Microsoft's "Don't get Scroogled!" campaign - can developers clarify? - Android General

If you haven't seen it: http://www.scroogled.com/ (it's by Microsoft--their name is at the bottom): "When you buy an Android app from the Google app store, they give the app maker your full name, email address and the neighborhood where you live. This occurs without clear warning every single time you buy an app."
App developers: do you actually get the real names of everyone who downloaded your app? If so, that's not that private. I don't download these kinds of apps (haha), but does this mean that the developer of Korea Sexy Girl Puzzle could release a list of the real names of everyone who downloaded his/her app? And, what about locations? What is the purpose of knowing the zip code of who downloaded your app? This issue isn't that big (unless you live in a very unpopulated zip code), but I don't see the reasoning.
---
Preferably, if you're an app developer, I'm just curious what exactly you see. But, if you're a non-app-developer, if you have legitimate information, I'd be interested. And not that it matters, but I'm an Android guy. This post isn't some Microsoft fanboy trying to start a flame war. Just want to get some facts, as I'm a little hesitant to trust one company's claim about a competitor.
~Ibrahim~
P.S. The infographic they made: http://blogs.technet.com/resized-im...00-00-00-97-94/2318.scroogled_5F00_041713.jpg

sour grapes ? win 8 sales are not good so why not lets do some mud slinging on android. but I am not a developer and I am too eager to learn what a developer would have in reply.

OK, this "sharing" is the same sharing done by Amazon, Etsy, and "everyone else on the internet." Developers, like Amazon or Etsy peeps, agree not to share the data. The data is required for financial transactions, apparently. Source: http://techcrunch.com/2013/04/09/mi...ogle-developers-need-to-process-transactions/
Microsoft, apparently, responded with this:
"Google also claims that sharing this information is necessary to process your transaction and maintain your account — that is, to issue refunds, reversals and payment adjustments. But, similar stores — including the Windows Phone Store and Apple’s App store, don’t do this, because it isn’t necessary for an app maker to have your full name, email address and ZIP code to process the initial transaction, issue refunds or handle customer service issues. Google could easily provide more anonymous means to handle these transactions."
Source: http://blogs.technet.com/b/scroogle...on-t-get-scroogled-by-google-s-app-store.aspx
~Ibrahim~

Related

[WARNING] DavinciDevelopers steal apps from this forum !

