Eliza, 29, said she’d mostly abandoned using swipe apps for their intended purpose. “Tinder transitioned from being a thing where I actually wanted to meet people to being, ‘I’m bored, tell me I’m pretty,’” she said. “I don’t really meet people on it anymore.”
Talking to women in their 20s and 30s about the ways they avoid swipe burnout (or at least make swiping more pleasant), almost all of them said basically the same thing as Serena, 34: “I can only stand dating apps at this point because I delete them frequently. It feels less like a full-time job that way.” She was contemplating joining Match.com, one of the oldest and most traditional dating sites, in hopes that it might mean sifting through fewer profiles in search of decent, mature people looking to go on real dates.
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
WikiLeaks: Here’s how the CIA hacks your phones, TVs and PCs
The organization released thousands of documents it claims show how the US spy agency can crack open devices from Apple, Samsung, Google and Microsoft.
Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.
“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”
Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.
The proposed legislation, said the lawmakers, would set up a cybersecurity grant program that would provide resources for states to develop and implement effective cyber resiliency plans, including efforts to identify, detect, protect, respond, and recover from cyber threats. It also would encourage development of a stronger cybersecurity workforce.
The reason staffers chose Confide over other secure messaging apps, like Signal, is that Confide erases messages as soon as they’re read.
Other secure messengers, like Signal, do not wipe read messages — meaning they could be intercepted if someone gains access to a phone where the messages have not been explicitly deleted.
Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.
My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones
Social media has the potential to facilitate much closer relationships between libraries and their patrons. Current usage of social media by the library community generally remains ad hoc and somewhat experimental, but the uptake of these tools is accelerating, and they will likely play an increasingly important role in library service provision and outreach in the future. Taylor & Francis has produced a white paper that analyzes current practices relating social media’s use in the library and how this differs by librarian job role. The sample was taken from academic librarians around the world, which also allows us to examine differences by geographic location. The goal: to establish how librarians are currently using social media in their roles, the most useful social media tools and best applications for these tools in a library setting.
explores a variety of social media tools in terms of how they can be used to organize information and communities. Together, you will survey and use a variety of social media tools, such as Delicious, Diigo, Facebook, Goodreads, Google Hangouts, LibraryThing, Pinterest, Storify, Twitter, and more! You will also explore how social media tools can be used to organize and disseminate information and how they can be used to foster and sustain communities of learning.
With the widespread use of library technology that incorporates social media components, intelligent objects, and knowledge-sharing tools comes the ability of libraries to provide greater opportunities for patron engagement in those discovery systems through user-generated content. These features may include the ability of users to contribute commentary such as reviews, simple point-and-click rating systems (e.g. one star to five stars), or to engage in extensive discussions or other social interactions. This kind of content could transform authoritative files, alter information architecture, and change the flow of information within the library discovery system.
Across generations, concerns for privacy may dissipate with time as specific technologies take hold or as people become aware of a technology’s benefits and value those over their value for privacy.
Library Privacy Guidelines for Students in K-12 Schools