Have you created a ShazzleMail account on your smartphone? This is a required first step.

Yes No

Free Encrypted Email

Posts Tagged ‘security’

privacy-coins-and-bitcoin-dominance-guide

9 Important Privacy Settings for Windows 10

June 3, 2019

Matt Powell On Jun 3, 2019

At first glance, the Digital Age may seem like a wonderful thing. And in many ways, it is. Advances in technology have provided humanity with many qualities of life changes in various aspects of our lives from optimization in commercial operations to an AI reminding you to take the lasagna out the oven because you’re occupied with your three kids.
However, unfortunately, the Digital Age is a double-edged sword. Just as technology has made life easier for us, it has also diminished personal privacy to an all-time low and made digital crimes easier to commit.

Hacking is becoming a more prominent problem with every passing year. Don’t believe me? Ask the Marriott hotel chain that had the personal information of up to 500 million customers compromised in a data breach last year. Or Equifax, a credit bureau that was the victim of a cyber attack that may have compromised the data of around 140 million Americans. Or ask any of the 12 countries that were the victim of cyber attacks by a Chinese hacker group. Cyber attacks that affected hundreds of companies and organizations, and went on for years. Scared yet?

Cybercriminals are getting smarter, and everyone needs to start taking measures to protect themselves online from malicious cyber attackers. It is 2019. VPNs were once highly recommended, but now they are all but mandatory for Internet use. Ad blockers are also a huge defense for consumers online. Amongst younger people, the use of ad blocks is typically to combat against the constant and annoying ads they see attached to YouTube videos. But that’s not all they do. You know how when you go to a website to read an article and your screen gets bombarded with a bunch of pop up ads? You try to exit out of them or go back to a previous page but keep getting redirected to the same ads? Ad blockers can help with that. Standard ad blockers don’t work on Hulu video ads, but hey, we can’t have everything right?

And don’t think for a second that it’s just the standard cybercriminal who is out to invade your privacy. The big tech companies who provide you with the technology you know and love have also gotten really nosy too. At the rate they are going, tech companies like Amazon will know your breathing and eating patterns. No one knows for sure what they do with our data (aside from selling it to third-parties for advertisement purposes), but they kind of want all our data and it’s really unnerving.

Luckily, the companies who try to invade your privacy also provide you with the means of maintaining your privacy, and it is important for you to know how to make your technology truly work for you.

Key privacy settings for Windows 10
Windows 10 was not well-received upon release for a number of reasons. One of those reasons that Windows 10 invades your privacy. By default. For this reason alone, people in the tech community put off upgrading to Windows 10 for years. But casual users likely have no idea how invasive Windows 10 is. That’s where we come in.

Windows 10 is (unfortunately) the best Microsoft operating system so far right now, so users are going to need to use it sooner or later. And if you don’t know how to keep yourself protected while using Windows 10, that’s where we come in.

Here’s how to keep your privacy intact and your data safe from cybercriminals and nosy tech companies.

1. Don’t choose the Express Settings Installation option when installing Windows 10
This point actually applies to all technology moving forward. Taking advantage of express options that take care of the process for you, strips you of your agency and can make you complacent. Tech companies cannot be trusted, and you have no idea what you’re agreeing to because you’re too busy enjoying not having to do anything. As stated earlier, Windows by default is looking to invade your privacy and harvest your data. When you install Windows 10, be sure to select Custom Settings and do everything yourself.

The next step is heading into your Privacy settings. You can do so by simultaneously pressing the Windows key and the I key. One thing to keep in mind here is that the following tips apply to general Windows 10 settings, but for apps, you will have to adjust a lot of the privacy settings individually. Keep that in mind before you download a bunch of apps or you’ll be in the settings more than the apps themselves!

2. Get rid of Cortana. Or at least restrict her.
Cortana from the Halo series of video games is pretty cool. Microsoft’s Cortana? Not so much. If you don’t want Cortana knowing all of your business, then you need to adjust her settings. If you want to shut Cortana out entirely, head into the Cortana Settings of your PC and select the ‘Clear Cortana Data’ option to leave Cortana completely in the dark.

If you’d like to have Cortana around in a limited capacity, simply uncheck the information that you don’t want her to know such as your contacts, location, communication history, and Internet history.

3. Turn off your location
Windows 10 automatically tracks your location at all times. They keep this information for up to 24 hours and can share this information with any third-party app that has location permission (Remember to adjust the privacy of your apps!) That’s a little too uncomfortable for my part, and for a lot of other people. You can prevent this by turning your location off in the privacy settings.
4. Get rid of ad tracking
By default, every Windows user has an advertising ID that tracks your browsing/shopping history. Windows sends this data over to their advertising partners and said partners use this data to personalize the ad campaigns directed towards you.