/!\ BE AWARE OF YOUR APP, DavinciDevelopers try to steal them and sell them on the market !!
Hello guys,
Be careful, if you post an apk of your free app here, somebody will try to take the apk, remove the signature, and upload it as a paid version on the market !
The proofs : (edited to add new stolen softwares)
Llamadroid
- http://forum.xda-developers.com/showthread.php?p=10113570#post10113570
- http://www.androlib.com/android.application.com-kebab-llamadroid-zzjjD.aspx
(removed today, on 5th january)
Typo clock
- http://forum.xda-developers.com/showthread.php?t=814054
- http://www.appbrain.com/app/beautiful-clock-widget-3d/com.semicuda.typoclock
Iron soldiers
- http://forum.xda-developers.com/showthread.php?t=862875
- http://www.appbrain.com/app/iron-soldiers/vuxia.ironSoldiers
(removed from market today, on 5th january, but still referenced)
Championship racing 2010
- http://www.vividgames.com/sub_game.php?id=42
- http://www.androlib.com/android.application.com-vividgames-championship_racing_2010-zzxwq.aspx
(removed today, on 5th january)
Liquid wallpaper
http://forum.xda-developers.com/showthread.php?t=878252
http://www.appbrain.com/app/liquid-physics/livewallpaper.liquid
Bluetooth Scanner
http://forum.xda-developers.com/showthread.php?t=900923
http://www.androidzoom.com/android_games/casual/bluetooth-scanner_pvqg.html
(New !! Now, we have proof that ALL his apps are stolen)
And even Gameloft best sellers (paid games) :
http://www.androlib.com/android.app...ndroid-gand-gloftspaw-heroofsparta-zjCDi.aspx
(removed from market today, on 5th january, but still referenced)
http://www.androlib.com/android.application.com-gameloft-android-gand-gloftavar-avatar-zjCEx.aspx
(removed from market today, on 5th january, but still referenced)
Minigore
http://minigore.blogspot.com/2009/07/what-minigore-is.html
http://www.appbrain.com/app/minigore-hd/com.ambushgames.minigore
http://www.androlib.com/android.application.com-ambushgames-minigore-zzjqD.aspx
Zuma's revenge
Original
http://www.zumasrevengegame.com/
http://store.steampowered.com/app/3620/
Scammers
http://www.appbrain.com/app/zumas-revenge-hd/com.popcap.zumas_revenge
http://www.appbrain.com/app/zumas-revenge/com.fox.game.zumasrevenge
How is it possible ?
Google does not check your apk signature when you upload a software.
Even if you signed yous apk with you key, somebody else can put this on his google account.
The signature can be deleted easily if needed.
He can change the title of your app, so nobody see it, but he can't change the apk name nor the icon.
Why do we post our apk here ?
To have testers, to correct bugs, to have a perfect look and feel before put it on the market.
Because on the market people are rude, we have only one chance, so we need to avoid bugs.
And when we put our app online, we want to choose if it's paid or free (with ads or not).
What is the problem ?
If DavinciDevelopers steal and upload your app, he will lock your pak name.
2 apps can't have the same name on the market.
You may have a name like com.myname.myapp.apk
Where "myname" is the same in every app you do.
If he take that, this is a major issue for you because you will be associated to him on every search (google.com, market...).
So, you will have to change your app name and maybe your company name....
Within 1 or 2 days, the market is parsed from androlib, androidzoom, appbrain... and it's done. Google.com will see those websites, and you are trapped.
You will have your buggy app on the market, some people will pay for that, the thief will have some money, and every users will have a bad opinion of your app.
Why DavinciDevelopers does this ?
To make benefit from your work.
Because he doesn't care you are working from a long time on your app.
Because he doesn't care if your work is ruined, he will find somebody else.
How can we be protected ?
Because 2 apps can't have the same name, you should put your app on the market first.
If your app is in development stage, you can upload it as "draft", so it will not be visible on the market, but the name will be locked.
Who is DavinciDevelopers ?
Somebody that have 83 apps on the market !
Almost all of them are themes.
If you look the package name you can see for example :
com.nd.android.pandatheme.p__3d_android_theme
at :
http://www.androlib.com/android.application.com-nd-android-pandatheme-p__3d_android_theme-qAmiz.aspx
google search : "pandatheme", first link :
http://home.pandaapp.com:888/
So he is not a developer. He makes themes with a free online tool and sell them... nice.
And for the real apps he uploaded (about 5), they all are stolen, coming from poland, germany, and other places.
Almost every of them comes from XDA dev forums.
ps : this message should be marked as sticky in every development section.
Wow, I can't believe this
It gets even better! Check this out:
http://www.androlib.com/android.app...ndroid-gand-gloftspaw-heroofsparta-zjCDi.aspx
http://www.androlib.com/android.application.com-gameloft-android-gand-gloftavar-avatar-zjCEx.aspx
He released the liquid physics live wallpaper I posted on here as well.
http://forum.xda-developers.com/showthread.php?t=878252
http://www.appbrain.com/app/liquid-physics/livewallpaper.liquid
Attacking GameLoft was a bad move for this/these guy(s).
They hit somewhere they shouldn't have I think.
Khoral said:
Attacking GameLoft was a bad move for this/these guy(s).
They hit somewhere they shouldn't have I think.
Click to expand...
Click to collapse
He has ripped off Popcap as well
http://www.appbrain.com/app/zumas-revenge-hd/com.popcap.zumas_revenge
And MiniGore
http://www.appbrain.com/app/minigore-hd/com.ambushgames.minigore
So STICKY!!!
It's really funny the website slogan:
http://davincidevelopers.weebly.com/
Innovation is everything. WTF
What do you thing, does it matter to left a comment like: app is stolen,... Seller steals apps from real developers or something else in market for "his" apks?
I wrote an email to appbrain and told them about this: maybe they can at least exclude this person from appbrain???
Has anyone emailed him to let him know that we all know?
Dirtbags
Sent from your mom's phone
kiltedthrower said:
Has anyone emailed him to let him know that we all know?
Click to expand...
Click to collapse
Like they would care... they just want to make some quick money from other's work.
The only way we can solve this if somehow we contact google to do something about it.
Since yesterday, he deleted some apps from his market.
I'm the developer of iron soldiers, I had been notified yesterday by another xda forum user that he stole my app.
I emailed him and within 3 or 4 hours he removed the app.
He answered me that he is so sorry, that he shares his key with other people and he didn't know... blabla.
Anyway, he has many stolen apps so he is hard to believe.
Now I see that thanaos2042 created a new thread (thanks ) and that google already referenced it :
If you google "davincideveloppers", this post is already in the first page !
Internet has a memory, and his name will not be forgotten.
they sell a lot of apps which is 80++ but they still using free website ....what a cheapskate...
Holy ****. Mods, please sticky this!!
I sincerely hope Google kicks their ass for this. I'm not familiar with the ToS but I hope they get hit with a lawsuit and instant refunds to say the least.
Stealing from Indie Developers is simply ****ed up. Wouldn't it be funny if a massive attack was launched against this asshole's website? (wink wink)
Chalup said:
Stealing from Indie Developers is simply ****ed up. Wouldn't it be funny if a massive attack was launched against this asshole's website? (wink wink)
Click to expand...
Click to collapse
No, it wouldn't. He/they are using a free web host so that would effectively be an attack on a whole lot of innocent sites.
Terrible to steal!
stolen apps are all over the market, ive even seen the r2d2 live wallpaper from the droid, on the market for 99p,
Good to know about these flagrant ripoffs
Looks like someone took their website down. The link now shows a page that isn't published.
Edit: Looks like Google could do something about this since it appears to be a violation of the terms of service (see 11.4, 13.3 and 16)
11. Content licence from you
11.1 You retain copyright and any other rights you already hold in Content which you submit, post or display on or through, the Services. By submitting, posting or displaying the content you give Google a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive licence to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any Content which you submit, post or display on or through, the Services. This licence is for the sole purpose of enabling Google to display, distribute and promote the Services and may be revoked for certain Services as defined in the Additional Terms of those Services.
11.2 You agree that this licence includes a right for Google to make such Content available to other companies, organizations or individuals with whom Google has relationships for the provision of syndicated services, and to use such Content in connection with the provision of those services.
11.3 You understand that Google, in performing the required technical steps to provide the Services to our users, may (a) transmit or distribute your Content over various public networks and in various media; and (b) make such changes to your Content as are necessary to conform and adapt that Content to the technical requirements of connecting networks, devices, services or media. You agree that this licence shall permit Google to take these actions.
11.4 You confirm and warrant to Google that you have all the rights, power and authority necessary to grant the above licence.
13.3 Google may at any time, terminate its legal agreement with you if:
(A) you have breached any provision of the Terms (or have acted in manner which clearly shows that you do not intend to, or are unable to comply with the provisions of the Terms)
16. Copyright and trade mark policies
16.1 It is Google’s policy to respond to notices of alleged copyright infringement that comply with applicable international intellectual property law (including, in the United States, the Digital Millennium Copyright Act) and to terminating the accounts of repeat infringers. Details of Google’s policy can be found at http://www.google.com/dmca.html.
16.2 Google operates a trade mark complaints procedure in respect of Google’s advertising business, details of which can be found at http://www.google.com/tm_complaint.html.

