{"id":12129,"date":"2019-02-27T13:47:39","date_gmt":"2019-02-27T12:47:39","guid":{"rendered":"http:\/\/www.wjst.de\/blog\/?p=12129"},"modified":"2019-02-27T13:48:10","modified_gmt":"2019-02-27T12:48:10","slug":"compromised-privacy","status":"publish","type":"post","link":"https:\/\/www.wjst.de\/blog\/sciencesurf\/2019\/02\/compromised-privacy\/","title":{"rendered":"Compromised privacy"},"content":{"rendered":"<p><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-02-26\/law-enforcement-can-do-whatever-it-likes-with-consumer-dna-data\">No One Is Safeguarding Your DNA<\/a><\/p>\n<blockquote><p>A person\u2019s privacy can be compromised if a third or fourth cousin takes a home DNA test &#8230; The growing popularity of consumer DNA testing has helped law enforcement make arrests in decades-old crimes that would otherwise have remained cold cases. That may not be entirely good news for the rest of us, because using the technology to trace DNA to suspected criminals requires police to use a whole lot of other people\u2019s genetic data, too. Like cell phone data a decade ago, it\u2019s hard to say how all this information might be employed in the future. Imagine drug companies using it to target ads, life insurers using vast networks of relatedness to determine risk, or a scorned ex-lover employing the technique in some very 21st century stalking.<\/p><\/blockquote>\n<p>Yea, yea.<\/p>\n\n<p>&nbsp;<\/p>\n<div class=\"bottom-note\">\n  <span class=\"mod1\">CC-BY-NC Science Surf , accessed 10.04.2026<\/span>\n <\/div>","protected":false},"excerpt":{"rendered":"<p>No One Is Safeguarding Your DNA A person\u2019s privacy can be compromised if a third or fourth cousin takes a home DNA test &#8230; The growing popularity of consumer DNA testing has helped law enforcement make arrests in decades-old crimes that would otherwise have remained cold cases. That may not be entirely good news for &hellip; <a href=\"https:\/\/www.wjst.de\/blog\/sciencesurf\/2019\/02\/compromised-privacy\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Compromised privacy<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-12129","post","type-post","status-publish","format-standard","hentry","category-genetics-biology"],"_links":{"self":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/12129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/comments?post=12129"}],"version-history":[{"count":2,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/12129\/revisions"}],"predecessor-version":[{"id":12131,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/12129\/revisions\/12131"}],"wp:attachment":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/media?parent=12129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/categories?post=12129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/tags?post=12129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}