Wolfie Christl aka CrackedLabs is known for his meticulous investigations of surveillance adtech’s inner workings. This latest research report, on the dangers and perils related to behavioral advertising in the online gambling context, is no exception. Methodologically built around the […]
Co-written by 12 authors, this handbook builds on and makes tangible the Responsible Data Forum’s working definition for “responsible data”. The mission, stated in the introduction chapter, is to illustrate where the responsibilities in dealing with data are and present strategies to deal with that responsibly.
Every "sharing" interaction in a digital system has externalities – costs to somebody not involved in the transaction themselves: whenever an individual shares a resource or information about themselves, they are likely also sharing something that isn't theirs.
“The question protocol”, as suggested by Richard Rutter, is a handy heuristic to evaluate the data fields of a form:
When designing a form, you can ensure you are gathering only pertinent information by always invoking the question protocol. The question protocol forces you – and your organization – to ask yourselves why you are requesting a piece of information from a customer. Getting to the bottom of why you’re asking a question means determining precisely how you will be using the answer, if at all.
If any person behaved like an app—rifled through your address book, fitted a tracking device to your car, obsessively logged what books and TV shows you watched, and wanted to disturb you at any moment of the day or night—you’d throw them out of your house and call the police.
What happened to our culture that this kind of abusive behaviour became so normalized it is not even questioned any more by most? Here’s a free and simple design heuristic for you: Don’t design any artifact that you would throw out of your house for anti-social conduct!
Google Maps Hacks by Berlin artist Simon Weckert is performance art at its best: not only for the artifact it creates (in the most ephemeral way, in form of a live data stream on Google Maps), but for the awareness it creates.
99 second hand smartphones are transported in a handcart to […]
Peter Bihr builds a solid argument why “online ads on content fund its creation” is a so-called category error, where things that belong to one category are presented as belonging to another (where they don’t belong). The original social contract with ads on websites, he presents […]
Hey Tony (and anyone else looking, as I get this quite a lot), here are a couple of possible options: * https://usefathom.com/ * https://goaccess.io/ * https://github.com/vesparny/fair-analytics … I’m not mentioning Matomo as they’ve ventured into tag managers, etc.
This paper tickles my brain not just in the privacy domain, but neatly ties it into my interest in technology non-use. The researchers test the so-called shadow profile hypothesis: “the data shared by the users of an online service predicts personal information of non-users of the […]
An interesting hack project: a “teachable parasite” device (open source), feeding smart home assistants noise unless the user really wants to interact with them. It’s a small, remote-controlled device sitting on top of the home assistant, disturbing its microphones unless the user […]
A summary of Nick Couldry’s Nov 2018 lecture “Colonised by data: the hollowing out of digital society” at the Institut für Internet und Gesellschaft (HIIG) Berlin. The lecture builds on the comparison of today’s digital economy with traditional […]
Adopted 70 years ago today, Art. 12 of the Universal Declaration of Human Rights grants protection of privacy - today enforced by GDPR and similar laws (Photo: Eleanor Roosevelt holding an UDHR poster in 1949; public domain).