<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Identity &amp; The End of Privacy Archives - Sky&#039;s Blog</title>
	<atom:link href="https://blog.red7.com/category/frothy-concepts/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.red7.com/category/frothy-concepts/privacy/</link>
	<description>Communicating in a networked world</description>
	<lastBuildDate>Fri, 12 Apr 2019 19:33:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.red7.com/wp-content/uploads/2018/01/skyhi-wind-icon-256x256-120x120.png</url>
	<title>Identity &amp; The End of Privacy Archives - Sky&#039;s Blog</title>
	<link>https://blog.red7.com/category/frothy-concepts/privacy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>When did you stop answering your phone?</title>
		<link>https://blog.red7.com/when-did-you-stop-answering-your-phone/</link>
					<comments>https://blog.red7.com/when-did-you-stop-answering-your-phone/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Fri, 12 Apr 2019 19:33:43 +0000</pubDate>
				<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Mobile issues]]></category>
		<category><![CDATA[Our networked world]]></category>
		<guid isPermaLink="false">https://blog.red7.com/?p=5200</guid>

					<description><![CDATA[<p>Yesterday I had to answer my phone. Does that sound odd? First of all, what&#8217;s a phone for if you don&#8217;t answer it? But second, who answers the phone any more, given the overwhelming volume of spam calls we receive every day? You&#8217;re probably thinking “Why is he even asking this? When was the last [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/when-did-you-stop-answering-your-phone/">When did you stop answering your phone?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-full wp-image-461 alignleft" src="https://blog.red7.com/wp-content/uploads/2008/07/iphone.png" alt="" width="113" height="148" />Yesterday I had to answer my phone.</p>
<p>Does that sound odd? First of all, what&#8217;s a phone for if you don&#8217;t answer it? But second, who answers the phone any more, given the overwhelming volume of spam calls we receive every day?</p>
<p>You&#8217;re probably thinking “Why is he even asking this? When was the last time I answered a phone call?”</p>
<p><span id="more-5200"></span>Why do I say I had to answer my phone? Well, I had called a US government agency in order to set up an appointment at that government office. First, I waited on hold for 50 minutes trying to reach them. They have no “local” phone number here in San Francisco, only a big national call center. So to make a local appointment, you have to reach the call center, which means waiting 50 minutes. Then talking with them, they agreed it made the best sense to go to the local office. “We&#8217;ll give you a callback to schedule that appointment.” Huh? I wait for 50 minutes and then they can&#8217;t make an appointment, they have to call me back?</p>
<p>“So what&#8217;s the best time to reach you?” “Well,” I answer, “Daytime. Nighttime. Anytime. I don&#8217;t care.” And they respond “We can&#8217;t do that. We need a one-hour window. We will attempt to call you during that one hour window some time during the next five days.” In other words, they pick a single hour during which I have to answer my phone for possibly five days in a row. Well how hard would it be for them to just call me whenever they have an agent available? Like maybe on Tuesday. Nope. Instead they have to use one single hour of the day, but any time in the next five days.</p>
<p>(This is worse than waiting for the cable company to fix my equipment. At least they tell me what day they&#8217;ll be here.)</p>
<p>OK, I thought that was bade enough, but&#8230; they won&#8217;t tell me what number they will call <span style="text-decoration: underline;">from</span>. They&#8217;ll just call from some random phone number. Meaning that during my availability times I have to answer every call that comes in — something I never do because of the volume of spam calls.</p>
<p>So I tried it because I had no alternative. During my first day of availability, during my “best time to call me hour,” I got a call in the first 4 minutes. Spam. Of course. Then after 20 minutes, another. Spam again. And so forth. During the four hours I answered calls that day, I got a dozen calls. All spam. Yes 12 spam calls. No real people at all.</p>
<p>It occurred to me that actually I hardly ever answer my phone any more unless the caller is in my address book. And that in trying to schedule things, I actually <span style="text-decoration: underline;">never</span> call people on my phone. Instead I email them or “text message” them. And, in fact, email is increasingly going unanswered by my friends. The only way to really reach someone is to message them. I know this has happened with the younger generation, but now I find it extending up into people in their 70s.</p>
<p>So my question is — and you can just think about this if you want to — no need to really answer: 1. Do you still answer your phone (if the caller isn&#8217;t in your address book); 2. When did you stop?</p>
<p>If you do answer, I probably won&#8217;t answer your call. Hahahah. Just think about how your own behavior has changed.</p>
<p>The post <a href="https://blog.red7.com/when-did-you-stop-answering-your-phone/">When did you stop answering your phone?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/when-did-you-stop-answering-your-phone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5200</post-id>	</item>
		<item>
		<title>After Net Neutrality</title>
		<link>https://blog.red7.com/after-net-neutrality/</link>
					<comments>https://blog.red7.com/after-net-neutrality/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Fri, 05 Jan 2018 03:53:41 +0000</pubDate>
				<category><![CDATA[Communicating]]></category>
		<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Software and online tools]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<guid isPermaLink="false">https://blog.red7.com/?p=4910</guid>

