Skip to main content

Home/ Digit_al Society/ Group items tagged key

Rss Feed Group items tagged

dr tech

Quantum computing: Game changer or security threat? - BBC News - 0 views

  •  
    "Quantum computing may offer potential benefits to the financial services industry, but it also poses risks. Banks rely on encryption to keep their transactions and customer data secure. This involves scrambling and unscrambling data using keys made of very large numbers - tens, if not hundreds, of digits long."
dr tech

The UK government's voice-over-IP standard is designed to be backdoored / Boing Boing - 0 views

  •  
    "GCHQ, the UK's spy agency, designed a security protocol for voice-calling called MIKEY-SAKKE and announced that they'll only certify VoIP systems as secure if they use MIKEY-SAKKE, and it's being marketed as "government-grade security." But a close examination of MIKEY-SAKKE reveals some serious deficiencies. The system is designed from the ground up to support "key escrow" -- that is, the ability of third parties to listen in on conversations without the callers knowing about it."
dr tech

Petya ransomware encryption system cracked - BBC News - 0 views

  •  
    "Petya ransomware victims can now unlock infected computers without paying. An unidentified programmer has produced a tool that exploits shortfalls in the way the malware encrypts a file that allows Windows to start up. In notes put on code-sharing site Github, he said he had produced the key generator to help his father-in-law unlock his Petya-encrypted computer."
dr tech

To regulate AI we need new laws, not just a code of ethics | Paul Chadwick | Opinion | ... - 0 views

  •  
    "Nemitz identifies four bases of digital power which create and then reinforce its unhealthy concentration in too few hands: lots of money, which means influence; control of "infrastructures of public discourse"; collection of personal data and profiling of people; and domination of investment in AI, most of it a "black box" not open to public scrutiny. The key question is which of the challenges of AI "can be safely and with good conscience left to ethics" and which need law. Nemitz sees much that needs law."
dr tech

Amazon's Clever Machines Are Moving From the Warehouse to Headquarters - 0 views

  •  
    "About two years ago the retail team lost another key task: negotiating with major brands and manufacturers the terms of popular sales on the site called "Lightning Deals." Common during the holidays as well as Mother's Day and Father's Day, they help move lots of inventory in a short period. Now, instead of calling their vendor manager at Amazon, the makers of handbags, smartphone accessories and other products simply logged into an Amazon portal that would determine if Amazon liked the deal being offered and the quantity it was willing to buy. No small talk. No give and take. Thousands of Amazon man hours spent forecasting demand, planning marketing strategies and negotiating deals was now handled by software, a major leap in efficiency."
dr tech

Together we can thwart the big-tech data grab. Here's how | John Harris | Opinion | The... - 0 views

  •  
    "Blockchain technology has also opened the way to new models whereby endless micropayments can be made in return for particular online services or content; and, if people voluntarily allow elements of their data to be used, rewards can flow the other way. Here perhaps lies the key to a system beyond the current, Google-led model, in which services appear to be free but the letting-go of personal data is the actual price."
dr tech

Basic common sense is key to building more intelligent machines | New Scientist - 0 views

  •  
    "At Imperial College London, Murray Shanahan and colleagues are working on a way around this problem using an old, unfashionable technique called symbolic AI. "Basically this meant an engineer labelled everything for the AI," says Shanahan. His idea is to combine this with modern machine learning. Symbolic AI never took off, because manually describing everything quickly proved overwhelming. Modern AI has overcome that problem by using neural networks, which learn their own representations of the world around them. "They decide what is salient," says Marta Garnelo, also at Imperial College."
dr tech

Zoom's Flawed Encryption Linked to China - 0 views

  •  
    "MEETINGS ON ZOOM, the increasingly popular video conferencing service, are encrypted using an algorithm with serious, well-known weaknesses, and sometimes using keys issued by servers in China, even when meeting participants are all in North America, according to researchers at the University of Toronto."
dr tech

Revealed: Tory 'dark' ads targeted voters' Facebook feeds in Welsh marginal seat | Poli... - 0 views

  •  
    "The Observer has obtained a series of Conservative party attack ads sent to voters last week in the key marginal constituency of Delyn, north Wales. Activists captured the ads using dummy Facebook accounts after finding that their own ad - encouraging young people to register to vote - were being "drowned out" by the Tory ads"
dr tech

Naomi Klein: how big tech helps India target climate activists | India | The Guardian - 0 views

  •  
    "Referred to in the Indian press variously as the "toolkit case", the "Greta toolkit", and the "toolkit conspiracy", the police's ongoing investigation of Ravi, along with fellow activists Nikita Jacob and Shantanu Muluk, centres on the contents of a social media guide that Thunberg tweeted to her nearly 5 million followers in early February. When Ravi was arrested, the Delhi police declared that she "is an editor of the Toolkit Google Doc & key conspirator in document's formulation & dissemination. She started WhatsApp Group & collaborated to make the Toolkit doc. She worked closely with them to draft the Doc.""
dr tech

Germany seizes US$60 million of bitcoin - now, where's the password? - CNA - 0 views

