Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

The Intimate Social Graph

Soulskill posted more than 3 years ago | from the anything-you-tweet-may-be-used-against-you-in-a-court-of-law dept.

Privacy 21

jamie tips an article by Slashdot vet Keith Dawson about the uncertain state of privacy protection for one-to-one online communications through social sites and services. Quoting: "The privacy of these communications is protected mainly under a law — ECPA, the Electronic Communications Privacy Act — dating from 1986 and crafted for then-existing email (think Compuserve and Prodigy) and emerging cellular networks. This law is an increasingly poor fit for modern and emerging communication modalities. Email stored on servers is treated differently depending on whether or not the user has read a particular message; and messages older than 6 months in storage enjoy different protection than newer messages. In attempting to apply the ECPA to social networking media, courts have interpreted users' privacy rights in a variety of ways. ... One shortcoming of the ECPA is that it does not require email, search engine, cloud computing or social networking sites to report how many requests for private data they get from authorities. Whatever the number, it almost certainly dwarfs the number of real-time online intercepts (wiretap, pen register, and trap and trace orders), for which statistics must be kept."

cancel ×

21 comments

Sorry! There are no comments related to the filter you selected.

GPG FTW (2, Informative)

Anonymous Coward | more than 3 years ago | (#33913940)

GPG is ported to about everything in creation. If you care about email privacy, use it. It makes whatever the law says some company must do irrelevant, and guards against "accidental" leaks by those companies.

Nearly every ISP provides you with POP or other mail. Run your own mail client: most have built in support for GPG so it's transparent to you once you have made your keys.

Depending on some "benevolent entity" to protect you is unwise.

Re:GPG FTW (4, Interesting)

icebraining (1313345) | more than 3 years ago | (#33914102)

Of course, getting your recipients to accept and send encrypted mails is a different matter.

I have GPG configured and sent the grand total of 3 emails using it. Nobody else I know (in an entire CS course, both teachers and colleagues) has a public key I can use. Even if they understand the concept (I've explained it some times) they simply don't care.

Re:GPG FTW (0)

Anonymous Coward | more than 3 years ago | (#33914880)

> Of course, getting your recipients to accept and send encrypted mails is a different matter.

(Same AC here as you replied to). Yep, you're right. I agree. But also, there is no free lunch. Either you (generic you, not you in particular) are willing to act in a way consistent with your goals, or you are not. But you generally can't have the benefits of achieving those goals (say, privacy) without spending a little bit of energy in their general direction. (Sometimes you can if someone else acts on your behalf, I suppose, but *somebody* has to get off their ass).

Re:GPG FTW (1)

yahwotqa (817672) | more than 3 years ago | (#33916074)

Just refuse to send sensitive data over plain e-mail. Recipient, if they need the data, can then offer alternatives, or ask for suggestions from you.

I'm way past the point to go out of my way to convince people to use correct solutions if they do not want to. I value my free time much more than 10 years ago.

It could be made easy, with cooperation (1)

Burz (138833) | more than 3 years ago | (#33915548)

If operating systems (including the desktop environments) treated keys and certificates as interesting standardized objects complete with consistent/appropriate icons, it would help people feel familiar with and in control of privacy measures like PGP.

It would help further if the FOSS world and other techies had their druthers and started an initiative to identify/brand communications software as adhering to a certain standard that is both consumer-friendly and devoid of any backdoors. If the software carried a certain "trustworthy" badge then users would know it passed scrutiny and that there weren't any "legal snooping" deals being cut with governments, etc.

When I first saw TFA summary, I thought of ZPhone and how cool it would be if similar communication apps like it could be grouped together and explained to average people who are seeking more privacy. If the concept catches on, it could encourage the creation of more user-friendly security software or prompt the big guys like Skype to become more open so they can earn the badge.

