Bookmarked We read the privacy policies of Skype, Meet, and Webex: 10 ways videoconferencing systems can better protect privacy for customers (

Video conferencing services are a critical part of how people are weathering the physical distancing required at this time, and people shouldnโ€™t have to make a choice between social connections, or work, or their privacy. Consumers deserve to access these services without sacrificing the privacy or security of their data and conversations.

Bill Fitzgerald take a look at the policies of Skype, Google Meet and Webex. He uses the comparative policy analysis rubric to provide a list of recommendations. Some of the suggestions includes treating video calls like email in that they maybe recorded and create an account to access a one-time conference using a throwaway email address, or making strategic โ€œmistakesโ€ in the accuracy of the information you provide. What is interesting is that for many of the points of concern, the only answer is to not use the application.
Replied to Browser Hygiene for Better Privacy – Think of it Like Washing Your Hands Online! by Bill FitzgeraldBill Fitzgerald (

With these steps in place — a distinct browser profile for work and school, some tuned settings in the browser to increase protection, and some ad blocking paired with a password manager — you have made some real improvements in safeguarding your privacy. The first few days you use this setup, it might feel awkward. That’s okay – it’s a new way of working, and change generally feels awkward.

Stick with it. As the steps become familiar, this way of working will become second nature — and that’s a skill you will need after the pandemic is over. It’s not like adtech and the other companies that track us are going away anytime soon.

I remember Doug Belshaw writing something similar for a Chromebook a few years ago.
Liked This “robot lawyer” can take the mystery out of license agreements (The Verge)

Obviously, a service like Do Not Sign is never going to replace paying a lawyer to read over an important contract. (โ€œIโ€™m not saying that itโ€™s going to be arguing in the High Court anytime soon,โ€ Browder jokes.) But when even something as simple as a pair of wireless headphones comes with a lengthy license agreement for you to agree to, even a limited amount of information is better than blindly agreeing to a contract.

The idea of an application highlighting keywords reminds me of Bill Fitzgerald suggestion to look for the following search words associated with consent: third party, affiliations, change, update and modify.
Listened IRL Podcast: The โ€œPrivacy Policyโ€ Policy from

In the Season 5 premier of IRL, host Manoush Zomorodi speaks with Charlie Warzel, writer-at-large with the New York Times, about our complicated relationship with data and privacy โ€” and the role privacy policies play in keeping things, well, confusing. Youโ€™ll also hear from Parker and Lila, two young girls who realize how gaming and personal data intersect. Rowenna Fielding, a data protection expert, walks us through the most efficient ways to understand a privacy policy. Professor Lorrie Cranor explains how these policies have warped our understanding of consent. And privacy lawyer Jenny Afia explains why โ€œprivacyโ€ is a base element of being human.

Manoush Zomorodi leads an exploration of what we mean by privacy by taking a dive into privacy policies. Charlie Warzel, the editor behind the New York Times’ Privacy Project, argues that Privacy has become an impoverished word. Another option for this is a ‘hyperobject’, as James Bridle explains in the New Dark Age,

The philosopher Timothy Morton calls global warming a โ€˜hyperobjectโ€™: a thing that surrounds us, envelops and entangles us, but that is literally too big to see in its entirety.Page 77

The argument in the end is that with the rise of surveillance capitalism, we have moved over time from ‘we might use’ your data to ‘we will’ use your data, therefore making privacy policies seemingly null and void.

For more on privacy policies, Bill Fitzgerald argues that we need to move beyond compliance to focus on privacy:

The more we can ground these conversations [around privacy] in personal elements the better: what do you want to show? Why? How? Do you ever want to retract it?

Alternatively, Amy Collier provides the follow list to consider:

  • Audit student data repositories and policies associated with third-party providers
  • Have a standard and well-known policy about how to handle external inquiries for student data and information.
  • Provide an audit of data to students who want to know what data is kept on them, how the data is kept, where it is kept, and who else has access.
  • Have clear guidelines and regulations for how data is communicated and transmitted between offices.
  • Take seriously the data policies of third-party vendors.
  • Closely examine and rethink student-tracking protocols.
  • Give students technological agency in interacting with the institution.

In regards to privacy policies associated with third-party vendors, Fitzgerald suggests looking for the following search words associated with consent: third party, affiliatuons, change, update and modify.

For a different approach, Amy Wang reports on the terms of services associated with Instagram. She also includes extracts from a lawyer, Jenny Afia, who rewrote the document in plain English. This is similar to Terms of Service, Didn’t Read, a site designed to not only summarise Terms of Services, but also highlight aspects to consider.

Bookmarked Privacy Postcards, or Poison Pill Privacy by Bill FitzgeraldBill Fitzgerald (FunnyMonkey)

For those who want to use this structure to create your own Privacy Postcards, I have created a skeleton structure on Github. Please, feel free to clone this, copy it, modify it, and make it your own.

Bill Fitzgerald provides a framework for unpacking privacy when it comes to apps, especially in the Play Store.
Bookmarked Fitness tracking app Strava gives away location of secret US army bases by Alex Hern (the Guardian)

Data about exercise routes shared online by soldiers can be used to pinpoint overseas facilities

Alex Hern reports that Strava data inadvertently reveals a number of supposed military secrets. In response, Bill Fitzgerald also provides some interesting commentary on Twitter:

Arvind Narayanan also wrote a series of tweets: