What to Eat

 

Like everything else in our culture, food has gender associations. Steak is masculine, and salad is feminine. That’s a gross generalization, of course, but one that is valid enough for advertisers and marketers to recognize and exploit. The television commercials for Arby’s restaurants are an obvious example, wherein a narrator announces in his sonorous baritone that Arby’s has “the meats.” It’s not easy to imagine a female narrator making the same pronouncement.

Marketing campaigns and the tactics advertisers deploy in them are a window into a culture’s true underlying motivations, into its id, because advertisers understand the greater value for them and their clients of appealing to emotion over reason. They don’t create cultural stereotypes; they only exploit them. What follows is a short list, by no means comprehensive, of the preferred foods of men and women as advertisers see them.


For men – steak, hamburgers, pizza, beer, hot peppers, sausages, peanuts, fried chicken, barbecue, chili, chips, liquor, bacon, salami, shepherd’s pie, the keto diet (when employed as a scientific-sounding excuse for eating more meat).

Michelle Obama at Miriam’s Kitchen 3-6-09
Michelle Obama serving food on March 5, 2009 at Miriam’s Kitchen, a local non-profit organization that provides healthy, nutritious meals to the homeless in Washington, D.C.. White House photo by Joyce Boghosian.

For women – salads, cupcakes, chocolate, wine, baked chicken, vegetarian lasagna, quiche, souffle, casseroles, soups, cottage cheese.

What a lot of nonsense! It would be easy to blame advertisers for gender prejudices toward food if it weren’t for the reality that they only exploit and reinforce the prejudices already held by their target audiences. Having enough quality food to eat should be the first priority for people of any gender. Of the two stereotyped cuisines, however, the one supposedly preferred by men is overall unhealthier for the eaters and for the planet. Maybe leave the testosterone aside and make room on the plate for mushroom risotto, fruit salad, and an effort to help make the world a better place.
— Ed.

 

Not Buying It

 

The departure of advertisers from Laura Ingraham’s show on Fox News after a boycott of their products and services was proposed by David Hogg, the Parkland, Florida, shooting survivor Ms. Ingraham gratuitously mocked on Twitter, is not censorship, as Fox News executives claim, but the simple economic result of a self-inflicted wound. No one disputes Ms. Ingraham’s First Amendment right to make hateful, idiotic remarks. Furthermore, no one claims that Ms. Ingraham cannot disagree with Mr. Hogg on gun control. As a public figure, however, with a forum that allows her to generate revenue through television viewership ratings that are often as not in her case driven by the outlandishness of her hateful, idiotic remarks, and ad hominem attacks on those she disagrees with, she cannot expect there will be no repercussions. Boycotting her advertisers is simply hitting her where she and Fox News are most vulnerable.

 

Rosaparks
Rosa Parks in 1955, with Martin Luther King Jr. in the background. Ms. Parks was instrumental in starting the Montgomery, Alabama, bus boycott when she refused to give up her seat to a white passenger. Photo by the United States Information Agency (USIA).

There’s a world of difference between the costs paid by Ms. Ingraham for her free speech and that paid by someone such as Juli Briskman, the woman who lost her job after flipping off Supreme Leader’s motorcade last October. Ms. Briskman was not a public figure at the time, and she undertook her action on her own account, with no connection made by her between that action and her employer. Still, her employer, a federal contractor, fired her after it became widely known she worked for them. Ms. Briskman had no thought of ginning up popularity and revenue for her or her employer, far from it. People like Laura Ingraham are well aware their speech will generate controversy, because controversy translates into money. Ms. Ingraham and other public figures like her are the television wrestlers of punditry, throwing metal chairs and bellowing insults while they stomp around the arena doing their best to incite the crowd.

The boycott is a time honored method for expressing disapproval and trying to effect change in public policy or the behavior of public figures. People on both sides of the political spectrum engage in boycotts, as the Reverend Franklin Graham demonstrated recently when he called for a boycott of Target department stores on account of what he sees as their overly liberal transgender restroom policy. Everyone votes with their dollars, for the simple reason that in our capitalist society it is the easiest and most effective way of getting the attention of the powerful. Whether a boycott is undertaken for frivolous or nasty reasons is in the eye of the beholder, but it has to be respected because it too is a form of free speech. The object of a boycott may weather it with enough counter support from people who perceive the boycott as unfair. At any rate, the economic effect is often secondary to the real aim of the boycotters, which is to bring a matter to widespread public attention, causing the boycotted company or public figure to explain or justify their actions, policies, or remarks.

