<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7357029693565332780</atom:id><lastBuildDate>Wed, 06 Nov 2024 02:49:02 +0000</lastBuildDate><title>You Own The Internet</title><description></description><link>http://youowntheweb.blogspot.com/</link><managingEditor>noreply@blogger.com (Rob Grams)</managingEditor><generator>Blogger</generator><openSearch:totalResults>8</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-5817704635467845343</guid><pubDate>Fri, 06 Jun 2014 18:14:00 +0000</pubDate><atom:updated>2014-06-06T11:14:00.538-07:00</atom:updated><title>Would you be happy if Apple and their app developers had your fingerprint on file?</title><description>&lt;h1 class=&quot;title&quot; id=&quot;page-title&quot; style=&quot;margin: 0px;&quot;&gt;
&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px; line-height: 24px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: small; font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot; style=&quot;font-size: medium; font-weight: normal;&quot;&gt;Click HERE&lt;/a&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h1 class=&quot;title&quot; id=&quot;page-title&quot; style=&quot;margin: 0px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;OVERNIGHT TECH: Privacy advocates eye new Apple.&amp;nbsp;&lt;i&gt;By &lt;a href=&quot;http://thehill.com/author/kate-tummarello&quot;&gt;Kate Tummarello&lt;/a&gt;&amp;nbsp;Via:&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;a href=&quot;http://thehill.com/policy/technology/overnights/207991-overnight-tech-privacy-advocates-eye-new-apple-features#ixzz33iex1ShT&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;thehill.com&lt;/i&gt;&lt;/span&gt;&lt;/a&gt; &lt;/h1&gt;
&lt;br /&gt;
THE LEDE: At its annual developers conference on Monday, Apple announced new features and expanded uses of current features that could raise some concerns among privacy advocates and privacy-minded lawmakers.&lt;br /&gt;
&lt;br /&gt;
The company announced that it would be expanding the uses for its Touch ID, the iPhone’s fingerprint verification feature. While that feature can currently be used to unlock a phone, it will soon be available to log in to applications.&lt;br /&gt;
&lt;br /&gt;
“People love using Touch ID, and now, third party apps can take advantage of Touch ID as well,” Craig Federighi, Apple’s senior vice president of software engineering, said during Monday’s presentation. While less than half of iPhone users had passcodes before the company rolled out Touch ID, 83 percent enabled passcode or fingerprint unlocking once the feature was introduced, he said.&lt;br /&gt;
&lt;br /&gt;
Federighi touted the feature’s privacy and security protections. “It always keeps the fingerprint data itself completely protected inside of the secure enclave in the A7 processor,” he said. “The information is never exposed to third party apps or the rest of the system, for that matter. It’ very secure.”&lt;br /&gt;
&lt;br /&gt;
Despite those assurances, the expanded use of the fingerprint ID feature could raise eyebrows among privacy advocates. Sen. Al Franken (D-Minn.) — who wrote to Apple about the privacy implications of Touch ID when it was announced last year — said he is “looking forward to finding out more about” Apple’s Monday announcement. “Using fingerprints as passwords can be a double-edged sword: it adds convenience, but it often creates potential long-term security concerns,” Franken said in a statement.&lt;br /&gt;
&lt;br /&gt;
Also, a new health, fitness data center: Apple also announced a new feature that would incorporate health data from other applications to create what Federighi called “a composite profile of your activity and health” with built-in privacy protections. “We carefully protect your privacy, so you have total control over which applications have access to which part of your healthcare information,” he said.&lt;br /&gt;
&lt;br /&gt;
Pam Dixon, executive director of the World Privacy Forum, warned that Apple should be careful with this “quasi-health data,” which can be used, often without the user’s knowledge, to affect healthcare costs. “The really innocent, simple fitness information is actually really important” in determining healthcare costs, she said. &lt;br /&gt;
&lt;br /&gt;
While Apple isn’t subject to the Health Information Portability and Accountability Act — which governs how traditional healthcare providers use and share data — the company “is going to have to be really careful” to give users “full confidence that the [health and fitness] information isn’t going anywhere,” Dixon continued.&lt;br /&gt;
&lt;br /&gt;
SCOTUS rulings slap top patent court: The Supreme Court on Monday issued two rulings reining in the rights of patent holders that have been established by the U.S. Court of Appeals for the Federal Circuit, the country’s top patent court. In a case between tech companies Akamai and Limelight, &lt;a href=&quot;http://thehill.com/policy/technology/207898-supreme-court-splitting-patents-steps-is-not-infringement&quot;&gt;the court said&lt;/a&gt; a company does not infringe on a method patent if it replicates only some of the steps described in the patent. In another case between companies producing heart rate monitors, the Supreme Court raised the specificity standards for infringement claims.&lt;br /&gt;
&lt;br /&gt;
The rulings come after the Senate Judiciary Committee walked away from its attempts to craft a patent litigation reform bill, but patent reform advocates say the Supreme Court’s Monday actions are a step in the right direction to curb abuse of the patent system. The ruling in the Limelight case “shuts down another potential avenue of going after customers, which is a good thing,” Julie Samuels, executive director of tech advocacy group Engine, said. “It also is promising to see the continued pushback on the Federal Circuit, whose broad — and unjustified — reading of the law has led to the troll problem.”&lt;br /&gt;
&lt;br /&gt;
FCC releases spectrum auction rules: The Federal Communications Commission on Monday published a &lt;a href=&quot;http://transition.fcc.gov/Daily_Releases/Daily_Business/2014/db0602/FCC-14-50A1.pdf&quot;&gt;484-page order&lt;/a&gt; outlining its rules for the 2015 spectrum auction, which will involve buying airwaves back from television broadcasters and reselling them to wireless companies looking to boost their cellphone networks. At its monthly meeting in May, the Commission &lt;a href=&quot;http://thehill.com/policy/technology/206244-fcc-limits-verizon-att-in-airwaves-auction&quot;&gt;voted&lt;/a&gt; 3-2 to approve the agency’s plans for the auction, including limiting some companies — especially industry giants AT&amp;amp;T and Verizon — from participating in parts of the auction.&lt;br /&gt;
