The importance of deleting old stuff—another lesson from the Sony attack

Saving data, especially e-mail and informal chats, is a liability.

It’s also a security risk: the risk of exposure. The exposure could be accidental. It could be the result of data theft, as happened to Sony. Or it could be the result of litigation. Whatever the reason, the best security against these eventualities is not to have the data in the first place.

via The importance of deleting old stuff—another lesson from the Sony attack | Ars Technica.

Vigilant Solutions National Vehicle Location Service

The largest pool of data is that harvested by Vigilant from commercial sources, most notably, Vigilant’s subsidiary, DRN (Digital Recognition Network). This pool of LPR data totals over 1.8 billion detections and grows at a rate of almost 70 million per month. This data is available via an annual subscription and greatly enhances an agency’s investigative reach.

via Vigilant Solutions National Vehicle Location Service.

The IRS uses computers?! The horror!

It’s impossible to imagine the Internal Revenue Service or most other number-crunching agencies or companies working without computers. But when the IRS went to computers — the Automatic Data Processing system –there was an uproar. The agency went so far as to produce a short film on the topic called Right On The Button, to convince the public computers were a good thing.

via The IRS uses computers?! The horror!.

What happens to the posts you don’t publish?

This paternalistic view isn’t abstract. Facebook studies this because the more its engineers understand about self-censorship, the more precisely they can fine-tune their system to minimize self-censorship’s prevalence. This goal—designing Facebook to decrease self-censorship—is explicit in the paper.

So Facebook considers your thoughtful discretion about what to post as bad, because it withholds value from Facebook and from other users. Facebook monitors those unposted thoughts to better understand them, in order to build a system that minimizes this deliberate behavior.

via Facebook self-censorship: What happens to the posts you don’t publish?.

Motorola Is Listening

Most subsequent connectivity to both services (other than downloading images) is proxied through Motorola’s system on the internet using unencrypted HTTP, so Motorola and anyone running a network capture can easily see who your friends/contacts are (including your friends’ email addresses), what posts you’re reading and writing, and so on. They’ll also get a list of which images you’re viewing, even though the actual image download comes directly from the source.

via Motorola Is Listening – Projects – Beneath the Waves.