Skip to main content

Home/ Digit_al Society/ Group items tagged collection

Rss Feed Group items tagged

dr tech

Generation AI: What happens when your child's friend is an AI toy that talks back? | Wo... - 0 views

  •  
    "If that data is collected, does the child have a right to get it back? If that data is collected from very early childhood and does not belong to the child, does it make the child extra vulnerable because his or her choices and patterns of behaviour could be known to anyone who purchases the data, for example, companies or political campaigns. Depending on the privacy laws of the state in which the toys are being used, if the data is collected and kept, it breaches Article 16 of the Convention on the Rights of the Child - the right to privacy. (Though, of course, arguably this is something parents routinely do by posting pictures of their children on Facebook). "
dr tech

Facebook v Apple: the looming showdown over data tracking and privacy | Technology | Th... - 0 views

  •  
    "Some time in the next few months, iPhone users will be greeted by a message - not from Facebook, but from Apple - asking them if they will allow the Facebook app to collect their data. If users refuse, Apple will prevent Facebook from doing so. Facebook's attempt to vilify Apple looks like sour grapes Read more A similar message from Apple will pop up, related to any app that collects data on users for advertising purposes. Facebook says it will preempt the change by rolling out a pop-up screen over the coming weeks and months, making a plea to users to stay opted in. "Agreeing to these prompts doesn't result in Facebook collecting new types of data; it just means that Facebook can continue to give people better experiences," a Facebook spokeswoman said."
jhendoooo

Biometric data collection for Digital ID of all Bhutanese to commence from January next... - 0 views

  •  
    "Digital Identity (ID) is one of the main results focused under the main Digital Drukyul Flagship Program of Nu 2.557 bn as the fund also covers results such as Institutionalizing e-Patient Information System, creating Digital Schools, Integrating e-business services (business licensing and Single window for trade), Land records, tax information etc. Citing some examples of what benefits people can expect with the completion of the Digital ID Lobzang Jamtsho, Chief ICT Officer, Application Development Division, Department of Technology and Telecom (DITT) under Ministry of Information and Communication (MoIC) said stated, "Currently the online processes are hybrid in nature, where although we communicate or negotiate online, people still need to be physically present to sign a contract or make online transactions." He said that with the use of Digital ID, one can have bank transactions or even sign up contracts remotely to state a few components that the program encapsulates. The paper found that the biggest advantage of the Digital ID of the person is that all the information of the person will be stored and based around the Digital ID of the person. This could be health records, land records, tax records, revenue and bank records, business records, education records, census records etc. The person can use his digital ID to access all this information and also use his ID to complete online procedures to avail services. To protect the privacy of the person access to the information will be compartmentalized and restricted so some tax officials for example cannot access the health records of a person. A key component of digital ID is collecting the biometric details of people like eyes and all finger prints for verification and security."
dr tech

'Boundless Informant' Is a Secret NSA Tool to Data-Mine the World - 0 views

  •  
    "The NSA has a tool that records and analyzes all the flow of data that the spy agency collects around the world. Think of it as a global data-mining software that details exactly how much intelligence, and of what type, has been collected from every country in the world. It's aptly called "Boundless Informant." "
dr tech

Why Targeted Ads Are a Serious Threat to Your Privacy - 0 views

  •  
    "Data collection is a prerequisite to delivering targeted ads, so their use will inherently stir up privacy concerns. Ad companies are incentivized to collect and share as much data as they can, with safeguarding this information only a secondary issue at best. Breaches are a concern largely because of the potential fallout to a company's brand."
dr tech

A radical proposal to keep your personal data safe | Richard Stallman | Opinion | The G... - 0 views

  •  
    "The robust way to do that, the way that can't be set aside at the whim of a government, is to require systems to be built so as not to collect data about a person. The basic principle is that a system must be designed not to collect certain data, if its basic function can be carried out without that data."
dr tech

How private is your Gmail, and should you switch? | Gmail | The Guardian - 0 views

  •  
    "Most people are aware of the cookies that track them across the web, and the privacy-invading practices of Google search, but did you know Google's email service, Gmail, collects large amounts of data too? This was recently put into stark focus for iPhone users when Gmail published its app "privacy label" - a self-declared breakdown of the data it collects and shares with advertisers as part of a new stipulation on the Apple App Store."
dr tech

Norway suspends virus-tracing app due to privacy concerns | World news | The Guardian - 1 views

  •  
    "Launched in April, the smartphone app Smittestopp ("infection stop") was set up to collect movement data to help authorities trace the spread of Covid-19, and inform users if they had been exposed to someone carrying the virus. On Friday, the data agency Datatilsynet issued a warning that it would stop the Norwegian Institute of Public Health from handling data collected via Smittestopp."
dr tech

The Trump 2020 app is a voter surveillance tool of extraordinary power | MIT Technology... - 0 views

  •  
    "Data collection-as Parscale's comment suggested-is perhaps the most powerful thing the Trump 2020 app does. On signing up, users are required to provide a phone number for a verification code, as well as their full name, email address, and zip code. They are also highly encouraged to share the app with their existing contacts. This is part of a campaign strategy for reaching the 40 to 50 million citizens expected to vote for Trump's reelection: to put it bluntly, the campaign says it intends to collect every single one of these voters' cell-phone numbers. This strategy means the app also makes extensive permission requests, asking for access to location data, phone identity, and control over the handset's Bluetooth function."
dr tech