&lt;br /&gt;
The National Association of Broadcasters said it is “currently wading through the rather lengthy order.” In a statement, the group’s Executive Vice President of Communications, Dennis Wharton reiterated that its “twin aims are to help ensure the best chance for auction success while holding harmless those local TV stations committed to staying in business who wish to continue serving their tens of millions of viewers.&quot;&lt;br /&gt;
&lt;br /&gt;
FCC’s O’Rielly calls for internal tech advances: FCC Republican Commissioner Michael O’Rielly took to the &lt;a href=&quot;http://www.fcc.gov/blog/fcc-needs-improve-its-internal-911-and-ipv6-compliance&quot;&gt;agency’s blog&lt;/a&gt; on Monday to criticize the FCC for calling on the private sector to make specifical technical improvements without making the same improvements itself. “The FCC loses credibility when it seeks to impose rules or standards on the private sector but does not adhere to the same or similar commitments in its own operations,” O’Rielly wrote.&lt;br /&gt;
&lt;br /&gt;
He pointed to the agency’s recent work to improve the 911 system, despite the fact that within the FCC, callers have to dial 9 before dialing outside numbers, including 911. O’Rielly encouraged the agency to go through with the “simple” update to the phone systems to allow direct dialing to 911 and then help other agencies complete a similar update. “This potential life-saving fix is especially important because in addition to hosting employees and visitors, many of our Federal buildings have day care centers with infants and young children on site,” he wrote.&lt;br /&gt;
&lt;br /&gt;
O’Rielly also criticized the agency’s efforts to keep up with the IPV6 transition, which involves updating websites to make them compatible with Internet Protocol addresses assigned under the new, bigger IPV6 address system. Despite the FCC’s calls on the private sector to “quickly move” to the new system, 12 percent of the agency’s subdomains are IPV6 compatible, O’Rielly wrote. “For an agency that just proposed rules and questions that aim to micromanage the way the Internet works, this seems ironic,” he said, referencing FCC Chairman Tom Wheeler’s controversial attempts to rewrite the agency’s net neutrality rules.&lt;br /&gt;
&lt;br /&gt;
Read more: &lt;a href=&quot;http://thehill.com/policy/technology/overnights/207991-overnight-tech-privacy-advocates-eye-new-apple-features#ixzz33iex1ShT&quot;&gt;http://thehill.com/policy/technology/overnights/207991-overnight-tech-privacy-advocates-eye-new-apple-features#ixzz33iex1ShT&lt;/a&gt; &lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px; line-height: 24px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot;&gt;Click HERE&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://youowntheweb.blogspot.com/2014/06/would-you-be-happy-if-apple-and-their.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-3477201377777557103</guid><pubDate>Fri, 06 Jun 2014 13:00:00 +0000</pubDate><atom:updated>2014-06-06T06:00:00.723-07:00</atom:updated><title>&quot;The President&quot; supports our voice...</title><description>&lt;h1 class=&quot;heading&quot; style=&quot;-webkit-appearance: none; background-color: white; font-family: open-sans, sans-serif; font-size: 20px; margin: 0px;&quot;&gt;
&lt;img src=&quot;https://s3.amazonaws.com/thunderclap-production/campaign_updates/hero_images/000/004/663/web/Captura_de_pantalla_2014-05-27_a_la(s)_15.12.10.png?1401196348&quot; style=&quot;-webkit-appearance: none; font-size: 16px; line-height: 24px; width: 100%;&quot; /&gt;&lt;/h1&gt;
&lt;div style=&quot;-webkit-appearance: none; background-color: white; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;div style=&quot;font-family: open-sans, sans-serif;&quot;&gt;
&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: small; line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium; line-height: normal;&quot;&gt;Click HERE&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Obama said on Feb 23rd, 2012 &quot;Consumers can’t wait any longer for clear rules of the road that ensure their personal information is safe online&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The same day The&amp;nbsp;White House released its&amp;nbsp;&lt;a href=&quot;http://www.bloomberg.com/news/2012-02-23/obama-looks-to-web-industry-for-online-consumer-privacy-standard.html&quot; style=&quot;-webkit-appearance: none; -webkit-transition: color 0.3s linear; color: #c82820; transition: color 0.3s linear;&quot;&gt;Consumer Privacy Bill of Rights&lt;/a&gt;, a proposal to protect online users from being tracked by websites without their knowledge.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;President Barack Obama said in a statement. “As the Internet evolves, consumer trust is essential for the continued growth of the digital economy.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The administration’s plan was to offer&amp;nbsp;a thorough, considered recommendation that “stakeholders”—industry, government and, one hopes, consumer advocacy groups—agree on a set of standards, in line with those in other countries, to be codified by Congress and enforced by the Federal Trade Commission&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;It was Feb 23rd and President used &quot;trust&quot;... I guess he knew that the issue was huge to bring his attention. We believe the oil of the economy should be &quot;trust&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;What happen with the&amp;nbsp;&lt;a href=&quot;http://www.bloomberg.com/news/2012-02-23/obama-looks-to-web-industry-for-online-consumer-privacy-standard.html&quot; style=&quot;-webkit-appearance: none; -webkit-transition: color 0.3s linear; color: #c82820; transition: color 0.3s linear;&quot; title=&quot;Link: http://www.bloomberg.com/news/2012-02-23/obama-looks-to-web-industry-for-online-consumer-privacy-standard.html&quot;&gt;Consumer Privacy Bill of Rights&lt;/a&gt;? Have you seen real actions focus to recover trust? (you can see at the end of this update a summary of the Bill of Rights. It is interesting that you read it to see what has change to better or to worse???)