This jewelry is a brilliant shield against face-recognition intrusions

This jewelry is a brilliant shield against face-recognition intrusions

Having seen the light-up glasses invented by Japan’s National Institute of Informatics to foil face recognition, Nowak decided to move her project in a different direction, creating what she describes as face jewelry. Much to her surprise, the Prince-like design was the first one Nowak tried and the first that worked.

Industry Watch: Beware the dark patterns of privacy

Industry Watch: Beware the dark patterns of privacy

And that, said John Biondi, vice president of experience design at Nerdery, “is a UX not crafted to respect privacy.” Instead, he thinks companies — and the people who design their websites and applications — will gain more trust and have more success if they offer their users both agency to control their data and transparency into how their data is being used.

Accessories for the Paranoid uses fake data to stop your devices spying on you

Accessories for the Paranoid uses fake data to stop your devices spying on you

The second object is an add-on to the well-known Amazon Echo virtual assistant, which responds to the call of "Alexa".Having to listen at all times in order to detect the call of its name, the Alexa device observes, processes and collects data in the user's home whenever it is switched on.

Opinion | A Brief History of How Your Privacy Was Stolen

Opinion | A Brief History of How Your Privacy Was Stolen

Up until around 2000, the technology industry never had enough processing power, memory, storage or network bandwidth to build products that could be deeply integrated with our lives.

Let’s retake control of our events! #JoinMobilizon

Let’s retake control of our events! #JoinMobilizon

We asked professional designers to help us develop our vision for Mobilizon. We asked two designers to work with us on this project, so that Mobilizon would, right from its conception, fit the needs and uses of the people who are going to use it.

What does GDPR mean for UX?

What does GDPR mean for UX?

The General Data Protection Regulation (GDPR) act came into effect in May last year — it’s a legal framework that sets out guidelines on how to collect and process personal information within the European Union.

Sky Views: The government is quietly creating a digital ID card without us noticing

Sky Views: The government is quietly creating a digital ID card without us noticing

In mid-April, a few days after the launch of the government's long-waited Online Harms white paper, the Information Commissioner's Office (ICO) announced a code of practice for age-appropriate design online, proposing strong restrictions on the way under-18s are treated online.

The genius move behind Facebook groups: Mining users for more valuable data

The genius move behind Facebook groups: Mining users for more valuable data

In an Instagram post on Tuesday, , “Now we’re focused on building the digital equivalent of the living room, where you can interact in all the ways you’d want privately — from messaging and stories to secure payments and more.” He added, “We’ve redesigned Facebook to make communities as central as friends.

Facebook CEO Mark Zuckerberg says the ‘future is private’

Facebook CEO Mark Zuckerberg says the ‘future is private’

His opening statements build on the massive shift in Zuckerberg’s vision for the company that he first outlined early last month when he announced Facebook would transition away from the News Feed and public posts and toward a “privacy-focused communications platform” that unified its messaging products around concepts like ephemerality and encryption.

“Ethics” and Ethics

“Ethics” and Ethics

How should they even understand design ethics when there’s a user research department, an analytics group and, UX team each with a different focus? Philosophical ethics discusses the morality of human action, it doesn’t provide rules to program self-driving cars.

Handshake: a peculiar chat experiment

Handshake: a peculiar chat experiment

This is primarily a design for out-of-band communication in which communicating parties aim to mitigate potential compromises in asymmetric encryption methodology ranging from CA poisoning to reliance on trusted centralized service providers for communications technology, and it can even be used to explore patterns in post-quantum readiness.

The £300 ‘dumb phone’ with ZERO apps could fix your smartphone addiction

The £300 ‘dumb phone’ with ZERO apps could fix your smartphone addiction

AS SMARTPHONE brands try and outdo each other with the craziest new designs and cutting edge technology, to keep us glued to our phones, a Swiss company called Punkt is taking a decidedly different tack.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

NTRU Prime NTRU Prime is a NTRU based lattice cryptosystem that attempts to improve on the original NTRU design by eliminating weaknesses in the structure of the rings used in older NTRU systems.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation.

Maqp/tfc: Tinfoil Chat

Maqp/tfc: Tinfoil Chat

Transmitter Program encrypts and signs plaintext data and relays the ciphertexts from Source Computer to her Networked Computer through a serial interface and a hardware data diode.

Private App Designs are Inherently More Secure

Private App Designs are Inherently More Secure

Private Services Have Huge Comparative Security Advantages If we look at early Internet services that have somehow made it to 2019, we have designs like the Domain Name System (DNS) and Network Time Protocol (NTP) that have no inherent privacy or security.

A thread written by @cynthiablee

A thread written by @cynthiablee

Even if your child didn't install this app, if your child disclosed sensitive information to a friend who did, Facebook now has full access to that data, not anonymized.

This 'parasite' protects your privacy by feeding smart speakers white noise

This 'parasite' protects your privacy by feeding smart speakers white noise

images courtesy of bjoern karmann project alias is designed to give users more control over their smart assistants, both when it comes to customisation and privacy. through an app users can train alias to react on a custom wake-word/sound, and once trained, alias can take control over your home assistant.

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin banking: trends so far Here are just a few of the reasons for this prediction: Fidelity (one of the biggest asset management companies on the planet) is launching a crypto custody service .

The 2018 Matrix Holiday Special!

The 2018 Matrix Holiday Special!

This ended up consuming a lot of time over the summer as we updated Synapse and the various matrix-*-sdks (and thus Riot) to only calculate and send details to the clients about members who are currently talking in a room, whereas previously we sent the entire state of the room to the client (even including users who had left).

The Tech Industry’s Psychological War on Kids – Richard Freed – Medium

The Tech Industry’s Psychological War on Kids – Richard Freed – Medium

This alliance pairs the consumer tech industry’s immense wealth with the most sophisticated psychological research, making it possible to develop social media, video games, and phones with drug-like power to seduce young users.

11 key readings on children’s data and privacy online

11 key readings on children’s data and privacy online

Here we highlight 11 studies that we have found valuable for insights regarding how children conceptualise privacy, their (often frustrated and resigned) interactions with digital environments as they negotiate privacy, their understandings of data, and the role of parents in children’s privacy online.

Signal >> Blog >> Setback in the outback

Signal >> Blog >> Setback in the outback

We can’t include a backdoor in Signal, but that isn’t a new dynamic either. Although we can’t include a backdoor in Signal, the Australian government could attempt to block the service or restrict access to the app itself.

Euro consumer groups: We think Android tracking is illegal

Euro consumer groups: We think Android tracking is illegal

"There is no real option to turn off Location History once it has been enabled; users can only pause it after the Google account has been created," stated the complaint (PDF) led by the Norwegian Consumer Council.

Private by Design: How we built Firefox Sync

Private by Design: How we built Firefox Sync

Where does it go?” With the Firefox Sync design, you enter a passphrase of your choosing and it is used to derive an encryption key that never leaves your computer.

'City of surveillance': privacy expert quits Toronto's smart-city project

'City of surveillance': privacy expert quits Toronto's smart-city project

But, as big tech companies continue to struggle with protecting privacy, experts have highlighted the dangers of the new plan, and answers to their questions have not yet been adequately answered.

On leveling the playing field and online tracking

On leveling the playing field and online tracking

As a result, third-parties have been engaged in activities like collecting the user’s browsing history, personal data, information about their device, and so on, which is a subversion of the built-in protections that browsers provide to prevent the “straightforward” ways of getting this data from the third-party’s own website (aka, their own users).