Skip to main content

Posts

Showing posts with the label Privacy

Workplace Privacy

Photo by Philipp Birmes Americans who believe that our rights are unalienable would be surprised to learn how limited in scope they are at their place of employment. At work, our liberties are second to the need for business to monitor their assets, including their greatest asset, their people. While it is not unreasonable for businesses to be secure, they must tread carefully to avoid violating the rights of their employees. The story of Theranos, the now defunct blood testing company which has since been revealed to be a total fraud, is not new, but many new details are now emerging. Theranos was a silicon valley wunderkind because it was poised to revolutionize the blood testing industry under the leadership of its charismatic leader, Elizabeth Holmes. Holmes made many unethical business decisions, but how was this massive fraud initially discovered? One detail about Theranos that has recently emerged is how paranoid senior leadership was. Holmes had made a connection to a f...

The Scope Of Big Data

Photo by koon boh Goh Combining massive data warehouses, powerful supercomputers, and a global computing network infrastructure,  big data delivers a more tailored experience as we migrate ever more of our lives onto the internet. Big data is what adds value to connected our lives; data is fed to algorithms which in turn make an increasing amount of decisions on our behalf. But at what cost does this freedom from decision come? It is common knowledge that Facebook extracts a fee from its users, but this fee is paid in data rather than in dollars. Despite overwhelming abuse of the use of customer data, people continue using the social networking behemoth. Recently, Facebook entered into negotiations with the FTC regarding a multi-billion dollar fine over its conditions for the company. These negotiations follow Facebook another multi-billion dollar fine in Europe. Facebook usage has not declined because it provides value to its users. Value is, of course, a subjective term bu...

Operator Overload

Photo by Oliver Sjostrom Life has changed dramatically since the start of the personal computer revolution in the late 1970s. We have seen computing go from the realm of military to industry, then to the home and now to the pocket of our pants. Connected computers have followed the same path, as the Internet has forever changed the landscape of computing, including how people interact with it. Along the way, we've seen computing go from being rather anti-social to being a completely mainstream component of popular culture. Let's pause for a moment and examine how technology migrated into being chic. In the late 1970s there was a lot of optimism around what computing technology could someday do for us and while many people were eager to learn, that number was still small. Computers were essentially souped up calculators and most people weren't eager to learn an arcane programming language or spend their free time noodling around with calculations. One pivotal use ca...

An Algorithmic Life

Photo by sk Data is the most valuable commodity of the 21st century. Algorithms are what transform data into information. Algorithms have become like a trusted friend whose recommendations we seek, and that we adhere to. Perhaps what isn't known is how these pieces of code are able to derive such useful information for us, which is the part of algorithms that are unseen to many. An algorithm is ultimately only as good as the data that is fed into it, and we are all feeding vast amounts of data into code we did not author, that we don't control, and that is only visible to us in its outputs. The convenience provided by algorithms is certainly welcome, but according to a recent Pew Research Center report , the public doesn't have such a welcoming opinion of them when used for decisions that can be life-changing. Algorithms represent far more than recommendations on which media to consume. There is an innate desire for humanity in decisions that could dictate, for examp...

Law enforcement and DNA sequencing

DNA sequencing has risen in popularity in recent years to to the widespread availability of affordable testing kits. Obviously people are opting into participation by uploading their DNA data, in great numbers, but do they fully know how that data will be used? The Golden State Killer, who terrorized California from the mid-1970s to the mid-1980s, was recently apprehended by working with a lesser known testing company, Family Tree DNA. Their kits are smaller and so is their database, but their database has an big advantage. The company boasts that it has the largest database Y-DNA database in the world. Y-DNA is very useful in tracing patrilineal ancestry, which is essentially data on who you are related to. This data is how the Golden State Killer was caught. Because some of his relatives had willingly participated in DNA kit testing, law enforcement was able to triangulate his identity. Use of these databases by law enforcement is a new but already rapidly growing phenomen...

Ad blocking without browser extensions

Google is an advertising company first and foremost, lest we forget. They want to create ads people want to see, they say, but I find it hard to trust their motives. It comes as little surprise they want to clamp down on browser extension based adblockers as Ars recently covered. Fortunately, there are other ways to block ads which are more effective anyway. Every OS has a hosts file, which is simply a plain text file that can route internet traffic from one host to another. In Linux and Mac OS X the hosts file is in /etc/hosts and in Windows it is in C:\Windows\System32\Drivers\etc\hosts and editing it will require sudo or Administrator rights. Once you have your hosts file open, we are going to add a bunch of entries to it that will take traffic from many thousand known ad-serving domains and route it to 0.0.0.0 which is equivalent to a digital trash can. There are options for host file ad blocking. Personally, I use the list from mvps.org  but the list from Steven B...