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Well ... as a consequence of the Obama&#39;s call. All the industry got together and they launched and promote &quot;Digital Advertising Alliance&#39;s (DAA) Self-Regulatory Program for Online Behavioral Advertising&quot; with the&amp;nbsp;Advertising Option Icon (&lt;a href=&quot;http://www.youradchoices.com/&quot; style=&quot;-webkit-appearance: none; -webkit-transition: color 0.3s linear; color: #c82820; transition: color 0.3s linear;&quot; title=&quot;Link: http://www.youradchoices.com/&quot;&gt;http://www.youradchoices.com/&lt;/a&gt;). Are you familiar with that?&amp;nbsp;Have you seen the icon? Can you recognize it? Does it come&amp;nbsp;immediately&amp;nbsp;to your mind after I mention it?&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Two years after President Barack Obama promised to introduce legislation to strengthen privacy protections on the Internet, a coalition of consumer groups and civil rights organizations are urging him to follow through on his promise (&lt;a href=&quot;http://www.mcclatchydc.com/2014/02/24/219200/consumer-groups-urge-president.html#storylink=cpy&quot; style=&quot;-webkit-appearance: none; -webkit-transition: color 0.3s linear; color: #c82820; transition: color 0.3s linear;&quot; title=&quot;Link: http://www.mcclatchydc.com/2014/02/24/219200/consumer-groups-urge-president.html#storylink=cpy&quot;&gt;http://www.mcclatchydc.com/2014/02/24/219200/consumer-groups-urge-president.html#storylink=cpy&lt;/a&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-appearance: none;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br style=&quot;-webkit-appearance: none;&quot; /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;We only see the tip of the iceberg, but it is the tip of a very large iceberg.There are too many interests, lobbies under the tip of the iceberg. We see what they want us to see. Imaging under the ice, specially after NSA case. Companies providing access to information to the Government,&amp;nbsp;NSA general counsel Rajesh De said &quot;big tech companies like Yahoo and Google provided ‘full assistance’ in legally mandated collection of data&quot; (&lt;a href=&quot;http://www.theguardian.com/world/2014/mar/19/us-tech-giants-knew-nsa-data-collection-rajesh-de&quot; style=&quot;-webkit-appearance: none; -webkit-transition: color 0.3s linear; color: #c82820; transition: color 0.3s linear;&quot; title=&quot;Link: http://www.theguardian.com/world/2014/mar/19/us-tech-giants-knew-nsa-data-collection-rajesh-de&quot;&gt;http://www.theguardian.com/world/2014/mar/19/us-tech-giants-knew-nsa-data-collection-rajesh-de&lt;/a&gt;)&amp;nbsp;. How a President can put pressure on&amp;nbsp;the industry to be more transparent on privacy if owes too many favors?&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br style=&quot;-webkit-appearance: none;&quot; /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;What&#39;s worse that our data is being spied by governments or manage, analyzed, and monetized by big players????. Everybody is talking about the NSA and the government. One could argue that the government is doing that for our benefit to have more security in our&amp;nbsp;countries... What about companies??? Are they analyzing, selling our data so that we are live is safer?&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Thanks for supporting a new internet where you own and control your data while sealing privacy&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br style=&quot;-webkit-appearance: none;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;---------------- Consumer Privacy Bill of Rights - Summary --------------------&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;“Every day, millions of Americans shop, sell, bank, learn, talk and work online.&amp;nbsp; At the turn of the century, online retail sales were around $20 billion in the United States, now they’re nearing $200 billion,” said&amp;nbsp;&lt;strong style=&quot;-webkit-appearance: none;&quot;&gt;Secretary Bryson&lt;/strong&gt;.&amp;nbsp; “The Internet has become an engine of innovation, business growth, and job creation, so we need a strong foundation of clear protections for consumers, and a set of basic principles to help businesses guide their privacy and policy decisions.&amp;nbsp; This privacy blueprint will do just that.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The Consumer Privacy Bill of Rights provides a baseline of clear protections for consumers and greater certainty for businesses. The rights are:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Individual Control:&amp;nbsp; Consumers have a right to exercise control over what personal data organizations collect from them and how they use it.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;ul style=&quot;-webkit-appearance: none; list-style-image: initial; list-style-position: initial; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;-webkit-appearance: none; margin-bottom: 15px; margin-left: 30px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;strong style=&quot;-webkit-appearance: none;&quot;&gt;Transparency:&lt;/strong&gt;&amp;nbsp; Consumers have a right to easily understandable information about privacy and security practices.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-appearance: none; list-style-image: initial; list-style-position: initial; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;-webkit-appearance: none; margin-bottom: 15px; margin-left: 30px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;strong style=&quot;-webkit-appearance: none;&quot;&gt;Respect for Context:&lt;/strong&gt;&amp;nbsp; Consumers have a right to expect that organizations will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-appearance: none; list-style-image: initial; list-style-position: initial; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;-webkit-appearance: none; margin-bottom: 15px; margin-left: 30px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;strong style=&quot;-webkit-appearance: none;&quot;&gt;Security:&lt;/strong&gt;&amp;nbsp; Consumers have a right to secure and responsible handling of personal data.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-appearance: none; list-style-image: initial; list-style-position: initial; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;-webkit-appearance: none; margin-bottom: 15px; margin-left: 30px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;strong style=&quot;-webkit-appearance: none;&quot;&gt;Access and Accuracy:&lt;/strong&gt;&amp;nbsp; Consumers have a right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data are inaccurate.