Toggle light / dark theme

Computers are really, really good at recognizing faces… For people who don’t want to be found, or just enjoy the previously unquestioned ability to travel without being tracked, facial recognition poses a risk. As a solution, Japan’s National Institute of Informatics (NIII) created glasses that make faces unreadable to machines.

Image Credit: flickr/Steve Jurvetson.

Read more

43c0c76c-2b4c-11e5-acfb-cbd2e1c81cca.img

I sometimes wonder, How much data am I generating? Meaning: how much data do I generate just sitting there in a chair, doing nothing except exist as a cell within any number of global spreadsheets and also as a mineable nugget lodged within global memory storage systems — inside the Cloud, I suppose. (Yay Cloud!)

Read more

Toss Your Credit Cards and Other Security Musings – By: Sherri Hammons

“Let’s post our credit card numbers and even those pesky CSV codes on the back. (Better yet, let’s just do away with credit cards altogether because, at the end of that day, it’s just a bank taking on the risk that you’ll pay back a loan.) Let’s post our social security numbers and our driver’s licenses. Let’s post everything. Overnight, the incentives to steal your data are wiped off the face of the earth. The dark databases are worth zero.”

Last year, my personal credit cards and banks were breached five times. Last week, another personal breach. Each time, I was informed by email and snail mail, a new credit card or bank account was issued, and I bought more monitoring for my credit or, in the case of one of the breaches, the company that was breached bought additional monitoring. About the fourth time, I started wondering why our industry doesn’t do something else. The traditional IT security model is dead, but we just keep propping up the body. Hope has become our strategy in the cyber security war. Read more

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access. Read more

We’ve suspected it all along—that Skynet, the massive program that brings about world destruction in the Terminator movies, was just a fictionalization of a real program in the hands of the US government. And now it’s confirmed—at least in name.

As The Intercept reports today, the NSA does have a program called Skynet. But unlike the autonomous, self-aware computerized defense system in Terminator that goes rogue and launches a nuclear attack that destroys most of humanity, this one is a surveillance program that uses phone metadata to track the location and call activities of suspected terrorists. A journalist for Al Jazeera reportedly became one of its targets after he was placed on a terrorist watch list. Read more

— Wired
It’s taken close to half a decade. But WikiLeaks is back in the business of accepting truly anonymous leaks.

On Friday, the secret-spilling group announced that it has finally relaunched a beta version of its leak submission system, a file-upload site that runs on the anonymity software Tor to allow uploaders to share documents and tips while protecting their identity from any network eavesdropper, and even from WikiLeaks itself. The relaunch of that page—which in the past served as the core of WikiLeaks’ transparency mission—comes four and a half years after WikiLeaks’ last submission system went down amid infighting between WikiLeaks’ leaders and several of its disenchanted staffers. Read more

By Elizabeth Dwoskin — Wall Street Journal

Dozens of smartphone apps collect so much location data that their publishers can plot users’ comings and goings in detail, a forthcoming peer-reviewed study found.

Computer scientists at Carnegie Mellon University concluded that a dozen or so popular Android apps collected device location – GPS coordinates accurate to within 50 meters – an average 6,200 times, or roughly every three minutes, per participant over a two-week study period.

The research comes at a time of increasing concern about electronic privacy. A 2014 Pew survey found that more than 90 percent of Americans feel they’ve lost control over personal data. While savvy users understand that using mobile devices entails some privacy tradeoffs – for example, a navigation app will reveal their location to the app’s publisher – most don’t realize the extent to which such information is collected and distributed, the researchers said.
Ready more