[SUGGESTION] How to tackle software thieves

I think everybody is well aware of the pain that software thieves like DavinciDevelopers and Chris Burchett is putting us through. Until Google cleans up their market policy and starts implementing some basic regulation, these robbers are going to continue stomping upon the intellectual property of the developers here.
As we all know, software thieves almost always exploit a very simple loophole: they delete signatures off the apks and then publish them to the Android market as a paid app under a different name, and everyone will be none the wiser. They make a quick buck from unsuspecting users who chance across the app and purchase it, and thus they profit off the labours of hardworking developers here. It matters little to them whether a thousand or a million users pass by their application page without choosing to install it, because every single user conned into paying for the app is a profit to them.
I strongly recommend that developers who publish their APKs here insert a pop-up into their application that appears on the first boot, stating very clearly that this app is freely published here (insert thread URL) and instructing the user to immediately seek a refund if he has paid for it, and to report the issue to Google.
In other words, probably something along the lines of:
PLEASE TAKE NOTE
This app has been freely published on XDA-Developers, and can be found at .
If you have paid for this app, PLEASE SEEK A REFUND IMMEDIATELY AND REPORT THE SELLER TO GOOGLE.
Click to expand...
Click to collapse
Additionally, you might also want to insert this in the "About" section of the app, if applicable.
Software thieves may be capable of deleting signatures, but they can't remove app elements. With users alerted to these dishonest actions, they will not only distrust them but send a flood of complaints pouring into Google, and sooner or later they'll have to pack up shop and think of actually doing something productive for society.
I'm sorry if this has already been suggested, but given the severity of this issue, I thought that it would be important to highlight this to all developers in here and out there. Not everyone may be aware of the dangers making the dive into application development, and fewer still might actually think of doing something about software pirates and intellectual property thieves.
Remember, this is only a short-term measure to help starve these software thieves of their ill-gotten gains (and perhaps also to create awareness for you and your thread). It does not preclude the usage of other anti-piracy measures, and it could be circumvented by the more tech-savvy of the thieves. In the long haul, we will still need to get Google to overhaul its Android Market policy to respect the intellectual property rights of developers.
Mods, please feel free to delete this or lock this thread if I am repeating what others have already proposed.
Madrenergic said:
Software thieves may be capable of deleting signatures, but they can't remove app elements. With users alerted to these dishonest actions, they will not only distrust them but send a flood of complaints pouring into Google, and sooner or later they'll have to pack up shop and think of actually doing something productive for society.
Click to expand...
Click to collapse
Just wanted to point out that this is not true. I've also seen people say that the package name cannot be changed. That's not true either.
A skilled developer could often easily delete app elements (Using obfuscation like proguard is a good deterrent). A crappy one might still manage, pirates do (Sure they'll add bugs in the process, but they don't care because they don't have to deal with the bug reports, you do).
A non-malicious example of hacking the internals of an app is how I enable long-press of Search on the Droid X/2 in my HomeSmack app (https://market.android.com/details?id=com.teslacoilsw.homesmack). Motorola hard-coded long-press of search to launch com.google.android.voicesearch/com.google.android.voicesearch.RecognitionActivity. So my solution replaces Google's VoiceSearch.apk with a modified one where I renamed Google's RecognitionActivity to RecognitionActivityReal and created my own RecognitionActivity. I kept RecognitionActivityReal functional so VoiceSearch can still be used.
It'd also be possible for the theifs to upload using your app signature. The disadvantage of course is that they can't modify it at all, even in the future.

Confessions of a Google junkie (or, Privacy? What privacy?)

the original link.....http://www.zdnet.com/blog/google/confessions-of-a-google-junkie-or-privacy-what-privacy/3553
Summary: A lot has been made of Google’s new privacy policy and terms of use. I say bring it on.
There are very few aspects of my life that don’t somehow involve Google. My phone runs on Android, my favorite tablet just got an OTA update to Ice Cream Sandwich (!!!), I use Chrome across all of my computers, I develop AdWords campaigns, I use Analytics to develop metrics for the day job and dive into SEO, I handle many of the CBS Interactive Google webcasts, I use Google Docs almost exclusively for productivity, and my wife doesn’t know where I am half the time until she checks my Google Calendar (which, in fact, aggregate two other Google Calendars).
I’m increasingly turning to Google+ as my source of relevant information and opinions, a function previously reserved for Twitter, and I’ve even dispensed with bookmarks, instead using Google Sites to organize important pages and resources.
I live, eat, breathe, work, and play Google and there aren’t many people more aware of Google’s business model and the amount of data it collects than I. So is it just sheer stupidity and naiveté that has me utterly embracing the Google ecosystem and relatively unconcerned about newly announced privacy policies that have caused so much consternation this week? Before you jump down to the talkbacks to tell me how stupid I really am, read on for another couple paragraphs.
As Larry Dignan pointed out in his post about the new policies last night,
Google noted that it already has all that data, but it’s now integrating that information across products. It’s a change in how Google will use the data not what it collects. In other words, Google already knows more about you than your wife.
From my perspective, though, I can live with Google knowing a lot about me. It knows, for example, that I’ve recently developed an obsession with the electric guitar and have been researching inexpensive models that I might just be able to justify as a birthday present to myself. It doesn’t judge, it just shows me the best deals in display ads on the three models of guitar and 2 models of amps I’ve been reading about the most. My wife isn’t aware of this obsession and her take on it would be judgmental (God love her!): “When will you have time to play guitar? And we’re supposed to be saving money! And what’s wrong with your acoustic guitar?”
Taking this a step further, as Google’s new privacy policies and terms of use do, I should expect to start seeing guitar-related apps in my suggestions in the Google Market and the Chrome Marketplace. Guitarists on Google+ should start appearing in suggested people to add to my circles and Google Reader should offer to download Guitar Player Magazine feeds for me. And, more likely than not, I’ll start seeing more guitar-related ads as well.
Google’s goal, of course, is to sell advertising. That’s about 97% of their revenue. By pulling people like me into their increasingly unified ecosystem, they can demonstrate very high click-through rates to potential advertisers and charge a premium to reach highly targeted and yet incredibly vast audiences.
They need to give me something in return
For me to buy into this, they need to give me something in return. Something to make all things Google really sticky. Like a wide array of free tools from Google Docs to Google Music to Google Voice. And cheap tools that I buy for my business like Google Apps and AdWords. Their new policies are designed to be more transparent, but also to pave the way for these tools to talk to each other better, making them even stickier through a unified experience and more relevant services.
