Skip to main content

POST Lights, camera, inaction

It’s an old meme on this blog, but I think it is essentially true that the Big Brother of Orwellian nightmare isn’t really the government, who do their best to spy on us all the time in order to track down people who post abusive tweets and such like, but us. We are Big Brother. The mobile phone and the Internet have combined to

I’m sure most people, as I do, assume that if they are in a business meeting them someone will be recording them on a pen with a movie camera in it or through their glasses or whatever. But what is to be done?. I remember a super story about this that I saw in a newspaper a while ago. Some Austrian wildlife photographers had set up cameras in a forest in order to capture exotic forest creatures going about their business, but instead caught an Austrian politician up to his

Members of the Carinthian Hunting Society in southern Austria are accustomed to observing animals in the wild, such as the western European red deer or wild boar, with the help of cameras in the forest. But the hunting society got more than it bargained for last week when their cameras recorded footage of a politician enjoying an explicit sexual encounter in the woods.

[From Forest Sex Footage Sparks Debate in Austria - SPIEGEL ONLINE]

As one comment I saw had it, "if it had been with his wife it would have been even bigger news". Amusing, indeed. But the story does raise some interesting points about mundane privacy in a camera-infested world. I don’t know whether, in a world of smartphones and social media, one might have a reasonable expectation of privacy when having sex out in the woods somewhere. I would have thought not, but I am not a lawyer (or a wildlife photographer). It’s getting really hard to think about privacy and what we want from it.

Privacy is not a static construct. It is not an inherent property of any particular information or setting. It is a process by which people seek to have control over a social situation by managing impressions, information flows, and context.

[FromWhy Teens Are Innovators Of A New Public Form Of Privacy | Co.Exist | ideas + impact]

As I’ve written, blogged and spoke about many times before, I think that the only construct that makes sense is to think about privacy as a function of control over personal information.

I've talked before about how privacy is not a "thing," it's a tradeoff.

From Privacy Is About Tradeoffs... And Things Go Wrong When Those Tradeoffs Are Not Clear | Techdirt

xxx

xxx

a big problem is that the tradeoffs aren't as clear or as explicit as they should be.

From Privacy Is About Tradeoffs... And Things Go Wrong When Those Tradeoffs Are Not Clear | Techdirt

xxx

Comments

Popular posts from this blog

There is no excuse for not taking cards

So we went to the pub. For lunch. Seven of us. Say £20 per head. £100+ quid. Say £50 quid gross for the pub. Colleague goes to order food and drinks and pay at the bar. Apologetic barmaid comes over to explain that their “card machine” is down, so she can only accept cash. Under normal circumstances I would have simply walked out, feeling it wholly inappropriate to reward such a poorly managed establishment and, as a functioning actor in a capitalist economy, done my duty to depress their lunchtime takings. Here’s what we wanted to say: This is absurd. This is 2016 not 1916. Your card machine is down? Well, so what! Are you seriously telling me that mein host has no mobile phone number capable of registering for PingIt or PayM? That none of the staff or the pub itself have a PayPal account that I can send the money to? That neither the owners nor managers not contingency planners thought to tuck an iZettle behind the bar to use when the clunky and expensive GPRS terminal fails for o...

Financial Cryptography: Corda Day - a new force

Forum friend Ian Grigg, who I always take very seriously indeed on any such topic, wrote about Corda on his blog and concluded with a powerful statement. Bitcoin told the users it wanted an unstoppable currency - sure, works for a small group but not for the mass market. Ethereum told their users they need an unstoppable machine - which worked how spectacularly with the DAO? Not. What. We. Wanted. Corda is the only game in town because it's the only one that asked the users. It's that simple. From Financial Cryptography: Corda Day - a new force xxx It seems to me, however, what Ian is pointing to as the greatest strength of their approach is also the greatest weakness. A staple feature of unimaginative management consultants presentations about innovation is some variation on the statement by Henry Ford that if you had asked users what they wanted, they would have asked for faster horses coupled with some variation on the statement by Steve jobs that it was pointless ask...

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...