You can’t protect your privacy if you don’t know how it’s being violated. That’s the essence of a report by the Electronic Frontier Foundation that shines a bright disinfecting light on how corporations are collecting data on consumers. Think Facebook-like data collection on steroids and you begin to grasp the scope of the problem. “I think on mobile, we’re still in this Wild West Era where people don’t understand the kind of tracking that’s happening when they use apps on their phone,”Bennett Cyphers with the Electronic Frontier Foundation (EFF) told Threatpost. “And there aren’t really a lot of ways to rein it in either, even if you do know what’s happening.” Threatpost caught up with Cyphers for a podcast (see below) to better understand his 17,300-word in-depth report “Behind the One-Way Mirror“. In his overview with Threatpost he discusses the “identifiers” behind data collection – the ways that companies identify consumers who they’re collecting the data from. Cyphers notes that consumers and regulators are struggling to understand who is collecting data, how that data is being shared and how it’s being stored. Identifiers, he said, are part of a new corporate surveillance state that includes mobile and physical tracking via “invisible pixel images, browser fingerprinting, social widgets, mobile tracking, and face recognition [that] companies employ to collect information about who we are, what we like, where we go, and who our friends are.” Unfortunately, according…
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-12-04 09:00:002019-12-04 09:00:00EFF Talks the Corporate Surveillance of Consumers
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email firstname.lastname@example.org