She announced the launch on her personal blog earlier today.
Enter the Internet of things, where you can choose to follow people, places or things. The notes you leave can be private, or you can share them with everything and everybody.
The possibilities seem endless.
For instance, Fake shared a note she wrote for her friend Lauren:
Perhaps this would be a more useful note when you’re roaming around town: “Find me a Nearby Toilet NOW.”
That seems to be coming soon: Fake wrote on her blog that she plans on building out a notification system so you can get pinged when someone you follow sends out a note.
As far as making money, Fake is betting on selling sponsored notes.
- How To Marry Your Cofounder And Not Kill Your $200 Million Startup In The Process
- Inside OkCupid Labs: The Modern Matchmakers Of Silicon Valley
- Why Gay Guys Love Using Grindr To Hook Up And Make Friends
The banking industry often employs two-step security measures—similar to Google Authenticator—as an added layer of protection against password theft and fraud. Unfortunately, those systems have just been rendered moot by a highly-advanced hack.
The attack, know as the Man in the Browser method, works like this. Malicious code is first introduced onto the victim’s computer where it resides in the web browser. It will lay dormant until the victim visits a specific website—in this case, his bank’s secure website. Once the user attempts to log in, the malware activates and runs between the victim and the actual website. Often the malware will request that the victim enter his password or other security pass into an unauthorized field, in order to “train a new security system.” Once that happens, the attacker has full access to the account.
Luckily, the method is only a single-shot attack. That is, the attacker is only able to infiltrate the site once with the user-supplied pass code. But, once in, the attacker can hide records of money transfers, spoof balances and change payment details. “The man in the browser attack is a very focused, very specific, advanced threat, specifically focused against banking,” Daniel Brett, of malware testing lab S21sec, told the BBC.
Since this attack has shown that the two-factor system is no longer a viable defense, the banking industry may have to adopt more advanced fraud-detection methods similar to what secure credit cards. When compared to having your account silently drained, standing in line for the teller suddenly doesn’t seem like that much of a hassle. [BBC News via Technology Review]
Image: jamdesign / Shutterstock
Three years ago, Ars Technica discovered that when you “deleted” your photos, they were still kept on Facebook’s servers, and anyone with a static URL could still access it. Three years later, Ars Technica revisited the matter and found little has changed. But Facebook says that things will be different…eventually.
Ars Technica’s Jacqui Cheng got Facebook to comment on the matter, they’re developing a new one which will permanently wipe photo off their servers within 45 days of a user “deleting” the photo from the site.
“The systems we used for photo storage a few years ago did not always delete images from content delivery networks in a reasonable period of time even though they were immediately removed from the site,” Facebook spokesperson Frederic Wolens told Ars via e-mail.
Wolens explained that photos remaining online are stuck in a legacy system that was apparently never operating properly, but said the company is working on a new system that will delete the photos in a mere month and a half. For really real this time.
So if there’s some incriminating piece of imagery on Facebook you’re really dying to have removed once and for all, maybe all hope isn’t lost entirely. [Ars Technica]
Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.
Collaborators – Digital Profs
- Marketing Costs Normalized to CPM Basis for Comparison
- Netflix vs Blockbuster - Perfect example of an industry replaced by a more efficient version of itself
- Coke vs Pepsi vs Dr Pepper
- Global Windows Phone Market Share By Manufacturer
- Taylor Swift Wrote An Op-Ed In The Wall Street Journal, And It's Filled With Fascinating Insights
- Samsung 52 inch HDTV $9.99 at BestBuy - purchase receipt below (6:21a eastern time August 12, 2009)
- What Good Guy Bot vs Bad Guy Bots Look Like
- HP Mini 311 Nvidia ION Netbook Hackintosh'ed
- 4 Reasons Why Crumbs Bake Shop Massively Failed
- Brand Advertisers: Escaping an Ecosystem of Digital Advertising Fraud
- #SESNY: Toward a Performance Mindset for All Advertising
- Tips for Marketers Selecting a Digital Agency
- Context Is Not King or Queen; It's Just Necessary
- 2013 New Year's Digital Marketing Resolutions
- The Good, Bad, and Ugly of Online Campaign Ratings and eGRPs
- Why You Should Banish the Net Promoter Score Immediately
- Digital Strategy To-MAY-to vs. To-MAH-to
- The Agency-Client Relationship is Forever Changed
- Targeting vs. Privacy - Who Will Win?
- July 2014 (92)
- June 2014 (118)
- May 2014 (173)
- April 2014 (130)
- March 2014 (247)
- February 2014 (167)
- January 2014 (222)
- December 2013 (167)
- November 2013 (111)
- October 2013 (116)
- September 2013 (214)
- August 2013 (210)
- July 2013 (200)
- June 2013 (87)
- May 2013 (87)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (94)
- August 2012 (93)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (23)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (13)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)