{"id":216,"date":"2014-12-22T19:19:23","date_gmt":"2014-12-22T19:19:23","guid":{"rendered":"http:\/\/securitybydesign.de\/?p=216"},"modified":"2014-12-22T19:19:23","modified_gmt":"2014-12-22T19:19:23","slug":"austrian-study-about-online-tracking-big-data-and-surveillance","status":"publish","type":"post","link":"https:\/\/securitybydesign.de\/?p=216","title":{"rendered":"Austrian study about Online Tracking, Big Data and surveillance"},"content":{"rendered":"<p>The Austrian Research Institute Cracked Labs has published a very <a href=\"http:\/\/crackedlabs.org\/dl\/Studie_Digitale_Ueberwachung.pdf\" target=\"_blank\">interesting study in German<\/a> about Online Tracking, Big Data and commercial surveillance with many examples showing what information companies derive from the data we provide on the internet and how they violate privacy best practices like user consent and restriction to a specific purpose.<\/p>\n<p>One quote From Google\u2019s Eric Schmidt (2013) mentioned in the <a href=\"http:\/\/crackedlabs.org\/studie-kommerzielle-ueberwachung\">online version<\/a> of the report is also a good slogan for 2015: \u201cYou have to fight for your privacy or you will lose it\u201d.<\/p>\n<p>Having said that, I wish you Merry Christmas and a Happy New Year!<\/p>\n<div class=\"shariff\" data-title=\"Austrian study about Online Tracking, Big Data and surveillance\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/securitybydesign.de\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"gftlx\" data-services='[\"googleplus\",\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"info\"]' data-image=\"\" data-url=\"https:\/\/securitybydesign.de\/?p=216\" data-lang=\"en\" data-theme=\"round\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>The Austrian Research Institute Cracked Labs has published a very interesting study in German about Online Tracking, Big Data and commercial surveillance with many examples showing what information companies derive from the data we provide on the internet and how &hellip; <a href=\"https:\/\/securitybydesign.de\/?p=216\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-216","post","type-post","status-publish","format-standard","hentry","category-privacy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=216"}],"version-history":[{"count":1,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/216\/revisions"}],"predecessor-version":[{"id":217,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/216\/revisions\/217"}],"wp:attachment":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}