Sound kind of weird? You can turn off ad tracking by checking off for the option that says “Let apps use my advertising ID”.

5. Disable your camera access
For those of you who have played Grand Theft Auto 5, you remember the scene where Lester says he is going to reverse engineer a webcam and spy on those sorority girls again? That’s a real thing that can actually happen. It’s not hard to highjack a simple camera. Up until now, we have been discussing the invasion of your privacy online, but here, someone could actually see you personally if they wanted to. That’s terrifying.

Even Mark Zuckerberg tapes up his camera just as a safety precaution. You don’t need to go that far (Unless you want to), but you can at least turn camera access off for your device and apps in the privacy settings. A lot of people don’t even use their camera, so there’s no need to take on an unnecessary privacy risk. And if you ever need to turn it back on, that’s easy to do.

6. Disable microphone access
In case you were wondering, Mark Zuckerberg tapes up his microphone too. Now granted most people aside from politicians, secret agents, and business executives probably don’t need to go this far, more safety never hurt anyone right? If you don’t want to be an unintentional radio show host, turn off your microphone in your privacy settings to keep anyone from tuning in.

7. Manage your App Access
Head into the ‘Account Info’ tab of your privacy settings, and you’ll see that by default apps are allowed access to your name, picture, and other account info. Other account info being intentionally vague to keep users in the dark and as many exploitable loopholes open as possible. Do yourself a huge favor and close these holes up by turning this default setting off. As is standard, you can select individual apps to have access to your account info.

8. Get rid of Timeline tracking
Timeline tracking is Windows recording all of the websites that you have visited. Turn off timeline tracking in your privacy settings to keep this from happening. You obviously won’t browse the internet once and then never do so again, so you will have to do this regularly. You also need to manually delete your browsing history, but I am sure this is something most people are used to doing.

9. Fix your privacy settings after every major update. You have no choice.
What if I told you that after all the work you did on customizing your privacy settings, that you will have to do it all over again from time to time? Well, I am telling you.

Whenever there is a major update, Microsoft resets all privacy settings to default and it’s back to data harvesting they go. Sounds very consumer friendly right? Despite constant complaints about this, Microsoft has not fixed this annoyance.

What’s worse, is you probably have automatic updates turned on, which means a major update could occur, your privacy settings have been reset, and you will have no idea. Microsoft keeps users in the dark about all of this because of course, they do.

So, unfortunately, this process will not be a one-time thing. You can, however, fight back a little. There is a way to prevent automatic updates from occurring which means you can decide when you want to start this rodeo all over again.

Conclusion
Technology is a wonderful thing, but it’s also a huge pain. If you want to stay safe online, you will have to take a very active role in maintaining your privacy. It’s unfortunate that we cannot trust tech companies to behave themselves, but that’s just the way it is. It’s a nasty game, but now that you know the rules, you can beat them at it. Stay safe!

Tags: , ,

apple

Apple exec dismisses Google CEO’s criticism over turning privacy into a ‘luxury good’

May 29, 2019

By Jacob Kastrenakes@jake_k May 27, 2019, 12:18pm EDT

Apple’s software chief, Craig Federighi, says he doesn’t “buy into” the criticism that Apple is turning privacy into a luxury good, an accusation that was indirectly leveled at the company by Google CEO Sundar Pichai.

In an interview with The Independent, Federighi dismissed “the luxury good dig,” just a couple weeks after Pichai wrote an op-ed in The New York Times saying that “privacy cannot be a luxury good offered only to people who can afford to buy premium products and services.” While Pichai didn’t name Apple, which has recently advertised the privacy benefits of its $999 phone, there’s no mistaking which company he’s referring to.

FEDERIGHI SAYS MINIMIZING DATA COLLECTION MEANS THERE’S LESS OF A RISK IN CHINA
Apple wants to sell products to “everyone we possibly could,” Federighi said, adding that Apple’s products are “certainly not just a luxury.” The argument stems over the difference in business models between the two companies: Apple sells generally high-priced hardware directly to customers, so it doesn’t need to collect much data on them; while Google offers a multitude of free services to users, primarily profiting off of ads displayed on those services that are often targeted based on user data. Pichai argued that it’s important to provide privacy-protective services that everyone has access to.

Federighi said it’s “gratifying” to see other companies discussing privacy, but that it’ll take more than “a couple of months and a couple of press releases” to change these companies’ business practices, which rely on data collection. Federighi didn’t name Google specifically, but likewise, it’s pretty clear which company he’s referring to.

