{"id":2670,"date":"2016-08-16T01:21:49","date_gmt":"2016-08-15T23:21:49","guid":{"rendered":"http:\/\/le-bars.net\/yoann\/?p=2670"},"modified":"2018-05-23T03:53:50","modified_gmt":"2018-05-23T01:53:50","slug":"privacy-anomaly-corrected-soon","status":"publish","type":"post","link":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/","title":{"rendered":"Privacy: an anomaly soon to be corrected"},"content":{"rendered":"<figure style=\"width: 2790px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Vint_Cerf_-_2010.jpg?uselang=fr\" title=\"Vinton Cerf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg\" width=\"2790\" height=\"2791\" alt=\"Vinton Cerf\" class \/><\/a><figcaption class=\"wp-caption-text\">Vinton\u00a0Cerf in 2010 by \u0412\u0435\u043d\u0438 \u041c\u0430\u0440\u043a\u043e\u0432\u0441\u043a\u0438 Veni Markovski, picture under licence <a href=\"http:\/\/creativecommons.org\/licenses\/by\/3.0\" title=\"CC BY 3.0\" target=\"_blank\">CC BY 3.0<\/a> via <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Vint_Cerf_-_2010.jpg?uselang=fr\" title=\"The picture on Wikimedia\u00a0Commons\" target=\"_blank\">Wikimedia\u00a0Commons<\/a>.<\/figcaption><\/figure>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Vint_Cerf\" title=\"Vinton Cerf\" target=\"_blank\">Vinton\u00a0Cerf<\/a> had an essential role in modern communications systems: he is one of the inventors of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_protocol_suite\" title=\"Internet protocol suite\" target=\"_blank\">TCP\/IP protocol<\/a>, which is the basis of the Internet. He is now a Google member, <a href=\"http:\/\/www.bloomberg.com\/news\/articles\/2015-08-10\/google-to-adopt-new-holding-structure-under-name-alphabet-\" title=\"Google Rises After Creating Holding Company Called Alphabet\" target=\"_blank\">which recently became Alphabet<\/a>. On November 20th, 2013, <a href=\"http:\/\/www.cnet.com\/news\/vint-cerf-privacy-may-be-an-anomaly\/\" title=\"Vint Cerf: \u2018Privacy may be an anomaly\u2019\" target=\"_blank\">he stated that \u2018privacy could be an anomaly.\u2019<\/a> Rest assured, this anomaly is about to be corrected\u00a0\u2026<\/p>\n<p><!--more--><\/p>\n<p>It appears that his point was to warn on the difficulties in protecting privacy. Indeed, in an interview given to the French weekly <a href=\"http:\/\/www.larecherche.fr\/\" title=\"La Recherche\" target=\"_blank\">La\u00a0Recherche<\/a> in February 2016<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_1');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_1');\" ><sup id=\"footnote_plugin_tooltip_2670_1_1\" class=\"footnote_plugin_tooltip_text\">1<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_1\" class=\"footnote_tooltip\">Philippe\u00a0Pajot, 2016. <em>Entretien avec Vinton <span style=\"font-variant: small-caps;\">Cerf<\/span><\/em>, La\u00a0Recherche n\u00b0\u00a0508, pp. 4\u20138.<\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_1').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_1', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>, he affirmed the importance of strong authentication and related security techniques to ensure personal data does not fall into the wrong hands. However, nowadays protecting privacy may be jeopardized.<\/p>\n<p>Actually, the privacy issue is not really a new one. As indicated, Vinton\u00a0Cerf\u2019s quote given in the first paragraph of this article as been said in 2013. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" title=\"Edward\u00a0Snowden\" target=\"_blank\">Edward\u00a0Snowden<\/a>\u2019s revelations also began in 2013 and show that <a href=\"http:\/\/www.theguardian.com\/world\/interactive\/2013\/nov\/01\/snowden-nsa-files-surveillance-revelations-decoded#section\/1\" title=\"NSA files decoded\" target=\"_blank\">the <span style=\"font-variant: small-caps;\">nsa<\/span> is likely to interfere in the private life of any Internet user<\/a>. This regardless of her or his nationality, but especially if she or he is not on the <span style=\"font-variant: small-caps;\">us<\/span> territory. Previously, <a href=\"https:\/\/en.wikipedia.org\/wiki\/WikiLeaks\" title=\"WikiLeaks\" target=\"_blank\">WikiLeaks began operations in 2006<\/a>, highlighting, among other things, violations of privacy. Even before, <a href=\"https:\/\/en.wikipedia.org\/wiki\/ECHELON\" title=\"ECHELON\" target=\"_blank\"><span style=\"font-variant: small-caps;\">echelon<\/span><\/a> was revealed in 1988 and has expanded to the Internet.<\/p>\n<p>However, several recent news revive the interest on these matters. For instance, issue 501\u2013502, dated July and August 2015, of La\u00a0Recherche feature an interview on the subject with <a href=\"http:\/\/www.demontjoye.com\/\" title=\"Yves-Alexandre\u00a0de\u00a0Montjoye\u2019s personal homepage\" target=\"_blank\">Yves-Alexandre\u00a0de\u00a0Montjoye<\/a>, a researcher in computational science at the <span style=\"font-variant: small-caps;\">mit<\/span><span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_2');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_2');\" ><sup id=\"footnote_plugin_tooltip_2670_1_2\" class=\"footnote_plugin_tooltip_text\">2<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_2\" class=\"footnote_tooltip\">Yves-Alexandre\u00a0de\u00a0Montjoye and Gautier\u00a0Cariou, 2015. <em>Les m\u00e9tadonn\u00e9es menacent la vie priv\u00e9e<\/em>, La Recherche n\u00b0\u00a0501\u2013502, pp. 114\u2013117.<\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_2').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_2', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>. Once again, <a href=\"https:\/\/www.phrozensoft.com\/2015\/09\/windows-privacy-tweaker-4\" title=\"Windows Privacy Tweaker\" target=\"_blank\">serious questions arise concerning privacy on the new version of Microsoft\u00a0Windows<\/a>. In France, there is of course the recent adoption of the Bill on intelligence, which resulted in <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/04\/14\/do-not-worry-the-prime-minister-is-looking-over\/\" title=\"Do not worry, the prime minister is looking over\">five<\/a> <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/04\/21\/does-the-number-matter\/\" title=\"Does the number matters?\">articles<\/a> <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/06\/18\/an-update-about-the-bill-on-intelligence\/\" title=\"An update about the bill on intelligence\">in<\/a> <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/07\/25\/epilogue-concerning-the-law-on-intelligence\/\" title=\"Epilogue concerning the law on intelligence\">this<\/a> <a href=\"http:\/\/le-bars.net\/yoann\/en\/2016\/01\/29\/statistical-analysis-of-the-law-on-intelligence\/\" title=\"Statistical analysis of the law on intelligence\">blog<\/a>. Let examine these issues, before trying to give some solutions.<\/p>\n<h2>Meta-data have more to say than data themselves<\/h2>\n<p>Avoid posting photos of an evening when you were drunk is insufficient. During any Internet browsing, each service you use produces meta-data. These meta-data are saying very much about habits and personality of the user. And you do not produce meta-data only on the Internet.<\/p>\n<h3>Everyday acts can be used to track you<\/h3>\n<figure style=\"width: 675px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/de.wikipedia.org\/wiki\/Datei:20110808_MalteSpitz.png\" title=\"Malte\u00a0Spitz\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/7\/72\/20110808_MalteSpitz.png\" width=\"675\" height=\"450\" alt=\"Malte\u00a0Spitz\" class \/><\/a><figcaption class=\"wp-caption-text\">Malte\u00a0Spitz in 2011 \u2013 picture by B\u00dcNDNIS 90\/DIE\u00a0GR\u00dcNEN under licence <a href=\"https:\/\/creativecommons.org\/licenses\/by\/3.0\/\" title=\"CC\u00a0BY\u00a0SA\" target=\"_blank\">CC\u00a0BY\u00a03.0<\/a> via <a href=\"https:\/\/de.wikipedia.org\/wiki\/Datei:20110808_MalteSpitz.png\" title=\"The picture on Wikimedia\u00a0Commons\" target=\"_blank\">Wikimedia\u00a0Commons<\/a>.<\/figcaption><\/figure>\n<p>In 2011, German member of parliament <a href=\"http:\/\/malte-spitz.de\/english\/\" title=\"Malte\u00a0Spitz\u2019s personal homepage\" target=\"_blank\">Malte\u00a0Spitz<\/a> managed to obtain from his phone company all the data it had about him. With the help of the German newspaper <a href=\"http:\/\/www.zeit.de\/index\" title=\"Die\u00a0Zeit\" target=\"_blank\">Die\u00a0Zeit<\/a>, he has put on-line <a href=\"http:\/\/www.zeit.de\/datenschutz\/malte-spitz-data-retention\" title=\"Tell-all telephone\" target=\"_blank\">a tool to track not only all of his phone calls, but also all of his travels between September 2009 and February 2010<\/a>. For a mobile phone, even if it is not equipped with a GPS, can locate quite precisely its user (based on the cell sites to which it connects).