{"id":4110,"date":"2022-10-28T22:49:50","date_gmt":"2022-10-28T22:49:50","guid":{"rendered":"https:\/\/2024.thenexus.today\/index.php\/2022\/10\/28\/privacy-news-october-28\/"},"modified":"2022-10-28T22:49:50","modified_gmt":"2022-10-28T22:49:50","slug":"privacy-news-october-28","status":"publish","type":"post","link":"https:\/\/2024.thenexus.today\/index.php\/2022\/10\/28\/privacy-news-october-28\/","title":{"rendered":"Privacy News: October 28"},"content":{"rendered":"<blockquote><p>In case you haven&#8217;t heard, there&#8217;s a new Chief Twit. \u00a0His other company is known for <a href=\"https:\/\/www.reuters.com\/business\/autos-transportation\/tesla-hit-by-new-lawsuit-alleging-racial-abuse-against-black-workers-2022-07-01\/\">racial abuse of Black workers<\/a> and <a href=\"https:\/\/hypebeast.com\/2022\/5\/tesla-recalls-130000-vehicles-software-bug\">software bugs<\/a>, and as soon has he took over he fired Vijaya Gadde, the widely-respected head of Trust &amp; Safety. \u00a0What could possibly go wrong?<\/p>\n<p>\u2013 <a href=\"__GHOST_URL__\/a-new-chief-twit-and-a-big-twitter-privacy-issue\/\">A new Chief Twit &#8211; and a big Twitter privacy issue<\/a><\/p><\/blockquote>\n<p>Privacy&#8217;s only one of the many reasons the Twitter acquisition&#8217;s a big deal. Unfortunately, most of the articles I&#8217;ve read mostly provide a fairly limited range of perspectives. \u00a0As Andre Brock <a href=\"https:\/\/twitter.com\/DocDre\/status\/1586106272356892673\">says<\/a>, &#8220;Black Twitter\u2019s dominance over the platform has a LOT to do with how many tech pundits\/liberal voices on here see Twitter as a \u2018hell site\u2019.&#8221; \u00a0<a href=\"https:\/\/twitter.com\/i\/events\/1586034951480553473\">I&#8217;ve collected a bunch of other reactions in a Twitter moment<\/a>.<\/p>\n<h3 id=\"what-happens-to-your-twitter-data-when-elon-takes-over\"><a href=\"https:\/\/www.vox.com\/recode\/2022\/10\/27\/23427106\/elon-musk-twitter-data-direct-messages\">What happens to your Twitter data when Elon takes over<\/a><\/h3>\n<p>Sara Morrison on Vox (vox.com)<\/p>\n<p>That said, privacy&#8217;s certainly a big concern! Morrison notes that Twitter doesn&#8217;t really allow you to delete data, observes that the new owner \u2013 or whoever he designates \u2013 could certainly get at private direct messages if they wanted to. And that&#8217;s not the only threat; firing Gadde is likely to lead to a lot of other departures from Twitter&#8217;s security team, so it&#8217;s prime opportunity for intelligence agencies, organized crime, or teenagers to get access to data.<\/p>\n<p>For somebody like me, this isn&#8217;t a big deal. I&#8217;ve said a few things in DMs that might be a bit embarassing if they were public, but nothing that would put me or anybody else at risk. \u00a0But think about whistleblowers or activists who have shared information with journalists or other activists in Twitter DMs \u2013 and some of the new Chief Twit&#8217;s statements that certainly make it seem like he&#8217;s sucking up to countries like Russia and China.<\/p>\n<h3 id=\"how-to-run-a-small-social-network-site-for-your-friends\"><a href=\"https:\/\/runyourown.social\">How to run a small social network site for your friends<\/a><\/h3>\n<p>Darius Kazemi on runyourown.social<\/p>\n<p>As people consider moving off Twitter, it&#8217;s worth thinking about setting up your own small social network. \u00a0Kazemi&#8217;s excellent overview lays out some general principles of running a small social network site, focusing more on community building more than they are related to specific technologies. <\/p>\n<blockquote><p>Running a social network site is community building first and a technical task second.