{"id":1144,"date":"2010-07-07T11:52:38","date_gmt":"2010-07-07T19:52:38","guid":{"rendered":"\/?p=1144"},"modified":"2010-07-07T11:55:24","modified_gmt":"2010-07-07T19:55:24","slug":"microsoft-accuses-apple-google-of-attempted-privacy-murder","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1144","title":{"rendered":"&#8220;Microsoft Accuses Apple, Google of Attempted Privacy Murder&#8221;"},"content":{"rendered":"<p><a href=\"http:\/\/www.networkworld.com\/community\/user\/13712\" class=\"broken_link\">Ms. Smith <\/a>at <a href=\"http:\/\/www.networkworld.com\">Network World<\/a> made it to the<a href=\"http:\/\/www.digg.com\"> home page <\/a>of digg.com yesterday\u00a0when<a href=\"http:\/\/www.networkworld.com\/community\/blog\/microsoft-accuses-apple-google-attempted-priv\" class=\"broken_link\"> she reported\u00a0<\/a>on my concerns about the collection and release of information related to people&#39;s\u00a0movements and location.\u00a0<\/p>\n<p>I\u00a0want to set the record straight about one thing: the headline.\u00a0 It&#39;s not that I object to the term &#8220;attempted privacy murder&#8221; &#8211; it pretty much sums things up. The issue is\u00a0just that I speak as Kim Cameron &#8211; a person, not a corporation.\u00a0 I&#39;m not in marketing or public releations\u00a0&#8211; I&#39;m a technologist who has come to understand that\u00a0we\u00a0must\u00a0 all work together to ensure people are able to trust their digital environment.\u00a0 The ideas I present here are the same ones I apply liberally in my day job, but this is a personal blog.<\/p>\n<p>Ms. Smith is as <a href=\"http:\/\/www.networkworld.com\/community\/blog\/microsoft-accuses-apple-google-attempted-priv\" class=\"broken_link\">precise as she is concise<\/a>:<\/p>\n<p style=\"padding-left: 30px;\">A Microsoft identity guru bit Apple and smacked Google over mobile privacy policies. Once upon a time, before working for Microsoft, this same man took MS to task for breaking the <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/ms996456.aspx\">Laws of Identity<\/a>.<\/p>\n<p style=\"padding-left: 30px;\">Kim Cameron, <a href=\"\/?p=360\">Microsoft&#39;s Chief Identity Architect<\/a> in the Identity and Security Division, <a href=\"\/?p=1141\">said of Apple<\/a>, &#8220;If privacy isn\u2019t dead, Apple is now amongst those trying to bury it alive.&#8221;<\/p>\n<p style=\"padding-left: 30px;\">What prompted this was when Cameron visited the Apple App store to download a new iPhone application. When he discovered Apple had updated its <a href=\"http:\/\/www.apple.com\/legal\/privacy\/\">privacy policy<\/a>, he read all 45 pages on his iPhone. Page 37 lets Apple users know:<\/p>\n<p style=\"padding-left: 60px;\"><strong>Collection and Use of Non-Personal Information<\/strong><\/p>\n<p style=\"padding-left: 60px;\">We also collect non-personal information &#8211; data in a form that does not permit direct association with any specific individual.<strong> We may collect, use, transfer, and disclose non-personal information for any purpose. The following are some examples<\/strong> of non-personal information that we collect and how we may use it:<\/p>\n<p style=\"padding-left: 60px;\">\u00b7 We may collect information such as occupation, language, zip code, area code,<strong> unique device identifier, location<\/strong>, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising.<\/p>\n<p style=\"padding-left: 30px;\">The MS identity guru put the smack down not only on Apple, but also on Google, writing in his <a href=\"\/?p=1136\">blog<\/a>, &#8220;Maintaining that a personal device fingerprint has &#8216;no direct association with any specific individual&#8217; is unbelievably specious in 2010 &#8211; and even more ludicrous than it used to be now that Google and others have collected the information to build giant centralized databases linking phone MAC addresses to house addresses. And &#8211; big surprise &#8211; my iPhone, at least, came bundled with Google\u2019s location service.&#8221;<\/p>\n<p style=\"padding-left: 30px;\">MAC in this case refers to Media Access Control addresses associated with specific devices and one of the types that Google collected. <a href=\"http:\/\/www.theatlantic.com\/science\/archive\/2010\/06\/what-could-google-do-with-the-data-its-collected\/58396\/\">Google <\/a>admits to collecting MAC addresses of WiFi routers, but denies snagging MAC addresses of laptops or phones. Google is under mass investigation for its WiFi blunder.<\/p>\n<p style=\"padding-left: 30px;\">Apple&#39;s new policy is also under fire from two Congressmen who gave Apple until July 12th to respond. Reps. Edward J. Markey (D-Mass.) and Joe Barton (R-Texas) sent a <a href=\"http:\/\/markey.house.gov\/docs\/markeybartonapple.pdf\" class=\"broken_link\">letter <\/a>to Apple CEO Steve Jobs asking for answers about Apple gathering location information on its customers.<\/p>\n<p style=\"padding-left: 30px;\">As far as Cameron goes, Microsoft&#39;s Chief Identity Architect seems to call out anyone who violates privacy. That includes Microsoft. According to <a href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Windows_Live_ID\">Wikipedia&#39;s <\/a>article on Microsoft Passport:<\/p>\n<p style=\"padding-left: 60px;\">&#8220;A prominent critic was Kim Cameron, the author of the Laws of Identity, who questioned Microsoft Passport in its violations of those laws. He has since become Microsoft&#39;s Chief Identity Architect and helped address those violations in the design of the Windows Live ID identity meta-system. As a consequence, Windows Live ID is not positioned as the single sign-on service for all web commerce, but as one choice of many among identity systems.&#8221;<\/p>\n<p style=\"padding-left: 30px;\">Cameron seems to believe location based identifiers and these changes of privacy policies may open the eyes of some people to the, &#8220;<a href=\"\/?p=1137\">new world-wide databases linking device identifiers and home addresses<\/a>.&#8221;<\/p>\n<p style=\"padding-left: 30px;\">\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Identity Guru Accuses Apple, Google of trying to bury privacy alive<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,2,3,47,11,77],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1144"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1144"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1144\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}