Skip to main content

Home/ Digit_al Society/ Group items tagged controlling

Rss Feed Group items tagged

dr tech

"Privacy Not Included": Mozilla's guide to insecure, surveillant gadgets to avoid / Boi... - 0 views

  •  
    ""Privacy Not Included" is Mozilla's Christmas shopping (anti)-guide to toys and gadgets that spy on you and/or make stupid security blunders, rated by relative "creepiness," from the Nintendo Switch (a little creepy) to the Fredi Baby monitor (very creepy!). Mozilla's reviews include a detailed rationale for each ranking, including whether the product includes encryption, whether it forces a default password change, how easy to understand the documentation is, whether it shares your data for "unexpected reasons," whether it has known security vulnerabilities, whether it has parental controls and more."
dr tech

Singapore healthcare provider breached, personal records of 1.5m people - including the... - 0 views

  •  
    "FROM THE BOING BOING SHOP   FOLLOW US Twitter / Facebook / RSS Singhealth, a Singaporean public health service, suffered the worst breach in Singaporean history, losing control of 1.5 million peoples' data; included in the breach was prescription data on 160,000 people, including Singapore's prime minister, Lee Hsien Loong."
dr tech

Why Momo Challenge panic won't go away - 0 views

  •  
    ""Urban legends are projections of society's anxieties, hopes, fears, and worries," says Blank. "In today's society we have societal anxiety about what our kids are doing on the internet, the amount of control and information that's available to kids nowadays, societal fears about cyberbullying and how people are managing their mental health online, especially for kids." "The Momo story reflects that anxiety of what is it our kids are doing online," continued Blank."
dr tech

Paralyzed Patients Can Now Control Android Tablets With Their Minds - 0 views

  •  
    "This month, in an open-access study published in PLOS One, a team reported the first brain implant system that lets patients use their thoughts to navigate an off-the-shelf Android tablet. Compared to previous generations, this system doesn't require training-for example, learning to type on a different, non-QWERTY keyboard-or specialized interface equipment. With just her thoughts, T6 was able to send emails, chat with other paralyzed patients in the trial, Google random questions, and even shop on Amazon. For the first time since she became paralyzed, T6 regained access to the entire commercially-available Google Play ecosystem and the digital world."
dr tech

Inside the City That Spies on You - Featured Stories - Medium - 0 views

  •  
    "Many of the countries buying into that technology, however, still lack the institutions and the legislative oversight to keep it under control. In young, volatile democracies especially, the lure of technological greatness is already coming at a great social cost. "The thing with technology is that it kind of becomes irresistible," says Professor Webster. "It's very tempting when it can do something for us more efficiently. But just because the technology can do something it doesn't mean we should use it.""
dr tech

'Surveillance capitalism': critic urges Toronto to abandon smart city project | Cities ... - 0 views

  •  
    ""As we have made clear, we believe that data collected in public space must be overseen and closely controlled by an independent and publicly accountable Data Trust, not Sidewalk Labs, Google, or any private company," said spokesperson Keerthana Rang."
dr tech

Tech firms can't keep our data forever: we need a Digital Expiry Date | Opinion | The G... - 0 views

  •  
    "This Digital Expiry Date offers companies the benefits of getting your data, personalizing results and still making profits, while putting some control in the user's hands. You will not have to worry about governments or companies in the future mishandling years' worth of information - which would limit the damage they could do. A Digital Expiry Date would maintain online innovation and profitability, while helping to prevent any future privacy disasters."
dr tech

Efail: can email be saved? / Boing Boing - 0 views

  •  
    "The revelation that encrypted email is vulnerable to a variety of devastating attacks (collectively known as "Efail") has set off a round of soul-searching by internet security researchers and other technical people -- can we save email? One way to think about Efail is that it was caused by a lack of central coordination and control over email-reading programs -- the underlying protocols are strong and robust, but they can be implemented in ways that create real problems. In particular, the ability to show HTML inside a message makes email very hard to secure:"
dr tech

Couple's Amazon Device Recorded Private Conversation, Sent To Friend « CBS Bo... - 0 views

  •  
    ""The person on the other line said, 'unplug your Alexa devices right now,'" Danielle told KIRO. "'You're being hacked.'" The couple had reportedly placed Amazon devices in every room of their house to control the heat, lights, and security system. All of the gadgets were pulled out after their colleague proved they had received the unauthorized recording."
dr tech

Rise of the machines: has technology evolved beyond our control? | Books | The Guardian - 0 views

  •  
    "In October 2016, algorithms reacted to negative news headlines about Brexit negotiations by sending the pound down 6% against the dollar in under two minutes, before recovering almost immediately. Knowing which particular headline, or which particular algorithm, caused the crash is next to impossible. When one haywire algorithm started placing and cancelling orders that ate up 4% of all traffic in US stocks in October 2012, one commentator was moved to comment wryly that "the motive of the algorithm is still unclear"."
dr tech

