Benjamin, great read! I loved the history and mental model. Thanks for writing about the security space! We desperately need more and better design perspective.
It occurs to me that a version of detector.io for consumers exists but it resides in the hands of the third parties that we entrust our data and storage hardware to. Google or Apple, for example, will inform me if they have detected "unusual" sign-on activity in my account or device. I find this to be a nice utility but again, the paradigm remains that the right to view access is maintained by third parties.
Great post to stimulate thinking around privacy choices.
Benjamin, great read! I loved the history and mental model. Thanks for writing about the security space! We desperately need more and better design perspective.
It occurs to me that a version of detector.io for consumers exists but it resides in the hands of the third parties that we entrust our data and storage hardware to. Google or Apple, for example, will inform me if they have detected "unusual" sign-on activity in my account or device. I find this to be a nice utility but again, the paradigm remains that the right to view access is maintained by third parties.
Great post to stimulate thinking around privacy choices.