GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
The SeattlePI reports that an Amazon Echo user requested Alexa's recordings of him and Amazon sent them to the wrong user. According to the story, the recordings made identifying the recorded user easy.
Amazon claims this was an isolated incident, but what I find disturbing is the record-keeping.
People really need to start exercising some sense about unquestionably accepting Silicon Valley's "free" services. (And, yes, I know Amazon is not physically in Silicon Valley, but it might as well be.)
We are blindly giving away our privacy to outfits who use it manipulate us for mammon just so we don't have to get up, walk across the room, and turn on the coffee pot.
Distribution: Slackware/Salix while testing others
Posts: 1,718
Rep:
How about these little incidents:
Quote:
"Alexa told one customer to KILL their foster parents and chatted about dogs defecating and sex acts after Amazon launched its 'let's chat' AI experiment"
Distribution: Slackware/Salix while testing others
Posts: 1,718
Rep:
Quote:
Originally Posted by frankbell
The SeattlePI reports that an Amazon Echo user requested Alexa's recordings of him and Amazon sent them to the wrong user. According to the story, the recordings made identifying the recorded user easy.
Amazon claims this was an isolated incident, but what I find disturbing is the record-keeping.
People really need to start exercising some sense about unquestionably accepting Silicon Valley's "free" services. (And, yes, I know Amazon is not physically in Silicon Valley, but it might as well be.)
We are blindly giving away our privacy to outfits who use it manipulate us for mammon just so we don't have to get up, walk across the room, and turn on the coffee pot.
Here's a key excerpt, in case the link doesn't work on the other side of the Big Pond:
Quote:
The New York Times’ reporting offers a necessary window into the surveillance economy and the emerging economic logic of surveillance capitalism. We are beginning to see how the trade in data — much of it done behind the scenes — is also an exchange of influence and power. We are becoming aware of companies’ astonishing informational appetites, according to which all data is potentially useful. Even carmakers like Ford are beginning to tout consumer data as a major revenue stream on par with the selling of actual automobiles. In other words, The New York Times’ reporting doesn’t just implicate Facebook: It’s an indictment of the whole economic system in which we all participate today.
Distribution: Currently: OpenMandriva. Previously: openSUSE, PCLinuxOS, CentOS, among others over the years.
Posts: 3,881
Rep:
Thanks for the thread, and remind me never to tell Alexa anything - actually, I'll just give it same fake news. Then Alexa can tell whoever they like...
My rock is very comfortable - I'll stay under it...
Last edited by jsbjsb001; 12-22-2018 at 04:51 AM.
Reason: forgot "give" :doh:
By heavens, I know that Big Data is harvesting as much as they can about me, but, for Pete's sake, I'm not going to just hand it over to them on a silver platter.
I suspect that, if a lot of the folks who have bought these things realized what is going on behind the scenes, they would take them out back and smash them. But there's large contingent who would say, as a person I know says, "I have nothing to hide."
Well, I don't have anything to hide either, but that doesn't mean I want to run nekkid through Silicon Valley.
My local rag had a story relevant to this thread today. I could not find it on their site, so I went to the source, the website of the College of William and Mary in Virginia (to use the full name).
Two William and Mary researchers have been studying "smart home" devices and have concluded that they are even more vulnerable than even cynical old I thought.
Here's a bit from the article at the W&M website:
Quote:
For example, let’s say you want to change the temperature of your thermostat. You pull up your smart home app on your mobile phone and tell it to turn up the heat. The app will then write a change to the target temperature variable in the centralized data store. The thermostat device will subsequently receive an update from the data store and change its temperature accordingly. The system works because apps and devices are able to communicate by reading from or writing to variables in the centralized data store.
The problem, Nadkarni and Poshyvanyk explained, is that a data store-based system provides hackers the ability to access all devices in the home, from light switches to security alarms. An adversary can compromise one low-integrity product, like a sprinkler or a third-party lighting app, and modify a data store variable that another high-integrity product, such as a security alarm, depends on. This can have a whole host of unwanted consequences.
Apparently if they can hack your thermostat or your fridge, they can get into your router from there. And then nothing you do on your computer is private any more!
another aspect of how the Internet Of Things is a really bad idea
and a total waste of bandwidth why on earth dose a toaster coffee maker table lamp have to be connected to the internet
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.