In honor of #NCSAM, here are some tips for keeping your accounts and devices safe on the web.
online
Algorithms, Confidence, and Infrastructure
Every so often the Oxford English Dictionary adds new words. It adds them to its online dictionary with far more frequency than its physical tome, given that a physical dictionary is quite a bit more difficult to update. It released a list of new words yesterday, and while a few are new words entirely (bikeable) others are new definitions of familiar words. The “tumblr definition” of ship is recognized (and boy is the tumblr community excited about it) and a definition of thing that accounts for the phrase “is that a thing?”
Daniel Temkin put together an Internet Directory with a scrolling and searchable list of all registered domains with a top level domain name ending in .com
Ted Striphas was interviewed about the effects of algorithms (such as the ones that define the order of google search results, or what shows up in your facebook newsfeed) on culture. As he puts it, “The issue may come down to how comfortable people are with these systems drilling down into our daily lives, and even becoming extensions of our bodies.”
Women, the Web, and the App Takeover
Here’s what was important this week…
Today is Pi day. Here is more than you probably ever wanted to know about pi day.
Last Saturday, March 8 was International Women’s Day. Started as a revolutionary holiday to honor the achievements of women, International Women’s Day is recognized in many countries. However, in Nepal it is recognized by women only, rather than as a day where men pay tribute to the women. Nepal also has another holiday that only women observe:
However, the interesting thing about a cultural distaste and monthly banishment that occurs surrounding menstruation, is that “they talk openly – more openly perhaps than the average teenage girl in the UK might – about what they use for sanitary protection. Some use sanitary pads, some are happy with cloths, although they dry them by hiding them under other clothes on washing lines.”
Identity on the Internet
Anonymity is valuable to the structure of the Internet, but as the identity of a person becomes fluid, the reputations and identifiability of someone’s online presence becomes increasingly valuable. While jobs rely on user-submitted references, as do academic applications, many also turn to your social media presence or to your search results to gauge reputation. Privacy by obscurity, as records are digitized and indexed, is no longer as viable. But, there is no consistent form of identification across the web. Each service relies on its own username as identifier, with character limits abound, and your ability to hold the same username across services relies on both the uniqueness of your username as well as the date you joined the online service. But are usernames outdated? A self-selected identifier, varying from service to service and format to format? As Mat Honan puts it, ““One of the best things about the online world is how it lets us be whoever we want to be. We shouldn’t have to sacrifice that just because someone else got there first.”
The advantage of a username is that, at least within a service, it “refers unambiguously to a particular person”. That works fine if you know the username of the person, but often you may only know their name. Luckily, with services like Facebook, a person’s unique identifier is their name, provided they haven’t pseudonymized it. Once you have connected with that person, you expect (within the relevant online service) when you type in their name, you will be returned with precisely the person you were expecting to find. The difficulty with this system is finding out the username of another person, and confirming that the person with their name online is really the person you’re looking for.
A Narrative of Bits and Pieces
Shortly after the Boston Marathon bombings occurred, and once police identified the accused bombers, the manhunt began. The police and other teams scoured Boston and the surrounding area for the Tsarnaev brothers. Meanwhile, the rest of the country scoured the Internet for their Internet presence. However, this had a new effect in light of the tragedy of the bombing:
The social media droppings the Tsarnaev brothers left behind not only attest to their own immersion in the interactive, electronic world, but they have also provided everyone else with plenty of digital data from which to try to extract patterns and possible meaning — fulfilling that very human need to try to make narrative sense of the tragic and the overwhelming.
(Unraveling Boston Suspects’ Online Lives Link by Link, New York Times)
With the continuing revelations surrounding the extent of NSA surveillance of, and indeed, spying on, Internet traffic and cell phone transmissions, the reality becomes that a more sinister narrative could arise. With the “social media droppings”–combined with location data provided by cell phone metadata, the content and recipients skimmed from our email messages, and decrypted VPN and SSL traffic–a very new, and more elaborate pattern and meaning could be constructed. As Sarah Kendzior points out in her most recent piece for Al Jazeera:
The greatest danger of data collection lies not in the information, but in its interpretation. With billions of pieces of intelligence stored in a given month, the ability to gather data has exceeded the ability to analyse it. The trail supersedes the target. Data becomes its own context.
She goes on to elaborate:
The greatest threat of online surveillance is not that they know us, but that they think they do, and we are hostage to their interpretation. They will spy until “something happens”, and what we naively called “life” will be spit back as evidence.