skip to main content
opinion
Free access

Modern tech can't shield your secret identity

Published: 25 April 2022 Publication History

Abstract

The Communications website, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
twitter
Follow us on Twitter at http://twitter.com/blogCACM
http://cacm.acm.org/blogs/blog-cacm
Jason Hong considers how modern computing technologies would undermine superheroes' anonymity.

References

[1]
Tucille, J.D. New Yorkers are watched by more than 15,000 surveillance cameras. Reason, June 7, 2021. https://bit.ly/3gIpjEo
[2]
Michel, A.H. Eyes In The Sky: The Secret Rise of Gorgon Stare and How It Will Watch Us All. Mariner Books. 2019.
[3]
Superman - Want to tag Clark Kent? https://knowyourmeme.com/photos/1218277-superman
[4]
Ingram, D. Facebook to delete 1 billion people's 'facial recognition templates'. NBC News, Nov 2, 2021. https://nbcnews.to/3sygjYl
[5]
Moyer, E. Clearview AI set to get patent for controversial facial recognition tech. C/Net, December 4, 2021. https://cnet.co/3oHz8al
[6]
Whittaker, Z. T-Mobile quietly reported a sharp rise in police demands for cell tower data. TechCrunch. July 12, 2019. https://tcrn.ch/3gwETTM
[7]
Valentino-DeVries, J., Singer, N., Keller, M., and Krolik, A. Your Apps Know Where You Were Last Night, and They're Not Keeping It Secret. The New York Times, December 10, 2018. https://nyti.ms/3srLO6a
[8]
Thompson, S., and Warzel, C. Twelve Million Phones, One Dataset, Zero Privacy. The New York Times, December 19, 2019. https://nyti.ms/3gyJ94W
[9]
O'Sullivan, D. How the cell phones of spring breakers who flouted coronavirus warnings were tracked. CNN, April 4, 2020. https://cnn.it/34ObJwy
[10]
Balebako, R., Marsh, A., Lin, J., Hong, J.I., Cranor, L.F. The privacy and security behaviors of smartphone app developers. Workshop on Usable Security (USEC 2014). https://bit.ly/3oEWSMl
[11]
Chitkara, S., et al. Does this App Really Need My Location? Context-Aware Privacy Management for Smartphones. IMWUT 2017.
[12]
Pepitone, J. Apple and Google get grilled on privacy. CNN, May 10, 2011. https://cnn.it/3GGRq1w
[13]
Gallagher, S. Where've you been? Your smartphone's Wi-Fi is telling everyone. [Updated]. Ars Technica, November 5, 2014. https://bit.ly/35UNkpK
[14]
Mac, R., and Hill, K. Are Apple AirTags Being Used to Track People and Steal Cars? The New York Times, December 30, 2021. https://nyti.ms/3HY31Lf
[15]
Duhigg, C. How Companies Learn Your Secrets. The New York Times, February 16, 2012. https://nyti.ms/3gASOIm
[16]
Associated Press. Priest outed via Grindr app highlights rampant data tracking. USA Today, July 23, 2021. https://bit.ly/3rISJJc
[17]
Allyn, B. 'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man. NPR, June 24, 2020. https://n.pr/3gFu5Ts
[18]
Reichert, C. House Dems demand FBI, others stop spying on Black Lives Matter protests. C/INet, June 9, 2020. https://cnet.co/365lcAt
[19]
Freed, D., et al. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. CHI 2018. https://bit.ly/3rEcP7i
[20]
Bowles, N. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse. The New York Times, June 23, 2018. https://nyti.ms/3oEFoPW
[21]
Benjakob, O. The NSO File: A Complete (Updating) List of Individuals Targeted With Pegasus Spyware. Haaretz, January 20, 2022. https://bit.ly/34O0W5E

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 65, Issue 5
May 2022
108 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3533590
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 April 2022
Published in CACM Volume 65, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Opinion
  • Popular
  • Pre-selected

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 6,494
    Total Downloads
  • Downloads (Last 12 months)189
  • Downloads (Last 6 weeks)17
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media