Archive for June, 2017

Accused lured victims by posting ads on social networking sites – Times of India

THANE: In another major development in the Ambernath-based fake call centre case, the police have learnt that the accused used to lurre youth by posting advertisements on various social networking sites. The investigators have also identified the three persons who were involved in processing the itunes card to convert the amount into cash. According to their modus operandi, the accused used to post various ads and motivational quotes to lure the youth. One such motivational quote read as, 'If call centre employees were honest'. A day after this was posted the cops raided the place. The company, Mount Logic Solutions, had also posted attractive pay scales along with a pick up and drop facility from Ambernath station. The best part of the deal was Saturday and Sunday off. Also, the company had claimed to give additional incentives based on their performance and even offered accomodation but only for experienced candidates. Meanwhile, a senior police official said that they have found that the callers were not getting any incentives for getting good business. ''They were paid somewhere between Rs 20,000 to Rs 30,000 per month. This means that the advertisements that they posted were misleading,'' the official said. ''We have recovered a number of mails and names of victims. This will help us in nailing the accused,'' the official added. The cops have so far found income amounting to Rs 1.60 crore from the company and they are tracking the money trail. Last Thursday, Mount Logic Solutions, which had allegedly duped US citizens, was raided and 25 employees were arrested.

Read the original:
Accused lured victims by posting ads on social networking sites - Times of India

No social networking helped topper get good marks – Times of India

Indore: When most students his age are busy on social networking websites, JEE topper in Indore Arpit Prajapat did not even own a mobile phone.

From 8am till 9 pm, Arpit followed a tight schedule for more than two years to prepare for the JEE. "Whenever I felt tired and felt the need to relax, I just sat in a corner alone for a while without doing anything. Social networking was a big no for me," Arpit told TOI.

Arpit, who is the son of a gardener who couldn't even clear class VIII, feels that his hardwork has paid off. "My parents never expected this but it has happened. No one from my family has studied so much and attained any position in any competitive exam," added Prajapat.

An elated Harinam Prajapat, Arpit's father, said that his son will achieve what he has set out to.

See the rest here:
No social networking helped topper get good marks - Times of India

A One-Stop Social Networking Mobile App Enabling Users to Create Multiple Profiles Under One General Account for … – PR Newswire (press release)

MONTREAL, June 13, 2017 /PRNewswire/ --Virtual Artifacts Inc. (VA), an internet technology company focused on rethinking the online experience, announced today the launch of Hibe Share, a privacy-focused social networking mobile app. The company also announced plans to release more services powered by its flagship electronic platform, Hibe.

"Hibe Share is like a combination of Facebook, LinkedIn and an enterprise social platform that enables people to interact with their entire social network with authentic privacy and image management," says Mr. Dobey, CEO of VA.

Hibe Share allows users to create multiple profiles under one general account. These profiles, known as personas, can be created for personal, professional, academic and even anonymous interactions. Users can then use the persona of their choice to share specific content with dedicated audiences. As such, they control who sees what content, and how they will appear to their various audiences. In this manner, Hibe Share constantly safeguards users' privacy and image, allowing them to confidently interact with their entire social network.

Another benefit of Hibe Share is that it enables users to make efficiency gains in receiving and consuming content. Each persona has its own feed, populated with content from the audience associated with it. This allows users to prioritize which of their professional, personal or other feeds they wish to engage in first, and therefore not force them to navigate through noise and ads in order to reach the information they seek.

"We want people to regain control of their privacy and online image by ensuring that their private communications and information cannot spread across their social network unintentionally, nor be accessed by strangers," says Mr. Dobey.

The launch of Hibe Share follows last December's soft release of Hibe Persona, a smart contact manager. Unlike traditional contact managers, users of Hibe Persona do not have to look for, create, and update continually changing information about their contacts. Users need only maintain their information. Hibe Persona stores all historical data as well as updates their entire contact list automatically, ensuring that all users have the most recent information.

"In this hyper-connected and dynamic world where people's personal and professional information constantly changes, no one should be manually managing their contacts today. It would be amazing if Hibe Persona replaces the clunky default contact managers in our devices, enabling users to attain platform and device independence. As such, we believe that Hibe Persona is the bridge between traditional contact managers and our social network," says Mr. Dobey.

