Created at 10am, Apr 15
HephaestionSoftware Development
0
How software developers can fix part of GDPR’s problem of click-through consents
KqC5Y5jPnaRBrgor-tBDnyjNHdLuOP6ZR8cHrioLUnY
File Type
PDF
Entry Count
11
Embed. Model
jina_embeddings_v2_base_en
Index Type
hnsw

It is argued that GDPR suffer from a practical problem of click-through consents, which developers of web browsers should resolve.

Bjrn Lundgren bjorn.lundgreniffs.se 1 Institute for Futures Studies, Stockholm, Sweden 2 Department of Philosophy, Stockholm University, 1 However, it can be questioned whether Nissenbaums idea holds in this case, because expectations may be given a fairly descriptive reading. Indeed, even if she is highly critical of various online information norms, her theory may, if applied, imply that the online norms are expected and hence appropriate. 2 Arguably, privacy requirements for a large online market can have effects for citizens of other nations (and not only if they connect through an EU-based IP address). Stockholm, Sweden 760 AI & SOCIETY (2020) 35:759760
id: 89823d3773a29040395cc02375a24e31 - page: 1
Primitive examples of these types of functionality already exists (e.g., many web browsers have the ability to send a do not track-request to websites and some sets of websites also offer privacy-choice services that are pre-set for consent in accordance with previous choices on other sites) and there are various add-ons to increase privacy (e.g., by blocking various analytics functions). Some web browsers also attempt to compete through increased privacy protection, ranging from Operas included VPN services (see, e.g., Williams 2017) to the more complex Onion Routing (Goldschlag et al. 1999) through Tor; so one may reasonably presume that there would also be a (niche) market for the above proposed services. Alternatively, one may think that Onion Routing through the Tor Browser is an ideal solution for privacy. However, although Onion Routing can benefit individuals privacy through anonymity protections, such anonymity protections does not protect the individual when she uses serv
id: c60cb0179593c45b8dac909a2d4b6759 - page: 2
Furthermore, de-anonymization technologies are becoming more and more powerful, enabling supposedly anonymized users to be re-identified (Lundgren 2020; Ohm 2010).3 An illustrative example is that of Johansson et al. (2015, p. 10), who have shown how de-anonymisation can be achieved by analysing when a user posts information with 90% successful identifications using machine learning and a sample of 1000 users (Lundgren 2020, p. 204). So, we cannot purely depend on technologies that aim to achieve technical anonymity, whichin turnexplains why we need web browsers to help enforcing proper consents.
id: 219eb06cce6c4630fe0cc1c758d2636f - page: 2
Curmudgeon Corner is a short opinionated column on trends in technology, arts, science and society, commenting on issues of concern to the research community and wider society. Whilst the drive for superhuman intelligence promotes potential benefits to wider society, it also raises deep concerns of existential risk, thereby highlighting the need for an ongoing conversation between technology and society. At the core of Curmudgeon concern is the question: What is it to be human in the age of the AI machine? -Editor.
id: d6691b01a7b7ecda4700b56b5f9d5b96 - page: 2
How to Retrieve?
# Search

curl -X POST "https://search.dria.co/hnsw/search" \
-H "x-api-key: <YOUR_API_KEY>" \
-H "Content-Type: application/json" \
-d '{"rerank": true, "top_n": 10, "contract_id": "KqC5Y5jPnaRBrgor-tBDnyjNHdLuOP6ZR8cHrioLUnY", "query": "What is alexanDRIA library?"}'
        
# Query

curl -X POST "https://search.dria.co/hnsw/query" \
-H "x-api-key: <YOUR_API_KEY>" \
-H "Content-Type: application/json" \
-d '{"vector": [0.123, 0.5236], "top_n": 10, "contract_id": "KqC5Y5jPnaRBrgor-tBDnyjNHdLuOP6ZR8cHrioLUnY", "level": 2}'