article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Where possible, favor openness and transparency over aggressive data collection or restrictions which erode civil liberties.

article thumbnail

Data collection cheat sheet: how Parler, Twitter, Facebook, MeWe’s data policies compare

Security Affairs

While these alt platforms largely position themselves as “free speech” alternatives, we at CyberNews were also interested in how these alt social platforms compare in terms of data collection. Users would need to read both Triller’s and Quickblox’ privacy policies to get a good idea of how their data is being collected and processed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Democrat Bill Seeks to Enforce Privacy and Security Rights for Health Information

Hot for Security

As organizations deploy new tools to fight the spread of COVID-19 – including contact tracing apps, digital monitoring, home tests and vaccine appointment booking – US Democrats have introduced a bill seeking to set strong and enforceable privacy and data security rights for health information. Representatives Anna G.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. It turns out there is a natural opening for this technology: microlegislation. Political scientist Amy McKay coined the term.

article thumbnail

MY TAKE: Apple users show strong support for Tim Cook’s privacy war against Mark Zuckerberger

The Last Watchdog

This colorful chapter in the history of technology and society isn’t just breezing by unnoticed. The largest players in the tech industry need to demonstrate that they can self-regulate, or else lawmakers will take over a core asset of their business – consumer data – as demonstrated by California’s consumer privacy act.

article thumbnail

More SRE Lessons for SOC: Simplicity Helps Security

Anton on Security

the principle of … simplicity ( SRE book, Chapter 9 “Simplicity” ). Metrics and associated data collection? So, perhaps one practical tip: when you encounter or create a SOC process, or a piece of technology in or around your SOC, think “does this add complexity?” Well, let’s find out! In detection content?

article thumbnail

It’s Google’s World. Your Business Is Just Living in It

Adam Levin

On the face of it, it’s not necessarily bad news; anyone who remembers the days of phone books, mail order catalogs, and paper maps is most likely glad for the convenience of the services Google provides–businesses and consumers alike. .” It would seem that Google has a monopoly, but that’s for the court to decide.