Skip to main content

Home/ Digit_al Society/ Group items tagged monitoring

Rss Feed Group items tagged

dr tech

ExpressVPN's Research on Phone Location Tracking | ExpressVPN - 0 views

  •  
    "In these cases, we call the SDKs "trackers" or "tracker SDKs." We follow the lead of the Electronic Frontier Foundation, Fight for the Future, and other digital rights organizations and use the term broadly: "Trackers" encompasses traditional advertisement surveillance, behavioral, and location monitoring. Legitimate uses may include user feedback mechanisms, telemetry, and crash reporters. App developers have decided to include tracker SDKs in apps for a variety of reasons, and we do not categorize all usage of trackers as malicious or condemn the app authors. Additionally, given the complexity and pace of software development, some developers may not be aware that trackers are in their app or may not know the full implications of bundling such code before publishing."
dr tech

Welcome to dystopia: getting fired from your job as an Amazon worker by an app | Jessa ... - 0 views

  •  
    "Instead, the robots are here not to replace this lower tier of underpaid and undervalued work. They are here to smugly sit in the middle, monitoring and surveilling us, hiring and firing us. Amazon has recently replaced its middle management and human resources workers with artificial intelligence to determine when a worker has outlived their usefulness and needs to be let go. There is no human to appeal to, no negotiating with a bot. "
dr tech

Amazon's Vector power smart meter deal puts 'how you live your life' on web giant's ser... - 0 views

  •  
    ""This is all identifiable in the smart meter data - it has literally your entire the pattern of life and behaviour through just monitoring where you live and what you do in your home." Vector and AWS say the data is anonymised and cannot be linked back to customers. Privacy advocates dispute that, because the way some customers use power in certain locations will easily identify them. For the companies, it's a tightrope: the more anonymous the data is made, the less value it has overall."
dr tech

Tell Zoom to protect all users from police surveillance, hackers, and cyber-criminals -... - 0 views

  •  
    "Zoom is not encrypting calls for free accounts with end to end encryption so they can provide law enforcement and the Federal Bureau of Investigation with content from those calls. As protesters demonstrate in the wake of the murder of George Floyd, law enforcement has deployed a wide range of surveillance tools to monitor and track protesters-including facial recognition software and contact tracing technology. They are working to get information from every source possible to disrupt and even arrest people involved with the protests."
dr tech

Amazon's driver monitoring app is an invasive nightmare - 0 views

  •  
    "Mentor is made by eDriving, which describes the app on its website as a "smartphone-based solution that collects and analyzes driver behaviors most predictive of crash risk and helps remediate risky behavior by providing engaging, interactive micro-training modules delivered directly to the driver in the smartphone app." But CNBC talked to drivers who said the app mostly invades their privacy or miscalculates dangerous driving behavior. One driver said even though he didn't answer a ringing phone, the app docked points for using a phone while driving. Another worker was flagged for distracted driving at every delivery stop she made. The incorrect tracking has real consequences. ranging from restricted payouts and bonuses to job loss. "
dr tech

Encryption Lava Lamps - San Francisco, California - Atlas Obscura - 1 views

  •  
    "As the lava lamps bubble and swirl, a video camera on the ceiling monitors their unpredictable changes and connects the footage to a computer, which converts the randomness into a virtually unhackable code.  Why use lava lamps for encryption instead of computer-generated code? Since computer codes are created by machines with relatively predictable patterns, it is entirely possible for hackers to guess their algorithms, posing a security risk. Lava lamps, on the other hand, add to the equation the sheer randomness of the physical world, making it nearly impossible for hackers to break through."
dr tech

$10bn of precious metals dumped each year in electronic waste, says UN | Environment | ... - 0 views

  •  
    "A record 54m tonnes of "e-waste" was generated worldwide in 2019, up 21% in five years, the UN's Global E-waste Monitor report found. The 2019 figure is equivalent to 7.3kg for every man, woman and child on Earth, though use is concentrated in richer nations. The amount of e-waste is rising three times faster than the world's population, and only 17% of it was recycled in 2019."
dr tech

Islamic State: Giant library of group's online propaganda discovered - BBC News - 0 views

  •  
    ""The attraction for jihadists of these platforms is that the developers of these decentralised platforms have no way of acting against content that is stored on user-operated servers or content that's shared across a dispersed network of users, " BBC Monitoring senior jihadi specialist Mina Al-Lami said. "It's really all about privacy, freedom and encryption."
dr tech

Online Harms: Encryption under attack | Open Rights Group - 0 views

  •  
    "Service providers, including many ORG members, will be required to do this through the imposition of a "duty of care" - a concept awkwardly borrowed from health & safety - which will require them to monitor the integrity of their services not by objective technical standards, but by subjective "codes of practice" on both illegal and legal content. Although the framework has been drawn up with large American social media platforms in mind, it would apply to any site or service with UK users which hosts user-generated content. A blog with comments will be fair game. An app with user reviews will be fair game. "
dr tech

'Being young' leads to detention in China's Xinjiang region | World news | The Guardian - 0 views

