Skip to main content

Home/ Digit_al Society/ Group items tagged ITGS reliability privacy security

Rss Feed Group items tagged

dr tech

Open Rights Group Scotland - E-voting's Unsolvable Problem - 0 views

  •  
    Ahhh ITGS group - a great discussion on the evoting problem would have been perfect for your Paper 2. "Remember: all of these principles of security, anonymity and verifiability have to be achieved in an understandable way. If they can't be then you get the opportunity for losers to claim fraud, and their supporters to believe them."
amenosolja

Windows 10 Is Watching: Should You Be Worried? - 0 views

  •  
    "In amongst the numerous reports of privacy infringements, there have been a handful of genuine issues. Reports of Microsoft utilizing your computer as a P2P node for update sharing were completely founded, and the 13 pages of privacy settings are also no joke."
dr tech

JetBlue is the latest to use facial recognition technology in airports - 0 views

  •  
    "However, there is some concern about how accurate these new procedures will be. Apparently the facial recognition technology doesn't recognize all people will the same accuracy. White women and black people aren't as easily recognized as white men, meaning there could be some mismatching of identities. Some are also concerned that this is crossing the line in terms of passenger privacy."
dr tech

Where everybody knows your face: Woody Harrelson photo used to spot thief | US news | T... - 0 views

  •  
    "Georgetown University's Center on Privacy and Technology highlighted the April 2017 episode in Garbage In, Garbage Out, a report on what it says are flawed practices in law enforcement's use of facial recognition. The report says security footage of the thief was too pixelated and produced no matches while high-quality images of Harrelson returned several possible matches and led to one arrest."
amenosolja

How to Use USB Security Keys with your Google Account - 0 views

  •  
    "The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
amenosolja

An Android Porn App Takes Your Photo and Holds It to Ransom - 0 views

  •  
    "The Register reports that security firm Zscaler was first to spot the app, which presents itself as a normal video playing app, albeit for playing videos of an adult nature. Apparently once it has silently snapped photos of its victim it will display a message on screen demanding that they pay $500 . Otherwise, well... do you want people knowing you've used the app?"
neoooo

Mapped: The State of Facial Recognition Around the World - 1 views

  •  
    "North America, Central America, and Caribbean In the U.S., a 2016 study showed that already half of American adults were captured in some kind of facial recognition network. More recently, the Department of Homeland Security unveiled its "Biometric Exit" plan, which aims to use facial recognition technology on nearly all air travel passengers by 2023, to identify compliance with visa status."
anonymous

Find the ungoogleable with crowdsourced search engine - tech - 04 December 2013 - New S... - 0 views

  • THERE'S nothing like the human touch.
  • DataSift is new kind of search engine that uses crowdsourced human intelligence to answer vague, complex or visual questions, even when the users are not sure what they are searching for.
  • answered easily and quickly by human workers
julia barr

New York Asks Cellphone Carriers to Explain Why They Rejected Antitheft Switch - 0 views

  •  
    SAN FRANCISCO - New York State's top prosecutor is investigating why American cellphone carriers have yet to embrace antitheft software on Samsung smartphones, raising questions about possible coordination among the biggest carriers.
amenosolja

A Smile Detector and Other Apps You Need to Be Using | WIRED - 0 views

  •  
    "RECHO DOES ONE very simple, little thing: It lets you leave a voice message tied to a location. When other people using the app hit those coordinates, Recho will tell them there's something to listen to. You can use the app to discover different "rechoes" around you, if you actively want to listen in on someone's location-aware thoughts. You can also share interesting soundbytes with your Recho followers. It's a little weird and novel, but ultimately a new way to think about digital exploring a place."
Max van Mesdag

Google warning on fake anti-virus software - 0 views

  •  
    It turns out that 15% of free anti-virus softwares contain viruses themselves, according to Google.
1 - 11 of 11
Showing 20 items per page