A cautionary tale about how outside forces (companies and governments) will constantly try to breach your carefully-laid privacy boundaries and will do this by taking advantage of any vulnerabilities (sometimes WE ARE the vulnerability). https://twitter.com/blawlawlaw/status/1180527655541706752 …
-
-
Tweet je nedostupan.Prikaži ovu nit
-
Incognito modes (ex. Dread Pirate Roberts moniker, black mask) are at least moderately effective, but some data is identifying on its face (having six fingers).https://twitter.com/AtlantaUM/status/1180528255612440576 …
Prikaži ovu nit -
Box of chocolates demonstrates excellent data masking (you never know what you're gonna get). Real-life demonstration of personal information leaks from sources other than the data subject (he TELLS a STRANGER Jenny's ADDRESS and ENTIRE HISTORY OF ABUSE).https://twitter.com/NC_CyberLaw/status/1180527856616689665 …
Prikaži ovu nit -
Excellent demonstration of the distinction between secrecy (we all know what people are doing in the bathroom) and privacy (but they close the door anyway). https://twitter.com/blawlawlaw/status/1180528225577000960 …
Tweet je nedostupan.Prikaži ovu nit -
Flawless contrasting examples of careful selection of who has access to sensitive personal data AND the ability of the wealthy to protect information more thoroughly (Wickham/Georgiana situation vs. Wickham/Lydia situation).https://twitter.com/EllenMcGinnis/status/1180528303796563970 …
Prikaži ovu nit -
If you're going to use a VPN (One Ring invisibility™), be VERY SURE you trust the source and know what information your VPN is gathering. Don't connect to tech when you're unaware of the vulnerabilities (PIPPIN).https://twitter.com/aspie_ravenclaw/status/1180531009298817024 …
Prikaži ovu nit -
IOI should never have given a KNOWN ENEMY OF THE COMPANY access to any servers whatsoever, that's just security 101, you're basically asking for a data breach (going from book plot, haven't seen movie).https://twitter.com/NathanielDWhite/status/1180531511721889792 …
Prikaži ovu nit -
Such a great example of the privacy pitfalls of fame (name and image recognition, easily-findable apartment, etc.). Also, that map should have been encrypted and then there would be no concern about handing it over to the kidnappers.https://twitter.com/ethanjacobslaw/status/1180532097108234241 …
Prikaži ovu nit -
SO MANY examples of purposely submitting false data to hide identity (Chareth Cutestory, Mr. F, Maeby's exec job after lying about her age, Gene Parmesan's disguises, George/Oscar mixups). Gob's forget-me-nows may be a form of deletion request?https://twitter.com/LeitaVictory/status/1180532441943019520 …
Prikaži ovu nit -
"I Just Can't Wait to be King" dance/Zazu distraction is a great example of obscuring data through volume (though algorithms are generally better at data extraction than hornbills). https://twitter.com/atchambers/status/1180532762899632128 …
Tweet je nedostupan.Prikaži ovu nit -
Solid incognito mode in disguising the time machine as a phone booth and what an illustration that some things (your presence at a famous historical event) just can't be hidden from that epic snoop: history.https://twitter.com/alltinomit/status/1180534502944395264 …
Prikaži ovu nit -
The bad news for all of you are that the comments are quickly turning this into a game of "identify every pop culture hole in Calli's knowledge."
Prikaži ovu nit -
I know that apparently everyone in the entire galaxy fell for it, but dear god, do a better job of pseudonymization than switching "Obi-Wan Kenobi" to "Old Ben Kenobi." Also, the force is a snitch.https://twitter.com/LibraryOgre/status/1180544092293550081 …
Prikaži ovu nit -
Ok, a little more Star Wars: never be too confident that there are no exploits or weaknesses in your systems (CHECK FOR TRACKERS ON YOUR SHIP, HAN).pic.twitter.com/bo5Pd7F91G
Prikaži ovu nit -
SUCH a great exercise in data masking in possessing the body/image of an entirely separate person (though Zuul has no chill and immediately reveals the switch by not shutting up about it).https://twitter.com/tmr232/status/1180547349522849793 …
Prikaži ovu nit -
MAYBE SCREEN THE PEOPLE BUILDING YOUR TECH/SECURITY SYSTEM and have better internal security practices in place so as not to leak data. (Also, if a literal child can hack into your closed system that holds resurrected murder-beasts, BUILD IT BETTER.)https://twitter.com/mikamckinnon/status/1180549330207330304 …
Prikaži ovu nit -
Btw, new strategy is that I'm "liking" the stuff I've seen. If I haven't liked your comment, I'm not ignoring you, I just...there are many things I have not seen.
