Business Insider Intelligence is a new research and analysis service for real-time insight and intelligence about the Internet industry. The product is currently in beta. For more information, and to sign up for a free 30-day trial, click here.
Data is starting to trickle in and shape our understanding of the nascent mobile ad market. According to data from Flurry Analytics, 25- to 34-year-old females are the most valuable demographic for advertisers and publishers (as measured by the underlying click-through and conversion rates).
This is not surprising: Young people have adopted smartphones at a much higher rate than their parents. However, mobile CPMs will eventually even out as penetration picks up amongst older age groups. Furthermore, women should be more valuable because they historically have controlled household expenses and there is some evidence that they use smartphones more than men while shopping.
Finally, the eCPMs strike us as pretty high—even as smartphone usage has exploded, demand seems to have held up.
Feedback? Questions? Send us an email
- Smartphone Sales Will Reach Nearly 1.6 Billion Units By 2016
- Here’s What Retail Customers Are Actually Doing With Their Smartphones
- Online Video Advertising Takes Off
Last week, The Daily reported that Kanye West‘s charity spent more than a half-million dollars in 2010—but none of that money went to actual charitable causes.
After analyzing federal tax filings, the iPad newspaper found that in 2010, the Kanye West Foundation had expenditures totaling $572,383, but the majority of that went to employee salaries and other overhead expenses.
The charity didn’t even donate a single cent to an actual charity that year. And now, West’s foundation is in the process of being dissolved.
Since it’s easy to get bogged down in the numbers, Statista took The Daily’s findings and compiled information from the foundation’s tax filings to create the below infographic explaining where Kanye West’s money went and what happened to his so-called charity foundation. Complete with West’s stunner shades, obviously.
Take a look below.
- ‘Dancing With The Stars’ Season 14 Cast Revealed—Here’s Today’s Buzz
- Steve Martin Mocks Gwyneth Paltrow On Twitter
- UPDATE: Charlie Sheen’s New TV Show Gets A Premiere Date
Just one question.
Who reads privacy policies?
You probably don’t. Just like you don’t read the terms and conditions when you download and install software, or sign up for an online email account, or rip the tag off a new mattress.
The 1% of you who do read privacy policies are probably the exact same 1% who are losing sleep because information from your iPhone address book was secretly being uploaded to the servers of Path and some other app makers.
So the Attorney General and the six companies win for looking aware and concerned about online privacy, and the privacy zealots get to rest a little easier before going off on their next crusade. (Probably against Google.)
Plus, apps makers now all have to hire lawyers to write up these privacy policies and interns to put the policies online and build links to them in their apps. Which increases employment!
Wins all around. Well done.
- Your iPad (Still) Comes From The Hands Of Teenagers Living A Factory Life
- Microsoft Ups Its Legal War Against Google With A New Attack
- The Truth About That Microsoft Office On The iPad Story
Trolls. They fill the internet with insults, dead-end arguments, and inanity the likes of which we’ve never seen. Or maybe we have. The Guardian’s David Mitchell notes that trolling comments aren’t all that different from graffiti, and should likewise carry no more weight.
More specifically, Mitchell is talking less about trolls as you and I know them and more about anonymous, often inaccurate online reviews. It’s not a bulletproof analogy by any means, but Mitchell’s idea does reframe the way you look at anonymous content in a compelling way:
When you read a bit of graffiti that says something like “Blair is a liar”, you don’t take it as fact. You may, independently, have concluded that it is fact. But you don’t think that the graffiti has provided that information. It is merely evidence that someone, when in possession of a spray can, wished to assert their belief in the millionaire former premier’s mendacity. It is unsubstantiated, anonymous opinion. We understand that instinctively. We need to start routinely applying those instincts to the web.
If you read a review, an opinion, a description or a fact and you don’t know who wrote it then it’s no more reliable than if it were sprayed on a railway bridge. We should always assume the worst so that all those who wish to convince… have an incentive to identify themselves.
The flip side of the coin, of course, is that anonymity is vital to the spread of information on the internet. The important tool to remember, as always, is your skepticism. Without it, you’re letting yourself get all worked up over graffiti. (And we’re not talking Banksy here—or even Hanksy.) Photo remixed from The Awl.