					<description><![CDATA[<p>Under the principles of net neutrality, Internet Service Providers [ISPs] are like common carriers, carrying all bits equally, but with neutrality nullified, what&#8217;s the likely outcome? The Federal Communications Commission [FCC] in the United States has voted to nullify the common carrier status of ISPs, and thus to kill net neutrality, but of course other nations [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/after-net-neutrality/">After Net Neutrality</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="wp-image-3307 alignright" src="https://blog.red7.com/wp-content/uploads/2011/02/sky-037.jpg" alt="" width="187" height="187" />Under the principles of <em>net neutrality</em>, Internet Service Providers [ISPs] are like <em>common carriers</em>, carrying all bits equally, but with neutrality nullified, what&#8217;s the likely outcome?</p>
<p>The Federal Communications Commission [FCC] in the United States has voted to nullify the common carrier status of ISPs, and thus to kill net neutrality, but of course other nations may not do so and I think there are customer actions that could make it difficult for carriers to run roughshod over this principle. The FCC calls their own action “<a href="https://www.fcc.gov/restoring-internet-freedom" target="_blank" rel="noopener">Restoring Internet Freedom</a>” and I, along with millions of others, contend that it&#8217;s only restoring the freedom for carriers to differentiate and prioritize, and charge as they see fit, making it more difficult for us common folks in the long run.</p>
<p><span id="more-4910"></span>On the positive side, improved and more timely data service seems really attractive. People want it. Faster and stutter-free movies. Voice-over-IP calls without interruptions. Gaming and hugely-fast downloads. So there is actually some consumer pressure to prioritize.</p>
<p>Personally I think most of this is “entertainment motivated” in that the customers who care will be mostly the “consumers” — not businesses and not nonprofits. That&#8217;s because even if ISPs charge businesses more for these premium prioritized services, the big businesses will pony up and pay for it. Small businesses and individuals will be less able to do this, and that&#8217;s a big part of the problem.</p>
<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-4932 alignright" src="https://blog.red7.com/wp-content/uploads/2018/01/detour-300x245.jpg" alt="" width="300" height="245" srcset="https://blog.red7.com/wp-content/uploads/2018/01/detour-300x245.jpg 300w, https://blog.red7.com/wp-content/uploads/2018/01/detour.jpg 400w" sizes="(max-width: 300px) 100vw, 300px" />So here&#8217;s how I think things will play out:</p>
<p><strong>Advertising — </strong>The first thing that&#8217;ll happen, and it will be soon, though it&#8217;s not specifically limited by net neutrality, is that <span style="text-decoration: underline;">ISPs will look at your web usage</span> and keep track of the sites you visit. They&#8217;ll make money by selling this data to third parties. Are you visiting Amazon.com a lot? You&#8217;re probably shopping. Are you visiting REI.com a lot? You&#8217;re shopping for outdoor gear. Visting Toyota.com a lot? Shopping for a new car. This kind of information is of great use and worth money to retailers, advertisers, car manufacturers. This kind of data is already commercially shared from web sites to advertising networks, but when ISPs can gather and sell this information, they&#8217;ll make money from it. And what&#8217;s more, ISPs can collect the data without your knowledge, and without leaving any evidence that they are doing so. Other web sites and advertisers do not have that advantage.</p>
<p>An ISP can also sniff the content of your (unencrypted) email, or your file downloads, which is something a web site cannot do. In other words, the ISP can create an open book full of information it can sell, because it is capable of monitoring every unencrypted communication you make through its connection. You may know that Google&#8217;s gmail can sniff your gmail traffic and will present advertising based on the contents of your mail — the ISPs would be able to do this regardless of where your email is held, if the connections are unencrypted.</p>
<p>The <a href="https://letsencrypt.org" target="_blank" rel="noopener">Let&#8217;s Encrypt</a> project, which has ramped up mightily in the past year, aims to make it easier to protect traffic between you and the web sites you use, by making web site content unreadable by ISPs. The ISPs can still see which sites you use and how long you&#8217;re using each site, but when a web site is encrypted (HTTPS) the ISP can&#8217;t see which pages you&#8217;re viewing, nor what content you&#8217;ve viewed or submitted. (And you can also protect all of your network traffic from your ISP using a VPN, which I&#8217;ll discuss later.)</p>
<p>So here&#8217;s how I think this is all going to play out over a time period of one to three years (2018 to 2020):</p>
<p><img loading="lazy" decoding="async" class=" wp-image-1686 alignright" style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;" src="https://blog.red7.com/wp-content/uploads/2009/06/monkey-128x128.jpg" alt="" width="159" height="159" /><strong>The Inspection Scenario —</strong> To shape and prioritize your traffic, the ISP wants to u<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;">nderstand (and prioritize) the type of data packets you&#8217;re sending. In theory and as far as the technology is concerned, all packets are just binary data, but in practice an ISP can look inside those packets (see </span><a style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;" href="https://en.wikipedia.org/wiki/Deep_packet_inspection" target="_blank" rel="noopener"><em>deep packet inspection</em></a><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;">) and make conjectures about which ones are video, or audio, or gaming, or file transfers, and could treat them differently. Such as giving them higher or lower priority. Or charging more for some kinds of data. And because the carrier knows where your packets are going (meaning Disney, or YouTube or Netflix), it can differentiate and then prioritize based on financial agreements it may have (or interests) in those endpoints. </span><strong style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;">So I predict that ISPs, who already have the capability to examine content, will be differentiating in some way based on your content as early as 2018</strong><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;">.</span></p>
<p><strong>Premium Services Plan —</strong> If the network manager has the capacity to examine your data, it could charge more for certain types of data — for the data that has more value to you. In other words, the carrier might &#8220;take a cut&#8221; of the economic value of the packets. This would be a lot like your phone company charging you more money to call a bank than to call a barbershop. Doesn&#8217;t happen to phone calls because the phone company (in the US) is a <a href="https://en.wikipedia.org/wiki/Common_carrier" target="_blank" rel="noopener"><em>common carrier</em></a> and regulated thus by the FCC. But that&#8217;s what Net Neutrality did for data carriers — and that&#8217;s now been <a href="https://www.fcc.gov/restoring-internet-freedom" target="_blank" rel="noopener">rescinded by the FCC</a>. <strong>I predict that ISPs will announce premium pricing for some types of content by 2019 — starting with voice-over-IP or video — and will promise to prioritize such types of traffic, for that price.</strong></p>
<p><strong><img loading="lazy" decoding="async" class="wp-image-105 alignleft" src="https://blog.red7.com/wp-content/uploads/2006/10/25-dog.jpg" alt="" width="272" height="134" />Transfer of costs to the supplier</strong> — Using a process we call <em>zero-rating</em>, an ISP may make certain types of content effectively free to its customers. They could make web access free, but inject advertising. They could make music “free” as T-Mobile has (meaning certain sites are free). Or throttle the delivery of (low-quality) <a href="https://www.theverge.com/2017/10/25/16546798/verizon-unlimited-data-full-video-quality-fee" target="_blank" rel="noopener">video as Verizon has</a>. Zero-rating has the effect of making other content more expensive, and of excluding content or providers based on criteria invisible to the customer. <strong>I predict that during 2018 more ISPs will first offer to accelerate certain content (such as video) for a price to the customer, then begin soliciting suppliers themselves to underwrite this, and eventually contend that this saves the end user from having to bear this cost.</strong></p>
<p><strong>Premium Sites Plan — </strong>The network manager could also charge customers more, or give more reliable or faster service, for traffic from specific providers. &#8220;Get your Disney movies faster and without glitches &#8211; $19.95 a month&#8221; is what I&#8217;d expect to hear within a few years. This would be done by prioritizing all traffic from Disney to you. Or any set of providers. Web sites. Email. And so forth. Any service the ISP thinks it can charge extra for, it will. <strong>I predict that by 2019 we will see <em>Top-100 Premium Sites Plans</em> from ISPs. </strong>Something that would have been illegal under the Obama-era FCC rules of net neutrality.</p>
<p><strong>HTTPS (web) encryption</strong> — We&#8217;ve already reached the point where around half of web sites use HTTPS encryption to keep pages and submitted forms private. <strong>This will increase to 90% by 2020 and will frustrate the ISPs ability to look inside your interaction with these web sites.</strong></p>
<p><strong>Encrypted email</strong> — Here I&#8217;m pessimistic. People using standalone email, such as Apple Mail or Entourage, Outlook, Thunderbird apps on computers, have had encryption available for 20 years, though it hasn&#8217;t been easy to use until the last year or two. <strong>I predict email encryption will only slightly increase by 2020.</strong> However, more and more customers use outlook.com and gmail.com and services that use HTTPS encryption on their webmail interfaces, which renders email contents opaque to ISPs. This is a mitigating factor that will continue to improve the privacy of email, except that the email hosting company can, of course, still read your mail.</p>
<p><strong><img loading="lazy" decoding="async" class="wp-image-3059 alignleft" src="https://blog.red7.com/wp-content/uploads/2010/09/pont-des-arts-hookup.jpg" alt="" width="239" height="158" /></strong></p>
<p><strong>The Resistance — </strong>How could you prevent this kind of predatory behavior? Well even today, you could use a <em><a href="https://en.wikipedia.org/wiki/Virtual_private_network" target="_blank" rel="noopener">Virtual Private Network</a></em> [VPN] to encrypt everything between your computer and the net. The encrypted packets are tunneled to another location (beyond your ISP), where they emerge onto the public Internet. For example, if you&#8217;re in San Francisco using &#8220;BigBad ISP&#8221; as your ISP, your computer might encrypt everything and send it to New York City, where it might emerge on a &#8220;GoodGuy ISP&#8221; network. BigBadISP would lose the ability to examine your data, and consequently could only charge you one rate for all traffic. That wouldn&#8217;t prohibit GoodGuy from doing something on its end, of course, but presumably you&#8217;d choose to emerge in friendly territory. <strong>I predict that by 2018 VPNs will be used by 20% of individuals and that ISPs will discourage their use by limiting VPN traffic. I predict that by 2019 ISPs will differentially charge more for VPN traffic from non-business customers or will require that customers upgrade to more expensive business or “Pro” plans in order to use a VPN. And I think that by 2020 ISPs will block VPN traffic from consumer accounts.</strong></p>
<p><strong>Higher Priced Privacy — </strong>And with VPNs blocked, ISPs will offer “Privacy services” for an additional price. In other words, if your ISP can&#8217;t see and make money off your traffic, they&#8217;ll charge you more to pay for the difference.</p>
<p>So the bottom line here is that businesses are in the business of making money by offering services. ISPs have offered connectivity for many years. That connectivity was priced initially based on bandwidth, then on data volume (particularly for mobile data), and now ISPs want to price their service on the <span style="text-decoration: underline;">value of the data</span>. They&#8217;ll attempt to charge both their customers and the businesses who want to interact with their customers. They&#8217;ll offer “prioritized” services for an extra fee where there was no fee before. They&#8217;ll throttle services that don&#8217;t comply.</p>
<p>Because they can inspect customer behavior and data, they&#8217;ll profit by monetizing the value of the information about their own consumer customers. If that becomes difficult because of encryption, they&#8217;ll charge the customer an extra fee to protect his own data, under the guise that this is an improvement.</p>
<p>Net neutrality, and its interpretation under law, has largely protected consumers from this scenario for years. Now you have my predictions about how it could all unravel in just a few years.</p>
<p>The post <a href="https://blog.red7.com/after-net-neutrality/">After Net Neutrality</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/after-net-neutrality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4910</post-id>	</item>
		<item>
		<title>The Brutalist Sky Look</title>
		<link>https://blog.red7.com/brutalist-look/</link>
					<comments>https://blog.red7.com/brutalist-look/#comments</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 28 Sep 2016 03:05:05 +0000</pubDate>
				<category><![CDATA[Cancer]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=4144</guid>

