Simply not credible: The extraordinary verdict against ICANN – the body that hopes to run the internet

In an extraordinary judgment, the organization that hopes to take over running the top level of the internet later this year has been slammed by an independent review as at best incompetent and at worst deliberately mendacious.

The decision [PDF] by ICANN’s Independent Review Panel (IRP) over the organization’s decision to refuse “community” status for three applications covering business suffixes has exposed a level of double-dealing that many suspected occurred in the non-profit organization but has been difficult to prove.

Source: Simply not credible: The extraordinary verdict against the body that hopes to run the internet

This is an incredible story of lawyers who feel they are above the law, insider dealing and nepotism. What a mess at ICANN

Characterizing and Avoiding Routing Detours Through Surveillance States

We find that 84\% of paths originating in Brazil traverse the United States, but when relays are used for country avoidance, only 37\% of Brazilian paths traverse the United States. Using the open DNS resolver infrastructure allows Kenyan clients to avoid the United States on 17\% more paths. Unfortunately, we find that some of the more prominent surveillance states (e.g., the U.S.) are also some of the least avoidable countries.

Cornell University Library

A legal approach to mitigate anonymisation with risk

Perfect anonymization of data sets that contain personal information has failed. But the process of protecting data subjects in shared information remains integral to privacy practice and policy. While the deidentification debate has been vigorous and productive, there is no clear direction for policy. As a result, the law has been slow to adapt a holistic approach to protecting data subjects when data sets are released to others. Currently, the law is focused on whether an individual can be identified within a given set. We argue that the best way to move data release policy past the alleged failures of anonymization is to focus on the process of minimizing risk of reidentification and sensitive attribute disclosure, not preventing harm. Process-based data release policy, which resembles the law of data security, will help us move past the limitations of focusing on whether data sets have been “anonymized.” It draws upon different tactics to protect the privacy of data subjects, including accurate deidentification rhetoric, contracts prohibiting reidentification and sensitive attribute disclosure, data enclaves, and query-based strategies to match required protections with the level of risk. By focusing on process, data release policy can better balance privacy and utility where nearly all data exchanges carry some risk.
paper here

Amazon randomly kills PriceZombie price comparison site

Unfortunately, it seems our service has to come to an untimely end. After being previously told we were in 100% compliance with the rules, our Amazon affiliate account was closed a few months ago. Amazon claimed we were violating their rules against showing product and price information that was more than 24 hours old. Obviously, this is something ALL price history trackers do, not just PriceZombie. Overnight, we lost over 90% of our income but we kept going, hoping to resolve any issues and return to compliance. However, our appeals to Amazon affiliate program administrators (associates@amazon.com) and even Jeff Bezos (jeff@amazon.com) were either ignored or answered incompletely

Source: Important Announcement – PriceZombie will be shutting down unless..

Wtf?

Amazon randomly destroys price tracking site PriceZombie

Unfortunately, it seems our service has to come to an untimely end. After being previously told we were in 100% compliance with the rules, our Amazon affiliate account was closed a few months ago. Amazon claimed we were violating their rules against showing product and price information that was more than 24 hours old. Obviously, this is something ALL price history trackers do, not just PriceZombie. Overnight, we lost over 90% of our income but we kept going, hoping to resolve any issues and return to compliance. However, our appeals to Amazon affiliate program administrators (associates@amazon.com) and even Jeff Bezos (jeff@amazon.com) were either ignored or answered incompletely

Source: Important Announcement – PriceZombie will be shutting down unless..

Wtf?

Dark Patterns make you do stuff you don’t want to on websites

Everyone has been there. So in 2010, London-based UX designer Harry Brignull decided he’d document it. Brignull’s website, darkpatterns.org, offers plenty of examples of deliberately confusing or deceptive user interfaces. These dark patterns trick unsuspecting users into a gamut of actions: setting up recurring payments, purchasing items surreptitiously added to a shopping cart, or spamming all contacts through prechecked forms on Facebook games.

