WHY IT MATTERS: Digital Transformation
214.7K views | +5 today
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tag: 'Privacy'. Clear
Scooped by Farid Mheir
Scoop.it!

Why 'Anonymous' Data Sometimes Isn't: the case of netflix and others #nowhereToHide

Why 'Anonymous' Data Sometimes Isn't: the case of netflix and others #nowhereToHide | WHY IT MATTERS: Digital Transformation | Scoop.it
Anonymous data sets are an enormous boon for researchers, but the recent de-anonymization of Netflix customer data shows there are privacy risks as well. Commentary by Bruce Schneier.
Farid Mheir's insight:

Even anonymous data can be used to identify you, when coupled with other information.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

No Two Digital Cameras Are the Same: Fingerprinting Via Sensor Noise #nowhereToHide

No Two Digital Cameras Are the Same: Fingerprinting Via Sensor Noise #nowhereToHide | WHY IT MATTERS: Digital Transformation | Scoop.it

The previous article looked at how pieces of blank paper can be uniquely identified. This article continues the fingerprinting theme to another domain, digital cameras, and ends by speculating on t...

Farid Mheir's insight:

How the noise from your camera sensor can help authorities identify you as the author of a picture. Nowhere to hide...

Maria Ioia's curator insight, March 8, 2015 8:57 PM

I thought smart phone biometrics was interesting. This is ridiculous!

Scooped by Farid Mheir
Scoop.it!

Online Porn Could Be The Next Big Privacy Scandal via @qz

Online Porn Could Be The Next Big Privacy Scandal via @qz | WHY IT MATTERS: Digital Transformation | Scoop.it
If you are viewing online porn in 2015, even in Incognito mode, you should expect that at some point your browsing history will be publicly released and attached to your name.
Farid Mheir's insight:

Beyond the catchy title, this short post highlights some very important links to help you determine if your browser sessions are safe Mine are not it seems...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Spies Can Track You Just by Watching Your Phone's Power Use | WIRED

Spies Can Track You Just by Watching Your Phone's Power Use | WIRED | WHY IT MATTERS: Digital Transformation | Scoop.it
Researchers at Stanford University and Israel's defense research group Rafael have created a technique they call PowerSpy, which they say can gather information about an Android phone's geolocation merely by tracking its power use over time through...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

No #privacy: 3 or 4 purchases can unmask an anonymous credit card record via @theverge

A handful of purchases can unmask an anonymous credit card record
Farid Mheir's insight:

The article describes MIT research that proves anonymous data provides sufficient information to identify you when merged with location, date and other purchase data. There is no privacy when Big Data is mined.


Compare this with previous posts on the subject http://www.scoop.it/t/digital-transformation-of-businesses?tag=Privacy 

or this specific post about a German politician life exposed via his cell phone location data http://sco.lt/7shPsH 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

read this, then make your kids read it too: Are You Hackproof? How to Protect Your Identity in 10 Minutes

read this, then make your kids read it too: Are You Hackproof? How to Protect Your Identity in 10 Minutes | WHY IT MATTERS: Digital Transformation | Scoop.it
There are things you can do—easy, free things!—to ward off the many entities (some nefarious, some just nosy) that want to steal your passwords, to know what websites you're looking at, or to gauge whether you're associating with someone who's on their list.
Farid Mheir's insight:

Read this article, then force your kids to read it too, then explain it to them. I know I will.

No comment yet.
Rescooped by Farid Mheir from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Prying Eyes: Inside the NSA's War on Internet Security **

Prying Eyes: Inside the NSA's War on Internet Security ** | WHY IT MATTERS: Digital Transformation | Scoop.it
US and British intelligence agencies undertake every effort imaginable to crack all types of encrypted Internet communication. The cloud, it seems, is full of holes. The good news: New Snowden documents show that some forms of encryption still cause problems for the NSA.

Via Constantin Ionel Milos / Milos Constantin
Scooped by Farid Mheir
Scoop.it!

