Betsy Cooper: Unlike “information-gathering” hacks (where data is stolen because it is valuable) or “hold hostage” attacks (when data is imprisoned until someone pays to release it), “manipulation hacks” are hard to detect: They result when individuals (or bots) illegally change vital information below the threshold of attention.
just watched “The Circle”, a thriller about a computer company which uses internet connectedness to eradicate privacy in the name of “transparency” and “democracy”. The film is fictional, but the conflict between privacy and internet capitalism is real. The giants of the computer world routinely collect as much information as they can about people who […]
Shawn Hamilton: I passed a bus enclosure near the campus one day and saw five people, presumably students, all perched like birds on a wire, uniformly staring at a fixed point near their knees as they cradled their cherished screens.
Mel Gurtov: We’re all in a bitter struggle to preserve our freedom of thought and movement against the rising tide of security-firsters who will forever contend that sacrificing our privacy is necessary. Apple Encryption
Larry Wines: They kept telling us, for a long time, that we shouldn’t worry about not making anything in America anymore, because we could all have jobs in the ever-expanding “services-based economy.”
Randy Shaw: Once upon a time not so long ago, the best minds of the younger generation left college to join nonprofit organizations working to improve communities, nations and the world. Today, the idealistic techie hipster is heading toward tech.
Atomic Fart: Anyone can secretly place the iPhone near an unsuspecting nebbish, quickly move to the other side of the room, and then wait.
Claude Fischer: Some interesting and perhaps unexpected findings are coming out of research into the sociology of cell phones. One finding is that, however cell phone obsessed we think we are … um, did I just hear a buzz? Is that for me? … Americans are mobile laggards.
Steve Hochstadt: Right now we are being spied upon on a grand scale unimaginable a few years ago. Not by the government, but by the real Big Brother, Big Brother Computing.
Robert Link: Be on the lookout for when language is being used against you, to bind you, to paint you into a corner, rather than to communicate, as with the so-called “Stop Online Piracy Act”.
Robert Link: As we think about the difference, say, between Irvine and Davis, both in California, it is natural to wonder if we really know enough about the different cities to understand why things unfold one way at one place but so differently at another.
Robert Link: Corporate software, like other consumer goods, runs largely on the principle of planned obsolescence. The latest new-shiny makes outmoded and outdated the formerly-new-shiny with which one is currently saddled.
Freedom of the press means little when only the wealthy can run one. But the internet gives anyone with a dollar and a nearby internet cafe the chance to publish works that can instantly be seen by an amazingly diverse and far-flung audience worldwide.