Searching for "data privacy"

Zoom succumbs to Chinese authorities

After March 2020 reports about Zoom privacy issues, now Zoom acknowledges working with the Chinese government:

++++++++++++++

Is Zoom Safe for Chinese Students?

Elizabeth Redden June 12, 2020

https://www.insidehighered.com/news/2020/06/12/scholars-raise-concerns-about-using-zoom-teach-about-china

Unlike many other major tech platforms based in the U.S., Zoom, which is headquartered in California, has not been blocked by the Chinese government. Zoom said in a blog post that it is “developing technology over the next several days that will enable us to remove or block at the participant level based on geography” which will allow the company to “to comply with requests from local authorities when they determine activity on our platform is illegal within their borders; however, we will also be able to protect these conversations for participants outside of those borders where the activity is allowed.”

Zoom’s interference with the Tiananmen gatherings and its suspension of user accounts raised alarm among many in higher education, which increasingly depends on Zoom to operate courses remotely — including for students located within China’s borders.

Multiple scholars took to Twitter to express their worries

PEN America, a group that advocates for free expression, condemned Zoom for shuttering the activist’s account.

This is not the first time Zoom’s links to China have come under scrutiny. In April, the company admitted that some of its user data were “mistakenly” routed through China; in response, the company announced that users of paid Zoom accounts could opt out of having their data routed through data centers in China.

An April 3 report by scholars at the University of Toronto’s Munk School of Global Affairs & Public Policy said Zoom’s research and development operations in China could make the company susceptible “to pressure from Chinese authorities.”

Zoom, whose Chinese-born CEO is a U.S. citizen, said in its latest annual report to the U.S. Securities and Exchange Commission that it had more than 700 employees at its research and development centers in China as of Jan. 31. The SEC filing notes that Zoom has a “high concentration of research and development personnel in China, which could expose us to market scrutiny regarding the integrity of our solution or data security features.”

+++++++++++++

Zoom Just Totally Caved In to China on Censorship from r/technology


++++++++++++++
more about Zoom in this IMS blog
https://blog.stcloudstate.edu/ims?s=zoom

Algorithmic Test Proctoring

Our Bodies Encoded: Algorithmic Test Proctoring in Higher Education

SHEA SWAUGER ED-TECH

https://hybridpedagogy.org/our-bodies-encoded-algorithmic-test-proctoring-in-higher-education/

While in-person test proctoring has been used to combat test-based cheating, this can be difficult to translate to online courses. Ed-tech companies have sought to address this concern by offering to watch students take online tests, in real time, through their webcams.

Some of the more prominent companies offering these services include ProctorioRespondusProctorUHonorLockKryterion Global Testing Solutions, and Examity.

Algorithmic test proctoring’s settings have discriminatory consequences across multiple identities and serious privacy implications. 

While racist technology calibrated for white skin isn’t new (everything from photography to soap dispensers do this), we see it deployed through face detection and facial recognition used by algorithmic proctoring systems.

While some test proctoring companies develop their own facial recognition software, most purchase software developed by other companies, but these technologies generally function similarly and have shown a consistent inability to identify people with darker skin or even tell the difference between Chinese people. Facial recognition literally encodes the invisibility of Black people and the racist stereotype that all Asian people look the same.

As Os Keyes has demonstrated, facial recognition has a terrible history with gender. This means that a software asking students to verify their identity is compromising for students who identify as trans, non-binary, or express their gender in ways counter to cis/heteronormativity.

These features and settings create a system of asymmetric surveillance and lack of accountability, things which have always created a risk for abuse and sexual harassment. Technologies like these have a long history of being abused, largely by heterosexual men at the expense of women’s bodies, privacy, and dignity.

Their promotional messaging functions similarly to dog whistle politics which is commonly used in anti-immigration rhetoric. It’s also not a coincidence that these technologies are being used to exclude people not wanted by an institution; biometrics and facial recognition have been connected to anti-immigration policies, supported by both Republican and Democratic administrations, going back to the 1990’s.

