Random Thoughts on Brain-Computer Interfaces, Productivity, and Privacy.

Random Thoughts on Brain-Computer Interfaces, Productivity, and Privacy.

We can expect to see the emergence of awesome speeds of communication, new apps and tools, shareable mental models and knowledge bases, deep learning projects that will enable the creation of those apps, misuses of the BCI, a need for more open-source projects, and changes in the type of intelligence that humans will need to develop in the future.

What Is MINIX? Is The World's Most Popular OS A Threat?

What Is MINIX? Is The World's Most Popular OS A Threat?

A closed source version of MINIX (which itself is an open source OS) exists on its own CPU (Intel Management Engine) that we don’t have access to, but it has complete access to the system memory, hard drive, TCP/IP stack.

Hacker Breaks Into French Government's New Secure Messaging App

Hacker Breaks Into French Government's New Secure Messaging App

Dubbed " Tchap ," the end-to-end encrypted, open source messaging app has been created by the French government with an aim to keep their officials, parliamentarians and ministers data on servers inside the country over concerns that foreign agencies could use other services to spy on their communications.

Google's Sensorvault Can Tell Police Where You've Been

Google's Sensorvault Can Tell Police Where You've Been

The data Google is turning over to law enforcement is so precise that one deputy police chief said it “shows the whole pattern of life.” It’s collected even when people aren’t making calls or using apps, which means it can be even more detailed than data generated by cell towers.

Lyft tightens employee access to rider data, but it may not be enough

Lyft tightens employee access to rider data, but it may not be enough

That said, Lyft did set up an anonymous tip line for complaints about employees misusing data after its investigation in 2018.The ride-hailing service's new security measures are similar to Uber's, which also issues warnings on employees' dashboard tools and trains staff on the proper ways to access user data.

CoinFi News - Facebook senior executives used user data against competition and to help friends

CoinFi News - Facebook senior executives used user data against competition and to help friends

Facebook’s senior executives have been considering selling user data for years, according to leaked internal Facebook documents accessed by NBC News. NBC News claims these contain information that could be used as leverage over companies it partnered with—data about friends, relationships and photos.

The Time Tim Cook Stood His Ground Against the FBI

The Time Tim Cook Stood His Ground Against the FBI

At 4:30 a.m., just in time for the morning news cycle on the East Coast, Cook published an open letter to Apple customers explaining why the company would be opposing the ruling, which “threatens the security of our customers.” He referenced the danger that could come from the government having too much power: “The implications of the government’s demands are chilling,” he wrote.

Public, Council Were in the Dark on Police Access to ‘Smart’ Streetlights

Public, Council Were in the Dark on Police Access to ‘Smart’ Streetlights

Lt. Jeffrey Jordon, who works with Police Chief David Nisleit on special projects, confirmed that outside law enforcement agencies have requested access to San Diego’s raw video footage too, but he declined to say which ones and for what purposes.

Mark Zuckerberg leveraged Facebook user data to fight rivals and help friends, leaked documents show

Mark Zuckerberg leveraged Facebook user data to fight rivals and help friends, leaked documents show

The documents, which include emails, webchats, presentations, spreadsheets and meeting summaries, show how Zuckerberg, along with his board and management team, found ways to tap Facebook’s trove of user data — including information about friends, relationships and photos — as leverage over companies it partnered with.

“Blockchain in Cybersecurity: The future?” (From our Forums.)

“Blockchain in Cybersecurity: The future?” (From our Forums.)

NASA has decided to use blockchain technology as a way of enhancing security and minimizing denial of service and other different traffic service attacks. Also, blockchain security means there is no centralized authority in control of the network to verify the data going through it which makes it hard for hackers to orchestrate an attack.

Australian Child-Tracking Smartwatch Vulnerable to Hackers

Australian Child-Tracking Smartwatch Vulnerable to Hackers

(Photo: Troy Hunt) An Australian company that markets a smartwatch that lets parents monitor their children shut down its service on Monday after researchers revealed hackers could track a child's location, spoof the location, add themselves as a "parent" and view personally identifiable information associated with the account.

Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support

Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support

But the issue is much worse than previously reported, with the hackers able to access email content from a large number of Outlook, MSN, and Hotmail email accounts, according to a source who witnessed the attack in action and described it before Microsoft’s statement, as well as screenshots provided to Motherboard.

Microsoft discloses security breach that impacted some Outlook accounts

Microsoft discloses security breach that impacted some Outlook accounts

Chinese companies have leaked over 590 million resumes via open databases Over 540 million Facebook records found on exposed AWS servers According to Microsoft, between January 1, 2019, and March 29, 2019, a hacker, or group of hackers, compromised the account of a Microsoft support agent, one of the company's customer support representatives that handles technical complaints.

Amazon staff listen to customers' Alexa recordings, report says

Amazon staff listen to customers' Alexa recordings, report says

Amazon employees around the world regularly listen to recordings from the company’s smart speakers as part of the development process for new services, Bloomberg News reports.

