Take in all of a subject's experience, from phone numbers dialled and e-mail messages viewed to every breath taken, step made and place gone A quote from the LifeLog wiki.Talk about coincidences. On the same day that Facebook was founded, the Pentagon killed off the LifeLog project. But was it just shifted sideways and resurrected as Facebook? The ...
With an estimated one CCTV camera for every 14 people in London, it would appear to be one of the most surveillance-minded cities in the world outside of China. It has been calculated that during the working day of an average person in the UK's capital would be caught on around 300 different cameras. Certainly CCTV cameras have a place in soci...
The do-it-yourself furniture guys are going it alone ​Whilst Amazon, Target and Walmart continue to insist on 'enriching your shopping experience' by using your personal data with, at best, your vaguely tacit approval, we take our hats off to the independently minded Swedish furniture makers & retailers, IKEA, for their stance on...
In my latest piece on corporate 'misbehavior', I am taking a look at Alphabet Inc. Never heard of them? Well, that's because it is a company that does nothing - basically. However, founded in 2016, it is the holding company for all of the various companies, operations, services, projects and assets created, owned and/or controlled by the founders o...
When, in May 2018, the European Union (EU) introduced the General Data Protection Regulation (GDPR) with the express intention of enforcing strict rules regarding the gaining the consent of internet users for the collection and processing of their personal data by website operators, it hadn't necessarily envisioned a world where cookies were no lon...
The results of the decentralize.today 2019 review of messaging apps are in... ​During the course of last year, we undertook to review a number of the most popularly available messaging apps.This is the fourth year we have undertaken the review and we do get asked why we devote so much time and energy to this exercise. ...
What is the CCPA? ​The California Consumer Privacy Act (CCPA) is a comprehensive data privacy law that will go into effect on January 1, 2020. The new data security framework will have a major impact on both consumers and businesses, because the regulations apply to any companies – no matter their location – that collect personal information f...
This is more than just another WhatsApp alternative. For once, this doesn't rely just on having an internet connection, but also sends and receives messages via WiFi and Bluetooth.Even better is that it doesn't rely on any one server! It is pure peer-to-peer and fully encrypted. It also has a blog & forum feature and an RSS reader.You can ...
Today, as we kick off a major new initiative from the annals of the Privacy Cookbook, we feature an Open Letter from the Privacy Advocate...   I believe that the Privacy Cookbook is a great tool for helping to drive things toward a better, safer, more secure and more private internet, DNS, cellphone and PC setup in future. Even as we publ...
In the second article on corporate maleficence, I will be taking a look at the Apple Inc.Apple has shown itself to be a complete poodle when it comes to its relationship with China. During the recent mass demonstrations in Hong Kong, it pulled a crowd-sourced app from it's App Store which allowed users to track the locations of both Police and...
Every Monday, I will be taking on corporations, exposing their unethical practices, how they sell our data and the other things that make them richer and richer at your expense. I will try to share with you not just our findings, but also provide some solutions. Today we start with the world's best selling cellphone co...
Trivago describes its service as helping you "find your ideal hotel and compare prices from different websites"...simple enough mission you would think! The issue is that Trivago (officially) has two income streams. The first is where hotels are charged based on cost-per-clicks (CPCs): someone looks and/or books, they pay!The second (lesser) s...
 The second part of my quick drive through the tech dominated technological-industrial complex of present day USAThe huge growth in the value of the Big Tech 5 in the USA has been a combination of factors. The favourable economic environment in the years since the Global Financial Crisis of 2008 and low interest rates. The advance of glob...
Google loves to track you. You can feel the corporate glow emanating from their HQ every time you switch on location services. Now they know where you are and probably also what you are up to….Google Maps is certainly a handy creation. Easy to look up something even in the most obscure of locations, it will seldom let you down. But let’s say y...
Consumer tech goods company rewrites the recycling rules Some decades ago, during the early, boom years of mass produced consumer appliances, the term 'built-in obsolescence' was introduced into everyday language. It was used to describe the deliberate building of products to have a limited shelf life of useful operation. This was deemed ...
Crypto-maverick announces second tilt at the US Presidency by declaring he can't win so don't vote for him!​I'm sure we've all heard of John McAfee (and if you haven't can I ask what rock you have been living under for the past 20 years?).Most famous professionally for being the creator of the first commercially successful anti-virus soft...
How a key component of the US's Mainstream media became a national security threat  Amidst all of the internal bickering and the international tension that has characterized recent months, the act of 'normalizing nonsense', of nullifying the impact and import of news items as they break, to the point that they lose their relevance has res...
Just when you thought that Airbnb was only there to find you a nice comfy bed somewhere for the night, it seems they don’t want to miss out on the opportunity to abuse your privacy as well. No, it isn’t hidden cameras in the bedrooms, it's something way more sinister than that!It has come to lightthat users of their app who...
Before the data bandits and peddlers got access to and made use of our personal information, advertising companies would use a scatter gun approach to find their target audiences. One of the few tools they had at their disposal would be different TV time slots. Sweets and chocolates were advertised around the time that kids got home from school and...
New research raises some concerns The issues with virtual location servers VPN service providers promote online security and anonymity. They claim to not keep logs and provide high speed downloading by effectively providing you access to the nearest 'virtual' server. That server, however, may not be that close geographically. To address that, some ...