Sunday, January 16, 2011

Letter RE: "Technology outpaces Privacy (Yet Again)" -- NY TIMES

Ms. Singer suggests that we are again witnessing the continual conflict between technology and privacy protections. Ms. Singer is wrong. Things have changed, drastically. Rather than have our privacy taken away from us by new technologies, we are now actively giving it away (albeit often due to the not-so-subtle coaxing of the new technology companies --like camera companies encouraging exhibitionism). We twitter or post our most banal experiences and thoughts, or provide websites with intimate financial details and genomic predispositions.
Perhaps we need to first reassess our shifting perceptions of privacy before we look to our slow moving legislatures and even slower to evolve laws.

Dov Greenbaum, JD MPhil PhD
Mark Gerstein, PhD

Unpublished letter in response to
Natasha Singer's "Technology Outpaces Privacy (Yet Again)" (12/12/2010)
http://www.nytimes.com/2010/12/12/business/12stream.html

5 comments:

  1. You ought to on a titanic level frontal cortex blowing in like manner strong course, and that prompts notice: Benefit Beverages

    ReplyDelete
  2. Reports of hacking, cyber attacks, and divulging of personal information have accelerated over the past decade, causing a corresponding increase in the need for security and protection. While businesses tend to be the major target for cyber attacks, the use of VPNs among individuals is also on the rise. dark web links

    ReplyDelete
  3. VPN is short for Virtual Private Network and is a technology that creates an encrypted secure connection over a less secure network like the Internet. The benefit is that it provides the security that the network on which it is based cannot provide. It uses the internet to transport data. Many such networks can be created by using different systems incorporating encryption and other security mechanisms to ensure that only authorized users can access the network and information cannot be intercepted by the others. It is like a tunnel built to transmit data between a network of say an organization and a remote user. It hides your data and IP address. ways to make money online

    ReplyDelete
  4. Very efficiently written information. It will be beneficial to anybody who utilizes it, including me. Keep up the good work. For sure i will check out more posts. This site seems to get a good amount of visitors. buy Westinghouse portable generators

    ReplyDelete
  5. When you successfully solve a proof of work, you get a mining reward. The number of Bitcoins in the reward depends on a number of factors such as complexity of the problem. For you to make more money you have to solve many problems. fake bitcoin sender

    ReplyDelete