Back to the wife comparison that Larry brought up. My wife knows that every Friday night is pizza night in our house. So does Google, since every Friday around 4:30 I pull out my Android and use Google Voice Search to find the number of whatever pizza joint we decide to patronize that week. Fine. Google, however, can actually do something more useful with that information than my wife can (”Where should I order pizza, sweetheart?” “Wherever, just not that place down the road. Or that other place. And make sure they’re having a deal!”).
Come Friday morning, the ads I see on Gmail or Google search should start being pretty pizza-heavy: Dominos, Papa Johns, and a place or two that has an active Google Offer. As I’m driving home that evening, the GPS on my phone should set off an alert when I drive past a well-reviewed pizza place (assuming I’ve set location-based preferences to alert me to destinations with at least four-star average reviews). And the minute I type a P in my mobile browser, Google Instant should leap into action and display nearby pizza places and a news story about a new place to get pizza in the next town.
We’re not quite there yet, but this is the sort of integration and experience that Google is covering in its new policies and terms of use. I know that my privacy red flags should probably be going off. Google has gigabytes of information about me and is using that information to help its advertisers sell products. That’s bad, right?
Guess what, folks? This is the semantic web
And yet, I don’t think it is. Many of the same techies who cry foul over these new policies have also been pushing for the development of the semantic web to make it easier to find what we actually need in the trillions of web pages floating around the Internet. Guess what, folks? This is the semantic web. When our search engines know what we actually mean, when data on the web automagically becomes information we can use easily and quickly, we’ve arrived.
And the semantic web can’t exist without “the web” (whatever that is) knowing a lot about us. It takes data for a computer to understand our needs and process natural language efficiently. Some of those data will necessarily be fairly personal.
Now, if I start getting spam from pizza places or calls on my Google Voice number from Dominos because Google has sold my contact information and preferences to advertisers, we have a problem and I’ll be waving my privacy flag as high as anyone else. However, when I opt in by opening a Google account and staying logged in as I surf the web, I’m not only consenting to the collection and aggregation of data about me, I’m asking that it be done so that the web and related tools can be more useful to me. This sort of data mining lets me work faster, play easier, and find the best pizza in a 20-mile radius.
For its part, Google needs to remain the trusted broker of these data. No, I don’t like the idea that our government could brand me a terrorist and seize these gigabytes of data under the Patriot Act. The alternative, though, is an ever-growing morass of web sites and tools that I get to dig through manually.
And, by the way, even if I’m not logged in to my Google account as I’m doing it, my ISP knows the sites I’ve visited, too, and could just as easily (if not more so) be compelled to turn over this information to the real Big Brother in all of this.
Far more trust in Google than the Feds
Honestly, I have far more trust in Google than I do in the Feds. Google is motivated by money: they need my trust to keep collecting those data to keep making it easier for me to buy things from Google’s paying advertisers. If that trust is broken by inappropriate sharing of data, then my eyeballs go elsewhere and so do the advertisers who target me via AdWords and AdSense. Our government has no such financial motivation. Money talks.
The fact that the speech recognition on my phone kicks ass because I use Google Voice all the time and it’s learned how I talk might be a little creepy, but it’s far more important that I can do a Google search or send a text while I’m driving without taking my eyes off the road.
Welcome to 2012, folks. The semantic web has arrived. Use it well and let’s keep Google’s new policies in perspective. And Google? Don’t be evil. I have a lot of colleagues who will be pointing, laughing, and saying I told you so if you ever are.
Nice article.
I think the key for Google's continued success is to keep the advertising passive, suggestions when you're searching etc. aren't in your face but they work.
You see a lot of people complaining that they've been searching for something online and then all of the adverts on the websites they visit contain something pertaining to that, and they grumble that it's annoying. Personally, I'd much rather see an advert to something that's relevant to me rather than a cluttered webpage of irrelevant information.
By targeting adverts and increasing their relevance to the individual, they are far more likely to be successful. This means that the revenue per advert is going to improve and websites aren't going to need to cover their website in adverts (at the cost of the user experience) to make it profitable.
Plus given the huge amount of free stuff that google gives you, it's a bit rich for somebody to complain that they're trying to get something back off you.
I too would much rather see things directly targeted towards me then just random ads. And everyone is up in arms about google recording what you do. Well i think of it this way, i'm fine with them getting to know me and my behavior and what i do, as long as they keep providing FREE products for me.
Ahh the good old "If they are going to screw me without consent, I would much rather they knew my name, stroked my hair and whispered sweet nothings into my ear while they did it."
I prefer to treat my online habbits like the strange neighbour a few doors down. Say "hi" in passing, and realise that while they probrobly know more than I would want them to from when I've invited them over for coffee and from peeking in my windows as they walk past, know that I don't actually have to put up with their $#!+ if they become too creepy.
Thats why its important there are alternitives and competition, and that we as consumers don't put our eggs all in one basket and be prepared to protest or move on if they stretch the friendship too far.
I know privacy is impossible in this day and age but that doent mean you have to lie back and take it. "because you know it means well and it does give you nice gifts once in a while"
My suggestion is cut your reliance on any one brand and spread out the load.
hungry81 said:
My suggestion is cut your reliance on any one brand and spread out the load.
Click to expand...
Click to collapse
I like the author am reliant on Google these days. I'd be happy to look at alternatives. Granted they work on the platforms I needs them to, Android 2.X and 3.2, Linux+chrome, windows XP + chrome, and windows 7 + firefox or chrome. The linux requirement cuts out a lot of things, iTunes/iCloud for example.
Have any suggestions who/where i could go for:
Music
Docs
G+
Gmail
Needs a slick webUI, and the searching ability of gmail
Calendar
I need delegation and the ability for my wife to add me to events and share calendars.
Reader
works on all my devices, and syncs between them
I would very much like my phone to know when I leave work. Now i could do this with some sort of timer, but I end up working somewhat flexible hours, and have a leaving time of anywhere within an hour and a half. I would like it to know that since I now have "buy bread, milk, and eggs" on my to-do list (thanks hun!), that it needs to remind me of that on the way home. Even better if it can just direct me to a store with a deal on one or all of those things.
I like that the first hit in Google I get for cookies is the wikipedia page for http cookies and the second is to pythons cookielib module. Where as I bet my grandmother gets, chocolate chip cookies. The ability for Google search to know that I have a particular artist in my collection, and show me the bind's page near the top of the results without me having to add "band" to my search terms.
Anyways, if and when Google starts selling my data to 3rd parties, I'll export my data and move. Google makes it fairly painless to do that.

