Skip to main content

Home/ Digit_al Society/ Group items tagged control ITGS

Rss Feed Group items tagged

dr tech

David Cameron's favourite censorware is built and maintained by Huawei - Boing Boing - 0 views

  •  
    "Now the BBC reports that Homesafe was built by Huawei, the Chinese IT giant Huawei, founded by Ren Zhengfei, a former officer in China's People's Liberation Army. Huawei has been characterized by senior Western spooks as an arm of the Chinese intelligence service, conducting industrial espionage on its behalf. "
dr tech

Tech Terms Censored Online in China - 0 views

  •  
    "A new study released this month in First Monday uncovers more than 4,000 unique keywords censored over the last year and a half on Chinese instant messaging platforms. Focusing on Skype and the microblogging service Sina Weibo, the researchers cultivated their keyword list using reverse-engineering techniques such as packet sniffing, which captures and analyzes packets of data as they pass through a network."
dr tech

You Should Be Afraid of Artificial Intelligence - 0 views

  •  
    "Writing about Artificial Intelligence is a challenge. By and large, there are two directions to take when discussing the subject: focus on the truly remarkable achievements of the technology or dwell on the dangers of what could happen if machines reach a level of Sentient AI, in which self-aware machines reach human level intelligence). "
dr tech

Edward Snowden's secure email provider Lavabit forced to close by US security services ... - 0 views

  •  
    "The secure email service used by US whistleblower Edward Snowden has shut down rather than comply with orders from US security services - and is also legally barred from speaking out. The owner and operator of Lavabit, Ladar Levison, took the service down yesterday "for maintenance" before revealing today that the real reason was demands from US intelligence."
dr tech

Lavabit competitor Silent Circle shuts down its secure email service, destroys servers ... - 0 views

  •  
    "Silent Circle, a secure communications company founded by PGP creator Phil Zimmerman, has pre-emptively shut down its secure, encrypted email service and destroyed the servers so that it cannot be forced to reveal its customers' secrets to NSA spooks. "
dr tech

Lavabit founder has stopped using email: "If you knew what I know, you might not use it... - 0 views

  •  
    "After discussing the general absurdity and creepiness of not being allowed to freely criticize the government for the order they brought to his company, he concludes by saying that he's stopped using email altogether, and "If you knew what I know about email, you might not use it either." "
dr tech

Google introduces the biggest algorithm change in three years | Technology | theguardia... - 0 views

  •  
    "Not everything is so straightforward in Google land, as Google's chat protocols Hangouts and Talk, suffered a privacy issue on the 26 September that saw instant messages routed to unintended recipients."
julia barr

New York Asks Cellphone Carriers to Explain Why They Rejected Antitheft Switch - 0 views

  •  
    SAN FRANCISCO - New York State's top prosecutor is investigating why American cellphone carriers have yet to embrace antitheft software on Samsung smartphones, raising questions about possible coordination among the biggest carriers.
dr tech

Is technology bad for us? | Eva Wiseman | Life and style | The Observer - 0 views

  •  
    "So instead of switching off the internet, the conversation should be about how to change it. How to clarify what we're giving for what we take. And the responsibility should not be with young people, in their WiFi-reliant worlds - it should be with the massive corporations that profit from them. As with cigarette packets (their photos of messy lungs a stark reminder of the choice you're making), so should the internet be required to advertise its risks, to alert you to where your data is being held. Because this is not just somewhere we play. The internet is where we live."
dr tech

The US fears back-door routes into the net because it's building them too | Technology ... - 0 views

  •  
    "In a discussion of how to secure the "critical infrastructure" of the United States he described the phenomenon of compromised computer hardware - namely, chips that have hidden "back doors" inserted into them at the design or manufacturing stage - as "the problem from hell". And, he went on, "frankly, it's not a problem that can be solved"."
dr tech

One day soon Siri will know exactly what you want and when | Technology | The Observer - 0 views

  •  
    "From a computer science perspective, learning the behaviour of a single user is tough. This is the small data problem; unlike big data, where patterns and trends easily emerge, individual human beings can be unpredictable and can change behaviour, which is not helpful for pattern-hunting algorithms."
dr tech

What Is Net Neutrality & Why Should I Care? - 0 views

  •  
    "This effectively ensured that all South Koreans are forced to use Internet Explorer. To this day, OS X and Linux hasn't seen the same degree of adoption in Korea as it has in Europe, China and the United States. It also means that 75% of South Korean netizens use some variety of IE becauseā€¦ Well? They have to. It also means that many South Korean websites are fundamentally less advanced, less user friendly and much less secure than their Western counterparts. The cruel irony is that this government intervention effectively hamstrung an entire industry"
dr tech

Antivirus software is dead, says security expert at Symantec | Technology | theguardian... - 0 views

  •  
    "Dye told the Wall Street Journal that hackers increasingly use novel methods and bugs in the software of computers to perform attacks, resulting in about 55% cyberattacks going unnoticed by commercial antivirus software."
dr tech

Would a Google car sacrifice you for the sake of the many? - Medium - 0 views

  •  
    "But what will robot cars be programmed to do when there's lots of them on the roads, and they're networked with one another? We know what we as individuals would like. My car should take as its Prime Directive: "Prevent my passengers from coming to harm." But when the cars are networked, their Prime Directive well might be: "Minimize the amount of harm to humans overall." "
dr tech

Egypt's New Internet Surveillance System Remains Shrouded in Mystery - 0 views

  •  
    "Three months passed. Then, on Wednesday, anonymous government officials reportedly confirmed that a local company called Systems Engineering of Egypt (SEE or See Egypt) had won the bid to develop the system, which would allegedly allow the Egyptian government to sniff and analyze Internet and social media activity, as well as intercept Skype, WhatsApp and Viber conversations. "
dr tech

10 things you need to know about biometrics technology | Technology | The Observer - 0 views

  •  
    "Schools in the UK have experimented with fingerprinting pupils then using that data for tasks including library books and lunch payments. However, the European Commission has questioned the practice, including whether schools can make it compulsory and whether parents can challenge it in court."
dr tech

Algorithm knows you're drunk just by looking at you - Boing Boing - 0 views

  •  
    "built an algorithm that can determine with 90 percent accuracy whether a person is drunk or not based on an infrared image of his or her face."
dr tech

Google's 'mobilegeddon' will shake up search results | Technology | The Guardian - 0 views

  •  
    "Having a site that is friendly to mobile browsers on smartphones and tablets will be key from Tuesday as Google rolls out a new mobile-focused algorithm. The update to the way Google ranks search results will take into account how mobile-friendly a website is. This means companies without a good mobile website will suffer, as searchers on mobile will see sites with good mobile experiences ranked higher than those with no mobile or poor mobile sites."
amenosolja

How to Use USB Security Keys with your Google Account - 0 views

  •  
    "The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
dr tech

France's plan to legalize mass surveillance will give it the power to spy on the world ... - 0 views

  •  
    "After getting caught breaking its own laws with a mass surveillance program, the French government has introduced legislation that mirrors the NSA's rules, giving it the power to spy on all foreigners -- and any French people who happen to be swept up in the dragnet."
« First ‹ Previous 161 - 180 of 470 Next › Last »
Showing 20 items per page