<\/p>\n<p>When an individual uses a credit card, her or his bank book four information about her or him: her or his <span style=\"font-variant: small-caps;\">id<\/span>, as well as the date, the place and the price of the transaction. Note that the bank retains neither the first nor the last name of the client, but an identifier. This procedure is called anonymization. However, this procedure does not guarantee anonymity: Yves-Alexandre\u00a0de\u00a0Montjoye and his collaborators calculated that with nothing but the day and the place of the transaction, on average an individual is re-identified in 90\u202f% of the cases<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_3');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_3');\" ><sup id=\"footnote_plugin_tooltip_2670_1_3\" class=\"footnote_plugin_tooltip_text\">3<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_3\" class=\"footnote_tooltip\">Yves-Alexandre\u00a0de\u00a0Montjoye, Laura\u00a0Radaelli, Vivek\u00a0Kumar\u00a0Singh, and Alex\u00a0Pentland, 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata, <em>Science<\/em> n\u00b0\u202f347 (6221), pp. 536 \u2013 539. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1126\/science.1256297\" title=\"Unique in the shopping mall: On the reidentifiability of credit card metadata\" target=\"_blank\">10.1126\/science.1256297<\/a><\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_3').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_3', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>.<\/p>\n<p>Still according to them, this problem does not only affect bank data. It arises with any meta-data and four information is enough to bring down the anonymity performed according to the procedure I described above.<\/p>\n<h3>Meta-data collected by smart-phones<\/h3>\n<figure style=\"width: 639px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/news.mit.edu\/2015\/identify-from-credit-card-metadata-0129\" title=\"Yves-Alexandre de Montjoye\" target=\"_blank\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/news.mit.edu\/sites\/mit.edu.newsoffice\/files\/styles\/news_article_image_top_slideshow\/public\/images\/2015\/MIT-No-Privacy-01_2.jpg?resize=639%2C426\" width=\"639\" height=\"426\" alt=\"Yves-Alexandre de Montjoye\" class \/><\/a><figcaption class=\"wp-caption-text\">Yves-Alexandre\u00a0de\u00a0Montjoye \u2013 picture by Bryce\u00a0Vickmark.<\/figcaption><\/figure>\n<p>With meta-data obtained using a smart-phone, it is possible to go further than simply identifying the presence of a person in a given location. Indeed, Yves-Alexandre\u00a0de\u00a0Montjoye and his collaborators have shown that meta-data can be used to determine personality traits of the user<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_4');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_4');\" ><sup id=\"footnote_plugin_tooltip_2670_1_4\" class=\"footnote_plugin_tooltip_text\">4<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_4\" class=\"footnote_tooltip\">Yves-Alexandre\u00a0de\u00a0Montjoye, Jordi\u00a0Quoidbach, Florent\u00a0Robic, and Alex\u00a0Pentland, 2013. <em>Predicting Personality Using Novel Mobile Phone-Based Metrics<\/em>, chapter of <em>Social Computing, Behavioral-Cultural Modeling and Prediction<\/em>, volume 7812 in the serie <em>Lecture Notes in Computer Science<\/em>, pp. 48 \u2013 55. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-37210-0_6\" title=\"Predicting Personality Using Novel Mobile Phone-Based Metrics\" target=\"_blank\">10.1007\/978-3-642-37210-0_6<\/a><\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_4').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_4', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>.<\/p>\n<p>Researchers identified five major personality traits: openness to experience, self-discipline, extroversion, agreeableness and emotional instability. To each category is assigned a level: low, medium or high, which allows summarizing the personality. With this base, using meta-data from smart-phones owned by several voluntaries, the researchers have elaborate an algorithm. This algorithm can predict fairly accurately the personality of a user of a smart-phone by analysing the meta-data it contains.<\/p>\n<p>Also, by using nothing but meta-data collected with a smart-phone, Jonathan\u00a0Mayer and his collaborators have shown that one can obtain highly personal information such as health problems<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_5');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_5');\" ><sup id=\"footnote_plugin_tooltip_2670_1_5\" class=\"footnote_plugin_tooltip_text\">5<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_5\" class=\"footnote_tooltip\">Jonathan\u00a0Mayer, Patrick\u00a0Mutchler, and John\u00a0C.\u00a0Mitchell, 2016. Evaluating the privacy properties of telephone metadata, <em><span style=\"font-variant: small-caps;\">pnas<\/span><\/em> , vol. 113, n\u00b0 20, pp. 5536 \u2013 5541. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1073\/pnas.1508081113\" title=\"Evaluating the privacy properties of telephone metadata\" target=\"_blank\">10.1073\/pnas.1508081113<\/a>. <a href=\"http:\/\/www.pnas.org\/content\/113\/20\/5536.full\" title=\"Evaluating the privacy properties of telephone metadata\" target=\"_blank\">Disponible en ligne.<\/a><\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_5').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_5', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>. Moreover, taking for example the <a href=\"https:\/\/en.wikipedia.org\/wiki\/National_Security_Agency\" title=\"National Security Agency\" target=\"_blank\"><span style=\"font-variant: small-caps;\">nsa<\/span><\/a> surveillance program, they hypothesised this agency follows individuals who contact those who directly contacted an individual subject to surveillance. Then, from a single individual, the authors estimated the agency will be following up to 25,000 individuals or more.<\/p>\n<h3>A desire to collect data on all Internet users<\/h3>\n<figure style=\"width: 2214px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:2015_Max_Schrems_%2817227117226%29_%28cropped%29.jpg?uselang=en\" title=\"Max\u00a0Schrems\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/a\/a9\/2015_Max_Schrems_%2817227117226%29_%28cropped%29.jpg\" title=\"Max\u00a0Schrems\" width=\"2214\" height=\"2865\" alt=\"Max Schrems\" class \/><\/a><figcaption class=\"wp-caption-text\">Part of elements presented in this article come from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Max_Schrems\" title=\"Max\u00a0Schrems\" target=\"_blank\">Max\u00a0Schrems<\/a>\u2019 work \u2013 picture by Eleleleven under licence <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/deed.en\" title=\"CC BY-SA 2.0\" target=\"_blank\">CC BY-SA 2.0<\/a> via <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:2015_Max_Schrems_%2817227117226%29_%28cropped%29.jpg?uselang=en\" target=\"_blank\">Wikimedia Commons<\/a>.<\/figcaption><\/figure>\n<p>However, we also produce many meta-data when using certain services on the Internet. Notably, when using <a href=\"https:\/\/www.facebook.com\/\" title=\"Facebook\" target=\"_blank\">Facebook<\/a>, <a href=\"https:\/\/twitter.com\/\" title=\"Twitter\" target=\"_blank\">Twitter<\/a>, various <a href=\"https:\/\/abc.xyz\/\" title=\"Alphabet\" target=\"_blank\">Alphabet<\/a> services \u2013 which is the name of the new Google parent company, you followed \u2013 and other <a href=\"https:\/\/www.instagram.com\/\" title=\"Instagram\" target=\"_blank\">Instagram<\/a>. To think that to protect your privacy you just have to pay attention to what you publish is to be mistaken about the real threats.<\/p>\n<p>What you actually publish finally do not provided much information about your private life. In contrast, people with whom you share, the items for which you clicked \u201cI like\u201d (or \u201cI do not like\u201d), location information, as well as date of birth, these tell volumes about you. Updating more or less frequently your status is also very revealing. All these are pretty informational about your tastes, your habits, your needs, and so on. This can lead to a fairly accurate psychological profile and even gives the possibility to anticipate what you could do.<\/p>\n<p>It is interesting to note that Facebook also collects as many data as possible from users who are not registered to its services. The Facebook button available on many websites will install a cookie on the user\u2019s computer, even if she or he did not actually click the button<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_6');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_6');\" ><sup id=\"footnote_plugin_tooltip_2670_1_6\" class=\"footnote_plugin_tooltip_text\">6<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_6\" class=\"footnote_tooltip\">Arnold\u00a0Roosendaal, 2010. Facebook Tracks and Traces Everyone: Like This!, <em>Tilburg Law School Legal Studies Research Paper Series<\/em> n\u00b0 03\/2011. <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1717563\" title=\"Facebook Tracks and Traces Everyone: Like This!\" target=\"_blank\">Available on-line.<\/a><\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_6').