In May, the EU Court of Justice ruled that because people have the “right to be forgotten,” Google must remove links from European versions of search, just because people ask them to. But you can’t hide from the past on the internet.
The requirement that Google take down links for the right to be forgotten is just lame censorship. Overtly! It’s the removal of inconvenient facts from published public view because somebody wants the facts to disappear. It’s a bit like the producers of Friday Night Lights calling on the Ministry of Truth to have Season 2 erased from the record because it’s inferior to the rest of the series.
Earlier this week, Facebook announced that it was going to start using all of that ever-so-illuminating app and website data it collects to serve us with more targeted ads. In other words, Facebook is getting ready to use your browsing history to benefit advertisers. Here’s how to stop them.
Cyber criminals have reportedly hacked into the servers of Domino’s Pizza France and Belgium, and downloaded over 600,000 customer records.
The data includes customers’ names, addresses, phone numbers, email addresses, passwords and delivery instructions – as well as their favourite pizza toppings – according to the hacker organisation known as Rex Mundi.
The hackers are now demanding a ransom of €30,000 (£24,000) to release the data. If Domino’s does not pay the ransom by 20:00 CET tonight, they say they will post the entirety of the data in their possession on the Internet
Twitter has been a happening place this spring. Reuters suggests the micr0blogging site will have nearly 400 million users by 2018. In addition, the hashtag #YesAllWomen exploded, and according to CNN, it was mentioned in 1 million tweets in just one week. That’s a lot of talking.
At the same time, there’s a ghost conversation going on about the public nature of Twitter. Specifically, some people who thought they were speaking at least semi-privately have discovered that their names, their identities, and in some cases, their locations were being spread all across the internet after they shared a few thoughts that seemed somehow newsworthy.
Seems like it’s time to look a little closer at how Twitter really works, and how much privacy a reasonable person can expect while using this particular social media site.
Most Facebook Inc (NASDAQ:FB) users think that when they set their friends list privacy to “Only Me,” it means that they are the only ones who can see it. However, anyone can take advantage of a loophole in the privacy. As Mashable reports, that loophole is the social network’s mutual friends feature.
All users can see mutual friends between any other two users if one of them has made their friends list publicly available. So, for example, if one user keeps her friends list private but her closest friend does not, then a third party could compare the two users’ lists to see all the friends they have in common.
Just because you turned off your phone doesn’t mean the NSA isn’t using it to spy on you.
Edward Snowden’s latest revelation about the NSA’s snooping inspired an extra dose of shock and disbelief when he said the agency’s hackers can use a mobile phone as a bug even after it’s been turned off. The whistleblower made that eye-opening claim when Brian Williams of NBC Nightly News, holding his iPhone aloft during last Wednesday’s interview, asked, “What can the NSA do with this device if they want to get into my life? Can anyone turn it on remotely if it’s off? Can they turn on apps?
“They can absolutely turn them on with the power turned off to the device,” Snowden replied.
Snowden didn’t offer any details on this seemingly magical feat. But a group of particularly cunning iPhone hackers say it’s possible. They also say you can totally and completely turn off your iPhone so no one—not even the NSA—can use it to spy on you.
Google has been hit by more than 12,000 requests to erase links to personal history after a landmark European court ruling, Reuters reports. On May 13th, the top European court upheld a law that requires Google to erase “inadequate, irrelevant or no longer relevant” information from search results if individuals request so.
One problem here is that drawing the line between who is a private person and who is a public figure can be difficult and time-consuming. Defining what personal information is “irrelevant or no longer relevant” can be even harder to do.