Similarities with the cookies question appeared for me, as the
use/misuse factors were very similar, so views may remain valid across
domains.
My own view is that it is not the sense to give permission,
it is the ability to know a need exists to give permission and what the
outcome is, which is an area where the privacy issue becomes most
starkly illustrated on all sides, and frequently becomes muddied by
those legitimate circumstances where access could potentially be
socially justified. By muddied I mean masked or otherwise confused,
which experience shows often happens during justifications for various
types of action.
If the imposition of DP/RIPA/access to
communications/employment laws are looked at as extensions
incorporating accepted moral/ethical constructs and the muddy waters as
avoidance mechanisms to allow/hide conduct which is deemed necessary,
expedient or seen as just plain needed, any views expressed become
useful to my research, so thank you.
Good luck with your project.
Ian
W
> -----Original Message-----
> From: This list is for those
interested in Data Protection
> issues [mailto:data-
[log in to unmask]] On Behalf Of
> Roland Perry
> Sent: 20
October 2011 15:53
> To: [log in to unmask]
> Subject: Re:
[data-protection] [POSSIBLE SPAM] Monitoring methods
>
>
> In
message
> <30885475.795631319120810579.JavaMail.
defaultUser@defaultHost>, at
> 15:26:50 on Thu, 20 Oct 2011, Ian
Welton
> <[log in to unmask]> writes
> >When the target opens the
Spoofed SMS, the connection between the
> >target phone and our Main
Server is established. You are now
> connected
> >to the target phone
and you have every functionality that the target
> >has and even more.
You now have access to stored data and
> even Deleted
> >Data from
the target phone.
>
> This is potentially an example (which I'm
looking for in a
> project I'm
> involved with) of drive-by spyware
allowing someone to take
> control of a
> phone without the phone
owner having in any sense to "give
> permission".
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|