Skip to main content

Home/ ITGSonline/ Group items tagged privacy

Rss Feed Group items tagged

1More

The Glass Room - 0 views

  •  
    "And if your password can be reverse-engineered to reveal something about you or others like you, how safe or unique is it really."
1More

Vulnerabilities in GPS fleet-tracking tools let attackers track and immobilize cars en ... - 0 views

  •  
    "L&M used a credential stuffing attack: using email addresses gleaned from massive breaches to gain access by repeatedly trying different email/password combinations."
1More

Ethics committee raises alarm over 'predictive policing' tool | UK news | The Guardian - 0 views

  •  
    "Amid mounting financial pressure, at least a dozen police forces are using or considering predictive analytics, despite warnings from campaigners that use of algorithms and "predictive policing" models risks locking discrimination into the criminal justice system."
1More

Why Targeted Ads Are a Serious Threat to Your Privacy - 0 views

  •  
    "Data collection is a prerequisite to delivering targeted ads, so their use will inherently stir up privacy concerns. Ad companies are incentivized to collect and share as much data as they can, with safeguarding this information only a secondary issue at best. Breaches are a concern largely because of the potential fallout to a company's brand."
1More

Your next car could have a built-in road-rage detector - 0 views

  •  
    "Affectiva is running a program that pays drivers to help train its emotion-recognition system. The company sends drivers a kit including cameras and other sensors to place within their vehicles. These record a person's facial expressions, gestures, and tone of voice on the road. That data is then labeled by trained specialists for a range of emotions, and fed into deep neural networks."
1More

Leaked Chinese database of 1.8 million women includes a field indicating whether they a... - 0 views

  •  
    " discovered an insecure Chinese database of 1.8 million women, aged 15-39"
1More

Major vulnerability in 5G means that anyone with $500 worth of gear can spy on a wide a... - 0 views

  •  
    "That's why it was so important that the new 5G mobile protocol be designed to foil IMSI catchers, and why the 3rd Generation Partnership Project, or 3GPP (the body standardizing 5G) updated the Authentication and Key Agreement (AKA) to resist IMSI catching techniques."
1More

Dutch surgeon wins landmark 'right to be forgotten' case | Technology | The Guardian - 0 views

  •  
    "A Dutch surgeon formally disciplined for her medical negligence has won a legal action to remove Google search results about her case in a landmark "right to be forgotten" ruling. The doctor's registration on the register of healthcare professionals was initially suspended by a disciplinary panel because of her postoperative care of a patient. After an appeal, this was changed to a conditional suspension under which she was allowed to continue to practise."
1More

To Measure Your Stress Level, Scientists Can Analyze Your Eyes - 0 views

  •  
    How long before this is used without our knowledge in facial recognition systems? "Through the use of the data from this lab study and a formula Kim and Yang applied called "fractal dimension," Kim and Yang discovered a negative relationship between the fractal dimension of pupil dilation and a person's workload, showing that pupil dilation could be used to indicate the mental workload of a person in a multitasking environment."
1More

Generation AI: What happens when your child's friend is an AI toy that talks back? | Wo... - 0 views

  •  
    "If that data is collected, does the child have a right to get it back? If that data is collected from very early childhood and does not belong to the child, does it make the child extra vulnerable because his or her choices and patterns of behaviour could be known to anyone who purchases the data, for example, companies or political campaigns. Depending on the privacy laws of the state in which the toys are being used, if the data is collected and kept, it breaches Article 16 of the Convention on the Rights of the Child - the right to privacy. (Though, of course, arguably this is something parents routinely do by posting pictures of their children on Facebook). "
1More

Together we can thwart the big-tech data grab. Here's how | John Harris | Opinion | The... - 0 views

  •  
    "Blockchain technology has also opened the way to new models whereby endless micropayments can be made in return for particular online services or content; and, if people voluntarily allow elements of their data to be used, rewards can flow the other way. Here perhaps lies the key to a system beyond the current, Google-led model, in which services appear to be free but the letting-go of personal data is the actual price."
1More

Open Rights Group Scotland - E-voting's Unsolvable Problem - 0 views

  •  
    Ahhh ITGS group - a great discussion on the evoting problem would have been perfect for your Paper 2. "Remember: all of these principles of security, anonymity and verifiability have to be achieved in an understandable way. If they can't be then you get the opportunity for losers to claim fraud, and their supporters to believe them."
1More

London cops are subjecting people in the centre of town to facial recognition today and... - 0 views

  •  
    "People in Soho, Piccadilly Circus, and Leicester Square are being told by the London Metropolitan Police to submit to a trial of the force's notoriously inaccurate, racially biased facial recognition system, which clocks in an impressive error-rate of 98% (the system has been decried by Professor Paul Wiles, the British biometrics commissioner, as an unregulated mess)."
1More

This New Algorithm Can Read Your Brainwaves to See What You're Seeing - 0 views

  •  
    "And, of course, there's the law-enforcement angle. Instead of relying on sketch artists and police lineups, a real-life version of a Recaller could tap into a witness's memory and reconstruct what they saw. Forget security-camera footage - cops just need your thoughts."
1More

AI Experts Issue Warning Against Facial Scanning With a "Dangerous History" - 0 views

  •  
    "But researchers at New York University's AI Now Institute have issued a strong warning against not only ubiquitous facial recognition, but its more sinister cousin: so-called affect recognition, technology that claims it can find hidden meaning in the shape of your nose, the contours of your mouth, and the way you smile. If that sounds like something dredged up from the 19th century, that's because it sort of is."
1More

Billboards are using sensors to identify, target and track individuals / Boing Boing - 0 views

  •  
    "I can't believe this has to be said (again), but cyberpunk was meant as a warning, not a business plan. It turns out that you need very few identifiers to make a guess about who a person standing in front of a billboard is, especially when you can suck data out of their phones. Throw in data about how long you stand in front of a billboard and you've got metrics that advertisers can use to tune their campaigns."
1More

"Privacy Not Included": Mozilla's guide to insecure, surveillant gadgets to avoid / Boi... - 0 views

  •  
    ""Privacy Not Included" is Mozilla's Christmas shopping (anti)-guide to toys and gadgets that spy on you and/or make stupid security blunders, rated by relative "creepiness," from the Nintendo Switch (a little creepy) to the Fredi Baby monitor (very creepy!). Mozilla's reviews include a detailed rationale for each ranking, including whether the product includes encryption, whether it forces a default password change, how easy to understand the documentation is, whether it shares your data for "unexpected reasons," whether it has known security vulnerabilities, whether it has parental controls and more."
1More

To regulate AI we need new laws, not just a code of ethics | Paul Chadwick | Opinion | ... - 0 views

  •  
    "Nemitz identifies four bases of digital power which create and then reinforce its unhealthy concentration in too few hands: lots of money, which means influence; control of "infrastructures of public discourse"; collection of personal data and profiling of people; and domination of investment in AI, most of it a "black box" not open to public scrutiny. The key question is which of the challenges of AI "can be safely and with good conscience left to ethics" and which need law. Nemitz sees much that needs law."
1 - 20 of 360 Next › Last »
Showing 20 items per page