Join 3,496 readers in helping fund MetaFilter (Hide)

12 posts tagged with computers and privacy. (View popular tags)
Displaying 1 through 12 of 12. Subscribe:

Lucy Kellaway's 'History of Office Life'

A series of BBC News Magazine articles on the office as workplace: (i) How the office was invented; (ii) The ancient Chinese exam that inspired modern job recruitment (previously); (iii) The invention of the career ladder; (iv) The arrival of women in the office; (v) Do we still need the telephone?; (vi) Are there too many managers?; (vii) The era of the sexually charged office; (viii) The decline of privacy in open-plan offices; (ix) How the computer changed the office forever and (x) Why did offices become like the home?—by columnist Lucy Kellaway. [more inside]
posted by misteraitch on Aug 2, 2013 - 22 comments

Student Data to Be Legally Given (and then Sold) to Capitalist Ventures

via Reuters A joint venture sponsored in part by the Bill and Melinda Gates Foundation, a vast student database including personal information on students grades K through 12 will be shared with corporations selling "personalized" educational software. Information can include social security numbers, presence of learning disabliities, or anything else school officials choose to share with any companies involved in this venture.
posted by DMelanogaster on Mar 6, 2013 - 88 comments

use value vs. exchange value

What Is Value? What Is Money? (via via) [more inside]
posted by kliuless on Sep 1, 2012 - 15 comments

Position-based quantum cryptography theoretically proved

Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.
posted by Joe Beese on Aug 8, 2010 - 47 comments

Cyber Command Über Alles

Attention Geeks and Hackers: Uncle Sam's Cyber Force Wants You! [more inside]
posted by homunculus on Jun 5, 2008 - 29 comments

"Leaving no trace [of our daily lives] is nearly impossible."

The Anonymity Experiment. Is it possible to hide in plain sight? Privacy-minded people have long warned of a world in which an individual’s every action leaves a trace, in which corporations and governments can peer at will into your life with a few keystrokes on a computer. Now one of the people in charge of information-gathering for the U.S. government says, essentially, that such a world has arrived.
posted by amyms on Feb 16, 2008 - 44 comments

Geek Squad Steals Porn?

Using a computer set to auto-screencast, The Consumerist catches a Geek Squad technician copying porn from a client's computer to a thumbdrive, and they've got video and logfiles (CSV) to prove it. Also, the Geek Squad CEO responds, and an anonymous Geek Squad tech confesses that this is not an uncommon practice: "stealing customers' nudie pics was an easter egg hunt." Consumerist users suggest that this practice might not be limited to Geek Squad. Via.
posted by charmston on Jul 6, 2007 - 73 comments

Privacy and the need or right to know

NSA,FISA, and Privacy It is of course the president who finally approves of actions that may or may not be deemed legal but before 9/11, this is what he had been advised to consider "The largest U.S. spy agency warned the incoming Bush administration in its "Transition 2001" report that the Information Age required rethinking the policies and authorities that kept the National Security Agency in compliance with the Constitution's 4th Amendment prohibition on "unreasonable searches and seizures" without warrant and "probable cause," according to an updated briefing book of declassified NSA documents posted today on the World Wide Web. If this is the sort of reading you enjoy, then by all means dig about here: But then Windows allowed NSA to have a sure access to your machine . And by now we all know that Google will fight the government on making its search data base available in order to protect your privacy.(Reality: to protect Google stuff). And if you worry about search engines tracking you and making data available, then here is a workaround
posted by Postroad on Jan 20, 2006 - 16 comments

Your call is important to us

The DOJ wants to tap your IMs, your email, your VOIP calls, and your Web browsing -- and they want you to pay for it. The Justice Department is seeking to expand its ability to monitor online traffic by forcing broadband providers to make their services "wiretap-friendly," and a petition filed with the FCC this week says you will foot the bill. Get ready for CALEA 2.0. "As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire tapping," the prescient Justice Brandeis observed in 1928.
posted by digaman on Mar 13, 2004 - 15 comments

This article in the always interesting Technology Review describes new technology that goes well beyond regular "spyware." BayTSP even automates their cease-and-desist letters. It all made me think of people like this.
posted by anathema on May 24, 2002 - 2 comments

Do you have a 'Super Cookie' ??? Another m$ screw-up...

Do you have a 'Super Cookie' ??? Another m$ screw-up... Very interesting since wmp just minutes before tried to access the net through my firewall that is set to block all except a few programs. If you're running mozilla his demo doesn't hit but using msie it sures pulls up the ID# of my wmp... time to tighten things down again!!! Another blasted waste of time to fix what m$ should not have let out in the first place!!! Link via... Inflight Correction
posted by tilt on Jan 17, 2002 - 13 comments

Excellent, in-depth analysis

Excellent, in-depth analysis of "spyware" used by insidious and horrible software entities such as RealPlayer. Written by my hero and yours, Steve Gibson.
posted by Succa on Oct 16, 2000 - 14 comments

Page: 1