Re:It could be made easy, with cooperation (1)

Burz (138833) | more than 3 years ago | (#33915558)

Interestingly, the ZPhone website now has this:

Submitted to IETF as a proposal for a public standard, and source code is published

So maybe ZPhone itself would serve as a kind of assurance of privacy/trust.

Re:GPG FTW (0)

Anonymous Coward | more than 3 years ago | (#33916394)

I don't use e-mail encryption, but I find it relatively easy to get people to use IM encryption [wikimedia.org] , especially as everyone using a Mac is using Adium which includes support for it, and usually when I show people Pidgin they like it and want to switch to it... so installing OTR as well is not that hard.

Re:GPG FTW (1)

Jotii (932365) | more than 3 years ago | (#33923396)

Your OpenPGP key (093461E7) expired two years ago. A good way to promote the usage of OpenPGP encryption is to always be ready to accept encryptet emails.

Ahahahahahaha that's funny! (-1, Offtopic)

Anonymous Coward | more than 3 years ago | (#33914030)

I am laughing my rear areas off. That is super haha! Now come to my webstore and by 100% authorized Gucci for your love one while I make more soup to help homeless I am helping with yor support!

http://wellcome.american-shopper.cn/ [american-shopper.cn]

Re:Ahahahahahaha that's funny! (5, Funny)

Worthless_Comments (987427) | more than 3 years ago | (#33914306)

This guy sounds legit.

Re:Ahahahahahaha that's funny! (2, Insightful)

TheUnknownCoder (895032) | more than 3 years ago | (#33915468)

What a proper username!

Get a clue (-1, Offtopic)

Anonymous Coward | more than 3 years ago | (#33914048)

If an application can bring down an entire network, the network is complete shit. Hire some goddamned engineers and techs who know what the fuck they're doing.

kdawson is a "vet"? (1)

abigor (540274) | more than 3 years ago | (#33914118)

Does this mean he no longer works at Slashdot?

Re:kdawson is a "vet"? (1)

corbettw (214229) | more than 3 years ago | (#33914184)

From your lips to CmdrTaco's ears.

Re:kdawson is a "vet"? (0)

Anonymous Coward | more than 3 years ago | (#33914278)

And if he's a vet then did he neuter Katz?

Intimate Social Graph WTF? (1)

Apple Acolyte (517892) | more than 3 years ago | (#33914260)

Is this article FUBAR? What's with the title? What do the terms "Intimate Social Graph" have to do with law enforcement snooping on stored electronic correspondence? Anyway, I think the safe thing to assume is, anything you send online in the clear is potentially open for anyone with interest and some technical experience to intercept and learn about you. There should be no expectation of privacy for that sort of information. If you proceed with that assumption in mind, you won't be disappointed if you find out you're being snooped on, and hopefully you will have taken some measure to guard yourself based on that realization.

kdawson out kdawsoned (0)

Anonymous Coward | more than 3 years ago | (#33916008)

Soulskill is the new kdawson

Re:Intimate Social Graph WTF? (1)

yahwotqa (817672) | more than 3 years ago | (#33916092)

Anything with "social (network|graph)", "web 2.0", "html5" "i(phone|pad)" in the title will get more pagehits on /., don't you know that?

Dicks (-1, Offtopic)

Anonymous Coward | more than 3 years ago | (#33914460)

Dicks

The only thing KDawson is a vet at is... (-1, Flamebait)

Anonymous Coward | more than 3 years ago | (#33915038)

...sucking cock.

