|
My cousin is a chemistry lecturer. He recently turned up at a beer festival wearing a t-shirt that read:
"If you get with me, you'll be Fe2Mg5Si8O22(OH)2[^]"
Thus proving that nerds aren't limited to IT.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
/ravi
|
|
|
|
|
What do you get when you cross a joke with a rhetorical question?
The metaphorical solid rear-end expulsions have impacted the metaphorical motorized bladed rotating air movement mechanism.
Do questions with multiple question marks annoy you???
|
|
|
|
|
|
|
Is the basic unit of laryngitis the hoarsepower?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
|
|
That's a bunch of road apples!
Mongo: Mongo only pawn... in game of life.
|
|
|
|
|
Might be, you have such strange units, after all.
|
|
|
|
|
That comment was pretty hard to swallow.
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "As far as we know, our computer has never had an undetected error." - Weisert | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
|
What did you expect? They've got to pay Taylor Bloody Swift somehow!
|
|
|
|
|
Rather disconcerting but my reading of this:
"With your permission, we may collect information stored on your mobile device [ ... ]"
is that my permission is not mandatory...
Life is too shor
|
|
|
|
|
That's what they want you to think!
The article points however that there doesn't appear to be any mechanism by which your permission may be granted or denied. The implication would appear to be that if you use Spotify you are giving tacit consent for all this stuff and more. It looks like a return to the days when opening the box committed you to all kinds of conditions that were only listed inside it!
|
|
|
|
|
Today's permission is tomorrow's Terms of Service*
*Win XI ?
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "As far as we know, our computer has never had an undetected error." - Weisert | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
That's usually code for "if you don't give us all imaginable permissions, the app will refuse to work". Sometimes that only means that you have to give permission on install but you can then revoke permission and it doesn't notice, but that particularly annoying ones keep checking.
So what we actually need is a way to say "sure, sure.. I'll allow it.." and then actually disallow it in a way that is undetectable to the app/site/whatever. Actually, extend that a bit: give an option to lie - for example "share location data" but then pretend to be at some configurable place unrelated to where you actually are.
|
|
|
|
|
And yet people will bitch and whine about what NSA does.
Damn - at least they (try) to keep it to themselves!
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "As far as we know, our computer has never had an undetected error." - Weisert | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
|
Apologizes for "creating confusion" and "not communicating better what these policies mean".
Does not apologize for the policies.
A lot of this seems to be about future potential features.
The intensity of what permission is required goes down throughout the document.
De-identifying is known to be weak[^].
|
|
|
|
|
The problem is the features they suggest they might implement, people will like, but the permissions required, in the wrong hands could be very intrusive.
The question really is, how much do you trust them? That's if it really matters, is there really such thing as privacy any more anyway?
|
|
|
|
|
Its not necessarily them you need to worry about. Once the data has been collected, then there's always the possibility of unauthorized access. That's true if the data is in the cloud, on a server, or in a locked file cabinet in the office basement.
The question isn't so much how much do you trust them, but how much do you trust their security, and how valuable might the data be to motivated third parties?
|
|
|
|
|
What data?
I have a flip phone.
...yes they still make them, mine cost a hefty $12.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
A friend of mine started a new job this week that required him to have a smart phone. He was still using flip phones until last Wednesday.
|
|
|
|
|
So I'm the last one then?
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|