Borrowing from Henry A. Giroux, Kevin Seeber describes the pedagogy of punishment and some of its consequences in regards to higher education’s approach to plagiarism in his book chapter “The Failed Pedagogy of Punishment: Moving Discussions of Plagiarism beyond Detection and Discipline.”

my note: I am repeating this for years
Sean Michael Morris and Jesse Stommel’s ongoing critique of Turnitin, a plagiarism detection software, outlines exactly how this logic operates in ed-tech and higher education: 1) don’t trust students, 2) surveil them, 3) ignore the complexity of writing and citation, and 4) monetize the data.

Technological Solutionism

Cheating is not a technological problem, but a social and pedagogical problem.
Our habit of believing that technology will solve pedagogical problems is endemic to narratives produced by the ed-tech community and, as Audrey Watters writes, is tied to the Silicon Valley culture that often funds it. Scholars have been dismantling the narrative of technological solutionism and neutrality for some time now. In her book “Algorithms of Oppression,” Safiya Umoja Noble demonstrates how the algorithms that are responsible for Google Search amplify and “reinforce oppressive social relationships and enact new modes of racial profiling.”

Anna Lauren Hoffmann, who coined the term “data violence” to describe the impact harmful technological systems have on people and how these systems retain the appearance of objectivity despite the disproportionate harm they inflict on marginalized communities.

This system of measuring bodies and behaviors, associating certain bodies and behaviors with desirability and others with inferiority, engages in what Lennard J. Davis calls the Eugenic Gaze.

Higher education is deeply complicit in the eugenics movement. Nazism borrowed many of its ideas about racial purity from the American school of eugenics, and universities were instrumental in supporting eugenics research by publishing copious literature on it, establishing endowed professorships, institutes, and scholarly societies that spearheaded eugenic research and propaganda.

+++++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

Keep the Crashers Out of Your Zoom

+++++++++
https://blog.zoom.us/wordpress/2020/03/20/keep-the-party-crashers-from-crashing-your-zoom-event/

How to Keep the Crashers Out of Your Zoom Event

++++++++++++++

How to Secure Your Zoom Meetings from Zoom-Bombing Attacks

https://www.bleepingcomputer.com/news/software/how-to-secure-your-zoom-meetings-from-zoom-bombing-attacks/

++++++++++++++++

Maybe we shouldn’t use Zoom after all

he Intercept reported that Zoom video calls are not end-to-end encrypted, despite the company’s claims that they are.

Motherboard reports that Zoom is leaking the email addresses of “at least a few thousand” people because personal addresses are treated as if they belong to the same company

Apple was forced to step in to secure millions of Macs after a security researcher found Zoom failed to disclose that it installed a secret web server on users’ Macs, which Zoom failed to remove when the client was uninstalled

+++++++++++++

‘Zoom is malware’: why experts worry about the video conferencing platform

https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing

security researchers have called Zoom “a privacy disaster” and “fundamentally corrupt” as allegations of the company mishandling user data snowball.

A report from Motherboard found Zoom sends data from users of its iOS app to Facebook for advertising purposes, even if the user does not have a Facebook account.
++++++++++++++++

Zoom’s security and privacy problems are snowballing from r/technology

+++++++++++++++++++

this Tweet threads informative:

+++++++++++++++++

https://www.edsurge.com/news/2020-03-27-holding-class-on-zoom-beware-of-these-hacks-hijinks-and-hazards

your teaching online we can help

both these tweets very valid about the past:

while this one is very valid for the present

in a need to choose the right tool for remote learning? Contact us, we will help you

10 years in ed tech

https://www.edsurge.com/news/2019-12-31-when-education-giants-stumbled-and-data-ruled

The tools that have delivered are specific, targeted solutions that are easy to use and provide teachers and students delight. Simple solutions, like Read 180, which helps accelerate learning for struggling students, still deliver 20 years later, now under Houghton Mifflin Harcourt instead of Scholastic. Accelerated Reader, a product that started more than 30 years ago, still motivates kids to read.