'working' from the bottom..... downwards (0)

Anonymous Coward | more than 3 years ago | (#33916382)

some 'flagged' text; almost almost all of US monkeys are considered to be a 'threat' (to constant deception) now. carry on. can't be much further now.

the corepirate nazi holycost (life, liberty etc...) is increasing by the minute. you call this 'weather'?

continue to add immeasurable amounts of MISinformation, rhetoric & fluff, & there you have IT? that's US? thou shalt not... oh forget it. fake weather (censored?), fake money, fake god(s), what's next? fake ?aliens? ahhaha. seeing as we (have been told that) came from monkeys, the only possible clue we would have to anything being out of order, we would get from the weather. that, & all the other monkeys tipping over/exploding around US.

the search continues; on any search engine

weather+manipulation

bush+cheney+wolfowitz+rumsfeld+wmd+oil+freemason+blair+obama+weather+authors

meanwhile (as it may take a while longer to finish wrecking this place); the corepirate nazi illuminati (remember, (we have been told) we came from monkeys, & 'they' believe they DIDN'T), continues to demand that we learn to live on less/nothing while they continue to consume/waste/destroy immeasurable amounts of stuff/life, & feast on nubile virgins while worshipping themselves (& evile in general (baal to be exact)). they're always hunting that patch of red on almost everyones' neck. if they cannot find yours (greed, fear ego etc...) then you can go starve. that's their (slippery/slimy) 'platform' now. see also: http://en.wikipedia.org/wiki/Antisocial_personality_disorder

never a better time to consult with/trust in our creators. the lights are coming up rapidly all over now. see you there?

greed, fear & ego (in any order) are unprecedented evile's primary weapons. those, along with deception & coercion, helps most of us remain (unwittingly?) dependent on its' life0cidal hired goons' agenda. most of our dwindling resources are being squandered on the 'wars', & continuation of the billionerrors stock markup FraUD/pyramid schemes. nobody ever mentions the real long term costs of those debacles in both life & any notion of prosperity for us, or our children. not to mention the abuse of the consciences of those of us who still have one, & the terminal damage to our atmosphere/planet (see also: manufactured 'weather', hot etc...). see you on the other side of it? the lights are coming up all over now. the fairytail is winding down now. let your conscience be your guide. you can be more helpful than you might have imagined. we now have some choices. meanwhile; don't forget to get a little more oxygen on your brain, & look up in the sky from time to time, starting early in the day. there's lots going on up there.

"The current rate of extinction is around 10 to 100 times the usual background level, and has been elevated above the background level since the Pleistocene. The current extinction rate is more rapid than in any other extinction event in earth history, and 50% of species could be extinct by the end of this century. While the role of humans is unclear in the longer-term extinction pattern, it is clear that factors such as deforestation, habitat destruction, hunting, the introduction of non-native species, pollution and climate change have reduced biodiversity profoundly.' (wiki)

"I think the bottom line is, what kind of a world do you want to leave for your children," Andrew Smith, a professor in the Arizona State University School of Life Sciences, said in a telephone interview. "How impoverished we would be if we lost 25 percent of the world's mammals," said Smith, one of more than 100 co-authors of the report. "Within our lifetime hundreds of species could be lost as a result of our own actions, a frightening sign of what is happening to the ecosystems where they live," added Julia Marton-Lefevre, IUCN director general. "We must now set clear targets for the future to reverse this trend to ensure that our enduring legacy is not to wipe out many of our closest relatives."--

"The wealth of the universe is for me. Every thing is explicable and practical for me .... I am defeated all the time; yet to victory I am born." --emerson

no need to confuse 'religion' with being a spiritual being. our soul purpose here is to care for one another. failing that, we're simply passing through (excess baggage) being distracted/consumed by the guaranteed to fail illusionary trappings of man'kind'. & recently (about 10,000 years ago) it was determined that hoarding & excess by a few, resulted in negative consequences for all.

consult with/trust in your creators. providing more than enough of everything for everyone (without any distracting/spiritdead personal gain motives), whilst badtolling unprecedented evile, using an unlimited supply of newclear power, since/until forever. see you there?

all the manuals say we're not to kill each other, & we're mandated to care for/about one another, before any other notion will succeed. one does not need to agree whois 'in charge' to grasp the possibility that there may be some assistance available to us, including from each other. there's also the question of frequent extreme 'distractions' preventing us from following the simple 'directions' we were given, along with everything we needed to accomplish our task. see you there?
boeing, boeing, gone.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>