Gongol.com Archives: March 2015
March 25, 2015

The forced immediacy of everything on Twitter makes it hazardous turf for risk of offense

Depending on what a court decides in the Radio Shack bankruptcy case, possibly quite a lot. One might ask "Who cares?" about records on your battery and bulb purchases from ten years ago. But what if another company -- more prominent, or perhaps more effective at getting your personal data -- were to go belly-up? Nothing guarantees that Facebook or Google will last forever.

More than half a decade ago, groups like the EFF warned of the risk of "regulatory capture" -- that an FCC with more power would become a tool of vested interests. There's also the risk of corrosive mission creep.

Ease of setup may make it too easy to use for theft. One analyst thinks an astonishing 6% of Apple Pay transactions use stolen credit cards.

The tiny icons that identify individual websites inside many browsers can be compromised