{"id":19121,"date":"2014-09-18T11:52:17","date_gmt":"2014-09-18T15:52:17","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=19121"},"modified":"2014-09-18T11:52:17","modified_gmt":"2014-09-18T15:52:17","slug":"when-a-gift-is-really-a-data-breach","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2014\/09\/18\/when-a-gift-is-really-a-data-breach\/","title":{"rendered":"When a Gift is Really a Data Breach"},"content":{"rendered":"<p>Can a gift be a data breach? Lots of Apple product users think so, as evidenced by the <a href=\"http:\/\/www.theguardian.com\/technology\/2014\/sep\/15\/apple-u2-album-itunes-delete?view=desktop\">strong reaction<\/a> against the company for their unsolicited syncing of U2\u2019s latest album <em>songs of innocence <\/em>to 500 million iCloud accounts. Although part of the negative reaction stems from differences of musical taste, <em>what <\/em>Apple shared with customers seems less important than the fact that they put content on user accounts at all.<\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-apple-event.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-19126\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-apple-event-400x266.jpg\" alt=\"u2-apple-event\" width=\"400\" height=\"266\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-apple-event-400x266.jpg 400w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-apple-event-250x166.jpg 250w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-apple-event-500x333.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-apple-event.jpg 770w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a>With a proverbial expectant smile, Apple gifted the album\u2019s 11 songs to unsuspecting users. A promotional move, this was timed with the launch of the iPhone6 and Apple iWatch. And much like teenagers who find that their parents spent the day reorganizing their bedrooms, some customers found the move invasive rather than generous.<\/p>\n<p><a href=\"https:\/\/twitter.com\/dynamicsymmetry\">Sarah Wanenchack <\/a> has done some <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2014\/03\/07\/keurig-your-new-coffee-overlord\/\">great work<\/a> on this blog with regards to device ownership\u2014or more precisely, our increasing lack of ownership over the devices that we buy. That Apple can, without user permission, add content to our devices, highlights this lack of ownership. Music is personal. Devices are personal. And they should be. We bought them with our own money. And yet, these devices remain accessible to the company from which they came; they remain alterable; they remain\u2014despite a monetary transaction that generally implies buyer ownership\u2014nonetheless shared. And this, for some people, is offensive. \u00a0<!--more--><\/p>\n<p>It is also a breach of privacy. Users produce data, but they also consume data. I\u2019m sure for most people, and certainly for the decision makers at Apple, giving people music seems far less insidious than selling people\u2019s information. But Just as opt-out models of user-data sharing, mining, and sales expose customers\u2019 productive labor and personal information to unexpected parties in unexpected ways, opt-out models of data-gifting infiltrate customers\u2019 private consumptive spaces.<\/p>\n<p>Admittedly, the exposure in this case is mainly just inconvenient. At worst, those who aren\u2019t fans of U2\u2019s music made an appalled face as they found their playlist infiltrated by\u00a0an unappealing sound.<\/p>\n<p>But if we push this, and think about what Apple did with this gift, the act itself becomes worrisome, if not surprising. If they can put <em>this <\/em>content into one\u2019s collection, they can put other content in too. Putting content in means entering, uninvited, into a presumably private realm. The space, in short, was never yours.<\/p>\n<p>I leave you now with 2 gifts of my own:<\/p>\n<p>1.) Link to remove U2 album (if you are so inclined): <a href=\"https:\/\/buy.itunes.apple.com\/WebObjects\/MZFinance.woa\/wa\/offerOptOut\">https:\/\/buy.itunes.apple.com\/WebObjects\/MZFinance.woa\/wa\/offerOptOut<\/a><\/p>\n<p>2.) Some of my favorite public Twitter responses<\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19122\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-400x273.png\" alt=\"u2\" width=\"400\" height=\"273\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-400x273.png 400w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-250x170.png 250w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2-500x341.png 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u2.png 975w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u21.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19123\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u21-400x143.png\" alt=\"u21\" width=\"400\" height=\"143\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u21-400x143.png 400w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u21-250x89.png 250w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u21-500x179.png 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u21.png 975w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u22.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19124\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u22-400x269.png\" alt=\"u22\" width=\"400\" height=\"269\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u22-400x269.png 400w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u22-250x168.png 250w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u22-500x336.png 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/09\/u22.png 975w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>Follow Jenny Davis on Twitter <a href=\"https:\/\/twitter.com\/Jenny_L_Davis\">@Jenny_L_Davis<\/a><\/p>\n<p>Headline pic: <a href=\"http:\/\/www.vogue.it\/en\/people-are-talking-about\/vogue-arts\/2014\/09\/u2-songs-of-innocence\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can a gift be a data breach? Lots of Apple product users think so, as evidenced by the strong reaction against the company for their unsolicited syncing of U2\u2019s latest album songs of innocence to 500 million iCloud accounts. Although part of the negative reaction stems from differences of musical taste, what Apple shared with [&hellip;]<\/p>\n","protected":false},"author":1753,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967,892],"tags":[3914,3211,424,26671],"class_list":["post-19121","post","type-post","status-publish","format-standard","hentry","category-commentary","category-essay","tag-apple","tag-ownership","tag-privacy","tag-u2"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/19121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1753"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=19121"}],"version-history":[{"count":6,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/19121\/revisions"}],"predecessor-version":[{"id":19131,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/19121\/revisions\/19131"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=19121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=19121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=19121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}