In the interview, Federighi also addressed two other criticisms of Apple’s privacy stance: that it shouldn’t be storing Chinese’ users iCloud data in China, where the country could spy on it; and that its choice not to collect much user data has made it fall behind when it comes to develop AI features, like Siri.

On China, Federighi suggests that storing data within the country isn’t as big of a risk for Apple as it would be for other companies, because of “all of our data minimization techniques.” Between encrypting data and collecting a small amount of data in the first place, Federighi says there’s not much to access on its Chinese iCloud servers, and that anyone who does gain access wouldn’t be able to do much with that information.

Federighi also says he sees the choice between collecting data and building powerful new AI features as a “false trade off.” Building these features without collecting additional user data, “sometimes that’s extra work,” he says. “But that’s worth it.”

Apple does that in a handful of ways, according to the report. That includes buying a catalog of public photos it can use to train algorithms on, as well as analyzing publicly available voice data — like podcasts — instead of using voice recordings from users. Apple has also revealed in the past that it uses differential privacy techniques to anonymize user data and learn from the data in aggregate.

The privacy battle between these two companies is unlikely to slow down. Because Apple’s business model doesn’t involve selling ads, privacy is a key area that Apple can use to make its products stand out, which incentivizes the company to keep volleying back at Google.

Google, meanwhile, understands that the cultural tide is turning against massive data collection, largely thanks to Facebook’s constant scandals, and it’s been making small changes to limit some of those concerns. Just this month, that’s included a new easy-to-read privacy policy for Nest devices, limits to ad tracking in Chrome, and Incognito modes for more apps.

Tags: ,

telegram-3m

Your Privacy Is Our Business

April 30, 2019

Let us reassure you: You’re worried only because you don’t understand anything about anything.

By Jessica Powell
Ms. Powell writes about the tech world.

April 27, 2019

Zak Tebbal
You look upset. You’ve been making a lot of noise lately about deleting our company’s app from your phone. But please, sit down. Let me explain. You just don’t understand how technology works.

I don’t mean that in a condescending way — it’s just that you clearly don’t have a Ph.D. in internet security, and I think you sometimes get a little confused when you talk about these matters.

You keep saying we don’t respect your privacy, but look — here’s your data, right here in front of you. Here’s your picture of Uncle Greg throwing his face into the Mai Tai Volcano Bowl at that tiki bar. There’s your post on President Trump (nice job! That one got a lot of likes!). It’s all there, safe and secure in the warm blue blanket we’ve placed around it. No one has hacked it. It’s totally safe. Private.

[As technology advances, will it continue to blur the lines between public and private? Sign up for Charlie Warzel’s limited-run newsletter to explore what’s at stake and what you can do about it.]

Maybe by “privacy,” what you really mean to say is “control” — that you don’t have any control over your data. Believe me, we are all about control. We have a ton of privacy settings on our app. Just click on the top right of your screen, and then the link on the pull-down menu, and then follow that one and the one after that and — there you go!

The reason we make it a bit hard to get to your settings is that people aren’t really that interested in messing with those things. We know this because we watch everything you do.

Having said that, we care deeply about privacy and security, and think it’s so empowering for you (for all of us, really) to have control over your data. So by all means, if it will make you feel better, go right ahead and change your ad settings so that we can’t target you as closely as before. But just so you know, this means we’re going to have to show you a lot of ads for colorful socks with elephants on them, because we really have no idea who wants to buy those things, and we’re paid to show them to someone.

(Also, don’t be surprised if you suddenly feel lonely when all of our precision targeting disappears and your favorite brands are no longer in touch with you. What are you going to do? Go outside? Call your friends on the phone? This is 2019. No one wants to talk to you as much as the advertisers on our app.)
You’re mumbling again and looking irritated. Something about us and a data breach. I can tell you’ve been reading the newspapers. Don’t you know those things are obsolete? And journalists are so ill informed on security matters. They don’t respect privacy — their whole job is to reveal private things! They are the last people you should listen to on this issue.

Trust me when I assure you that there hasn’t been any data breach. Your data is secure. I mean, we did give third parties access to your data and sat back and watched as a political party used an ethically dubious service to target people in one of the most fraught elections in modern history, but really, who doesn’t do that in this industry? Also, we want to be really clear on this point since you aren’t a very technical person: Your data was secure the whole time — it was just in someone else’s very secure hands.

You’re shaking your head. Look, I know this is hard for you to understand, but I’m basically Henry Ford here and you are the old carriage driver who’s really worried that I’m going to run over your horse with my new car. And well, yes, I am going to do that — but here’s the thing! We’re doing it together.

