Archive for the ‘Privacy Tech-Know Blog’ Category

25 Oct 2017

Privacy Tech-Know Blog: Seeing A Different World: The Possibilities Associated with Augmented and Virtual Reality


Phones, glasses, and headsets can now all either overlay information on the world we’re looking at or immerse us entirely in imaginary ones. The processes of overlaying information, termed ‘augmented reality’, can be seen when Pokémon appear on our mobile phones, directions appear for nearby restaurants, or our food’s nutritional information is displayed when we point our camera at our plate.

The full immersion into alternate worlds, termed ‘virtual reality’, can let us look around a space, play games with others in simulated cockpits, or climb mountain ranges. Both technologies present novel opportunities to experience the world while simultaneously raising questions about how our data is collected or used. Whereas Augmented Reality (AR) routinely presents information on top of our real-world environment, virtual reality (VR) replaces that environment entirely. The technologies underlying AR and VR share some commonalities but the ways in which they collect and process data are different.

Read the rest of this entry »


21 Aug 2017

Privacy Tech-Know Blog: Cookieless Identification and Tracking of Devices


We are regularly told to block or ‘clear our cookies’, or use a private browsing mode, if we don’t want to be tracked as we visit websites. Website operators and marketing, advertising, and other tracking companies, however, have developed other ways of tracking us, called ‘fingerprinting’, which work even if you clear or block your cookies. How prevalent is this kind of cookieless tracking? How accurate is it? And what are the implications for our ability to control our personal information and protect our privacy interests?

Read the rest of this entry »


17 Jul 2017

Privacy Tech-Know Blog: Can We Still Be ‘Just Another Face In The Crowd’?


Facial recognition technologies can quickly identify who you are by automatically analyzing your facial features. The characteristics of your face (your biometric information) may be collected when you apply for an identity document like a passport, when you get your photo taken for an employee badge, or when you upload photos online to social media websites.

Given how many opportunities there are to record our faces, it is time to ask: can we remain anonymous in a crowd?

Read the rest of this entry »


13 Jun 2017

Privacy Tech-Know Blog: Who’s Watching Where You’re Driving?


When you drive down the road or park your car, have you considered who might be recording where your car was at any given time, and where that information is stored and shared? Public agencies and private companies are using Automated Licence Plate Recognition (ALPR) systems to track vehicles throughout Canada, today.

ALPR systems have privacy implications because they record where specific vehicles are at given times, often without the driver realizing that such information is being captured.

Read the rest of this entry »


6 Mar 2017

Privacy Tech-Know Blog: Let me virtually assist you


The way we interact with our digital devices has evolved over time: from specific commands in command line interfaces, to graphical user interfaces (GUIs), to touch-based interfaces. Virtual assistants (VAs) are the next step in this evolution, and they present new privacy challenges. These assistants, such as Siri (Apple), Alexa (Amazon), Cortana (Microsoft), or simply ‘Google’, are designed to respond to your spoken or written commands and take some action. Such commands let you place phone calls, order a car service, book a calendar appointment, play music or buy goods.

The use of these assistants is on the rise: a 2015 Gartner study found that 38 per cent of Americans had used a virtual assistant in 2015 and that two-thirds of customers in developed markets would use them daily in 2016. The most commonly-used VAs are voice-based, however, much of the presented information also applies to text-based VAs.

Read the rest of this entry »


10 Feb 2017

Privacy Tech-Know Blog: The actual privacy benefits of virtual private networks


Virtual Private Networks (VPNs) let you establish a secure communications channel between your computing device and a server. After connecting to the server, you could gain access to a private network that has work files or applications, or use the server as a relay point to then access Internet content when browsing from a public network.

There are several reasons for using a VPN: you might need to remotely access information held on corporate servers while travelling or working from home; you might be wary of the insecure wireless networks you’re using; or you might want to access online content that’s blocked on the network you’re connected to but is accessible from the server somewhere else. Sometimes a company will require you to use a VPN, meaning the company will dictate the security and type of VPN you use (for example, your employer). Whereas when you make a consumer decision to use a VPN you’re responsible for making these decisions on your own.

In the wake of Edward Snowden’s revelations, a large number of consumer VPN providers have sprung up, and security experts now often suggest that you use a VPN when accessing the Internet from an insecure network (e.g., a café, public library, or other free Wi-Fi hotspot). This blog post will help you understand what to look for when choosing between different VPN services.

Read the rest of this entry »


8 Dec 2016

Privacy Tech-Know Blog: Uniquely You: The identifiers on our phones that are used to track us


techblog-uniquelyyou

Canadians’ mobile devices are filled with applications that collect personal information, including identifiers that are engrained into different parts of the devices. But what exactly are these identifiers, and how are they used?

An identifier is a piece of information (usually a sequence of characters) that’s used to uniquely identify a device, a user, or a set of behaviours taken on the device. Mobile identifiers constitute privacy-affecting technologies because they can be used to correlate an individual’s various activities while using a phone, tablet, or other connected device, and they support the linking of devices with actual persons.

Our mobile devices are filled with identifiers that uniquely label different components and behaviours. The radios and other physical hardware, operating systems, applications, and even web browsers are all rife with identifiers that can uniquely identify the device, the person using the device, or the behaviours of the user. And while these identifiers are typically meant to serve a useful purpose, the user is often unaware that these identifiers exist or how they’re collected and used. We will outline several of the most prominent identifiers associated with mobile devices and their significance for privacy.

Read the rest of this entry »


9 Nov 2016

Privacy Tech-Know Blog: Pay me to regain access to your personal information! Ransomware on the rise


business growth 1

Ransomware is a type of malicious software (malware) which, when installed on a device or system, prevents access to that device, or that device’s content or applications. Once installed and operational, the malware prompts you to pay a ransom to restore full functionality to the device. Personal or sensitive data have been targeted with ransomware, or accessed when attackers were rifling through organizational computers or networks. In fact ransomware has affected a range of devices, including those running Windows, OS X, and Android, and has affected healthcare providers, police services, public schools, universities, and various types of businesses, in addition to individual consumer users. It’s an increasingly prevalent issue, with Symantec estimating that Canadians were affected by over 1,600 ransomware attacks a day in 2015.

Read the rest of this entry »