Companies that aim to provide student data in a usable fashion, like Schoology, still provide value.

the promise of data in education is still proving itself. It has taken awhile, but we’re getting to a point where data is more actionable. Renaissance just acquired Schoolzilla, which was launched in 2011, for this reason.

When it comes to devices, many kids today have access to iPads or Chromebooks. Although one-to-one computing hasn’t been as transformational as some predicted in 2010, we’ve certainly seen a huge shift

Most of these [textbook providers] companies tried to re-platform every unique product into one monolithic model, but the promise didn’t pan out—the products proved clunky and hard to use

Predictions that educators would want more assessment data to drive instruction have proven true. https://www.renaissance.com/

The prediction that digital reading would be simple and easy to implement has also proven true.

Virtual reality hasn’t panned out yet.

The rise of gaming in education was another prediction that has largely faded.

started to solve the challenge of data interoperability and portability.

Alongside that, privacy and data responsibility are still a problem

The role of the teacher, however, is still critical. Rather than take over responsibility for educating students, technology’s role should be—and increasingly is—to put multiple options into educators’ hands to easily solve different types of challenges for individual students.

 

+++++++++++++
more on technology for the last decade
https://blog.stcloudstate.edu/ims/2020/01/02/100-tech-debacles-of-the-decade/

smart anonymization

This startup claims its deepfakes will protect your privacy

But some experts say that D-ID’s “smart video anonymization” technique breaks the law.

https://www.technologyreview.com/s/614983/this-startup-claims-its-deepfakes-will-protect-your-privacy/

The upside for businesses is that this new, “anonymized” video no longer gives away the exact identity of a customer—which, Perry says, means companies using D-ID can “eliminate the need for consent” and analyze the footage for business and marketing purposes. A store might, for example, feed video of a happy-looking white woman to an algorithm that can surface the most effective ad for her in real time.

Three leading European privacy experts who spoke to MIT Technology Review voiced their concerns about D-ID’s technology and its intentions. All say that, in their opinion, D-ID actually violates GDPR.

Surveillance is becoming more and more widespread. A recent Pew study found that most Americans think they’re constantly being tracked but can’t do much about it, and the facial recognition market is expected to grow from around $4.5 billion in 2018 to $9 billion by 2024. Still, the reality of surveillance isn’t keeping activists from fighting back.

++++++++++++
more on deep fake in this IMS blog
https://blog.stcloudstate.edu/ims?s=deep+fake

federated learning

https://twitter.com/benhamner/status/1177755933050462208

Federated learning: train machine learning models while preserving user privacy, by keeping user data on device (e.g. mobile phone) and only sending encrypted gradient updates (that can only be decrypted in aggregate) back to the server

https://federated.withgoogle.com/

deepfake Zao

https://www.theguardian.com/technology/2019/sep/02/chinese-face-swap-app-zao-triggers-privacy-fears-viral

Released on Friday, the Zao app went viral as Chinese users seized on the chance to see themselves act out scenes from well-known movies using deepfake technology, which has already prompted concerns elsewhere over potential misuse.

As of Monday afternoon it remained the top free download in China, according to the app market data provider App Annie.

Concerns over deepfakes have grown since the 2016 US election campaign, which saw wide use of online misinformation, according to US investigations.

In June, Facebook’s chief executive, Mark Zuckerberg, said the social network was struggling to find ways to deal with deepfake videos, saying they may constitute “a completely different category” of misinformation than anything faced before.

++++++++++
more on deepfake in this IMS blog
https://blog.stcloudstate.edu/ims?s=deepfake

Tik Tok and cybersecurity

https://www.axios.com/tiktok-china-online-privacy-personal-data-6b251d22-61f4-47e1-a58d-b167435472e3.html

The bottom line: While the Big Tech behemoths of the U.S. are barred from making inroads in China, the inverse doesn’t apply. That could mark an opening front in the ongoing technological and economic war between the two rivals.

++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

https://blog.stcloudstate.edu/ims?s=tik+tok

https://blog.stcloudstate.edu/ims/2018/10/31/students-data-privacy/

1 7 8 9 10 11 16