“Since the launch of iOS 13 last fall, the amount of background location data that marketers collect has dropped by 68% according to Location Sciences, a firm that helps marketers analyze location data.”
“La Présidente de la CNIL met en demeure les sociétés EDF et ENGIE en raison du non-respect de certaines des exigences relatives au recueil du consentement à la collecte des données de consommation issues des compteurs communicants LINKY, ainsi que pour une durée de conservation excessive des données de consommation.”
“Companies and governments are gaining new powers to follow people across the internet and around the world, and even to peer into their genomes. The benefits of such advances have been apparent for years; the costs — in anonymity, even autonomy — are now becoming clearer. The boundaries of privacy are in dispute, and its future is in doubt. Citizens, politicians and business leaders are asking if societies are making the wisest tradeoffs. The Times is embarking on this monthslong project to explore the technology and where it’s taking us, and to convene debate about how it can best help realize human potential.”
“Neither patients nor doctors have been notified. At least 150 Google employees already have access to much of the data on tens of millions of patients, according to a person familiar with the matter and the documents. In a news release issued after The Wall Street Journal reported on Project Nightingale on Monday, the companies said the initiative is compliant with federal health law and includes robust protections for patient data. Some Ascension employees have raised questions about the way the data is being collected and shared, both from a technological and ethical perspective, according to the people familiar with the project. But privacy experts said it appeared to be permissible under federal law. That law, the Health Insurance Portability and Accountability Act of 1996, generally allows hospitals to share data with business partners without telling patients, as long as the information is used “only to help the covered entity carry out its health care functions.””
“Facebook avait précisé que les données transmises aux scientifiques sélectionnés seraient anonymisées. Mais il est techniquement très compliqué de le faire totalement sur de vastes jeux de données personnelles. Par le biais de croisements et de recoupements, il est possible de réidentifier des internautes pourtant « anonymes », comme l’avaient montré, dès les années 2000, des recherches effectuées à partir d’une fuite de données issues du moteur de recherche d’AOL. Pour limiter ces risques, Facebook avait annoncé travailler à une anonymisation dite « différentielle » des jeux de données, censée régler le problème. C’est ce nouveau processus qui « a pris plus de temps que prévu », explique le réseau social.”
“le projet Kivaou, financé par l’Agence nationale de la recherche et piloté par Sagem (désormais Safran) et le ministère de l’intérieur, a été conçu pour mettre au point un « outil de surveillance embarqué permettant d’indexer au fil de l’eau tous les passants et d’enregistrer leur biométrie faciale ». Selon nos informations, des enquêteurs ont parfois profité de ces expérimentations pour faire progresser leurs investigations.[…]
« La plus-value policière de cette technologie [reconnaissance faciale] ne fait aucun doute », peut-on lire dans une récente note du Centre de recherche de l’école des officiers de la gendarmerie. Selon son auteur, elle pourrait même « mettre fin à des années de polémiques sur le contrôle au faciès, puisque le contrôle d’identité serait permanent et général ».”
“ The UpGuard Cyber Risk team can now report that two more third-party developed Facebook app datasets have been found exposed to the public internet. One, originating from the Mexico-based media company Cultura Colectiva, weighs in at 146 gigabytes and contains over 540 million records detailing comments, likes, reactions, account names, FB IDs and more. This same type of collection, in similarly concentrated form, has been cause for concern in the recent past, given the potential uses of such data.”
“Around 250 bounty hunters and related businesses had access to AT&T, T-Mobile, and Sprint customer location data, according to documents obtained by Motherboard. The documents also show that telecom companies sold data intended to be used by 911 operators and first responders to data aggregators, who sold it to bounty hunters. The data was in some cases so accurate that a user could be tracked to specific spots inside a building.”
“The tool, called LPAuditor (short for Location Privacy Auditor), exploits what the researchers call an « invasive policy » Twitter deployed after it introduced the ability to tag tweets with a location in 2009. For years, users who chose to geotag tweets with any location, even something as geographically broad as “New York City,” also automatically gave their precise GPS coordinates. Users wouldn’t see the coordinates displayed on Twitter. Nor would their followers. But the GPS information would still be included in the tweet’s metadata and accessible through Twitter’s API”.
“Predictim analyzes their digital footprint to accurately assess their level of risk, giving you a complete picture of them that can’t be achieved with only a standard background check.”