All right, I’m still working on that metaphor, but let’s talk about the printing press. You see, when the printing press was invented, people were very afraid of it. They tried to stop it. But the printing press democratized access to information. That’s what we want to do with your information — democratize it — and make it available to every person, everywhere. We want to set your data free!

And we intend to make a fortune doing it.

Jessica Powell (@themoko) is the former head of communications for Google and the author of “The Big Disruption: A Totally Fictional but Essentially True Silicon Valley Story.”

Tags: , ,

privacy-coins-and-bitcoin-dominance-guide

Apple tied to new privacy website, suggesting future security marketing

March 6, 2019

The iPhone maker, which makes privacy a selling point for its devices, appears to be gearing up for another marketing push with PrivacyIsImportant.com.

BY
IAN SHERR
MARCH 5, 2019 6:35 PM PST

The tech industry’s already-boiling privacy debate may get even hotter soon.

Apple appears to have purchased the web address PrivacyIsImportant.com, which according to public registration records, was bought on March 4. Currently, the site is just a blank white page. MacRumors was fist to notice the domain purchase. Apple didn’t immediately respond to a request for comment.

If indeed Apple is planning something, it’d fall in line with the company’s ongoing marketing over its products like the iPhone and its Mac computers. During CES in Las Vegas in January, Apple put up a billboard promising “What happens on your iPhone, stays on your iPhone.”

Apple’s moves come at a time when privacy issues are squarely in the public debate. Governments are attempting to force, through potential legislation and court battles, access to encrypted messages on WhatsApp, Signal and other apps. They’ve argued, in effect, that privacy is not absolute. Meanwhile, Facebook’s poor handling of user data landed CEO Mark Zuckerberg and COO Sheryl Sandberg in congressional hearings.

The debate has divided the tech industry as well. On one side are companies like Google and Facebook, which make almost all their money from tracking users and showing ads to them. On the other said are companies like Microsoft, whose CEO Satya Nadella says “privacy is a human right.”

Apple has gone up against Google and Facebook too. Last year, for example, the company said its Safari browser would prevent companies like Facebook from tracking users without their knowledge.

Apple CEO Tim Cook, in pushing on privacy issues, echoed Nadella’s sentiment when he spoke at Apple’s shareholder meeting last week.

“We’ve always viewed privacy as a human right,” Cook said. “And in this country, we view it that it’s ingrained in the Constitution.”

Originally published March 5, 2:32 p.m. PT.
Update, 3:47 p.m.: Includes more details.

5G and foldable phones go big at MWC 2019: With international intrigue and a 5G coming-out party, this show doesn’t need the boost of a Samsung event.

Galaxy S10 Plus review: No doubt about it, the Galaxy S10 Plus is going to be one of the best Android phones of 2019.

Tags: ,

images-1

US legal eagle: Well done, you bought privacy compliance tools. Doesn’t mean you comply with anything

February 25, 2019

From California state regs to Europe’s GDPR: It’s all just a ‘veneer of protection’

By Rebecca Hill 25 Feb 2019 at 14:44 13
Much-lauded privacy laws risk being undermined as compliance is outsourced to tech vendors and “toothless trainings, audits and paper trails” are confused for genuine protections, a New York Law School professor has said.

In a paper in the Washington Law Review, published online last week, Ari Ezra Waldman argued that recently strengthened privacy laws actually offer “false promises” for consumers.

He said that laws like the European Union’s GDPR or California’s state privacy rules are failing to deliver on their promised protections partly because of the “booming market” in tech vendors hawking privacy compliance tools.

“The responsibility for fulfilling legal obligations is being outsourced to engineers at third-party technology vendors who see privacy law through a corporate, rather than substantive, lens,” he wrote.

“Toothless trainings, audits, and paper trails, among other symbols, are being confused for actual adherence to privacy law, which has the effect of undermining the promise of greater privacy protection for consumers.”

The problem is heightened because, as they fear increasing fines under the new laws, organisations – particularly those without the cash to build tools in-house or hire in experts – are more likely to look for a quick fix.

However, Waldman warned that this could have knock-on effects for not only because organisations buying honky kit risk non-compliance, but also for both the long-term outlook of the vendors and consumers.

“Not all innovation is good innovation,” Waldman said. “Companies that develop shoddy products may lose out in the market in the long term, but in the short and medium term, they risk putting millions of persons’ data at risk.”

‘Symbols of compliance standing in for real protections’
The paper aimed to emphasise the importance of privacy laws by pointing to Facebook’s “cavalier” approach to data protection, mobile app platforms that “routinely sweep in user data” because they can, and even academics’ interest in hoovering up personal info as part of studies.

