New Internet-Privacy Bill to address Ad Tracking or Online-Data Collection

digital-ad industry says that if it passes it could mean ‘Facebook won’t be free’

Tennessee Congresswoman Martha Blackburn says she wants to give consumers control of their internet experience.

She’s introduced a bill — the “BROWSER Act” — that would require internet users to actively opt in to say yes to any sort of ad tracking or online-data collection.

“Facebook won’t be free,” said Scott Howe, CEO of the data company Acxiom. Acxiom collects consumer data on millions of Americans — where they live and the kinds of things they shop for — that marketers and media companies use to target consumers and deliver more-relevant ads. So it’s looking out for any legislation in this realm closely.
Continue reading New Internet-Privacy Bill to address Ad Tracking or Online-Data Collection

Students do what Social Giants drag ass on

While Facebook, Google, Yahoo and other Social Media Giants debate on whether blocking fake news on their services will be bad enough for their bottom line (because they make revenue for clicks on their sites and traffic flow) instead of focusing on the greater good for their users and society on a whole, a group of college Students have stepped up on done their job for them. Continue reading Students do what Social Giants drag ass on

Most Common Internet Acronyms

#

  • 143 – I love you
  • 2 – To
  • 20 – Location
  • 24/7 – Twenty-four hours a day, seven days a week
  • 411 – Information

A

  • AFAIK – As far as I know
  • AFK – Away from keyboard
  • AIM – AOL Instant Messenger
  • AKA – Also known as
  • AM – Antemeridian
  • AOL – America Online
  • ASAP – As soon as possible
  • ASL – Age, sex, location
  • ATM – At the moment

B

  • b/c – Because
  • b/w – Between
  • b4 – Before
  • BBIAB – Be back in a bit
  • BBL – Be back later
  • BCC – Blind carbon copy
  • bf – Boyfriend
  • BFF – Best friends forever
  • Bling – Overly flashy jewelry
  • blog – Web log
  • BRB – Be right back
  • BTW – By the way
  • Buck – Dollar

C

  • Cab – Taxi
  • CC – Carbon copy
  • CTN – Can’t talk now
  • cya – See ya
  • CYE – Check your e-mail

D

  • Dis – Disrespect
  • DIY – Do it yourself
  • dl – Download

E

  • ETA – Estimated time of arrival

F

  • f – Female
  • FAQ – Frequently Asked Questions
  • fb – Facebook
  • FUBAR – Fouled up beyond all recognition
  • fwd – Forward
  • FWIW – For what it’s worth
  • FYI – For your information

G

  • Gamer – Video game player
  • gf – Girlfriend
  • GG – Good game
  • GJ – Good job
  • GL – Good luck
  • GLHF – Good luck have fun
  • GPS – Global positioning system
  • gr8 – Great
  • GTG – Got to go

H

  • HOAS – Hold on a second
  • HTH – Hope this helps
  • hw – Homework

I

  • IAC – In any case
  • IC – I see
  • IDK – I don’t know
  • IIRC – If I remember correctly
  • IKR – I know, right?
  • IM – Instant Message
  • IMO – In my opinion
  • info – Information
  • IRT – In regards to

J

  • J/K – Just kidding

K

  • K – OK

L

  • L8 – Late
  • l8r – Later
  • LAN – Local Area Network
  • LMAO – Laughing my a** off
  • LMK – Let me know
  • LOL – Laughing out loud

M

  • m – Male
  • MIRL – Meet in real life
  • MMB – Message me back
  • MMO – Massively multiplayer online
  • Mooch – Freeload
  • msg – Message
  • MYOB – Mind your own business

N

  • N/A – Not Available
  • NC – No comment
  • ne1 – Anyone
  • NM – Not much
  • noob – Newbie
  • NP – No problem
  • NTN – No thanks needed

O

  • od – Overdose
  • OMG – Oh my gosh
  • OMW – On my way
  • OT – Off topic

P

  • PC – Personal computer
  • PHAT – Pretty hot and tempting
  • PK – Player Kill
  • pls – Please
  • PM – Postmeridian
  • POS – Parent over shoulder
  • ppl – People
  • pwn – Own