<\/p>\n<p>And while community building is hard work, it&#8217;s often worth it.<\/p>\n<p>This is my pitch to you: using big social media sites is easy, but you pay a steep price for it. You should consider running your own site, which is harder, but can be extremely rewarding.<\/p><\/blockquote>\n<h2 id=\"privacy-after-roe\">Privacy after Roe<\/h2>\n<h3><\/h3>\n<h3 id=\"how-the-tech-sector-can-protect-personal-data-post-roe\"><a href=\"https:\/\/brookings.edu\/techstream\/how-tech-firms-can-protect-personal-data-after-roe-us-privacy-abortion-surveillance\">How the tech sector can protect personal data post-Roe<\/a><\/h3>\n<p>Jordan Famularo and Richmond Wong on Brookings (brookings.edu)<\/p>\n<p>Steps the tech sector should take to prevent the misuse of data in abortion-related cases.<\/p>\n<h3 id=\"dhs-agents-monitored-twitter-after-roe-decision-foia-shows\"><a href=\"https:\/\/bloomberg.com\/news\/newsletters\/2022-10-26\/dhs-agents-monitored-twitter-after-roe-decision-foia-shows\">DHS Agents Monitored Twitter After Roe Decision, FOIA Shows<\/a><\/h3>\n<p>Jack Gillum on bloomberg.com<\/p>\n<p>In the hours after the US Supreme Court overturned Roe v. Wade, federal authorities were monitoring social media to gather intelligence about nationwide protests and possible violence. <\/p>\n<h3 id=\"cracking-down-on-federal-aid-for-reproductive-health-surveillance-fusion-centers\"><a href=\"https:\/\/cdt.org\/insights\/cracking-down-on-federal-aid-for-reproductive-health-surveillance-fusion-centers\">Cracking Down on Federal Aid for Reproductive Health Surveillance: Fusion Centers<\/a><\/h3>\n<p>Jake Laperruque on Center for Democracy and Technology (cdt.org)<\/p>\n<p>Fusion centers are law enforcement hubs that stockpile and share data to aid state and local investigations. <a href=\"https:\/\/www.hsgac.senate.gov\/imo\/media\/doc\/Testimony-Sena-2021-05-18.pdf\">At least 80<\/a> fusion centers operate <a href=\"https:\/\/www.dhs.gov\/fusion-center-locations-and-contact-information\">across the country<\/a>, with at least one in each state. They are owned and operated by the states and <a href=\"https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/2018_national_network_of_fusion_centers_final_report.pdf\">nearly all<\/a> staff at facilities are from state and local agencies. However, fusion centers significantly rely on the federal government, which can leverage that reliance to ensure that its assistance is not used to facilitate abortion-related investigations.<\/p>\n<p>This is one of a series of blog posts examining how the federal government could prevent federal surveillance assistance to state and local law enforcement from being used to investigate and prosecute reproductive health care choices. \u00a0Other posts examined <a href=\"https:\/\/cdt.org\/insights\/cracking-down-on-federal-aid-for-reproductive-health-surveillance-regional-computer-forensic-labs\/\">Regional Computer Forensic Laboratories<\/a>, the <a href=\"https:\/\/cdt.org\/insights\/cracking-down-on-federal-aid-for-reproductive-health-surveillance-the-national-domestic-communications-assistance-center\/\">National Domestic Computer Assistance Center<\/a>, and <a href=\"https:\/\/cdt.org\/insights\/cracking-down-on-federal-aid-for-reproductive-health-surveillance-the-computer-analysis-response-team\/\">The Computer Analysis Response Team<\/a>.