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_6', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>. This cookie allows Facebook to collect information about the user navigation. Therefore, to preserve the privacy of the few people who read these web-pages, my website does not have such a button.<\/p>\n<h3>To use any means<\/h3>\n<p>Anyway, Facebook has other ways to collect data on those who are not part of its users. <a href=\"http:\/\/rue89.nouvelobs.com\/rue89-eco\/2011\/10\/30\/plaintes-nouveaux-concurrents-facebook-en-difficulte-sur-la-vie-privee-226066\" title=\"Plaintes, nouveaux concurrents\u00a0: Facebook en difficult\u00e9 sur la vie priv\u00e9e\" target=\"_blank\">By using the import function of address book it offers to its users, it collects all email addresses.<\/a> For those that do not match an existing profile, it builds ghosts profiles that are fed by cross-checking.<\/p>\n<p>Moreover, its servers keep every dates and locations data collected by its mobile application. And you need to keep in mind that nothing of what is published or collected is ever deleted, at most is it hidden to public eyes while Facebook internally retains full access. It is quite simple: for Facebook, privacy simply does not exist.<\/p>\n<p>It is therefore established that Facebook collects data about me, though I am not one of its users. Therefore, in accordance with <a href=\"http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML\" title=\"European\u00a0Directive\u00a095\/46\/EC\" target=\"_blank\">European\u00a0Directive\u00a095\/46\/EC<\/a>, I wanted to contact it so it put at my disposal this data. I have not found a way to do so without being connected to its services, meaning without a Facebook profile. I am not certain it is legal\u00a0\u2026<\/p>\n<h3>Facebook knows more about you than you know yourself<\/h3>\n<p>At this point, you may be thinking: \u201c<a href=\"https:\/\/research.facebook.com\/blog\/cat-people-dog-people\/\" title=\"Cat People, Dog People\" target=\"_blank\">Facebook knows I love kittens<\/a>, big deal!\u201d However, Facebook knows much more.<\/p>\n<p>Michal\u00a0Kosinski, David\u00a0Stillwell, and Thore\u00a0Graepel used solely the mentions \u201clike\u201d from 58,000 US Facebook accounts<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_7');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_7');\" ><sup id=\"footnote_plugin_tooltip_2670_1_7\" class=\"footnote_plugin_tooltip_text\">7<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_7\" class=\"footnote_tooltip\">Michal\u00a0Kosinski, David\u00a0Stillwell, and Thore\u00a0Graepel, 2013. Private traits and attributes are predictable from digital records of human behavior, <em>PNAS<\/em> vol.\u00a0110, n\u00b0\u00a015, pp.\u00a05802\u20135805. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1073\/pnas.1218772110\" title=\"Private traits and attributes are predictable from digital records of human behavior\" target=\"_blank\">10.1073\/pnas.1218772110<\/a>. <a href=\"http:\/\/www.pnas.org\/content\/110\/15\/5802.full.pdf\" title=\"Private traits and attributes are predictable from digital records of human behavior\" target=\"_blank\">Available online.<\/a><\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_7').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_7', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>. Using nothing but these statements, they have been able to deduct if they belong to a Caucasian (white) or an African\u00a0American (black) with an accuracy of 95\u202f%, 93\u202f% for the gender and 88\u202f% for the sexual orientation, but also 65\u202f% for the use of narcotics and 60\u202f% to determine if the user\u2019s parents were a couple at 21, among other features that intuitively do not seem to be determined with the aid of a simple \u201clike.\u201d<\/p>\n<p>Now, as we have seen, Facebook has much more information than just the \u201clike.\u201d With this, it can finely determine the profiles of its users. It is not exaggeration to say that, on several points, these data allow it to anticipate their reactions. Therefore, on some issues, so Facebook knows more accurately its users that its users know themselves\u00a0\u2026<\/p>\n<p>Moreover, Facebook controls the algorithm filling the news feed its users consult. Thus, <a href=\"http:\/\/gizmodo.com\/facebook-employees-asked-mark-zuckerberg-if-they-should-1771012990\" title=\"Facebook Employees Asked Mark Zuckerberg If They Should Try to Stop a Donald Trump Presidency\" target=\"_blank\">it has a very efficient mean to manipulate opinions<\/a>.<\/p>\n<h3>Others can use data from Facebook<\/h3>\n<p>Of course, for some there is a huge temptation to drink from this data source. A simple way is to consult the profiles of those on which one seeks information. To take an example, among others, Matthew\u00a0Manant, Serge\u00a0Pajak, and Nicolas\u00a0Soulie created two fictitious identities with identical CVs<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_8');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_8');\" ><sup id=\"footnote_plugin_tooltip_2670_1_8\" class=\"footnote_plugin_tooltip_text\">8<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_8\" class=\"footnote_tooltip\">Matthieu\u00a0Manant, Serge\u00a0Pajak, and Nicolas\u00a0Souli\u00e9, 2014. Online social networks and hiring: a field experiment on the French labor market, <em>MPRA\u00a0Paper<\/em>. <a href=\"https:\/\/mpra.ub.uni-muenchen.de\/60403\/\" title=\"Online social networks and hiring: a field experiment on the French labor market\" target=\"_blank\">Available online.<\/a><\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_8').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_8', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>. There was only a single detail that distinguished them: the Facebook profile associated with one of them indicated that the person was born in Marrakesh and spoke Arabic, while the other one stated that the person was born in Brive-la-Gaillarde (a small town in southern France) and spoke Italian. For the rest, the Facebook pages had identical contents, including identical photos.<\/p>\n<p>Researchers sent the CVs of the two identities in response to several job offers. For 230 applications, the identity native from Brive-la-Gaillarde received 49 positive responses (i.e., a recruiter response to prolong the hiring process), a rate of 21.3\u202f%. The other identity has received 31 positive responses for 232 applications delivered, a rate of 13.4\u202f%. Such a difference, greater than 50\u202f%, is significant.<\/p>\n<p>That job applicants face discrimination based on their origins, though illegal, is unfortunately not a fact recently discovered<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_9');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_9');\" ><sup id=\"footnote_plugin_tooltip_2670_1_9\" class=\"footnote_plugin_tooltip_text\">9<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_9\" class=\"footnote_tooltip\">Nicolas\u00a0Jacquemet and Anthony\u00a0Edo, 2013. <em>La Discrimination \u00e0 l\u2019embauche sur le march\u00e9 du travail fran\u00e7ais<\/em>, \u00c9ditions rue d\u2019Ulm. <a href=\"http:\/\/www.cepremap.fr\/depot\/opus\/OPUS31.pdf\" title=\"La Discrimination \u00e0 l\u2019embauche sur le march\u00e9 du travail fran\u00e7ais\" target=\"_blank\">Available on-line<\/a>.<\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_9').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_9', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>. The novelty highlighted in this study is that recruiters have used Facebook to learn about the candidates, which is normally not relevant because supposed to be a matter of private life\u00a0\u2026<\/p>\n<h3>Privacy for sale<\/h3>\n<p>A third party can easily use a Facebook account to view other Facebook accounts. However, as we have seen, Facebook itself has the possibility to know much more by analysing meta-data. Consequently, some people would appreciate being able to access such information. Well, I have some good news\u00a0\u2026<\/p>\n<p><a href=\"https:\/\/epic.org\/privacy\/facebook\/\" title=\"Facebook Privacy\" target=\"_blank\">We know for a long time that Facebook sells personal data about its users.<\/a> Of course, it does not sell all the data at its disposal (in order to keep its competitive advantage), but still it sells some of them. There is no reason to be surprised: in economics, <a href=\"http:\/\/www.merriam-webster.com\/dictionary\/company\" title=\"Definition of company\" target=\"_blank\">a company is defined by its ability to make a profit<\/a>, it is its reason for being. The example of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Free_software\" title=\"Free software\" target=\"_blank\">free software<\/a> shows that the maxim \u2018if it is free, you are the product\u2019 is false. However, as a company cannot exist without making profit, and as Facebook do not charge its users, nor can rely for revenue from not targeted advertisements, it must sell what it has: data regarding privacy. Therefore, whoever is ready to pay the price can obtain very fine access to the private life of a great part of humanity, as Facebook does not just collect all that it may on its users, but also potentially on every Internet users.