Skip to main content

Home/ Digit_al Society/ Group items tagged abuse

Rss Feed Group items tagged

dr tech

'Smart' tech is being weaponised by domestic abusers, and women are experiencing the wo... - 0 views

  •  
    "Because for all the promises of smart tech, at least a "dumb" heating system can't be taken over by a vindictive ex, and used to torment you with unbearable heat or terrible cold, when you have no idea why. A daft doorbell can't tell a stalker when you leave, or when you're home, or where you go if you use a smartwatch, too. And no stupid speaker can be used to listen in on your private conversations. These situations may sound like nightmares, but they are all real cases of smart tech-enabled domestic abuse. And the number of cases is shooting up: between 2018 and 2022, the domestic violence charity Refuge saw an increase of 258% in the number of survivors supported by their tech abuse team."
dr tech

Facebook under pressure to resume scanning messages for child abuse in EU | Technology ... - 0 views

  •  
    " The children's charity NSPCC has called on Facebook to resume a programme that scanned private messages for indications of child abuse, with new data suggesting that almost half of referrals for child sexual abuse material are now falling below the radar. Recent changes to the European commission's e-privacy directive, which are being finalised, require messaging services to follow strict new restrictions on the privacy of message data. Facebook blamed that directive for shutting down the child protection operation, but the children's charity says Facebook has gone too far in reading the law as banning it entirely."
dr tech

'They said: aren't you that porn star?' The woman hunting down image-based abuse | Sexu... - 0 views

  •  
    "Landsem's digital detective skills would help pivot the Norwegian approach to digital image-based abuse. In 2017, she discovered several nude images of Nora Mørk, a handball player on the national team. The case kickstarted a national debate and, in the summer of 2021, Norway made the spread of intimate images a crime punishable with up to one year of imprisonment - two if the abuse is "systematic" or "organised.""
dr tech

Sadiq Khan received racist abuse after false reports he blocked Queen statue | Sadiq Kh... - 0 views

  •  
    "Sadiq Khan has received a wave of social media abuse, some of it racist, after newspapers incorrectly that reported he might block a new statue of the Queen, days after the London mayor warned that some media outlets were "monetising" hatred."
dr tech

Want the platforms to police bad speech and fake news? The copyright wars want a word w... - 0 views

  •  
    "EFF's Legal Director Corynne McSherry offers five lessons to keep in mind: 1. (Lots of) mistakes will be made: copyright takedowns result in the removal of tons of legitimate content. 2. Robots won't help: automated filtering tools like Content ID have been a disaster, and policing copyright with algorithms is a lot easier than policing "bad speech." 3. These systems need to be transparent and have due process. A system that allows for automated instant censorship and slow, manual review of censorship gives a huge advantage to people who want to abuse the system. 4. Punish abuse. The ability to censor other peoples' speech is no joke. If you're careless or malicious in your takedown requests, you should pay a consequence: maybe a fine, maybe being barred form using the takedown system. 5. Voluntary moderation quickly becomes mandatory. Every voluntary effort to stem copyright infringement has been followed by calls to make those efforts mandatory (and expand them)."
dr tech

Mandatory Student Spyware Is Creating a Perfect Storm of Human Rights Abuses | Electron... - 0 views

  •  
    "Spyware apps were foisted on students at the height of the Covid-19 lockdowns. Today, long after most students have returned to in-person learning, those apps are still proliferating, and enabling an ever-expanding range of human rights abuses. In a recent Center for Democracy and Technology report, 81 percent of teachers said their schools use some form of this "student monitoring" spyware. Yet many of the spyware companies supplying these apps seem neither prepared nor concerned about the harms they are inflicting on students. "
dr tech

Human-like programs abuse our empathy - even Google engineers aren't immune | Emily M B... - 0 views

  •  
    "That is why we must demand transparency here, especially in the case of technology that uses human-like interfaces such as language. For any automated system, we need to know what it was trained to do, what training data was used, who chose that data and for what purpose. In the words of AI researchers Timnit Gebru and Margaret Mitchell, mimicking human behaviour is a "bright line" - a clear boundary not to be crossed - in computer software development. We treat interactions with things we perceive as human or human-like differently. With systems such as LaMDA we see their potential perils and the urgent need to design systems in ways that don't abuse our empathy or trust."
aren01

Social networks' anti-racism policies belied by users' experience | Race | The Guardian - 1 views

  •  
    ""The abhorrent racist abuse directed at England players last night has absolutely no place on Twitter," the social network said on Monday morning. A Facebook spokesperson said similarly: "No one should have to experience racist abuse anywhere, and we don't want it on Instagram." But the statements bore little relation to the experience of the company's users. On Instagram, where thousands left comments on the pages of Marcus Rashford, Bukayo Saka and Jadon Sancho, supportive users who tried to flag abuse to the platform were surprised by the response."
  •  
    "The world's biggest social networks say racism isn't welcome on their platforms, but a combination of poor enforcement and weak rules have allowed hate to flourish."
neoooo

Apple's Not Digging Itself Out of This One: "Online researchers say they have found fla... - 0 views