Q

  • qt – Cutie

R

  • re – Regarding
  • ROFL – Rolling on floor laughing
  • ROTFL – Rolling on the floor laughing
  • RPG – Role playing game
  • RSVP – Répondez s’il vous plaît
  • RTFM – Read the flippin’ manual

S

  • sec – Second
  • SMH – Shaking my head
  • SMS – Short Message Service
  • SOS – Someone over shoulder
  • Sry – Sorry
  • sup – What’s up

T

  • TBA – To be announced
  • TBC – To be continued
  • TBD – To be determined
  • TC – Take care
  • thx – Thanks
  • TIA – Thanks in advance
  • TLC – Tender love and care
  • TMI – Too much information
  • Troll – Offensive comments poster
  • TTFN – Ta-ta for now
  • TTYL – Talk to you later
  • Tweet – Twitter post
  • txt – Text
  • TY – Thank you

U

  • u – You
  • U2 – You too
  • ugh – Disgusted
  • UR – Your

V

  • VM – Voicemail
  • vs – Versus

W

  • w/ – With
  • w/e – Whatever
  • w/o – Without
  • W8 – Wait
  • WB – Write back
  • Whoa – Expression of surprise
  • WTF – What the f***

X

  • XOXO – Hugs and kisses

Y

  • Y – Why
  • YOLO – You only live once
  • YW – You’re welcome

Z

  • ZZZ – Sleeping

The singularity – Will it Happen?

What is the singularity?

I honestly was not aware of this topic so I set out to do some research to open my mind and man was my mind blown. Basically what I understand is that the singularity is a point in time when technology will surpass human intelligence and humans will start to become the minority in intelligence.

Vernor Vinge introduced the term Technological Singularity in his science fiction novel Marooned in Realtime(1986) and later developed the concept in his essay the Coming Technological Singularity (1993). His definition of Singularity is widely known as the event horizon thesis and in essence says that trans or post-human minds will imply a weirder future than we can imagine:

“Within thirty years, we will have the technological means to create superhuman intelligence. Shortly after, the human era will be ended. […] I think it’s fair to call this event a singularity. It is a point where our models must be discarded and a new reality rules. As we move closer and closer to this point, it will loom vaster and vaster over human affairs till the notion becomes a commonplace. Yet when it finally happens it may still be a great surprise and a greater unknown.” (1)

Continue reading The singularity – Will it Happen?

How do I block or unblock an app in Facebook?

Been getting a lot of app request lately. I do not do the apps thing as you never know what you are getting when allowing these apps access to your account. With Timeline it became a bit of a hassle to block apps, so here is how to do just that with little work.
Blocking an app means it won’t be able to access any information about you from Facebook or send you any requests.If you received a request for an app, and you want to block the app:

  1. Go to the App Center
  2. Click the X button next to the request
  3. When you see the yellow box, click the Block (App Name) link

You can add and manage your blocked apps in the Blocked People and Apps section of your Privacy Settings Page.

To block an app you haven’t received a request from:

  1. Navigate to your Privacy Settings Page
  2. Click Manage Blocking across from Blocked People and Apps
  3. In the Block Apps section, type in the app’s name

To unblock an app:

  1. Navigate to your Privacy Settings Page
  2. Click Manage Blocking across from Blocked People and Apps
  3. In the Block Apps section, find the app you want and click Unblock

Note: You’ll need to grant the app permissions again if you would like to re-add it to your profile (timeline).

Big Data Is Just a Big Scam

The newly emergent “big data” meme has never been defined in any meaningful and definitive way. It’s the most amorphous new buzz-term that I’ve seen for a decade. It’s one of those “eye of the beholder” terms used to liven up a seminar and eventually soak investors.

Let’s start by asking what does big data mean? Lots of data? More data than you can handle? Amorphous data? Out of control data? Useful data for analysis? Useless data? Information overload?

If you read enough about big data, it is all of the above and more. The key is not the data, but the challenge of how to handle the data and what to do with the data itself.

In other words, how can we make this huge pile of data, that we have managed to accumulate, be useful in new and profitable ways? The data pools can come from anywhere via various computing mechanisms such as Facebook posts, NSA logs, mailing lists, customers, etc.

