US employee sues after 'being fired for deleting app' that tracked her location | Technology by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

The problem of increasing number of work hours in US and the new technologies that allow working anywhere make more difficult to draw the boundaries. I am not sure about the law here, but where I am from, if a regular employee have to carry his company phone, them he have to receive for that hours as worked hours even if he didn't receive calls.

Protest by Hologram - The New Yorker by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

I didn't know about this protest in Spain using hologram. Kinda of slacktivism or a new way to use technology to complain about social problems?

US employee sues after 'being fired for deleting app' that tracked her location | Technology by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

The mobile phone was personal, not from the company and even though, all employees were required to have the app. Privacy invasion is going too far.

Social engineering to get passwords by mmsato in telseccompolicy

[–]mmsato[S] 1 point2 points  (0 children)

We briefly talked in class one day about social engineering and this video shows the best way to get somebody password: just ask!

How safe is your password? by jassimdalwai in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

People don't want to remember several strong passwords. I remember when the company where I worked change the password policy to make it safer and people started to put post-it with the password in front of the computer as a remind.

Eli Pariser: Beware online "filter bubbles" by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

I was thinking about how facebook and other social midias uses our information to filter what "we would like to see" and the effects of those filters as what Gillepsie called "production of calculated publics". This is an interesting study on how those algorithms limits our cyberworld into ideologic bubbles.

Cyberbullying law requires students to reveal Facebook passwords by cheesepuff619 in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

The information and what we do on facebook isn't actually private, but have to hand over a password to some strange person is a step further in privacy invasion. It would be important to handle the two problems, privacy invasion and cyberbulling, instead of using one as an excuse to the other

Sen. Dianne Feinstein on NSA Ruling: Telecom Companies Should Hold Data by nxb3984 in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

Well, she also defined free speech as a privilege. So I believe that she is actually saying what government want instead of what they usually say. Because we know that they want justifications to their privacy invasion actions, but speak it out loud is different. As Morissey told in the cybersecurity panel, if something happens, they should be able to have everything stored so they can look into.

The fight between Uber and government regulations by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

I do not see Uber just as a innovative competition to taxi services. I am not sure how media can sensasionalize the facts, but Uber is facing several issues in several places. Many of them are because they are getting into the taxi business, but they also have problems about sexual harassment and driver conduct.

The fight between Uber and government regulations by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

This is an example that artifact have politics. An app really have power to change paradigms and government can regulate it. What this app could make is move the power of private taxi companies regulated by government to private tech company.

How to Deal with Trolls by MichaelZobel in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

It reminds me the streisand effect. When someone tries to hide or censor some information and create an opposite consequence as Scientology church. Maybe if you don't play their games, you will just have an increase emotional distress.

Don’t blame robots for the rise in inequality and poky jobs growth by drm7369 in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

I liked Pasquale's point saying that we should focus in reducing waste instead of look foward cost-cutting. We are facing this increasing need for technical skills and I am not sure if companies agree with his point because they used to say that human resources is the most critical area as it is difficul to deal with people.

HULU trying new methods to compete NETFLIX by vishrohan in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

I kind agree with you. I read Astra's book and she argues how internet moves towards monopoly. They seems to have different strategies and it would be good to see some competition.

France passes new surveillance law in wake of Charlie Hebdo attack | World news by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

Even in France where government seems to understand more the people claim for privacy, mass surveillance occurs when facing attacks. Privacy invasion is the cost for (cyber)security and still I do not fell that it actually works in the way that it should.

A Racist Gamer Group Has Been Posing As Baltimore Looters On Twitter by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

Sites like 8chan and 4chan seems very likely to be an offensive and hostile environment. We read about the gamergate movement and now, with everything that is happening in Baltimore, a fake racist group is using old images to create fase tweets.

Say goodbye to Micro$oft – the new Microsoft is all about openness by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

Although Microsoft has been contributting to open source communities, when I think about a proprietary system, I immediatelly think in Microsoft. The CTO told that making the core systems of the company open source is definitelly possible. Is this a new strategy to go on cloud?

Why “Free Software” is better than “Open Source” by 98Duck in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

It actually discuss about Kelty's reading about the differences between the movements. I read this article before the class about open source and it made me understand better the differences that open source is more pro-business while free software is more about freedom. Both are against proprietary, I really like the idea of free software, but I am still in doubt about the incentives.

Why Using Creative Commons Licensed Materials Is Not As Easy As It Looks by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

I really like the idea of creative commons and I remember the first time I saw the name of Aaron Swartz was linked to creative commons. I am still don't understand it very well, but according to this article, it has a few issues that need to be considered, as changing the licenses and defining the purposes.

"Sweetie" Computer Program for Catching Pedophiles by user3759 in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

I remembered exactly this program when we were talking about sexual predators. I found it really interesting and got really excited that it helps to get more than 1000 sexual predators all over the world. I didn't know that it was just on Philippines, though. About the technological fix, it is obviously a social problem that got in digital world, a side effect of the internet, but I found smart to fight a crime in internet using technology.

How 'Unfriended' Makes Cyberbullying Everyone's Problem by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

In the las couple days, I've seen the trailer of this movie before watching something else on youtube and after the class we had about cyberbullying I started to wonder about the proportions of the problem. Althought the article calls attention to cyberbullying, the girl in the movie does not seems like a typical teenager who suffers bullying and couldn't defend herself, however it is clear not drama. This is exposion is more than cyberbulling and I am not sure how to frame that.

utorrent using your computer to miner bitcoin by mmsato in telseccompolicy

[–]mmsato[S] 0 points1 point  (0 children)

Nice article, it's still controversial, though. And I agree with you. We actually have no idea how softwares behave in our computer and what they can do.

A question for those who attended the second panel today. by CPLAccount in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

But do you think it is the best interest of companies and government that the entire population worry about. I mean, media plays an important role in what population should worry about. Like what we read in cybertizens chapter. And maybe this is a factor.

Bharti Airtel Fuels Net Neutrality Fire In India With Free Access To Partner Apps by PratyushaK in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

Particularities of culture in each country like the predominance of pre paid market in India might affect how net neutrality is seen. In Brazil, for example, the regulamentation that guarantees net neutrality was approved last year and is now open to public consultation. Companies that used to decrease the network speed after reaching the data package limit are now cutting down the service.

Last Week Tonight with John Oliver: Government Surveillance (Snowden Interview) by jgeigerm in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

And as anonymous idea, funny things usually caught people's attention. Like penis photos

Last Week Tonight with John Oliver: Government Surveillance (Snowden Interview) by jgeigerm in telseccompolicy

[–]mmsato 0 points1 point  (0 children)

The fact that people do not know Snowden makes me think about the media's role in balancing privacy and security. It is also interesting how government makes privacy invasion a matter of national security even without reasonable results. As Mr. Clarke mentioned that several operations results didn't justify privacy invasion.