Categories
General

Who Watches the Watchmaker?

In other words, as human behavior is tracked and merchandized on a massive scale, the Internet of Things creates the perfect conditions to bolster and expand the surveillance state. In the world of the Internet of Things, your car, your heating system, your refrigerator, your fitness apps, your credit card, your television set, your window shades, your scale, your medications, your camera, your heart rate monitor, your electric toothbrush, and your washing machine — to say nothing of your phone — generate a continuous stream of data that resides largely out of reach of the individual but not of those willing to pay for it or in other ways commandeer it.

The Creepy New Wave of the Internet

One of the premises of the speculative future in William Gibson’s The Peripheral is that only wealth and power afford privacy. It’s a future I’d rather not see realized.

Categories
Design

Mike Monteiro at Webstock

How Designers Destroyed the World

Categories
Browsers

The SMC

As James Risen and Nick Wingfield reported yesterday in the New York Times, the interests of tech companies and the NSA have been converging over the past decade in two ways. The first way is fairly prosaic: Lots of Silicon Valley companies are in the business of selling stuff to the NSA: storage hardware, sophisticated communications equipment, data analytics software, and more. But while this may have increased recently, it’s not fundamentally new. It’s just the latest high-tech twist on the good old military-industrial complex.

— Kevin Drum: The Surveillance-Marketing Complex, Coming Soon to a Computer Near You

Before you visit that or any other site, you might want to install Ghostery to block all the tracking beacons.

Categories
Design

Designing for Humankind

It may be harder to design a slick user experience if we expose the workings of a device, but advocating transparency is about designing a good experience for humankind, not just a single user. It demonstrates an ethical, holistic mindset that’s becoming ever more important as technology becomes central to people’s lives.

— Cennydd Bowles: On Changing the World

Categories
General

He Is Us

If we the people don’t consider our own privacy terribly valuable, we cannot count on government — with its many legitimate worries about law-breaking and security — to guard it for us.

Alex Kozinski: The Dead Past

Categories
Apple iOS

Ransack Your Way to Success!

It all started innocently enough. I was thinking of implementing a Path Mac OS X app as part of our regularly scheduled hackathon. Using the awesome mitmproxy tool which was featured on the front page of Hacker News yesterday, I started to observe the various API calls made to Path’s servers from the iPhone app. It all seemed harmless enough until I observed a POST request to https://api.path.com/3/contacts/add.

Arun Thampi: Path uploads your entire iPhone address book to its servers

Like location, I assume iOS will eventually require user permission for apps to access contact info. That Path was approved with such unethical functionality (that also appears to be a flagrant violation of the review guidelines) should be a reminder that the scrutiny given to apps is inconsistent and you cannot assume that because the App Store℠®™© (or any app store) is a walled garden, apps within are respectful of you.

Categories
Design

Sociopathy

We have a name for the kind of person who collects a detailed, permanent dossier on everyone they interact with, with the intent of using it to manipulate others for personal advantage — we call that person a sociopath.

Maciej Ceglowski: The Social Graph is Neither