					<description><![CDATA[<p>Starting to get some hair growing back this week. Lost 90% when going through that second round of chemotherapy. Today I shot this selfie which reminds me of the brutalist term as used in architecture. Brutalist concrete white hair beginning to grow straight down from the top. Like an incipient concrete cap. Not enough yet that [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/brutalist-look/">The Brutalist Sky Look</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft wp-image-4143" src="/wp-content/uploads/2016/09/sky-as-cancer-brutalist.jpg" alt="sky-as-cancer-brutalist" width="256" height="320" />Starting to get some hair growing back this week. Lost 90% when going through that second round of chemotherapy. Today I shot this selfie which reminds me of the <em>brutalist</em> term as used in architecture. <a href="https://en.wikipedia.org/wiki/Brutalist_architecture" target="_blank">Brutalist</a> concrete white hair beginning to grow straight down from the top. Like an incipient concrete cap. Not enough yet that it can be combed in any direction particularly, but enough to reduce the reflective glare. I originally said losing hair wouldn&#8217;t matter much to me, but it did matter in some specific ways.<span id="more-4144"></span></p>
<p>First, my head was cold. San Francisco summer weather is cold anyway, but wow was my head cold! So I got out Kathryn&#8217;s <em>Angel Island</em> baseball hat and it has been my constant companion for several months. About a week ago I noticed it was feeling too hot—perhaps a sign that hair was growing back.</p>
<p>Second, people didn&#8217;t recognize me. Doesn&#8217;t surprise me that many people would recognize my mop of stark-white hair as synonymous with me. Walking down the street, folks might glance at me and then walk on without a glimmer of recognition. This was particularly true when I had the baseball hat on.</p>
<p>Now to the debate. I think this look is kind of a Bruce Willis look before he was shaving it. Think 1990s. I do not think it&#8217;s current. Current would imply that I need a 3-day growth of beard.</p>
<p>What do you think?</p>
<p>[<a href="/getting-the-tube-running/">More about the cancer journey</a>]</p>
<p>The post <a href="https://blog.red7.com/brutalist-look/">The Brutalist Sky Look</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/brutalist-look/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4144</post-id>	</item>
		<item>
		<title>Now that I know everyone</title>
		<link>https://blog.red7.com/know-everyone/</link>
					<comments>https://blog.red7.com/know-everyone/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Fri, 08 Jan 2016 04:13:33 +0000</pubDate>
				<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3962</guid>

					<description><![CDATA[<p>I have several &#8220;threads&#8221; on LinkedIn. First, I&#8217;m a computer science guy, so I know lots of CS people. Next, I&#8217;ve been involved in peace activities with The Dalai Lama Foundation and The Metta Center. Another group of people. Then recently as a musician+composer. On LinkedIn I&#8217;ve been looking at the &#8220;People You May Know&#8221; [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/know-everyone/">Now that I know everyone</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-3963" src="/wp-content/uploads/2016/01/spooky-guy.jpg" alt="spooky-guy" width="175" height="158" />I have several &#8220;threads&#8221; on LinkedIn. First, I&#8217;m a computer science guy, so I know lots of CS people. Next, I&#8217;ve been involved in peace activities with <a href="http://dalailamafoundation.org" target="_blank">The Dalai Lama Foundation</a> and <a href="http://mettacenter.org" target="_blank">The Metta Center</a>. Another group of people. Then recently as a musician+composer. On LinkedIn I&#8217;ve been looking at the &#8220;People You May Know&#8221; links and recently I&#8217;ve been adding a lot of musicians because LinkedIn usually does get it right and it shows me names and photos for people I do indeed know. For every 8 or so people it suggests, I know one or two people.</p>
<p>But a week ago I noticed that it&#8217;s not giving me as many names or people I know. Maybe I know one in a hundred of the people it&#8217;s presenting. I wonder if their algorithm is confused by my change of orientation and can&#8217;t figure out who to present as possible links? Uh, yes, I do know that it&#8217;s basing its recommendations on my own contacts, but it seems to have reached some kind of event horizon.</p>
<p>The post <a href="https://blog.red7.com/know-everyone/">Now that I know everyone</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/know-everyone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3962</post-id>	</item>
		<item>
		<title>Backdoors &#8211; How Absolutely Stupid!</title>
		<link>https://blog.red7.com/backdoors-how-absolutely-stupid/</link>
					<comments>https://blog.red7.com/backdoors-how-absolutely-stupid/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 24 Dec 2015 03:00:40 +0000</pubDate>
				<category><![CDATA[Complexity]]></category>
		<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3911</guid>

