Skip to main content

Home/ Digit_al Society/ Group items tagged Wi-fi

Rss Feed Group items tagged

dr tech

Wi-Spy - Hackster.io - 0 views

  •  
    "A duo of researchers at the University of Waterloo and the University of Illinois Urbana-Champaign have turned this old assumption of impracticality on its head with their description of a Wi-Fi localization exploit they call Wi-Peep. They have outlined how an inconspicuous and inexpensive device can locate hidden Wi-Fi devices without their cooperation."
dr tech

Londoners give up eldest children in public Wi-Fi security horror show | Technology | T... - 0 views

  •  
    "When people connected to the hotspot, the terms and conditions they were asked to sign up to included a "Herod clause" promising free Wi-Fi but only if "the recipient agreed to assign their first born child to us for the duration of eternity". Six people signed up. F-Secure, the security firm that sponsored the experiment, has confirmed that it won't be enforcing the clause."
dr tech

New cloud hacking service steals Wi-Fi passwords - Techworld.com - 0 views

  •  
    Yikes this is very scary - lets all jump from WEP, to WPA to WPA 2?
dr tech

MIT's 'Kinect of the Future' Device Tracks People Through Walls [VIDEO] - 0 views

  •  
    "The device tracks a single person with an accuracy of plus or minus 10 centimeters - about the size of an adult hand. Apart from the ability to "see" through a wall, its main advantage is that the person being tracked isn't required to wear a transmitter. While other location systems depend on Wi-Fi, this device can track a person's movements within the radius of its radio waves."
longspagetti

Hide a Wi-Fi Access Point Inside a Pocket Book for Stealthy File Sharing - 0 views

  •  
    The access point itself will allow multiple devices to hook up to it so they can all share files with each other on a private little network. Then, for fun, the whole thing is shrunk down and stuffed inside a small notebook so you can stealthily share files anywhere. It's a little over the top, but fun nonetheless. Head over to Node for the full guide.
dr tech

What Artificial Intelligence Isn't - 0 views

  •  
    "AI is already here. This isn't some future, theoretical technology we are working on. AI machines are already among us. Take for example Microsoft's recent security robot demonstration. Called the K5, these autonomous machines stand 5 feet tall, weigh 300 pounds, and are equipped with HD cameras, sensors, alarms, Wi-Fi and - you guessed it - artificial intelligence. These machines have been programmed to recognize if something is out of place, like an injured employee or a potential trespasser. And as technology improves, the K5 will become more capable of recognizing even smaller discrepancies than humans can."
dr tech

TechScape: suspicious of TikTok? You're not alone | TikTok | The Guardian - 0 views

  •  
    "Perkins' report offers a dizzying list of data the TikTok app can access while it's running, including the device location, calendar, contacts, other running applications, wi-fi networks, phone number and even the SIM card serial number. He concludes: For the TikTok application to function properly, most of the access and device data collection is not required. This leads us to believe that the only reason this information has been gathered is for data harvesting. It is also notable that the device only needs to ask the user for permission to perform each of these actions once and then follow the user's preferences. The application however has a culture of persistent access or continuously asking for a decision reversal by the user. The hourly checking of location is also unnecessary. Finally, device mapping, external storage access, contacts and third-party applications data collection allows TikTok the ability to reimage the phone in the likeness of the original device."
dr tech

British mobile phone users' movements 'could be sold for profit' | World news | The Gua... - 0 views

  •  
    "Many people unwittingly sign up to be location-tracked 24/7, unaware that the highly sensitive data this generates is being used and sold on for profit. Campaigners say that if this information were stolen by hackers, criminals could use it to target children as they leave school or homes after occupants have gone out."
dr tech

Iran's Secret Manual for Controlling Protesters' Mobile Phones - 0 views

  •  
    "According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their data connections to a crawl, break the encryption of phone calls, track the movements of individuals or large groups, and produce detailed metadata summaries of who spoke to whom, when, and where. Such a system could help the government invisibly quash the ongoing protests - or those of tomorrow - an expert who reviewed the SIAM documents told The Intercept."
1 - 13 of 13
Showing 20 items per page