I would argue that most readers of this column are themselves repositories of big data. I just bought a 3 Terabyte drive for backup. I have a lot of data to back up! Big data!

From what I can tell, what Big Data does best is spy on individuals.

A useful tool I can imagine would be a big data analysis tool that the police could use to find you guilty of some random crime by going through your files. Or at least find something that would embarrass you. Big data!

This all harkens back to a comment made by a former CEO of American Express, who told an audience that if the company wanted to (and this applies to all credit card companies) it could use your personal buying habits and tendencies to put together a complete dossier and definitely tell if you are having an affair or not. Big data!

None of this sounds good or healthy for the society. Jumping to conclusions, making assumptions, acting on false assumptions. Hounding the public with useless advertisements.

Full Article

Relationship drama: “Ask” button controversy shows Facebook is for stalking, not interrogations

Facebook can sometimes seem like a digital microcosm of your entire life. It’s where you share snippets of personal information with your friends (and the company’s advertising network), chat with everyone you’ve ever met, and make any major life development “Facebook official.” But the harsh dismissal of a new feature allowing Facebook users to ask friends if they are in a relationship when they haven’t told Facebook yet, shows that the service still has its own rules of etiquette — and that it’s not a perfect replica of the real world.

The feature works like this: someone notices that a friend hasn’t filled out the “relationship status” section of their profile, then messages that friend by clicking on a special “ask” button. After the initiator of the request explains why they want to know if the friend is single or not, the friend decides whether to respond, either privately or publicly. It’s basically a private messaging tool made for one type of conversation.

That question wouldn’t seem strange outside of Facebook. People ask each other about their relationships all the time — it’s hardly a taboo subject. But according to the reaction to the feature from sites like Slate, Time, and Jezebel, a feature made for asking Facebook users about their love lives is stranger than Facebook’s new drone-powered future. A betting man probably would have thought that a social network using flying robots to provide Internet access would be stranger than this “ask” button, but it looks like he would have been wrong.

Continue reading

Customizing Firefox

What are Extensions?

Extensions or plug-ins add extra functionality to Firefox. Simply put, they are extra apps that give Firefox some extra bells and whistles to make it yours. You can get add-ons that do just about anything like check the weather, listen to music, update your social accounts.

There are three types of extensions:

Extensions

Extensions add new features to Firefox or modify existing ones. There are extensions that allow you to block advertisements, download videos from websites, integrate Firefox with websites like Facebook or Twitter, and even add features from other browsers.

Appearance

There are two types of appearance add-ons:

  1. complete themes, which changes the look of buttons & menus,
  2. background themes, which decorate the menu bar and tab strip with a background image.

Plug-ins

Plug-ins let you add support for all kinds of Internet content. These usually include patented formats like Flash, QuickTime, and Silverlight that are used for video, audio, on-line games, presentations, and more. Plug-ins are created and distributed by other companies. Continue reading Customizing Firefox

The Heartbleed Bug

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

How to stop the leak?

As long as the vulnerable version of OpenSSL is in use it can be abused. Fixed OpenSSL has been released and now it has to be deployed. Operating system vendors and distribution, appliance vendors, independent software vendors have to adopt the fix and notify their users. Service providers and users have to install the fix as it becomes available for the operating systems, networked appliances and software they use.

What is being leaked?

Encryption is used to protect secrets that may harm your privacy or security if they leak. In order to coordinate recovery from this bug we have classified the compromised secrets to four categories: 1) primary key material, 2) secondary key material and 3) protected content and 4) collateral.

What is leaked primary key material and how to recover?

These are the crown jewels, the encryption keys themselves. Leaked secret keys allows the attacker to decrypt any past and future traffic to the protected services and to impersonate the service at will. Any protection given by the encryption and the signatures in the X.509 certificates can be bypassed. Recovery from this leak requires patching the vulnerability, revocation of the compromised keys and reissuing and redistributing new keys. Even doing all this will still leave any traffic intercepted by the attacker in the past still vulnerable to decryption. All this has to be done by the owners of the services. Continue reading The Heartbleed Bug