twitter facebook rss

ECJ Says Safe Harbor Is Not So Safe

Posted by Tara Taubman-Bassirian on October 8, 2015

‘A milestone’ or a ‘historical’ decision cry the media around the world. It is like a deluge of comments and articles. The Open Rights Group speaks of a ‘Landmark victory for Privacy rights’. Like a bombshell, following the Advocat General Opinion, the ECJ decision this Tuesday 6 October 2015 held the Safe Harbor decision 2000 invalid. […]

Another Day In Court For The Company Behind The World’s Most Popular Browser Plugin

Posted by Alexander Hanff on August 13, 2015

Earlier this week I boarded a plane to Dusseldorf in Germany in order to attend a court session in Cologne regarding ad blocking.  The purpose was to continue my research on how these privacy enhancing tools are being targeted by the publishing and advertising industry and follows on from a debate I hosted at the […]

The agony of indecision – Windows 10

Posted by Kevin on August 12, 2015

It’s just sitting there. Mostly it’s being quiet – but every now and again it pops up: ‘Here I am. What are you going to do about me.’ Well I don’t know. Do I install Windows 10 and obey the business logic; or do I ignore it and obey the privacy logic? The Business Logic […]

NSA is missing a trick, here …

Posted by Rob Slade on July 31, 2015

Lonely Chinese are chatting with a smartphone program. “Since Xiaoice collects vast amounts of intimate details on individuals, the program inevitably raises questions about users’ privacy.” Siri, Cortona, Xiaoice, etc.  At least with Facebook you have to semi-deliberately share your deepest secrets with the world.  But who is going to remember (or guard) what they […]

NSA to destroy bulk metadata collection

Posted by Kevin on July 28, 2015

The Office of the Director of National Intelligence announced yesterday that the NSA will cease analytic access to its collection of historical metadata (that is, the data collected under Section 215 prior to the new authorization under the USA FREEDOM Act from 29 June 2015 onwards). Furthermore, the NSA will destroy that data as soon […]

DNA-based access control: the dystopian endgame

Posted by Kevin on July 27, 2015

Martin Zinaich yesterday excellently described what he calls the PIT: privacy invasive technology (Falling into the PIT). The implication is that this is a deep, steep pit from which it is already too late to escape. But there was one comment he makes that implies it is going to get worse: The problem with technology […]

Hacking Team Hacked

Posted by Kevin on July 6, 2015

If you enjoy irony, this is one of your better days: Hacking Team, purveyors of spyware (DaVinci) beloved by repressive regimes around the world, has been hacked. And its dirty laundry is being hung out to dry. Don’t you just love the comments from Christian Pozzi, Senior System and Security Engineer: More seriously, the hackers’ […]

Veracode & Marketo – more like Faust & Mephistopheles

Posted by Kevin on July 1, 2015

I have news for you: you can’t trust your friends anymore. Some of them are likely to be unwitting marketing pawns first, and friends second. This is from the Marketo website: With those figures it’s fairly obvious that marketing companies will seek to exploit friendships over and above advertising – or put another way, get […]

France and the global censorship of Google

Posted by Kevin on June 13, 2015

There’s still an awful lot of guff being written about the ‘right to be forgotten’, especially by certain Americans who believe that their own right to free speech trumps all limitations on free speech anywhere else in the world. Here’s an example: What’s worse, if France or other EU countries get away with this attempt […]

The Global Identity Foundation

Posted by Kevin on May 21, 2015

The basis of all information security is the protection of confidential information from unauthorised access. This requires the ability to differentiate between authorised and unauthorised subjects. For years passwords have done this. A unique password issued to the authorised subject has assured that only that authorised subject is granted access. But passwords are no longer […]