Schneier on Security

We project that about 60% of the searches for individuals of European-descent will result in a third cousin or closer match, which can allow their identification using demographic identifiers. We demonstrate that the technique can also identify research participants of a public sequencing project.

Fake fingerprints can imitate real ones in biometric systems – research

Fake fingerprints can imitate real ones in biometric systems – research

Based on those insights, the researchers used a common machine learning technique, called a generative adversarial network, to artificially create new fingerprints that matched as many partial fingerprints as possible.

HTTP/3: Come for the speed, stay for the security

HTTP/3: Come for the speed, stay for the security

In 2013, Google introduced a new experimental protocol called Quick UDP Internet Connections (QUIC), that would make HTTP requests faster and more secure. Google estimates that traditional TCP-based HTTP requests take about 100ms because the client has to establish a connection with the server before it asks for anything.

A new Venezuelan ID, created with China's ZTE, tracks citizen behavior

A new Venezuelan ID, created with China's ZTE, tracks citizen behavior

As part of a $70 million government effort to bolster “national security,” Venezuela last year hired ZTE to build a fatherland database and create a mobile payment system for use with the card, according to contracts reviewed by Reuters.

DigitalBits: An Economy Reimagined – DigitalBitsOrg – Medium

DigitalBits: An Economy Reimagined – DigitalBitsOrg – Medium

DigitalBits is a protocol layer Blockchain designed to help facilitate mass market liquidity of various digital assets and integrate with existing apps to drive market-adoption of Blockchain technology. Applications utilize DigitalBits technology to facilitate mass market liquidity of various digital assets.

New Boom in Facial Recognition Tech Prompts Privacy Alarms

New Boom in Facial Recognition Tech Prompts Privacy Alarms

Another example comes from Seattle-based tech company RealNetworks, where Mike Vance, senior director of product management, has received dozens of recent queries from K-12 schools across the nation seeking to participate in RealNetworks’ Secure, Accurate Facial Recognition (SAFR) program.

Alarm over talks to implant UK employees with microchips

Alarm over talks to implant UK employees with microchips

Britain’s biggest employer organisation and main trade union body have sounded the alarm over the prospect of British companies implanting staff with microchips to improve security.

Microsoft Office Was Hackers' Favorite App Target This Year

Microsoft Office Was Hackers' Favorite App Target This Year

Kaspersky blocked 796.8 million attacks around the globe in Q1 2018, and the company found that one popular productivity suite was the victim of more than 47 percent of exploits: Microsoft Office.

Need medical help? Sorry, not until you sign away your privacy

Need medical help? Sorry, not until you sign away your privacy

I dutifully entered my info anyway—immediate physical needs have a way of leapfrogging over data privacy concerns, even for people like me who feel strongly about maintaining control over how their information is collected and used.

GCHQ uses Instagram to 'open up world of espionage' to public

GCHQ uses Instagram to 'open up world of espionage' to public

After years of secretly hoovering up metadata about millions of citizens, Britain’s spy agency has made its public foray into one of the growing sources for such information by opening its own Instagram account.

Equifax Has Chosen Experian. Wait, What? — Krebs on Security

Equifax Has Chosen Experian. Wait, What? — Krebs on Security

The news came in an email Equifax is sending to people who took the company up on its offer for one year of free credit monitoring through its TrustedID Premier service.

Why “Cyber” is Red-Hot (and why it’s a Burning Civil Liberties Issue) - BC Civil Liberties Association

Why “Cyber” is Red-Hot (and why it’s a Burning Civil Liberties Issue) - BC Civil Liberties Association

Cyber security is increasingly a national security matter; think: cyber-attacks against critical infrastructure or military equipment (like power grids and satellites). Many countries are responding to these threats, including Canada, which has a new National Cyber Security Strategy.

EFF Sues California Law Enforcement Agency For Refusing To Hand Over Stingray Documents

EFF Sues California Law Enforcement Agency For Refusing To Hand Over Stingray Documents

In an attempt to learn about Defendants’ use of these devices, EFF sent a request for records relating to six cell site simulator warrants that precisely identified each warrant using the information on the Department of Justice’s OpenJustice website, including the date range of the authorized search, the nature of the investigation, the items to be searched for, and the exact date and time Defendants electronically provided information about them to the Department of Justice.

The Facebook Dilemma

The Facebook Dilemma

On Monday, Oct. 29, and Tuesday, Oct. 30, 2018, FRONTLINE presents The Facebook Dilemma. With dozens of original interviews and rare footage, The Facebook Dilemma examines the powerful social media platform’s impact on privacy and democracy in the U.S. and around the world.

Court: Teen’s driving killed someone, but he can’t be forced to give up passcode

Court: Teen’s driving killed someone, but he can’t be forced to give up passcode

A Florida state appellate court has ruled that an inebriated teenager involved in a car crash that resulted in the death of another person cannot be compelled to provide a passcode to his iPhone 7—the boy can indeed invoke a Fifth Amendment privilege, protecting him against self-incrimination.

