<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<br>
That is freakin' _excellent_. <br>
<br>
That is exactly what we need.<br>
<br>
Paradigm: When you control the technology, it's liberating. When
you don't, it's oppressive.<br>
<br>
For example Google's EULA agreement for their Search app update on
Android, which gives them permission to turn on your camera and
microphone at ANY time and WITHOUT notifying you or seeking
confirmation: there is no other reason for that, than to spy on
people: it's oppressive technology. "You search Google, Google
searches you. We invented Search, we don't need no stinkin'
warrant!"<br>
<br>
Contrast to: DIY mobiles, with open-source operating systems and
apps, where every function is controlled by the user. To which I'd
add my "hookswitch," a simple physical switch with three positions:
ON (fully enabled), Standby (all sensors physically disconnected
& shorted, all it can do is ring), and OFF (battery
disconnected, totally shut down). <br>
<br>
Ideal case, the user can toggle every sensor on and off at will.
When you're making a phone call you probably don't want your camera
on. When you're taking photos, you probably don't want your mic
on. If you're concerned about being stalked, you don't want your
GPS on unless you call 911. <br>
<br>
But we don't have to settle for a wooden enclosure with un-labeled
buttons. We could also have custom enclosures built, that are fully
functional and properly labeled, and more robust than the commercial
ones. There's no good reason a mobile can't be as physically
robust as an oldschool dial phone.<br>
<br>
-G.<br>
<br>
<br>
=====<br>
<br>
<br>
<div class="moz-cite-prefix">On 13-03-27-Wed 1:29 PM, J Clark wrote:<br>
</div>
<blockquote
cite="mid:42EBC818-6C71-4A06-864F-4D7CFA090598@manymedia.com"
type="cite">Sudoers,
<div><br>
</div>
<div>Following a related conversation earlier, here's info on a
DIY cellphone:
<div><a moz-do-not-send="true"
href="http://hlt.media.mit.edu/?p=2182">http://hlt.media.mit.edu/?p=2182</a></div>
<div><a moz-do-not-send="true"
href="https://github.com/damellis/cellphone">https://github.com/damellis/cellphone</a></div>
<div><br>
</div>
<div>I'd love to follow any development that happens around
here. Not a coder, but happy to test!</div>
<div><br>
</div>
<div> j.</div>
</div>
<div><br>
</div>
<div>P.S. from the "you knew it was coming" dept:</div>
<div><br>
</div>
<div><span class="Apple-style-span" style="font-family: monospace;
">How Hard Is It to 'De-Anonymize' Cellphone Data?</span><span
class="Apple-style-span" style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "><a moz-do-not-send="true"
href="http://j.mp/14oUhaC">http://j.mp/14oUhaC</a></span><span
class="Apple-style-span" style="font-family: monospace; "> </span><span
class="Apple-style-span" style="font-family: monospace; "> (Science
Daily)</span><span class="Apple-style-span"
style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> "The proliferation of sensor-studded cellphones
could lead to a wealth</span><span class="Apple-style-span"
style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> of data with socially useful applications --
in urban planning,</span><span class="Apple-style-span"
style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> epidemiology, operations research and
emergency preparedness, among</span><span
class="Apple-style-span" style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> other things. Of course, before being released
to researchers, the</span><span class="Apple-style-span"
style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> data would have to be stripped of identifying
information. But how</span><span class="Apple-style-span"
style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> hard could it be to protect the identity of
one unnamed cellphone user</span><span
class="Apple-style-span" style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> in a data set of hundreds of thousands or even
millions? According to</span><span class="Apple-style-span"
style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> a paper appearing this week in Scientific
Reports, harder than you</span><span class="Apple-style-span"
style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "> might think."</span><span
class="Apple-style-span" style="font-family: monospace; "><br>
</span><span class="Apple-style-span" style="font-family:
monospace; "><br>
</span></div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
sudo-discuss mailing list
<a class="moz-txt-link-abbreviated" href="mailto:sudo-discuss@lists.sudoroom.org">sudo-discuss@lists.sudoroom.org</a>
<a class="moz-txt-link-freetext" href="http://lists.sudoroom.org/listinfo/sudo-discuss">http://lists.sudoroom.org/listinfo/sudo-discuss</a>
</pre>
</blockquote>
<br>
</body>
</html>