Apple’s privacy stance, the gist:
- Security is the foundation of privacy.
- Privacy is a fundamental human right.
- Embody commitments to privacy with code.
That’s my takeaway from Craig Federighi’s keynote at the 10th Annual European Data Protection & Privacy Conference.
… the four key privacy principles that guide Apple.
- Not collecting unnecessary data through data minimization.
- Processing as much data on device as possible.
- Making it clear to customers what data is collected and giving them tools to control how that data is used.
- Keeping data safe through security, including Apple’s unique integration of hardware and software. Security is the foundation of privacy.
Source: Craig Federighi Shares Apple’s Four Privacy Principles in Conference Keynote – MacRumors
Now, others take the opposite approach. They gather, sell, and hoard as much of your personal information as they can. The result is a data-industrial complex, where shadowy actors work to infiltrate the most intimate parts of your life and exploit whatever they can find–whether to sell you something, to radicalize your views, or worse. — Craig Federighi
I agree with all of that. Props to Apple for pushing privacy and pissing off the right people.
ANI launched its online list, ANI-L, in 1994. Like a specialized ecological niche, ANI-L had acted as an incubator for Autistic culture, accelerating its evolution. In 1996, a computer programmer in the Netherlands named Martijn Dekker set up a list called Independent Living on the Autism Spectrum, or InLv. People with dyslexia, ADHD, dyscalculia, and a myriad of other conditions (christened “cousins” in the early days of ANI) were also welcome to join the list. InLv was another nutrient-rich tide pool that accelerated the evolution of autistic culture. The collective ethos of InLv, said writer and list member Harvey Blume in the New York Times in 1997, was “neurological pluralism.” He was the first mainstream journalist to pick up on the significance of online communities for people with neurological differences. “The impact of the Internet on autistics,” Blume predicted, “may one day be compared in magnitude to the spread of sign language among the deaf.”
Source: The neurodiversity movement: Autism is a minority group. NeuroTribes excerpt.
A triptych of triptychs for designing for neurological pluralism…
The cave, campfire, and watering hole archetypal learning spaces:
The red, yellow, and green of interaction badges:
The three level communication stack of distributed collaboration:
Living Privately. - Building and maintaining a sense of what to show in each social environment. - Discovering and creating new environments in which we can show more of ourselves. - Assessing where you can grow new parts of yourself which aren’t (yet) for public display.
Source: On Privacy – Human Systems – Medium
With 1Password Business, each employee on your team gets a free 1Password Families membership. This way they can learn the habits they need to protect themselves and your company.
Source: Introducing 1Password Business – AgileBits Blog
Yay. I love this. I was an early beta tester of 1Password for Teams and Families. I like and trust their products. They have earned their great reputation. Moves like this bolster that rep.
Passwords and privacy are important modern literacy. We all need to be learning the habits to protect ourselves. Families need password managers. Employees need password managers. Public education very much needs password managers. Privacy should not be a function of privilege. Equip all students with password managers and include use of them in curriculum. Password and identity management are essential to digital pedagogy and parenting.
Until something better than passwords reaches broad deployment, we must equip ourselves to handle them safely. Let’s teach ourselves, our students, and our kids how to secure the keys to our identity.
I collected password advice in my “Privacy and Passwords” piece.
K12 classrooms-and most families-have bad password practices. Passwords for Google Classroom accounts are often derived from usernames. That password is then reused when signing up for other online accounts. This violates three of the most important rules of protecting online privacy and identity. From Krebs on Security:
- Do not use your network username as your password.
- Avoid using the same password at multiple Web sites.
- Never use the password you’ve picked for your email account at any online site: If you do, and an e-commerce site you are registered at gets hacked, there’s a good chance someone will be reading your e-mail soon.
In that piece, I include several selections from the Smart Girl’s Guide to Online Privacy by @violetblue. Check out Chapter 10, “I Hate Passwords”, of this well-respected and widely-recommended book.