{"id":3776,"date":"2018-08-28T12:26:23","date_gmt":"2018-08-28T16:26:23","guid":{"rendered":"http:\/\/blogs.ams.org\/blogonmathblogs\/?p=3776"},"modified":"2018-08-28T13:53:30","modified_gmt":"2018-08-28T17:53:30","slug":"the-fat-tech-cat-diet","status":"publish","type":"post","link":"https:\/\/blogs.ams.org\/blogonmathblogs\/2018\/08\/28\/the-fat-tech-cat-diet\/","title":{"rendered":"The Fat Tech Cat Diet"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3788\" src=\"https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/20180810_101514-e1535473803954-1-1.jpg?resize=640%2C340\" width=\"640\" height=\"340\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/20180810_101514-e1535473803954-1-1.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/20180810_101514-e1535473803954-1-1.jpg?resize=300%2C159&amp;ssl=1 300w, https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/20180810_101514-e1535473803954-1-1.jpg?resize=768%2C407&amp;ssl=1 768w, https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/20180810_101514-e1535473803954-1-1.jpg?resize=1024%2C543&amp;ssl=1 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption>This got me thinking about the things that live inside my phone. <\/figcaption><\/figure>\n\n\n\n<p>Like much of the world, I seem to live in a permanent state of vexation about technology, privacy, and how to survive in a world where so many access points are guarded by hungry algorithm crunching data trolls. This is not a new anxiety for me, I&#8217;ve blogged here before about some of the <a href=\"https:\/\/blogs.ams.org\/blogonmathblogs\/2018\/02\/26\/the-rise-of-the-not-so-smart-cities\/\">privacy concerns of smart cities<\/a>, the <a href=\"https:\/\/blogs.ams.org\/blogonmathblogs\/2016\/02\/23\/opening-the-cryptographic-backdoor\/\">privacy choices made by Apple in the past<\/a>, and even the\u00a0<a href=\"https:\/\/blogs.ams.org\/blogonmathblogs\/2017\/05\/22\/black-hat-white-hat\/\">benevolent hackers protecting us<\/a>. \u00a0But technology moves on, and the fat cats of the tech sector seem to be getting fatter on a steady diet of user data.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3789\" src=\"https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/Screen-Shot-2018-08-28-at-8.26.17-AM-1-1-1.png?resize=629%2C925\" width=\"629\" height=\"925\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/Screen-Shot-2018-08-28-at-8.26.17-AM-1-1-1.png?w=629&amp;ssl=1 629w, https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/Screen-Shot-2018-08-28-at-8.26.17-AM-1-1-1.png?resize=204%2C300&amp;ssl=1 204w\" sizes=\"auto, (max-width: 629px) 100vw, 629px\" \/><figcaption>Well this certainly doesn&#8217;t inspire confidence. <\/figcaption><\/figure>\n\n\n\n<p>This topic has been especially hot on my mind this summer, because in an unexpected move (<a href=\"https:\/\/www.instagram.com\/p\/BmTStbdhThd\/?utm_source=ig_web_copy_link\">precipitated by this<\/a>) I switched from an iPhone to a phone with an Android operating system and have been questioning the implications to my privacy ever since.<\/p>\n\n\n\n<p>I mean, wow, I&#8217;ve had to click &#8220;I Agree&#8221; to a whole lot of things the last month.<\/p>\n\n\n\n<p>But as it (shockingly) turns out, it doesn&#8217;t quite matter whether I agree or not. \u00a0A report from the Associated Press revealed that <a href=\"https:\/\/apnews.com\/828aefab64d4411bac257a07c1af0ecb\/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not?utm_medium=AP&amp;utm_source=Twitter&amp;utm_campaign=SocialFlow\">Google apps store a time-stamped register your locations<\/a>, even when you specifically turn off location services. \u00a0So, for example, even if your &#8220;location history&#8221; is turned off, every time your gmail app pings a tower, the time and location is saved in your history. \u00a0That&#8217;s frustrating.<\/p>\n\n\n\n<p>So maybe you think it&#8217;s smarter to use an iPhone and stay away from Google&#8217;s proprietary apps. \u00a0Well, I have bad news for you. \u00a0Apple, who has always differentiated itself by loudly proclaiming its commitment to<a href=\"https:\/\/www.wired.com\/2015\/06\/apples-latest-selling-point-little-knows\/\"> locking up all of your private data inside your phone<\/a> that it can&#8217;t be touched <a href=\"https:\/\/blogs.ams.org\/blogonmathblogs\/2016\/02\/23\/opening-the-cryptographic-backdoor\/\">even by the engineers at Apple<\/a>, has a new (as of iOS10) privacy scheme. \u00a0And the math around it doesn&#8217;t look very good. \u00a0The scheme is called <a href=\"https:\/\/www.