<\/p>\n<p>To guard yourself against this, you should not share with anyone, press \u201cLike\u201d, nor update your status, and so on. In other words: do not use the service\u00a0\u2026 However, it is not enough because any website offering services related to Facebook potentially send information about your private life.<\/p>\n<p>I have given many details about Facebook. This because it is probably the entity collecting the most data regarding privacy at the time, just ahead of Google \u2013 <a href=\"https:\/\/privacy.google.com\/intl\/en\/your-data.html\" title=\"Data Collection\" target=\"_blank\">anyway, according to it<\/a>. However, one should not forget they are far from being the only ones to collect such data, often without notifying the user. Sometimes, this collection is not even done on purpose. For instance, the use of a script (in Javascript) to perform auto-completion (automatically completing entries made by the user) can lead <a href=\"https:\/\/github.com\/w3c\/fingerprinting-guidance\/issues\/8\" title=\"Predictive text and complete loss of privacy\" target=\"_blank\">to transmit personal information without validation from the user<\/a>. The web has been developed without worrying about privacy, so that today there are number of elements which threaten it, even in good faith.<\/p>\n<p>Indeed, a simple mistake can have huge effects. For example, on an iPhone, <a href=\"http:\/\/gizmodo.com\/can-pokemon-go-really-read-all-your-emails-1783479136\" title=\"Pok\u00e9mon Go Was Never Able To Read Your Email\" target=\"_blank\">the game Pok\u00e9mon Go can get access to large sections of the user\u2019s Google Account<\/a>. Provided he or she uses fairly wide range of Google services, this involves particularly broad access to her or his private life. Although, as I write this, the editor is trying to correct the problem, this story highlights the possibility of an error with very large consequences.<\/p>\n<h3>There is something new indeed<\/h3>\n<figure style=\"width: 576px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Edward_Snowden-2.jpg?uselang=fr\" title=\"The picture on Wikimedia\u00a0Commons\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/60\/Edward_Snowden-2.jpg\" width=\"576\" height=\"694\" alt=\"Edward\u00a0Snowden in 2013\" class \/><\/a><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" title=\"Edward Snowden\" target=\"_blank\">Edward\u00a0Snowden<\/a> in 2013 \u2013 screen shot from the movie <a href=\"http:\/\/www.imdb.com\/title\/tt4044364\/\" title=\"Citizenfour\" target=\"_blank\"><em>Citizenfour<\/em><\/a> (2014, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Laura_Poitras\" title=\"Laura Poitras\" target=\"_blank\">Laura\u00a0Poitras<\/a>, <a href=\"http:\/\/www.praxisfilms.org\/\" title=\"Praxis Films\" target=\"_blank\">Praxis Films<\/a>) under licence <a href=\"https:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en\" title=\"Creative Commons BY 3.0\" target=\"_blank\">Creative Commons BY 3.0<\/a> via <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Edward_Snowden-2.jpg?uselang=fr\" title=\"The picture on Wikimedia Commons\" target=\"_blank\">Wikimedia Commons<\/a>.<\/figcaption><\/figure>\n<p>We must not forget that, since a while, the police can obtain bank statements of an individual and deduce amount of information about her or his private life. We should not underestimate how far such investigations can go. However, the current situation presents two novelties.<\/p>\n<p>The first novelty is the type of data that can be obtained nowadays. For instance, I have found no reported cases where such investigations have determined if the parents of the subject were a couple when being 21. Using meta-data, unprecedented knowledge of intimate life of anyone can be achieved.<\/p>\n<p>The second concerns the conditions of access to such information. As part of a police investigation, if everything goes as it should, a request to gain access to private data must be substantiated. Then, a judge must decide if it is legitimate. But nowadays, the limit to access to personal data is the price you can pay.<\/p>\n<p>In security, trust is defined as the ability to do harm. Whether you find me friendly or not, I do not have access to your medical records: you do not trust me on this matter, unlike your doctor. By storing privacy, habits and personality of its users, the ability of many companies to do some harm becomes particularly important.<\/p>\n<p>I have <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/04\/14\/do-not-worry-the-prime-minister-is-looking-over\/\" title=\"Do not worry, the Prime-minister is looking over!\">expressed<\/a> <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/04\/21\/does-the-number-matter\/\" title=\"Does the number matter?\">myself<\/a> <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/06\/18\/an-update-about-the-bill-on-intelligence\/\" title=\"An update about the bill on intelligence\">against<\/a> a lack of <a href=\"http:\/\/le-bars.net\/yoann\/en\/2015\/07\/25\/epilogue-concerning-the-law-on-intelligence\/\" title=\"Epilogue concerning the law on intelligence\">control<\/a> in <a href=\"http:\/\/le-bars.net\/yoann\/en\/2016\/01\/29\/statistical-analysis-of-the-law-on-intelligence\/\" title=\"Statistical analysis of the law on intelligence\">surveillance<\/a> from states, with a vue from here. However, in some framework, a state has legitimacy to carry out surveillance and investigations. We must constantly ensure that this framework is both appropriate and respected \u2013 for instance, as I write this, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Global_surveillance_disclosures_(2013%E2%80%93present)\" title=\"Global surveillance disclosures (2013\u2013present)\" target=\"_blank\">Edward\u00a0Snowden\u2019s disclosures<\/a> have shown that this is not the case in most countries \u2013 but there is such legitimacy. For its part, a business is not legitimate in any way to have unlimited trust.<\/p>\n<h2>The end of privacy is not inevitable<\/h2>\n<p>Even though some try to make us believe the contrary, violation of privacy is not <a href=\"http:\/\/www.thefreedictionary.com\/consubstantial\" title=\"Definition of \u201cconsubstantial\u201d\" target=\"_blank\">consubstantial<\/a> to the use of social networks in particular, nor to the use of the Internet in general. Moreover, there already exist some practices that help to protect it.<\/p>\n<h3>Limit risks while browsing<\/h3>\n<p>As a starting point, you can use <a href=\"https:\/\/www.eff.org\/en\/privacybadger\" title=\"Privacy Badger\" target=\"_blank\">Privacy Badger<\/a> when web browsing. It is a plug-in that blocks elements which may collect personal data on web pages you are visiting. It is quite a simple way to reduce the risk your data are transmitted to a third party without notifying you.<\/p>\n<p>Besides, if you browse this site using Privacy Badger and depending on your browser settings, you will find that by default it may block some items. This is due to the fact that WordPress, the software I am using to manage the site, uses elements that may be used for the purpose of collecting information, for example using Google tools. I do not do such things. I am looking for a way to stop using these WordPress elements. However, this cannot be achieved so easily as I cannot afford, at least for now on, my WordPress version to differ too much from the standard version. At least because that would make updates difficult, which would be a big security problem.<\/p>\n<p>Anyway, I have not installed module that would allow me to collect private information: the only items I collect with this website are the pages being viewed and the approximate location of the IP addresses that are consulting these pages. However, none of these are really reliable. As the browsing experience on this site is not altered by the use of Privacy Badger, I encourage you to use it even on these pages. Doing so, you will not have to trust me \u2013 keep in mind: trust is the ability to do harm.<\/p>\n<p>Anyhow, I encourage you to read the <a href=\"http:\/\/le-bars.net\/yoann\/en\/privacy-policy\/\" title=\"Privacy policy\">privacy policy<\/a> of this website.<\/p>\n<h3>Use social networks concerned with privacy<\/h3>\n<p>As we have seen, the way Facebook is working is inherently intrusive to privacy. As a consequence, it is not reasonable to use it. However, there are social networks that have incorporated the respect of privacy.