Understanding the real motivations of Edward Snowden, Glenn Greenwald, and Julian Assange.
David Sanger and Thom Shanker have a lengthy story in the New York Times about various National Security Agency techniques for penetrating foreign computers and networks, including a strategy for accessing seemingly air-gapped computers. Two thoughts:
If you think people shouldn't have access to your email address, you must not remember the phone book.
The fatal flaw in the Obama administration's defense of metadata collection.
The social web used to be about broadcasting your life. Maybe not any more.
Privacy and celebrity aren't particularly well-acquainted concepts. But actors Maggie Gyllenhaal and John Cusack appear in a new PSA video calling for an end to NSA surveillance practices.
It’s the best way to stave off the oncoming onslaught of cyber-attacks.
A tip sheet for the scandals
How should you feel about the latest invasions of privacy? We asked Jeffrey Rosen to give us a tip sheet for the scandals.
Just last Friday, walking down the street, I saw a handmade sign above a dumpster warning passersby not to deposit their trash there. "Smile. You're on camera," said the sign. A few minutes later, reading on my phone, I came across a comment on a story about the NSA that quoted a computer firm executive as telling a crowd at a lecture he was giving, "You have no privacy. Get over it." Then, about twenty minutes after that, I went to send an e-mail on my computer and a little window popped up informing me that Safari, my Web browser, wanted "to access" my stored personal information.