The Battle to Control the Design of New Technologies
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves―even when the odds are deliberately stacked against them.
In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information.
Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of