Mahatma Gandhi coined the term “satyagraha” to explain his view on the right way to conduct non-violent efforts for change. Satyagraha means truth (satya), and grasp or hold onto (graha), or holding onto the truth. When people hold what they believe to be the truth, they actively try to get someone or some group who is obstructing their aims to see that truth as well, so that in the end they will step out of the way without the threat of violence. Of course, we all believe we hold the truth, with the possible exception of media pundits who cynically exploit political arguments for personal gain, in which case it’s hard to say whether they believe their own nonsense or not. It doesn’t really matter.

An assembly of moments from the 1982 Richard Attenborough film Gandhi, with Ben Kingsley, showing some of the Mahatma’s methods and philosophy.

For everyone else, with their own truths (not their own facts), it is important to treat those who disagree by the light of their own truths with respect and consideration during the contest for change. The boycott throughout history has been an instrument of change used by the weak against the strong, and today is no different. It’s unseemly then for the strong to veil themselves in the First Amendment in a cynical attempt to elevate the debate into the same arena where Gandhi, Martin Luther King Jr., Rosa Parks, and Cesar Chavez fought for their rights, when they brought this public criticism upon themselves as a consequence of abusing their public forum in the interest of spewing vitriol in pursuit of dollars.
— Vita

 

You Get What You Pay For

 

Recently the news and commentary website Salon instituted a policy of not allowing visitors using advertisement blockers to access their website without either or turning the blockers off or allowing Salon to use the visitors’ computers to mine the cryptocurrency Monero. In other words, when a visitor with an active ad blocker arrives at the Salon website, Salon detects the ad blocker and immediately pops up a notice about its new policy, giving the visitor the options of turning off the ad blocker and continuing to the rest of the site and viewing it for free, but with ads, or, for a visitor who chooses not to turn off the ad blocker, then that visitor must grant Salon permission to use their computer to mine Monero, which replaces the revenue Salon would otherwise lose to that visitor who wants to read articles without viewing any ads. The third option for the visitor is to leave the website.

 

It remains to be seen how well visitors to the Salon website will accept the new policy and whether Salon will see a return to revenue levels they had before ad blockers became much more widely used in the past few years. It’s commendable that the owner of Salon is being open about taking this step and giving visitors options. Some websites use the computers of visitors to mine cryptocurrency without notifying them, a practice known as cryptojacking. Sometimes the website owner is not aware this is happening because their website has been hacked, and in that case it is the hacker who gets the revenue, and both the website owner and the visitor lose out. What the owner of Salon is doing is not cryptojacking, a sneaky and disreputable practice.

Garry Moore Tony the Tiger 1955
Image of television personality Garry Moore and Kellogg’s cereal character Tony the Tiger taken from a 1955 Kellogg’s advertisement. There have always been tacky ads for products of dubious worth.

There are other ways for website owners to cope with replacing revenue lost to ad blockers. The website for The Atlantic magazine stops a visitor at the door when it detects an ad blocker and advises the visitor to turn it off, or whitelist The Atlantic in the ad blocker, or leave. Simple and straightforward. Other websites, such as the one for The New York Times, give a visitor a certain number of free articles each month before the visitor reaches a paywall that requires the visitor buy a subscription to read more articles. More lenient on the front end, but with a harder line on the back end. These models work reasonably well for very popular websites that can afford to lose a small percentage of visitors who absolutely refuse either to not use an ad blocker or to pay for content on the internet. The owners of less well known websites would have a harder time adopting those models without alienating visitors they can ill afford to lose.

Joe dimaggio camel ad
Long before Joe DiMaggio plugged coffee makers, he did advertisements for cigarettes, as did many celebrities, including athletes like him.

The shame of it all is that ad blockers have increased in popularity because of the bad behavior of a few bad actors on the internet who push out ads that hide malware and trackers, or video ads that use autoplay, or ads with Flash Player code that makes them highly distracting, and because of that kind of activity internet users have quite reasonably installed ad blockers to avoid all that, and the effect has been to punish the good along with the bad. Unfortunately there are also too many internet users who think everything on the internet should be free, conveniently ignoring the obvious point that the producers of internet content have to eat and pay the rent just like anybody else.

Imagine picking up a newspaper from a kiosk, a newspaper from which someone has helpfully cut out every single advertisement, leaving only the articles. This would be a great boon to the reader, obviously, but how is the publisher supposed to pay the bills? The reader picked up the newspaper without paying for it, which is not a big deal because the selling price of a newspaper typically takes care of a small percentage of the cost of publishing it. Print newspapers, and now internet newspapers and other publications have always relied on the selling of advertising space for the greater part of their revenue. If readers can’t see the ads, why would advertisers continue to buy ad space?

In this early scene from the 1963 Stanley Kramer film It’s a Mad, Mad, Mad, Mad World, Jonathan Winters as Lennie Pike, third from the left, has some choice words for those who want something for free.

There’s plenty of blame to go around for the state of internet advertising, from publishers and ad producers who put out obnoxious ads that distract from the visitor’s experience, to visitors who seem to think that internet publishers should make their content available free, and even better as far as they are concerned would be free without any visible means of support in the form of advertisements. That’s the “Big Rock Candy Mountain” pipe dream. More reasonable would be a compromise among publishers, advertisers, and visitors that would ask advertisers and publishers to show respect to visitors by not pushing obnoxious ads on them, and visitors to acknowledge the need for publishers to eat and pay the rent like anybody else, and to satisfy those needs by showing ads to visitors. Simple really, particularly considering the alternatives of working in the mines or paying for what you get.
— Techly

 

Just Say No

 

As if the lack of trust hadn’t sunk low enough between internet users, advertisers, and the websites which host advertisements, along comes cryptojacking, a method for either honestly or dishonestly using the computing power and electricity of internet users to mine cryptocurrency. Last week, users of YouTube in some countries noticed that their antivirus and antimalware programs were alerting them to code hidden in ads on YouTube which were enlisting their computers for cryptomining without their permission. Google, which administers YouTube, claims to have fixed the problem. Unfortunately, there are many small websites that don’t have Google’s Information Technology (IT) resources and may have been hacked and had cryptojacking code installed without their knowledge.

 

Cryptojacking sounds like it should be illegal, but oddly enough it is not. There can be repercussions such as blacklisting for hiding code in ads, and of course this sort of activity serves to push more people toward the use of ad blockers, which deplete the revenue of honest websites as well as dishonest ones. There are now outfits on the web, Coinhive being the most notable, which promote to website owners the idea of replacing ads altogether with a bit of JavaScript code on the website itself that will enlist the computers of visitors in mining Monero, a type of cryptocurrency that, unlike Bitcoin, doesn’t require high end equipment. Coinhive takes 30% of the resulting mining revenue, and the website owner gets 70%. Coinhive rather dubiously promotes this as a fair business model for the website owner in a time of declining revenue from ads, while not mentioning its relative fairness for the website visitor.

Cryptocurrency Mining Farm
A mining farm of Genesis Mining in Iceland. These are mainly Zeus scrypt miners. 2014 photo by Marco Krohn. No subterfuge involved in this cryptocurrency mining operation. Note that because the calculations required to create the currency generate a lot of heat, there are fans at the ends of all the units.

As originally set up by Coinhive, the JavaScript ran without the internet user’s knowledge or permission. If an internet user visited a website running Coinhive‘s JavaScript code, and the user’s security software did not alert the user or block the code from running, the only indication the user had of being legally cryptojacked was how unusually busy their computer was and, when the electric bill arrived, how unusually high it was. Savvy computer users might also check running processes monitored by the task manager on their computer. But it’s a good bet that most computer users have no idea about task manager or where to find it on their computer. Some users don’t run any security software at all, or if they do, they misuse it. Running Coinhive software without the knowledge or permission of website visitors is sneaky at best, and more likely just plain unethical, and any arguments from Coinhive or anyone else that it is a fair replacement for ads is mere sophistry.

After some amount of pushing from internet users, Coinhive started offering an above board, opt-in type of cryptomining code so that website visitors knew what was being asked of them. Naturally that version has not proved popular with the website owners who partner with Coinhive because advising visitors of cryptomining activity only leads to the great majority of them declining to participate. People who are not computer savvy, when confronted with an option which will in all likelihood confuse and frighten them, will resort to the safest option and just say no. More computer savvy visitors will likely decide it’s not worth their while to have their computer slowed down to a crawl and their electricity bill hiked by a few dollars a month just to visit a website. Only the most indispensable websites could get away with it, and they are apt to have access to many other less complicated sources of revenue. Coinhive, meanwhile, continues offering the original, surreptitious version of its software.