<\/p>\n<h2 id=\"automated-decision-systems\">Automated decision systems<\/h2>\n<h4 id=\"regulating-the-risks-of-ai\"><a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4195066\">Regulating the Risks of AI<\/a><\/h4>\n<p>Margot E. Kaminski on Social Studies Research Network (papers.ssrn.com)<\/p>\n<p>From the abstract:<\/p>\n<blockquote><p>Companies and governments now use Artificial Intelligence (AI) in a wide range of settings. But using AI leads to well-known risks\u2014that is, not yet realized future harms that arguably present challenges for a traditional liability model. It is thus unsurprising that lawmakers in both the United States and the European Union (EU) have turned to the tools of risk regulation for governing AI systems. <\/p>\n<p>This Article observes that constructing AI harms as risks is a choice with consequences. Risk regulation comes with its own policy baggage: a set of tools and troubles that have emerged in other fields. Moreover, there are at least four models for risk regulation, each with both overlapping and divergent goals and methods. Emerging conflicts over AI risk regulation illustrate the tensions that emerge when regulators employ one model of risk regulation, while stakeholders call for another.<\/p><\/blockquote>\n<h2 id=\"and\">And &#8230;<\/h2>\n<h4 id=\"iran%E2%80%99s-secret-manual-for-tracking-and-controlling-protesters%E2%80%99-mobile-phones\"><a href=\"https:\/\/theintercept.com\/2022\/10\/28\/iran-protests-phone-surveillance\">Iran\u2019s Secret Manual for Tracking and Controlling Protesters\u2019 Mobile Phones<\/a><\/h4>\n<p>Sam Biddle on The Intercept (theintercept.com)<\/p>\n<p>The documents provide an inside look at an Iranian government program that lets authorities monitor and manipulate people\u2019s phones.<\/p>\n<h4 id=\"on-protecting-intimate-privacy-a-chat-with-danielle-citron\"><a href=\"https:\/\/iapp.org\/news\/a\/on-protecting-intimate-privacy-a-chat-with-danielle-citron\">On protecting intimate privacy: A chat with Danielle Citron<\/a><\/h4>\n<p>on International Association of Privacy Professionals (iapp.org)<\/p>\n<p>The IAPP\u2019s Jedidiah Bracy interviews Danielle Citron about her new book \u201cThe Fight for Privacy: Protecting Dignity, Identity and Love in the Digital Age.\u201d<\/p>\n<h4 id=\"children%E2%80%99s-data-stolen-by-medibank-hacker-company-confirms\"><a href=\"https:\/\/abc.net.au\/news\/science\/2022-10-28\/medibank-data-breach-children-caught-up-privacy-concerns\/101584376\">Children\u2019s data stolen by Medibank hacker, company confirms<\/a><\/h4>\n<p>Ariel Bogle on ABC News (abc.net.au)<\/p>\n<p>While adults are also at risk of scams or stigma due to the disclosure of health records, children are a special case \u2014 particularly because they don\u2019t always get a say about what carers sign them up for or share, experts say.<\/p>\n<h4 id=\"amazon-accidentally-exposed-an-internal-server-packed-with-prime-video-viewing-habits\"><a href=\"https:\/\/techcrunch.com\/2022\/10\/27\/amazon-prime-video-server-exposed\">Amazon accidentally exposed an internal server packed with Prime Video viewing habits<\/a><\/h4>\n<p>Zack Whittaker on TechCrunch (techcrunch.com)<\/p>\n<p>The server, which Amazon took offline, was not protected with a password.