Search
Content type: News & Analysis
Written by the National Coalition for Human Rights Defenders - Kenya and Privacy International
05:00: Mercy’s alarm goes off. She gets out of the warmth of the bed into the piercing morning chill. She switches on the bedside lamp and reaches for her Bible. She then checks in onto her devotional group on Facebook, as she does every morning. Her Facebook app keeps track of her location, and the time she wakes up.
05:24: She steps into the shower and prepares for her day in the…
Content type: News & Analysis
Written by Privacy International
08:27: Jen gets on the London Underground to go to work. She uses her contactless debit card to pay for the tube, so Transport for London knows where she is travelling to and from and her bank knows when she takes the tube.
08:36: The public WiFi on the tube means that even when Jen doesn’t connect to it, her every step inside the underground is tracked. The data will eventually be sold to advertisers.
08:58: Jen arrives at work. As with all the lower…
Content type: Long Read
The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices to interacting with devices we have no control over and no knowledge that we are generating data. Below we outline 10 ways in which this exploitation and…