As the implications of such mass data hoarding, harvesting and hawking have come to light, a set of comprehensive international privacy laws have been drawn up – but Waldman said that, in reality, the law’s “veneer of protection is hiding the fact that it is built on a house of cards”.

He pins much of this on the burgeoning “privacy outsourcing market” and the idea that third-party tech vendors “instantiate their own vision of the law into their services” to fling at organisations desperate to avoid whopping fines.

The argument is based on a socio-legal principle of “legal endogeneity”, first mooted by academic Lauren Edelman. This is when the law is shaped by ideas emerging from the space it seeks to regulate, rather than constraining or guiding those organisations’ behaviour.

It occurs when “ambiguously worded legal requirements” allow compliance professionals on the ground to define what the law means in practice – and in the case of privacy laws, much of this comes down to tech vendors and compliance professionals.

Some of the law’s most important premises – like privacy by design or consent – “are so unclear that professionals on the ground have wide latitude to frame the law’s requirements, kicking endogeneity into high gear”.

Tech can’t save you – but everyone wants it to
Mixed in with this is the fact that both private and public bodies have (misplaced) faith in technology to solve their problems; meanwhile the threats of financial penalties make organisations “uniquely susceptible to promises that vendors can make their troubles disappear”.

This opens the door to vendors selling compliance, and Waldman said that there are 200-plus firms that “instantiate their own interpretations of privacy law into the designs of automated tools, often marketing themselves as one-stop compliance shops”.

The author – hoping to see off any “not all vendors!” comebacks – emphasised that he isn’t saying every firm is part of the problem, nor that they alone are responsible for undermining the promise of privacy law.

Instead, Waldman said that the impact of privacy tech vendors on the legal frameworks is “both significant and under-explored” – and aimed to probe this by assessing the claims made by 165 companies listed in a 2018 report (PDF) from the International Association of Privacy Professionals.

He found that, at some point, almost three-quarters had at some point positioned their products and services as achieving GDPR compliance – when most are designed to meet just two or three of the GDPR’s requirements, “if that”.

‘Privacy law can’t be broken down into code-able pieces’
A further issue described in the paper is that, by promoting these tools for compliance, vendors are attempting to reduce the law into “code-able pieces” when the law is about more than just paper trails and data maps.

“Such under-inclusive compliance technologies may then have the effect of increasing corporate exposure to administrative fines if in-house constituencies confuse purchasing a compliance technology that does a few things with actually solving a problem,” Waldman wrote.

He also posits the idea that this could lead to an imbalance between firms that have to outsource because they lack the money or time to recruit legal experts or build their own tools in-house, and those that can afford to do this.

Meanwhile, consumers are being disempowered because they are increasingly faced with tech-driven conversations about compliance based on black box algorithms. This also risks “erasing” traditional safeguards that sees the law interpreted in the open and on the public record.

Waldman proposed lawmakers edge away from “transactional visions of privacy law that are susceptible to symbolic structures”, as well as calling on the US Federal Trade Commission to be “more active vendor regulators” with better audits.

For vendors, he called for “more modest approaches” that include hiring lawyers and professionals and establishing a closer relationship with regulators, possibly including certification.

Possible products and services include summaries and comparisons of legislation, training courses and tools that scan the data a company has to seek out personal information.

He also called for further research that puts vendors in an ecosystem of social forces that influence the implementation of privacy law on the ground, as well as work on the problem of privacy education for engineers. ®

Tags: , ,

Introducing ShazzleMail Email and How it Works

Privacy is your Fundamental Human Right.

Our Daily Blog
privacy-coins-and-bitcoin-dominance-guide
9 Important Privacy Settings for Windows 10
June 3, 2019

Matt Powell On Jun 3, 2019 At first glance, the Digital Age may seem like a wonderful thing. And ...

Read more
apple
Apple exec dismisses Google CEO’s criticism over turning privacy into a ‘luxury good’
May 29, 2019

By Jacob Kastrenakes@jake_k May 27, 2019, 12:18pm EDT Apple’s software chief, Craig Federigh...

Read more
telegram-3m
Your Privacy Is Our Business
April 30, 2019

Let us reassure you: You’re worried only because you don’t understand anything about anything. ...

Read more
pr
Coffee with Privacy Pros: Three Constants of Privacy
April 23, 2019

A look behind the career and privacy theology of the law-lovin’ CPO of Uber, Ruby Zefo Jared Cose...

Read more
privacy-coins-and-bitcoin-dominance-guide
We’ve Stopped Talking And Searching About Privacy
April 15, 2019

Kalev Leetaru Contributor AI & Big Data I write about the broad intersection of data and soci...

Read more