skip to main content
opinion
Free Access

Modern tech can't shield your secret identity

Published:25 April 2022Publication History
Skip Abstract Section

Abstract

The Communications website, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.

twitter

Follow us on Twitter at http://twitter.com/blogCACM

http://cacm.acm.org/blogs/blog-cacm

Jason Hong considers how modern computing technologies would undermine superheroes' anonymity.

References

  1. Tucille, J.D. New Yorkers are watched by more than 15,000 surveillance cameras. Reason, June 7, 2021. https://bit.ly/3gIpjEoGoogle ScholarGoogle Scholar
  2. Michel, A.H. Eyes In The Sky: The Secret Rise of Gorgon Stare and How It Will Watch Us All. Mariner Books. 2019.Google ScholarGoogle Scholar
  3. Superman - Want to tag Clark Kent? https://knowyourmeme.com/photos/1218277-supermanGoogle ScholarGoogle Scholar
  4. Ingram, D. Facebook to delete 1 billion people's 'facial recognition templates'. NBC News, Nov 2, 2021. https://nbcnews.to/3sygjYlGoogle ScholarGoogle Scholar
  5. Moyer, E. Clearview AI set to get patent for controversial facial recognition tech. C/Net, December 4, 2021. https://cnet.co/3oHz8alGoogle ScholarGoogle Scholar
  6. Whittaker, Z. T-Mobile quietly reported a sharp rise in police demands for cell tower data. TechCrunch. July 12, 2019. https://tcrn.ch/3gwETTMGoogle ScholarGoogle Scholar
  7. Valentino-DeVries, J., Singer, N., Keller, M., and Krolik, A. Your Apps Know Where You Were Last Night, and They're Not Keeping It Secret. The New York Times, December 10, 2018. https://nyti.ms/3srLO6aGoogle ScholarGoogle Scholar
  8. Thompson, S., and Warzel, C. Twelve Million Phones, One Dataset, Zero Privacy. The New York Times, December 19, 2019. https://nyti.ms/3gyJ94WGoogle ScholarGoogle Scholar
  9. O'Sullivan, D. How the cell phones of spring breakers who flouted coronavirus warnings were tracked. CNN, April 4, 2020. https://cnn.it/34ObJwyGoogle ScholarGoogle Scholar
  10. Balebako, R., Marsh, A., Lin, J., Hong, J.I., Cranor, L.F. The privacy and security behaviors of smartphone app developers. Workshop on Usable Security (USEC 2014). https://bit.ly/3oEWSMlGoogle ScholarGoogle ScholarCross RefCross Ref
  11. Chitkara, S., et al. Does this App Really Need My Location? Context-Aware Privacy Management for Smartphones. IMWUT 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Pepitone, J. Apple and Google get grilled on privacy. CNN, May 10, 2011. https://cnn.it/3GGRq1wGoogle ScholarGoogle Scholar
  13. Gallagher, S. Where've you been? Your smartphone's Wi-Fi is telling everyone. [Updated]. Ars Technica, November 5, 2014. https://bit.ly/35UNkpKGoogle ScholarGoogle Scholar
  14. Mac, R., and Hill, K. Are Apple AirTags Being Used to Track People and Steal Cars? The New York Times, December 30, 2021. https://nyti.ms/3HY31LfGoogle ScholarGoogle Scholar
  15. Duhigg, C. How Companies Learn Your Secrets. The New York Times, February 16, 2012. https://nyti.ms/3gASOImGoogle ScholarGoogle Scholar
  16. Associated Press. Priest outed via Grindr app highlights rampant data tracking. USA Today, July 23, 2021. https://bit.ly/3rISJJcGoogle ScholarGoogle Scholar
  17. Allyn, B. 'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man. NPR, June 24, 2020. https://n.pr/3gFu5TsGoogle ScholarGoogle Scholar
  18. Reichert, C. House Dems demand FBI, others stop spying on Black Lives Matter protests. C/INet, June 9, 2020. https://cnet.co/365lcAtGoogle ScholarGoogle Scholar
  19. Freed, D., et al. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. CHI 2018. https://bit.ly/3rEcP7iGoogle ScholarGoogle Scholar
  20. Bowles, N. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse. The New York Times, June 23, 2018. https://nyti.ms/3oEFoPWGoogle ScholarGoogle Scholar
  21. Benjakob, O. The NSO File: A Complete (Updating) List of Individuals Targeted With Pegasus Spyware. Haaretz, January 20, 2022. https://bit.ly/34O0W5EGoogle ScholarGoogle Scholar

Index Terms

  1. Modern tech can't shield your secret identity

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image Communications of the ACM
                  Communications of the ACM  Volume 65, Issue 5
                  May 2022
                  108 pages
                  ISSN:0001-0782
                  EISSN:1557-7317
                  DOI:10.1145/3533590
                  Issue’s Table of Contents

                  Copyright © 2022 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 25 April 2022

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • opinion
                  • Popular
                  • Pre-selected

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                HTML Format

                View this article in HTML Format .

                View HTML Format