Dressing for the Surveillance Age | The New Yorker - 0 views

  •  
    "Apart from biases in the training databases, it's hard to know how well face-recognition systems actually perform in the real world, in spite of recent gains. Anil Jain, a professor of computer science at Michigan State University who has worked on face recognition for more than thirty years, told me, "Most of the testing on the private venders' products is done in a laboratory environment under controlled settings. In real practice, you're walking around in the streets of New York. It's a cold winter day, you have a scarf around your face, a cap, maybe your coat is pulled up so your chin is partially hidden, the illumination may not be the most favorable, and the camera isn't capturing a frontal view.""
dr tech

The Coming Software Apocalypse - The Atlantic - 0 views

  •  
    "It's been said that software is "eating the world." More and more, critical systems that were once controlled mechanically, or by people, are coming to depend on code. This was perhaps never clearer than in the summer of 2015, when on a single day, United Airlines grounded its fleet because of a problem with its departure-management system; trading was suspended on the New York Stock Exchange after an upgrade; the front page of The Wall Street Journal's website crashed; and Seattle's 911 system went down again, this time because a different router failed. The simultaneous failure of so many software systems smelled at first of a coordinated cyberattack"
dr tech

Mind Control Isn't Sci-Fi Anymore | WIRED - 0 views

  •  
    "He sits down at a computer keyboard, fires up his monitor, and begins typing. After a few lines of text, he pushes the keyboard away, exposing the white surface of a conference table in the midtown Manhattan headquarters of his startup. He resumes typing. Only this time he is typing on…nothing. Just the flat tabletop. Yet the result is the same: The words he taps out appear on the monitor."
dr tech

Supercomputer shows doubling masks offers little help preventing viral spread -- Scienc... - 0 views

  •  
    "Japanese supercomputer simulations showed that wearing two masks gave limited benefit in blocking viral spread compared with one properly fitted mask. The findings in part contradict recent recommendations from the U.S. Centers of Disease Control and Prevention (CDC) that two masks were better than one at reducing a person's exposure to the coronavirus. Researchers used the Fugaku supercomputer to model the flow of virus particles from people wearing different types and combinations of masks, according to a study released on Thursday by research giant Riken and Kobe University."
dr tech

The Big Read: Floundering in digital wave, older hawkers could call it quits - taking a... - 0 views

  •  
    "THE DIGITAL DIVIDE The fear of losing control aside, many hawkers also have to deal with another major challenge: Digital technology, which entails some basic competence in logic and literacy - much to the horror of those who only received some primary school education, typical of the older generation of hawkers."
dr tech

Part human, part machine: is Apple turning us all into cyborgs? | Technology | The Guar... - 0 views

  •  
    "But whether we trust Apple might be beside the point, if we don't yet know whether we can trust ourselves. It took eight years from the launch of the iPhone for screen time controls to follow. What will human interaction look like eight years after smartglasses become ubiquitous? Our cyborg present sneaked up on us as our phones became glued to our hands. Are we going to sleepwalk into our cyborg future in the same way?"
dr tech

Microsoft productivity score feature criticised as workplace surveillance | Microsoft |... - 0 views

  •  
    ""Employers are increasingly exploiting metadata logged by software and devices for performance analytics and algorithmic control," Christl added. "MS is providing the tools for it. Practices we know from software development (and factories and call centres) are expanded to all white-collar work.""
dr tech

Twitter hack: accounts of prominent figures, including Biden, Musk, Obama, Gates and Ka... - 0 views

  •  
    "Twitter suffered a major security breach on Wednesday that saw hackers take control of the accounts of major public figures and corporations, including Joe Biden, Barack Obama, Elon Musk, Bill Gates, Jeff Bezos and Apple. The company confirmed the breach Wednesday evening, more than six hours after the hack began, and attributed it to a "coordinated social engineering attack" on its own employees that enabled the hackers to access "internal systems and tools"."
dr tech

The Trump 2020 app is a voter surveillance tool of extraordinary power | MIT Technology... - 0 views

  •  
    "Data collection-as Parscale's comment suggested-is perhaps the most powerful thing the Trump 2020 app does. On signing up, users are required to provide a phone number for a verification code, as well as their full name, email address, and zip code. They are also highly encouraged to share the app with their existing contacts. This is part of a campaign strategy for reaching the 40 to 50 million citizens expected to vote for Trump's reelection: to put it bluntly, the campaign says it intends to collect every single one of these voters' cell-phone numbers. This strategy means the app also makes extensive permission requests, asking for access to location data, phone identity, and control over the handset's Bluetooth function."
dr tech

Facebook and Instagram ban antisemitic conspiracy theories and blackface | Technology |... - 0 views

  •  
    "Conspiracy theories about Jewish people "controlling the world" are to be explicitly banned from Facebook and Instagram for the first time, after the company announced an update to its content policies on Tuesday. The ban on "certain kinds of implicit hate speech" would also include content depicting blackface, Facebook's vice-president of integrity, Guy Rosen, said."
« First ‹ Previous 61 - 80 of 492 Next › Last »
Showing 20 items per page