Hibe Share and Hibe Persona apps are the first two of the four main pillars that the company is building atop its proprietary social (Social X) and e-commerce (ShopMedia) engines. Both Hibe Share and Hibe Persona are available on Apple Store and Google Play in North America. The company plans to release its apps worldwide within the next few weeks.

The next pillar, presently in alpha testing, is the Hibe Pandora app. Hibe Pandora is directed at small and medium apps, enabling them to "friend" each other, and thereby allowing their users to communicate and exchange data.

Hibe Pandora is like a Facebook for apps. By plugging their apps to Hibe Pandora, developers will maintain their independence, boost user retention, and increase profits as a result of additional revenue streams. "As a result of Hibe's proprietary privacy technology, apps can now talk to each other, thereby allowing people to use their favorite apps to interact with others on different apps," says Mr. Dobey.

The fourth pillar of the Hibe Platform is Hibe Marketplace, the next generation of e-commerce.

Hibe Marketplace, in cooperation with apps plugged to Hibe Pandora, will allow brands and consumers to interact directly through brand representatives, and no longer through intermediaries who presently control the relationship. "The most challenging part of Hibe Marketplace was to create a viable alternative where brands could promote and advertise their products and services across different apps at no cost, ensuring a mass reach and targeted messages to consumers, while steadfastly safeguarding consumers' basic right to privacy," states Mr. Dobey.

Moreover, based on its patented technology, Hibe Marketplace will empower buyers to choose their own delivery options from a competing list of shippers, while freeing sellers from the complexities of shipping and tracking their deliveries.

"Dealing with the online privacy issue required us to basically disrupt the traditional models of social media and e-commerce. The right to privacy has been at the heart of our values since the beginning. It might not make sense right now but our focus today is not to play the numbers game. These breakthrough apps are a means to an end. So bear with us for the few months to come," states Mr. Dobey.

ABOUT VIRTUAL ARTIFACTS Based in Montreal, Canada, Virtual Artifacts Inc. is committed to building technologies that transform how individuals, brands and organizations meet, connect, communicate and transact online. The company is dedicated to developing tools that bridge the gap between online and real-life interactions.

For more information visitwww.hibe.com.

Media Contact: Jean Dobey, CEO Phone: 514.842.2021 Email: pr@hibe.com

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/a-one-stop-social-networking-mobile-app-enabling-users-to-create-multiple-profiles-under-one-general-account-for-better-privacy-and-image-management-300472954.html

SOURCE Virtual Artifacts Inc.

http://www.hibe.com

Link:
A One-Stop Social Networking Mobile App Enabling Users to Create Multiple Profiles Under One General Account for ... - PR Newswire (press release)

The App That Does Nothing – The Atlantic

Binky is an app that does everything an app is expected to do. Its got posts. Its got likes. Its got comments. Its got the infinitely scrolling timeline found in all social apps, from Facebook to Twitter, Instagram to Snapchat.

I open it and start scrolling. Images of people, foods, and objects appear on and then vanish off the screen. Solar cooker. B.F. Skinner. Shoes. Marmalade. Sports Bra. Michael Jackson. Ganesha. Aurora Borealis. These are binks, the name for posts on Binky.

I can like a bink by tapping a star, which unleashes an affirming explosion. I can re-bink binks, too. I can swipe left to judge them unsavory, Tinder-style, and I can swipe right to signal approval. I am a binker, and I am binking.

Theres just one catch: None of it is real. Binky is a ruse, a Potemkin-Village social network with no people, where the content is fake and feedback disappears into the void. And it might be exactly the thing that smartphone users wantand even need.

* * *

Its strange to think of content as optional. When Bill Gates declared that Content is King in 1996, he meant that digital content creators would make more money online than computer manufacturers. Gates cited television as a precursor: It was an invention that created many industries, but broadcastersthe content creatorswere the long-term winners on TV.

Gates was right and wrong. Content, from e-commerce to social media, did drive huge profits in the two decades since. But equipment also produced enormous wealthjust look at Apple. With the rise of Facebook, Google, Uber, Microsoft, Amazon, and others, content stopped being a name for ideas alone and started signifying a confluence of machines, services, media, and ideas. This is the phenomenon some nickname #content (as a hashtag), implying that the purpose of ideas is to fill every moment with computational engagement. Technologys effect on ordinary life is always more important than the ideas its content carries.

