Friday, March 18, 2011

Perhaps the hacks are by e-Paparazzi? Perhaps they are “planned leaks” by the “star's” publicist? Perhaps no one cares?

http://www.pogowasright.org/?p=21759

Hacker Ring Targeting Young Hollywood Stars

March 18, 2011 by Dissent

The FBI is reportedly investigating a hacking ring that is attacking phones and computers of stars and stealing nude photos and other personal items.

The latest victim is apparently Scarlett Johansson, 26, who reportedly had a nude picture hacked from her iPhone.

Earlier this week “High School Musical” star Vanessa Hudgens had to release a statement after a batch of nude photos of her started circulating online. In the photos she is kissing another woman and posing nude.

Read more on MyFOXNewYork. TMZ mentions that an unnamed source indicates that there as many as 50 other celebrities may have already been victims, too.

As unfortunate as these types of breaches are, one wonders why they don’t serve as more of a wakeup call for people to not store nude photos and the like on their cell phones or portable devices. I guess it’s the “It couldn’t happen to me” mentality.



Interesting question. Should we treat public employees like professional athletes? (Minus the multi-million dollar salaries, of course.) We publish the athlete's Batting Average or Quarterback rating, or Free-Throw percentage... Personally, I think it might be fun to say, “Senator, it looks like you're in a Legislative Slump. You're only 2 for 26 on getting your bills passed...”

http://www.pogowasright.org/?p=21761

NC: Bill pits public right vs. privacy

March 18, 2011 by Dissent

Fred Clasen-Kelly reports:

A legislative proposal that would grant citizens access to performance evaluations and other details about government employees in North Carolina has pitted the public’s right to know against worker privacy.

At an open government conference Thursday, a city of Charlotte official blasted the proposal, saying it was “a complete invasion” of privacy.

“I don’t want everyone in Charlotte to know I had a bad year,” said Hope Root, a city attorney.

Read more in the News & Observer.



Nothing new?

http://www.pogowasright.org/?p=21727

Your Data Your Rights”

March 17, 2011 by Dissent

Statement by Vivianne Reding, European Commissioner For Justice:

Our Charter of Fundamental Rights and our Treaty make it clear that everyone has the right to the protection of personal data. This right is particularly important in today’s world – a world in which rapid technological changes allow people to share personal information publicly and globally on an unprecedented scale.

While social networking sites and photo sharing services have brought dramatic changes to how we live, new technologies have also prompted new challenges. It’s now more difficult to detect when our personal data is being collected. Sophisticated tools allow the automatic collection of data. This data is then used by companies to better target individuals. Public authorities are also using more and more personal data for a wide variety of purposes, including the prevention and fight against terrorism and serious crime.

The question today is how the Commission will ensure that privacy rights are put into action. I am a firm believer in the necessity of enhancing individuals’ control over their own data.

Peoples’ rights need to be built on four pillars:

The first is the “right to be forgotten”: a comprehensive set of existing and new rules to better cope with privacy risks online. When modernising the legislation, I want to explicitly clarify that people shall have the right – and not only the “possibility” – to withdraw their consent to data processing. The burden of proof should be on data controllers – those who process your personal data. They must prove that they need to keep the data rather than individuals having to prove that collecting their data is not necessary.

The second pillar is “transparency”. It is a fundamental condition for exercising control over personal data and for building trust in the Internet.

Read more of her statement on eGov Monitor. Have you guessed the other two pillars? They’re “privacy by default” and “protection regardless of data location.” [Attention Cloud providers! Bob]

Did I mention I like the way she thinks about much of this?


(Related)

http://www.pogowasright.org/?p=21752

The Review of the EU Data Protection Framework v. The State of Online Consumer Privacy in the US

March 17, 2011 by Dissent

In a recent blog entry on EDiscoveryMap, Monique Altheim highlights some of the differences between EU and U.S. approaches to privacy regulation, contrasting the differences between yesterday’s Senate hearing on consumer privacy and a talk given by Viviane Reding, Vice President of the European Commission, Commissioner for Justice, Fundamental Rights and Citizenship, “The Review of the EU Data Protection Framework.”