<\/p>\n<p>For instance, you can join me on <a href=\"https:\/\/diasporafoundation.org\/\" title=\"The Diaspora* project\" target=\"_blank\">Diaspora*<\/a>. This is a social network based on a decentralized technology and free software. More than that, from the start respect of privacy is a key point of its conception, which is the subject of this article. We are quite a large number using it nowadays. Also, though still in active development, it is already perfectly usable. My ID on this network is <a href=\"https:\/\/framasphere.org\/people\/1770d1803aa9013341342a0000053625\" title=\"Yoann\u00a0Le\u00a0Bars on Diaspora*\" target=\"_blank\">ylebars@framasphere.org<\/a>.<\/p>\n<p>And for those who might be tempted with Manichaeism, notice that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mark_Zuckerberg\" title=\"Mark\u00a0Zuckerberg\" target=\"_blank\">Mark\u00a0Zuckerberg<\/a>, Facebook co-founder, <a href=\"https:\/\/www.kickstarter.com\/profile\/1787331560\" title=\"Mark\u00a0Zuckerberg \u2013 Kickstarter\" target=\"_blank\">made a donation to the Kickstarter of Diaspora*<\/a>. On this occasion, <a href=\"http:\/\/www.wired.com\/2010\/05\/zuckerberg-interview\/\" title=\"Mark Zuckerberg: I Donated to Open Source, Facebook Competitor\" target=\"_blank\">he said he considered it a \u201ccool\u201d idea<\/a>.<\/p>\n<h3>Get out of the influence of Google<\/h3>\n<p>The policy on privacy of Google is also problematic. Yet it is quite possible to do without its services. Thus, for your research on the web, you can use alternative searching engines such as <a href=\"https:\/\/duckduckgo.com\/\" title=\"DuckDuckGo\" target=\"_blank\">DuckDuckGo<\/a> and <a href=\"https:\/\/www.qwant.com\/\" title=\"Qwant\" target=\"_blank\">Qwant<\/a>.<\/p>\n<p>Moreover, accounts of one user to various Google services, such as Gmail and Youtube, are bonded to each other. This allows a large collection of data and cross-checking. Same problems arise with services like <a href=\"https:\/\/www.dropbox.com\/en\/\" title=\"Dropbox\" target=\"_blank\">Dropbox<\/a>. However, there are alternative services equally effective and much less intrusive, such as those proposed by <a href=\"https:\/\/owncloud.org\/\" title=\"OwnCloud\" target=\"_blank\">OwnCloud<\/a> and <a href=\"https:\/\/framasoft.org\/\" title=\"Framasoft\" target=\"_blank\">Framasoft<\/a>. The latter has also initiated the <a href=\"https:\/\/degooglisons-internet.org\/liste\" title=\"De-Google-ify Internet\" target=\"_blank\">project \u201cDe-Google-ify Internet,\u201d<\/a> which aims to offer free and privacy respectful alternatives to the most popular web services.<\/p>\n<h3>Should you change your operating system?<\/h3>\n<p>Some may thinks that protect privacy requires technical skills and use of obscure systems. This is not entirely true.<\/p>\n<p><a href=\"http:\/\/betanews.com\/2016\/07\/20\/windows-10-excessive-data-collection-france\/\" title=\"France: Windows 10 collects \u2018excessive personal data\u2019, issues Microsoft with formal warning\" target=\"_blank\">It turns out that Microsoft must constantly be recalled to order about privacy<\/a>, as it uses its operating system Windows to collect much of the private data of its customers. Apple, for its part, <a href=\"http:\/\/www.apple.com\/privacy\/\" title=\"Apple\u2019s commitment to your privacy\" target=\"_blank\">makes commitments<\/a> and <a href=\"http:\/\/www.apple.com\/privacy\/approach-to-privacy\/\" title=\"The most personal technology must also be the most private.\" target=\"_blank\">provides tools that should allow you not to disseminate private information<\/a>. However, <a href=\"https:\/\/en.wikipedia.org\/wiki\/OS_X\" title=\"MacOS\" target=\"_blank\">MacOS<\/a> operating system has <a href=\"http:\/\/osxprivacy.com\/\" title=\"We always trusted you, OS X.\" target=\"_blank\">a long history of very intrusive practices<\/a>. In particular, Apple definition of what are the private data is extremely restrictive, excluding many elements that are actually part of it.<\/p>\n<p>Ultimately, it is true that the best guarantee in protecting your privacy lies in the use of alternative systems such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Linux\" title=\"Linux\" target=\"_blank\">GNU\/Linux<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Berkeley_Software_Distribution\" title=\"Berkeley Software Distribution\" target=\"_blank\">*BSD<\/a>. True enough, one has to take the decision to install and use these systems, in contrast to Windows and MacOS which in general are pre-installed. However, contrary to popular belief, to use GNU\/Linux is not \u2013 in any case, is no longer \u2013 difficult. Also, I think this site shows that, when using this system, you may efficiently work on publishing, music, videos and other things to come. Anyway, I think it shows that my difficulties do not come from the tools, but from my skills \u2013 or the lake thereof. Anyway, you can gradually adopt more privacy protecting practices and register an eventual transition to a new operating system in a medium-term process.<\/p>\n<h3>Use a smart-phone in privacy<\/h3>\n<p>I think that the various studies I cited clearly establish that smart-phones are essentially tools to collect metadata about their users. Such metadata are exploited by manufacturers and operators. Therefore, the ratio cost-benefit should be seriously questioned.<\/p>\n<p>However, if you decide to use such a device, you have several options to forestall some privacy violations.<\/p>\n<p>Regarding devices running <a href=\"https:\/\/en.wikipedia.org\/wiki\/Android_%28operating_system%29\" title=\"Android\" target=\"_blank\">Android<\/a>, there are several websites offering valuable advices to protect your privacy using such a system. Simply, they usually lack of advice to protect against data collection by Google. This starts with the Google account. It is better not to use such an account. In this purpose, you can use independent application markets such as <a href=\"https:\/\/f-droid.org\/\" title=\"F-Droid\" target=\"_blank\">F-Droid<\/a> and <a href=\"https:\/\/www.aptoide.com\/\" title=\"Aptoide\" target=\"_blank\">Aptoide<\/a>, on which the vast majority of Android applications are available. Using these markets, there is no need to set up a Google account.<\/p>\n<p>All applications available on F-Droid are open source and free software. This means that their source code is available, therefore one can ensure that they are not malicious. However, the principle of Aptoid is to allow everyone to create a store without specific criteria. As a result, some stores may offer malicious applications. To guard against this, it is better to use only stores rated \u201c~ppa\u201d and to install only applications marked with the badge \u201cverified.\u201d You should also pay attention to what an application requests access. For example, a simple flash-light application requesting access to your private data probably has some hidden purpose.<\/p>\n<p>About the iPhone, <a href=\"https:\/\/support.apple.com\/en-us\/HT203033\" title=\"About privacy and Location Services\" target=\"_blank\">Apple once again makes commitments<\/a>. However, <a href=\"http:\/\/www.huffingtonpost.fr\/2015\/03\/21\/iphone-vie-privee-5-choses-apple_n_6908676.html\" title=\"iPhone: 5 choses qu'Apple sait sur votre vie priv\u00e9e (et partage parfois avec d'autres entreprises)\" target=\"_blank\">considering the history of Apple on the subject<\/a>, the efficiency of these commitments is still in question.<\/p>\n<p>Note that Edward\u00a0Snowden and Andrew\u00a0Huang <a href=\"https:\/\/www.youtube.com\/watch?v=tfTByjDg_M0\" title=\"Edward Snowden at the MIT Media Lab\" target=\"_blank\">presented an iPhone case<\/a> which will allow the user to control whether the smart-phone is transmitting data. At the time I write this, it should be available in a few months and they plan to make versions for each type of smart-phone.<\/p>\n<p>There are also alternative systems more respectful of privacy. Among these, <a href=\"http:\/\/www.ubuntu.com\/phone\" title=\"Ubuntu\u00a0for\u00a0Phones\" target=\"_blank\">Ubuntu\u00a0for\u00a0Phones<\/a> and <a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/os\/\" title=\"Firefox\u00a0OS\" target=\"_blank\">Firefox\u00a0OS<\/a>. Such systems provide much better protection of privacy.<\/p>\n<h3>Go further while preserving effectiveness for the various systems<\/h3>\n<p>We have seen that anonymization made by replacing an identity with an identifier is not sufficient. However, since the 1990s, more efficient methods in protecting privacy have been established.<\/p>\n<p>For instance, Latanya\u00a0Sweeney introduced k-anonymity<span class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_10');\" onkeypress=\"footnote_moveToReference_2670_1('footnote_plugin_reference_2670_1_10');\" ><sup id=\"footnote_plugin_tooltip_2670_1_10\" class=\"footnote_plugin_tooltip_text\">10<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_2670_1_10\" class=\"footnote_tooltip\">Latanya\u00a0Sweeney, 1997. Datafly: A System for Providing Anonymity in Medical Data, <em>Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects<\/em>, Chapman &amp; Hall, Ltd. London, UK, pp.