<\/p>\n<h4 id=\"download-the-smart-city-pdx-digital-justice-and-surveillance-technologies-zine-%E2%80%94-news\"><a href=\"https:\/\/smartcitypdx.com\/news\/2022\/10\/21\/download-the-smart-city-pdx-digital-justice-and-surveillance-technologies-zine\">Download the Smart City PDX Digital Justice and Surveillance Technologies Zine \u2014 News<\/a><\/h4>\n<p>Hector Dominguez on Smart City PDX (smartcitypdx.com)<\/p>\n<p>This Zine is an educational material to learn more about surveillance technologies and Digital Justice. e Smart City PDX<\/p>\n<h4 id=\"an-unrepresentative-democracy-how-disinformation-and-online-abuse-hinder-women-of-color-political-candidates-in-the-united-states\"><a href=\"https:\/\/cdt.org\/insights\/an-unrepresentative-democracy-how-disinformation-and-online-abuse-hinder-women-of-color-political-candidates-in-the-united-states\">An Unrepresentative Democracy: How Disinformation and Online Abuse Hinder Women of Color Political Candidates in the United States<\/a><\/h4>\n<p>Dhanaraj Thakur, DeVan Hankerson Madrigal on Center for Democracy and Technology (cdt.org)<\/p>\n<p>Executive Summary In a press interview, former Vermont state house representative Kiah Morris said she reported at least 26 incidents to the local police where she and her family felt threatened between 2016 and 2018. The severity of the targeted abuse both on and offline ultimately led Rep. Morris\u2026<\/p>\n<h4 id=\"tabling-of-the-national-security-and-intelligence-review-agency%E2%80%99s-annual-report-2021\"><a href=\"https:\/\/nsira-ossnr.gc.ca\/tabling-of-the-national-security-and-intelligence-review-agencys-annual-report-2021\">Tabling of the National Security and Intelligence Review Agency\u2019s Annual Report 2021<\/a><\/h4>\n<p>NSIRA (nsira-ossnr.gc.ca)<\/p>\n<h4 id=\"the-tiktok-settlement-is-real-and-you-can-get-money-from-it\"><a href=\"https:\/\/mashable.com\/article\/tiktok-data-privacy-settlement-payouts\">The TikTok settlement is real, and you can get money from it<\/a><\/h4>\n<p>Mike Pearl on Mashable (mashable.com)<\/p>\n<p>In fact, you might have already gotten paid.<\/p>\n<h4 id=\"new-infographic-highlights-xr-technology-data-flows-and-privacy-risks\"><a href=\"https:\/\/fpf.org\/blog\/new-infographic-highlights-xr-technology-data-flows-and-privacy-risks\">New Infographic Highlights XR Technology Data Flows and Privacy Risks<\/a><\/h4>\n<p>Future of Privacy Forum (fpf.org)<\/p>\n<p>As businesses increasingly develop and adopt extended reality (XR) technologies, including virtual (VR), mixed (MR), and augmented (AR) reality, the urgency to consider potential privacy and data protection risks to users and bystanders grows. Lawmakers, regulators, and other experts are increasingl\u2026<\/p>\n<h4 id=\"%E2%80%8Edismantling-injustice-history-future-of-racialized-surveillance\"><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/history-future-of-racialized-surveillance\/id1553476491?i=1000583682173\">\u200eDismantling Injustice: History &amp; Future of Racialized Surveillance <\/a><\/h4>\n<p>Rumsha Sajid and Danny Cendejas on Apple Podcasts (podcasts.apple.com)<\/p>\n<p>From a growing culture of deputized surveillance, to shows like \u201cRing Nation,\u201d surveillance is evolving with us. Two deeply experienced organizers working at MediaJustice discuss the historic roots of present day surveillance\u2014colonialism and slavery\u2014and the continued disproportionate impact that surveillance has on communities of color.<\/p>\n<h4 id=\"bain-capital-crypto-leads-33m-round-for-privacy-focused-identity-protocol\"><a href=\"https:\/\/coindesk.com\/business\/2022\/10\/27\/bain-capital-crypto-leads-33m-round-for-privacy-focused-identity-protocol\">Bain Capital Crypto Leads $3.3M Round for Privacy-Focused Identity Protocol<\/a><\/h4>\n<p>Brandy Betz on CoinDesk (coindesk.com)<\/p>\n<p>Notebook Labs aims to accelerate DeFi adoption with its crypto identity protocol.