This colorful printed patch makes you pretty much invisible to AI

This colorful printed patch makes you pretty much invisible to AI

They could be used to fool self-driving cars into reading a stop sign as a lamppost, for example, or they could trick medical AI vision systems that are designed to identify diseases.

E-readers reading your reading: A serious invasion of privacy?

E-readers reading your reading: A serious invasion of privacy?

I feel there are bigger things to worry about than whether Kobo knows what page of Fifty Shades (no, not really) I'm currently on, or if the Amazon lot are astonished to see that not only has my husband got all the paper editions of the George RR Martin books, but he's just bought them all as ebooks as well as they were "too heavy to carry to work".

Mission possible: How to fend off online trackers

Mission possible: How to fend off online trackers

By default, browsers store various bits of information on your computer about websites you visit: The cache is storage that contains images and other Web data. Bear in mind, however, that a VPN will not provide total protection against information harvesting by social networks, search engines, and online trackers.

California's Assembly Will Consider Only Industry Bills

California's Assembly Will Consider Only Industry Bills

We are disappointed the California Assembly Privacy and Consumer Protection Committee will not hear A.B. 1760 , which would have substantially strengthened the California Consumer Privacy Act. Tomorrow, the Privacy Committee will instead vote on several bills backed by Big Tech interests that will erode the CCPA and the promises this law made to give all Californians the privacy rights they want and deserve.

Does Facebook Survive Because Of Its Size Or Because We Gave Up On Privacy And Security?

Does Facebook Survive Because Of Its Size Or Because We Gave Up On Privacy And Security?

Perhaps the most existential question raised by Facebook’s lack of consequences over the past year is whether it has escaped harm because it is simply so big and intrinsic to modern life that we cannot live without it or whether we as a society have become so numb to privacy violations that we simply no longer care about our digital safety, security or privacy?

Defense against the Darknet, or how to accessorize to defeat video surveillance

Defense against the Darknet, or how to accessorize to defeat video surveillance

"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .

Integrating Network-Layer Privacy Protections With Cryptocurrencies

Integrating Network-Layer Privacy Protections With Cryptocurrencies

While significant effort has focused on protocol-layer protections, publications mapping IP addresses through tracking transaction broadcast origins and subsequently making connections with identities (through public keys) have amplified concerns that protocol-layer solutions are not the only means needed to safeguard privacy.

Research: Classification of attacks on Tor clients and Tor hidden services

Research: Classification of attacks on Tor clients and Tor hidden services

This message will be routed from the entry node of the hidden service, which is controlled by the adversary, to the central server and will include information such as the circuit ID, the cell timestamp, the source IP address, and the circuit ID.

Ad Industry Slams Texas Privacy Proposal

Ad Industry Slams Texas Privacy Proposal

by Wendy Davis @wendyndavis, Yesterday The ad industry is weighing in against a new privacy proposal in Texas that would require companies to obtain consumers' opt-in consent before drawing on data about them, including information used for ad targeting.

Cybersecurity Apps that will be Helpful in 2019

Cybersecurity Apps that will be Helpful in 2019

In case you would like to know what services a computer is running for network inventory purposes and managing service upgrades or to check which ports are open on a system and if those ports can be exploited in simulated attacks, then this is the right tool to implement a security strategy.

CoinFi News - Facebook senior executives used user data against competition and to help friends

CoinFi News - Facebook senior executives used user data against competition and to help friends

Facebook’s senior executives have been considering selling user data for years, according to leaked internal Facebook documents accessed by NBC News. NBC News claims these contain information that could be used as leverage over companies it partnered with—data about friends, relationships and photos.

“Blockchain in Cybersecurity: The future?” (From our Forums.)

“Blockchain in Cybersecurity: The future?” (From our Forums.)

NASA has decided to use blockchain technology as a way of enhancing security and minimizing denial of service and other different traffic service attacks. Also, blockchain security means there is no centralized authority in control of the network to verify the data going through it which makes it hard for hackers to orchestrate an attack.

Microsoft disabled or replaced these Google features in the new Edge

Microsoft disabled or replaced these Google features in the new Edge

Microsoft published a list of services that it replaces or disabled in the Chromium-based version of Microsoft Edge recently.

