Skip to main content

Home/ Digit_al Society/ Group items tagged documents

Rss Feed Group items tagged

dr tech

Snowden Docs: British Spies Used DDoS Attacks Against Anonymous - 0 views

  •  
    "The new documents reveal that a GCHQ unit dubbed the Joint Threat Research Intelligence Group, or JTRIG, launched an operation called Rolling Thunder against the hacker collective in 2011. That operation included using DDoS attacks as well as malware to slow down the hackers and later identify them, as first reported by as reported by NBC News on Wednesday."
dr tech

How Much Does Google Really Know About You? - 0 views

  •  
    "Taken as a whole, the information Google collects about users is shockingly complete. The company can mine your emails and Drive documents, track your browsing history, track the videos you watch on YouTube, obtain your WiFi passwords and much more."
dr tech

Rubbish city: China's e-waste epidemic - in pictures | Art and design | theguardian.com - 0 views

  •  
    "Mounds of decaying air conditioners, piles of abandoned electronics and tenements built among the trash … Reuters photographer Kim Kyung-Hoon has documented the lives of residents of Dongxiaokou, a village outside Beijing and home to a large electronic-waste recycling centre, for a look at life amid the digital ruins"
dr tech

The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block - 0 views

  •  
    "The type of tracking, called canvas fingerprinting, works by instructing the visitor's web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it."
dr tech

NSA Building Computer to Break 'Nearly Every Kind of Encryption' [REPORT] - 0 views

  •  
    "The agency has invested nearly $80 million to build a computer that could break "nearly every kind of encryption," according to a Washington Post report published online Thursday. Based on documents provided by former NSA contractor Edward Snowden, the Post reports the NSA is racing to build a "cryptologically useful quantum computer" research program called "Penetrating Hard Targets.""
dr tech

Telcos' anti-Net Neutrality argument may let the MPAA destroy DNS - Boing Boing - 0 views

  •  
    "A leaked MPAA document discloses the studios' lobbyists' plan to force ISPs to give it control over DNS (one of the key goals in SOPA), by using the arguments raised in the decade-old Brand X case, where the ISPs said that they were more than a "telecommunications service" and were, instead, an "information service" because they provided DNS (among other things)."
dr tech

Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept - 0 views

  •  
    "The "March 2013 Watchlisting Guidance," a 166-page document issued last year by the National Counterterrorism Center, spells out the government's secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings."
dr tech

Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset - Research - 0 views

  •  
    "The most well-documented of these deals with the hash function used to "anonymize" the license and medallion numbers. A bit of lateral thinking from one civic hacker and the data was completely de-anonymized. This data can now be used to calculate, for example, any driver's annual income. More disquieting, though, in my opinion, is the privacy risk to passengers. With only a small amount of auxiliary knowledge, using this dataset an attacker could identify where an individual went, how much they paid, weekly habits, etc. I will demonstrate how easy this is to do in the following section."
dr tech

"Privacy Not Included": Mozilla's guide to insecure, surveillant gadgets to avoid / Boi... - 0 views

  •  
    ""Privacy Not Included" is Mozilla's Christmas shopping (anti)-guide to toys and gadgets that spy on you and/or make stupid security blunders, rated by relative "creepiness," from the Nintendo Switch (a little creepy) to the Fredi Baby monitor (very creepy!). Mozilla's reviews include a detailed rationale for each ranking, including whether the product includes encryption, whether it forces a default password change, how easy to understand the documentation is, whether it shares your data for "unexpected reasons," whether it has known security vulnerabilities, whether it has parental controls and more."
dr tech

Invisible, targeted infrared light can fool facial recognition software into thinking a... - 0 views

  •  
    "documenting a tool for fooling facial recognition software by shining hat-brim-mounted infrared LEDs on the user's face, projecting CCTV-visible, human-eye-invisible shapes designed to fool the face recognition software. "
dr tech

