Skip to main content

Home/ Digit_al Society/ Group items matching "address" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

NSA trove shows 9:1 ratio of innocents to suspicious people in "targeted surveillance" - Boing Boing - 0 views

  •  
    "The NSA uses laughably sloppy tools for deciding whether a target is a "US person" (a person in the USA, or an American citizen abroad). For example, people whose address books contain foreign persons are presumed by some analysts to be foreign. Likewise, people who post in "foreign" languages (the US has no official state language) are presumed by some analysts to be non-US persons."
dr tech

Email inventor Ray Tomlinson dies at 74 - BBC News - 0 views

  •  
    "The US computer programmer came up with the idea of electronic messages that could be sent from one network to another in 1971. His invention included the ground-breaking use of the @ symbol in email addresses, which is now standard."
dr tech

You Don't Understand Bitcoin Because You Think Money Is Real - 0 views

  •  
    "The bitcoin blockchain was created, in part, to address this historical weakness. After the 21 millionth bitcoin is mined, in around 2140, the system will produce no more."
dr tech

Report: someone is already selling user data from defunct Canadian retailer's auctioned-off servers / Boing Boing - 0 views

  •  
    "When Vancouver tech retailer NCIX went bankrupt, it stopped paying its bills, including the bills for the storage where its servers were being kept; that led to the servers being auctioned off without being wiped first, containing sensitive data -- addresses, phone numbers, credit card numbers, passwords, etc -- for thousands of customers. Also on the servers: tax and payroll information for the company's employees."
dr tech

Vulnerabilities in GPS fleet-tracking tools let attackers track and immobilize cars en masse / Boing Boing - 0 views

  •  
    "L&M used a credential stuffing attack: using email addresses gleaned from massive breaches to gain access by repeatedly trying different email/password combinations."
dr tech

One person, one click: is this how to save democracy? | Paolo Gerbaudo | World news | The Guardian - 0 views

  •  
    "We may be only just starting to understand how digital democracy can help address the crisis of legitimacy that is affecting different levels of the political process."
dr tech

Germany Creates Ethics Rules for Autonomous Vehicles - Robotics Business Review - 0 views

  •  
    ""The ethics commission has done pioneering work and has developed the world's first guidelines for automated driving. We are now implementing these guidelines." The ethics rules address a classic thought experiment: the "trolley problem.""
dr tech

Police across the US are training crime-predicting AIs on falsified data - MIT Technology Review - 0 views

  •  
    "The system used historical data, including arrest records and electronic police reports, to forecast crime and help shape public safety strategies, according to company and city government materials. At no point did those materials suggest any effort to clean or amend the data to address the violations revealed by the DOJ. In all likelihood, the corrupted data was fed directly into the system, reinforcing the department's discriminatory practices."
dr tech

The Morris Worm Was the World's First Cyberattack - 0 views

  •  
    "His program became the first of a particular type of cyber attack called "distributed denial of service," in which large numbers of internet-connected devices, including computers, webcams and other smart gadgets, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked."
dr tech

Phishers steal San Diego school data going back to 2008 / Boing Boing - 0 views

  •  
    "After a successful phishing attack that captured over 50 accounts, hackers stole 500,000 records from the San Diego Unified School District, for staff, current students, and past students going all the way back to 2008; including SSNs, home addresses and phone numbers, disciplinary files, health information, emergency contact details, health benefits and payroll info, pay information, financial data for direct deposits."
dr tech

Russia blocks millions of IP addresses in battle against Telegram app | World news | The Guardian - 0 views

  •  
    "The "battle for Telegram" pits one of Russia's most popular messaging apps - with more than 13 million users - against the internet censor Roskomnadzor, in a public cat-and-mouse game to block traffic that has put the agency's reputation on the line. Telegram is widely used by the Russian political establishment, and prominent politicians and officials have openly flouted or criticised the ban. Data from the app showed several Kremlin officials had continued to sign in on Tuesday evening, four days after a court ordered the service to be blocked over alleged terrorism concerns."
dr tech

Contact apps won't end lockdown. But they might kill off democracy | John Naughton | Opinion | The Guardian - 0 views

