-
6 votes
-
Why humanitarians are worried about Palantir’s new partnership with the UN
8 votes -
Even years later, Twitter doesn’t delete your direct messages
4 votes -
Telcos sold highly sensitive customer GPS data
4 votes -
Millions are on the move in China, and Big Data is watching
9 votes -
How ontologies help data science make sense of disparate data
3 votes -
Data on discrimination
5 votes -
I tried to block Amazon from my life. It was impossible
13 votes -
VOIPO.com data leak
7 votes -
Pew study: 74% of Facebook users did not know Facebook was maintaining a list of their interests/traits, 51% were uncomfortable with it, and 27% felt the list was inaccurate
21 votes -
Transparency-seeking OPEN Government Data Act signed into law
7 votes -
Open standards may finally give patients control of their data and care via Electronic Health Records
6 votes -
How Google tracks your personal information
7 votes -
At Blind, a security lapse revealed private complaints from Silicon Valley employees
13 votes -
Amazon sends 1,700 Alexa voice recordings to a random person
17 votes -
Facebook says new bug allowed apps access to private photos of up to 6.8m users
33 votes -
Remember backing up to diskettes? I’m sorry. I do, too.
11 votes -
Google CEO Sundar Pichai testifies before the House Judiciary Committee on Data Collection
15 votes -
Your apps know where you were last night, and they’re not keeping it secret
23 votes -
Marriott admits hackers stole data on 500 million guests; passports and credit card info included
21 votes -
Amazon admits it exposed customer email addresses, but refuses to give details
14 votes -
Unsecured database of millions of SMS text messages exposed password resets and two-factor codes
19 votes -
Tim Cook's keynote address at the 40th International Conference of Data Protection and Privacy Commissioners
8 votes -
What are the best practices regarding personal files and encryption?
Over the past year I have done a lot to shore up my digital privacy and security. One of the last tasks I have to tackle is locking down the many personal files I have on my computer that have...
Over the past year I have done a lot to shore up my digital privacy and security. One of the last tasks I have to tackle is locking down the many personal files I have on my computer that have potentially compromising information in them (e.g. bank statements). Right now they are simply sitting on my hard drive, unencrypted. Theft of my device or a breach in access through the network would allow a frightening level of access to many of my records.
As such, what are my options for keeping certain files behind an encryption "shield"? Also, what are the potential tradeoffs for doing so? In researching the topic online I've read plenty of horror stories about people losing archives or whole drives due to encryption-related errors/mistakes. How can I protect against this scenario? Losing the files would be almost as bad as having them compromised!
I'm running Linux, but I'm far from tech-savvy, so I would either need a solution to be straightforward or I'd have to learn a lot to make sense of a more complicated solution. I'm willing to learn mainly because it's not an option for me to continue with my current, insecure setup. I do use a cloud-based password manager that allows for uploading of files, and I trust it enough with my passwords that I would trust it with my files, though I would like to avoid that situation if possible.
With all this in mind, what's a good solution for me to protect my personal files?
26 votes -
Twitter makes datasets available containing accounts, tweets, and media from accounts associated with influence campaigns from the IRA and Iran
8 votes -
Microsoft re-releases Windows 10 October 2018 update with explanation of data loss bug
23 votes -
Facebook Isn’t Sorry — It Just Wants Your Data
15 votes -
Data for good: Wonderful ways that big data is making the world better
7 votes -
Alphabet to shut Google+ social site after user data exposed
18 votes -
Did Facebook lLearn anything from the Cambridge Analytica debacle? An even bigger data breach suggests it didn’t.
14 votes -
What does big data look like when cross-referenced?
Google knows a lot about its users. Facebook knows a lot about its users. FitBit knows a lot about its users. And so on. But what happens when these companies all sell their data sets to one...
Google knows a lot about its users. Facebook knows a lot about its users. FitBit knows a lot about its users. And so on.
But what happens when these companies all sell their data sets to one another? It'd be pretty trivial to link even anonymized users from set to set by looking for specific features. If I went for a run, Google tracked my location, FitBit tracked my heart rate, and Facebook tracked my status about my new best mile time, for example. Thus, Google can narrow down who I am in the other sets using pre-existing information that coincides with theirs. With enough overlap they can figure out exactly who I am fairly easily. Furthermore, each additional layer of data makes this discovery process from new data sets even easier, as it gives more opportunities to confirm or rule out concurrent info. So then when, say, Credit Karma, Comcast, and Amazon's data enter the fray, my online identity stops looking like an individual egg in each different basket but a whole lot of eggs in all in one. And they can do this across millions/billions of users--not just me!
I don't know for certain that this is a thing that happens, but... I have to assume it definitely is happening, right? How could it not? With how valuable data is and how loose protections are, this seems like a logical and potentially very lucrative step.
Right now, is there an aggregate version of "me" that exists in a data store somewhere that is a more comprehensive and accurate picture than my own self-image? After all, my memory and perception are imperfect and biased, but data stores aren't.
6 votes -
Data Factories
6 votes -
No cash needed at this cafe. Students pay the tab with their personal data.
31 votes -
iPhone iOS passcode bypass hack exposes contacts, photos
8 votes -
China's Social Credit system: The first modern digital dictatorship
8 votes -
Introducing Firefox Monitor, helping people take control after a data breach
24 votes -
NCIX data breach - The WAN Show Sept 21, 2018
7 votes -
A life insurance company wants to track your fitness data
10 votes -
NCIX Data Breach - after bankruptcy, terabytes of unencrypted customer/company data have been sold to multiple buyers
20 votes -
How Game Apps That Captivate Kids Have Been Collecting Their Data
11 votes -
A call for principle-based international agreements to govern law enforcement access to data
7 votes -
A year later, Equifax lost your data but faced little fallout
17 votes -
Who controls your data? Nine reporters in London, Paris, New York & San Francisco filed more than 150 requests for personal data to 30+ popular tech companies
8 votes -
Should Grindr users worry about what China will do with their data?
16 votes -
Google and Mastercard cut a secret ad deal to track retail sales
26 votes -
The tech industry is lobbying for federal data & privacy regulation that is friendly to the tech industry, but hostile to users' interests
11 votes -
Venmo's public API exposes millions of transactions, startling users
10 votes -
Verizon throttled fire department’s “unlimited” data during California wildfire
17 votes -
California wildfires: Verizon throttled data during crisis
24 votes -
The Data Detox Kit- An 8 day challenge to clean up your online data.
16 votes