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

The information I found on the drives, including candidates, precincts, and the number of votes cast on the machine, were not encrypted. By using a $15 palm-sized device, my team was able to exploit a smart chip card, allowing us to vote multiple times.

Quantum Computing – Is the World of a Security Internet Over?

Quantum Computing – Is the World of a Security Internet Over?

After decades and billions of dollars in research, designs are finally coming online that can solve tasks faster than classical computer designs.

A new ‘smart firewall’ iPhone app promises to put your privacy before profits

A new ‘smart firewall’ iPhone app promises to put your privacy before profits

For weeks, a small team of security researchers and developers have been putting the finishing touches on a new privacy app, which its founder says can nix some of the hidden threats that mobile users face — often without realizing.

Tim Cook: Personal data collection is being 'weaponized against us with military efficiency'

Tim Cook: Personal data collection is being 'weaponized against us with military efficiency'

And those of us who believe in technology's potential for good must not shrink from this moment," Cook said. They may say to you, "Our companies will never achieve technology's true potential if they are constrained with privacy regulation." But this notion isn't just wrong, it is destructive.

The Linux Kernel's Speck Death Sentence Finally Being Carried Out

The Linux Kernel's Speck Death Sentence Finally Being Carried Out

The removal of Speck from the Linux kernel tree is finally happening.Google decided in August they wouldn't use Speck as planned but rather work on the new HPolyC crypto code for use in future Android Go devices.

Hackers breach Healthcare.gov system, taking files on 75,000 people

Hackers breach Healthcare.gov system, taking files on 75,000 people

A government system used by insurance agents and brokers to help customers sign up for healthcare plans was breached, allowing hackers to siphon off sensitive and personal data on 75,000 people. CMS didn’t say exactly what kind of data was included in the stolen files, nor did it say how the breach happened.

How to increase the value of your anonymized data? – Generate Vision – Medium

How to increase the value of your anonymized data? – Generate Vision – Medium

From figure 3 we can see that faces images processed by conventional anonymization methods not only produce bad segmentation boundaries, but also make the segmentation model to infer completely new object classes that were never present in the original image, like cats or bottles.

How the FOSTA Rules Create a “Bootleggers and Baptists” Scenario for the 21st Century

How the FOSTA Rules Create a “Bootleggers and Baptists” Scenario for the 21st Century

While internet content providers like Facebook and Amazon are not “bootleggers” themselves, since they operate within the law, they are roughly equivalent to the licit producers of alcohol during Prohibition, who benefited from a competitive moat created by the new rules.

Facebook Is Developing A Camera-Equipped TV Device Capable Of Streaming — Report

Facebook Is Developing A Camera-Equipped TV Device Capable Of Streaming — Report

reportedly is developing a television set-top box equipped with a camera, that would allow for video calling as well as streaming, according to Cheddar TV. This new TV device would incorporate these same video features, and also allow users to stream entertainment content — likely, videos from Facebook Watch.

Apple to US users: Here's how you can now see what personal data we hold on you

Apple to US users: Here's how you can now see what personal data we hold on you

The move brings the four countries in line with Europe, where Apple began offering a simpler way to download a copy of user data in May, just before the EU's strict GDPR privacy legislation came into effect.

The Good Censor - GOOGLE LEAK

The Good Censor - GOOGLE LEAK

From elections and political propaganda, trolls and gendered bigotry, to hate speech and religious extremism, Bots and troll farms lash out at free thought and controversial opinion, while faceless users attack each other without empathy. Free speech becomes a social, economic and political weapon.

Google Ads Begins Recording Some Calls Initiated by Call Extensions

Google Ads Begins Recording Some Calls Initiated by Call Extensions

When a user initiates a call from a call-only ad or call extension they will hear a short message informing them that the call may be recorded by Google for quality assurance.

Tech Workers Now Want to Know: What Are We Building This For?

Tech Workers Now Want to Know: What Are We Building This For?

Last year, a small team of Clarifai engineers began working on a project inside a private room at its downtown New York office, said three people with knowledge of the matter, who spoke on the condition that they not be identified for fear of retaliation.

Tell these Senators to vote "no" on Supreme Court nomination

Tell these Senators to vote "no" on Supreme Court nomination

If Brett Kavanaugh is confirmed, we’ll no longer be able to rely on the federal judiciary to protect the rights of the most vulnerable people in our country.

US government loses bid to force Facebook to wiretap Messenger calls

US government loses bid to force Facebook to wiretap Messenger calls

A joint federal and state law enforcement effort investigating the MS-13 gang had pushed a district court to hold the social networking giant in contempt of court for refusing to permit real-time listening in on voice calls.

More