					<description><![CDATA[<p>I have not written on this subject because I just see everyone else is banging on Congress about how stupid it would be to install &#8220;backdoors&#8221; in commercial email and software services. But honestly, I&#8217;m a bit concerned right now because government pressure is being stepped up. A &#8220;backdoor&#8221; is a mechanism that allows a [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/backdoors-how-absolutely-stupid/">Backdoors &#8211; How Absolutely Stupid!</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1344" src="/wp-content/uploads/2009/05/cloud-with-computers.jpg" alt="Cloud computing" width="64" height="64" />I have not written on this subject because I just see everyone else is banging on Congress about how stupid it would be to install &#8220;backdoors&#8221; in commercial email and software services. But honestly, I&#8217;m a bit concerned right now because government pressure is being stepped up.</p>
<p>A &#8220;backdoor&#8221; is a mechanism that allows a service provider or government to access the contents of a system without knowing users&#8217; passwords and without their knowledge. It is essentially a universal key that opens everything.</p>
<p>We hear government officials crying out that this is the only way they can protect the nation against attack. In other words, the government wants to have universal access to every electronic communication, or we will all die in flaming terrorist attacks.</p>
<p>So just why is this the stupidest idea in the world?<span id="more-3911"></span>Well it&#8217;s <span style="text-decoration: underline;">so incredibly stupid</span> because it is impossible to guarantee that a &#8220;universal key&#8221; that decrypts everything can be kept secret. The government&#8217;s argument make it sounds like there&#8217;s a little physical key (like a little golden metallic key, let&#8217;s say) that could be kept safe in a place like Fort Knox and only brought out when needed. And yes, would be separate keys or processes for each provider or company (one for Apple, one for Dell, one for AT&amp;T, one for Facebook) But encryption does NOT rely upon physical keys—that&#8217;s a dangerous argument.</p>
<p>There would be additional processes and safeguards on these keys, but essentially once a key is figure out, an entire company, entire industry, entire set of encryption processes, could be compromised.</p>
<p>With encryption, the  key is a sequence of numbers. You don&#8217;t have to break into a vault and &#8220;steal&#8221; the key to have universal access — you just have to <span style="text-decoration: underline;">figure out</span> what the key is, even independent of the guys who created it in the first place, and once you figure it out, you&#8217;re in and you have access to everything—past, present, future.</p>
<p><img loading="lazy" decoding="async" class="alignright wp-image-3308" src="/wp-content/uploads/2011/02/sky-039.jpg" alt="sky-039" width="222" height="222" />Here are some common-sense reasons why this just can&#8217;t possibly work:</p>
<ol>
<li>If someone were to find a way to independently generate or figure out the key(s), they&#8217;d be able to read every encrypted message ever created. (It&#8217;s a bit more complex than this, but it&#8217;s close.)</li>
<li>The key(s) would immediately become the target of every foreign government&#8217;s security services. If one of them discovered the key (stole it, recreated it, hacked an easier way of duplicating it), you&#8217;d probably not know. Just suddenly everything would become transparent to them.</li>
<li>Crooks will immediately attempt to discover the secret key(s). Don&#8217;t underestimate these guys. They are superb hackers and they have many millions of dollars to spend working on this. They might succeed.</li>
<li>It&#8217;s even easier, however. The key(s) would be stored somewhere on computers. If crooks could hack into that computer, they could probably extract the key.</li>
<li>A disgruntled government employee might release the key(s). Think about Edward Snowden if you want to argue that any government anywhere is really capable of keeping everything secret all the time, and forever.</li>
<li>Once the key is &#8220;out&#8221; it&#8217;s out forever. There&#8217;s no calling it back. (There could be mitigating circumstances on this one, but it would still be a terrible meltdown.)</li>
<li>The key(s) doesn&#8217;t affect just crooks and terrorists. It would also affect commercial transactions, banking, credit cards, stock markets &#8230; in short everything that depends upon encryption could be compromised if the key(s) were hacked.</li>
<li>Oh, and public key encryption has existed for years. If the government were to require that in the future there be backdoors for universal decryption, any of the existing encryption systems (which would not have backdoors) could continue to be used. (As far we we know there is no universal key for today&#8217;s systems.)</li>
<li>You know the phrase &#8220;If guns are outlawed only outlaws will have guns.&#8221; Well if commercial operators are required to provide the government with backdoors into their systems, you can be sure that outlaws will not, and from then on, only the outlaws will have secure communications.</li>
</ol>
<p>Convinced yet?</p>
<p>Is that enough? Do you trust any government to do this, let alone to understand the magnitude of this Pandora&#8217;s Box?</p>
<p>&nbsp;</p>
<p>[1] Interesting <a href="http://www.infoworld.com/article/3016418/security/acts-of-terrorism-could-push-congress-toward-encryption-backdoors-in-2016.html" target="_blank">Infoworld article</a> about this.</p>
<p>[2] Problems with backdoors <a href="http://www.infoworld.com/article/3018029/virtual-private-network/listen-up-fbi-juniper-code-shows-the-problem-with-backdoors.html?token=%23tk.IFWNLE_nlt_infoworld_daily_2015-12-23&amp;idg_eid=50371a93cfc9adb7d98a3cfc2a99902f&amp;utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=InfoWorld%20Daily:%20Afternoon%20Edition%202015-12-23&amp;utm_term=infoworld_daily#tk.IFW_nlt_infoworld_daily_2015-12-23" target="_blank">Infoworld article</a></p>
<p>The post <a href="https://blog.red7.com/backdoors-how-absolutely-stupid/">Backdoors &#8211; How Absolutely Stupid!</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/backdoors-how-absolutely-stupid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3911</post-id>	</item>
		<item>
		<title>Opt out from Online Behavioral Advertising? Maybe not&#8230;</title>
		<link>https://blog.red7.com/opt-out-behavioral-adverts/</link>
					<comments>https://blog.red7.com/opt-out-behavioral-adverts/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Tue, 17 Jun 2014 17:47:43 +0000</pubDate>
				<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3699</guid>

					<description><![CDATA[<p>Online advertising has “gotten personal” and can adapt itself so that the ads you see are related to what you’ve been viewing, or shopping for, online. This means, for example, that when you are viewing a sleeping bag at REI.com, you might later on see an ad for REI—an ad featuring that same sleeping bag—at [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/opt-out-behavioral-adverts/">Opt out from Online Behavioral Advertising? Maybe not&#8230;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_3700" aria-describedby="caption-attachment-3700" style="width: 247px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="wp-image-3700 size-full" src="/wp-content/uploads/2014/06/a-b-advertising-cookie.gif" alt="Advertising and cookies" width="247" height="220" /><figcaption id="caption-attachment-3700" class="wp-caption-text">Advertising and cookies</figcaption></figure>
<p>Online advertising has “gotten personal” and can adapt itself so that the ads you see are related to what you’ve been viewing, or shopping for, online.</p>
<p>This means, for example, that when you are viewing a sleeping bag at REI.com, you might later on see an ad for REI—an ad featuring that same sleeping bag—at another web site later that week.</p>
<p>A friend recently mentioned <a title="HuffPost says opt out" href="http://www.huffingtonpost.com/2014/06/12/facebook-ads_n_5488980.html">this article in Huffington Post</a> claiming you can opt out of this kind of advertising. They say you can opt out in 2 easy steps. Turns out you can&#8217;t really opt out of the tracking, just the advertising itself.<span id="more-3699"></span></p>
<p>The way the advertising works is:</p>
<ol>
<li>When you visit REI online, a <em>cookie</em> is saved in your browser;</li>
<li>The cookie is for an online ads site, not for REI;</li>
<li>When you later on visit the second site, the online ads site “notices” the cookie, looks up what you were viewing, and shows you a relevant ad.</li>
</ol>
<p>It’s pretty simple, and REI never has to put any cookies in your browser—they just pay for their advertising through the company that tracks and then serves the ads, which makes the REI advert appear when you’re on the second site.</p>
<p>The bottom line is that you can in fact <a title="Opt out page" href="http://www.aboutads.info/choices/">opt out from <span style="text-decoration: underline;">seeing</span> the custom ads</a>. But you can’t opt out from having your information recorded. In other words, you can turn on the blinders and not see the ads, but they’re still going to know what you’re looking at, how recently you looked at it, how often you looked, and every place you looked at it.</p>
<p>The post <a href="https://blog.red7.com/opt-out-behavioral-adverts/">Opt out from Online Behavioral Advertising? Maybe not&#8230;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/opt-out-behavioral-adverts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3699</post-id>	</item>
		<item>
		<title>In the long run they&#8217;ll get you &#8220;in the code&#8221;</title>
		<link>https://blog.red7.com/get-you-in-the-code/</link>
					<comments>https://blog.red7.com/get-you-in-the-code/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 11 Sep 2013 07:40:46 +0000</pubDate>
				<category><![CDATA[CyberSpark]]></category>
		<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Math and science]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3602</guid>