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-appearance: none; list-style-image: initial; list-style-position: initial; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;-webkit-appearance: none; margin-bottom: 15px; margin-left: 30px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;strong style=&quot;-webkit-appearance: none;&quot;&gt;Focused Collection:&lt;/strong&gt;&amp;nbsp; Consumers have a right to reasonable limits on the personal data that companies collect and retain.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;-webkit-appearance: none; list-style-image: initial; list-style-position: initial; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;li style=&quot;-webkit-appearance: none; margin-bottom: 15px; margin-left: 30px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;strong style=&quot;-webkit-appearance: none;&quot;&gt;Accountability:&lt;/strong&gt;&amp;nbsp; Consumers have a right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Consumer Privacy Bill of Rights.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: small; line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot; style=&quot;font-size: medium; line-height: normal;&quot;&gt;Click HERE&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://youowntheweb.blogspot.com/2014/06/the-president-supports-our-voice.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-2812417306265791841</guid><pubDate>Thu, 05 Jun 2014 18:00:00 +0000</pubDate><atom:updated>2014-06-05T11:00:00.168-07:00</atom:updated><title>You Own The Internet</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/6kIPInbcP5k?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot;&gt;In a world where abuse of privacy is becoming an ever-present silent enemy, companies are collecting billions of dollars prying into your personal details, contents, and behaviour.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot;&gt;More than ever, the need exists for a new Internet, owned and controlled by you, THE USER.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot;&gt;More than an evolution, MNPOI represents a true REVOLUTION, into a space where the users are truly the owners.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot;&gt;Each and every one of us has a vital part to play in building this new internet....One that YOU OWN and CONTROL in which companies and technology serve the world&#39;s users and not the other way around.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot;&gt;It&#39;s time to act. What are you going to do about it?&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot;&gt;We need you to be part of it. We can&#39;t do it without you:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: arial, sans-serif; font-size: 13.333333969116211px; line-height: 17px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px; line-height: 24px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot;&gt;Click HERE&lt;/a&gt;</description><link>http://youowntheweb.blogspot.com/2014/06/you-own-internet.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-7149572264484388963</guid><pubDate>Thu, 05 Jun 2014 13:03:00 +0000</pubDate><atom:updated>2014-06-05T06:03:00.183-07:00</atom:updated><title>World Economic Forum is &quot;sharing&quot; our vision</title><description>&lt;img src=&quot;https://s3.amazonaws.com/thunderclap-production/campaign_updates/hero_images/000/004/673/web/Captura_de_pantalla_2014-05-28_a_la(s)_12.25.33.png?1401272802&quot; style=&quot;-webkit-appearance: none; background-color: white; font-family: open-sans, sans-serif; font-size: 16px; font-weight: bold; line-height: 24px; width: 100%;&quot; /&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-appearance: none; background-color: white; line-height: 24px; margin-bottom: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Rethinking Personal Data: Trust and Context in User-Centred Data Ecosystems:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www3.weforum.org/docs/WEF_RethinkingPersonalData_TrustandContext_Report_2014.pdf%C2%A0&quot;&gt;VIEW PDF&lt;/a&gt;&lt;/div&gt;
&quot;An asymmetry of power exists today between institutions and individuals – created by an imbalance in the amount of information about individuals held by, or that is accessible to, industry and governments, and the lack of knowledge and ability of the same individuals to control the use of that information. While people are generally willing to share personal information in exchange for valued services, recent surveys indicate growing unease in how personal data are being used. A study by the telecommunications operator Orange showed that 78% of consumers find it hard to trust companies in the way they use such data.1 A crisis of trust is developing, stemming from the use of personal data in ways that are inconsistent with individuals’ preferences or expectations. To thrive, the growing number of economies that depend on the potential of “big data” must earn the trust of individuals, and be centred on empowering those individuals by respecting their needs.&quot;

Rethinking Personal Data:&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px; line-height: 24px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot;&gt;Click HERE&lt;/a&gt;</description><link>http://youowntheweb.blogspot.com/2014/06/world-economic-forum-is-sharing-our_5.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-491677275393636696</guid><pubDate>Wed, 04 Jun 2014 12:49:00 +0000</pubDate><atom:updated>2014-06-04T17:25:35.834-07:00</atom:updated><title>The journey is long. Why privacy matters?</title><description>&lt;div style=&quot;-webkit-appearance: none; background-color: white; font-family: open-sans, sans-serif; font-size: 16px; font-weight: bold; line-height: 24px; margin: 20px 0px;&quot;&gt;
&lt;img src=&quot;https://s3.amazonaws.com/thunderclap-production/campaign_updates/hero_images/000/004/685/web/Captura_de_pantalla_2014-05-29_a_la(s)_13.05.30.png?1401361816&quot; style=&quot;-webkit-appearance: none; width: 100%;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-appearance: none; line-height: 24px;&quot;&gt;