\u00a0356 \u2013 381<\/span><\/span><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_2670_1_10').tooltip({ tip: '#footnote_plugin_tooltip_text_2670_1_10', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top right', relative: true, offset: [10, 10], });<\/script>. Its principle is to expand the information spectrum: instead of the date of birth, age is requested; instead of the postal code, the department; and so on. Such a method increases the number of people that can match the information, reinforcing the respect of privacy.<\/p>\n<p>However, concerning metadata, it is still not sufficient. A credible solution would be that users become the sole depositors of such data, rather than the different systems collect these data. For their part, those services can make demands without seeking excessive precision.<\/p>\n<p>Take the example of a GPS system that uses information from its users to evaluate traffic. Rather than actually collect their coordinates, the application may send questions like: \u2018Are you located less than five kilometres from this train station?\u2019 The user\u2019s phone would just answer yes or no. The application could then assess the traffic just as effectively as it would by collecting its users coordinates, but with increased respect for privacy. This provides a credible solution to protect private life without jeopardizing the efficiency of applications that are emerging.<\/p>\n<h3>No reason to resign<\/h3>\n<p>While credible solutions do exist, it is clear that the industrial collecting data are reluctant to adopt them. However, regulations agency tend to impose them. Create political will to promote such approaches is probably a good solution.<\/p>\n<p>I have heard that in any case the end of privacy is inevitable, we would have no other choice but to accept it. Yet as we have seen, nothing really binds us to give up our privacy.<\/p>\n<p>I write this article from France. I do not want to make big words, but let notice that in early 1789, it seemed clear that the French regime (since called the old regime), heir of centuries old tradition, was immutable. No one would have thought it could be changed but at the margin. Yet in the summer of the same year, the regime had undergone a profound change.<\/p>\n<p>The first reason <a href=\"http:\/\/www.apple.com\/customer-letter\/\" title=\"A Message to Our Customers\" target=\"_blank\">Apple opposed the FBI<\/a> is because its customers wanted their privacy can be preserved to government investigations. What is surprising is that there is not at least as much concern about privacy violations made by commercial companies.<\/p>\n<p>Still, if users decide that respecting privacy is an essential point, companies will risk losing their customers, while real solutions exist. We can choose what we want to accept: we have the means to act because a company cannot exists without customers.<\/p>\n<p>Thank Diaspora* community for its constructive comments that helped me to improve this article.<\/p>\n<div class=\"speaker-mute footnotes_reference_container\"> <div class=\"footnote_container_prepare\"><p><span role=\"button\" tabindex=\"0\" class=\"footnote_reference_container_label pointer\" onclick=\"footnote_expand_collapse_reference_container_2670_1();\">Notes<\/span><span role=\"button\" tabindex=\"0\" class=\"footnote_reference_container_collapse_button\" style=\"display: none;\" onclick=\"footnote_expand_collapse_reference_container_2670_1();\">[<a id=\"footnote_reference_container_collapse_button_2670_1\">+<\/a>]<\/span><\/p><\/div> <div id=\"footnote_references_container_2670_1\" style=\"\"><table class=\"footnotes_table footnote-reference-container\"><caption class=\"accessibility\">Notes<\/caption> <tbody> \r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_1');\"><a id=\"footnote_plugin_reference_2670_1_1\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>1<\/a><\/th> <td class=\"footnote_plugin_text\">Philippe\u00a0Pajot, 2016. <em>Entretien avec Vinton <span style=\"font-variant: small-caps;\">Cerf<\/span><\/em>, La\u00a0Recherche n\u00b0\u00a0508, pp. 4\u20138.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_2');\"><a id=\"footnote_plugin_reference_2670_1_2\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>2<\/a><\/th> <td class=\"footnote_plugin_text\">Yves-Alexandre\u00a0de\u00a0Montjoye and Gautier\u00a0Cariou, 2015. <em>Les m\u00e9tadonn\u00e9es menacent la vie priv\u00e9e<\/em>, La Recherche n\u00b0\u00a0501\u2013502, pp. 114\u2013117.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_3');\"><a id=\"footnote_plugin_reference_2670_1_3\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>3<\/a><\/th> <td class=\"footnote_plugin_text\">Yves-Alexandre\u00a0de\u00a0Montjoye, Laura\u00a0Radaelli, Vivek\u00a0Kumar\u00a0Singh, and Alex\u00a0Pentland, 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata, <em>Science<\/em> n\u00b0\u202f347 (6221), pp. 536 \u2013 539. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1126\/science.1256297\" title=\"Unique in the shopping mall: On the reidentifiability of credit card metadata\" target=\"_blank\">10.1126\/science.1256297<\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_4');\"><a id=\"footnote_plugin_reference_2670_1_4\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>4<\/a><\/th> <td class=\"footnote_plugin_text\">Yves-Alexandre\u00a0de\u00a0Montjoye, Jordi\u00a0Quoidbach, Florent\u00a0Robic, and Alex\u00a0Pentland, 2013. <em>Predicting Personality Using Novel Mobile Phone-Based Metrics<\/em>, chapter of <em>Social Computing, Behavioral-Cultural Modeling and Prediction<\/em>, volume 7812 in the serie <em>Lecture Notes in Computer Science<\/em>, pp. 48 \u2013 55. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-37210-0_6\" title=\"Predicting Personality Using Novel Mobile Phone-Based Metrics\" target=\"_blank\">10.1007\/978-3-642-37210-0_6<\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_5');\"><a id=\"footnote_plugin_reference_2670_1_5\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>5<\/a><\/th> <td class=\"footnote_plugin_text\">Jonathan\u00a0Mayer, Patrick\u00a0Mutchler, and John\u00a0C.\u00a0Mitchell, 2016. Evaluating the privacy properties of telephone metadata, <em><span style=\"font-variant: small-caps;\">pnas<\/span><\/em> , vol. 113, n\u00b0 20, pp. 5536 \u2013 5541. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1073\/pnas.1508081113\" title=\"Evaluating the privacy properties of telephone metadata\" target=\"_blank\">10.1073\/pnas.1508081113<\/a>. <a href=\"http:\/\/www.pnas.org\/content\/113\/20\/5536.full\" title=\"Evaluating the privacy properties of telephone metadata\" target=\"_blank\">Disponible en ligne.<\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_6');\"><a id=\"footnote_plugin_reference_2670_1_6\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>6<\/a><\/th> <td class=\"footnote_plugin_text\">Arnold\u00a0Roosendaal, 2010. Facebook Tracks and Traces Everyone: Like This!, <em>Tilburg Law School Legal Studies Research Paper Series<\/em> n\u00b0 03\/2011. <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1717563\" title=\"Facebook Tracks and Traces Everyone: Like This!\" target=\"_blank\">Available on-line.<\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_7');\"><a id=\"footnote_plugin_reference_2670_1_7\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>7<\/a><\/th> <td class=\"footnote_plugin_text\">Michal\u00a0Kosinski, David\u00a0Stillwell, and Thore\u00a0Graepel, 2013. Private traits and attributes are predictable from digital records of human behavior, <em>PNAS<\/em> vol.\u00a0110, n\u00b0\u00a015, pp.\u00a05802\u20135805. <span style=\"font-variant: small-caps;\">Doi<\/span>: <a href=\"https:\/\/dx.doi.org\/10.1073\/pnas.1218772110\" title=\"Private traits and attributes are predictable from digital records of human behavior\" target=\"_blank\">10.1073\/pnas.1218772110<\/a>. <a href=\"http:\/\/www.pnas.org\/content\/110\/15\/5802.full.pdf\" title=\"Private traits and attributes are predictable from digital records of human behavior\" target=\"_blank\">Available online.<\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_8');\"><a id=\"footnote_plugin_reference_2670_1_8\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>8<\/a><\/th> <td class=\"footnote_plugin_text\">Matthieu\u00a0Manant, Serge\u00a0Pajak, and Nicolas\u00a0Souli\u00e9, 2014. Online social networks and hiring: a field experiment on the French labor market, <em>MPRA\u00a0Paper<\/em>. <a href=\"https:\/\/mpra.ub.uni-muenchen.de\/60403\/\" title=\"Online social networks and hiring: a field experiment on the French labor market\" target=\"_blank\">Available online.<\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_9');\"><a id=\"footnote_plugin_reference_2670_1_9\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>9<\/a><\/th> <td class=\"footnote_plugin_text\">Nicolas\u00a0Jacquemet and Anthony\u00a0Edo, 2013. <em>La Discrimination \u00e0 l\u2019embauche sur le march\u00e9 du travail fran\u00e7ais<\/em>, \u00c9ditions rue d\u2019Ulm. <a href=\"http:\/\/www.cepremap.fr\/depot\/opus\/OPUS31.pdf\" title=\"La Discrimination \u00e0 l\u2019embauche sur le march\u00e9 du travail fran\u00e7ais\" target=\"_blank\">Available on-line<\/a>.