  •  
    "Bitcoin is stored on software known as a digital wallet that is secured through encryption. A password is used as a decryption key to open the wallet and access the bitcoin. When a password is lost the user cannot open the wallet. The fraudster had been sentenced to more than two years in jail for covertly installing software on other computers to harness their power to "mine" or produce bitcoin. When he went behind bars, his bitcoin stash would have been worth a fraction of the current value. The price of bitcoin has surged over the past year, hitting a record high of US$42,000 in January. It was trading at US$37,577 on Friday, according to cryptocurrency and blockchain website Coindesk."
dr tech

Opinion | They Stormed the Capitol. Their Apps Tracked Them. - The New York Times - 0 views

  •  
    "Surrendering our privacy to the government would be foolish enough. But what is more insidious is the Faustian bargain made with the marketing industry, which turns every location ping into currency as it is bought and sold in the marketplace of surveillance advertising. Now, one year later, we're in a very similar position. But it's far worse. A source has provided another data set, this time following the smartphones of thousands of Trump supporters, rioters and passers-by in Washington, D.C., on January 6, as Donald Trump's political rally turned into a violent insurrection. At least five people died because of the riot at the Capitol. Key to bringing the mob to justice has been the event's digital detritus: location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing."
dr tech

Doctors use algorithms that aren't designed to treat all patients equally - 0 views

  •  
    "The battle over algorithms in healthcare has come into full view since last fall. The debate only intensified in the wake of the coronavirus pandemic, which has disproportionately devastated Black and Latino communities. In October, Science published a study that found one hospital unintentionally directed more white patients than Black patients to a high-risk care management program because it used an algorithm to predict the patients' future healthcare costs as a key indicator of personal health. Optum, the company that sells the software product, told Mashable that the hospital used the tool incorrectly. "
yeehaw

Return to the moon? 3D printing with moondust could be the key to future lunar living -... - 0 views

  •  
    "Much of the excitement around 3D printing in space has focused on using it to construct buildings from lunar rock"
dr tech

Humour over rumour? The world can learn a lot from Taiwan's approach to fake news | Arw... - 0 views

  •  
    "Inoculating people from misinformation and tackling the "infodemic" are key to fighting the coronavirus. Tang, Taiwan's first transgender government minister and a self-described "civic hacker", has done this by fostering digital democracy: using technology to encourage civic participation and build consensus. Tang has also quashed faked news by implementing a 2-2-2 "humour over rumour" strategy. A response to misinformation is provided within 20 minutes, in 200 words or fewer, alongside two fun images. Early in the pandemic, for example, people were panic-buying toilet paper because of a rumour that it was being used to manufacture face masks; supplies were running out. So, the Taiwanese premier, Su Tseng-chang, released a cartoon of him wiggling his bum, with a caption saying: "We only have one pair of buttocks." It sounds silly, but it went viral. Humour can be far more effective than serious fact-checking."
dr tech

Facebook's botched Australia news ban hits health departments, charities and its own pa... - 0 views

  •  
    "While the ban was only meant to target Australian news publishers, dozens of pages run by key government agencies, community pages, union pages, charity organisations and politicians were also blocked for several hours."
dr tech

Full Page Reload - 0 views

  •  
    "These experiments in computational creativity are enabled by the dramatic advances in deep learning over the past decade. Deep learning has several key advantages for creative pursuits. For starters, it's extremely flexible, and it's relatively easy to train deep-learning systems (which we call models) to take on a wide variety of tasks."
dr tech

Yann LeCun and Yoshua Bengio: Self-supervised learning is the key to human-level intell... - 0 views

  •  
    "LeCun argues that even self-supervised learning and learnings from neurobiology won't be enough to achieve artificial general intelligence (AGI), or the hypothetical intelligence of a machine with the capacity to understand or learn from any task. That's because intelligence - even human intelligence - is very specialized, he says. "AGI does not exist - there is no such thing as general intelligence," said LeCun. "We can talk about rat-level intelligence, cat-level intelligence, dog-level intelligence, or human-level intelligence, but not artificial general intelligence.""
dr tech

FBI warns of look-alike election sites that could mess with voting - 1 views

  •  
    "Dubbed typosquatting, the idea is simple (if devious): A hacker registers a domain that is close enough to a real site, like yourbanknarne.com, and puts up a clone of yourbankname.com. The unsuspecting victim goes to the wrong site by mistake, and enters their personal banking information. In doing so, they have inadvertently handed the digital keys to their account to a hacker. "
dr tech

Scientists identify key conditions to set up a creative 'hot streak' | Artificial intel... - 0 views

  •  
    "They then analysed how diverse the individuals' work was at different points in their careers. This was assessed using an artificial intelligence system that was trained, in the case of art, to "recognise" different styles by features such as the brush strokes, shapes and objects in a piece, while in the case of film, it was trained to classify a director's work based on plot and cast information. For science, the system identified different research topics based on the papers cited within a researcher's publications."
‹ Previous 21 - 40 of 63 Next › Last »
Showing 20 items per page