Similarly,
diovan free delivery if treatment begins after a fracture or a doctor detects
buy for no prescription sample the disease only after a person has lost significant bone,
buy cheap amoxicillin online the outlook is less favorable. A person can discuss with
cheapest in uk a doctor which medication or combination of medications is right
cialis online cheap for them. Doctors may scan areas such as the hip
low cost celexa or spine, as these areas are most susceptible to osteoporotic
buy cheap colchicine changes. BD is a process in which the bones lose
cheap generic cialis minerals that are essential for their strength and resilience. Alterations
cheap viagra in usa in this gene may relate to lower bone mineral density
buy medication and an increased risk of fractures. Low estrogen levels in
buy for low price biological females and low testosterone levels in biological males can
diclofenac no prescription contribute to bone loss and increase the risk of osteoporosis.
buy generic triamterene Additionally, long-term use of certain medications, such as corticosteroids, can
buy arcoxia internet weaken bones and contribute to bone loss. Treatment will vary
buying generic cialis as a healthcare professional will tailor plans depending on individual circumstances..
Now here is an interesting Twitter feed: A running report on every book being checked out of all of Harvard’s libraries. Feels voyeuristic to me, but you have to stretch your imagination to figure out how this would be an invasion of privacy. If the tweets are close to real time, maybe somebody could watch who comes out of Widener library right after “Anglo-Saxon Wills” was checked out, and maybe identify the person who is trying to challenge a millennium-old bequest. (That is a real example — at least the name of the book part.) Still, even without being able to figure out who is reading this stuff, knowing that SOMEBODY is RIGHT NOW finding a need to read that classic tome, “Documents diplomatiques. Deuxième Conférence internationale pour la répression de la traite des blanches (18 avril-4 mai 1910),” — well, I just can’t help thinking it is none of my business. The book is about the white slave trade. Am I just a prude?
Re-identification is a very sophisticated art these days. Maybe someone can figure out how to make mischief by correlating these data with some other source. I can’t think of a way off the top of my head. What think you?
This entry was posted
on Monday, August 30th, 2010 at 9:36 pm and is filed under Privacy.
You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.
August 30th, 2010 at 11:29 pm
I can see this sort of feed as a minor input to privacy violation attempts, but given the fact that the library system’s various platforms (a quick google tells me that HOLLIS is still in use: is it still green-screens?) have access to all checkout info, maybe a determined attacker would just break the system security rather than correlating? Perhaps there are a few opportunities for social engineering at one of Harvard’s many libraries, once an attacker knows that a book that truly offends him/her has been borrowed? If the book is at all uncommon, perhaps this could be related to the “recall” functionality. It doesn’t seem it would be out of reach for anyone on library staff to get this info with no work at all. I doubt correlation is the weakest link here.
September 6th, 2010 at 12:12 pm
Here is your reidentification opportunity: use Google Latitude (http://www.google.com/latitude) or Facebook Places to get real-time updates of your friends’ locations. Whenever you see a friend wander into Widener, correlate the time they leave with the timestamp in the feed. You could only reidentify your friends’ book-browsing habits, but given that Facebook Places is opt-out, then you can find the locations of many people who wouldn’t expect you to know it.
September 6th, 2010 at 2:01 pm
Nice!
December 9th, 2010 at 1:00 pm
amazing and beautiful… thank you..