6 min read · Sep 3rd · Colin Koopman’s writings are focused on the politics and ethics of contemporary information technologies. Countering the widespread assumption that all the information technology we are immersed in…
These precedents show us to have been swaddled in data for much longer than we commonly think.
Much of what we discuss under the heading of contemporary mass surveillance, by contrast, has the quite different goal of state security in mind. Surveillance today targets not the improvement of the lives of citizens but more often their safety through the prevention of possible threats to life and property.
7 min read · Aug 26th · “Under His Eye,” she says. The right farewell. “Under His Eye,” I reply, and she gives a little nod.
By now you've probably heard that Apple plans to push a new and uniquely intrusive surveillance system out to many of the more than one billion iPhones it has sold, which all run the behemoth's proprietary, take-it-or-leave-it software. This new offensive is tentatively slated to begin with the launch of iOS 15—almost certainly in mid-September—with the devices of its US user-base designated as the initial targets. We’re told that other countries will be spared, but not for long.
The task Apple intends its new surveillance system to perform—preventing their cloud systems from being used to store digital contraband, in this case unlawful images uploaded by their customers—is traditionally performed by searching their systems. While it’s still problematic for anybody to search through a billion people’s private files, the fact that they can only see the files you gave them is a crucial limitation
Now, however, that’s all set to change. Under the new design, your phone will now perform these searches on Apple’s behalf before your photos have even reached their iCloud servers, and—yada, yada, yada—if enough "forbidden content" is discovered, law-enforcement will be notified.
4 min read · From 2016 · One way of working out if the data you’re gathering is particularly sensitive is to do a thought experiment: what would happen if this data got into the hands of a malicious actor? Who would be keen to get their hands on it? What are the worst things that they could do with this data?
Jan 11th · Per poder autenticar-se és necessari tenir configurat un certificat vàlid en el navegador o tenir introduïda correctament en el lector de certificats la targeta corresponent. Premi "Continuar" per…