Adam Greenberg reports: People spend a lot of time concerned about getting their information off the internet and out of the hands of organizations that collect it, but the concept of obfuscation – injecting false, misleading and ambiguous data – can be an equally effective privacy tactic. At hacker conference HOPE X, which kicked off…
Category: Misc
No silver bullet: De-identification still doesn’t work
Arvind Narayanan and Edward W. Felten write: Paul Ohm’s 2009 article “Broken Promises of Privacy” spurred a debate in legal and policy circles on the appropriate response to computer science research on re-identification.1 In this debate, the empirical research has often been misunderstood or misrepresented. A new report by Ann Cavoukian and Daniel Castro is full of such…
CO: Drone Crashes In Brighton Man’s Backyard
CBS in Denver reports: A drone crashed into a Brighton man’s backyard and now the homeowner wants answers. George Ray said the drone had a GoPro camera mounted on it and was videotaping over his property located off Interstate 76 near 136th Ave. early this morning. Ray said he heard a strange sound outside his…
A Study of Whois Privacy and Proxy Service Abuse
Richard Clayton writes: Long time readers will recall that last year ICANN published the draft report of our study into the abuse of privacy and proxy services when registering domain names. At WEIS 2014 I will present our academic paper summarising what we have found — and the summary (as the slides for the talk indicate) is very straightforward: when criminals register domain names…