					<description><![CDATA[<p>Bruce Schneier says “Remember this: The math is good, but math has no agency. Code has agency, and the code has been subverted.” (read original) What this means is that the theory behind something — in this case encryption using “hard” mathematics — may be very good, but the implementation can be full of “gotchas” [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/get-you-in-the-code/">In the long run they&#8217;ll get you &#8220;in the code&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-thumbnail wp-image-3603 alignright" style="border: 0px none; margin: 4px 12px;" src="/wp-content/uploads/2013/09/bruce-schneier-150x150.jpg" alt="Bruce Schneier on security" width="150" height="150" />Bruce Schneier says “Remember this: The math is good, but math has no agency. Code has agency, and the code has been subverted.” (<a title="Schneier on Security" href="https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html" target="_blank">read original</a>)</p>
<p>What this means is that the theory behind something — in this case encryption using “hard” mathematics — may be very good, but the implementation can be full of “gotchas” — errors, omissions, faults — and that‘s what will get you in the long term. He was specifically commenting on Edward Snowden’s revelations about the US National Security Agency and whether they can read all encrypted messages, but it can apply to many other software endeavors.</p>
<p>If you’re thinking of writing some software whose function is critical, and especially if lives depend on it, you have to be extremely careful with your implementation. And <em>Open Source</em> is a big plus because other eyes can look at your code and spot mistakes that you, as author, are likely to overlook.</p>
<p>So whatever you’re working on, be very, very careful with the implementation.</p>
<p>The post <a href="https://blog.red7.com/get-you-in-the-code/">In the long run they&#8217;ll get you &#8220;in the code&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/get-you-in-the-code/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3602</post-id>	</item>
		<item>
		<title>Google and government requests for data or removal</title>
		<link>https://blog.red7.com/google-and-government-requests-for-data-or-removal/</link>
					<comments>https://blog.red7.com/google-and-government-requests-for-data-or-removal/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Fri, 24 Sep 2010 19:15:54 +0000</pubDate>
				<category><![CDATA[Free Speech + Human Rights]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Google]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=3085</guid>

					<description><![CDATA[<p>Google receives requests, including court orders, from many countries, for data or for removal of information on the various services it provides (search, YouTube, etc.). They’re experimenting with putting up a page that shows the number of requests they’ve received, and (partially) the action they took, for the most recent six months. You can view [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/google-and-government-requests-for-data-or-removal/">Google and government requests for data or removal</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.google.com/transparencyreport/governmentrequests/" target="_blank"><img loading="lazy" decoding="async" class="alignright size-full wp-image-3086" style="border: 0pt none; margin: 2px 12px;" title="google-chinese-censorship" src="/wp-content/uploads/2010/09/google-chinese-censorship.jpg" alt="" width="300" height="166" /></a>Google receives requests, including court orders, from many countries, for data or for removal of information on the various services it provides (search, YouTube, etc.).</p>
<p>They’re experimenting with <a href="http://www.google.com/transparencyreport/governmentrequests/" target="_blank">putting up a page that shows the number of requests</a> they’ve received, and (partially) the action they took, for the most recent six months.</p>
<p>You can view their map and click the pushpins to see country-specific data. For China, it says</p>
<blockquote>
<p>Chinese officials consider censorship demands to be state secrets, so we cannot disclose that information at this time.</p>
</blockquote>
<p>Isn’t it interesting that rather than saying “removal requests” Google used the word “censorship” in this case?</p>
<hr class="hr_dashed" />
<p>To read more about legitimate (legal) requests and requests that do not have the force of law behind them and may simply be trying to intimidate a web site owner, visit the <a href="http://www.chillingeffects.org/" target="_blank">Chilling Effects Clearinghouse</a>.</p>
<p> </p>
<p>The <a href="http://opennet.net/" target="_blank">Open Net Initiative</a> seeks to identify and document Internet filtering and surveillance.</p>
<p>The post <a href="https://blog.red7.com/google-and-government-requests-for-data-or-removal/">Google and government requests for data or removal</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/google-and-government-requests-for-data-or-removal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3085</post-id>	</item>
		<item>
		<title>Secret courts, secret orders</title>
		<link>https://blog.red7.com/secret-courts-secret-orders/</link>
					<comments>https://blog.red7.com/secret-courts-secret-orders/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 27 May 2010 18:42:42 +0000</pubDate>
				<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2816</guid>

					<description><![CDATA[<p>Cory Doctorow posted a BoingBoing article about a recent National Security Letter requiring the Internet Archive to reveal user information to the FBI. In case you’re not familiar with this process, certain government agencies can issue these letters under the PATRIOT act, which require you to disclose information about your online users, and you can [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/secret-courts-secret-orders/">Secret courts, secret orders</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://boingboing.net/2008/05/07/patriot-act-gagorder.html" target="_blank"></a><a href="http://boingboing.net/2008/05/07/patriot-act-gagorder.html" target="_blank"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2817" style="border: 0pt none; margin: 2px 12px;" title="EFF-logo" src="/wp-content/uploads/2010/05/EFF-logo.png" alt="" width="86" height="59" /></a>Cory Doctorow posted a BoingBoing article about a recent National Security Letter requiring the Internet Archive to reveal user information to the FBI. In case you’re not familiar with this process, certain government agencies can issue these letters under the PATRIOT act, which require you to disclose information about your online users, and you can be required not to disclose <span style="text-decoration: underline;">even the existence of the NSL</span> to anyone else &#8211; not your board of directors, not your employees, not even your dog. You can tell your attorney, otherwise this would violate due process of law because you would be denied legal representation. <a href="http://www.eff.org/press/archives/2008/05/06" target="_blank">EFF stepped into this</a><sup>[1]</sup> as legal adviser to the Internet Archive and Brewster Kahle. The legal grounds on which they contested this was that the Internet Archive is a <em>library</em> (recognized by the State of California) which is exempt from these requirements under US law. The provisions apply to providers of Internet communication services (such as ISPs, duh, by definition).</p>
<blockquote><p>Regardless of how you <span style="text-decoration: underline;">feel</span> about government agencies having unchecked access to this kind of information — If you ran an online service that promised “we never share your information with anyone else” &#8211; what would your reaction be to an NSL requiring that you give up something like IP addresses, or physical address, or other information about a user of your service, <span style="text-decoration: underline;">without informing anyone</span>? Would you be happy telling your users that you never share their information?</p></blockquote>
<p><span id="more-2816"></span>What I do to deal with this is have a statement on any service-oriented web site I create that lets users know that we may be required by law to give up information and that if they are concerned about this they should either not use the service or they should never use their true name or address information. But how honest is even my policy if I couldn’t tell users their information has been subpoenaed?</p>
<hr />
<p>[1] From <a href="http://www.eff.org/press/archives/2008/05/06" target="_blank">EFF&#8217;s statement</a>: <em>The NSL included a gag order, prohibiting Kahle from discussing the letter and the legal issues it presented with the rest of the Archive&#8217;s Board of Directors or anyone else except his attorneys, who were also gagged. The gag also prevented the ACLU and EFF from discussing the NSL with members of Congress, even though an ACLU lawyer who represents the Archive recently testified at a congressional hearing about the FBI&#8217;s misuse of NSLs. &#8230; Since the Patriot Act was passed in 2001, relaxing restrictions on the FBI&#8217;s use of the power, the number of NSLs issued has seen an astronomical increase, to nearly 200,000 between 2003 and 2006. EFF&#8217;s investigations have uncovered multiple NSL misuses, including an improper NSL issued to North Carolina State University.</em></p>
<p>The post <a href="https://blog.red7.com/secret-courts-secret-orders/">Secret courts, secret orders</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/secret-courts-secret-orders/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2816</post-id>	</item>
		<item>
		<title>Reclaim your Facebook privacy</title>
		<link>https://blog.red7.com/reclaim-your-facebook-privacy/</link>
					<comments>https://blog.red7.com/reclaim-your-facebook-privacy/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 26 May 2010 02:04:01 +0000</pubDate>
				<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Facebook]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2805</guid>