  •  
    "Apple's Not Digging Itself Out of This One: "Online researchers say they have found flaws in Apple's new child abuse detection tool that could allow bad actors to target iOS users.""
dr tech

UK school pupils 'using AI to create indecent imagery of other children' | Global devel... - 0 views

  •  
    "They said that a number of schools were reporting for the first time that pupils were using AI-generating technology to create images of children that legally constituted child sexual abuse material. Emma Hardy, UK Safer Internet Centre (UKSIC) director, said the pictures were "terrifyingly" realistic. "The quality of the images that we're seeing is comparable to professional photos taken annually of children in schools up and down the country," said Hardy, who is also the Internet Watch Foundation communications director."
dr tech

Child safety groups and prosecutors criticize encryption of Facebook and Messenger | Fa... - 0 views

  •  
    "This week, the tech giant announced it had begun rolling out automatic encryption for direct messages on its Facebook and Messenger platforms to more than 1 billion users. Under the changes, Meta will no longer have access to the contents of the messages that users send or receive unless one participant reports a message to the company. As a result, messages will not be subject to content moderation unless reported, which social media companies undertake to detect and report abusive and criminal activity. Encryption hides the contents of a message from anyone but the sender and the intended recipient by converting text and images into unreadable cyphers that are unscrambled on receipt."
dr tech

'Pimps' use Instagram to glorify sexual violence and abuse, investigation finds | Sex t... - 0 views

  •  
    "Instagram has been used to promote sexual violence and exploitation by people advertising themselves as "pimps", a Guardian investigation has found. For the past year, the Guardian has been tracking Instagram accounts hosting content that advocates such activity as well as those that encourage violence against the women under the control of a pimp - someone who makes money from selling others for sex. The accounts identified often use hashtags as well as code phrases commonly associated with sex work to make it easier for buyers to locate them."
dr tech

TerraCom and YourTel threaten journalists who exposed massive personal data breach - Bo... - 0 views

  •  
    "Journalists discovered that two companies had posted the personal data of 170,000 customers online. The leak, which exposed the victims to identity theft and fraud, was reportedly so bad that social security numbers, passport scans, financial data and home addresses were indexed by search engines. Rather than merely address the problem, however, TerraCom and YourTel threatened the reporters, referring to them as "hackers" and accusing them of "numerous violations of the Computer Fraud and Abuse Act"
dr tech

Facebook deletes Norwegian PM's post as 'napalm girl' row escalates | Technology | The ... - 0 views

  •  
    In her intervention on Friday, the Norwegian prime minister wrote that the photograph, entitled The Terror of War and featuring the naked nine-year-old Kim Phúc running away from a napalm attack, had "shaped world history". Solberg added: "I appreciate the work Facebook and other media do to stop content and pictures showing abuse and violence ... But Facebook is wrong when they censor such images."
dr tech

Facebook isn't looking out for your privacy. It wants your data for itself | Technology... - 0 views

  •  
    "If Facebook cared about unfair profiling and privacy abuse, for instance, it would probably not have started grouping its users together based on their "Ethnic Affinity". It wouldn't then allow that ethnic affinity to be used as a basis for excluding users from advertisements, and it certainly wouldn't allows that ethnic affinity to be used as a basis for potentially illegal discrimination in real estate advertising."
dr tech

The 'Athens Affair' shows why we need encryption without backdoors | Trevor Timm | Comm... - 0 views

  •  
    "One of the biggest arguments against mandating backdoors in encryption is the fact that, even if you trust the United States government never to abuse that power (and who does?), other criminal hackers and foreign governments will be able to exploit the backdoor to use it themselves. A backdoor is an inherent vulnerability that other actors will attempt to find and try to use it for their own nefarious purposes as soon as they know it exists, putting all of our cybersecurity at risk. "
dr tech

EFF scores a giant victory for fair use and dancing babies - Boing Boing - 0 views

  •  
    "The Ninth Circuit Court of Appeals ruled in Lenz's and EFF's favor today, ruling that rightsholders must consider fair use before issuing takedowns. The court found that people whose creations were censored through DMCA abuse could sue the companies that filed the censorship demands, even if they couldn't show monetary damages from the censorship. "
jamandham

UN: 'urgent action' needed on cyber violence against women (Wired UK) - 0 views

  •  
    An article that focuses on cyber violence against women that shows the issues that can arise from the internet as it involves security and how people can abuse technology for their benefits.
dr tech

Apple won't let EFF release a DRM-free app - Boing Boing - 0 views

  •  
    "EFF has released its mobile app to help people join in important, timely struggles, but you can't get it for your Iphone or Ipad, because Apple insists that EFF use DRM, and this is contrary to everything it stands for. In a petition, EFF calls out Apple's incredibly abusive, one-sided developer "agreement" and calls on developers and Apple users to join a campaign to get Apple to give developers the freedom to release their creations on more liberal terms."
dr tech

The Celebrity Photo Hack Goes Far Beyond iCloud - 0 views

  •  
    "iTunes phishing scams Compromised phones or computers Celebrity passwords/emails as part of a larger password dump (such as the Adobe hack) Mobile-phone or computer-repair individuals abusing access Password reset questions guess Brute force"
1 - 20 of 46 Next › Last »
Showing 20 items per page