Amazon and the Rise of 'Luxury Surveillance' - The Atlantic - 0 views

  •  
    "It would be a bit glib-and more than a little clichéd-to call this some kind of technological dystopia. Actually, dystopia wouldn't be right, exactly: Dystopian fiction is generally speculative, whereas all of these items and services are real. At the end of September, Amazon announced a suite of tech products in its move toward "ambient intelligence," which Amazon's hardware chief, Dave Limp, described as technology and devices that slip into the background but are "always there," collecting information and taking action against it. This intense devotion to tracking and quantifying all aspects of our waking and non-waking hours is nothing new-see the Apple Watch, the Fitbit, social media writ large, and the smartphone in your pocket-but Amazon has been unusually explicit about its plans. The Everything Store is becoming an Everything Tracker, collecting and leveraging large amounts of personal data related to entertainment, fitness, health, and, it claims, security. It's surveillance that millions of customers are opting in to."
dr tech

Teachers in Denmark are using apps to audit their student's moods | MIT Technology Review - 0 views

  •  
    "In a Copenhagen suburb, a fifth-grade classroom is having its weekly cake-eating session, a common tradition in Danish public schools. While the children are eating chocolate cake, the teacher pulls up an infographic on a whiteboard: a bar chart generated by a digital platform that collects data on how they've been feeling. Organized to display the classroom's weekly "mood landscape," the data shows that the class averaged a mood of 4.4 out of 5, and the children rated their family life highly. "That's great!" the teacher exclaims, raising two thumbs up in the air. She then moves to an infographic on sleep hygiene. Here the data shows the students struggling, and the teacher invites them to think of ways to improve their sleeping habits. After briefly talking among themselves, the children suggest "less screen time at night," "meditation before sleep," and "having a hot bath." They collectively make a commitment to implement these strategies. At next week's cake time, they will be asked whether or not they followed through."
dr tech

TechScape: suspicious of TikTok? You're not alone | TikTok | The Guardian - 0 views

  •  
    "Perkins' report offers a dizzying list of data the TikTok app can access while it's running, including the device location, calendar, contacts, other running applications, wi-fi networks, phone number and even the SIM card serial number. He concludes: For the TikTok application to function properly, most of the access and device data collection is not required. This leads us to believe that the only reason this information has been gathered is for data harvesting. It is also notable that the device only needs to ask the user for permission to perform each of these actions once and then follow the user's preferences. The application however has a culture of persistent access or continuously asking for a decision reversal by the user. The hourly checking of location is also unnecessary. Finally, device mapping, external storage access, contacts and third-party applications data collection allows TikTok the ability to reimage the phone in the likeness of the original device."
dr tech

It looks like China did have access to U.S. TikTok user data | Mashable - 0 views

  •  
    "TikTok has already come under fire for its data collection, and this is just another step in yet another app collecting information on its users and doing whatever it pleases with it. It seems being online in 2022 is becoming more and more difficult to do while maintaining some semblance of privacy and data autonomy."
dr tech

Anonymous: the hacker collective that has declared cyberwar on Russia | Ukraine | The G... - 0 views

  •  
    "Cyber conflicts are fought in the shadows, but in the case of Russia's invasion of Ukraine, it is a group that calls itself Anonymous that has made the most public declaration of war. Late on Thursday the hacker collective tweeted from an account linked to Anonymous, @YourAnonOne, that it had Vladimir Putin's regime in its sights."
dr tech

Uber knows you're more likely to pay surge prices when your phone is dying - 0 views

  •  
    "Uber knows when your phone battery is running low because its app collects that information in order to switch into power-saving mode. But Chen swears Uber would never use that knowledge to gouge you out of more money. "We absolutely don't use that to kind of like push you a higher surge price, but it's an interesting kind of psychological fact of human behavior," Chen said. Uber's surge pricing uses a proprietary algorithm that accounts for how many users are hailing rides in an area at a given time. Customers are apparently less willing to believe that when the multiplier is a round number like 2.0 or 3.0, which seems more like it could have been arbitrarily made up by a human."
dr tech

Viral anime photo filter app Meitu sparks security and privacy concerns - 0 views

  •  
    "But when you dive into the code of Meitu, that's where things get interesting. Security researchers have jumped in to assess the photo editing app and found that it was indeed collecting information, including a phone's IMEI number (a handset's unique ID number), and sending it back to remote servers:"
dr tech

Your smartwatch is also recording your PIN - 0 views

  •  
    "With all the personal data it collects, your wrist-mounted wearable computer is almost definitely going to betray you at some point, whether that's a reminder to get up and do another 5,000 steps this afternoon or accidentally giving away your ATM PIN. According to a new paper, ominously titled "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN" it is surprisingly simple to determine your PIN or password by reverse-engineering motion sensor data from a smartwatch or fitness tracker."
dr tech

Cryptocurrency raider takes $60 million in digital cash - 0 views

  •  
    "A cryptocurrency is only as reliable as the technology that keeps it running, and Ethereum is learning this the hard way. An attacker has taken an estimated $60 million in Ethereum's digital money (Ether) by exploiting vulnerabilities in the Decentralized Autonomous Organization, an investment collective. The raider took advantage of a "recursive call" flaw in the DAO's code-based smart contracts, which administer the funds, to scoop up Ether many times in a single pass."
1 - 20 of 85 Next › Last »
Showing 20 items per page