Étiquette : privacy by design (Page 1 of 2)

#StopCovid : une efficacité incertaine pour des risques réels

“Nous devrions éviter de faire porter à nos concitoyens un dilemme moral : serions non fautifs si nous ne téléchargeons pas cette application? La pression sociale ou le sentiment de culpabilité pourrait faire naître un consentement induit, indirectement contraint.”

Source : #StopCovid : une efficacité incertaine pour des risques réels

GitHub – DP-3T/documents: Decentralized Privacy-Preserving Proximity Tracing — Documents

data_protection_privacy_figure1_phases_of_decentralized_contact_tracing.jpg

“Decentralized Privacy-Preserving Proximity Tracing This repository contains a proposal for a secure and decentralized privacy-preserving proximity tracing system. Its goal is to simplify and accelerate the process of identifying people who have been in contact with an infected person, thus providing a technological foundation to help slow the spread of the SARS-CoV-2 virus. The system aims to minimise privacy and security risks for individuals and communities and guarantee the highest level of data protection.”

Source : GitHub – DP-3T/documents: Decentralized Privacy-Preserving Proximity Tracing — Documents

PACT: Private Automated Contact Tracing

“Our team at MIT, working with partners from around the world, has developed a system for identifying people at risk of infecting COVID-19, by using the Bluetooth signals that our cell phones send each other. Privacy is a bedrock value so our system can notify individuals of potential contacts without revealing any private information to other individuals, the government, health care providers, or cell service providers.”

Source : PACT: Private Automated Contact Tracing

CCC | 10 requirements for the evaluation of « Contact Tracing » apps

Header

“In principle, the concept of a « Corona App » involves an enormous risk due to the contact and health data that may be collected. At the same time, there is a chance for « privacy-by-design » concepts and technologies that have been developed by the crypto and privacy community over the last decades. With the help of these technologies, it is possible to unfold the epidemilogical potential of contact tracing without creating a privacy disaster. For this reason alone, all concepts that violate or even endanger privacy must be strictly rejected. In the following, we outline social and technical minimum requirements for such technologies. The CCC sees itself in an advisory and observation role in this debate. We will not recommend specific apps, concepts or procedures. We however advise against the use of apps that do not meet these requirements.”

Source : CCC | 10 requirements for the evaluation of « Contact Tracing » apps

Your features improve while your data stays private.

“When we use data to create better experiences for you, we work hard to do it in a way that doesn’t compromise your privacy. One example is our pioneering use of Differential Privacy, where we scramble your data and combine it with the data of millions of others. So we see general patterns, rather than specifics that could be traced back to you. These patterns help us identify things like the most popular emoji, the best QuickType suggestions, and energy consumption rates in Safari.”

Source : Privacy – Apple

California Is Making It Illegal for Devices to Have Shitty Default Passwords

“Under the new law, all new internet-connected devices made or sold in California with a default password will be required to make that password unique and secure for every single device. That means no more devices shipped with username/password combos of “admin/admin,” for example. It’s far from a panacea—and really, why aren’t you using a password manager already—but it’s a step towards at least a minimal baseline of security in our internet-of-things addled future.”

Source : California Is Making It Illegal for Devices to Have Shitty Default Passwords – Motherboard

Changer notre approche en matière de lutte contre le pistage – Section Presse Mozilla

“Le blocage des publicités popup dans la version originale de Firefox était un bon choix en 2004, parce qu’il améliorait le confort des utilisateurs et donnait aux plates-formes publicitaires de l’époque une raison de se soucier de l’expérience délivrée. En 2018, nous espérons que nos efforts pour donner plus de contrôle aux utilisateurs auront le même effet”.

Source : Changer notre approche en matière de lutte contre le pistage – Section Presse Mozilla

Google Home, Amazon Echo : comment effacer tout ce que vous avez dit à votre assistant personnel

“Et Apple alors ? Eh bien Apple ne conserve pas vos conversations. Elles sont traitées et supprimées. Cela signifie que vous n’avez pas d’historique”.

Source : Google Home, Amazon Echo : comment effacer tout ce que vous avez dit à votre assistant personnel – Tech – Numerama

« Older posts

© 2020 no-Flux

Theme by Anders NorenUp ↑