Benjamin, great read! I loved the history and mental model. Thanks for writing about the security space! We desperately need more and better design perspective.
It occurs to me that a version of detector.io for consumers exists but it resides in the hands of the third parties that we entrust our data and storage hardware to. Google or Apple, for example, will inform me if they have detected "unusual" sign-on activity in my account or device. I find this to be a nice utility but again, the paradigm remains that the right to view access is maintained by third parties.
Great post to stimulate thinking around privacy choices.
This is a really good point and one that I hadn't thought of - detectors do exist in the form of "unusual sign-in activity" alerts. Although of course as you say, Google would never send one about its own activities! The detector tends not to point in that direction...
Benjamin, great read! I loved the history and mental model. Thanks for writing about the security space! We desperately need more and better design perspective.
Really glad you enjoyed it!
It occurs to me that a version of detector.io for consumers exists but it resides in the hands of the third parties that we entrust our data and storage hardware to. Google or Apple, for example, will inform me if they have detected "unusual" sign-on activity in my account or device. I find this to be a nice utility but again, the paradigm remains that the right to view access is maintained by third parties.
Great post to stimulate thinking around privacy choices.
This is a really good point and one that I hadn't thought of - detectors do exist in the form of "unusual sign-in activity" alerts. Although of course as you say, Google would never send one about its own activities! The detector tends not to point in that direction...