A Researcher Needed Three Hours to Identify Me From My DNA

A Researcher Needed Three Hours to Identify Me From My DNA

I’d previously sent a DNA sample to the genetic testing company 23andMe Inc. and then uploaded my data anonymously to a genealogy website. Genetic genealogists then look for DNA relatives of anonymous suspects, scouring public records and social media until they arrive at a likely name.

The Full Guide to Securing Your Data Over Wi-Fi

The Full Guide to Securing Your Data Over Wi-Fi

The hacker then connects to a real access point using a different wireless card, effectively funneling all of the information through their system before moving it along to the second network.

An Amazon employee might have listened to your Alexa recording

An Amazon employee might have listened to your Alexa recording

A spokesperson defended the company's practices, however, telling Bloomberg that the e-commerce giant only listens to "an extremely small sample" and that its employees do not have access to identifying information:. We only annotate an extremely small sample of Alexa voice recordings in order [to] improve the customer experience.

Delhi HC directs YouTube to remove defamatory PewDiePie songs

Delhi HC directs YouTube to remove defamatory PewDiePie songs

The interim order was granted by a Single Judge Bench of Justice Jayant Nath in a suit preferred by T-Series owner Super Cassettes Pvt Ltd., seeking to permanently restrain Felix Arvid Ulf Kjellberg, better known as PewDiePie, from uploading the songs titled ‘T-Series Diss Track/Bitch Lasagna’ and ‘Congratulations’.

Amazon reportedly has thousands of people listening to snippets of Alexa conversations

Amazon reportedly has thousands of people listening to snippets of Alexa conversations

The report said the Amazon team transcribes the recordings and shares the conversations with other parts of the company in order to make Alexa's "understanding of human speech" better.

Here is all the information that your browser reveals about you

Here is all the information that your browser reveals about you

In the case of the geographic information, information gathered through GPS will be significantly more accurate on average than browser estimated values. That may indicate that your browser is not sharing that information or it does not apply to you (such as accelerometer and gyroscope information while you are using a desktop computer).

Your Smartphone Apps Are Filled With Trackers You Know Nothing About

Your Smartphone Apps Are Filled With Trackers You Know Nothing About

Both of these SDKs allow Facebook and Google to track users beyond their desktop web browsers and automatically collect information like when you installed the app, each time you opened it, and what you purchased.

Two Thirds of Hotel Sites Leak Guest Booking Info to Third-Parties

Two Thirds of Hotel Sites Leak Guest Booking Info to Third-Parties

Third-party services running on most hotel websites have access to guest booking information, including personal data and payment card details. "This information could allow these third-party services to log into a reservation, view personal details, and even cancel the booking altogether," Wueest says.

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

When personal information is fraudulently used to open new accounts, BJS says, people affected experience a lot financial problems in the future. Someone calls you claiming to be from your bank and asks for sensitive personally identifiable information like your social security number.

Avoiding consumer lock-in with the decentralised web

Avoiding consumer lock-in with the decentralised web

Because Weavemail lives on Arweave’s permaweb, you can be confident that as long as you know the address of this transaction, and there is an available Arweave node to serve it to you, your access to this mail client as it currently exists simply cannot be denied, or changed.

How to increase your chances of finding a hidden camera

How to increase your chances of finding a hidden camera

Step 3: Scan the house network to identify potential cameras. That is, if a host wants to hide a camera they can connect it to a network that you may not have access to.

Internet Privacy in the Age of Surveillance

Internet Privacy in the Age of Surveillance

The Federal Security Service, also known as the FSB, requires a post-collection court warrant to access the records of ordinary citizens, but they can begin surveillance efforts before they request the warrant.

How to protect kid’s online privacy?

How to protect kid’s online privacy?

The advancement of cell phones and access to the internet enable young teens and children to use social messaging apps all day long. In my opinion, I would suggest you monitor the digital activities of teens using cell phone spy apps.

A Pod world: How you’d trade your data for services over a decentralized internet

A Pod world: How you’d trade your data for services over a decentralized internet

Late last year, open source startup Inrupt built an application based on the Solid standards that enables a more peer-to-peer internet with Personal Online Data Stores (Pods) for everyone.

Should you be concerned about LastPass uploading your passwords to its server?

Should you be concerned about LastPass uploading your passwords to its server?

No changes to any of the other actions which will provide the server with the key to decrypt your data: Opening Account Settings, Security Challenge, History, Bookmarklets, Credit Monitoring Linking to a personal account Adding an identity Importing data if the binary component isn’t installed Printing all sites Some of these actions will prompt you to re-enter your master password.

Third-party Facebook apps expose 540 million users’ details

Third-party Facebook apps expose 540 million users’ details

The cyber risk team at security firm UpGuard found one data store originating from the Mexico-based media company Cultura Colectiva of 146GB, containing more than 540 million records, detailing comments, likes, reactions, account names, Facebook IDs and more.

More