Cellphone tracking now easier than ever via @WashingtonPost

Cellphone tracking now easier than ever via @WashingtonPost | WHY IT MATTERS: Digital Transformation | Scoop.it
New devices can pinpoint what floor you’re on, aiding rescue crews but setting off privacy groups’ alarms.
Farid Mheir's insight:

Cell phones can now be tracked inside buildings using barometric sensors. Great for 911 calls, it also raises a lot of privacy concerns.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Were 1.2 Billion Passwords Really Stolen? And Does It Matter? via @mashable

Were 1.2 Billion Passwords Really Stolen? And Does It Matter? via @mashable | WHY IT MATTERS: Digital Transformation | Scoop.it
The revelation that a Russian criminal gang stole more than 1.2 billion passwords have us asking if the hack was legitimate or if it even matters.
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Why privacy matters- why it is Paramount even if you’re “not doing anything you need to hide" via @TED

Why privacy matters- why it is Paramount even if you’re “not doing anything you need to hide" via @TED | WHY IT MATTERS: Digital Transformation | Scoop.it
Glenn Greenwald was one of the first reporters to see -- and write about -- the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide."
Farid Mheir's insight:

Amazing talk on the reasons why privacy is so important in the digital age. Listen until the end as I find the Q&A during the last 3 minutes may help you to see Snowden as a whistle blower rather than a traitor.


I was curious and dug the 2005 CNET article about the personal information that CNET has gathered on Eric Schmidt that Greenwald references in his talk.

http://cnet.co/1vTS5Uh


No comment yet.
Scooped by Farid Mheir
Scoop.it!

Edward Snowden: The Untold Story via @WIRED #mustread

Edward Snowden: The Untold Story via @WIRED #mustread | WHY IT MATTERS: Digital Transformation | Scoop.it
The message arrives on my “clean machine,” a MacBook Air loaded only with a sophisticated encryption package. “Change in plans,” my contact says. “Be in the lobby of the Hotel ______ by 1 pm. Bring a book and wait for ES to find you.”
Farid Mheir's insight:

A very good story that reveals some new information about what Snowden knows and has done. Very informative and well written.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Behind the huge cyberattack campaign in Latin America that no one has heard about via @qz

Behind the huge cyberattack campaign in Latin America that no one has heard about via @qz | WHY IT MATTERS: Digital Transformation | Scoop.it
For the past four years, a secret cyber-attack campaign, possibly state-sponsored, has been directed at several Latin American intelligence services, military, embassies and other government institutions. The Moscow-based cyber-security firm Kaspersky Lab, which claims to have unearthed the campaign, has given it a name: El Machete. According to Kaspersky, the attacks started in 2010. Its...
Farid Mheir's insight:

Interesting that cyber attacks are not a monopoly of USA, China and Russia, although they share similar features with the USA PRISM program and Israeli Flame and Stuxnet virus.


The Best Explanation Yet Of How The NSA's PRISM Surveillance Program Works http://sco.lt/8rWyDx


A world where everything is hackable via @Strata @acroll http://sco.lt/8pX85p


No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Data Brokers: Selling your personal information via @60minutes #mustsee

The Data Brokers: Selling your personal information via @60minutes #mustsee | WHY IT MATTERS: Digital Transformation | Scoop.it
Steve Kroft investigates the multibillion-dollar industry that collects, analyzes and sells the personal information of millions of Americans with virtually no oversight
Farid Mheir's insight:

A very well researched overview of the data privacy issues that we face online. The report exposes in very simple terms how your personal information is being collected as you browse the Internet.


More on this topic here

http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Privacy


And also a specific post I wrote a while back on the tool featured during the interview:

What is behavioural tracking? @gary_kovacs explains in 9min video: Tracking our online trackers via @TED #mustsee http://sco.lt/6nVELB


No comment yet.
Rescooped by Farid Mheir from visual data
Scoop.it!

Nicholas Felton Had 95,000 Conversations Last Year And Mapped Each One

Nicholas Felton Had 95,000 Conversations Last Year And Mapped Each One | WHY IT MATTERS: Digital Transformation | Scoop.it
Life quantification pioneer Nicholas Felton's latest annual report is his most ambitious to date.

For the last nine years, Nicholas Felton--who you may know best for inspiring the Facebook timeline or creating the life-logging app Reporter--has been recording some aspect of almost every moment of his life. And each year, he turns this data into a elegant, printed book that visualizes the year called The Feltron Report...