<\/p>\n<h4 id=\"privacy-regulators-call-for-adequate-privacy-protections\"><a href=\"https:\/\/yukon-news.com\/news\/privacy-regulators-call-for-adequate-privacy-protections\">Privacy regulators call for adequate privacy protections<\/a><\/h4>\n<p>Dana Hatherly on Yukon News (yukon-news.com)<\/p>\n<p>Jason Pedlar of the Yukon is among those federal, provincial and territorial privacy regulators<\/p>\n<h4 id=\"cartoon-privacy-law-frankenstein\"><a href=\"https:\/\/teachprivacy.com\/cartoon-privacy-law-frankenstein\">Cartoon: Privacy Law Frankenstein<\/a><\/h4>\n<p>Daniel Solove on TeachPrivacy (teachprivacy.com)<\/p>\n<p>Prof Solove\u2019s new Halloween cartoon &#8211; Privacy Law Frankenstein &#8211; involving the multitude of different privacy laws in the United States.<\/p>\n<h4 id=\"tiktok-accused-of-plotting-to-track-specific-us-citizens\"><a href=\"https:\/\/theregister.com\/2022\/10\/21\/tiktok_spying_allegations_bytedance\">TikTok accused of plotting to track specific US citizens<\/a><\/h4>\n<p>Brandon Vigliarolo on The Register (theregister.com)<\/p>\n<p>China-owned boredom-killing biz issues precision-engineered denial<\/p>\n<h4 id=\"the-current-state-of-general-state-privacy-laws\"><a href=\"https:\/\/jdsupra.com\/legalnews\/the-current-state-of-general-state-4915876\">The Current State of General State Privacy Laws<\/a><\/h4>\n<p>John Pavolotsky on JD Supra (jdsupra.com)<\/p>\n<p>It\u2019s a great time to be a privacy attorney. <\/p>\n<h4 id=\"uk-watchdog-warns-against-ai-for-emotional-analysis-dubs-%E2%80%98immature%E2%80%99-biometrics-a-bias-risk\"><a href=\"https:\/\/techcrunch.com\/2022\/10\/26\/no-to-voight-kampff-tests\">UK watchdog warns against AI for emotional analysis, dubs \u2018immature\u2019 biometrics a bias risk<\/a><\/h4>\n<p>Natasha Lomas on TechCrunch (techcrunch.com)<\/p>\n<p>The UK privacy watchdog has warned against use of \u201cemotion analysis\u201d technologies, saying \u201cimmature\u201d biometrics pose a discrimination risk.<\/p>\n<h4 id=\"apple-executives-say-privacy-controls-and-advertising-can-coexist\"><a href=\"https:\/\/livemint.com\/technology\/tech-news\/apple-executives-say-privacy-controls-and-advertising-can-coexist-11666790675455.html\">Apple executives say privacy controls and advertising can coexist<\/a><\/h4>\n<p>WSJ on mint (livemint.com)<\/p>\n<p>The iPhone maker plans to comply with new EU mandate governing how devices must be charged<\/p>\n<h4 id=\"biometric-privacy-trial-is-a-milestone-in-privacy-law\"><a href=\"https:\/\/jdsupra.com\/legalnews\/biometric-privacy-trial-is-a-milestone-4493147\">Biometric Privacy Trial Is a Milestone in Privacy Law<\/a><\/h4>\n<p>Elizabeth Burgin Waller on JD Supra (jdsupra.com)<\/p>\n<p>Generally, biometric privacy laws seek to protect the unique attributes of human beings that could be leveraged to access sensitive information about&#8230;<\/p>\n<h4 id=\"view-of-data-and-the-good\"><a href=\"https:\/\/ojs.library.queensu.ca\/index.php\/surveillance-and-society\/article\/view\/15764\/10281\">View of Data and the Good?<\/a><\/h4>\n<p>Daniel Susser on ojs.library.queensu.ca<\/p>\n<p>The abstract:<\/p>\n<blockquote><p>Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new \u201csociotechnical imaginaries,\u201dnew understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry\u2019s own vision for the future.<\/p><\/blockquote>\n<h4 id=\"where-did-all-the-%E2%80%9Creject%E2%80%9D-buttons-come-from\"><a href=\"https:\/\/noyb.eu\/en\/where-did-all-reject-buttons-come\">Where did all the \u201creject\u201d buttons come from?!