Marshall McLuhan was the best theorist of media as mechanisms for behavior rather than channels for ideas. His famous quip the medium is the message was meant to deemphasize content in favor of the media forms that make it possible. For McLuhan, the meaning of individual books, television programs, newspaper articles, movies, and software programs is just a distraction. More important: how those media change the way people think and behave in aggregate. The book, for example, creates a society for which knowledge is singular, certain, and authoritative thanks to the uniformity of print.

The smartphones effects have evolved and changed. When I wrote about the iPhone shortly after its launch, I called it the geeks Chihuahua: a glass-and-metal companion that people could hold, stroke, and peta toy dog for the tech set. Some years later, after games, apps, and social media made smartphone use compulsive, I dubbed the device the cigarette of this century: a source of obsessive attention that, like smoking, brings people together in a shared dependency whose indulgence also produces the calming relief of new data.

It doesnt make sense to talk about the meaning of cigarettes or Chihuahuas. Their meaning is the pattern of their use. Thats the thing about content: Its form and meaning matters less than how it changes peoples behavior. And when it comes to smartphones, seeing and touching them is far more important than processing the meaning they deliver.

* * *

Binky eviscerates meaning by design. Every bink on Binky is a labeled image, chosen randomly and generated endlessly. Liking a bink does nothing. Swiping or re-binking sends binks nowhere. The comments are my favorite: A keyboard appears on which to type them, but each key-tap reveals a whole word in a pre-generated comment. Words, tags, or emoji continue appending until I stop typing. This looks amazing! #harlemshake #wordsToLiveBy #rofl, or I dunno, I like this but its problematic .

Binky is a social network app with no network and no socializing. And yet, Binky is not just as satisfying as real social apps like Twitter or Instagram, but even more satisfying than those services. Its posts are innocuous: competent but aesthetically unambitious photos of ordinary things and people. Should binkers feel the urge to express disgust at Linus Paulding or Lederhosen, they can swipe left, and Binky accommodates without consequence. And the app doesnt court obsession by counting followers or likes or re-binks.

Dan Kurtz, the game developer and improv actor who created Binky, tells me that the idea for the app arose partly from his own feelings after reading through the current updates on Facebook or Twitter while waiting for a train. I dont even want that level of cognitive engagement with anything, he explains, but I feel like I ought to be looking at my phone, like its my default state of being. Kurtz wondered what it would look like to boil down those services into their purest, most content-free form. This is what people really want from their smartphones. Not content in the sense of quips, photos, and videos, but content as the repetitive action of touching and tapping a glass rectangle with purpose and seeing it nod in response.

Binky also offers a new take on the smartphones effects, McLuhan-style. Some of the toy-dog aspects of mobile computing remain, along with the compulsive ones, too. But the novelty of touching the smartphone has long since ended, and the angst of its compulsive use is universally acknowledged. Those habits are here to stay, like it or not.

Standard smartphone fare inspires users to create content whose publication accrues value for the tech titans that operate walled-garden services. Those businesses transform that aggregated attention into revenue and stock value in turn. Meanwhile, the pleasure and benefit of those services dwindles by the day, as conflict and exhaustion suffocate delight and utility.

Binky offers a way to see and tolerate that new normalcy. What if the problem with smartphones isnt the compulsion to keep up with the new ideas they deliver, but believing that the meaning of those ideas matters in the first place? Binky offers all the pleasure of tapping, scrolling, liking, and commenting without any of the burden of meaning.

The app frames its intervention with humor and mockery. Its name is a trademark for baby pacifiers, an image that also adorns the apps icon. Calling it Binky implies a global infancy among apps, but also a legitimate comfort thanks to Binkys succor. And Kurtz initially conceived of the app in a Comedy Hack Day mini-hackathon held by Cultivated Wit, a firm that produces, well, contentvideos and events and software and the like. Forged from games and comedy, Binky might look like an ironic joke to some.

Is a baby pacifier just a parody? Kurtz retorts when I press him on the matter. Its a good point; something that replaces another isnt always a joke. He reminds me of my own ironic app, which, to my delight, he cites as an inspiration: a game called Cow Clicker that boiled down Facebook games to their purest form like Binky does social apps. In both cases, irony offers an in-road for some but burns out fast. Deliberate use always wins.