					<description><![CDATA[<p>Neat idea &#8211; although ReclaimPrivacy.org has gone away, you still may want to scan your Facebook privacy settings to see exactly how private you might not be! Comparitech offers to guide you through this. Try it out. Comparitech&#8217;s page also describes privacy issues you might want to address on google (gmail and google+) and suggestions on avoiding [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/reclaim-your-facebook-privacy/">Reclaim your Facebook privacy</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<table border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td><a href="http://reclaimprivacy.org/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2806" style="border: 0pt none; margin: 2px 12px;" title="ReclaimPrivacy.org" src="/wp-content/uploads/2010/05/reclaim-privacy-org.png" alt="" width="67" height="67" /></a>Neat idea &#8211; although <strong>ReclaimPrivacy.org</strong> has gone away, you still may want to scan your Facebook privacy settings to see exactly how private you might not be! <a href="https://www.comparitech.com/blog/vpn-privacy/privacyfix-is-no-more-but-you-can-still-protect-yourself-heres-how/" target="_blank" rel="noopener">Comparitech</a> offers to guide you through this. Try it out.</td>
</tr>
<tr>
<td>Comparitech&#8217;s page also describes privacy issues you might want to address on google (gmail and google+) and suggestions on avoiding tracking in browsers. I thought I had most everything set pretty well on my Facebook account, but I was a bit surprised at my results (back in 2010). The old ReclaimPrivacy piece of code could fix the settings for you, but yes, you can do it all yourself if you just follow all the steps. <span id="more-2805"></span></td>
</tr>
<tr>
<td><a href="http://mattmckeon.com/facebook-privacy/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2813" style="border: 0pt none; margin: 2px 12px;" title="Facebook privacy visualization" src="/wp-content/uploads/2010/05/facebook-privacy-viz.jpg" alt="" width="178" height="174" /></a>A nice visualization of the erosion of privacy on Facebook is available from <a href="http://mattmckeon.com/facebook-privacy/" target="_blank" rel="noopener">Matt McKeon</a>. It covers the period 2005 to April 2010.</td>
</tr>
</tbody>
</table>
<p>The post <a href="https://blog.red7.com/reclaim-your-facebook-privacy/">Reclaim your Facebook privacy</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/reclaim-your-facebook-privacy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2805</post-id>	</item>
		<item>
		<title>Goodbye &#8220;MyBlogLog&#8221;</title>
		<link>https://blog.red7.com/goodbye-mybloglog/</link>
					<comments>https://blog.red7.com/goodbye-mybloglog/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Tue, 26 Jan 2010 17:15:30 +0000</pubDate>
				<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[social media]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2458</guid>

					<description><![CDATA[<p>I just realized (smack me in the face, huh!) that MyBlogLog.com, which I signed up for some months ago, is actually something I don’t want any part of! Duh. It’s a “service” that shows my little face photo on sites that subscribe to their service, saying “Sky has been reading this page.” Given what Facebook [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/goodbye-mybloglog/">Goodbye &#8220;MyBlogLog&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-2459" style="border: 0pt none; margin: 2px 12px;" title="MyBlogLog" src="/wp-content/uploads/2010/01/mybloglog-shot.jpg" alt="" width="128" height="266" />I just realized (smack me in the face, huh!) that MyBlogLog.com, which I signed up for some months ago, is actually something I don’t want any part of! Duh.</p>
<p>It’s a “service” that shows my little face photo <span style="text-decoration: underline;">on sites that subscribe to their service</span>, saying “Sky has been reading this page.” Given what Facebook did to me in December, revealing who all of my friends are<sup>[1][2]</sup>, I’ve become somewhat protective of where I go and what I read.<span id="more-2458"></span> Why would I want people to see that I’ve been reading some blog that just happens to subscribe to this service? What if I arrive at a site, gag on its contents, and then leave? MyBlogLog still shows that I’ve recently been there.</p>
<p>Goodbye privacy? Nope, <em>goodbye MyBlogLog</em> — I just unregistered. And they miss me already?</p>
<table border="0" width="100%">
<tbody>
<tr>
<td><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2460" title="MyBlogLog We Miss You" src="/wp-content/uploads/2010/01/mybloglog-we-miss-you.jpg" alt="" width="201" height="91" /></td>
</tr>
</tbody>
</table>
<hr class="hr_dashed" />[1] <a href="/the-king-facebook-has-no-clothes-and-neither-do-we/" target="_blank">The King (Facebook) has no Clothes — and Neither do we</a> [now that our friends are public information]</p>
<p>[2] <a href="/the-king-facebook-has-no-friends-and-neither-do-we/" target="_self">The King (Facebook) has no Friends — and Neither do we</a> [any more]</p>
<p>The post <a href="https://blog.red7.com/goodbye-mybloglog/">Goodbye &#8220;MyBlogLog&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/goodbye-mybloglog/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2458</post-id>	</item>
		<item>
		<title>Chris Pirillo&#8217;s &#8220;Pillars of Community&#8221;</title>
		<link>https://blog.red7.com/pillars-of-community/</link>
					<comments>https://blog.red7.com/pillars-of-community/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Mon, 18 Jan 2010 17:15:14 +0000</pubDate>
				<category><![CDATA[Communicating]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Making organizations work]]></category>
		<category><![CDATA[Organizations and Sociology]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Social Entrepreneurs]]></category>
		<category><![CDATA[Technology and geeky stuff]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Chris Pirillo]]></category>
		<category><![CDATA[Community]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2417</guid>

