location based services and privacy (or the lack thereof) – Part 2

This is a follow-up on the original post: Location based service and privacy (or the lack thereof). This post, part two is a short evaluation of how sharing my location with each and everyone changed my life.

Okay so what did I do? Well I spend the first couple of weeks tweeting, and sharing my location on foursquare 4 or 5 times each day. I lost some followers to that but it was in the name of science. My days basically are kind of »Read More

location based services and privacy (or the lack thereof)

Geolocation, Privacy, Twitter and Foursquare

(I know where you have been)

Location based services and privacy. Are you willing to give the latter one up for the first?

This is the first in a series of three.

  1. This post; general introduction
  2. May 2011; after a couple of weeks location sharing
  3. June 2011; a while without.

Lets talk about a few things first, Twitter, Facebook, Foursquare, Google Latitude, Flickr. I bet you use at least two of those? Good, so do I. I mainly use Twitter, upload a daily picture to Flickr, reply to posts on Facebook and am about to share my daily location via Foursquare for this experiment, so lets continue. What exactly does this mean in regard to privacy? »Read More

Hello world!

So where have I been the past couple of months? Well mainly at school, work and home.

Stay tuned, I’ve got something coming up on privacy.

GPG/ PGP Encryption for e-mail

As some might know, PGP is a way to encrypt or sign messages. I’m using GPG (Hey you misspelled it,- no i did not) for quite a while now and thought i’d write this little post about it. First of all some background.

PGP stands for Pretty Good Privacy and became commercial some years ago. GPG is the free alternative. GPG can be used to encrypt and decrypt messages and documents using certificates. For _all_ the information on PGP visit Wikipedia. Though you should use GPG.

So how does it work? Well Each party creates a Public and a Private key. The Publicis the one that you send to other parties and the Private is the one you should guard with your life. When someone encrypts a message with your Public Key, your Private key allows you to decrypt it, and since it is signed with the others Public key, the matching Private key allows for decryption as well. »Read More