<\/a><\/h4>\n<p>on noyb.eu (noyb.eu)<\/p>\n<p>More and more websites have added an option to say \u201cno\u201d to cookies and other tracking- as foreseen by the GDPR. Where did this trend come from?<\/p>\n<h4 id=\"courts-recognize-constitutional-harms-from-invasive-school-surveillance\"><a href=\"https:\/\/cdt.org\/insights\/courts-recognize-constitutional-harms-from-invasive-school-surveillance\">Courts Recognize Constitutional Harms from Invasive School Surveillance<\/a><\/h4>\n<p>Cody Venzke on Center for Democracy and Technology (cdt.org)<\/p>\n<p>This fall, a federal trial court in Ohio ruled that certain uses of remote proctoring violate students\u2019 right to be free from unreasonable searches under the Fourth Amendment. The court recognized that some aspects of remote proctoring technology intrude on the \u201ccore places\u201d where society recognizes\u2026<\/p>\n<h4 id=\"metaverse-privacy-concerns-and-how-to-address-them\"><a href=\"https:\/\/techtarget.com\/searchcio\/tip\/Metaverse-privacy-concerns-and-how-to-address-them\">Metaverse Privacy Concerns and How to Address Them<\/a><\/h4>\n<p>Ashwin Krishnan, on TechTarget (techtarget.com)<\/p>\n<p>Metaverse privacy is a moving target. Learn about the main data privacy concerns the metaverse poses and how to mitigate them.<\/p>\n<h4 id=\"buying-police-scanners-should-not-be-an-easy-decisionprivacy-rights-are-an-issue\"><a href=\"https:\/\/almanacnews.com\/blogs\/p\/2022\/10\/26\/buying-police-scanners-should-not-be-an-easy-decision----privacy-rights-are-an-issue\">Buying police scanners should not be an easy decision &#8212; privacy rights are an issue<\/a><\/h4>\n<p>Diana Diamond on Almanac Online (almanacnews.com)<\/p>\n<p>The Palo Alto Police Department wants the city to spend thousands of dollars each year, for an indefinite period, to purchase an unspecified number (10, 20, or?) of Automated License Plate Readers (ALPRs) to help them identify stolen vehicles, trace cars involved in crimes and help investigators locate perpetrators once a crime has occurred, according to a report from the Police Department.<\/p>\n<hr>\n<p>Image Credit: Privacy by <a href=\"http:\/\/www.nyphotographic.com\/\">Nick Youngson<\/a> <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/\" rel=\"license\">CC BY-SA 3.0<\/a> <a href=\"http:\/\/alphastockimages.com\/\">Alpha Stock Images<\/a> via <a href=\"https:\/\/www.picserver.org\/p\/privacy.html\">picserver.org<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In case you haven&#8217;t heard, there&#8217;s a new Chief Twit. \u00a0His other company is known for racial abuse of Black workers and software bugs, and as soon has he took over he fired Vijaya Gadde, the widely-respected head of Trust &amp; Safety. \u00a0What could possibly go wrong? \u2013 A new Chief Twit &#8211; and a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[460],"class_list":["post-4110","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-privacy-news"],"_links":{"self":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/4110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/comments?post=4110"}],"version-history":[{"count":0,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/4110\/revisions"}],"wp:attachment":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/media?parent=4110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/categories?post=4110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/tags?post=4110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}