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_2670_1('footnote_plugin_tooltip_2670_1_10');\"><a id=\"footnote_plugin_reference_2670_1_10\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>10<\/a><\/th> <td class=\"footnote_plugin_text\">Latanya\u00a0Sweeney, 1997. Datafly: A System for Providing Anonymity in Medical Data, <em>Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects<\/em>, Chapman &amp; Hall, Ltd. London, UK, pp.\u00a0356 \u2013 381<\/td><\/tr>\r\n\r\n <\/tbody> <\/table> <\/div><\/div><script type=\"text\/javascript\"> function footnote_expand_reference_container_2670_1() { jQuery('#footnote_references_container_2670_1').show(); jQuery('#footnote_reference_container_collapse_button_2670_1').text('\u2212'); } function footnote_collapse_reference_container_2670_1() { jQuery('#footnote_references_container_2670_1').hide(); jQuery('#footnote_reference_container_collapse_button_2670_1').text('+'); } function footnote_expand_collapse_reference_container_2670_1() { if (jQuery('#footnote_references_container_2670_1').is(':hidden')) { footnote_expand_reference_container_2670_1(); } else { footnote_collapse_reference_container_2670_1(); } } function footnote_moveToReference_2670_1(p_str_TargetID) { footnote_expand_reference_container_2670_1(); var l_obj_Target = jQuery('#' + p_str_TargetID); if (l_obj_Target.length) { jQuery( 'html, body' ).delay( 0 ); jQuery('html, body').animate({ scrollTop: l_obj_Target.offset().top - window.innerHeight * 0.2 }, 380); } } function footnote_moveToAnchor_2670_1(p_str_TargetID) { footnote_expand_reference_container_2670_1(); var l_obj_Target = jQuery('#' + p_str_TargetID); if (l_obj_Target.length) { jQuery( 'html, body' ).delay( 0 ); jQuery('html, body').animate({ scrollTop: l_obj_Target.offset().top - window.innerHeight * 0.2 }, 380); } }<\/script>","protected":false},"excerpt":{"rendered":"<p>Vinton\u00a0Cerf had an essential role in modern communications systems: he is one of the inventors of the TCP\/IP protocol, which is the basis of the Internet. He is now a Google member, which recently became Alphabet. On November 20th, 2013, he stated that \u2018privacy could be an anomaly.\u2019 Rest assured, this anomaly is about to &hellip; <a href=\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\" class=\"more-link\">Continuer la lecture de <span class=\"screen-reader-text\">Privacy: an anomaly soon to be corrected<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[154,156],"tags":[38],"class_list":["post-2670","post","type-post","status-publish","format-standard","hentry","category-point-of-view","category-society","tag-individual-liberties"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy: an anomaly soon to be corrected &#8211; Vu d\u2019ici<\/title>\n<meta name=\"description\" content=\"On the Internet, several things endanger our privacy and the amount of risks seems not well evaluated. However, some solutions does exist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy: an anomaly soon to be corrected &#8211; Vu d\u2019ici\" \/>\n<meta property=\"og:description\" content=\"On the Internet, several things endanger our privacy and the amount of risks seems not well evaluated. However, some solutions does exist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\" \/>\n<meta property=\"og:site_name\" content=\"Vu d\u2019ici\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-15T23:21:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-23T01:53:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg\" \/>\n<meta name=\"author\" content=\"Yoann Le Bars\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yoann Le Bars\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\"},\"author\":{\"name\":\"Yoann Le Bars\",\"@id\":\"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576\"},\"headline\":\"Privacy: an anomaly soon to be corrected\",\"datePublished\":\"2016-08-15T23:21:49+00:00\",\"dateModified\":\"2018-05-23T01:53:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\"},\"wordCount\":4382,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576\"},\"image\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg\",\"keywords\":[\"Individual liberties\"],\"articleSection\":[\"Point of view\",\"Society\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\",\"url\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\",\"name\":\"Privacy: an anomaly soon to be corrected &#8211; Vu d\u2019ici\",\"isPartOf\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg\",\"datePublished\":\"2016-08-15T23:21:49+00:00\",\"dateModified\":\"2018-05-23T01:53:50+00:00\",\"description\":\"On the Internet, several things endanger our privacy and the amount of risks seems not well evaluated. However, some solutions does exist.\",\"breadcrumb\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage\",\"url\":\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg\",\"contentUrl\":\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/le-bars.net\/yoann\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy: an anomaly soon to be corrected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/le-bars.net\/yoann\/#website\",\"url\":\"https:\/\/le-bars.net\/yoann\/\",\"name\":\"Vu d\u2019ici\",\"description\":\"Pages personnelles de Yoann LE\u00a0BARS\",\"publisher\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/le-bars.net\/yoann\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576\",\"name\":\"Yoann Le Bars\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/i0.wp.com\/le-bars.net\/yoann\/wordpress\/wp-content\/uploads\/2020\/11\/fec731577f2c05141910be0dc3ef5bb2.jpeg?fit=80%2C80&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/le-bars.net\/yoann\/wordpress\/wp-content\/uploads\/2020\/11\/fec731577f2c05141910be0dc3ef5bb2.jpeg?fit=80%2C80&ssl=1\",\"width\":80,\"height\":80,\"caption\":\"Yoann Le Bars\"},\"logo\":{\"@id\":\"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/image\/\"},\"description\":\"Un enseignant-chercheur avec un peu trop de centres d\u2019int\u00e9r\u00eats pour pouvoir r\u00e9sumer\u2026\",\"sameAs\":[\"http:\/\/le-bars.net\/yoann\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy: an anomaly soon to be corrected &#8211; Vu d\u2019ici","description":"On the Internet, several things endanger our privacy and the amount of risks seems not well evaluated. However, some solutions does exist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/","og_locale":"fr_FR","og_type":"article","og_title":"Privacy: an anomaly soon to be corrected &#8211; Vu d\u2019ici","og_description":"On the Internet, several things endanger our privacy and the amount of risks seems not well evaluated. However, some solutions does exist.","og_url":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/","og_site_name":"Vu d\u2019ici","article_published_time":"2016-08-15T23:21:49+00:00","article_modified_time":"2018-05-23T01:53:50+00:00","og_image":[{"url":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg","type":"","width":"","height":""}],"author":"Yoann Le Bars","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Yoann Le Bars","Dur\u00e9e de lecture estim\u00e9e":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#article","isPartOf":{"@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/"},"author":{"name":"Yoann Le Bars","@id":"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576"},"headline":"Privacy: an anomaly soon to be corrected","datePublished":"2016-08-15T23:21:49+00:00","dateModified":"2018-05-23T01:53:50+00:00","mainEntityOfPage":{"@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/"},"wordCount":4382,"commentCount":1,"publisher":{"@id":"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576"},"image":{"@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage"},"thumbnailUrl":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg","keywords":["Individual liberties"],"articleSection":["Point of view","Society"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/","url":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/","name":"Privacy: an anomaly soon to be corrected &#8211; Vu d\u2019ici","isPartOf":{"@id":"https:\/\/le-bars.net\/yoann\/#website"},"primaryImageOfPage":{"@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage"},"image":{"@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage"},"thumbnailUrl":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg","datePublished":"2016-08-15T23:21:49+00:00","dateModified":"2018-05-23T01:53:50+00:00","description":"On the Internet, several things endanger our privacy and the amount of risks seems not well evaluated. However, some solutions does exist.","breadcrumb":{"@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#primaryimage","url":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg","contentUrl":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Vint_Cerf_-_2010.