Naturalist David Attenborough discusses brood parasitism among birds in this BBC wildlife segment.

The arms race between website owners and advertisers on one side, and website visitors on the other side, began when internet service was incredibly slow and most consumers had data caps. Ads, particularly Flash ads that jumped up and down to attract the visitor’s attention, slowed down internet service even more and sucked up the visitor’s limited data. Enter ad blockers. The thing about ad blockers, however, is that even though most of them offer users the ability to whitelist websites, most users are either unaware of that option or don’t bother to use it unless prompted by the website. Ad blockers often act effectively as blunt instruments then, punishing honest websites which display discreet, reputable ads in an above board manner, along with dishonest or careless websites which display gaudy ads that may or may not harbor malicious code. Like many other areas of life, on the internet a few bad actors can spoil the honest efforts of the majority of website owners. The answer to declining revenue from the arms race between advertisers and advertising blockers is not for website owners to get sneaky, however, which erodes trust, but to develop trust with their visitors and exercise restraint on their advertisers.
— Techly

 

How About That Free Lunch Now

 

The great thing about the internet is that it is interactive; interactivity is also one of the bad things about the internet. When people read paper newspapers, way back when, they were exposed to advertisements paid for by commercial establishments in the news and features sections, and to classified advertisements paid for mostly by individuals or small businesses in a section of their own. Paper newspaper advertisements were interactive only in the sense that the reader could choose to ignore them. This was reasonably easy for the reader because the ads themselves did not hop up and down, yell and scream for attention, obfuscate the actual content of the newspaper for a period, or otherwise make a nuisance of themselves and detract from the peaceful enjoyment of the newspaper by the person who had paid a dime or a quarter for it.

When newspapers and writers of other content moved to the internet, they still needed to make a living, of course, and naturally they turned to advertisers to help fund their efforts. Since there was no pay model for the internet, such as had been the case in the days of paper newspapers when readers either subscribed for home delivery or paid directly at street corner kiosks, publishers relied even more heavily on advertisers for income. For some reason, people had gotten the notion that internet content should be free, and rightly or wrongly that’s the way things developed. Here is where the interactive part kicked in and started an internet arms race.

Bob Dylan performs his song “Mr. Tambourine Man” at the 1964 Newport Folk Festival. Dylan’s guitar and harmonica rig is much like the getup buskers used then and today to make a few dollars for their efforts. All that’s missing here is the hat or guitar case for collecting money tossed in by passers by. Many small websites, like this one, have to either pass the hat by posting a “Donate” button, or hope for the best from advertising revenue, or both.

Advertisers realized that since the internet was interactive and didn’t just lie there waiting to wrap fish after it was published like the old paper newspapers did, they could do things to jazz up their ads and, they thought, readers would pay closer attention and the advertisers would see higher returns. Great! Not all advertisers, just the ones who lacked any restraint, got their ads to hop up and down, to yell and scream for attention, to obfuscate for a period the content the reader was actually there to see, and to otherwise make a nuisance of themselves in order to draw attention. It turns out people did not like that, particularly the ones with slow internet connections or limited bandwidth, which the sparkly new advertisements ate into, much to the hapless reader’s dismay. Enter software engineers with a retaliatory response.

The software engineers had some experience in combating opponents in the advertising field after having worked to swat away the pop up army of advertisements that plagued internet users in the early days. One thing many advertisers have never been known for is restraint. Now here they were again, but instead of pop ups they were employing twitchy, sparkly, pushy advertisements. The software engineers working on behalf of browser makers and internet users came up with ad blockers. Now all ads were blocked. Hah hah! Internet users had the option of whitelisting – or permitting – ads on a website in the options menu of their ad blocker, but who would ever bother to do that? Publishers noticed, however, that their internet ad revenue plummeted.

An emotionally fraught rendition of “Silver Springs” in a 1997 concert by Fleetwood Mac, which demonstrates why they continued to draw large crowds well after their heyday. The song, written and sung by Stevie Nicks, who as a songwriter ranks in the top echelon of 1970s and 1980s pop and soft rock, is a deeply personal revelation. Fleetwood Mac had by 1997 long passed their peak of popularity for album sales, but concert ticket prices for such an established group with an extensive catalog of hits remained high, from $20 to $50 for the cheap seats, to over $100 for the best seats. The internet works similarly, with an enormous underclass of websites barely making it, and several well established websites with large followings dominating the market.