  •  
    "The IJOP is a massive database combining personal data scooped from automated online monitoring and information manually entered into a bespoke app by officials. It includes information ranging from people's physical characteristics to the colour of their car and their personal preference of using the front or back door to enter their house, as well as software they use online and their regular contacts."
aren01

The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 1 views

  •  
    "The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
  •  
    "Increasing numbers of implantable medical devices are now gaining internet connectivity, giving doctors the ability to monitor patients health remotely, and even update the devices to tweak a treatment plan. Unfortunately, that flexibility offers a way for hackers to hijack that hardware, and even potentially make changes to the way the devices work. While so far no attacks have been successful, proof-of-concept attacks have been available for years"
dr tech

Bosses turn to 'tattleware' to keep tabs on employees working from home | Technology | ... - 0 views

  •  
    "Remote surveillance software like Sneek, also known as "tattleware" or "bossware", represented something of a niche market pre-Covid. But that all changed in March 2020, as employers scrambled to pull together work-from-home policies out of thin air. In April last year, Google queries for "remote monitoring" were up 212% year-on-year; by April this year, they'd continued to surge by another 243%."
dr tech

US schools gave kids laptops during the pandemic. Then they spied on them | Jessa Crisp... - 1 views

  •  
    "The problem is, a lot of those electronics were being used to monitor students, even combing through private chats, emails and documents all in the name of protecting them. More than 80% of surveyed teachers and 77% of surveyed high school students told the CDT that their schools use surveillance software on those devices, and the more reliant students are on those electronics, unable to afford supplementary phones or tablets, the more they are subjected to scrutiny."
dr tech

'Voice of April': Chinese netizens get creative to keep censored film on social media |... - 0 views

  •  
    "A virtual protest has taken place on China's heavily monitored social media platforms, where netizens took turns to keep a censored video called the Voice of April alive and overwhelm censors."
dr tech

Could AI save the Amazon rainforest? | Artificial intelligence (AI) | The Guardian - 0 views

  •  
    "The model takes a two-pronged approach. First, it focuses on trends present in the region, looking at geostatistics and historical data from Prodes, the annual government monitoring system for deforestation in the Amazon. Understanding what has happened can help make predictions more precise. When already deforested areas are recent, this indicates gangs are operating in the area, so there's a higher risk that nearby forest will soon be wiped out. Second, it looks at variables that put the brakes on deforestation - land protected by Indigenous and quilombola (descendent of rebel slaves) communities, and areas with bodies of water, or other terrain that doesn't lend itself to agricultural expansion, for instance - and variables that make deforestation more likely, including higher population density, the presence of settlements and rural properties, and higher density of road infrastructure, both legal and illegal."
dr tech

Twitter has '50% chance' of major crash during World Cup, says insider | Twitter | The ... - 0 views

  •  
    "Twitter stands a 50% chance of a major outage that could take the site offline during the World Cup, according to a recently departed employee with knowledge of how the company responds to large-scale events. The former employee, who was granted anonymity because of the sensitivity of what was discussed, has knowledge of the workings of Twitter Command Centre, the platform's team of troubleshooters who monitor the site for issues such as traffic spikes and data centre outages."
dr tech

Iran's Secret Manual for Controlling Protesters' Mobile Phones - 0 views

  •  
    "According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their data connections to a crawl, break the encryption of phone calls, track the movements of individuals or large groups, and produce detailed metadata summaries of who spoke to whom, when, and where. Such a system could help the government invisibly quash the ongoing protests - or those of tomorrow - an expert who reviewed the SIAM documents told The Intercept."
dr tech

A Brain Scanner Combined with an AI Language Model Can Provide a Glimpse into Your Thou... - 0 views

  •  
    "Now researchers have taken a step forward by combining fMRI's ability to monitor neural activity with the predictive power of artificial intelligence language models. The hybrid technology has resulted in a decoder that can reproduce, with a surprising level of accuracy, the stories that a person listened to or imagined telling in the scanner. The decoder could even guess the story behind a short film that someone watched in the scanner, though with less accuracy."
dr tech

Brazilian facial recognition ruling can set an important precedent for countr... - 0 views

  •  
    "Every day, nearly 5 million people use São Paulo's metro system. Every one of their faces may have been recorded in a facial recognition system that has been in use since early 2020. In a March 23 decision, a São Paulo State court ordered the Metro company to stop using the technology. The Metro appealed the decision, claiming its monitoring system "rigorously obeys the General Law on Data Protection," but the argument was rejected by the same court in mid-April."
dr tech

Chinese city may have used a COVID app to block protesters, drawing an outcry | The Sea... - 0 views

  •  
    "Hu Xijin, a former editor of the ruling Communist Party's Global Times newspaper, warned that the use of the health code for purposes other than epidemic control "damages the authority" of the monitoring system and would chip away at the public's support for it. His post on Weibo, a Twitter-like social media platform, on Monday became a hashtag that was among the most-searched earlier this week, drawing 280 million views."
« First ‹ Previous 41 - 60 of 68 Next ›
Showing 20 items per page