Via Lauren Moss
Farid Mheir's insight:

The Felton report is a beautiful peeping hole into someone's life when they start to quantify themselves. Focussed on fairly benign problem space - conversations during the year - it shows what possibilities, both good and bad, lie within the quantified-self movement which is bound to explode with the availability of Apple watch and others alike.


Of course it brings tremendous opportunities for monitoring someone's life in order to improve it. Whether it is by measuring exercice (as we do today with step trackers) or heart rate or glucose levels in order to improve health or medical diagnosis. In the context of business, organizations can monitor employees in order to minimize injuries or prevent illness and time loss due to sickness.


There is of course the dark side, where all this data, when made available without our consent or knowledge, can be used to track us and restrict our privacy or our rights. This is already happening in the contexte of government surveillance (ie. Edward Snowden http://sco.lt/5k4B29) or internet browsing tracking (ie. data brokers http://sco.lt/79yNZh)

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Latest #Snowden leak reveals the NSA intercepted and #bugged Cisco routers via @sarahgilbert @engadget

Latest #Snowden leak reveals the NSA intercepted and #bugged Cisco routers via @sarahgilbert @engadget | WHY IT MATTERS: Digital Transformation | Scoop.it
As promised, the release of Glenn Greenwald's new book, No Place to Hide, has brought plenty more Snowden leaks, and one document is particularly
Farid Mheir's insight:

Spying, just like in the movies! 

Also see

United States of Secrets- #mustWatch via @FRONTLINE http://sco.lt/6kuPfV

No comment yet.
Scooped by Farid Mheir
Scoop.it!

United States of Secrets- #mustWatch via @FRONTLINE

United States of Secrets- #mustWatch via @FRONTLINE | WHY IT MATTERS: Digital Transformation | Scoop.it
How did the government come to spy on millions of Americans?
Farid Mheir's insight:

I watched episode #1, can't wait to see episode #2. Must watch, very good summary of all things in digital spying since 9/11.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Blackphone's Ultrasecure Smartphone Adds Encryption and Plugs Data Leakage to Stop Snooping and Thwart Mass NSA Surveillance @TechReview

Blackphone's Ultrasecure Smartphone Adds Encryption and Plugs Data Leakage to Stop Snooping and Thwart Mass NSA Surveillance @TechReview | WHY IT MATTERS: Digital Transformation | Scoop.it
New models built with security and privacy in mind reflect the Zeitgeist of the Snowden era.
Farid Mheir's insight:

Read if you want to know more about the new blackphone and the encryption behind it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How to Disappear Online at WhoIsHostingThis.com

How to Disappear Online at WhoIsHostingThis.com | WHY IT MATTERS: Digital Transformation | Scoop.it
Have you ever wanted to disappear online? Simply vanish from the electronic realm? Read on to discover how to remove your private info from the Internet.
Farid Mheir's insight:

Very useful, if not complete, list of things to do to erase your life on the Internet. The post also has useful links to services that can partially automate the process.

No comment yet.
Rescooped by Farid Mheir from Cloud Central
Scoop.it!

Secure Cloud Computing: Virtualizing the FreedomBox- solutions for secure&private cloud computing

Secure Cloud Computing: Virtualizing the FreedomBox- solutions for secure&private cloud computing | WHY IT MATTERS: Digital Transformation | Scoop.it

In 2010 I asked Professor Eben Moglen to speak to the Internet Society of New York about software freedom, privacy and security in the context of cloud computing and social media. In his Freedom in the Cloud talk, he proposed the FreedomBox as a solution: a small inexpensive computer which would provide secure encrypted communications in a decentralized way to defeat data mining and surveillance by governments and large corporations.


Via Peter Azzopardi
Farid Mheir's insight:

Security and privacy concerns are top of mind for corporations and individuals looking to move their data to the cloud. This very technical story provides some insights into what may be offered in the future: fully encrypted data, as soon as it leaves the browser, with minimal overhead. Let's hope we can see this in commercial offerings soon.

Peter Azzopardi's curator insight, April 18, 2014 6:54 PM

Homomorphic encryption allows data to be processed in an encrypted form so that only the end user can access it in a readable form. So far it has been too demanding for normal computers to handle.

Scooped by Farid Mheir
Scoop.it!