Dark patterns aren’t limited to the Web, either. The Columbia House mail-order music club of the ’80s and ’90s famously charged users exorbitant rates for music they didn’t choose if they forgot to specify what they wanted. In fact, negative-option billing began as early as 1927, when a book club decided to bill members in advance and ship a book to anyone who didn’t specifically decline. Another common offline example? Some credit card statements boast a 0 percent balance transfer but don’t make it clear that the percentage will shoot up to a ridiculously high number unless a reader navigates a long agreement in tiny print.

“The way that companies implement the deceptive practices has gotten more sophisticated over time,” said UX designer Jeremy Rosenberg, a contributor to the Dark Patterns site. “Today, things are more likely to be presented as a benefit or obscured as a benefit even if they’re not.”

When you combine the interactive nature of the Web, increasingly savvy businesses, and the sheer amount of time users spend online, it’s a recipe for dark pattern disaster. And after gaining an awareness for this kind of deception, you’ll recognize it’s nearly ubiquitous.

Source: Dark Patterns are designed to trick you (and they’re all over the Web)

Spotify is now selling your information to advertisers

The popular streaming service is now the latest platform that is opening its data to targeted advertising. Everything from your age and gender, to the music genres you like to listen will be available to various third-party companies.

Spotify is calling it programmatic buying and has already enabled it. Advertisers will have access to the 70 million people that use Spotify’s free, ad-supported streaming across 59 countries. By viewing your song picks, these buyers will be able to look for specific users who might be the best matches for the products they’re selling.

Source: Spotify is now selling your information to advertisers

Empty your free 30GB OneDrive space today – before Microsoft deletes your files for you

Microsoft is cutting its free 15GB OneDrive cloud storage space down to 5GB, and eliminating the 15GB free camera roll for many users. Files will be deleted by Redmond until your account is under the free limit.

Clouds turn to rain to hide your tears

Source: Empty your free 30GB OneDrive space today – before Microsoft deletes your files for you

Goes to show – the cloud’s promises are not worth very much…

Russian leader Putin signs controversial ‘Big Brother’ law

the new legislation — which Edward Snowden has called “Russia’s new Big Brother law” — is not only severe against those involved in “international terrorism,” its financing, and its non-denunciation. Law enforcement agencies will also be granted access to any user’s messages without any judicial oversight.

Several key provisions will directly affect the internet and telecom industry. In particular, telecom operators and internet resources will need to store the recordings of all phone calls and the content of all text messages for a period of six months. They will be required to cooperate with the Federal Security Service (FSB) to make their users’ communications fully accessible to this organization.

Source: Russian leader Putin signs controversial ‘Big Brother’ law

UK Police Accessed Civilian Data 1283 times for Fun and Profit, New Report Says

More than 800 UK police staff inappropriately accessed personal information between June 2011 and December 2015, according to a report from activist group Big Brother Watch.

The report says some police staff used their access to a growing trove of police data, which includes personal information on civilians, for entertainment and personal and financial gain.

ot only was some information not needed for official police work, according to the report, but was shared with third parties outside the police, including some organized crime groups, 877 times.

In total, 2,315 incidents of inappropriate access or distribution of data were reported.

The majority of incidents, 1,283, ended up with no disciplinary action taking place, while 297 ended in a resignation or dismissal, 258 resulted in a written or verbal warning, and 70 led to a criminal conviction or caution.

Citigroup Is Suing AT&T For Using the Word ‘Thanks’ Because Citi Trademarked Thankyou

Back in 2010, the US Patent and Trademark Office granted Citigroup a trademark for “thankyou,” which the company uses for credit card services. Today the company is suing AT&T over its own use of the terms “thanks” and “thanks AT&T.” Check the date, because this isn’t April Fool’s.

Source: Citigroup Is Suing AT&T For Using the Word ‘Thanks’ Because Citi Trademarked It

Uhm… some dick in a patent office decided to trademark a well known phrase because they dropped the space – and now they are using it as ammunition to go after people using a well used word? There is something rotten in the state of trademark.

systemd unilaterally changes value to kill background processes after user logs out

Source: #825394 – systemd kill background processes after user logs out – Debian Bug report logs

And amazingly defends their choice with a “we are wiser than thou, you don’t know what you need” argument whilst telling world + dog how system administration should be done. Idiots. Nobody expects programs on a server to be killed for them and nobody uses Debian for a desktop.