[GUIDE] Some incredibly simple things to protect YOUR PRIVACY!

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
The term "privacy" means many things in different contexts. Different people, cultures, and nations have a wide variety of expectations about how much privacy a person is entitled to or what constitutes an invasion of privacy. Information or data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of, privacy in the collection and sharing of data about one's self. Privacy concerns exist wherever uniquely identifiable data relating to a person or persons are collected and stored, in digital form or otherwise. In some cases these concerns refer to how data is collected, stored, and associated. In other cases the issue is who is given access to information. Other issues include whether an individual has any ownership rights to data about them, and/or the right to view, verify, and challenge that information.
This post does not intend to address the many definitions of privacy or the many technical means of protecting and invading one's privacy. There are already many posts addressing this aspect and brief search can turn up lots of answers for you.
This post is only intended to help the least technically savvy among us in maintaining some small amount of data security and privacy without getting very technical about things. It was derived from many diverse sources on basic privacy.
Note that I do NOT have a DONATE button anywhere.
I am not looking for donations.
If you feel that you should donate something, by all means,
send it to your favorite XDA developer and/or XDA itself!
And don't be shy about the
button for the many posters who were of help to you!
Recently, a friend handed me his phone and asked me to take a picture. “What’s the password?” I asked. “I don’t have one,” he said. I think I must have had a puzzled look on my face as, I suppose, I tend to grimace when someone I know tells me they’re choosing not to take one of the very simplest steps for privacy protection, allowing anyone to look through their phone with the greatest of ease, to see whichever messages, photos, and sensitive apps they please.
So, this post is for you, big guy with no password on your Galaxy/iPhone/Nexus/whatever, and for you, girl who stays signed into GMail on your boyfriend’s computer, and for you, person walking down the street having a loud conversation on your mobile phone about your recent doctor’s visit of that odd ailment you have. These are the really, really simple things you could be doing to keep casual intruders from invading your privacy.
1 Password protect your phone! It is one of the simplest things you can do to most devices (smartphones, tablets, etc.) with the least amount of effort. Many people tell me it is “annoying” to take the two seconds to type in a password each time before using the phone. Gimme a break, everyone!. Choosing not to password protect these devices is the digital equivalent of leaving your home or car unlocked. If you’re lucky, no one will take advantage of you. Or maybe the contents will be ravaged and your favorite speakers and/or secrets stolen. If you’re not paranoid enough, spend some time reading entries in Reddit, where many Internet users go to discuss issues of the heart. A good percentage of the entries start, “I know I shouldn't have, but I peeked at my gf’s phone and read her text messages, and…” Oh, and before you pick a password like "123456" or "password" do yourself a big favor and visit the Worst passwords of all time web page! No laughing allowed!
2 Turn on 2-step authentication in GMail (that is, if you use GMail, of course). The biggest conclusion you can derive from the epic hack of Wired’s Mat Honan is that it probably wouldn't have happened if he’d turned on “2-step verification” in GMail. This simple little step turns your device into a security fob — in order for your GMail account to be accessed from a new device, a person (you?) needs a code that’s sent to your phone. This means that even if someone gets your password somehow, they won’t be able to use it to sign into your account from a strange computer. (How it works - video) Google says that millions of people use this tool, and that “thousands more enroll each day.” Be one of those people! Yes, it can be annoying if your phone battery dies or if you’re traveling. Of course, you can temporarily turn it off when you’re going to be abroad or phone-less. Alternately, you can leave it permanently turned off, and increase your risk of getting epically hacked. Which do you like better?
3 Put a Google Alert on your name! This is an incredibly easy way to stay on top of what’s being said about you online. It takes less than a minute to do. Go here: http://www.google.com/alerts; anyone can do it easily. Google Alerts are email updates of the latest relevant Google results (web, news, etc.) based on your queries. Enter your name, and variations of your name, with quotation marks around it. Boom. You’re done. Now, that wasn't too tough, was it? I didn't think so. :-]
4 Sign out of your Facebook / Twitter / GMail / etc. account! Do it each time you are done with your emailing, social networking, tweeting, and other forms of general time-wasting. Not only will this reduce the amount of tracking of you as you surf the Web, this also prevents someone who later sits down at your computer from loading one of these up and getting snoopy. This becomes much more important when you’re using someone else’s or a public computer. Yes, people actually forget to do this, with terrible outcomes. Incidentally, if you have the Chrome browser on your PC and you use “incognito” (Ctrl Shift N) or Internet Explorer and you use “InPrivate” (Ctrl Shift P) you will automatically be logged out when you close the window, and no cookies or passwords will be stored. Pretty cool, right?
5 Don’t give out your email address, phone number, or zip code when asked. Hey, if some scary (or weird) looking dude in a bar asked for your phone number, you'd say no, wouldn't you? But when the person asking is a uniform-wearing employee at a local store, many people hand over their digits without hesitation. Stores often use this info to help profile you and your purchase. Yes, you can say no. If you feel badly about it, just pretend the employee is that scary looking dude!
6 Change Your Facebook settings to “Friends Only.” I really thought that by now, with the many Facebook privacy stories which have been published, everyone would have their accounts locked down and boarded up like a cheap Florida house before a hurricane. Not so. There are still lots and lots of people on Facebook who are as exposed on the internet as Katy Perry at that water park. Go to your Facebook privacy settings and make sure the “default privacy” setting isn't set to "public"! If it’s set to “Custom” make sure you know and understand any “Networks” you’re sharing with.
7 Use unique passwords for every site you go to. This sounds really difficult but - surprise - it is quite simple! Password managers come in many sizes and flavors these days. They will generate complex passwords and remember them for you. Protect yourself against phishing scams, online fraud, and malware. Many of these apps have versions you can use on your computer as well as on your tablet and phone. Some are free and some cost money. Your choice. Here, let me show you how simple it is to find a bunch of them: http://bit.ly/V4xehO! As I said, there are many - the one I use is this one here.
8 Clear your browser history and cookies on a regular basis. Do you remember the last time you did that? If you just shrugged, consider changing your browser settings so it is automatically cleared every session. Go to the “privacy” setting in your Browser’s “Options.” Tell it to “never remember your history.” This will reduce the amount you’re tracked online. Consider one of the several browser add-ons, like TACO, to further reduce tracking of your online behavior.
9 Read the posted privacy policy. Boring, isn't it? Every web site has one and likely for a good reason. Have you ever seen the XDA Privacy Policy? Yup, that's just what I thought!
In conclusion, here's one from the Wall Street Journal's Law Blog.
As I said, this is not a technical article but it may make you think if it does the job right.
Sixth Circuit: No Expectation of Privacy in Cell Phone GPS Data
Drug dealers, beware. Your pay-as-you-go phones probably have GPS. And, according to a federal appeals court in Cincinnati, police can track the signal they emit without a warrant.
The U.S. Court of Appeals for the Sixth Circuit ruled that the Drug Enforcement Administration committed no Fourth Amendment violation in using a drug runner’s cellphone data to track his whereabouts. The DEA obtained a court order to track Melvin Skinner’s phone, after finding his number in the course of an investigation of a large-scale drug trafficking operation.
The DEA didn’t know much about Mr. Skinner or what he looked like. They knew him as Big Foot, the drug mule, and they suspected he was communicating with the leader of the trafficking operation via a secret phone that had been registered under a false name. Agents used the GPS data from his throw-away phone to track him, and he was arrested in 2006 at a rest stop near Abilene, Texas, with a motorhome filled with more than 1,100 pounds of marijuana.
Mr. Skinner was convicted of drug trafficking and conspiracy to commit money laundering. On appeal, he argued that the data emitted from his cell phone couldn’t be used because the DEA failed to obtain a warrant for it, in violation of the Fourth Amendment.
The question in the case was whether Mr. Skinner had a reasonable expectation of privacy in the data his phone emitted. It’s a question that several courts are wrestling with. Federal law enforcement authorities, as in this case, say that investigators don’t need search warrants to gather such information.
Justice Department lawyers argued in a court brief that “a suspect’s presence in a publicly observable place is not information subject to Fourth Amendment protection.”
Judge John M. Rogers, writing for the majority, agreed:
There is no Fourth Amendment violation because Skinner did not have a reasonable expectation of privacy in the data given off by his voluntarily procured pay-as-you-go cell phone. If a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track the signal. The law cannot be that a criminal is entitled to rely on the expected untrackability of his tools. Otherwise, dogs could not be used to track a fugitive if the fugitive did not know that the dog hounds had his scent. A getaway car could not be identified and followed based on the license plate number if the driver reasonably thought he had gotten away unseen. The recent nature of cell phone location technology does not change this. If it did, then technology would help criminals but not the police.
