This Week’s Links (weekly)
eDiscovery lessons from a Russian soldier’s Ukraine pictogram pictures tags: MM LitSupport 10 Malware Removal Apps Tested, Malwarebytes Comes out on Top tags: MM Security Tech The New and Improved...
View ArticleThis Week’s Links (weekly)
New Survey Shows eDiscovery Workload, Predictive Coding Use Increasing tags: LitSupport MM Don’t Stipulate to Not Follow the Form of Production Rules tags: LitSupport MM ILTA 2014: Diversification the...
View ArticleGlenn Greenwald on Why Privacy Matters
I love his response to anyone who suggests that we don’t need privacy if we aren’t doing anything wrong. OK, go ahead and email me the passwords to ALL of your email accounts so I can troll through,...
View ArticleThe Innocent Victims of the Sony Hack
Image by The leaked unreleased movies, and the comments about their movies and stars made within the Sony corporate network are the headlines of the hack that Sony is dealing with right now, but as...
View ArticleWhat I’m Reading (weekly)
5 Dark Sharing Strategies Lawyers Need to Know #DarkShare tags:MM SocNetPres ABA TECHREPORT 2014 tags:LitSupport MM Judge Posner Says NSA Should Be Able To Get Everything & That Privacy Is...
View ArticleHotels Want to Block WiFi devices
In its petition to the FCC, Marriott and the hotel lobby argued that guests can use their smartphones or Mi-Fi devices to launch an attack against a hotel’s Wi-Fi network or threaten other guests’...
View ArticleEFF Releases Privacy Badger as Do Not Track Tool
If you’re concerned about how much tracking is being done as you click around on the internet, and you probably should be, one easy thing you can do is grab Privacy Badger from the Electronic Frontier...
View ArticlePrivacy Badger Blocking Sharing Buttons
As you may know, when the EFF Released Privacy Badger as Do Not Track Tool I was excited to share the news, and curious to see how it worked in real life. On one hand it is a great way to see what...
View ArticleReading – What’s in a Boarding Pass Barcode? A Lot
Image by Honestly, I haven’t given much thought to boarding passes. When I have a printed one, I typically hang on to it and throw it away once I reach my destination, assuming that once the flight...
View ArticleLinked – Beware of ads that use inaudible sound to link your phone, TV,...
“Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person’s online behavior across a range of devices, including...
View ArticleLinked – Facebook quizzes are (still) a privacy threat
An online quiz that illustrates the words you use the most on Facebook as a “word cloud” has gone viral — and it’s a great reminder of why you should be wary of connecting ostensibly fun games with...
View ArticleLinked – FTI – managing social media and audio along with emails and the rest
“The short video which was the trigger for this thought is about Ringtail’s ability to manage social media. It takes as an example a Facebook post with a photograph, Comments, Likes etc, and shows how...
View ArticleLinked – Another Scandal Resulting from E-mails Gone Public
Image by “Our psychology of e-mail doesn’t match the reality. We treat them as ephemeral, even though they’re not. And the archival nature of e-mail — or text messages, or Twitter chats, or Facebook...
View ArticleLinked – After Spending Time As Surveillance Subjects, Intelligence Oversight...
“Once again, it appears the only way to make our nation’s intelligence oversight committees care about surveillance is to include them in the “fun.” Unfortunately, our elected officials aren’t any...
View ArticleWhat’s Next on the Ban List, Curtains?
Image by If you’ve been paying attention to the news lately, it seems that some of the things that innocent people might use to protect themselves from bad people, are being threatened by some faulty...
View ArticleLinked – WhatsApp’s Encryption Could Be The Subject Of The Next Justice...
The newspaper has reported that the Justice Department is weighing how to move forward with an ongoing investigation that has run into trouble because of the service’s encryption. A federal judge had...
View ArticleLinked – 10 Actionable Privacy, Security & Encryption Takeaways From...
These are all good, and it’s even better that these basic security measures are being discussed by the legal sector, finally! 10 Actionable Privacy, Security & Encryption Takeaways From...
View ArticleLinked – US targets burner phones after Brussels attack – Business Insider
Image by “While the encryption debate may have temporarily subsided, burner phones seem to be getting the spotlight.It might be because terrorists aren’t using encryption as much as they are utilizing...
View ArticleThese People Are In Charge of Making Laws About Technology
Granted, it has zero chance of passing as is, but the current bill before the US Senate, The Compliance with Court Orders Act of 2016, would actually make encryption a legal impossibility. The bill,...
View ArticleLinked – The Internet of Things has a dirty little secret
Image by “If Nest wanted to increase profits it could sell your home’s environment data to advertisers. Too cold? Amazon ads for blankets. Too hot? A banner ad for an air conditioner. Too humid?...
View Article