You Can Absolutely Be Identified Just By How You Drive

Researchers from the University of Washington and the University of California, San Diego did an experiment to see what could be learned from just the information many cars are already recording. The result was that the way people drove was as identifiable as a fingerprint. […] When it was given data from all 16 sensors for the whole drive, the match was made 100 percent of the time. When it was given data from five sensors, three sensors, and even just the brake pedal, the match was made 100 percent of the time.

On just 15 minutes of data and all 16 sensors, the match was made 100 percent of the time. Just the brake pedal was 87 percent accurate.

This research reveals just how much data your car is actually collecting—and that turning over all that data through apps or insurance company dongles may be revealing more about yourself than you realize. Tesla, with its auto-uploading feature, probably knows a lot about its drivers.

Source: You Can Absolutely Be Identified Just By How You Drive

Oculus breaks promise, uses DRM to kill app that let you switch VR systems

As recently as 5 months ago, Oculus founder Palmer Luckey was promising his customers that they could play the software they bought from the Oculus store on “whatever they want,” guaranteeing that the company wouldn’t shut down apps that let customers move their purchased software to non-Oculus hardware.

But now, Oculus has changed its DRM to exclude Revive, a “proof-of-concept compatibility layer between the Oculus SDK [software development kit] and OpenVR,” that let players buy software in the Oculus store and run it on competing hardware.

The company billed the update as an anti-piracy measure, but Revive’s developer, who calls themself “Libre VR,” points out that the DRM only prevents piracy using non-Oculus hardware, and allows for unlimited piracy by Oculus owners.

Source: Oculus breaks promise, uses DRM to kill app that let you switch VR systems

There you go – DRM being thrown in again. It’ll get broken, but still it becomes an annoyance to the users. So another reason (apart from the price) to go to a competitor.

Study shows phone metadata is much more sensitive than top spies admit

In a study published online Monday in the journal Proceedings of the National Academy of Sciences, Stanford University researchers demonstrated how they used publicly available sources—like Google searches and the paid background-check service Intelius—to identify “the overwhelming majority” of their 823 volunteers based only on their anonymized call and SMS metadata.

Using data collected through a special Android app, the Stanford researchers determined that they could easily identify people based on their call and message logs.

The results cast doubt on claims by senior intelligence officials that telephone and Internet “metadata”—information about communications, but not the content of those communications—should be subjected to a lower privacy threshold because it is less sensitive.

Contrary to those claims, the researchers wrote, “telephone metadata is densely interconnected, susceptible to reidentification, and enables highly sensitive inferences.” Study shows phone metadata is much more sensitive than top spies admit

Runkeeper is secretly tracking you around the clock and sending your data to advertisers

The NCC, a consumer rights watchdog, is conducting an investigation into 20 apps’ terms and conditions to see if the apps do what their permissions say they do and to monitor data flows. Tinder has already been reported to the Norwegian data protection authority for similar breaches of privacy laws. The NCC’s investigation into Runkeeper discovered that user location data is tracked around the clock and gets transmitted to a third party advertiser in the U.S. called Kiip.me.

Source: Runkeeper is secretly tracking you around the clock and sending your data to advertisers

FindFace Facial Recognition Service Becomes a Weapon Against Russian Porn Actresses

Users of the Russian imageboard “Dvach” (2chan) have launched a campaign to deanonymize Russian actresses who appear in pornography, utilizing a controversial new service called “FindFace.”

Source: Facial Recognition Service Becomes a Weapon Against Russian Porn Actresses – Global Voices Advocacy

What a bunch of pissants – using a creepy stalker app to then send the contacts of porn actresses porn pictures of their friends. To me it sounds like these guys are so jealous of people having sex whilst they never will, that they’d rather just spoil it for everyone and try to make sure there are no more porn actresses.

93.4m Mexican Voters Data found on open US server

In my hands is something dangerous. It is proof that someone moved confidential government data out of Mexico and into the United States. It is a hard drive with 93.4 million downloaded voter registration records— The Mexican voter database.