&lt;a href=&quot;https://www.ted.com/talks/alessandro_acquisti_why_privacy_matters&quot; style=&quot;-webkit-appearance: none; background-color: white; color: #c82820; font-size: 16px;&quot; title=&quot;Link: https://www.ted.com/talks/alessandro_acquisti_why_privacy_matters&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;https://www.ted.com/talks/alessandro_acquisti_why_privacy_matters&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 16px;&quot;&gt;The journey is long and has already started with you. It was more difficult that expected. It&#39;s taking longer.&amp;nbsp;&lt;br style=&quot;-webkit-appearance: none;&quot; /&gt;It looks like the literacy around privacy and data is only read by a few. Looks like &quot;privacy&quot; and &quot;personal data&quot; is a geek&#39;s concept although it has been in our world since the beginning. Alessandro Acquisti,&amp;nbsp;Award Winning Associate Professor of Information Technology and Public Policy Carnegie Mellon University,&amp;nbsp; said &quot;In a few years, organizations will know so much about us, they will be able to infer our desires before we even form them, and perhaps buy products on our behalf before we even know we need them.”&amp;nbsp;&lt;br style=&quot;-webkit-appearance: none;&quot; /&gt;Do not sit idle by!! Act. Thanks for your support.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot; style=&quot;line-height: normal;&quot;&gt;Click HERE&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>http://youowntheweb.blogspot.com/2014/06/the-journey-is-long-why-privacy-matters.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-4860659039689251992</guid><pubDate>Wed, 04 Jun 2014 02:19:00 +0000</pubDate><atom:updated>2014-06-04T17:25:15.175-07:00</atom:updated><title>Why Private Browsing Doesn&#39;t Exist</title><description>&lt;a href=&quot;https://i.imgur.com/7jTSJTT.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://i.imgur.com/7jTSJTT.jpg&quot; width=&quot;100%&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 13px; line-height: 24px;&quot;&gt;&lt;span style=&quot;line-height: 32px; text-indent: -12px;&quot;&gt;Lend us your voice this 4th of July.&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://www.thunderclap.it/projects/12026-it-s-time-to-own-the-internet?locale=en&quot;&gt;Click HERE&lt;/a&gt;</description><link>http://youowntheweb.blogspot.com/2014/06/why-private-browsing-doesnt-exist.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-1137485479847578694</guid><pubDate>Tue, 03 Jun 2014 13:01:00 +0000</pubDate><atom:updated>2014-06-03T06:02:01.964-07:00</atom:updated><title>Exactly How the NSA Violates International Human Rights</title><description>&lt;div class=&quot;meta-container&quot; style=&quot;background-color: white; box-sizing: border-box; color: #aaaaaa; font-family: ProximaNovaCond; font-size: 0.8125rem; line-height: 1.4; margin: 0px 0px 2.2rem; padding: 0px; position: relative;&quot;&gt;
&lt;div class=&quot;meta-avatar js_author&quot; data-blogid=&quot;690&quot; style=&quot;box-sizing: border-box; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;floated-container img-30&quot; data-dropdownhover-container=&quot;&quot; style=&quot;box-sizing: border-box; height: 30px; margin: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;txt&quot; style=&quot;box-sizing: border-box; margin: 0px; max-width: 100%; overflow: hidden; padding: 0px; text-overflow: ellipsis; white-space: nowrap;&quot;&gt;
&lt;span class=&quot;display-name&quot; style=&quot;box-sizing: border-box; font-size: 0.875rem; font-weight: bold;&quot;&gt;David Greene AND Katitza Rodriguez - EFF&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;post-dropdown-ct js_post-dropdown-ct js_post-dropdown-ct-sticky&quot; style=&quot;box-sizing: border-box; margin: 0px; padding: 0px;&quot;&gt;
&lt;a class=&quot;button dropdown secondary transparent toggle-30 js_post-menu-toggler post-dropdown-trigger&quot; data-dropdown=&quot;dropdown-1583679391&quot; href=&quot;http://gizmodo.com/exactly-how-the-nsa-violates-international-human-rights-1583679391/+jcondliffe#&quot; sl-processed=&quot;1&quot; style=&quot;-webkit-appearance: none; -webkit-transform: translate3d(0px, 0px, 0px); -webkit-transition: opacity 0.15s ease-in; background-color: transparent; border: none transparent; box-sizing: border-box; color: #333333; cursor: pointer; display: inline-block; font-family: ProximaNovaCond, serif; font-size: 1rem; height: 30px; line-height: normal; margin: 0px; opacity: 0.5; padding: 0px; position: absolute; right: -42px; text-align: center; text-decoration: none; top: -7px; transition: opacity 0.15s ease-in; width: 30px;&quot; target=&quot;_self&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul class=&quot;f-dropdown proxima js_post-dropdown js_follow-controls whitelisted-links&quot; data-blogid=&quot;690&quot; data-description=&quot;Even%20before%20Ed%20Snowden%20leaked%20his%20first%20document%2C%20human%20rights%20lawyers%20and%20activists%20were%20concerned%20about%20law%20enforcement%20and%20intelligence%20agencies%20spying%20on%20the%20digital%20world.%20One%20of%20the%20tools%20developed%20to%20tackle%20those%20concerns%20was%20the%20development%20of%20the%20International%20Principles%20on%20the%20Application%20of%20Human%20Rights%20to%20Communications%20Surveillance%20%28the%20%22Necessary%20and%20Proportionate%20Principles%22%29.%20This%20set%20of%20principles%20was%20intended%20to%20guide%20governments%20in%20understanding%20how%20new%20surveillance%20technologies%20eat%20away%20at%20fundamental%20freedoms%2C%20and%20outlined%20how%20communications%20surveillance%20can%20be%20conducted%20consistent%20with%20human%20rights%20obligations.%20Furthermore%2C%20the%20Necessary%20and%20Proportionate%20Principles%20act%20as%20a%20resource%20for%20citizens%E2%80%94used%20to%20compare%20new%20tools%20of%20state%20surveillance%20to%20global%20expectations%20of%20privacy%20and%20due%20process.&quot; data-dropdown-content=&quot;&quot; data-imagetag=&quot;&quot; data-postid=&quot;1583679391&quot; data-sourceblogid=&quot;4&quot; data-starterid=&quot;1583679391&quot; data-title=&quot;Exactly How the NSA Violates International Human Rights&quot; id=&quot;dropdown-1583679391&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; font-size: 16px; height: auto; left: -99999px; line-height: 1.6; list-style: none; margin: 2px 0px 0px; max-height: none; max-width: 200px; padding: 0px; position: absolute; width: 200px; z-index: 99;&quot;&gt;