He was joined by Judge Eric L. Clay. Judge Bernice B. Donald, who concurred but disagreed with the majority’s Fourth Amendment reasoning, said the DEA couldn’t have figured out the identity of Mr. Skinner, the make and model of his vehicle or the route he would be driving without the GPS data from his phone.
“It is not accurate…to say that police in this case acquired only information that they could have otherwise seen with the naked eye,” she wrote. “While it is true that visual observation of Skinner was possible by any member of the public, the public would first have to know that it was Skinner they ought to observe.”
A lawyer for Mr. Skinner didn’t immediately respond to a request for comment.​
Comments? Suggestions? Ideas? They are all welcome.
Flame wars (relating to privacy or otherwise) are not. :-]
[GUIDE] Some incredibly simple things to protect YOUR PRIVACY - Part 2
Cameras on smart phones, getting better with each generation of new devices, allow people to take pictures or videos on the go and transmit these images by e-mail or post them to the Web. With phone in hand, unexpected sightings of celebrities can be snared with a flick of the wrist (turning the celled into the 'snaparazzi'), as can chance encounters with pretty girls or gorgeous sunsets. Their impact can be great for both good and evil.
Not too long ago two men lit themselves on fire in protest. But only one of them is credited with starting a revolution.
The difference between the two? Mobile phones recorded Mohamed Bouazizi, a Tunisian fruit vendor, as he set himself ablaze in despair over his economic plight. Those videos kicked off the wave of 2011 Arab Spring demonstrations.
Abdesslem Trimech, the other man, fell into relative obscurity. (Source: The Mobile Wave: How Mobile Intelligence Will Change Everything by Michael Saylor)
Back in 2005, a retail fraud investigator for one of the larger chain stores said that while he was still unable to capture a usable image of a credit card from even the then newer camera phones, he has been able to grab readable images of all account and routing info from the personal checks customers have produced at the checkout. Check writers, he says, have a tendency to "lay out" their check books on the writing counter at the registers and keep them stationary enough to obtain a clear image of all the personal information printed on the check. He has also tested this theory with camera-equipped palm tops and has found that with the adjustable resolution he has been able to get a pretty clear picture, with zoom, from a reasonable distance away (3-5 feet). So at this point in time, as phone cameras get better and better, your credit card might still be secure but your personal check might not be.
So, what personal information does your mobile phone reveal about you? Do you know? Do you care?
It seems that many people are slowly becoming more aware of the pitfalls and the mobile-privacy concerns.
According to reports, 54% of cell phone users in the U.S. have decided not to install an app once they discovered how much of their personal information it would access. (The amount of sensitive info an app can access typically is indicated by the "permissions" the app requests, listed on its information page.)
Also, nearly one-third of mobile app users report uninstalling an app from their phone because they learned it was collecting personal information they didn't wish to share.
We need to first be aware and also be willing to actively take steps in order to protect our own privacy. Children of all ages need to be carefully taught as well.
Okay, but what about students? Do students have an expectation of privacy on their cell phones while at school?
The short answer to this in the U.S. is a qualified yes. Whether educators have the authority to search the contents of student cell phones depends on a lot of factors. The key issue in this is the standard of reasonableness. According to New Jersey v. T.L.O (1985) students are protected by the Fourth Amendment to the U.S. Constitution which protects citizens against unreasonable searches and seizures. In T.L.O., the Supreme Court goes on to say that the standard that law enforcement officers must reach to conduct a search (probable cause that a crime has been committed), is not required of educators. In general, the standard applied to school officials is whether the search is “justified at its inception and reasonable in scope.” (See When can educators search student cell phones)
What information should children be taught NEVER to reveal?
The suggestions depend on their age. Common 'wisdom' suggests the following:
Elementary School Kids should NEVER share (their own or another’s):
Age
Full Name
Address
Phone Number
Name of School
Password Information
Images (with possible exception depending on parental involvement)
Middle School Kids should NEVER share (their own or another’s):
Age
Full Name
Address
Phone Number
Name of School
Password Information (even to friends)
Most Images (At this age, kids get into social networking and will be sharing images via cell phones and digital cameras. Parents should focus on limiting the images their children share online)
High School Kids should NEVER share (their own or another’s):
Address
Phone Number
Password Information (even to friends)
Offensive or Sexually Suggestive Images or Messages
If you managed to get this far there must have been something that concerned you.
Congratulations! Learning more about privacy is the first step.
Here's one more little trick you might try since you spent all the time getting here. :highfive:
Want to have an unlisted phone but would not like to have to pay monthly for it? Ask your phone company to replace your last name with another name - your grandmother’s maiden name or something that you never use. This will cost a few dollars, but works very well. Many phone companies will do this for you. No monthly fees for having your number unlisted and as soon as you hear someone calling you Mr. {your grandmother’s maiden name}, you can either block the number or request to be put on the company’s Do Not Call List or <fill in the blank of your choice>. Note that Caller ID takes its information from the phone book, so you will be identified as Mr. {your grandmother’s maiden name} on Caller ID units of people you call unless you turn this feature off.
Another helpful addition to the listing (available in some areas) is: "(data line)", meaning that the phone number is connected to a fax or computer and not to a live person. Check with your local company if this option is available.
Some time ago, in a concerted effort, multiple ACLU affiliates filed a total of 381 Freedom of Information Act (FoIA) requests in 32 states, asking local law enforcement agencies to disclose how they are using mobile phone location data.
The FoIA request in North Carolina struck gold: a copy of an official Department of Justice flyer, dated August 2010 that explains exactly what data is retained by Verizon Wireless, T-Mobile, AT&T, Sprint, and Sprint division Nextel. There's an enhanced copy on the ACLU website.
The eye-openers:
All of the mobile phone companies keep details about the location of cell towers used by every phone, for a year or longer.
All of the mobile phone companies keep records about voice calls and text messages received and sent for a year or longer. Verizon stores the contents of every text message for three to five days. (The others don't keep the text.)
IP session information -- tying your phone to an IP address -- is kept for a year by Verizon and 60 days on Sprint and Nextel.
IP destination information -- which IP addresses you connected to -- is stored for 90 days at Verizon and 60 days on Sprint and Nextel.
The ACLU is gathering information on what steps local police have to go through in order to acquire that stored data: warrants, formal requests, emergencies, possibly even informal procedures. They're also trying to figure out how law enforcement agencies share the data and how long it is retained.
There doesn't appear to be any sort of uniform nationwide policy or widespread judicial precedent.
The ACLU is also looking at law enforcement requests to "identify all of the cell phones at a particular location" and "systems whereby law enforcement agents are notified whenever a cell phone comes within a specific geographic area."
If you have been concerned about privacy and location data being leaked sporadically on your iOS or Android or Windows Phone device it seems you have been looking at very, very small potatoes!​
Comments? Suggestions? Ideas? They are all welcome.
Flame wars (relating to privacy or otherwise) are not. :-]
[ Another place holder ]
[GUIDE] Some Incredibly Simple Things To Protect Your Privacy!
If you find this thread helpful then do not forget to
Rate: *****
Submit thread as News Tip
If you find a particular post is helpful, please click on the Thanks button
If you are using XDA App or Tapatalk, long press on the post and select :good: Thanks
Thanks ny_limited - I just did all these!
Cheers
Tom
Szczepanik said:
If you find this thread helpful then do not forget to
Rate: *****
Submit thread as News Tip
If you find a particular post is helpful, please click on the Thanks button
If you are using XDA App or Tapatalk, long press on the post and select :good: Thanks
Thanks ny_limited - I just did all these!
Cheers
Tom
Click to expand...
Click to collapse
Appreciate the kind works, Tom, but.. This thread is for the non-technical ones among us. I suspect you are more technical than I am thus you hardly qualify to be here.
Thanks for the tips.
For extra protection, there's quite a few security apps on the market that will lock whatever information sensitive apps you want locked, usually with the same security options that your phone offers i.e. Password, PIN, pattern etc.
Just search "app lock" in the play store, for those interested.
--> dominating your screen from my t-mobile gs3, powered by: FreeGS3 R7 "Resurrection"
Complacency is one thing that most if not all internet/mobile/computing user have. I always advocate "Do not remember my password" while browsing from any form of medium to my friends. You never know when you will get compromised. Just leave your computer for a moment, your friend with malicious intent can extract all your private information with a simple and obtainable usb trick..
Even the thing most personal to me, my mobile phone, has no sites on "Log me in always" checked.
I hope websites would leave the box unchecked, as sites I visit always encourage user to have that option enabled. E.g. Ebay, Facebook..
Post # 2 has been updated just in case you need more reading material.
ny_limited said:
Post # 2 has been updated just in case you need more reading material.
Click to expand...
Click to collapse
like 1 better :good:
coohdeh said:
like 1 better :good:
Click to expand...
Click to collapse