See the interview with Chris Vickery commenting on this breach:

Before going any further, let’s make one thing very clear. I’m not the one who transmitted the data out of Mexico. Someone else will have to answer for that. However, eight days ago (April 14th), I did discover a publicly accessible database, hosted on an Amazon cloud server, containing these records. There was no password or authentication of any sort required. It was configured purely for public access. Why? I have no clue.

After reporting the situation to the US State Department, DHS, the Mexican Embassy in Washington, the Mexican Instituto Nacional Electoral (INE), and Amazon, the database was finally taken offline April 22nd, 2016.

Under Mexican law, these files are “strictly confidential”, carrying a penalty of up to 12 years in prison for anyone extracting this data from the government for personal gain. We’re talking about names, home addresses, birthdates, a couple of national identification numbers, and a few other bits of info.

Source: BREAKING: Massive Breach of Mexican Voter Data – Blog – MacKeeper™

UK intel agencies spy indiscriminately on millions of innocent folks, have been since  the 90s

The UK’s intelligence agencies (MI5, MI6, and GCHQ) are spying on everything you do, and with only the flimsiest of safeguards in place to prevent abuse, according to more than a thousand pages of documents published today as a result of a lawsuit filed by Privacy International.

The documents reveal the details of so-called “Bulk Personal Datasets,” or BPDs, which can contain “hundreds to millions of records” on people who are not suspected of any wrongdoing.

Source: UK intel agencies spy indiscriminately on millions of innocent folks

Data protection reform – Parliament approves new rules fit for the digital era

The new rules include provisions on:

  • a right to be forgotten,
  • “clear and affirmative consent” to the processing of private data by the person concerned,
  • a right to transfer your data to another service provider,
  • the right to know when your data has been hacked,
  • ensuring that privacy policies are explained in clear and understandable language, and
  • stronger enforcement and fines up to 4% of firms’ total worldwide annual turnover, as a deterrent to breaking the rules.
  • Source: Data protection reform – Parliament approves new rules fit for the digital era

    So we get simpler EULAs that no one will read either… But it’s nice to have control over your own data and the right to know when your data has been breeched. Not that you can do much with that knowledge, but ok.

    Hotjar – Records mouse behaviour to see where visitors are scrolling, mousing and clicking to make heatmaps

    Hotjar is a new and easy way to truly understand your web and mobile site visitors.

    Source: Hotjar – Heatmaps, Visitor Recordings, Conversion Funnels, Form Analytics, Feedback Polls and Surveys in One Platform

    I’ve been seeing this on more and more sites recently. They state that the service is cheap (but no pricing to be found) and I’m very curious if they keep your data and link it to you as a person on multiple tracked sites?

    All Prior Art – generating patent applications and giving them away, helping kill patent trolls

    All Prior Art is a project attempting to algorithmically create and publicly publish all possible new prior art, thereby making the published concepts not patent-able. The concept is to democratize ideas, provide an impetus for change in the patent system, and to preempt patent trolls. The system works by pulling text from the entire database of US issued and published (un-approved) patents and creating prior art from the patent language. While most inventions generated will be nonsensical, the cost to computationally create and publish millions of ideas is nearly zero – which allows for a higher probability of possible valid prior art.
    […]
    The particular Creative Commons license was chosen to prevent commercial use of the text along with restricting derivatives, since the point of the prior art is to be publicly published unmodified (as it is to be a valid reference point)
    […]
    -The intent is not to prevent actual creative and innovative patents from being filed, it is to take the obvious and easily automated ideas out-of-play. If an idea is truly creative and innovative, a computer should have difficulty coming up with it.

    Source: About – All Prior Art

    CIA’s Fundings Clearista Skin Care Products That Collect DNA among other markers for health

    Clearista products were designed with medical applications in mind before they became beauty products. The idea was that removing the product got you access to traces or biological markers that give an insight into the health of a person. They also cover blemishes and dark spots on the skin. So the CIA is interested, as DNA is one of the markers they can pick up. They use their vehicle In-Q-Tel (IQT) to fund Skincential Sciences, which produces Clearista (among other products)

    Source: CIA’s Venture Capital Arm Is Funding Skin Care Products That Collect DNA