&lt;li class=&quot;js_kinja-share-block&quot; style=&quot;box-sizing: border-box; cursor: pointer; font-size: 0.875rem; line-height: 1.25rem; margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;js_kinja-share hover-icon&quot; href=&quot;http://gizmodo.com/exactly-how-the-nsa-violates-international-human-rights-1583679391/+jcondliffe#&quot; rel=&quot;nofollow&quot; sl-processed=&quot;1&quot; style=&quot;box-sizing: border-box; color: #555555; display: block; line-height: inherit; padding: 0.5rem; text-decoration: none;&quot;&gt;&lt;span class=&quot;icon icon-prepend notranslate&quot; style=&quot;-webkit-user-select: none; box-sizing: border-box; color: black; display: inline-block; font-family: KinjaIcons; font-size: 16px; height: 16px; line-height: 16px; margin-right: 10px; margin-top: 1px; opacity: 0.3; text-align: center; vertical-align: top; width: 16px;&quot;&gt;E&lt;/span&gt;Share to Kinja&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; cursor: pointer; font-size: 0.875rem; line-height: 1.25rem; margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;js_share-post-item facebook hover-icon&quot; href=&quot;http://facebook.com/sharer.php?u=http%3A%2F%2Fgizmodo.com%2Fexactly-how-the-nsa-violates-international-human-rights-1583679391%2F%2Bjcondliffe&quot; rel=&quot;nofollow&quot; sl-processed=&quot;1&quot; style=&quot;box-sizing: border-box; color: #555555; display: block; line-height: inherit; padding: 0.5rem; text-decoration: none;&quot;&gt;&lt;span class=&quot;icon icon-prepend notranslate&quot; style=&quot;-webkit-user-select: none; box-sizing: border-box; color: black; display: inline-block; font-family: KinjaIcons; font-size: 16px; height: 16px; line-height: 16px; margin-right: 10px; margin-top: 1px; opacity: 0.3; text-align: center; vertical-align: top; width: 16px;&quot;&gt;j&lt;/span&gt;Share to Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; cursor: pointer; font-size: 0.875rem; line-height: 1.25rem; margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;js_share-post-item twitter hover-icon&quot; href=&quot;http://twitter.com/share?url=http%3A%2F%2Fgizmodo.com%2Fexactly-how-the-nsa-violates-international-human-rights-1583679391%2F%2Bjcondliffe&amp;amp;text=POST_TITLE&quot; rel=&quot;nofollow&quot; sl-processed=&quot;1&quot; style=&quot;box-sizing: border-box; color: #555555; display: block; line-height: inherit; padding: 0.5rem; text-decoration: none;&quot;&gt;&lt;span class=&quot;icon icon-prepend notranslate&quot; style=&quot;-webkit-user-select: none; box-sizing: border-box; color: black; display: inline-block; font-family: KinjaIcons; font-size: 16px; height: 16px; line-height: 16px; margin-right: 10px; margin-top: 1px; opacity: 0.3; text-align: center; vertical-align: top; width: 16px;&quot;&gt;i&lt;/span&gt;Share to Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; cursor: pointer; font-size: 0.875rem; line-height: 1.25rem; margin: 0px; padding: 0px;&quot;&gt;&lt;a class=&quot;hover-icon&quot; href=&quot;http://gizmodo.com/exactly-how-the-nsa-violates-international-human-rights-1583679391&quot; sl-processed=&quot;1&quot; style=&quot;box-sizing: border-box; color: #555555; display: block; line-height: inherit; padding: 0.5rem; text-decoration: none;&quot;&gt;&lt;span class=&quot;icon icon-prepend notranslate&quot; style=&quot;-webkit-user-select: none; box-sizing: border-box; color: black; display: inline-block; font-family: KinjaIcons; font-size: 16px; height: 16px; line-height: 16px; margin-right: 10px; margin-top: 1px; opacity: 0.3; text-align: center; vertical-align: top; width: 16px;&quot;&gt;r&lt;/span&gt;Go to permalink&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;post-content entry-content &quot; style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: Georgia, serif; line-height: 16px; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;has-media media-640&quot; data-textannotation-id=&quot;49105777b3be47fd14119eba7e362cc7&quot; style=&quot;box-sizing: border-box; clear: both; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; padding: 0px; text-rendering: optimizelegibility; width: 636px; word-break: break-word;&quot;&gt;
&lt;span class=&quot;lightBoxWrapper&quot; style=&quot;box-sizing: border-box; clear: both; display: block; position: relative;&quot;&gt;&lt;span class=&quot;img-border&quot; style=&quot;box-sizing: border-box; clear: left; display: block; float: left; margin-bottom: 1em; margin-right: 1em; max-width: 640px; position: relative;&quot;&gt;&lt;img alt=&quot;Exactly How the NSA Violates International Human Rights&quot; class=&quot;transform-com.kinja.core.model.Image$Size$KinjaUncroppedExtraLarge$@28a9466 js_annotatable-image cursor-crosshair&quot; data-asset-url=&quot;http://i.kinja-img.com/gawker-media/image/upload/s--qhgKTUFJ--/c_fit,fl_progressive,q_80,w_636/npo9odr2ultqdtxjtviz.jpg&quot; data-chomp-id=&quot;npo9odr2ultqdtxjtviz&quot; data-format=&quot;jpg&quot; src=&quot;http://i.kinja-img.com/gawker-media/image/upload/s--qhgKTUFJ--/c_fit,fl_progressive,q_80,w_636/npo9odr2ultqdtxjtviz.jpg&quot; data-original-src=&quot;http://i.kinja-img.com/gawker-media/image/upload/npo9odr2ultqdtxjtviz.jpg&quot; height=&quot;144&quot; id=&quot;img-0&quot; style=&quot;border: none; box-sizing: border-box; display: block; height: auto; margin-bottom: 0px; max-width: 100%; vertical-align: middle;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;first-text&quot; data-textannotation-id=&quot;3302ee31453591983da4cd2df836ab71&quot; style=&quot;box-sizing: border-box; font-family: inherit; line-height: 1.6; margin-bottom: 1.25rem; padding: 0px; text-rendering: optimizelegibility; word-break: break-word;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;em style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;This article first&amp;nbsp;&lt;/em&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2014/05/unnecessary-and-disproportionate-how-nsa-violates-international-human-rights&quot; sl-processed=&quot;1&quot; style=&quot;box-sizing: border-box; color: #28ade6; line-height: inherit; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;appeared on the Electronic Frontier Foundation&lt;/a&gt;&amp;nbsp;&lt;em style=&quot;box-sizing: border-box; line-height: inherit;&quot;&gt;and is reproduced here under Creative Commons license. Image by&amp;nbsp;&lt;a href=&quot;https://www.flickr.com/photos/wasfiakab/&quot; sl-processed=&quot;1&quot; style=&quot;box-sizing: border-box; color: #28ade6; line-height: inherit; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Wasfi Akab&lt;/a&gt;&amp;nbsp;under Creative Commons license.&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;first-text&quot; data-textannotation-id=&quot;3302ee31453591983da4cd2df836ab71&quot; style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; margin-bottom: 1.25rem; padding: 0px; text-rendering: optimizelegibility; word-break: break-word;&quot;&gt;
