<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Superhuman is Spying on You	</title>
	<atom:link href="https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you/feed" rel="self" type="application/rss+xml" />
	<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you</link>
	<description>A running commentary of occasionally interesting things — from Mike Davidson.</description>
	<lastBuildDate>Sun, 29 Dec 2019 13:23:59 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>
		By: bliss		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-587088</link>

		<dc:creator><![CDATA[bliss]]></dc:creator>
		<pubDate>Sun, 29 Dec 2019 13:23:59 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-587088</guid>

					<description><![CDATA[Excellent analysis. By default my mail clients don’t load images. Especially for commercial messages I generally don’t care enough about the contents to view it with “proper” formatting and tracking before deleting them. Wonder if there is/will be a Mozilla Thunderbird extension that simply rejects/deletes emails from Superhuman senders.]]></description>
			<content:encoded><![CDATA[<p>Excellent analysis. By default my mail clients don’t load images. Especially for commercial messages I generally don’t care enough about the contents to view it with “proper” formatting and tracking before deleting them. Wonder if there is/will be a Mozilla Thunderbird extension that simply rejects/deletes emails from Superhuman senders.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Mike D.		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-582830</link>

		<dc:creator><![CDATA[Mike D.]]></dc:creator>
		<pubDate>Sat, 14 Dec 2019 22:26:31 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-582830</guid>

					<description><![CDATA[Tony: Good examples, and I agree with all of your points. At the same time, however, the technology here was created *expressly* to give people the power to pry without their recipients knowing. It wasn&#039;t a clean feature that was then exploited bad people. It was a dirty feature that, in fact, *turned* good people into privacy violators. That&#039;s what makes this example so clear in my mind.

We are a few months into this now and Superhuman is still violating people&#039;s privacy.]]></description>
			<content:encoded><![CDATA[<p>Tony: Good examples, and I agree with all of your points. At the same time, however, the technology here was created *expressly* to give people the power to pry without their recipients knowing. It wasn&#8217;t a clean feature that was then exploited bad people. It was a dirty feature that, in fact, *turned* good people into privacy violators. That&#8217;s what makes this example so clear in my mind.</p>
<p>We are a few months into this now and Superhuman is still violating people&#8217;s privacy.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Tony		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-581567</link>

		<dc:creator><![CDATA[Tony]]></dc:creator>
		<pubDate>Tue, 10 Dec 2019 20:13:27 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-581567</guid>

					<description><![CDATA[I find it interesting that John use the analogy &quot;Creepy people will track you no matter the tool you are using. Just because creepy people use cars to follow other people it doesn’t mean cars are violating our privacy. Same goes for email, messaging apps, social network, etc.&quot;

No matter what the medium, cars, cookies, tracking pixels, facebook data heuristics, or guns there will always be those that figure out how to exploit what was intended to be a positive feature in our lives.  Most of us trade convenience for privacy every day without expecting that convenience to be exploited by person or entity with nefarious intent.

Many commenters were quick to come to the defense of the practice.  As a point of reference of where our country has going, a crazy person who picks up a gun and kills someone... they family of the person killed can now sue the manufacturer. We never seem to blame the crazy person or perhaps it is purely an economic question of who has the most money.  I use that as an example since you use cars.  Consider if a drunk person gets behind the wheel of a car and kills someone.  Can the family of the person killed sue the car manufacturer?  I say, not yet.

Using the example Mike used in his article about the child predator, or stalker... if they succeed based on the use of the technology can the family sue the technology company that developed the tool used? Again, not yet.  Think back when the metadata from photos taken by mobile phone cameras and then posted to facebook was decoded by child predators to find out, within minutes, a child was playing.  An unattended child was snatched but later the predator was caught before he could harm the child.  Again, a seemingly beneficial feature being exploited by the &quot;creepy people&quot;. 

My point is that ethical behavior is part of the development of any feature, HW or SW.  Something starts out with the best of intentions and then is exploited.  It then becomes the responsibility of the feature creator or remove it, eliminate the exploit, or at least mitigate it.  Many of the commenters say &quot;it has always been like that&quot; or &quot;the number of exploits is so low given the number of positive transactions&quot;.  I don’t disagree.  However, when the ability to exploit the feature becomes all too common, something must be done.  Hopefully it doesn&#039;t take congress to make it happen as in situation with facebook algorithms.  Whether congress or public pressure precipitates the change, it is an ethical responsibility to change.

Anyway, just wanted to give a different view to consider for the millennials and long term tech users that the pendulum tends to swing from one side of convenience to the other of blame.  Both sides cut with razor precision.]]></description>
			<content:encoded><![CDATA[<p>I find it interesting that John use the analogy &#8220;Creepy people will track you no matter the tool you are using. Just because creepy people use cars to follow other people it doesn’t mean cars are violating our privacy. Same goes for email, messaging apps, social network, etc.&#8221;</p>
<p>No matter what the medium, cars, cookies, tracking pixels, facebook data heuristics, or guns there will always be those that figure out how to exploit what was intended to be a positive feature in our lives.  Most of us trade convenience for privacy every day without expecting that convenience to be exploited by person or entity with nefarious intent.</p>
<p>Many commenters were quick to come to the defense of the practice.  As a point of reference of where our country has going, a crazy person who picks up a gun and kills someone&#8230; they family of the person killed can now sue the manufacturer. We never seem to blame the crazy person or perhaps it is purely an economic question of who has the most money.  I use that as an example since you use cars.  Consider if a drunk person gets behind the wheel of a car and kills someone.  Can the family of the person killed sue the car manufacturer?  I say, not yet.</p>
<p>Using the example Mike used in his article about the child predator, or stalker&#8230; if they succeed based on the use of the technology can the family sue the technology company that developed the tool used? Again, not yet.  Think back when the metadata from photos taken by mobile phone cameras and then posted to facebook was decoded by child predators to find out, within minutes, a child was playing.  An unattended child was snatched but later the predator was caught before he could harm the child.  Again, a seemingly beneficial feature being exploited by the &#8220;creepy people&#8221;. </p>
<p>My point is that ethical behavior is part of the development of any feature, HW or SW.  Something starts out with the best of intentions and then is exploited.  It then becomes the responsibility of the feature creator or remove it, eliminate the exploit, or at least mitigate it.  Many of the commenters say &#8220;it has always been like that&#8221; or &#8220;the number of exploits is so low given the number of positive transactions&#8221;.  I don’t disagree.  However, when the ability to exploit the feature becomes all too common, something must be done.  Hopefully it doesn&#8217;t take congress to make it happen as in situation with facebook algorithms.  Whether congress or public pressure precipitates the change, it is an ethical responsibility to change.</p>
<p>Anyway, just wanted to give a different view to consider for the millennials and long term tech users that the pendulum tends to swing from one side of convenience to the other of blame.  Both sides cut with razor precision.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Wallflux Clearinghouse		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-548879</link>

		<dc:creator><![CDATA[Wallflux Clearinghouse]]></dc:creator>
		<pubDate>Mon, 26 Aug 2019 07:47:59 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-548879</guid>

					<description><![CDATA[Could somebody maybe send an example tracked mail to contact@wallflux.com? 
I can then adjust the Wallflux Clearinghouse Google app script to catch superhuman-tracked email to remove the tracking pixel.
Thanks!]]></description>
			<content:encoded><![CDATA[<p>Could somebody maybe send an example tracked mail to <a href="mailto:contact@wallflux.com">contact@wallflux.com</a>?<br />
I can then adjust the Wallflux Clearinghouse Google app script to catch superhuman-tracked email to remove the tracking pixel.<br />
Thanks!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Markus Diersbock		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-540862</link>

		<dc:creator><![CDATA[Markus Diersbock]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 20:35:14 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-540862</guid>

					<description><![CDATA[The article states that &quot;geolocation&quot; information is gathered from the recipient
This is FALSE
The location is that of the Internet Provider, NOT to the user
Not sure how an Ex or a Stalker could find that useful]]></description>
			<content:encoded><![CDATA[<p>The article states that &#8220;geolocation&#8221; information is gathered from the recipient<br />
This is FALSE<br />
The location is that of the Internet Provider, NOT to the user<br />
Not sure how an Ex or a Stalker could find that useful</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: LilBkrBabe		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-539907</link>

		<dc:creator><![CDATA[LilBkrBabe]]></dc:creator>
		<pubDate>Fri, 19 Jul 2019 21:14:23 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-539907</guid>

					<description><![CDATA[*graphics]]></description>
			<content:encoded><![CDATA[<p>*graphics</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: LilBkrBabe		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-539906</link>

		<dc:creator><![CDATA[LilBkrBabe]]></dc:creator>
		<pubDate>Fri, 19 Jul 2019 21:13:30 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-539906</guid>

					<description><![CDATA[You mentioned that Superhuman requires access to all email. Does that mean Superhuman personnel can read the content of the email, or just the code/grpahics needed to track send and receive activity? 

Thanks]]></description>
			<content:encoded><![CDATA[<p>You mentioned that Superhuman requires access to all email. Does that mean Superhuman personnel can read the content of the email, or just the code/grpahics needed to track send and receive activity? </p>
<p>Thanks</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Neil Schwartzman		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-539433</link>

		<dc:creator><![CDATA[Neil Schwartzman]]></dc:creator>
		<pubDate>Wed, 17 Jul 2019 13:20:56 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-539433</guid>

					<description><![CDATA[Mik,

As the long-time Executive Director of the Coalition Against Unsolicited Commercial Email, and a fellow privacy advocate, I SALUTE YOU. So very well constructed and said. Respect.]]></description>
			<content:encoded><![CDATA[<p>Mik,</p>
<p>As the long-time Executive Director of the Coalition Against Unsolicited Commercial Email, and a fellow privacy advocate, I SALUTE YOU. So very well constructed and said. Respect.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-538686</link>

		<dc:creator><![CDATA[David]]></dc:creator>
		<pubDate>Fri, 12 Jul 2019 19:48:19 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-538686</guid>

					<description><![CDATA[Mike, thank you for writing this. Great stuff! I got here from Mike Monteiro’s article over on Modus/Medium ‘It Might Be Time to Start Flipping Tables’ 
From your screengrabs with the shrugger-investors to the phrase ‘tongue-bath’ (which I might need to co-opt) to your excellently illustrated bad things people could do with this technology…it’s stuff like this that just makes me want to take a time machine back to when my biggest privacy concerns were if my downstairs neighbor could hear me playing my records too loudly or if my parents ever found my old weird art journals. Next stop…Overton windoww wide ajar.]]></description>
			<content:encoded><![CDATA[<p>Mike, thank you for writing this. Great stuff! I got here from Mike Monteiro’s article over on Modus/Medium ‘It Might Be Time to Start Flipping Tables’<br />
From your screengrabs with the shrugger-investors to the phrase ‘tongue-bath’ (which I might need to co-opt) to your excellently illustrated bad things people could do with this technology…it’s stuff like this that just makes me want to take a time machine back to when my biggest privacy concerns were if my downstairs neighbor could hear me playing my records too loudly or if my parents ever found my old weird art journals. Next stop…Overton windoww wide ajar.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Steve Walker		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-538608</link>

		<dc:creator><![CDATA[Steve Walker]]></dc:creator>
		<pubDate>Fri, 12 Jul 2019 08:16:36 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-538608</guid>

					<description><![CDATA[I have had automatic loading of images turned off for years now, but have to turn many on as they are emails that I need to see, but much of the information (often what they are about) is hidden in images. As for Superhuman, how about extensions for other browsers that simply note which emails have been sent by it and repeatedly open and close the email in the background, flooding senders with receipts? Maybe they&#039;d get the message.]]></description>
			<content:encoded><![CDATA[<p>I have had automatic loading of images turned off for years now, but have to turn many on as they are emails that I need to see, but much of the information (often what they are about) is hidden in images. As for Superhuman, how about extensions for other browsers that simply note which emails have been sent by it and repeatedly open and close the email in the background, flooding senders with receipts? Maybe they&#8217;d get the message.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Disappointed		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-538399</link>

		<dc:creator><![CDATA[Disappointed]]></dc:creator>
		<pubDate>Wed, 10 Jul 2019 20:04:13 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-538399</guid>

					<description><![CDATA[Everybody knows about viruses and malware.  Therefore it&#039;s no longer the fault of virus or malware maufacturers or distributors, nor should they be called out or villified for this behaviour.  &quot;Others do it, so what&#039;s the big deal.&quot;

It is instead 100% each individuals fault for not protecting themselves.  Victim blaming is the norm.

Such attacks on this article or defenses on Superhuman are just as disappointing as the above points.]]></description>
			<content:encoded><![CDATA[<p>Everybody knows about viruses and malware.  Therefore it&#8217;s no longer the fault of virus or malware maufacturers or distributors, nor should they be called out or villified for this behaviour.  &#8220;Others do it, so what&#8217;s the big deal.&#8221;</p>
<p>It is instead 100% each individuals fault for not protecting themselves.  Victim blaming is the norm.</p>
<p>Such attacks on this article or defenses on Superhuman are just as disappointing as the above points.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: mcw		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-538214</link>

		<dc:creator><![CDATA[mcw]]></dc:creator>
		<pubDate>Tue, 09 Jul 2019 17:34:58 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-538214</guid>

					<description><![CDATA[Great post. 

(Honestly, I think two out of the three use-cases for why tracking is bad are weak -- Pedo/Terrorist/Criminal arguments are too often used to decrease privacy, and thus have some structural issues. The &quot;do you trust this company to not betray you in the future?&quot; is a much stronger argument, because we all get betrayed by commercial entities all the time.)

I think it is very interesting that the (few) comments that defend SH all embody, to use Mike&#039;s phrase, the “lets exploit everything in the world that can act to our benefit” ethos.

And I think it&#039;s something of a cultural divide. There are those who see people as resources to be exploited, and there are those who see people as persons, worthy of respect and dignity.

As far as I can tell the forces of greed and exploitation are winning, and perhaps will ultimately win. That&#039;s why I applaud this article. You fight the good fight, even if -- perhaps especially if -- you can&#039;t win.]]></description>
			<content:encoded><![CDATA[<p>Great post. </p>
<p>(Honestly, I think two out of the three use-cases for why tracking is bad are weak &#8212; Pedo/Terrorist/Criminal arguments are too often used to decrease privacy, and thus have some structural issues. The &#8220;do you trust this company to not betray you in the future?&#8221; is a much stronger argument, because we all get betrayed by commercial entities all the time.)</p>
<p>I think it is very interesting that the (few) comments that defend SH all embody, to use Mike&#8217;s phrase, the “lets exploit everything in the world that can act to our benefit” ethos.</p>
<p>And I think it&#8217;s something of a cultural divide. There are those who see people as resources to be exploited, and there are those who see people as persons, worthy of respect and dignity.</p>
<p>As far as I can tell the forces of greed and exploitation are winning, and perhaps will ultimately win. That&#8217;s why I applaud this article. You fight the good fight, even if &#8212; perhaps especially if &#8212; you can&#8217;t win.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Mark		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-538172</link>

		<dc:creator><![CDATA[Mark]]></dc:creator>
		<pubDate>Tue, 09 Jul 2019 11:40:03 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-538172</guid>

					<description><![CDATA[Dear Mike, It is but surprising as well as worrying to read about the spying techniques superhuman uses to spy on us using our emails. Your vivid article on the same has helped in bringing to light the methodologies used to derive details in the name of “Read Receipt”. As a journalist, it is an eye-opener for many using email as their main source of communication even till today.]]></description>
			<content:encoded><![CDATA[<p>Dear Mike, It is but surprising as well as worrying to read about the spying techniques superhuman uses to spy on us using our emails. Your vivid article on the same has helped in bringing to light the methodologies used to derive details in the name of “Read Receipt”. As a journalist, it is an eye-opener for many using email as their main source of communication even till today.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David K		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-538002</link>

		<dc:creator><![CDATA[David K]]></dc:creator>
		<pubDate>Mon, 08 Jul 2019 13:59:43 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-538002</guid>

					<description><![CDATA[And yet, a HUGE portion of our GDP is now basically this. Facebook, Google, Amazon, all the telecoms and the ISP&#039;s: everyone is collecting everything they can, and selling access to slices of it to anyone with a checkbook. (And that&#039;s not to mention the three-letter agencies!) The revealed creepiness, in this particular case, is that END USERS can access this kind of tracking. You should point out that employees at all of these other companies, including hundreds and hundreds of 3rd-party &quot;ad-tech&quot; parasites, also have access to this sort of data as well, and let everyone be appropriately grossed out.]]></description>
			<content:encoded><![CDATA[<p>And yet, a HUGE portion of our GDP is now basically this. Facebook, Google, Amazon, all the telecoms and the ISP&#8217;s: everyone is collecting everything they can, and selling access to slices of it to anyone with a checkbook. (And that&#8217;s not to mention the three-letter agencies!) The revealed creepiness, in this particular case, is that END USERS can access this kind of tracking. You should point out that employees at all of these other companies, including hundreds and hundreds of 3rd-party &#8220;ad-tech&#8221; parasites, also have access to this sort of data as well, and let everyone be appropriately grossed out.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Sander van Dragt		</title>
		<link>https://mikeindustries.com/blog/archive/2019/07/superhuman-is-spying-on-you#comment-537957</link>

		<dc:creator><![CDATA[Sander van Dragt]]></dc:creator>
		<pubDate>Mon, 08 Jul 2019 06:44:30 +0000</pubDate>
		<guid isPermaLink="false">https://mikeindustries.com/blog/?p=29080#comment-537957</guid>

					<description><![CDATA[Here’s a thought experiment: Would people disagreeing with this post be happy sending the author a list of times and locations where they opened this post? 

By the way even Google Analytics doesn’t let you filter this kind of information down to the individual visitor.]]></description>
			<content:encoded><![CDATA[<p>Here’s a thought experiment: Would people disagreeing with this post be happy sending the author a list of times and locations where they opened this post? </p>
<p>By the way even Google Analytics doesn’t let you filter this kind of information down to the individual visitor.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