Enter Google in the spring of 2017 with the Funding Choices program and their own ad blocker built into their Chrome browser, which in the past year has overtaken Microsoft’s Internet Explorer as the world’s most popular browser. But since Google makes the lion’s share of its revenue selling ads and marketing user information, why would Google then be against ads? Because the obnoxious ads that prompted the development of ad blockers have poisoned the well for everybody, and Google, with its dominant market position, can dictate which ads will fly and which ones won’t.

The Funding Choices program is geared toward internet users, telling them they can pay to subscribe to a publisher’s content and go ad free, or view the content free on condition they allow ads, which Google assures them they have vetted for good behavior. Google’s ad blocker built into its Chrome browser is geared toward advertisers, telling them essentially that unless they allow Google to vet their ads for good behavior, they will not see the light of day on the world’s most popular browser. All of this would seem a boon to both internet users and publishers. But that depends on how much they trust “Don’t Be Evil” Google. Rather than turn over yet more power to Google, a company which has already surpassed Microsoft in ways not only financial but morally suspect, perhaps the time has come for internet users to seek alternatives not only for search but for the multitude of other applications which Google has used to ingratiate itself as the public’s servant, the servant whose ear is always at the door. This website, for one, will seek alternatives to displaying Google ads. Oh, you weren’t even aware there were Google ads on this website?
― Techly

 

A Pitch Too High

 

In trying to specifically target their advertisements and therefore get a higher return per ad, companies like to know as much as possible about the consumer, and lately some of them have resorted to using ultrasonic beacons embedded in their ads. Say you are at your desktop computer reading a news story from the online version of your local newspaper, and nearby on your desk is your smartphone, which is on but currently idle, or so you would assume. Unknown to you, one of the ads on the webpage you are looking at emits an ultrasonic beacon lasting about 5 seconds through your computer’s speakers. Most likely also unknown to you (because like most people you probably don’t bother to read all the permissions you grant an application when you install it), one or more of the applications on your smartphone pick up that ultrasonic beacon through the phone’s microphone and, through various commercial agreements also done without your knowledge, relays the packet of information encapsulated in the beacon, along with information contributed from the smartphone application, back to the advertiser on the webpage as well as to anyone else who has an interest in information about you.

 

The more advertisers know about you, the better, as far as they are concerned. The problem here is how sneaky they are being about collecting information. It is even possible for advertisers to embed ultrasonic beacons in television advertisements, though so far there is no proof any of them have done that. The Federal Trade Commission (FTC), which regulates deceptive advertising practices, nonetheless recently warned 12 smartphone application developers about deceptively implying they were not monitoring users’ television viewing habits when in fact they were capable of doing so. Researchers recently discovered that as many as 234 Android applications are capable of using beacon technology. Unfortunately, it appears the FTC is reluctant to force the developers to divulge this capability to Android smartphone users. There is even less information available from Apple application developers.

 

Statue of Liberty, NY
The Statue of Liberty, also known as a beacon of freedom, on Liberty Island in New York Harbor; photo by William Warby.

 

This cross-device tracking, as it is known, is as invasive and sneaky as it gets, yet there seems to be little political will to either outlaw it or regulate it. A warning letter? That’s all? In the 1950s and 60s there was a public outcry about subliminal messages in print and television advertising. While the effectiveness of subliminal advertising has always been dubious, people were nevertheless upset they were being manipulated in such a sneaky, underhanded way. Because of the public outcry, the Federal Communications Commission (FCC) was moved to state it would revoke the license of any broadcaster who used subliminal messages in programming or advertising, and the FTC stated that it would prosecute advertisers under Sections 5 and 12 of the Federal Trade Commission Act of 1914, which governs deceptive practices.

 

Given the remarkable similarity of ultrasonic beacons in electronic devices to subliminal messaging, in practice if not in usage, it’s difficult to understand why the FCC and FTC have not come down harder on the commercial use of this technology. The practice is the same because both seek to take advantage of consumers without their knowledge, and certainly not with their explicit approval; the usage is different because subliminal advertisers cast a wide net to boost sales, while companies employing beacons gather information about users in order to more specifically target them, like fish in a barrel. Until federal regulators take stronger action against the use of ultrasonic beacons, people upset by the practice will apparently have to rely on the more acute hearing of their dogs to alert them.
― Techly
His Master's Voice
His Master’s Voice, an 1898 painting by English artist Francis Barraud (1856-1924) of his brother’s dog, Nipper. The Victor Talking Machine Company began using the painting in 1900, and in 1929 the painting became the symbol of the Radio Corporation of America (RCA), aka RCA Victor.

