Skip to main content

Home/ Digit_al Society/ Group items tagged anonymity authenticity

Rss Feed Group items tagged

dr tech

Stop confusing facial recognition with facial authentication - 0 views

  •  
    "Before we go deeper, it's important to note that there are two approaches to facial - or any biometric - authentication: "match on server" and "match on device." The former approach shares some of the risky aspects of facial recognition technology because it stores the details of one's most personal features-your face or your fingerprint-on a server, which is inherently insecure. There are some well-publicized examples of biometric databases being hacked, which is why so many companies are committing to only do on-device biometrics."
dr tech

Search me: online reputation management | Technology | The Guardian - 0 views

  •  
    "Past scandals, bad photos, critical comments: the internet has a long memory. As the EU considers the 'right to be forgotten', we investigate the growing business of online reputation management - and learn how you can airbrush your own past"
dr tech

Reclaim the Internet research reveals huge scale of social media misogyny | Technology ... - 0 views

  •  
    "To coincide with the launch, the campaign has released research by Demos revealing the huge scale of social media misogyny. The study monitored the use of the words "slut" and "whore" by UK Twitter users over three weeks from the end of April. It found that 6,500 individuals were targeted by 10,000 aggressive and misogynistic tweets in that period."
dr tech

Who protects reputation for the Bolibourgeoisie? | Setty's notebook - 0 views

  •  
    " Some search engines, including Bing and DuckDuckGo, give an entire first page of spurious results (see image in upper left). Most of the results are for pages obviously designed to obfuscate, throwing banal dust into the eyes of the search engine and leaving a casual searcher with the incorrect impression that there's nothing to see here. "
dr tech

The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block - 0 views

  •  
    "The type of tracking, called canvas fingerprinting, works by instructing the visitor's web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it."
Mcdoogleh CDKEY

BBC News - PlayStation 3 gaming console clock bug 'fixed' - 0 views

  •  
    This did not bode well for PS3 when it did happen :P
dr tech

Mass Wikipedia Edit To Make The Internet Less Sexist - 0 views

  •  
    ""This project also came on the heels of a very public debate about structural sexism in Wikipedia. [This] began when writer Amanda Filipacchi wrote a New York Times op-ed on a problematic editorial practice being implemented by a number of Wikipedia editors: women were being removed from the 'American Novelists' category and moved into a subcategory for 'American Women Novelists.'" Filipacchi's piece set the internet on fire, sparking a mass call for reform."
dr tech

Rutgers' online course tracks your knuckles, face, browser history - Boing Boing - 0 views

  •  
    "Rutgers University's new program also uses a "behavior observation tool," which monitors student browser activity throughout an active session. While this feature is intended to prevent students from using the Internet to cheat on exams, the power that this grants instructors is extremely invasive. If a student accidentally leaves a personal or embarrassing website in their browser during an online course, a ProctorTrack instructor might stumble upon their activity."
dr tech

Machine-Learning Maestro Michael Jordan on the Delusions of Big Data and Other Huge Eng... - 0 views

  •  
    "Now, the number of combinations of these columns grows exponentially with the number of columns. So if you have many, many columns-and we do in modern databases-you'll get up into millions and millions of attributes for each person. Now, if I start allowing myself to look at all of the combinations of these features-if you live in Beijing, and you ride bike to work, and you work in a certain job, and are a certain age-what's the probability you will have a certain disease or you will like my advertisement? Now I'm getting combinations of millions of attributes, and the number of such combinations is exponential; it gets to be the size of the number of atoms in the universe."
dr tech

China's social credit score is like a 'Black Mirror' episode - Business Insider - 0 views

  •  
    "The Chinese government is planning on implementing a system that connects citizens' financial, social, political, and legal credit ratings into one big social trustability score. The idea would be that if someone breaks trust in one area, they'd be adversely affected everywhere."
yeehaw

Forget Passwords: How Playing Games Can Make Computers More Secure - Scientific American - 0 views

  •  
    Sounds a bit extreme just to make sure no one can log on to your laptop or smartphone, but a team of researchers from Stanford and Northwestern universities as well as SRI International is nonetheless experimenting at the computer-, cognitive- and neuroscience intersection to combat identity theft and shore up cyber security-by taking advantage of the human brain's innate abilities to learn and recognize patterns.
1 - 12 of 12
Showing 20 items per page