Katia Vales discusses how advances in technology have not only brought countless benefits to humanity but have also infringed on people’s privacy. The author suggests that continuing to use technology to protect the very liberties that the same technology jeopardizes stands as a significant contradiction to the institutions of this country. While it may feel “justified” to use these invasive technologies because of criminal actions, it is vital to consider the bigger picture and think about what it means for citizens to exist in a state of continuous monitoring.
Read MoreBiometrics
Biometric Security
Halle Steffensmeier discusses how biometrics have become increasingly prevalent, citing examples such as retina scans in the Metaverse, fingerprints to access mobile devices, and law enforcement leveraging facial recognition solutions. Biometrics and cyber security are increasingly critical topics of discussion, particularly concerning individual privacy. By providing a complete picture of biometrics and a report on recent events in biometric security, the author hopes to illustrate the troubling reality of biometric data collection: our intimate data in the hands of the world's largest technology companies.
Read MoreApple’s Security & Privacy Practices
Raphael Kyle Caoile Manansala discusses how since its 2014 iteration of iOS, also known as iOS 8, Apple has taken an unprecedented step of introducing full-disk encryption as a feature dubbed as Data Protection when an iPhone user sets a passcode lock. This pioneered the idea in Silicon Valley that the data on smart technology devices like the iPhone belonging to its users. Apple has been known for its attention to detail. As we further explore its design decisions, we will see just how Apple took careful considerations in making decisions based on the security and privacy of its customers.
Read MoreThe Evolution of Aadhaar in India
Ashritha Dsouza analyzes and identifies the biometric-based identity program Aadhaar in India, and the challenges it faced from various stakeholders. This paper discusses the gaps in processes and external events of the Aadhaar project and suggests ways to address those gaps.
Read More