Prikaži ovu nit -
You would think dealer plates would be a form of anonymization, but sometimes the LACK of data stands out. Also, wood chippers are certainly a...form of masking data (though DNA still exists).https://twitter.com/iWasSaynBoourns/status/1180527685254176768 …
Prikaži ovu nit -
SO MANY fascinating forms of data masking, from full invisibility cloak to polyjuice disguises. Which is necessary because the world is a surveillance nightmare (the "track" on underage wizards, pensieve memory watching, the Weasley clock, etc.)https://twitter.com/LibraryOgre/status/1180552620282466306 …
Prikaži ovu nit -
I have SO MANY QUESTIONS about the privacy issues in sharing your memories/mind with your copilot (HOW DO YOU SET ACCESS CONTROLS ON YOUR BRAIN???). Also, the monster-portal is CALLED "the breach," so...https://twitter.com/gcouprie/status/1180555702991032320 …
Prikaži ovu nit -
Candle outs lighter's sexual status (rude), "yabbos" is a crime against humanity and also an insufficiently coded term (meaning still clear), Mary's scent-tracking ability demonstrates need for CCPA's "olfactory" data protection.https://twitter.com/zaltyclawyer/status/1180556447714861061 …
Prikaži ovu nit -
Fascinating case-study in legitimate interest assessments (Liv's need for food AND assistance in solving the murders may outweigh victim's privacy rights?). Rav is great (it's not privacy-related, I just love him).https://twitter.com/davidslavick/status/1180556766557306880 …
Prikaži ovu nit -
The cars they use in the robberies are VERY DISTINCTIVE and they should have been caught just from that. Brian is bad at being an undercover cop for many reasons, but putting unique data out there doesn't help (tuna on white bread at an auto shop, bro?).https://twitter.com/shadowmanos/status/1180561751668117505 …
Prikaži ovu nit -
The Witch has pretty invasive surveillance technology and I sure never saw Dorothy receive notice or give consent about this. Stealing guard uniforms could have been an effective data-cloaking ploy but other features (THEIR FACES) were too identifiable.https://twitter.com/AnonScone/status/1180563641235623936 …
Prikaži ovu nit -
This is actually a great example of the difficult tension of maintaining privacy in disaster/human crisis/war situations while also ensuring that information stays organized and safe (and would have meant Ilsa knew her husband was alive the whole time!).https://twitter.com/khneori/status/1180565307678773254 …
Prikaži ovu nit -
Guys, I haven't seen Enemy of the State. I'm very sorry. I'll add it to my to-watch list.pic.twitter.com/J6i5sWx7hO
Prikaži ovu nit -
There is so much throughout the series, but broadly speaking, if there were a more effective method of cloaking Slayer-ness, Slayers wouldn't be targeted by creatures and might LIVE PAST THE AGE OF, LIKE, 25, DAMN.https://twitter.com/Beardynoise/status/1180566693753610240 …
Prikaži ovu nit -
The full transformation of the prince into Mor'du illustrates that sometimes data encryption/anonymization can be TOO EFFECTIVE, as it no longer allows for use or re-identification of important data (like...remembering you're a human).https://twitter.com/mchardcastle/status/1180570330856919040 …
Prikaži ovu nit -
This book is too serious for me to joke about, but, legitimately, it brings up the tension between the right to control data and others getting access to data they need (Celie learning about her real father, her mother's wealth, her children, etc.).https://twitter.com/safe_secs/status/1180573687298351107 …
Prikaži ovu nit -
Scarlett is an evil, manipulative monster, but she THRIVES through carefully constructed misinformation campaigns (like when she steals her second husband) and is almost brought down by lack of data access controls (WHY ARE YOU HUGGING ASHLEY IN A BARN).https://twitter.com/MichelleRobbins/status/1180573842353188867 …
Prikaži ovu nit - Još 2 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.