2025-04-26
1404/02/06
Quotes & Excerpts

“Then we started seeing things we didn’t expect. Apps were automatically taking screenshots of themselves and sending them to third parties. In one case, the app took video of the screen activity and sent that information to a third party.”

Out of over 17,000 Android apps examined, more than 9,000 had potential permissions to take screenshots. And a number of apps were found to actively be doing so, taking screenshots and sending them to third-party sources.

Wynn-Williams's firsthand account of the next decade is not a story of these people becoming more reckless, rather, it's a story in which the possibility of consequences for that recklessness recedes, and with it, so does their care over those consequences.

Facebook buys its competitors, freeing it from market consequences for its bad acts. By buying the places where disaffected Facebook users are seeking refuge – Instagram and Whatsapp – Facebook is able to insulate itself from the discipline of competition – the fear that doing things that are adverse to its users will cause them to flee.

Facebook captures its regulators, freeing it from regulatory consequences for its bad acts. By playing a central role in the electoral campaigns of Obama and then other politicians around the world, Facebook transforms its watchdogs into supplicants who are more apt to beg it for favors than hold it to account.

Facebook tames its employees, freeing it from labor consequences for its bad acts. As engineering supply catches up with demand, Facebook's leadership come to realize that they don't have to worry about workforce uprisings, whether incited by impunity for sexually abusive bosses, or by the company's complicity in genocide and autocratic oppression.

First, Facebook becomes too big to fail.

Then, Facebook becomes too big to jail.

Finally, Facebook becomes too big to care.

CORY DOCTOROW
↖︎ Pluralistic

Everything that makes your phone useful, like knowing where you are, taking photos, enabling online shopping and banking – these are exactly where the potential weaknesses and vulnerabilities are, The more useful your phone is, the more attractive it is to advertisers, hackers, or anyone who wants your data.

Day's Context