Of Interest

  • Privacy missteps cast cloud over digital assistants

    Date published: 
    August 5, 2019

    "Ryan Calo, faculty co-director of the University of Washington Tech Policy Lab, said that while the devices are not listening, there remain concerns over access to conversations.

    "If employees are hearing things they shouldn't have access to, that is really a red flag, it's a bad practice," Calo said.

    Calo said the privacy concerns around digital assistants are likely to grow as the devices expand their capabilities.

  • Giving Cops the Finger: Compelled Device Decryption and the Fifth Amendment (Past Event)

    August 9, 2019
    DEF CON

    You can unlock your smartphone with a passcode, your finger, even your face. When the cops demand you decrypt your phone or other device for them, can you successfully invoke your Fifth Amendment right against self-incrimination? Well, it depends. This talk quickly walks through the when, where, why, and how of compelled decryption and the Fifth Amendment under current case law. It ends with some practical takeaways, including "don't talk to the cops" and "stay out of Florida."

  • Facebook transparency effort fails to stop shady political ads

    Date published: 
    August 1, 2019

    ""Fundamentally, we're in a very similar position in 2020 that we were in during 2016," said Marshall Erwin, a senior staff analyst at Mozilla who focuses on data security, privacy and surveillance. "I don't think the tools provided by Facebook offer the level of insight that we would want.""

  • Tech addiction & the dark art of persuasive design

    ‘Read Me’ Or Just Tap ‘I Agree’

    There’s a huge group of people at work behind our screens. They’re called behaviour architects, persuasive designers or user-experience specialists and the power they have is massive.

    That urge to keep swiping through your twitter feed? That’s design. The way we all click ‘I Agree’ to the terms and conditions? That’s design. Swiping right or left on Tinder? Well, that’s design too.

    We live in an online world of someone else’s making and most of us never even give it a second thought. And actually, that’s design as well.

  • Capital One Breach Is Case Study in Cyber Defenses, Vulnerabilities

    Date published: 
    July 30, 2019

    "IU cybersecurity program chair Scott Shackelford says that's a stark contrast to the just-settled Equifax breach two years ago. which he calls "a case study in what not to do." He says the credit-reporting agency spent weeks downplaying the significance of the breach, then caught more flak by offering free credit monitoring only if customers agreed to take any legal claims to arbitration instead of the courts.

  • Payouts Make Ransomware Attractive to Hackers, Experts Warn

    Date published: 
    July 29, 2019

    "Scott Shackelford, chair of the IU Cybersecurity Program, said while cyberattacks of governmental agencies have occurred since the late 1990s, he agrees there has been an uptick in these attacks on critical civilian infrastructure nationwide. This includes not only local governmental agencies, but also hospitals and police stations. He said even libraries at times can be targeted.

    Shackelford said smaller-scale attacks such as these can oftentimes be overshadowed by cyberattacks directed at large corporations such as Equifax, but can be just as devastating."

  • The LawBytes Podcast, Episode 22: Navigating Intermediary Liability for the Internet – A Conversation with Daphne Keller

    The question of what responsibility should lie with Internet platforms for the content they host that is posted by their users has been the subject of debate around in the world as politicians, regulators, and the broader public seek to navigate policy choices to combat harmful speech that have implications for freedom of expression, online harms, competition, and innovation.

Pages

Subscribe to Of Interest