  •  
    "There are clear indications that the UK government is now actively considering use of the technology as a way of easing the lockdown. If this signals an outbreak in Whitehall of tech "solutionism" - the belief that for every problem there is a technological answer - then we should be concerned. Tech solutions often do as much harm as good, for example, by increasing social exclusion, lacking accountability and failing to make real inroads into the problem they are supposedly addressing."
dr tech

Email scammers targeted by new bot that inundates them with endless annoying questions | The Independent - 0 views

  •  
    "The organisation is inviting anyone who thinks they've been targeted by a scam email to forward it to Re:scam, which will verify if it is a scam or not. It will then use its own email address to target any scammers it manages to detect.  "
dr tech

Cyber-attack forces shutdown of one of the US's largest pipelines | Cybercrime | The Guardian - 0 views

  •  
    "In a statement, the company said: "Colonial Pipeline is taking steps to understand and resolve this issue. At this time, our primary focus is the safe and efficient restoration of our service and our efforts to return to normal operation. This process is already under way, and we are working diligently to address this matter and to minimize disruption to our customers and those who rely on Colonial Pipeline."
dr tech

Technology promises hugs at a distance. Beware what you wish for | Psyche Ideas - 0 views

  •  
    "Haptic devices aimed at addressing genuine medical need, or for entertainment and novelty, seem appropriate and even fun. However, we believe it's important to stay vigilant - any technology that changes the norms of our social interactions could have unintended consequences."
dr tech

Microsoft says it would willingly participate in Australia's media code with Bing search engine | Australian media | The Guardian - 0 views

  •  
    ""The code reasonably attempts to address the bargaining power imbalance between digital platforms and Australian news businesses," he said. Google's search engine not as good as its competitors for news, research finds Read more "It also recognises the important role search plays, not only to consumers but to the thousands of Australian small businesses that rely on search and advertising technology to fund and support their organisations." The code, which is currently before the parliament, would facilitate negotiations between media companies and digital platforms - currently just Facebook and Google - for payment for content. If an agreement cannot be reached, then it goes to an arbiter for resolution."
dr tech

Obsessed fan finds Japanese idol's home by zooming in on her eyes, Asia, Digital News - AsiaOne - 0 views

  •  
    "Japanese idol Ena Matsuoka was attacked outside her home last month after a fan figured out her address from selfies she posted on social media - just by zooming in on the reflection on her pupils, according to media reports."
dr tech

New York Times writer is shocked to see how much a social trust scoring system knows about her / Boing Boing - 0 views

  •  
    "As of this summer, though, Sift does have a file on you, which it can produce upon request. I got mine, and I found it shocking: More than 400 pages long, it contained all the messages I'd ever sent to hosts on Airbnb; years of Yelp delivery orders; a log of every time I'd opened the Coinbase app on my iPhone. Many entries included detailed information about the device I used to do these things, including my IP address at the time."
dr tech

Inside China's mass surveillance for secrets and scandal | RNZ News - 0 views

  •  
    "Information collected includes dates of birth, addresses, marital status, along with photographs, political associations, relatives and social media IDs. It collates Twitter, Facebook, LinkedIn, Instagram and even TikTok accounts, as well as news stories, criminal records and corporate misdemeanours. While much of the information has been "scraped" from open-source material, some profiles have information which appears to have been sourced from confidential bank records, job applications and psychological profiles."
dr tech

The Trump 2020 app is a voter surveillance tool of extraordinary power | MIT Technology Review - 0 views

  •  
    "Data collection-as Parscale's comment suggested-is perhaps the most powerful thing the Trump 2020 app does. On signing up, users are required to provide a phone number for a verification code, as well as their full name, email address, and zip code. They are also highly encouraged to share the app with their existing contacts. This is part of a campaign strategy for reaching the 40 to 50 million citizens expected to vote for Trump's reelection: to put it bluntly, the campaign says it intends to collect every single one of these voters' cell-phone numbers. This strategy means the app also makes extensive permission requests, asking for access to location data, phone identity, and control over the handset's Bluetooth function."
‹ Previous 21 - 40 of 53 Next ›
Showing 20 items per page