Laws and Ethics Can’t Keep Pace with Technology via @Wadhwa @MIT @TechReview

Laws and Ethics Can’t Keep Pace with Technology via @Wadhwa @MIT @TechReview | WHY IT MATTERS: Digital Transformation | Scoop.it

Disruptive technology: A 1568 printing press. The technology brought social upheaval.


We haven’t come to grips with what is ethical, let alone with what the laws should be, in relation to technologies such as social media. Consider the question of privacy. Our laws date back to the late 19th century, when newspapers first started publishing personal information and Boston lawyer Samuel Warren objected to social gossip published about his family. This led his law partner, future U.S. Supreme Court Justice Louis Brandeis, to write the law review article “The Right of Privacy.” Their idea that there exists a right to be left alone, as there is a right to private property, became, arguably, the most famous law review article ever and laid the foundation of American privacy law.


The gaps in privacy laws have grown exponentially since then.

Farid Mheir's insight:

Provides interesting historical perspective -printing press, steam engine, etc.- to privacy and other related issues that technology - and digital transformation in particular - have exacerbated. 

No comment yet.
Rescooped by Farid Mheir from Information Technologies and Political Rights
Scoop.it!

#Syrian Web #Censorship Techniques Revealed via MIT @TechnologyReview

#Syrian Web #Censorship Techniques Revealed via MIT @TechnologyReview | WHY IT MATTERS: Digital Transformation | Scoop.it
Thanks to a leak of Syrian web censorship data, internet researchers have been able to analyse, for the first time, exactly what steps an authoritarian regime takes to restrict traffic.

Via Bob Boynton
Farid Mheir's insight:

I have not looked at the raw data or the report itself but I find interesting that 

- 98% of traffic goes through untouched

- the analysis does not raise the question of how much traffic was "inspected" or looked at


Bob Boynton's curator insight, February 25, 2014 9:31 AM

Censorship -- how Syria did it.

Scooped by Farid Mheir
Scoop.it!

Major Online Marketplace Silk Road Hacked — Someone Stole All Its Bitcoins via @bi

Major Online Marketplace Silk Road Hacked — Someone Stole All Its Bitcoins via @bi | WHY IT MATTERS: Digital Transformation | Scoop.it
They plan to rebuild and change the way money moves from buyer to seller.
Farid Mheir's insight:

Bitcoins remain a risky proposition, we all know that. What this event provides is how much attention bitcoin have received - and speculation - in a world where there are no rules. No government regulation, just "code of conduct" from its users. 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Bedtime Stories: Learning from Sleep Data- from #jawbone #StrataConf 2014 via @mrogati

Bedtime Stories: Learning from Sleep Data- from #jawbone #StrataConf 2014 via @mrogati | WHY IT MATTERS: Digital Transformation | Scoop.it
We optimize ads, but not our mood. We know more about our tweets than our own bodies. That's all about to change. As wearables transform the 'quantified self' from a niche to a mainstream market, they are generating vast amounts of data about our health, habits, and lifestyles
Farid Mheir's insight:

Fascinating insight that companies such as jawbone can derive from the trove of data that is captured by their wearable devices such as the UP bracelet. I've been wearing a fitbit for 3 months now and the sleep data is to me one of the most fascinating because it represents information that I did not have before (as oppposed to number of steps for example).


What I find interesting with Monica's work at jawbone is the anlaysis they've done over 50M nights of sleep and the kind of analysis that is expressed in the chart here. Wow, just so very insightful and useful. I'd love to be able to get insight on how I compare with similar people. And maybe one day get suggestion to improve my sleep.


Of course, privacy is Paramount. I found that my sleep patterns are very personal and that I would not want them to become public. Something to consider and enforce at all costs.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Meet Blackphone, a privacy-centric handset from some serious security veterans Via @gigaom

Meet Blackphone, a privacy-centric handset from some serious security veterans Via @gigaom | WHY IT MATTERS: Digital Transformation | Scoop.it
The device uses a secure version of Android and, judging by the pedigree of the team, it looks like a credible package for those seeking private communications.
Farid Mheir's insight:

This phone is not yet available and should be announced soon. Yet it offers a glimpse into the future: you want privacy, you'll have to pay for it. Otherwise they'll be plenty of free or subsidised phones to choose from.

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/