An algorithm for detecting face-swaps in videos / Boing Boing - 0 views

  •  
    "So they trained a deep-learning neural net on tons of examples of deepfaked videos, and produced a model that's better than any previous automated technique at spotting hoaxery. (Their paper documenting the work is here.)"
dr tech

TikTok 'tried to filter out videos from ugly, poor or disabled users' | Technology | Th... - 0 views

  •  
    "TikTok moderators were told to suppress videos from users who appeared too ugly, poor or disabled, as part of the company's efforts to curate an aspirational air in the videos it promotes, according to new documents published by the Intercept."
dr tech

India's controversial national ID scheme leaks fraud-friendly data for 130,000,000 peop... - 0 views

  •  
    "Now, in a new report published yesterday by researchers from the Bangalore-based think-tank the Centre for Internet and Society, Amber Sinha and Srinivas Kodali comprehensively document the many ways in which Aadhaar is leaking, tracking the #aadhaarleaks hashtag, which has revealed potentially compromising information on more than 130,000,000 people, largely material that is intentionally available through official portals."
dr tech

Age verification in three different ways, wherever you need it * Yoti - 0 views

  •  
    "How we verify your users We use a combination of AI technology, liveness anti-spoofing and document authenticity checks so you can be confident in the age of your customers."
dr tech

Fresh Cambridge Analytica leak 'shows global manipulation is out of control' | UK news ... - 0 views

  •  
    ""The documents reveal a much clearer idea of what actually happened in the 2016 US presidential election, which has a huge bearing on what will happen in 2020. It's the same people involved who we know are building on these same techniques," she said."
dr tech

Why Printers Add Secret Tracking Dots - 0 views

  •  
    "At that point, experts began taking a closer look at the document, now publicly available on the web. They discovered something else of interest: yellow dots in a roughly rectangular pattern repeated throughout the page. They were barely visible to the naked eye, but formed a coded design. After some quick analysis, they seemed to reveal the exact date and time that the pages in question were printed: 06:20 on 9 May, 2017 - at least, this is likely to be the time on the printer's internal clock at that moment. The dots also encode a serial number for the printer. "
dr tech

Leaked Documents Show How China's Army of Paid Internet Trolls Helped Censor the Corona... - 0 views

  •  
    ""China has a politically weaponized system of censorship; it is refined, organized, coordinated and supported by the state's resources," said Xiao Qiang, a research scientist at the School of Information at the University of California, Berkeley, and the founder of China Digital Times. "It's not just for deleting something. They also have a powerful apparatus to construct a narrative and aim it at any target with huge scale." "This is a huge thing," he added. "No other country has that." "
yeehaw

Apple supplier Lens Technology used forced Uighur laborers - The Washington Post - 0 views

  •  
    "One of the oldest and most well-known iPhone suppliers has been accused of using forced Muslim labor in its factories, according to documents uncovered by a human rights group, adding new scrutiny to Apple's human rights record in China."
dr tech

Bhutan taps Papilon to create biometric database for law enforcement | Biometric Update - 0 views

  •  
    "The biometric identification system will be used not only to identify criminals, DCRC said, but also to identify fingerprints of contested documents from various agencies such as courts, the National Land Commission and Anti-Corruption Commission."
dr tech

Brazilian Workers Paid 70 Cents an Hour to Transcribe TikToks - 1 views

  •  
    "He quit the same way he'd been given the job: through a WhatsApp message. He had neither a contract nor any documents regulating his employment. For Felipe, the plan to make a little quick money became a hellish experience. With TikTok's short-form video format, much of the audio that needed transcription was only a few seconds long. The payment, made in U.S. dollars, was supposed to be $14 for every hour of audio transcribed. Amassing the secondslong clips into an hour of transcribed audio took Felipe about 20 hours. That worked out to only about 70 cents per hour - or 3.85 Brazilian reals, about three-quarters of Brazil's minimum wage."
‹ Previous 21 - 40 of 60 Next ›
Showing 20 items per page