ICTs

­

10 Years Later, Google Stops Scanning Your Email, But Not For the Reasons You’d Think

EUGENE – Google’s pseudonymous parent company Alphabet Inc. announced late last week that it would discontinue the use of controversial in-email advertisements. For over a decade, the company scanned the content of users’ emails for keywords and then displayed relevant ads right in Gmail. Despite ongoing protest from consumer and digital rights activists, as well […]

Germany’s Network Enforcement Act: A Wurst Case Scenario

EUGENE –  Typically known for more stringent laws around speech than other western democracies, Germany’s latest push back against the use of social media for inciting violence and sharing extremist messages raises big questions on effectiveness, jurisdiction and legality.

On the heels of the recent Facebook Files leaks, which document the ways ICTs moderate content, new […]

Comey’s Backdoor: What We Got Wrong After Paris

// In this blog post, I’ll explore media and government reactions to acts of terror in both Paris and San Bernardino, California. FBI Director James Comey and California Democratic Senator Dianne Feinstein suggest radical changes to how we look at cryptography in the United States, often in direct defiance of security and civil rights experts.

A […]

Mad Max: Schrems on Security, Safe Harbor

Every now and then a story comes along that reminds us just how global the internet really is – one that reminds us that even though the pillars of social media hang their stetsons on the western U.S. coast, their reach and impact spans the globe.

This past Tuesday, September 6th 2015, Europe’s top court, the Court of Justice of the European Union (CJEU) struck down a 15 year old agreement between the United States and countries in the EU. […]

Pseudonyms: Not Who You Share With, But Who You Share As

// In this post I’ll dive into pseudonymity, and the challenges posed by real-name policies that sites like Facebook, Twitter and Google put in place. With quips and quotes from the EFF, m00t, Facebook’s Chris Cox and danah boyd, this should be a fun one.

A few things came across my desk this week that brought me […]

Block it to me, Block it to me, RESPECT. (Part 2)

//  Part 1 of the Block It To Me series explored the consequences of using an ad block for users, content writers and advertisers. Part 2 will focus on the ways major ICTs like Apple, Facebook and Twitter are hedging their bets – and stirring up the digital marketing industry – all while returning to basics.

Rotten […]

iMessaged You, and You Alone: End-to-End Encryption

//In this blog post, we’ll look into how your iPhone relies on end-to-end encryption, the differences between symmetrical and asymmetrical keys, and how the DOJ hopes to use this technology to thwart the bad guys. 

If you weren’t too busy buying a new mattress, RV or big screen TV this Labor Day Weekend, you may have come across a story from the New York […]

ICANN of Worms – The Freedom to Proxy May Suffer Latest Blow

A major change to the Internet’s global address book ICANN raises privacy concerns around the globe. I’ll shed light on the situation, explore potential consequences and contextualize the debate in a larger discussion around outdated rules in the fastest growing industry in human history.

Navigating the Web with Zero-Rating is a lot like Driving with a Learner’s Permit

//Recent headlines have trumpeted both the beginning and the end of the free and open internet, depending on who you’re reading. For countries with little to no access, the FCC’s Net Neutrality stance may seem far from relevant but that couldn’t be farther from the truth. In this blog post, I’ll explore some angles of […]

Reflections on the ’11 Spooky Facebook Thought Experiments

<ramble class=”media-literacy-soapbox”>

I hate to ramble like this, but I’ve just got to weigh in on the ‘spooky’ Facebook social experiment coverage from Fall 2014. […]