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf\">differential privacy<\/a>, and in a nutshell, Apple now sends all of your local data back to the mothership, but mixes it with enough noisy data that (in theory) your data could never be tied back to you personally. \u00a0This is an opt-in scheme, and when you agree to it, you are agreeing to a data sharing budget of epsilon per day. \u00a0That is, there is an upper bound, epsilon, to the amount of data they will harvest each day.<\/p>\n\n\n\n<p>However, mathematicians have shown that even for a fixed epsilon, the amount of privacy being lost is not really something to be proud of, in fact they show that\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/1709.02753.pdf\">the amount of privacy you can lose each day is unbounded<\/a>. \u00a0A <a href=\"https:\/\/www.wired.com\/story\/apple-differential-privacy-shortcomings\/\">post from Andy Greenberg at <em>Wired<\/em><\/a> gives a good rundown on some of the research that has been done on the shortcomings of the algorithm.<\/p>\n\n\n\n<p>What also really bugs me about this, is how apparently nonchalant Apple is about dealing with the criticism. \u00a0I mean, I&#8217;m torn. \u00a0On the one hand, Google is standing there out in the open with its grabby robot hands taking all of my data and I can&#8217;t stop them. \u00a0And in some sense, Apple is doing the same thing but just pretending it isn&#8217;t. \u00a0<\/p>\n\n\n\n<p>Cathy O&#8217;Neil, the <a href=\"https:\/\/mathbabe.org\/2018\/08\/12\/zuckerberg-is-totally-out-of-his-depth\/\">longtime blogger<\/a> and now frequent <a href=\"https:\/\/www.bloomberg.com\/authors\/ATFPV0aLyJM\/catherine-h-oneil\">contributor to Bloomberg<\/a> has done a lot of writing about big tech companies and their questionable algorithm practices. \u00a0Recently,\u00a0<a href=\"https:\/\/www.bloomberg.com\/view\/articles\/2018-08-05\/how-america-can-stop-being-the-wild-west-of-data\">O&#8217;Neil wrote about a set of proposals from Mark Warner<\/a> regarding data privacy. \u00a0Specifically, what the government might do to limit who gets to access your data and what they get to do with it. \u00a0 For the algorithms that have big control over your life, Warner recommends a system of algorithm auditing by human (because in case you missed it, <a href=\"https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing\">algorithm bias is a very real thing<\/a>). Most recently, she wrote about what<a href=\"https:\/\/www.bloomberg.com\/view\/articles\/2018-08-12\/mark-zuckerberg-is-totally-out-of-his-depth\"> Zuckerberg and his fellow cats<\/a> can do to reel in the powerful and dangerous beast they&#8217;ve created.<\/p>\n\n\n\n<p>What motivates your personal decisions on privacy? \u00a0Do you think about what operating system you use and does it vex you every day? \u00a0Let me know in the comments, or as usual I&#8217;ll be tweeting from my underground bunker <a href=\"https:\/\/twitter.com\/extremefriday\">@extremefriday<\/a>.<\/p>\n<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div>","protected":false},"excerpt":{"rendered":"<p>Like much of the world, I seem to live in a permanent state of vexation about technology, privacy, and how to survive in a world where so many access points are guarded by hungry algorithm crunching data trolls. This is &hellip; <a href=\"https:\/\/blogs.ams.org\/blogonmathblogs\/2018\/08\/28\/the-fat-tech-cat-diet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" data-url=https:\/\/blogs.ams.org\/blogonmathblogs\/2018\/08\/28\/the-fat-tech-cat-diet\/><\/div>\n","protected":false},"author":69,"featured_media":3778,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[366,58],"tags":[228,535,163,829,828,830],"class_list":["post-3776","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-science","category-mathematics-and-computing","tag-algorithms","tag-apple","tag-cathy-oneil","tag-google","tag-privacy","tag-tech"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/blogs.ams.org\/blogonmathblogs\/files\/2018\/08\/Screen-Shot-2018-08-28-at-8.26.17-AM-1.png?fit=629%2C925&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p3tW3N-YU","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/posts\/3776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/users\/69"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/comments?post=3776"}],"version-history":[{"count":4,"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/posts\/3776\/revisions"}],"predecessor-version":[{"id":3790,"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/posts\/3776\/revisions\/3790"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/media\/3778"}],"wp:attachment":[{"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/media?parent=3776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/categories?post=3776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ams.org\/blogonmathblogs\/wp-json\/wp\/v2\/tags?post=3776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}