden Revelations Hurt U.S. Companies – Digits – WSJ

New Report: Snowden Revelations Hurt U.S. Companies – Digits – WSJ.

Ah, the power of words. From this headline you would think that Edward Snowden was directly responsible for the damage done to US technology businesses. What a brilliant master criminal. Because? Because businesses (especially foreign businesses) are wary of companies who leave the door open for the NSA to come snooping around. Or give the NSA the keys to the house. Or throw the stuff into the back of the NSA truck parked in the driveway. So to speak. It’s all in how you phrase it, right? The Wall Street Journal has a certain Murdochian perspective on this. A somewhat more objective news organization might have titled the article, “Study Confirms: Discovery of NSA Spying Hurt U.S. Companies”.

And that’s the difference.