Even before Ed Snowden leaked his first document, human rights lawyers and activists were concerned about law enforcement and intelligence agencies spying on the digital world. One of the tools developed to tackle those concerns was the development of the&amp;nbsp;&lt;a href=&quot;https://en.necessaryandproportionate.org/text&quot; sl-processed=&quot;1&quot; style=&quot;box-sizing: border-box; color: #28ade6; line-height: inherit; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;&amp;nbsp;(the &quot;Necessary and Proportionate Principles&quot;). This set of principles was intended to guide governments in understanding how new surveillance technologies eat away at fundamental freedoms, and outlined how communications surveillance can be conducted consistent with human rights obligations. Furthermore, the Necessary and Proportionate Principles act as a resource for citizens—used to compare new tools of state surveillance to global expectations of privacy and due process.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;4c740e70611a98e79daaf7c3403e0e7f&quot; style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; margin-bottom: 1.25rem; padding: 0px; text-rendering: optimizelegibility; word-break: break-word;&quot;&gt;
We are now able to look at how the NSA&#39;s mass surveillance programs, which we have learned about in the past year, fare when compared to the Necessary and Proportionate Principles.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;2363be8184192bd5df4448c8e7cef248&quot; style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; margin-bottom: 1.25rem; padding: 0px; text-rendering: optimizelegibility; word-break: break-word;&quot;&gt;
As you might expect, the NSA programs do not fare well. To mark the first anniversary of the Snowden disclosures, we are releasing Unnecessary and Disproportionate, which details how some of the NSA spying operations violate both human rights standards and the Necessary and Proportionate Principles.&lt;/div&gt;
&lt;div data-textannotation-id=&quot;81d5a58ac7cb2e2ccb80bb8dee5a8b47&quot; style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; margin-bottom: 1.25rem; padding: 0px; text-rendering: optimizelegibility; word-break: break-word;&quot;&gt;
Some of the conclusions are as follows:&lt;/div&gt;
&lt;br /&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;b1f03fb908939c0df8a7ba706e3578cb&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The NSA surveillance lacks &quot;legality&quot; in that NSA surveillance laws are largely governed by a body of secret law developed by a secret court, the Foreign Intelligence Surveillance Court (FISC), which selectively publishes its legal interpretations of the law;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;22fa1b42144639fc4d48c91fb42278ac&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The NSA surveillance is neither &quot;necessary,&quot; nor &quot;proportionate,&quot; in that the various programs in which communications data are obtained in bulk violate the privacy rights of millions of persons who are not suspected of having any connection to international terrorism;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;6ec3dd4156186de7c337ec56e71f903c&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The NSA surveillance programs are not supported by competent judicial authority because the only judicial approval, if any, comes from the FISC, which operates outside of normal adversarial procedures such that the individuals whose data are collected lack access to the court;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;d87b8ee09980b8ee2ea16c2eafdae1a5&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The NSA surveillance programs lack due process because the FISC presents no opportunity for a public hearing;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;28b9d11939a818784ec5f33dc60a9898&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The NSA surveillance programs lack user notification: those whose data is obtained do not know that their communications have been monitored and hence they cannot appeal the decision nor get legal representation to defend themselves;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;20e31cac1c81e37a43239232545249b9&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The NSA surveillance programs lack the required transparency and public oversight, because they operate in secret and rely on gag orders against the entities from whom the data are obtained, along with secret, if any, court proceedings;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;747419a82a22b3e48707ccf148f5dfe6&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The NSA surveillance programs damage the integrity of communication systems by undermining security systems, such as encryption, requiring the insertion of surveillance back doors in communications technologies, including the installation of fiber optic splitters in transmission hubs; and&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; list-style-position: outside; list-style-type: none; margin: 0px 0px 1.5rem 1.125rem; padding: 0px; position: relative;&quot;&gt;
&lt;li data-textannotation-id=&quot;447edb03ec751251ff3aef6e3ce3f017&quot; style=&quot;box-sizing: border-box; margin: 0px 0px 6px; padding: 0px 0px 0px 1.125rem;&quot;&gt;The US surveillance framework is illegitimate because it applies less favorable standards to non-US persons than its own citizens; this discrimination places it in violation of the International Covenant on Civil and Political Rights (ICCPR).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div data-textannotation-id=&quot;fa68fefcbcf40e21a34ed275b198bc6d&quot; style=&quot;box-sizing: border-box; font-family: inherit; font-size: 0.9375rem; line-height: 1.6; margin-bottom: 1.25rem; padding: 0px; text-rendering: optimizelegibility; word-break: break-word;&quot;&gt;
More broadly, the United States justifies the lawfulness of its communications surveillance by reference to distinctions that, considering modern communications technology, are irrelevant to truly protecting privacy in a modern society. The US relies on the outmoded distinction between &quot;content&quot; and &quot;metadata,&quot; falsely contending that the latter does not reveal private facts about an individual. The US also contends that the collection of data is not surveillance—it argues, contrary to both international law and the Principles, that an individual&#39;s privacy rights are not infringed as long as her communications data are not analyzed by a human being. It&#39;s clear that the practice of digital surveillance by the United States has overrun the bounds of human rights standards. What our paper hopes to show is exactly where the country has crossed the line, and how its own politicians and the international community might rein it back.&lt;/div&gt;
&lt;/div&gt;
</description><link>http://youowntheweb.blogspot.com/2014/06/exactly-how-nsa-violates-international.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7357029693565332780.post-531043744808881133</guid><pubDate>Mon, 02 Jun 2014 18:46:00 +0000</pubDate><atom:updated>2014-06-03T06:02:49.791-07:00</atom:updated><title>This is Scary: &quot;Facebook App Knows What You’re Hearing, Watching&quot;</title><description>&lt;div class=&quot;post-content&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 10px; margin: 0px; padding: 0px 0px 0px 11px;&quot;&gt;