On that front, Kurtz makes his faith in the apps earnest utility clear. Look, all we want from our apps is to see new stuff scroll up from the bottom of the screen, the Binky website reads. It doesnt matter what the stuff is. Thats no gag; its an incisive elucidation of why people want to handle their smartphones so often. By sparing the mental and emotional effort of taking in content and spitting back approval and commentary, Binky makes it possible to experience the smartphone as such, as a pure medium for its behavior rather than a delivery channel for social-media content.

Thats also where apps start, it turns out. Kurtz wanted to learn iOS programming, and he reasoned that the best approach would be to incorporate all the standard interface widgets. Binky was the result. Whats an app without content? Pure, unadulterated tapping and scrolling through the hollowed-out interfaces that all apps now share.

* * *

Theres a use of cigarettes beyond their chemical effects. Smoking gives people something to hold and something to do with their hands. McLuhan called it poise. And smartphones offer something similar. At the bus stop, in the elevator, in front of the television, on the toilet, the smartphone offers purpose to idle fingers. To use one is more like knitting or doodling than it is like work or play. It is an activity whose ends are irrelevant. One that is conducted solely to extract nervous attention and to process it into exhaust.

There have been attempts to cure the ills of smartphone compulsion. Fidget cubes and spinners offer a recent example, doodads that offer mechanical intrigue that might, some users hope, distract them from the draw of the smartphone. But these devices fail to cop to the smartphones victory in standardizing the mechanics of idle effort. The tapping, the scrolling, the liking, the #content, even. Those must be preserved. Binky offers an unexpected salve: a way to use a smartphone without using one to do anything in particular. Isnt that all anyone really wants?

More:
The App That Does Nothing - The Atlantic

How should an originalist rule in the Fourth Amendment cell-site case? – Washington Post

The Supreme Court recently agreed to hear Carpenter v. United States, a case on whether the Fourth Amendment protects historical cell-site records. In this post, I want to focus on a small but potentially important part of the Carpenter litigation: How should an originalist Justice vote in the case? There are many different flavors of originalism, of course, and originalist arguments often can be used to argue for different outcomes. But in this post I want to discuss one originalist argument that I think is significant. Ill then ask readers to weigh in on it.

Lets start with the obvious: The Framers could not have imagined a world of cell-site records. And the original public meaning of the Fourth Amendment is open to a wide range of interpretations at different levels of generality. With that said, the text of the Fourth Amendment does have an important clue about what the Fourth Amendment was originally understood to mean that might be important to the Carpenter case.

Heres the opening text of the Fourth Amendment:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated[.]

As Justice Antonin Scalia emphasized in his concurrence in Minnesota v. Carter, the word their can be understood as important in historical context. It signals that to assert a Fourth Amendment violation, a persons own self, houses, papers or effects must be unreasonably searched or seized.

Heres what Scalia wrote in Carter, with emphasis in the original:

The Fourth Amendment protects [t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures . . . . U. S. Const., Amdt. 4 (emphasis added). It must be acknowledged that the phrase their . . . houses in this provision is, in isolation, ambiguous. It could mean their respective houses, so that the protection extends to each person only in his own house. But it could also mean their respective and each others houses, so that each person would be protected even when visiting the house of someone else. As todays opinion for the Court suggests, however, ante, at 88-90, it is not linguistically possible to give the provision the latter, expansive interpretation with respect to houses without giving it the same interpretation with respect to the nouns that are parallel to housespersons, . . . papers, and effectswhich would give me a constitutional right not to have your person unreasonably searched. This is so absurd that it has to my knowledge never been contemplated. The obvious meaning of the provision is that each person has the right to be secure against unreasonable searches and seizures in his own person, house, papers, and effects.

