Journalists covering digital public sphere/privacy/politics topics: security, privacy and data strategy and business model are quite distinct. Sometimes, they are at odds in terms of available choices. Important to understand these distinctions.
-
-
There is stuff fiddling with settings helps; there’s stuff that a good security team helps; privacy-by-design always helps (but isn’t without some trade-offs); and then there’s stuff settings and teams can’t mitigate.
Show this thread -
Being careful with explanations helps because conceptual clarity helps identify the political and economic dimensions of the issue—subject to democratic governance—and also consider what kind of technical investment/infrastructure is needed.
Show this thread -
Name, zip code, date of birth=match to voter rolls. Facebook data is easily matched for most to voter rolls.https://twitter.com/misgatos/status/976283361470685184 …
Show this thread
End of conversation
New conversation -
-
-
Security should also include verification in a scenario where they know an unauthorized party has data they shouldn't, they tell third party to delete, and third party says they did. Signature isn't enough.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I just wish you could hand someone an abstraction of your identity. Right now you have to give them your phone number- right? Or am I missing something?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.