Agreed. I guess I really didn't need the 3rd placeholder after all.
---
Spes in virtute est. (via XDA app)
This article is just over a year old but still makes good reading if you haven't seen it yet.
Few people would willingly carry around a device that tracks their movements, records their conversations, and keeps tabs on all the people they talk to. But, according to documents recently released by the American Civil Liberties Union, cell phone companies are doing all of that -- and may be passing the information on to law enforcement agencies.
"Retention Periods of Major Cellular Service Providers," an August 2010 document produced by the Department of Justice, outlines the types of information collected by various cell phone companies, as well as the amount of time that they retain it. On some levels, this is reassuring: Verizon (VZ) is the only company that holds on to text message content, and they erase it after 3-5 days. However, text message details -- the information about who you text with -- is retained for a minimum of a year, with some companies keeping it for up to seven years. In other words, that little back-and-forth you had with Bernie Madoff back in 2007 will be on the books until 2014.
Complete article is here
Click to expand...
Click to collapse
The privacy buck stops with the user
Yes, those terms of service are annoying. They're usually too complicated and too long, and users who want a certain mobile app will be inclined to click 'next' without actually reading the fine print, even if they're worried about what rights they're signing away. Still, "cellphone users need to take responsibility for their own data," maintains Steve Durbin, global VP of the Information Security Forum.
Click to expand...
Click to collapse
​
Cellphone and smartphone users have a love-hate relationship with mobile apps. While they love the functionality and enhanced user experience they bring to the table, clearly many hate the perceived privacy intrusions, suggests a newly released report from the Pew Internet & American Life Project.
More than half -- 54 percent -- of app users surveyed decided against installing a cellphone app when they discovered how much personal information they would need to share in order to use it. Thirty percent uninstalled an app that was already on their cellphone because they learned it was collecting personal information that they didn't wish to share.
Many cellphone users take additional steps to protect the personal data on their mobile devices, including backing up photos, contacts and other files -- tasks performed by 41 percent of those surveyed. Some 32 percent have cleared the browsing or search histories on their phone, and 19 percent have turned off the location-tracking feature due to privacy concerns.
Finally, 12 percent of cell owners say that another person has accessed their phone's contents in a way that made them feel that their privacy had been invaded.
The complete article was written by Erika Morphy and published in the E-Commerce Times in September.
i just know that you can monitor the keywords via google alerts
some useful information here. Thanks a lot!
More cell phone privacy notes
Police Searches of Cell Phones
You may have a legitimate expectation of privacy of the information stored in your cell phone, and so a search warrant may be needed before a police officer can look at your phone's data. However, an officer has the authority to search a cell phone when the search is "incident to an arrest." The search is deemed similar to an officer that searches a closed container on or near a person that he's arresting.
Traditional search warrant exceptions apply to the search of cell phones. Where the accessing of memory is a valid search incident to arrest, the court need not decide whether exigent circumstances also justify the officer's retrieval of the numbers from your cell phone. Police officers are not limited to search only for weapons or instruments of escape on the person being arrested. Rather, they may also, without any additional justification, look for evidence of the arrestee's crime on his person in order to preserve it for use at trial.
Illegally Intercepted Communications
Most people would think that public broadcasting of an illegally intercepted cell phone conversation would be illegal. Well, the US Supreme Court has found that (U.S.) the First Amendment allows an illegally intercepted cell phone conversation to be shared with others when the conversation involves matters of significant public interest. The lesson here is to be careful because technology has increased the chances that your cell phone conversations are being recorded and could be made public or used against you.
Cell Phone GPS Tracking
Although there are many advantages to cell phone GPS tracking, there are also privacy concerns. As most people carry their cell phone with them at all times, the ability is in place to track the exact movements of all individuals. Cell phone GPS could prove useful in saving lives during emergencies.
For these reasons the (U.S.) Federal Communications Commission (FCC) requires wireless network providers to give the cell phone GPS tracking location information for 911 calls that have been made from cell phones. This is known as E911. The law on E911 is fairly explicit. It allows carriers to provide tracking location information to third parties for E911 emergency calls only, however not under any other circumstances whatsoever without the consent of the cell phone owner. Recent court hearings have disallowed the requests of law enforcement agencies to obtain cell phone GPS tracking information from the cell phone companies for suspects in criminal investigations.
The complete article was written and published on Lawyers.com.
Instagram says it now has the right to sell your photos
Instagram said today that it has the perpetual right to sell users' photographs without payment or notification, a dramatic policy shift that quickly sparked a public outcry.
The new intellectual property policy, which takes effect on January 16, comes three months after Facebook completed its acquisition of the popular photo-sharing site. Unless Instagram users delete their accounts before the January deadline, they cannot opt out.
Under the new policy, Facebook claims the perpetual right to license all public Instagram photos to companies or any other organization, including for advertising purposes, which would effectively transform the Web site into the world's largest stock photo agency. One irked Twitter user quipped that "Instagram is now the new iStockPhoto, except they won't have to pay you anything to use your images."
"It's asking people to agree to unspecified future commercial use of their photos," says Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation. "That makes it challenging for someone to give informed consent to that deal."
The complete article is written by Declan McCullagh and published in c|net.
Thanks to FameWolf for the link!
Horrible Autoplay Video Ads Are Coming to Facebook
Facebook will unveil a new video ad product that will auto-play commercials upon arrival, executives told AdWeek's Jason del Ray. This most annoying addition, which will allow advertisers a chance to slap unsolicited videos all over the Facebook news feed, is expected to launch by April 2013, the sources say. And, to reiterate, yes, these will be the same variant of videos that pollute the ESPN.com homepage — the ones that start without you asking them to.
Facebook, which has been trying just about every kind of new ad it can this year, has not yet decided if these commercials will automatically play with or without sound. But in either case, you can bet they'll be a pain — and you can expect plenty of frustrated users. On the desktop version of Facebook, the vids will expand "out of the news feed into webpage real estate in both the left and right columns -- or rails -- of the screen," explains del Ray. Meaning: they will be everywhere. Also, for people who use a million tabs on older computers, imagine a ton of video playing over and over: slow-load city. Add a little audio in the mix and we can already see the confused masses looking for that one tab with the unwanted sound coming out of it. Oh, yeah, this is a really great idea, Facebook. As if you weren't full of those this week already.
The complete article is written by Rebecca Greenfield, published in The Atlatic Wire
ny_limited said:
Instagram said today that it has the perpetual right to sell users' photographs without payment or notification, a dramatic policy shift that quickly sparked a public outcry.
The new intellectual property policy, which takes effect on January 16, comes three months after Facebook completed its acquisition of the popular photo-sharing site. Unless Instagram users delete their accounts before the January deadline, they cannot opt out.
Under the new policy, Facebook claims the perpetual right to license all public Instagram photos to companies or any other organization, including for advertising purposes, which would effectively transform the Web site into the world's largest stock photo agency. One irked Twitter user quipped that "Instagram is now the new iStockPhoto, except they won't have to pay you anything to use your images."
"It's asking people to agree to unspecified future commercial use of their photos," says Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation. "That makes it challenging for someone to give informed consent to that deal."
The complete article is written by Declan McCullagh and published in c|net.
Thanks to FameWolf for the link!
Click to expand...
Click to collapse
Instagram has backed off the language in its new privacy and terms of service policies that set off a significant firestorm online. Instagram cofounder Kevin Systrom posted on the company’s blog under the title “Thank you, and we’re listening”. Whether you believe him or not you can read more about it at Forbes.
Happy New Year, everyone!
Enjoy the festivities!
Will see you all next year!
New 2013 CA laws affect online privacy, homeowners, schools
From protecting your online privacy to party buses, there are 750 new California (USA) laws taking effect in 2013.
The complete KABC-TV (Los Angeles) article of January 1, 2013 can be found here.
[USA] New laws keep employers out of worker social media accounts
Employers in Illinois and California cannot ask for usernames and passwords to the personal social media accounts of employees and job seekers under laws that took effect on Jan. 1.
Illinois Gov. Patrick Quinn in August signed legislation amending the State's 'Right to Privacy in the Workplace Act.'
California Gov. Jerry Brown signed legislation adding the prohibitions to the State's Labor Code in September.
The two states join Maryland, Michigan, New Jersey and Delaware in implementing such privacy laws.
Full ComputerWorld article: http://bit.ly/118L2tM

