August 08, 2011

Mobile Privacy: beware of unintended consequences

These issues are explored in our recent paper, .  We argue strongly that potential unintended uses of mobile systems must form part of the privacy threat/risk assessment, right from the outset, and that privacy must be built directly into protocols for location-based technologies.



Blackberry 8800 8820 charger port “GORDON’S ALIIVVEEEEEE????!!!” A Plea for a Brian Blessed GPS

Posted by: pybadyfyto at 11:32 PM | No Comments | Add Comment
Post contains 63 words, total size 1 kb.

Comments are disabled. Post is locked.
8kb generated in CPU 0.018, elapsed 0.0683 seconds.
33 queries taking 0.0588 seconds, 72 records returned.
Powered by Minx 1.1.6c-pink.