The internet is starting to realize something unsettling: our iPhones send information about the people we know to private servers, often without our permission. Some offending apps are fixing themselves. Some aren’t. But the underlying problem is much bigger.
Apple allows any app to access your address book at any time—it’s built into the iPhone’s core software. The idea is to make using these apps more seamless and magical, in that you won’t have dialog boxes popping up in your face all the time, the way Apple zealously guards your location permissions at an OS level—because fewer clicks mean a more graceful experience, right? Maybe, but the consequence is privacy shivved and consent nullified. Your phone makes decisions about what’s okay to share with a company, whose motivation is, ultimately, making money, without consulting you first.
Once you peel back that pretty skin of your phone and observe the software at work—we used a proxy application called Charles—watching the data that jumps between your phone and a remote server is plain. A little too plain. What can we see?
As Paul Haddad, the developer behind the popular Twitter client TapBot pointed out to me, some of App Store’s shiniest celebrities are among those that beam away your contact list in order to make hooking up with other friends who use the app smoother. From Haddad’s own findings:
Foursquare (Email, Phone Numbers no warning)
Path (Pretty much everything after warning)
Instagram (Email, Phone Numbers, First, Last warning)
Facebook (Email, Phone Numbers, First, Last warning)
Twitter for iOS (Email, Phone Numbers, warning)
Voxer (Email, First, Last, Phone numbers, warning)
Foursquare and Instagram have both recently updated to provide a much clearer warning of what you’re about to share. Which every single app should follow, providing clear warnings before they touch your contacts. But plenty of apps aren’t so generous. “A lot of other popular social networking apps send some data,” says Haddad, “mostly names, emails, phone numbers.” Instapaper, for example, transmits your address book’s email listings when you ask it to “search contacts” to connect with other friends using the app. The app never makes it clear that my data (shown up top) is leaving the phone—and once it’s out of your hands and in Instagram’s, all you can do is trust that it’ll be handled responsibly. You know, like not be stored permanently without your knowledge.
Trust is all we’ve got, and that’s not good. “Once the data is out of your device there’s no way to tell what happens to it,” explains Haddad. Companies might do the decent thing and delete your data immediately. Like Foursquare, which says it doesn’t store your data at all after matching your friends, and never has. Twitter keeps your address book data for 18 months “to make it easy for you and your contacts to discover each other on Twitter after you’ve signed up,” but can delete the data at any time with a link at the bottom of this page. Or a company might do the Path thing, storing that information indefinitely until they’re publicly shamed into doing otherwise. Or worse.
We need a solution, and goodwill on the part of app devs is going to cut it. All the ARE YOU SURE YOU WANT TO DO THIS? dialog boxes in the world won’t absolve Apple’s decision to hand out our address books on a pearly platter. iOS is the biggest threat to iOS—and nothing short of a major revision to the way Apple allows apps to run through your contacts should be acceptable. But is that even enough? Maybe not.
Jay Freeman, developer behind the massively popular jailbroken-iPhone program Cydia, doesn’t think Apple’s hand is enough to definitively state who gets your address book, and when:
“Neither Apple nor the application developer is in a good position to decide that ahead of time, and due to this neither Apple’s model of ‘any app can access the address book, no app can access your recent calls’, nor Google’s method of ‘developer claims they need X, take it or leave it’ is sufficient.”
Freeman’s solution? Cydia’s “one-off modifications to the underlying operating system” that we deal in, nicely transfers this control back to the user.” In other words, we can’t trust Apple or the people that make apps—so let’s just trust ourselves to control how iOS works.
Freeman left us with one, final, disquieting note. Shrewd devs and others with the knowhow have been able to dig through app traffic to find out of they’re shoveling around your address book. But there’s no easy way to do this—and if a dev really wants to sneak your data through the door, there’s technically nothing we can do to stop him: “There are tons of complex tricks that can be used to smuggle both information in network traffic and computation itself.” It’s a problem fundamental to computer science—once the data’s in a dev’s hands, he can conjure it away, too small to be noticed by App Store oversight in churning sea of other apps.
Unless Apple keeps him from getting that information in the first place by letting us all make informed decisions with our phone and the private life poured into it. Your move, iOS.
