The Death of BCC?

In the age of Facebook, in an era where privacy and anonymity are a thing of the very distant past, quite a few “features” of technology have been banished from daily use, forced to languish in the corner in a sad state of disuse and disrepair. But perhaps none have suffered such a miserable and regrettable fate as the BCC.

Quick: if you’re fighting with a friend and want to let your BFF know what’s going on as you send your frenemy a nasty messsage — what’s the best way to pull that off?

If you’ve completed the switch to Facebook mindset, your convoluted answer would consist of something to effect “Send a message to X, copy and paste it, and send it to Y.” And you’d be right – Facebook doesn’t give you another way of pulling this off. FAIL!

Let’s say your technical skills are not in such a pitiful state and you have enough sense to still use email for day-to-day communications. What’s your answer then? “I’ll just send X an email, then forward my result to Y.” aaaaaaaaand that’s another fail.

See, there’s this oft-overlooked feature my commandline mail client from the 80s has that solves this. It’s called “Blind Carbon Copy,” or BCC for short. You can send an email to more than one person without all your recipients knowing who you sent it to!

Continue reading

Disturbing Stats About Facebook Users & Security

There’s a screenshot that’s been sitting on my desktop for a rather long time now, and it’s as scary as it is interesting.

Facebook recently conducted a poll which showed up on the homepage newsfeed, and asked Facebook members just how exactly did they think Facebook’s “friend finder” worked when it prompted them for their email address & password in order to get a list of contacts. The numbers pretty much speak for themselves, here’s what they looked like near the end of the campaign:

Facebook Poll

Now ignore the dark blue bar: it’s a red herring and doesn’t contain any interesting info. The real juicy bit is the “Yes” option, and its 20% response.

Continue reading

Mapping Computer Techniques to the Real World

As a recent Times article describes, shopping plazas are now using cell-phone tracking technology to map shoppers’ activities and movement patterns. The "Path Intelligence" hardware used to track the movements works like this:

  • A cell-phone-wielding shopper enters the shopping plaza.
  • Path Intelligence monitors mounted throughout the plaza detect that a new mobile phone is in the vicinity and log its IMEI code.
  • As the shopper moves around the mall, his or her movements are continuously triangulated by the multiple Path Intelligence units, allowing movements to be mapped and saved for later analysis.

The good news: it’s totally private, there isn’t any (automated) way to map a particular record in the Path Intelligence logs to an actual person. The resulting logs can be analyzed for shopping patterns (where people go after visiting a certain store, peak hours of traffic, most popular regions, etc.) later on, providing valuable intelligence and allowing for improvements.

Continue reading