&lt;div class=&quot;mceTemp &quot; style=&quot;font-size: 1em; margin: 0px; padding: 0px;&quot;&gt;

&lt;dl class=&quot;wp-caption aligncenter caption-centered &quot; style=&quot;margin: 0px auto 12px; padding: 0px; width: 553px;&quot;&gt;&lt;ul class=&quot;socialByline&quot; style=&quot;color: #666666; font-size: medium; line-height: 21.02400016784668px; list-style: none; margin: -3px 0px 0.5em; padding: 0px 0px 0px 2.2em; text-indent: -1.5em;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-left-color: transparent; border-left-style: solid; border-left-width: 1px; display: inline-block; line-height: 1em; margin: 0px 0px 8px; padding: 0px; text-indent: 0px; white-space: nowrap;&quot;&gt;By&lt;/li&gt;
&amp;nbsp;&amp;nbsp;&lt;/span&gt;&amp;nbsp;
&lt;li class=&quot;popC byName popClosed&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-left-color: transparent; border-left-style: solid; border-left-width: 1px; display: inline-block; line-height: 1em; margin: 0px 0px 8px; padding: 0px; text-indent: 0px; white-space: nowrap;&quot;&gt;&lt;a class=&quot;popTrigger&quot; data-ls-clicked=&quot;1&quot; data-ls-seen=&quot;1&quot; href=&quot;http://topics.wsj.com/person/A/biography/1239&quot; style=&quot;color: #093d72; cursor: pointer; letter-spacing: 1px; margin-right: -1px; margin-top: 7px; outline: none; padding: 0px; text-decoration: none; text-transform: uppercase;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;REED ALBERGOTTI&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/dl&gt;
&lt;dl class=&quot;wp-caption aligncenter caption-centered &quot; style=&quot;margin: 0px auto 12px; padding: 0px; width: 553px;&quot;&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;size-full wp-image-5&quot; src=&quot;http://s.wsj.net/public/resources/images/BN-CW606_musict_G_20140520200014.jpg&quot; height=&quot;213&quot; style=&quot;border: none; margin: 0px auto 4px;&quot; width=&quot;320&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;VIA:&amp;nbsp;&lt;a href=&quot;http://blogs.wsj.com/digits/2014/05/21/facebook-app-knows-what-youre-hearing-and-watching/&quot;&gt;wsj.com&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;dd class=&quot;wp-caption-dd&quot; style=&quot;color: #333333; display: inline; font-size: 1.1em; line-height: normal; margin: 0px; padding: 2px 0px 0px;&quot;&gt;Facebook launched a new feature that can automatically recognize music and television shows.&lt;/dd&gt;&amp;nbsp;&lt;dd class=&quot;wp-caption-dd wp-cite-dd&quot; style=&quot;color: #666666; display: inline; font-size: 1em; line-height: normal; margin: 2px 0px; padding: 2px 0px 0px; text-align: right;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;line-height: 1.314em;&quot;&gt;Facebook’s mobile app just grew a keen sense of hearing. Starting Wednesday, the app has the ability to recognize music and television shows playing in the vicinity of users.&lt;/span&gt;&lt;/div&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
The feature is designed to make it easier for users to share. When users begin to write a post, the Facebook app will offer to include information about music or shows playing in the background.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
“We want to help people tell better stories,” said Aryeh Selekman, the product manager who led the development of the feature. “I hope there are people who love the feature and post more.”&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
If Facebook users share more about themselves, that can boost the value of ads targeted at some of its 1.28 billion users.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
The audio-recognition feature works similar to the app Shazam, which also can identify music and television programming using the built-in microphones in mobile phones.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
The feature took Selekman’s team about a year of engineering and logistics work. In order to recognize live television shows, Facebook inked deals to obtain audio from 160 television stations in the U.S. Using the microphone built into&amp;nbsp;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;&lt;a class=&quot;mandelbrot_refrag&quot; data-ls-seen=&quot;1&quot; href=&quot;http://topics.wsj.com/subject/I/iphone/1663?lc=int_mb_1001&quot; style=&quot;color: #115b8f; font-weight: bold; outline: none; text-decoration: none;&quot;&gt;iPhone&lt;/a&gt;&lt;/span&gt;&amp;nbsp;and Android phones, Facebook says the app can recognize a live show within 15 seconds.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
Facebook also said it reached deals with music-streaming sites, including Spotify and Rdio, to enable Facebook users to play previews of songs that others have shared using the audio-recognition feature. The feature is optional and can be switched on and off.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
If enough users opt in, the new Feature could give Facebook enough data to start compiling television ratings. Even if users decide not to share what they’re hearing or watching, Facebook will hold onto the data in anonymous form, keeping tabs on how many users watched particular shows.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
Users who begin a post after turning on the feature will notice a tiny audio equalizer with undulating blue bars, indicating the app has detected sound and is attempting to match it to a song or television show. Once the app finds a match, users will see the title of the song and a thumbnail, such as an album cover or a photo of a talk-show host. By tapping on the show or song, users can post it to their news feeds and let other users know what Facebook has already figured out – what they’re seeing and hearing.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.314em; margin-bottom: 1em; padding: 0px;&quot;&gt;
&lt;strong&gt;See full article:&lt;/strong&gt;&amp;nbsp;&lt;a data-ls-seen=&quot;1&quot; href=&quot;http://online.wsj.com/news/articles/SB10001424052702303749904579576503301205272&quot; style=&quot;color: #115b8f; font-weight: bold; outline: none; text-decoration: none;&quot;&gt;Facebook Adds Feature to Identify Music, TV Shows&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://youowntheweb.blogspot.com/2014/06/this-is-scary-facebook-app-knows-what.html</link><author>noreply@blogger.com (Rob Grams)</author><thr:total>0</thr:total></item></channel></rss>