If Kenneth G. Lieberthal were anything but a China expert at the Brookings institution, his travelling-in-China security procedures would read like the product of a paranoid mind that watched too many spy movies as a kid:
He leaves his cellphone and laptop at home and instead brings “loaner” devices, which he erases before he leaves the United States and wipes clean the minute he returns. In China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, “the Chinese are very good at installing key-logging software on your laptop.”
Talk about overkill, right? Well he’s not alone. The Times reports that these seemingly paranoid precautions are par for the course for just about anyone with valuable information including government officials, researchers, and even normal businessmen who do business in China.
But what about the rest of us? I may not have any valuable state secrets or research that needs protecting but that doesn’t mean I want the Chinese government snooping on my internetting when I visit my grandparents (especially when the consequences can be so severe). In the past, I’ve relied on a combination of VPNs, TOR, and password-protecting everything I can, but now it sounds like even that isn’t enough. Or maybe it’s totally overkill given my general unimportance in the grand scheme of things. Dear readers, I ask you, how much security is enough when it comes to the average person on vacation? [NY Times]
The security PIN system that Google Wallet users have to enter to verify transactions has been compromised. Thankfully, the chances of your wallet being used against you is relatively low—assuming you haven’t rooted your phone, that is.
Since Wallet saves your PIN in an encrypted file on the phone itself, rather than the secured NFC chip, if your phone falls into the wrong hands, that person could lift your PIN file from the phone and simply crack it using brute force. From there, he’d have access to—and use of—your Wallet account.
Security firm, Zvelo, discovered and reported the issue to Google, but because Wallet’s security architecture, the change will require a fundamental rejiggering of the security protocols. Man, talk about an oversight. According to Zvelo,
The lynch-pin, however, was that within the PIN information section was a long integer “salt” and a SHA256 hex encoded string “hash”. Knowing that the PIN can only be a 4-digit numeric value, it dawned on us that a brute-force attack would only require calculating, at most, 10,000 SHA256 hashes…This completely negates all of the security of this mobile phone payment system.
So, if you are rooted, be sure to take some additional security steps to protect yourself like activating the lock screen, disabling the USB debugging option in settings, and enabling full-disk encryption. Or maybe not losing your phone in the first place. [Zvelo via Android Central via The Verge]
Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.
Collaborators – Digital Profs
- Netflix vs Blockbuster - Perfect example of an industry replaced by a more efficient version of itself
- The Grand Unified Theory of Marketing(tm) - Digital String Theory
- Marketing Costs Normalized to CPM Basis for Comparison
- The JKWeddingDance video was real; the viral effect was MANUFACTURED - Post 1 of 2
- Coke vs Pepsi vs Dr Pepper
- drag2share: Android's Mobile Devices Control 60% Of The Global Computing Platform Market
- HP Mini 311 Nvidia ION Netbook Hackintosh'ed
- Samsung 52 inch HDTV $9.99 at BestBuy - purchase receipt below (6:21a eastern time August 12, 2009)
- Apple vs Microsoft vs Sony [Graphs]
- Brand Advertisers: Escaping an Ecosystem of Digital Advertising Fraud
- #SESNY: Toward a Performance Mindset for All Advertising
- Tips for Marketers Selecting a Digital Agency
- Context Is Not King or Queen; It's Just Necessary
- 2013 New Year's Digital Marketing Resolutions
- The Good, Bad, and Ugly of Online Campaign Ratings and eGRPs
- Why You Should Banish the Net Promoter Score Immediately
- Digital Strategy To-MAY-to vs. To-MAH-to
- The Agency-Client Relationship is Forever Changed
- Targeting vs. Privacy - Who Will Win?
- December 2014 (57)
- November 2014 (98)
- October 2014 (150)
- September 2014 (109)
- August 2014 (44)
- July 2014 (92)
- June 2014 (118)
- May 2014 (173)
- April 2014 (130)
- March 2014 (247)
- February 2014 (167)
- January 2014 (222)
- December 2013 (167)
- November 2013 (111)
- October 2013 (116)
- September 2013 (214)
- August 2013 (210)
- July 2013 (200)
- June 2013 (87)
- May 2013 (87)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (94)
- August 2012 (93)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (23)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (13)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)