 

The Fickle Fingerprint of Fate

In May of 2016, Department of Justice officials wrote a memorandum seeking a warrant to search a Lancaster, California, premises and to force the occupants to unlock any phones or electronic devices with their fingerprints if the devices were equipped with that technology. This amounted to a fishing expedition to circumvent previous court rulings which held that law enforcement could not compel a criminal suspect to unlock an electronic device with their pass code because that would be a violation of the Fifth Amendment protection against self incrimination. It is unclear whether the DoJ ultimately received the warrant they sought because not all documents related to the case are publicly available.

Creation of Adam (Michelangelo) Detail
“Creation of Adam,” by Michelangelo

Why is compelling a suspect to unlock a device with their fingerprint also not a violation of the Fifth Amendment? Because of a 2014 ruling in a Virginia Circuit Court which stated that fingerprints and other bodily attributes are not protected, while handing over a pass code to law enforcement is divulging of information, which is protected. Law enforcement has long been able to use a suspect’s physical characteristics to incriminate him or her, but has not been allowed to compel a suspect to give up information. The problem now is that technology has leaped ahead of current law, and judges and prosecutors are falling back on anachronistic case law to cope with the use of biometrics like fingerprints and iris scans to lock personal electronic devices. Case law going back one hundred years and more treats fingerprints as a way of determining a suspect’s culpability at a crime scene, not as a key to a suspect’s possessions which may or may not contain evidence. It is obtuse to claim that a fingerprint or any other biometric is not the same as a pass code when it is being used for the same purpose.

All seeing eye
“All seeing eye,” from U.S. currency

The use of biometrics is springing up not only in consumer devices, but in technology used by the military and law enforcement. The 2002 film, Minority Report, depicts a dystopian future when law enforcement and advertisers make great use of biometrics, and those predictions are proving more accurate with each passing year. The Department of Justice already uses facial recognition technology for surveillance of people in public spaces, and as we have seen with the National Security Agency, the ability of modern digital storage to accumulate massive amounts of data encourages the practice of scooping up everything indiscriminately. Like a fishing trawler using a drift net, law enforcement intends to collect everything now, store it, and sort it all out later. They think they are being efficient and better safe than sorry. But people are not fish subject to by-catch, which ought to be obvious enough, and to be sure the Fourth and Fifth Amendments to the Constitution make the distinction clear.
– Techly

Randolph County Veterans Memorial Park Bill of Rights marker
Randolph County, Georgia, Veterans Memorial Park Bill of Rights marker;
photo by Michael Rivera

Getting to Know You

 

Online Privacy and the Founding Fathers
“Online Privacy and the Founding Fathers” by Matt Shirk


The comedian George Carlin used to riff on oxymorons, phrases he found absurd such as “military intelligence” and “business ethics.” To that list we could add “online privacy.” The internet has always been a public place which gives people the illusion of private communication because of how they access it, from a handheld device or from their own computer. Recently in a ruling on a class-action lawsuit concerning Yahoo’s practice of scanning emails, a federal judge affirmed that online privacy is not for everybody.


In the lawsuit brought against Yahoo by email users who did not use Yahoo’s email service but corresponded with people who did, Judge Lucy Koh of the U.S. District Court for Northern California signed off on a settlement which allows Yahoo to continue scanning the emails of non-Yahoo users without their consent. The major change from Yahoo’s previous practice is that it must do so only while the emails are on its servers, rather than while they are in transit.

That satisfies the letter of the law while doing nothing to redress the grievances of non-Yahoo email users. The four plaintiffs in the lawsuit received $5,000 each. The Judge awarded the plaintiffs’ lawyers 4 million dollars in total. A  45 page PDF of the settlement is here, and the summary starts at page 40. Google is being sued in a similar class-action which is pending before Judge Koh.

Since most people don’t fully read the terms and conditions before signing up for online services, it’s doubtful whether many users of Yahoo, Google, or similar free webmail services are aware those companies are scanning their emails for the purpose of targeted advertising, as well as scanning the other half of the exchange coming from their correspondent. Other users who are aware of the scanning are resigned to accepting it as the price of free webmail. And the “price of free” is another oxymoron Mr. Carlin himself might have gleefully noted.

– Techly