The founding-era materials that I have examined confirm that this was the understood meaning. . . . Like most of the provisions of the Bill of Rights, the Fourth Amendment was derived from provisions already existing in state constitutions. Of the four of those provisions that contained language similar to that of the Fourth Amendment, two used the same ambiguous their terminology. See Pa. Const., Art. X (1776) (That the people have a right to hold themselves, their houses, papers, and possessions free from search and seizure . . .); Vt. Const., ch. I, XI (1777) (That the people have a right to hold themselves, their houses, papers, and possessions free from search or seizure. . .). The other two, however, avoided the ambiguity by using the singular instead of the plural. See Mass. Const., pt. I, Art. XIV (1780) (Every subject has a right to be secure from all unreasonable searches, and seizures of his person, his houses, his papers, and all his possessions); N. H. Const., XIX (1784) (Every subject hath a right to be secure from all unreasonable searches and seizures of his person, his houses, his papers, and all his possessions).

The New York Convention that ratified the Constitution proposed an amendment that would have given every freeman a right to be secure from all unreasonable searches and seizures of his person his papers or his property, 4 B. Schwartz, The Roots of the Bill of Rights 913 (1980) (reproducing New York proposed amendments, 1778) (emphases added), and the Declaration of Rights that the North Carolina Convention demanded prior to its ratification contained a similar provision protecting a freemans right against unreasonable searches and seizures of his person, his papers and property, id., at 968 (reproducing North Carolina proposed Declaration of Rights, 1778) (emphases added). There is no indication anyone believed that the Massachusetts, New Hampshire, New York, and North Carolina texts, by using the word his rather than their, narrowed the protections contained in the Pennsylvania and Vermont Constitutions.

That their . . . houses was understood to mean their respective houses would have been clear to anyone who knew the English and early American law of arrest and trespass that underlay the Fourth Amendment. The peoples protection against unreasonable search and seizure in their houses was drawn from the English common-law maxim, A mans home is his castle. As far back as Semaynes Case of 1604, the leading English case for that proposition (and a case cited by Coke in his discussion of the proposition that Magna Carta outlawed general warrants based on mere surmise, 4 E. Coke, Institutes 176-177 (1797)), the Kings Bench proclaimed that the house of any one is not a castle or privilege but for himself, and shall not extend to protect any person who flies to his house. 5 Co. Rep. 91a, 93a, 77 Eng. Rep. 194, 198 (K. B.).

Thus Cooley, in discussing Blackstones statement that a bailiff could not break into a house to conduct an arrest because every mans house is looked upon by the law to be his castle, 3 W. Blackstone, Commentaries on the Laws of England 288 (1768), added the explanation: [I]t is the defendants own dwelling which by law is said to be his castle; for if he be in the house of another, the bailiff or sheriff may break and enter it to effect his purpose. . . . 3 W. Blackstone, Commentaries on the Laws of England 287, n. 5 (T. Cooley 2d rev. ed. 1872). See also Johnson v. Leigh, 6 Taunt. 246, 248, 128 Eng. Rep. 1029, 1030 (C. P. 1815) ([I]n many cases the door of a third person may be broken where that of the Defendant himself cannot; for though every mans house is his own castle, it is not the castle of another man).

Of course this is not to say that the Fourth Amendment protects only the Lord of the Manor who holds his estate in fee simple. People call a house their home when legal title is in the bank, when they rent it, and even when they merely occupy it rent freeso long as they actually live there. That this is the criterion of the peoples protection against government intrusion into their houses is established by the leading American case of Oystead v. Shed, 13 Mass. 520 (1816), which held it a trespass for the sheriff to break into a dwelling to capture a boarder who lived there. The court reasoned that the inviolability of dwelling-houses described by Foster, Hale, and Coke extends to the occupier or any of his family . . . who have their domicile or ordinary residence there, including a boarder or a servant who have made the house their home. Id., at 523 (emphasis added). But, it added, the house shall not be made a sanctuary for one such as a stranger, or perhaps a visitor, who upon a pursuit, take[s] refuge in the house of another, for the house is not his castle; and the officer may break open the doors or windows in order to execute his process. Ibid. (emphasis in original).

Thus, in deciding the question presented today we write upon a slate that is far from clean. The text of the Fourth Amendment, the common-law background against which it was adopted, and the understandings consistently displayed after its adoption make the answer clear. We were right to hold in Chapman v. United States, 365 U. S. 610 (1961), that the Fourth Amendment protects an apartment tenant against an unreasonable search of his dwelling, even though he is only a leaseholder. And we were right to hold in Bumper v. North Carolina, 391 U. S. 543 (1968), that an unreasonable search of a grandmothers house violated her resident grandsons Fourth Amendment rights because the area searched was his home, id., at 548, n. 11 (emphasis added). We went to the absolute limit of what text and tradition permit in Minnesota v. Olson, 495 U. S. 91 (1990), when we protected a mere overnight guest against an unreasonable search of his hosts apartment.

