I don't know why people are obsessed with snooping through phones.

Dude, what do you expect to find? And if you think there’s something going on, why not leave the relationship beforehand? All these “switch phones or go through their phone to see if they’re honest" shit is stupid. I basically hear, “I think you’re cheating, so I’m going to betray your privacy to find out.” Um, no. You thinking I’m doing something and going through my phone to confirm it means there’s some shit you need to fix with yourself. Not that I’m hiding shit. Who the fuck taught you this shit?!

Respect People’s Fucking Privacy

Okay so I just saw a post which started a long string of thoughts that I need to get out//

1) to get it out of the way, Valentine’s Day is coming up.  Some idiot is gonna reblog a link to the V-Day Video. If you actually give a shit about Dan and Phil, you won’t click through.

2) DON’T FUCKING POST DAN’S OLD PHOTOBOOTH PICTURES// he has said on multiple occasions that he’s not proud of those and wishes that people who call themselves his fans wouldn’t keep on posting them.

3) leave Adrian the fuck alone// I know we mostly have because of the huge blowup, but also, why are there even pictures of him and Dan from 2008? Why do we have those?  They weren’t given to us by Dan or Adrian, someone did some stalking, found personal photos, and posted them on social media.  this leads to 

4) Don’t fucking stalk people! I wouldn’t want anyone posting pictures of me from seven years ago that I hadn’t willingly released to the public, and probably neither does anyone.  Think about what you’d be okay with someone doing to you if you were in Dan or Phil, or any other famous person’s shoes.  It shouldn’t be “a risk of being famous” that your fans will stalk you and post old and embarrassing photos of you.  That’s the fans going way past a line.

Rant over.

You are not what you read: librarians purge user data to protect privacy

Last week, with little fanfare, the Graduate Center at the City University of New York did something very few private companies would ever do to protect its users’ privacy: it quietly began to purge its interlibrary loan records.

“This policy change is motivated by the idea that libraries should not keep more information about their users’ requests than necessary,” wrote Beth Posner, head of library resource sharing at the school.

Recently, it’s become more common to try to force librarians to turn over user information and compel their silence simultaneously.

As use of the law to acquire patron records since the Patriot Act has increased, librarians have become some of the US’s foremost experimenters in data security. Now they’re doing something even the most security-conscious private firm would never dream of (but have often been encouraged to do by security experts): purging sensitive information in order to protect their users.

Read More

After the June 2013 National Security Agency leaks by Edward Snowden revealing the U.S. government’s surveillance of Americans’ online and phone communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. This is what we learned: 

- 91% of adults agree or strongly agree that consumers have lost control of how personal information is collected and used by companies.
- 86% of internet users have taken steps online to remove or mask their digital footprints, but young adults are more focused on online privacy than their elders.
- 52% of Americans describe themselves as “very concerned” or “somewhat concerned” about government surveillance of data and electronic communications, compared with 46% who are “not very concerned” or “not at all concerned.”

For more: The state of privacy in America: What we learned

How to Protect Your Online Privacy Post CISA - Cybersecurity Information Sharing Act of 2015

CISA — or the Cybersecurity Information Sharing Act of 2015 (PDF) — was originally introduced to the senate in July 2014, but it did not pass. The goal of the bill was to allow companies to share information with the government and related agencies that would otherwise remain protected and private.

Many advocates of the bill touted its importance for the future of cyber security. Those who oppose it believe it’s too vague and will allow the government to legally acquire personal information from those with no terrorist or unscrupulous ties. More specifically, the bill would allow select parties to gather personal and private data including internet browsing habits, web search history, regular activity and much more without a warrant.



Can you spot the suspicious behavior? Ester Hovers’ images in False Positives emulate the actions so-called smart cameras would deem “deviant behavior.” Connected to highly sophisticated software, these cameras can, among other things, detect abnormal activity like a person leaving a package or backpack on a busy street corner and alert the authorities. This, of course, prompts all kinds of conversations about privacy, security, and control. Hover hopes to contribute to the discussion.

“[The project] aims to raise questions about deviant and normal behavior within public space,” Hovers says.

 Check out more photos and read about Hover’s project.

10 anti-surveillance tools that protect your privacy online:

In 2016, the future of the Internet is up for debate.

From Washington to Paris to Beijing, the world’s governments and its richest companies are deciding the laws and code that will shape the rules of privacy and surveillance in cyberspace for the foreseeable future.

You can take some control with a small bag of privacy tools that allows you more freedom on the Web.

The FBI has a lead. A prominent religious leader and community advocate is in contact with a suspected sleeper agent of foreign radicals. The attorney general is briefed and personally approves wiretaps of his home and offices. The man was born in the United States, the son of a popular cleric. Even though he’s an American citizen, he’s placed on a watchlist to be summarily detained in the event of a national emergency. Of all similar suspects, the head of FBI domestic intelligence thinks he’s “the most dangerous,” at least “from the standpoint of … national security.”

Is this a lone wolf in league with foreign sponsors of terrorism? No: This was the life of Martin Luther King Jr. That FBI assessment was dated Aug. 30, 1963—two days after King told our country that he had a dream.

Throughout the United States—outside private houses, apartment complexes, shopping centers, and businesses with large employee parking lots—a private corporation, Vigilant Solutions, is taking photos of cars and trucks with its vast network of unobtrusive cameras. It retains location data on each of those pictures, and sells it.

It’s happening right now in nearly every major American city.

The company has taken roughly 2.2 billion license-plate photos to date. Each month, it captures and permanently stores about 80 million additional geotagged images. They may well have photographed your license plate. As a result, your whereabouts at given moments in the past are permanently stored. Vigilant Solutions profits by selling access to this data (and tries to safeguard it against hackers). Your diminished privacy is their product. And the police are their customers.

Finnish startup Zyptonite brings privacy to video calls
Zyptonite challenges tech giants on fast, free and anonymous video calls.

Born out of frustration with unreliable, insecure video calling services, Zyptonite believes it has found a better way.

Keeping touch with family and friends abroad has never been easier. Unfortunately it also often goes hand-in-hand with pixelated video image and muffled sound. These are exactly the issues new technology startup Zyptonite promises to put to rest.

Read the rest here

The Internet adage that ‘if it’s free you’re the product’ applies by degrees here. Pew’s researchers sketched out a range different scenarios to survey participants, to test their risk-benefit calculations and attitudes around sharing, and — unsurprisingly — a spectrum of responses was the result.

“A phrase that summarizes their attitudes is, ‘It depends’,” writes report author Lee Rainie, director of Internet, Science, and Technology research at Pew Research Center. “Most are likely to consider options on a case-by-case basis, rather than apply hard-and-fast privacy rules.”

Read the key takeaway here.