					<description><![CDATA[<p>At LeWeb in Paris (December 2009) Chris Pirillo articulated some underlying principles for creating true (virtual) community. Matt Buckland[1] recorded Chris’ points in text form. I’m going to make some comments on them now. Chris started by saying “I don’t have an agenda; I don’t have an announcement&#8230;” referring, of course, to the number of [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/pillars-of-community/">Chris Pirillo&#8217;s &#8220;Pillars of Community&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://chris.pirillo.com/"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2450" style="border: 0pt none; margin: 12px;" title="Chris Pirillo" src="/wp-content/uploads/2010/01/chris-pirillo.jpg" alt="" width="36" height="36" /></a>At LeWeb in Paris (December 2009) <strong><a href="http://chris.pirillo.com/" target="_blank">Chris Pirillo</a></strong> articulated some underlying principles for creating true (virtual) community. <strong><a href="http://www.matthewbuckland.com/" target="_blank">Matt Buckland</a></strong><sup>[1]</sup> <a href="http://www.matthewbuckland.com/?p=1231" target="_blank">recorded Chris’ points</a> in text form. I’m going to make some comments on them now.</p>
<p>Chris started by saying “I don’t have an agenda; I don’t have an announcement&#8230;” referring, of course, to the number of companies that had been making announcements on the stage. Probably not unusual, since you want to make product announcements where they will be heard, but it was certainly being noticed this time around.</p>
<p>The full video of Chris’ talk appears at the bottom of this article. I’m going to pick and choose from the points that Matt jotted down.</p>
<p><strong>So, what is the essence of community? Community…<span id="more-2417"></span></strong></p>
<p><strong>[Chris says] Community… lives inside us.</strong> Where I go, community goes. We create it based on our preferences, likes, dislikes and the people we link up with;</p>
<blockquote><p><img loading="lazy" decoding="async" class="alignright size-full wp-image-1238" style="border: 0pt none; margin: 2px 12px;" title="The Social Graph" src="/wp-content/uploads/2009/04/the-social-graph-of-malware.jpg" alt="" width="96" height="96" />Sky sez: <em>Community</em> is a construct composed of our connections and interactions — to that extent, wherever we go we bring those connections with us. Because we are becoming highly-linked through electronic media (and <em>social media</em>), our communities may in fact be available to us almost everywhere we go! <em>Communities of interest</em> and <a href="http://en.wikipedia.org/wiki/Community_of_practice" target="_blank"><em>Communities of practice</em></a> are examples of these kinds of virtual communities (unlike our <em>neighborhood</em>, which is a physical community). We all participate in many communities, sometimes interacting in a number of them at the same time.</p></blockquote>
<p><strong>… is becoming increasingly distributed</strong>, as we distribute our ideas and thoughts across social networks;</p>
<blockquote><p>I have already made a comment on this (prior to hearing Chris), in remarking that <a href="/blogger-ghost-town/">bloggers are beginning to spread out beyond blogging and take their communities with them into Twitter, Facebook, and so forth</a>. But, of course you’ve noticed that too. You probably started tweeting a long time ago, added a Facebook or Linked-in profile, and put more of your photos on Facebook now than on your old photo-sharing site. So <a href="http://drakedirect.blogspot.com/2009/10/draft-facebook-article.html" target="_blank">if it’s true that 25% of Web traffic is to Facebook</a><sup>[2][3]</sup>, then this certainly means that some of the social behavior that motivated blogging has moved, with many of us, to Facebook.</p></blockquote>
<p><strong>… is a commodity, but people [themselves] aren’t.</strong> It’s easy to set up a website or blog, but the people and voices behind it are what makes it unique, special;</p>
<blockquote><p>I’ve been promoting this idea for years—and I still have to remind clients that they can set up an online community <span style="text-decoration: underline;">web site</span>, but they still need people to staff it, and they still need <span style="text-decoration: underline;">customers’ voices to make it really happen</span>. And when you inject people into the equation, it forces things to scale more <em>linearly</em> and it costs more for upkeep and maintenance of the human community members.<span style="color: #800000;"> </span></p></blockquote>
<p><strong>… cannot be controlled</strong>, but can be “guided”;</p>
<blockquote><p><a href="http://peterblock.com/" target="_blank"><img loading="lazy" decoding="async" class="alignright size-full wp-image-2453" style="border: 0pt none; margin: 2px 12px;" title="Peter Block" src="/wp-content/uploads/2010/01/peter-block.jpg" alt="" width="38" height="53" /></a>That’s the essence, isn’t it? You have to <span style="text-decoration: underline;">listen</span> to what your friends, community, customers, are saying. I’m reading <a href="http://www.peterblock.com/" target="_blank">Peter Block</a> now, and he’s one of the masters of using transformational change to solve community issues. [Photo is from <a href="http://peterblock.com/" target="_blank">peterblock.com</a>.]</p></blockquote>
<p><strong>… is no longer defined by physical boundaries.</strong> You probably have more in common with a geek living on another continent than your next door neighbour;</p>
<blockquote><p>About a year ago someone asked me whether <a href="http://dalailamafoundation.org/" target="_blank">The Dalai Lama Foundation</a> wasn’t just “a big web site with a small organization&#8230;” At first the question offended me, but that didn’t last long as I realized and even pointed out that the organization in fact did do much of its work online. So it is indeed a large web site with a (smaller human) organization behind it. The organization was and is <span style="text-decoration: underline;">distributed</span> geographically. It uses network communications to get people going and then local groups of people may begin working on their own. There is little planned organization of this process, and it grows entirely organically.</p></blockquote>
<p><strong>… grows its own leaders.</strong> the best leaders come organically out of a community, and is not an appointed one. It’s crucial that communities grow it’s own leaders for credibility and respect reasons;</p>
<blockquote><p>Leaders arise organically from within communities. Leaders arise when a cause needs someone to carry it forward. At the Foundation we have had six years of growing in response to leaders who arise organically and naturally from our communities. This is reflected in the many projects that the Foundation has incubated or supported. This leaves the central organization small, but promotes the growth of new organizations that respond to the immediate needs of the constituent communities.]</p></blockquote>
<p><strong>… is the antithesis of ego.</strong> Community is myself and everyone else, not just me or my Twitter stream;</p>
<blockquote><p>Yes, community is looking outward to see and to listen to what those in the community want. And that’s why leaders develop and grow organically within healthy communities.</p></blockquote>
<p><strong>… is everywhere, inside you.</strong> It’s what you share, your passions — and it’s this that will spell success.</p>
<blockquote><p>Focus on these points: 1) look for people who share your needs, desires and motivations; 2) connect with them; 3) expand that connection by listening to the needs of those in the communities you form or join; 4) help foster organic growth of leaders within your communities; 5) continue looking outward at all times!</p></blockquote>
<p style="text-align: center;">[swfobj src=&#8221;http://www.ustream.tv/flash/video/2752312&#8243; width=&#8221;480&#8243; height=&#8221;386&#8243; flashvars=&#8221;autoplay=false&#8221; allowfullscreen=&#8221;true&#8221; allowscriptaccess=&#8221;true&#8221;]</p>
<hr class="hr_dashed" />[1] Matt is one of the <a href="http://travelinggeeks.com/" target="_blank">Traveling Geeks</a>, having been involved most recently in the Paris LeWeb trip, and before that having been part of the South Africa trip (which I was not).</p>
<p>[2] Could 25% of page-views on the Web really be attributed to Facebook? <a href="http://drakedirect.blogspot.com/2009/10/draft-facebook-article.html" target="_blank">Drake Direct says so</a>. Their source for the stats is compete.com, which uses a sampling methodology (they have a sample set of people who “represent” the Internet user population) and projects their results to a large population (all Web users). They are not directly measuring real traffic to any web site—they are estimating. I have done statistical work of this sort, and for certain kinds of probability distributions it is problematic&#8230;particularly <em>long-tail</em> distributions. So don’t believe the 25% statistic, but <span style="text-decoration: underline;">do</span> believe that traffic to Facebook really is quite high!</p>
<p>[3] Remember not to confuse <span style="text-decoration: underline;"><em>the Web</em></span> with <em><span style="text-decoration: underline;">the </span><span style="text-decoration: underline;">Internet</span></em>. It is only a subset of overall traffic on the net. Email probably still accounts for far more traffic than web pages, and video is coming into its own rapidly.</p>
<p>The post <a href="https://blog.red7.com/pillars-of-community/">Chris Pirillo&#8217;s &#8220;Pillars of Community&#8221;</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/pillars-of-community/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2417</post-id>	</item>
		<item>
		<title>The King (Facebook) has no Friends &#8211; and Neither do we</title>
		<link>https://blog.red7.com/the-king-facebook-has-no-friends-and-neither-do-we/</link>
					<comments>https://blog.red7.com/the-king-facebook-has-no-friends-and-neither-do-we/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Mon, 21 Dec 2009 01:45:13 +0000</pubDate>
				<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Facebook]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=2214</guid>