While EU and U.S. privacy advocates seem to be at arm’s (pond’s?) length on the issue of a “right to be forgotten,” there are also significant differences in other aspects of how privacy is viewed and embodied within the laws and respective cultures. In many respects, American privacy advocates like myself are probably more comfortable with the European approach of viewing privacy as a fundamental human right. Instead, we find ourselves poring through legal decisions looking for any glimmer of recognition of any kind of right to privacy.

Read Monique’s commentary on EDiscoveryMap. It may help you get a better sense of the differences in our respective frameworks.

There is a mentality in the U.S. that usually resists following Europe’s lead. Maybe it’s a throwback to our revolutionary roots, but when it comes to privacy, the EU is way ahead of us in some respects.



This is significant. Those little devices with the number in the window are used to secure a lots of systems.

http://it.slashdot.org/story/11/03/17/2321226/RSAs-Servers-Hacked?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

RSA's Servers Hacked

"EMC subsidiary RSA was the victim of 'an extremely sophisticated cyber attack' which resulted in the possible theft of the two-factor code used by their SecurID products."

The Boston Herald has a short article on the intrusion. Update: 03/17 23:54 GMT by T : Reader rmogull adds

"With all the hype that's sure the explode over this one, we decided to do a quick write-up to separate fact from speculation."

[From Yahoo answers:

The 6 digit code that you see on the token is generated using an algorithm that is exists in all tokens. The token also contains a clock and has a unique seed number. The current time and the unique seed are processed using the algorithm and produce the token code you see on the token. This is normally done 1 per minute. In this way a unique code is generated that appears to be random.

The server (Ace server), that is online and connected to whatever system you are logging on to, also knows the time and it also knows the unique seed number of your token. So it uses the same algorithm to calculate the code that you should see on your token. If they match then you are authenticated.



This may be worthy of a seminar by itself!

http://www.pogowasright.org/?p=21755

Yahoo to show how data used to target adverts

March 17, 2011 by Dissent

Tim Bradshaw reports:

Yahoo has launched a scheme in the UK to show visitors to its websites how their personal data are used to target advertising, the first such move by a large internet publisher ahead of the introduction of new European online privacy rules.

A year after its launch in the US, Yahoo’s “Ad Choices” icon will be added to advertisements on pages where its users log in to services such as Yahoo Mail and Messenger, some of its highest-value banners. Clicking on the icon prompts more information about who placed the advertisement, why it was shown and links to manage user preferences about targeted “interest-based” advertising.

Read more on Financial Times.

Good for Yahoo for doing this, too. I’d like to see them do this in the U.S.



The consensus so far seems to be: This won't work.

http://www.wired.com/epicenter/2011/03/nyt-paywall-is-weird/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29

Commentary: The New York Times Paywall Is … Weird

The NYT paywall has arrived: it’s going up in Canada today, and then worldwide on March 28. The most comprehensive source for the gritty details is this FAQ, which does things like explain the difference between an item and a pageview. (A slideshow or a multi-page article is one “item,” no matter how many slides it contains.)

The NYT has decided not to make the paywall very cheap and porous in the first instance as people get used to it. $15 for four weeks might be cheap compared to the cost of a print subscription, but $195 per year is still enough money to give readers pause and to drive them elsewhere. And similarly, 20 articles per month is lower than I would have expected at launch.



As all entertainment media viewing shifts to the Internet, someone has to come up with a tool to find exactly what you want to watch, when you want to watch it.

http://techcrunch.com/2011/03/17/moki-tv-is-the-ultimate-personalized-guide-to-whats-streaming-on-the-web/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29

Moki.TV Is The Ultimate, Personalized Guide To What’s Streaming On The Web

TV shows and movies are spread across a variety of websites, and platforms, including iTunes, Hulu, Amazon, Netflix and others, and it can be difficult to sort through all this fragmented content. Y Combinator-backed Moki.TV is launching today as a personalized guide to all TV, video and movie content on the web.

Moki.TV is a directory of all paid and free content included on Amazon’s streaming service, Netlfix, Hulu, iTunes, and others. At the moment, the site has 40,000 movies, and 60,000 TV episodes indexed; and this number is growing daily, says co-founder Matt Huang. Users can use the site to search for content and find where this content is streaming.



For the Techie-Toolbox

http://www.makeuseof.com/tag/create-ultimate-boot-cd-windows/

How To Create The Ultimate Boot CD For Windows


No comments: