The celebrity nudes hacking scandal serves as a good reminder that a” just say no” strategy won’t be effective for puffy pussy photo sexting anytime soon.
This concern isn’t a tale about ”right” or ”wrong” ways of thinking about protection– it’s a wake-up contact about safety and gender.
But, this could have been a tale about any apps or any of the numerous private vulnerabilities that have occurred in recent years.
This topic isn’t a account about ”right” or ”wrong” ways of thinking about protection– it’s a wake-up phone about stability and masculinity. … The level of exclusive files fraud that is currently occurring is bonkers.
The level of secret info robbery that is currently occurring is crazy.
Prior to the virtual trend, our secret places were our rooms and bathrooms, our homes, gender clubs, our calls, and our internal illusion worlds.
Today, our personal areas for grownup playing include scriptures, messages and clear information to trusted friends or family members, and particularly pictures. However, that merely holds true if we have complete respect in the recipient of our gifts.
The issue we currently have is that not everyone understands or agrees what constitutes an website personal storage. Exclusive room then includes all the locations that our personalized info stays. Online, private areas include our chat rooms, IRC, social media profiles, not-public messaging systems ( Twitter DMs, Facebook chat ), dating websites, message boards, and other common areas.
Not only famous people who have experienced a hazard after raunchy pictures of them are released. In one illustration, a Christian professor lost her job in 2013 after skinny images of her were stolen off her telephone, and linked with her label.
Find out how your login surveillance is become compromised, and how to create and manage safeguarded credentials.
Even though her male co-workers had posed for racy firemen calendars, a female firefighter in Manchester ( UK) lost her job the same year for posing in lingerie for a shutterbug friend.
This is also true for both men and people of all genders, but not as much as it is for females. It happens to us a ton, because our sex makes us a objective. Being ”online while sexual” is unjust, but it is true.

Folks commit terrible deeds. Websites and apps get deliberately hacked. Minions steal our wallets and retain our identification accounts. Although it has a much lower chance of widespread, problematic, or harsh targeting than it does for females, what might occur to gentlemen is terrible.
The terrible fact is that women have more motives to be concerned about website privateness than gentlemen do, because females are at greater danger for real crime, and females are explicitly targeted more generally.
This incident has given weirdos and those who like to pity people for expressing and exploring our gender on our own conditions a natural light. They’re correct in saying that we don’t consider nude images if we don’t ”want” this to arise, as if taking a picture of ourselves shirtless is some distorted way of asking for punishment, of lessons.
In the celebrity nudes aftermath this week I’ve seen tweets– even from security professionals– saying things like,” she shouldn’t have spread her legs for an iPhone”.
What lies. As if we were able to lose our jobs, our friends, our children’s safety, our emotional well-being, or our mental health because we voluntarily posted them on Twitter each week ( or what a million creepy dudes do every day with their own ”dick pics” on Tinder ). That’s stupid and just plain wrong.
It’s not a joke when someone uploads our private photos to Instagram and posts them there.
It is unlawful. It drives some women– especially young women– to suicide.
It is harassment to claim that we were at fault for violating our consent.
By making public intimate photos of a woman’s body, it harms her professional ( or school ) life, makes her vulnerable to sexual abuse, harms her reputation, and sends the message that those who are targeted are inferior, sexual objects.
These acts communicate to the world that it’s okay to devalue us, and Colombian naked women invites others to participate in harassing, humiliating and hurting us.
If you have’ nothing to hide’, here’s where to send your passwords
How two remote Arctic regions rose to prominence in the fight for internet privacy.
Why should big data evangelists be reprogrammed
This whole thing is a wake up call for each and every one of us who have trusted our most intimate aspects of privacy into the hands of companies like Apple, Google and Yahoo– companies that take our consent away with their Terms when we sign up.
Why can’t we collectively acknowledge this and demand better security from businesses like Apple? Humans are going to do things like take compromising photos no matter how much they’re shamed not to do it.

Does Steve Jobs ’ stance on porn mean they’ll care any less about taking steps to specifically protect intimate photos taken from women who aren’t famous given that they know he hated it so much that he permanently banned anything erotic from Apple’s app store?
Or will Apple just quietly fix another security problem, and pretend like a lot of women weren’t just completely violated because Apple might’ve made security an afterthought on a couple of their products?

The real solution is to admit that people will do this, and provide them with information about safer ways to do it so that they can mitigate any harm if they are hacked ( and their consent is revoked ). This is something conservative sex hysterics can’t face.
1. A popular app or megacorporation is not always secure. Anyone can save their ”disappearing” photos on Snapchat. Don’t trust your sensitive pics to any apps, most are made poorly and leak your privacy like there’s no tomorrow. Even apps from the most reputable app stores or the biggest corporations should be viewed as suspect.
2. Put your phone on lockdown. Turn on the password lock on your tablet, phone, and laptop. Never log in to a device other than a phone, computer, or tablet; if they have been compromised, your login information may be gathered.
3. Remove it for good. Don’t just toss your used phone, tablet, or computer in the trash. You’ll look in the Settings menu for terms such as ”erase all content and settings\
You should also be able to consider whether that encounter, whether it’s sharing personal photos, talking filthy on the phone or in tone chat, sexting, engaging in any kind of virtual sex, or simply divulging information on a physical subject, is shared with anyone.
It is meaningless to tell survivors they” doesn’t include done it” or ”what did you expect.” How about some facts people may definitely apply to help them make the decisions that are appropriate for them and provide them with tools to lessen, reduce, and yet probably prevent harm if something goes wrong instead of blaming and shaming?
No matter how happy we are of our bodies, how sex-positive we are, or how pleasant we are with being beautiful and sturdy at the same time, photos and videos that are only meant for the eyes of the person we trust in the hands of someone who doesn’t care about us or our safety, or worse- someone who gets off on hurting women, are devastating.
Realize that having someone worthwhile protecting signifies keeping your secret data and career personal.
Information and disclosures: The majority of these advice is contained in my guide, The Smart Girl’s Guide to Privacy, as well as additional advice and resources for surviving severe privateness breaches like those that are covered in this article. Additionally, I serve as an assistant for the non-profit Without My Acquiesce, which assists people who have been sufferers of revenge porn find help and legal options for retribution.
No listing found.
Compare listings
Compare