					<description><![CDATA[<p>There was a comment by Julia Angwin in the Wall Street Journal about how Facebook may make “friending” obsolete through its policy of making your friend list public. At first, a couple of days ago when I learned that my friend list was irretrievably public, I had thought of just unfriending everyone in order to [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/the-king-facebook-has-no-friends-and-neither-do-we/">The King (Facebook) has no Friends &#8211; and Neither do we</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-2206 alignleft" style="border: 0pt none; margin: 2px 12px;" title="facebook-logo" src="/wp-content/uploads/2009/12/facebook-logo.jpg" alt="facebook-logo" width="91" height="91" />There was a comment by Julia Angwin in <a href="http://online.wsj.com/article/SB126084637203791583.html?mod=wsj_share_facebook" target="_blank">the Wall Street Journal about how Facebook may make “friending” obsolete</a> through its policy of making your friend list public. At first, a couple of days ago when I learned that my friend list was irretrievably public, I had thought of just unfriending everyone in order to hide them in the future, but that’s “cutting of my nose to spite my face” as Mom would have said. I’d have to bring them all back when Facebook changes its policy (which it certainly will have to in the future). So I haven’t done it (yet).</p>
<p>But anyway <span style="text-decoration: underline;">it’s too late</span>. <span id="more-2214"></span>Whatever harm has been done has probably been scarfed up by the scurrying search engines which have picked up this valuable information while it has been available. What if some unscrupulous operator has already built a private search engine that has traversed Facebook pages and sucked up all of the relationships while they were public. Even if Facebook hides them later on, any such information could be preserved and used by unscrupulous individuals. (And in case you think you can’t build a search engine in a few hours, I built a search engine in 1999 that spiders, on my behalf, any site I point it at&#8230; and I could easily configure it to spider Facebook for this kind of information, and have it running on the task within an hour.)</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2215 alignright" style="border: 0pt none; margin: 2px 12px;" title="facebook-public-search-results" src="/wp-content/uploads/2009/12/facebook-public-search-results.jpg" alt="facebook-public-search-results" width="501" height="163" /></p>
<p>Julia says that Facebook has added the option to protect your friend list (must have happened while I was sleeping). But I can’t find it. I did find a place to restrict what Facebook shows to the search engines, but searchers have ways around that. And there’s <a href="http://gawker.com/5427077/the-valleywag-guide-to-restoring-your-privacy-on-facebook" target="_blank">an interesting, long post that I found in Valleywag</a>, that deals with some of the intricacies of making your information <em>more difficult to find</em>. It’s worth reading.</p>
<p><img decoding="async" src="file:///Users/sky/Library/Caches/TemporaryItems/moz-screenshot.png" alt="" /></p>
<p>The post <a href="https://blog.red7.com/the-king-facebook-has-no-friends-and-neither-do-we/">The King (Facebook) has no Friends &#8211; and Neither do we</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/the-king-facebook-has-no-friends-and-neither-do-we/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2214</post-id>	</item>
		<item>
		<title>The King (Facebook) has no Clothes &#8211; and Neither do we</title>
		<link>https://blog.red7.com/the-king-facebook-has-no-clothes-and-neither-do-we/</link>
					<comments>https://blog.red7.com/the-king-facebook-has-no-clothes-and-neither-do-we/#comments</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 17 Dec 2009 23:29:27 +0000</pubDate>
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Frothy Concepts]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Organizations and Sociology]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=2204</guid>

					<description><![CDATA[<p>Facebook has opened up our individual Facebook profiles so that we have no way to restrict certain pieces of information, such as who our friends are, which are now publicly available. EPIC—the Electronic Privacy Information Center, and nine other co-signing organizations have filed a complaint with the Federal Trade Commission about this problem.[1] Read what [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/the-king-facebook-has-no-clothes-and-neither-do-we/">The King (Facebook) has no Clothes &#8211; and Neither do we</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-2206" style="border: 0pt none; margin: 2px 12px;" title="facebook-logo" src="/wp-content/uploads/2009/12/facebook-logo.jpg" alt="facebook-logo" width="91" height="91" />Facebook has opened up our individual Facebook profiles so that we have no way to restrict certain pieces of information, such as who our friends are, which are now publicly available.</p>
<p><strong>EPIC</strong>—the Electronic Privacy Information Center, and nine other co-signing organizations <a href="http://epic.org/2009/12/epic-defends-privacy-of-facebo.html" target="_blank">have filed a complaint with the Federal Trade Commission</a> about this problem.<sup>[1] </sup>Read what <a href="http://blogs.zdnet.com/BTL/?p=28704&amp;tag=nl.e589" target="_blank">Larry Dignan says on ZDNet</a> about this. I investigated and found that we’re all naked now&#8230;<span id="more-2204"></span></p>
<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-2207" style="border: 0pt none; margin: 2px 12px;" title="facebook-profile" src="/wp-content/uploads/2009/12/facebook-profile.jpg" alt="facebook-profile" width="350" height="420" />I checked my own profile and turned the volume down on some of the privacy settings, but I was unable to restrict my friend list &#8211; all 127 of them are freely available to anyone who searches for me on Facebook (not to search engines &#8211; just to someone who joins Facebook, but that’s trivial). Now I ask you, do you want the entire world to know who you have friended on Facebook? It exposes your entire set of social connections. I consider my friend list to be much more private than the rest of the info they release. (Though I&#8217;m not entirely happy that they show my fan pages, for that matter.)  ¡No way José!</p>
<hr class="hr_dashed" />[1]From the <a href="http://epic.org/2009/12/epic-defends-privacy-of-facebo.html" target="_blank">EPIC complaint to the FTC</a>:</p>
<blockquote><p>34. Facebook now treats the following categories of personal data as “publicly available<br />
information:”</p>
<p>• users’ names,<br />
• profile photos,<br />
• lists of friends,<br />
• pages they are fans of,<br />
• gender,<br />
• geographic regions, and<br />
• networks to which they belong.38</p>
<p>35. By default, Facebook discloses “publicly available information” to search engines, to<br />
Internet users whether or not they use Facebook, and others. According to Facebook,<br />
such information can be accessed by “every application and website, including those you<br />
have not connected with . . . .”39</p>
<p>36. Prior to these changes, only the following items were mandatorily “publicly available<br />
information:”</p>
<p>• a user’s name and<br />
• a user’s network.</p></blockquote>
<p>The post <a href="https://blog.red7.com/the-king-facebook-has-no-clothes-and-neither-do-we/">The King (Facebook) has no Clothes &#8211; and Neither do we</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/the-king-facebook-has-no-clothes-and-neither-do-we/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2204</post-id>	</item>
		<item>
		<title>Reaching Advocates and Influencers</title>
		<link>https://blog.red7.com/reaching-advocates-and-influencers/</link>
					<comments>https://blog.red7.com/reaching-advocates-and-influencers/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 23 Jul 2009 17:00:31 +0000</pubDate>
				<category><![CDATA[Communicating]]></category>
		<category><![CDATA[Identity & The End of Privacy]]></category>
		<category><![CDATA[Social tools]]></category>
		<category><![CDATA[TG2009]]></category>
		<category><![CDATA[The Quantified Self]]></category>
		<category><![CDATA[Traveling Geeks]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cambridge]]></category>
		<category><![CDATA[JD Lasica]]></category>
		<category><![CDATA[marketing]]></category>
		<category><![CDATA[Renee Blodgett]]></category>
		<category><![CDATA[Robert Scoble]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[Susan Bratton]]></category>
		<category><![CDATA[traveling geeks]]></category>
		<guid isPermaLink="false">http://sky.dlfound.org/?p=1835</guid>

					<description><![CDATA[<p>Rather than blasting out advertising indiscriminately to everyone, firms are finding they can target individuals who like their brand and can influence others to see the brand more positively. There are more and more ways to find out who your brand&#8217;s advocates and influencers are. That’s because software is now tying the data together so [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/reaching-advocates-and-influencers/">Reaching Advocates and Influencers</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://travelinggeeks.com/" target="_blank"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-1608" style="border: 0pt none; margin: 2px 12px;" title="Traveling Geeks" src="/wp-content/uploads/2009/06/traveling-geeks-128x128.jpg" alt="Traveling Geeks" width="72" height="72" /></a>Rather than blasting out advertising indiscriminately to everyone, firms are finding they can target individuals who like their brand and can influence others to see the brand more positively. There are more and more ways to find out who your brand&#8217;s advocates and influencers are. That’s because software is now tying the data together so we can actively decide how to reach and, more importantly <em>interact with</em>, our passionate customers. Social media allow us to openly and transparently interact with and have conversations with our customers.</p>
<p>Susan Bratton, JD Lasica, Renee Blodgett and Robert Scoble discuss these aspects of marketing and customer relations in this roundtable in Cambridge as a part of <a href="http://travelinggeeks.com/" target="_blank">Traveling Geeks</a> 2009.</p>
<div class="aligncenter"><iframe loading="lazy" width="560" height="315" src="https://www.youtube.com/embed/GZ7ik_CrN2s" frameborder="0" allowfullscreen></iframe></div>
<p>&nbsp;</p>
<p>The post <a href="https://blog.red7.com/reaching-advocates-and-influencers/">Reaching Advocates and Influencers</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/reaching-advocates-and-influencers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1835</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: blog.red7.com @ 2026-04-29 21:20:30 by W3 Total Cache
-->