Google Play support is evil

Dear fellow developers,
I wonder how log will it take before we will unite and take some serious action against Google Play practices. Maybe you heard about banned apps and blocked accounts. I got my app blocked today and believe me that it is VERY frustrating experience.
I can write what is wrong with Google Play developer support, but others already done that better: androidofvirtue. com/dear-google-play-we-need-to-talk-about-a-few-things/
Long story short, I feel that Google is abusing its dominant position on the market by providing little to no service to developers. Developers has no other option for app publishing as manufacturers are pre-installing its market to almost every device. Users have no option as they do not have any good alternative available.
Google must listen to us, we are helping them to get money and they are treating us like criminals without any explanations, without possibility to defend ourselves and without possibility to use other and maybe more reasonable app market.
As I am from the EU I wrote an appeal to European Commission to investigate the Google market position regarding the competition advantage abuse. I really hate do do it but currently I feel that I ran out of options and I hate more to feel so powerless against Google ignorance and stupidity of its app removal policies.
If you would like to help then write an appeal too. Contact is [email protected]
They must hear us!
what app did you make and whats the reason they removed it
The app was intended for automatic connection to open hotspots and wifi password sharing. It was possible to enter password for some wifi when you connected to it and it was then shared with other users. This function was explicitly named in the name of the app, description and under the password box directly in application, therefore every user was sharing the password by his will and he was well informed what he's doing. It was intended for sharing of passwords for various public places, cafés etc.
The funny thing is, that the app got approved on Amazon which is also very strict, but obviously employs sane people.
The reason for banning is here:
REASON FOR REMOVAL: Violation of section 4.4 of the Developer Distribution Agreement.
After a regular review we have determined that your app interferes with or accesses another service or product in an unauthorized manner. This violates the provision of your agreement with Google referred to above.
Click to expand...
Click to collapse
I think that they think that I was phishing the passwords or something like that. Or maybe it is not ok to connect to open wifi automatically. Or maybe they think that if somebody share password for some hotspot then other people are not authorized to use it, however I feel that if I share password then I am giving implicit authorization to other users.
Thats the worst part -I simply don't know what is wrong. Can I fix it by adding some policy agreement? Should I ask user for some explicit permission to share the password and authorization for other users to use it? Isn't it a bit crazy?
The whole thing is not about me or my app. I just spend like month of evenings to build it and catch all the bugs, I made worse investments. What I really don't like is the Google attitude. They are keeping their developers in uncertainty, they are threatening them and they are behaving like the worst essence of corporations. We just need alternative store to become strong enough otherwise Google will not listen to us.

Categories

Resources