Head Belly Root
Notes Privacy Is Hard Creative Commons License
Chapter 6

Your Data Is Safe With Us

  1. S. Schuemie, "Google Start Privacy Tour in Leiden," Sleutelstad, March 22, 2017.
  2. Part of this section is based on material I wrote earlier; see J.-H. Hoepman, "De wereld volgens Google," XOT (blog), May 29, 2017.
  3. The original website, https://privacy.google.nl/ now redirects to https://safety.google, as further evidence that Google sees privacy as a safety issue.
  4. NOS Nieuws, "Charme-offensief Facebook: grote privacy-advertentie in Nederlandse kranten," April 17, 2018.
  5. J. Powell, "Your Privacy Is Our Business," New York Times, April 27, 2019.
  6. J.-H. Hoepman, "Lessons to Be Learned from the Polar Incident," XOT (blog), July 9, 2018.
  7. D. Tokmetzis, M. Martijn, R. Bol, and F. Postma, "Here's How We Found the Names and Addresses of Soldiers and Secret Agents Using a Simple Fitness App," De Correspondent, July 8, 2018.
  8. J. Hsu, "The Strava Heat Map and the End of Secrets," Wired, January 29, 2018.
  9. Privacy International, "No Body's Business but Mine: How Menstruation Apps Are Sharing Your Data," September 9, 2019.
  10. M. Green, "How Safe Is Apple's Safe Browsing?," A Few Thoughts on Cryptographic Engineering (blog), October 13, 2019.
  11. The privacy protection of this scheme is good but not perfect, as it does leak information over time that a malicious provider of such a safe browsing system could exploit. See T. Gerbet, A. Kumar, and C. Lauradoux, "A Privacy Analysis of Google and Yandex Safe Browsing," in 46th Annual IEEE/IFIP International Confer- ence on Dependable Systems and Networks, DSN 2016 (IEEE Computer Society, 2016), 347–358.
  12. A. Hern, "Apple Contractors 'Regularly Hear Confidential Details' on Siri Recordings," Guardian, July 26, 2019.
  13. See TensorFLow .
  14. We will not discuss these further in the text, but good books on the subject include the following: F. Pasquale, The Black Box Society: The Secret Algorithms That Control Money and Information (Cambridge, MA: Harvard University Press, 2016); C. O'Neill, Weapons of Math Destruction: How Big Data Increases Inequality and Threat- ens Democracy (New York: Crown, 2016). There are also dedicated conferences to the topic, like the ACM Conference on Fairness, Accountability, and Transparency (ACM FAT).
  15. For example, Mydex or Qiy.
  16. J.-H. Hoepman, "Digitale kluis is doos van Pandora," XOT (blog), April 4, 2001.
  17. See Solid.
  18. See Tim Berners-Lee, "One Small Step for the Web...," Medium, September 29, 2018.
  19. A. Robertson, "Twitter Is Funding Research into a Decentralized Version of Its Platform," Verge, December 11, 2019.
  20. This section is partially based on previous work. See J.-H. Hoepman, "Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing," XOT (blog), March 25, 2020; J.-H. Hoepman, "Google Apple Contact Tracing (GACT): a wolf in sheep's clothes," XOT (blog), April 19, 2020.
  21. P. Mozur, R. Zhong, and A. Krolik, "In Coronavirus Fight, China Gives Citizens a Color Code, with Red Flags," New York Times, March 1, 2020.
  22. L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-Dörner, M. Parker, D. Bonsall, and C. Fraser, "Quantifying SARS-CoV-2 Transmission Suggests Epidemic Control with Digital Contact Tracing," Science, March 31, 2020.
  23. J. Bay, "Automated Contact Tracing Is Not a Coronavirus Panacea," Medium, April 11, 2020.
  24. C. Troncoso et al., Decentralized Privacy-Preserving Proximity Tracing, white paper (DP-3T Consortium, May 25, 2020). See also Googel. and Apple.
  25. S. Vaudenay, Analysis of DP3T, Cryptology ePrint Archive, report 2020/399, April 8, 2020.
  26. See the Facebook Investor Relations Quarterly earnings page.
  27. See the Alphabet Investor Relations Earnings page.
  28. See "The Federal Budget in 2017: An Infographic".
  29. Central Intelligence Agency, "The World Factbook," November 17, 2019.
  30. J. Frederik and M. Martijn, "The New Dot Com Bubble Is Here: It's Called Online Advertising," De Correspondent, November 6, 2019.
  31. S. Guha, B. Cheng, and P. Francis, "Privad: Practical Privacy in Online Advertising," in Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2011, ed. D. G. Andersen and S. Ratnasamy (USENIX Association, 2011); V. Toubiana et al., "Adnostic: Privacy Preserving Targeted Advertising," in Proceedings of the Network and Distributed System Security Symposium, NDSS 2010 (Internet Society, 2010).
  32. Zuboff, The Age of Surveillance Capitalism.
  33. M. Veale, "A Critical Take on the Policy Recommendations of the EU High-Level Expert Group on Artificial Intelligence," European Journal of Risk Regulation, January 23, 2020.
  34. E. Morozov, "Capitalism's New Clothes," Baffler, February 4, 2019.
  35. J.-H. Hoepman, " Stop the Apple and Google Contact Tracing Platform (or Be Ready to Ditch Your Smartphone)," XOT (blog), April 11, 2020.
  36. T. Sharon, "When Google and Apple Get Privacy Right, Is There Still Something Wrong?," Medium, April 15, 2020; M. Veale, "Privacy Is Not the Problem with the Apple-Google Contact-Tracing Toolkit," Guardian, July 1, 2020.
  37. See Oliver Widder, Geek & Poke.