The MacValley blog


Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.


Tom Briant

The MacValley blog

Editor: Tom Briant


Click here to email Tom

Click here for Tom's profile



To search the blog posts please use the box below

Sunday, June 29, 2014

Sunday Roundup by Senior Correspondent Arnold Woodworth

Apple's 'Kill Switch' Is Deterring iPhone Thieves

How The iPad Air Compares To Samsung's Best Tablet Yet, The Galaxy Tab S

10 iPhone Tricks To Make Your Life Easier

Why Apple really cares about your privacy

I believe the answer is profit, with a smidgen of righteous anger.  Apple likely sees a competitive advantage in privacy.

With every iteration of OS X, iOS, and iCloud, we see Apple add increasing the privacy protections it provides its users

Apple retires Aperture and iPhoto, to be replaced with Photos for OS X

Apple intends the single app to serve the needs of both consumers and professionals. That will be an interesting challenge; it will be intriguing to see how Apple puts all of its photographic eggs in a single basket.

A 13-Year-Old Describes How Kids Are Bullied On Snapchat

Microsoft's new all-in-one tablet, the Surface Pro 3, is near impossible to repair if it breaks, according to the iFixit Teardown review.

Robot Truck Convoy Tests in Nevada; Driverless Trucks Before Cars, and Before the End of the Decade

Will car-hacking become the new carjacking?  Google’s Android Auto raises stakes for smart cars

Google Inc. revealed a new operating system for cars, called Android Auto.

As more cars become connected to the Internet in some capacity and collect and transmit more data, the question becomes all the more real: Will car-hacking become the new carjacking?

The first Android Auto-equipped cars will be available this year.

The average vehicle already contains around 60 microprocessors and more than 10 million lines of software code.

More than half of drivers worry that hackers might figure out how to sneak past the security systems in driverless cars, according to a February survey by Mason, Ohio-based Seapine Software. And with reason: Researchers have repeatedly shown in recent years that it’s possible to hack into connected cars and take control of steering wheels, brakes, engines and accelerators.

Meet The Real Hackers Of Silicon Valley (And NYC, LA, And London)

How Google declared open war against passwords

Hackers Can Record Everything You See With Google Glass

Hackers have already proven smarter than smartphones or just about any other connected electronic device, and soon they’ll hack into your fridge, thermostat, and toilet.

“Hardcore hackers wouldn’t even bother with Google Glass,” said one of the hackers, identified as Bosboom. “They would find access too easy.”

How to Disappear (almost) Completely: the illusion of privacy

Can anyone ever really leave the internet? And if you had the choice, is that something that you'd want to do?

we need to take a long, hard look at how we live our lives online.

the advice of Nathan Borenstein, the original inventor of email and now chief scientist at Mimecast: "It behooves us as individuals to behave as if the battle is lost, and privacy is dead."

It very well may be.

Would you like health insurance companies to know about EVERYTHING you eat?
When you eat junk food?  When you smoke?
When you shop at "plus" size stores?
And increase your insurance payments when they find out?

Every time you purchase something, the business you buy from, and the credit card company, gather information about you (and millions of others) that they can sell to anyone they want - whether you like it or not.

Facebook Search Warrant Disclosure Reveals Scope of Government Requests

Only 62 of the 381 people who were subjected to the searches later had charges brought against them in a disability fraud case.

Facebook's blog post said it was “by far the largest we’ve ever received — by a magnitude of more than ten.” That means the bulk search warrant requests Facebook has responded to in the past have never affected more than 38 people.

Even The Editor Of Facebook's Mood Study Thought It Was Creepy

there's something new-level creepy about a recent study that shows Facebook manipulated what users saw when they logged into the site as a way to study how it would affect their moods. 

Facebook, as a private company, doesn't have to agree to the same ethical standards as federal agencies and universities.

Facebook manipulated people—used them as guinea pigs—without their knowledge, and in a setting where that kind of manipulation feels intimate.

All residents of Estonia aged 15 or over have electronic ID cards, which are used in health care, electronic banking and shopping, to sign contracts and encrypt e-mail, as tram tickets, and much more besides--even to vote.

Estonia's approach makes life efficient: taxes take less than an hour to file, and refunds are paid within 48 hours. By law, the state may not ask for any piece of information more than once, people have the right to know what data are held on them and all government databases must be compatible, a system known as the X-road. In all, the Estonian state offers 600 e-services to its citizens and 2,400 to businesses.

Other governments have tried to issue electronic identity cards. But costs have been high and public resistance strong. Some have proved careless custodians of their citizens' data.

The scheme's advantages for Estonia are multiple. It will help it shed the detested "ex-Soviet" tag and promote itself as a paragon of good government and innovation. It will attract investment: once you have an Estonian ID, setting up a company there takes only a few minutes.

No comments:

Post a Comment



Blog Archive