Skip to main content

Home/ Digit_al Society/ Group items tagged secrets

Rss Feed Group items tagged

dr tech

NSA intimidation expanding surveillance state: Column - 0 views

  •  
    "There it is. If you run a business, and the FBI or NSA want to turn it into a mass surveillance tool, they believe they can do so, solely on their own initiative. They can force you to modify your system. They can do it all in secret and then force your business to keep that secret. Once they do that, you no longer control that part of your business. You can't shut it down. You can't terminate part of your service. In a very real sense, it is not your business anymore. It is an arm of the vast U.S. surveillance apparatus, and if your interest conflicts with theirs then they win. Your business has been commandeered."
dr tech

The death of privacy | World news | The Observer - 0 views

  •  
    "The message seems to be that if you really want to keep something private, treat it as a secret, and in the age of algorithmic analysis and big data, perhaps best to follow Winston Smith's bitter lesson from Nineteen Eighty-Four: "If you want to keep a secret, you must also hide it from yourself.""
dr tech

Facebook's secret settlement on Cambridge Analytica gags UK data watchdog | TechCrunch - 0 views

  •  
    "The UK's information commissioner just told a parliamentary subcommittee on online harms and disinformation that a secret arrangement between her office and Facebook prevents her from publicly answering whether or not Facebook contacted the ICO about completing a much-trumpeted 'app audit'."
dr tech

Google's secret cache of medical data includes names and full details of millions - whi... - 0 views

  •  
    "A whistleblower who works in Project Nightingale, the secret transfer of the personal medical data of up to 50 million Americans from one of the largest healthcare providers in the US to Google, has expressed anger to the Guardian that patients are being kept in the dark about the massive deal."
dr tech

When data gets creepy: the secrets we don't realise we're giving away | Technology | Th... - 0 views

  •  
    "Creepy grabs all this geo-location data and puts pins on a map for you. Most of the time, you probably remember to get the privacy settings right. But if you get it wrong just once - maybe the first time you used a new app, maybe before your friend showed you how to change the settings - Creepy will find it, and your home is marked on a map"
dr tech

Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept - 0 views

  •  
    "The "March 2013 Watchlisting Guidance," a 166-page document issued last year by the National Counterterrorism Center, spells out the government's secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings."
dr tech

The Secret Life of the 500+ Cables That Run the Internet - CNET - 0 views

  •  
    ""The whole network of undersea cables is the lifeblood of the economy," said Alan Mauldin, an analyst with TeleGeography. "It's how we're sending emails and phone calls and YouTube videos and financial transactions.""
dr tech

Inside the Secret List of Websites That Make AI Like ChatGPT Sound Smart: SoylentNews S... - 0 views

  •  
    "This text is the AI's mainsource of information about the world as it is being built, and it influences how it responds to users. If it aces the bar exam, for example, it's probably because its training data included thousands of LSAT practice sites. Tech companies have grown secretive about what they feed the AI. So The Washington Post set out to analyze one of these data sets to fully reveal the types of proprietary, personal, and often offensive websites that go into an AI's training data."
dr tech

UK gathering secret intelligence via covert NSA operation | Technology | guardian.co.uk - 0 views

  •  
    "UK's electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world's biggest internet companies through a covertly run operation set up by America's top spy agency, documents obtained by the Guardian reveal."
dr tech

UK censorwall will also block "terrorist content," "violence," "circumvention tools," "... - 0 views

  •  
    Huge chunks of the Internet will be effectively unreachable, and which sites go into the censorship bucket will be decided upon in secret, by unelected employees of big corporations, like China's Huawei. Sure, you can untick the box if you want, but as David Cameron's advisors will tell you, defaults are powerful and most users never change them.
dr tech

Lavabit competitor Silent Circle shuts down its secure email service, destroys servers ... - 0 views

  •  
    "Silent Circle, a secure communications company founded by PGP creator Phil Zimmerman, has pre-emptively shut down its secure, encrypted email service and destroyed the servers so that it cannot be forced to reveal its customers' secrets to NSA spooks. "
dr tech

Computers are now better than humans at recognising images | Global | The Guardian - 0 views

  •  
    "It might not sound like much, but the success of the Minwa supercomputer, which can sort a million images into a thousand predefined categories with an error rate less than the typical human, makes it the latest secret weapon of the company known as "China's Google", Baidu."
dr tech

MafiaLeaks promises whistleblowers safety from the Family | Media | theguardian.com - 0 views

  •  
    "MafiaLeaks uses the encrypted anonymising browser Tor to enable informants to securely share their secrets with the site. Currently, the recipients are limited by MafiaLeaks to the Fatto Quotidiano newspaper, the Sicilian TV station Telejato and Antonella Beccaria, an independent investigative journalist. All are known for their anti-mafia activities."
dr tech

Why appeasing governments over encryption will never work | Comment is free | The Guardian - 0 views

  •  
    "In case you're wondering what could be wrong with entrusting secret keys to the government for use "in exceptional circumstances", just ponder this: a few months ago, hackers (suspected to be Chinese) stole the personnel records of 21.5 million US federal employees, including the records of every person given a government background check for the last 15 years."
dr tech

How the NSA searches the world's intercepted private communications - Boing Boing - 0 views

  •  
    "XKEYSCORE is a secret NSA program that indexes data slurped up from covert fiber-taps, hacked systems, and smartphones, including "full take" data and metadata. "
Max van Mesdag

Somebody Lost Apple's 4th-Gen iPhone Prototype In a Bar - 0 views

  •  
    When you're trying to keep something a secret, it may not be a good idea to take it out into the public and lose it. It might not also be a good idea to take it and post about it, even if you are Gizmodo.
dr tech

Edward Snowden interview: breaking law was only option, says whistleblower | World news... - 0 views

  •  
    "In his most extensive public comments to date Snowden sought to answer critics who have said his actions damaged US national security or that the threat from the secret government surveillance he revealed was overblown. Snowden was interviewed by the NBC News anchor Brian Williams, who travelled to Moscow for the meeting"
1 - 20 of 54 Next › Last »
Showing 20 items per page