Skip to main content

Home/ Digit_al Society/ Group items tagged design

Rss Feed Group items tagged

dr tech

NSA and GCHQ target Tor network that protects anonymity of web users | World news | The... - 0 views

  •  
    "The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
dr tech

Who protects reputation for the Bolibourgeoisie? | Setty's notebook - 0 views

  •  
    " Some search engines, including Bing and DuckDuckGo, give an entire first page of spurious results (see image in upper left). Most of the results are for pages obviously designed to obfuscate, throwing banal dust into the eyes of the search engine and leaving a casual searcher with the incorrect impression that there's nothing to see here. "
dr tech

The US fears back-door routes into the net because it's building them too | Technology ... - 0 views

  •  
    "In a discussion of how to secure the "critical infrastructure" of the United States he described the phenomenon of compromised computer hardware - namely, chips that have hidden "back doors" inserted into them at the design or manufacturing stage - as "the problem from hell". And, he went on, "frankly, it's not a problem that can be solved"."
dr tech

Heartbleed - What Can You Do To Stay Safe? - 0 views

  •  
    "Naturally, you should do this - but be aware that this situation presents an ideal opportunity to phishers to start sending fake emails, complete with embedded links to the "change password" page - in reality, a website designed to harvest your details."
dr tech

Hundreds of US police forces have distributed malware as "Internet safety software" - B... - 0 views

  •  
    "But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
dr tech

Want To Plant One Billion Trees In A Single Year? Try Drones.  | GOOD - 0 views

  •  
    "First, the drones engage in aerial mapping to create detailed three-dimensional terrain models. They then begin "precision planting" by shooting seed pods that have been "pregerminated and covered in a nutritious hydrogel" into the soil. Finally, drones monitor tree growth over the course of a number of "planting audits," designed to track the reforrestation progress. "
dr tech

A Beacon System to Guide the Blind Through London’s Subways | GOOD - 0 views

  •  
    "This challenge inspired the Royal London Society for Blind People to team up with design firm Ustwo and create Wayfindr, a Bluetooth enabled beacon system to guide people who are blind or visually impaired through the London Underground."
dr tech

US military aims to create cyborgs by connecting humans to computers | Technology | The... - 0 views

  •  
    "The US government is researching technology that it hopes will turn soldiers into cyborgs, allowing them to connect directly to computers. The US military's Defense Advanced Research Projects Agency (Darpa) has unveiled a research programme called Neural Engineering System Design (NESD) which aims to develop an implantable neural interface, connecting humans directly to computers."
dr tech

Finally, a Machine That Can Finish Your Sentence - The New York Times - Medium - 0 views

  •  
    ""Each time we build new ways of doing something close to human level, it allows us to automate or augment human labor," said Jeremy Howard, founder of Fast.ai, an independent lab based in San Francisco that is among those at the forefront of this research. "This can make life easier for a lawyer or a paralegal. But it can also help with medicine." It may even lead to technology that can - finally - carry on a decent conversation. But there is a downside: On social media services like Twitter, this new research could also lead to more convincing bots designed to fool us into thinking they are human, Howard said."
dr tech

To a man with an algorithm all things look like an advertising opportunity | Arwa Mahda... - 0 views

  •  
    "This affects all of us every single day. When the algorithms that govern increasingly large parts of our lives have been designed almost exclusively by young bro-grammers with homogeneous experiences and worldviews, those algorithms are going to fail significant sections of society. A heartbreaking example of this is Gillian Brockell's experience of continuing to get targeted by pregnancy-related ads on Facebook after the stillbirth of her son. Brockell, a Washington Post journalist, recently made headlines when she tweeted an open letter to big tech companies, imploring them to think more carefully about how they target parenting ads."
dr tech

The Downfall of Computers - David Koff - Medium - 0 views

  •  
    "These exploits are based on chip engineering flaws, not on software flaws. Apple, Google, Abode, Microsoft, and other software companies didn't write poor software or bad Operating Systems to cause these problems to occur. Rather, the chip manufacturers - Intel, AMD and ARM - designed and then engineered computer chips with flaws built into them. Once discovered, those flaws allow the Meltdown and Spectre exploits to be run. Worse, these chips have been sold with consumer computers, servers and mobile devices since 1995. so the impact is, potentially, both personal and global in scope."
dr tech

Major vulnerability in 5G means that anyone with $500 worth of gear can spy on a wide a... - 0 views

  •  
    "That's why it was so important that the new 5G mobile protocol be designed to foil IMSI catchers, and why the 3rd Generation Partnership Project, or 3GPP (the body standardizing 5G) updated the Authentication and Key Agreement (AKA) to resist IMSI catching techniques."
dr tech

the world wide web turns 30 today and its inventor is worried for the future - 0 views

  •  
    "he outlines three sources of dysfunction - 'deliberate, malicious intent, such as state-sponsored hacking and attacks, criminal behaviour, and online harassment'; 'system design' which has created 'perverse incentives where user value is sacrificed, such as ad-based revenue models that commercially reward clickbait'; and the 'viral spread of misinformation'. he also calls attention to the 'unintended negative consequences' of the web, which he said had led to 'the outraged and polarised tone and quality of online discourse'."
dr tech

DARPA Is Building a $10 Million, Open Source, Secure Voting System - Motherboard - 0 views

  •  
    "Now they might finally get this thanks to a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design and build a secure voting system that it hopes will be impervious to hacking."
dr tech

Invisible, targeted infrared light can fool facial recognition software into thinking a... - 0 views

  •  
    "documenting a tool for fooling facial recognition software by shining hat-brim-mounted infrared LEDs on the user's face, projecting CCTV-visible, human-eye-invisible shapes designed to fool the face recognition software. "
dr tech

A radical proposal to keep your personal data safe | Richard Stallman | Opinion | The G... - 0 views

  •  
    "The robust way to do that, the way that can't be set aside at the whim of a government, is to require systems to be built so as not to collect data about a person. The basic principle is that a system must be designed not to collect certain data, if its basic function can be carried out without that data."
dr tech

Why 3D virtual learning fell flat | Society | Subject areas | Publishing and editorial ... - 0 views

  •  
    "Second Life, Thinking Worlds, Unity3D and others were all making inroads into the realm of corporate learning and there was a buzz about it in the L&D market, which, at the time, had a reputation for churning out spectacularly boring and poorly designed compliance-based eLearning. One major mobile phone network with whom I worked back in 2008 had a vision of enlivening their learner experience by providing a 3D avatar-based portal into their learning management system, which at the time hosted solidly 2D page-turner eLearning of a very pedestrian nature."
dr tech

"The Biology of Disinformation," a paper by Rushkoff, Pescovitz, and Dunagan / Boing Boing - 0 views

  •  
    "Already, artificially intelligent software can evolve false political and social constructs highly targeted to sway specific audiences. Users find themselves in highly individualized, algorithmically determined news and information feeds, intentionally designed to: isolate them from conflicting evidence or opinions, create self-reinforcing feedback loops of confirmation, and untether them from fact-based reality. And these are just early days. If memes and disinformation have been weaponized on social media, it is still in the musket stage."
dr tech

Mongolia is changing all its addresses to What3Words' three-word phrases - Quartz - 0 views

  •  
    "The system is designed to solve the an often-ignored problem of 75% of the earth's population, an estimated 4 billion people, who have no address for mailing purposes, making it difficult to open a bank account, get a delivery, or be reached in an emergency."
‹ Previous 21 - 40 of 124 Next › Last »
Showing 20 items per page