Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

New phone call etiquette: Text first and never leave a voice mail

Washington Post: “Phone calls have been around for 147 years, the iPhone 16 years and FaceTime video voice mails about a week. Not surprisingly, how we make calls has changed drastically alongside advances in technology. Now people can have conversations in public on their smartwatches, see voice mails transcribed in real time and dial internationally… Continue Reading

Behind the Scenes at ‘Have I Been Pwned’

Via Slashdot and contributor slincolne [the link is behind a paywall]: “The founder of the data-breach notification site Have I Been Pwned manages “the largest known repository of stolen data on the planet,” reports Australia’s public broadcaster ABC, including over 6 billion email address. Yet with no employees, Troy Hunt manages all of the technical… Continue Reading

The Man Who Trapped Us in Databases

The New York Times [read free]- “Hank Asher was a drug smuggler with a head for numbers — until he figured out how to turn Americans’ private information into a big business. One of Asher’s innovations — or more precisely one of his companies’ innovations — was what is now known as the LexID. My… Continue Reading

6 Tips to Find Lost Emails in Gmail

MakeUseOf: “Ever read an email only to never find it again in your Gmail inbox? Whether you accidentally deleted it or you’re checking in the wrong folder, there are numerous reasons why you may be unable to find an important email. Fortunately, there are things you can do to find these lost or misplaced emails.” Continue Reading

Federal Reserve communications

Jeremy Singer-Vine, Data is Plural: Agam Shah et al. have compiled a corpus of key communications by the US Federal Reserve’s Federal Open Market Committee, which “controls the three tools of monetary policy — open market operations, the discount rate, and reserve requirements.” Gathered from the Fed’s website, the corpus includes all meeting minutes and… Continue Reading

How to Sort of Remove Your Online Presence

How to Geek: “Privacy-focused apps, better browsing practices, and data broker opt-outs are all ways to scrub as much information as possible from the internet. Removing yourself from the internet is difficult, but you can take steps to minimize your online footprint and make it harder for your data to be sold. Opt out of… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, July 22, 2023

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, July 22, 2023 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

Proton Mail is Fighting Back Against Tracking Links

How To Geek: “Emails are full of tracking links, especially in newsletters and promotional mailing lists, which can pass sensitive information about you to the sender. They’re such a problem that Proton Mail, the privacy-sensitive alternative to Gmail and other email platforms, is trying to prevent it with a new “Tracking Links Protection” feature. When… Continue Reading