I think we can all agree that the cellphone companys records of which of its cell towers were associated with its customers phone at some point in the past are, in the abstract, papers or effects. I would think that an originalist would then want to ask the Carter question: Whose papers or effects are they? Presumably they are the papers or effects of the phone company. But are they also the papers or effects of the customer?

The idea of papers and effects presumably was understood to include situations such asEntick v. Carrington (1765), the case that helped inspire the Fourth Amendments enactment, in which the kings officials broke into Enticks home. Inside the home, the officials removed all the private papers, books, etc. of the plaintiff there found, . . . and took and carried away 100 printed charts, 100 printed pamphlets, etc. etc. of the plaintiff there found, and other 100 charts etc etc took and carried away. In that setting, papers and effects likely meant something like a persons private property. Indeed, the first draft of the Fourth Amendment used property instead of effects.

The question is, can cell-site records be the users own papers or effects? It seems like an uphill battle. Cell-site records are a phone companys internally generated records ofhow its network connected a communicationbetween a customer and someone else. Cellphone customers dont know what cell towers their phones are connecting to, or where the towers are located. They dont know what the phone companys records say. Thats information that the phone company generates describing how its own network service operated that the phone company keeps in the ordinary course of its business. Whether those records are retained, and for how long, is up to the phone company. Its the phone companys business and its network, and users wouldnt see or access the records that the phone company creates and stores.

Given that, to say that cell-site records belong to the user that they are the users papers or effects you would need some kind of theory by which a person has some kind of property or property-like rights in another persons records of what they did on your behalf.

There are ways to get there, but Im not aware of any of those theories being recognized in the past much less the late 18th century. For example, one option would be to look to contract law or agency law. Perhaps signing the agreement makes the phone company the agent of the user, such that the phone company is working for the user and its company records belong, at least in some sense, to the user. This is creative, but at least at this point I dont see support for this theory in the historical caselaw or other materials.

Id be happy to be corrected, but Im not aware of an early court or even just a litigant suggesting that the contractual or agency relationship made the providers records in some sense the customers own, triggering the Fourth Amendment, its state equivalents, or common law search and seizure principles. There presumably were situations in the 18th or 19th century in which two parties would enter into a contractual agreement and the government would want records or testimony from the provider of those goods or services concerning what the recipient of the goods or service had done. A possibly interesting example is hotel guest lists, which are at least somewhat analogous to cell-site records records by a business of who was using a particular service and when. My understanding is that hotel guest lists were traditionally left open to inspection by anyone. See Jefferson Williamson, The American Hotel: An Anecdotal History 181 (1930). The records apparently werent considered the guests own papers, even though they were created in the course of providing a service to the guest.

It would be a different case, I think, with the contents of communications. In the case of contents, the network provider is merely holding the private communications of the user on the users behalf. The communications are still the users communications. The user wrote them, or, on receipt, received them. If I decide to store my emails on Gmails servers, for example, they are still my emails, just as my letters are still my letters when I send them through the postal mail. See Ex Parte Jackson, 96 US 727, 733 (1877) (Letters and sealed packages of this kind in the mail are as fully guarded from examination and inspection, except as to their outward form and weight, as if they were retained by the parties forwarding them in their own domiciles.).

If Im right, an originalist might plausibly conclude that the contents of communications are protected by the Fourth Amendment as the users papers or effects but that the business records of the company as to how those papers or effects were delivered would be the companys records, not the users.

Anyway, thats my tentative thinking. Im very interested to know whether readers who are interested in originalism find this thinking persuasive. And my apologies in advance if I have offered a wrong or naive view of originalism. It sometimes seems that one must be a sophisticated theorist of originalism to truly understand what originalism means, and I admit I am only a simple country Fourth Amendment lawyer.

Read more:
How should an originalist rule in the Fourth Amendment cell-site case? - Washington Post