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/le-bars.net\/yoann\/en\/2016\/08\/16\/privacy-anomaly-corrected-soon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/le-bars.net\/yoann\/fr\/"},{"@type":"ListItem","position":2,"name":"Privacy: an anomaly soon to be corrected"}]},{"@type":"WebSite","@id":"https:\/\/le-bars.net\/yoann\/#website","url":"https:\/\/le-bars.net\/yoann\/","name":"Vu d\u2019ici","description":"Pages personnelles de Yoann LE\u00a0BARS","publisher":{"@id":"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/le-bars.net\/yoann\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":["Person","Organization"],"@id":"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/90c5a2de7ad2db1184bbe140ebea1576","name":"Yoann Le Bars","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/image\/","url":"https:\/\/i0.wp.com\/le-bars.net\/yoann\/wordpress\/wp-content\/uploads\/2020\/11\/fec731577f2c05141910be0dc3ef5bb2.jpeg?fit=80%2C80&ssl=1","contentUrl":"https:\/\/i0.wp.com\/le-bars.net\/yoann\/wordpress\/wp-content\/uploads\/2020\/11\/fec731577f2c05141910be0dc3ef5bb2.jpeg?fit=80%2C80&ssl=1","width":80,"height":80,"caption":"Yoann Le Bars"},"logo":{"@id":"https:\/\/le-bars.net\/yoann\/#\/schema\/person\/image\/"},"description":"Un enseignant-chercheur avec un peu trop de centres d\u2019int\u00e9r\u00eats pour pouvoir r\u00e9sumer\u2026","sameAs":["http:\/\/le-bars.net\/yoann"]}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p61hos-H4","jetpack-related-posts":[{"id":378,"url":"https:\/\/le-bars.net\/yoann\/en\/2015\/06\/19\/claude-carliez-is-deceased\/","url_meta":{"origin":2670,"position":0},"title":"Claude\u00a0Carliez is deceased","author":"Yoann Le Bars","date":"19 juin 2015","format":"aside","excerpt":"Even though the public do not know him very much, Claude\u00a0Carliez is an important name of the entertainment industry, especially cinema. His career in the cinema started in 1953 as an actor (nowadays he would be credited as a stuntman) in Lucr\u00e8ce Borgia by Christian-Jacque((Christian-Jacque, 1953. Lucr\u00e8ce Borgia, Cin\u00e9dis.)), but\u2026","rel":"","context":"Dans &quot;Culture&quot;","block_context":{"text":"Culture","link":"https:\/\/le-bars.net\/yoann\/en\/category\/culture-en\/"},"img":{"alt_text":"Claude Carliez","src":"https:\/\/i0.wp.com\/le-bars.net\/yoann\/wordpress\/wp-content\/uploads\/2015\/06\/IMG_3095-768x1024.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/le-bars.net\/yoann\/wordpress\/wp-content\/uploads\/2015\/06\/IMG_3095-768x1024.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/le-bars.net\/yoann\/wordpress\/wp-content\/uploads\/2015\/06\/IMG_3095-768x1024.jpg?resize=525%2C300 1.5x"},"classes":[]},{"id":1371,"url":"https:\/\/le-bars.net\/yoann\/en\/2015\/08\/20\/how-i-extended-galileos-work\/","url_meta":{"origin":2670,"position":1},"title":"How I extended Galileo\u2019s work!","author":"Yoann Le Bars","date":"20 ao\u00fbt 2015","format":false,"excerpt":"I have already mentioned it: it is about time that I present the topics that I am interested in my work. As I have indicated on this site home page and as can be deduced from my resume, my areas of expertise are applied mathematics and theoretical computer science. My\u2026","rel":"","context":"Dans &quot;Science&quot;","block_context":{"text":"Science","link":"https:\/\/le-bars.net\/yoann\/en\/category\/science-en\/"},"img":{"alt_text":"Spring tide in Wimereux","src":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4e\/Wimereux_Spring_Tide.jpg","width":350,"height":200,"srcset":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4e\/Wimereux_Spring_Tide.jpg 1x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4e\/Wimereux_Spring_Tide.jpg 1.5x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4e\/Wimereux_Spring_Tide.jpg 2x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4e\/Wimereux_Spring_Tide.jpg 3x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4e\/Wimereux_Spring_Tide.jpg 4x"},"classes":[]},{"id":1710,"url":"https:\/\/le-bars.net\/yoann\/en\/2015\/09\/15\/everything-is-relative-my-dear-bruno\/","url_meta":{"origin":2670,"position":2},"title":"Everything is relative, my dear Bruno!","author":"Yoann Le Bars","date":"15 septembre 2015","format":false,"excerpt":"Even if special((A.\u00a0Einstein, 1905. Zur Elektrodynamik bewegter K\u00f6rper, Annalen der Physik, n\u00b0\u00a017, pp. 891 \u2013 921. It can be read on line. An English version translated by George Barker Jeffery is available on line.)) and general relativity((A.\u00a0Einstein, 1916. Die Grundlage der allgemeinen Relativit\u00e4tstheorie, Annalen der Physik, n\u00b0\u00a049, pp. 769 \u2013\u2026","rel":"","context":"Dans &quot;Science&quot;","block_context":{"text":"Science","link":"https:\/\/le-bars.net\/yoann\/en\/category\/science-en\/"},"img":{"alt_text":"Giordano\u00a0Bruno","src":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/1\/15\/Giordano_Bruno.jpg","width":350,"height":200},"classes":[]},{"id":3099,"url":"https:\/\/le-bars.net\/yoann\/en\/2017\/04\/04\/falling-bodies-galileo-sets-up-aristotle-to-the-fall\/","url_meta":{"origin":2670,"position":3},"title":"Falling bodies: Galileo sets up Aristotle to the fall","author":"Yoann Le Bars","date":"4 avril 2017","format":false,"excerpt":"As seen twice with a view from here, works from Nicolaus\u00a0Copernicus (1473 \u2013 1543), Giordano\u00a0Bruno (1548 \u2013 1600), Johannes\u00a0Kepler (1571 \u2013 1630) and Galileo\u00a0Galilei (1564 \u2013 1642), which have been preceded by those of Nicole\u00a0Oresme (circa 1320-1322 \u2013 1382), completely challenged the Aristotelian model. In this questioning, Galileo did not\u2026","rel":"","context":"Dans &quot;Science&quot;","block_context":{"text":"Science","link":"https:\/\/le-bars.net\/yoann\/en\/category\/science-en\/"},"img":{"alt_text":"Galileo GALILEI","src":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d4\/Justus_Sustermans_-_Portrait_of_Galileo_Galilei%2C_1636.jpg","width":350,"height":200,"srcset":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d4\/Justus_Sustermans_-_Portrait_of_Galileo_Galilei%2C_1636.jpg 1x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d4\/Justus_Sustermans_-_Portrait_of_Galileo_Galilei%2C_1636.jpg 1.5x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d4\/Justus_Sustermans_-_Portrait_of_Galileo_Galilei%2C_1636.jpg 2x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d4\/Justus_Sustermans_-_Portrait_of_Galileo_Galilei%2C_1636.jpg 3x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d4\/Justus_Sustermans_-_Portrait_of_Galileo_Galilei%2C_1636.jpg 4x"},"classes":[]},{"id":3462,"url":"https:\/\/le-bars.net\/yoann\/en\/2018\/03\/12\/did-copernicus-really-make-the-scientific-revolution\/","url_meta":{"origin":2670,"position":4},"title":"Did Copernicus really made the (scientific) revolution?","author":"Yoann Le Bars","date":"12 mars 2018","format":false,"excerpt":"In this blog and elsewhere, you have probably already seen the expression \u201cCopernican revolution\u201d. This expression highlights the fact that Nicolaus\u00a0Copernicus (1473 \u2013 1543) provoked a major change in perspectives by showing that it is more relevant to consider this is the Earth that is rotating around the Sun rather\u2026","rel":"","context":"Dans &quot;Science&quot;","block_context":{"text":"Science","link":"https:\/\/le-bars.net\/yoann\/en\/category\/science-en\/"},"img":{"alt_text":"Nicolaus\u00a0Copernicus","src":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/f\/f2\/Nikolaus_Kopernikus.jpg","width":350,"height":200,"srcset":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/f\/f2\/Nikolaus_Kopernikus.jpg 1x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/f\/f2\/Nikolaus_Kopernikus.jpg 1.5x"},"classes":[]},{"id":345,"url":"https:\/\/le-bars.net\/yoann\/en\/2015\/06\/18\/an-update-about-the-bill-on-intelligence\/","url_meta":{"origin":2670,"position":5},"title":"An update about the bill on intelligence","author":"Yoann Le Bars","date":"18 juin 2015","format":false,"excerpt":"The draft law on intelligence, which I have mentioned here and there, was approved with a large majority by the French National Assembly and the French Senate. This is despite the inria has produced a very critical note towards it, adding to the long list of reasoned criticisms of this\u2026","rel":"","context":"Dans &quot;Politics&quot;","block_context":{"text":"Politics","link":"https:\/\/le-bars.net\/yoann\/en\/category\/politics\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/posts\/2670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/comments?post=2670"}],"version-history":[{"count":184,"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/posts\/2670\/revisions"}],"predecessor-version":[{"id":3680,"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/posts\/2670\/revisions\/3680"}],"wp:attachment":[{"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/media?parent=2670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/categories?post=2670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/le-bars.net\/yoann\/wp-json\/wp\/v2\/tags?post=2670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}