“Ethics” and Ethics

“Ethics” and Ethics

How should they even understand design ethics when there’s a user research department, an analytics group and, UX team each with a different focus? Philosophical ethics discusses the morality of human action, it doesn’t provide rules to program self-driving cars.

CAN YOU BE HACKED BY THE WORLD AROUND YOU?

CAN YOU BE HACKED BY THE WORLD AROUND YOU?

As someone who researches 3-D modeling, including assessing 3-D printed objects to be sure they meet quality standards, I’m aware of being vulnerable to methods of storing malicious computer code in the physical world.

How does it feel to be watched at work all the time?

How does it feel to be watched at work all the time?

Image copyright Robin Lubbock Image caption Humanyze's Ben Waber thinks firms need to find our more about how they function His company gathers "data exhaust" left by employees' email and instant messaging apps, and uses name badges equipped with radio-frequency identification (RFID) devices and microphones.

Impact of 5G on Location technology

Impact of 5G on Location technology

In the modern world, it means that 5G is stepping up, bringing entirely new techniques that improve and speed the location technology. The fifth generation of mobile connectivity brings everyone the chance to see the exact routes and up-to-date location information.

The Full Guide to Securing Your Data Over Wi-Fi

The Full Guide to Securing Your Data Over Wi-Fi

The hacker then connects to a real access point using a different wireless card, effectively funneling all of the information through their system before moving it along to the second network.

Facebook still tracks you after you deactivate account

Facebook still tracks you after you deactivate account

Deactivating isn't as extreme, the company says, and the social network continues collecting your data in case you change your mind and want to return to your profile.

Sharesome Launches #FindThePornstar Facial Recognition Tool

Sharesome Launches #FindThePornstar Facial Recognition Tool

By their own description, the Sharesome team just decided to pop off work one day in order to come up with a “simple solution for all porn fans out there.” Simple — like hackable?

Airbnb says sorry after man detects hidden camera with network scan

Airbnb says sorry after man detects hidden camera with network scan

As Nealie tells it in her Facebook post, it took 33 days and 10 more unsuspecting guests staying in the property (she knows because at least some of those guests contacted her, she says) before Airbnb told her, on 5 April, that it had removed the listing and the host.

Handshake: a peculiar chat experiment

Handshake: a peculiar chat experiment

This is primarily a design for out-of-band communication in which communicating parties aim to mitigate potential compromises in asymmetric encryption methodology ranging from CA poisoning to reliance on trusted centralized service providers for communications technology, and it can even be used to explore patterns in post-quantum readiness.

How to increase your chances of finding a hidden camera

How to increase your chances of finding a hidden camera

Step 3: Scan the house network to identify potential cameras. That is, if a host wants to hide a camera they can connect it to a network that you may not have access to.

Cameras Linked to Chinese Government Stir Alarm in U.K. Parliament

Cameras Linked to Chinese Government Stir Alarm in U.K. Parliament

Through a network of corporate partners, the Hangzhou-based security firm has supplied its surveillance cameras for use on the British parliamentary estate, as well as to police, hospitals, schools, and universities throughout the country, according to sources and procurement records.

Another scandal: Facebook user data reportedly at risk again

Another scandal: Facebook user data reportedly at risk again

Though At The Pool shut down in 2014, UpGuard wrote that, “this should offer little consolation to the app’s end users whose names, passwords, email addresses, Facebook IDs and other details were openly exposed for an unknown period of time.”.

Teenagers' social media photos used to train eBay's AI without their knowledge

Teenagers' social media photos used to train eBay's AI without their knowledge

eBay is training its artificial intelligence using photos harvested from a social network popular among teenage girls for sharing photographs of their outfits without their knowledge or consent. The online marketplace uses pictures uploaded by unsuspecting users of Chictopia, a popular “style” sharing website headquartered in San Francisco.

Airbnb guest found hidden surveillance camera by scanning Wi-Fi network

Airbnb guest found hidden surveillance camera by scanning Wi-Fi network

Nealie Barker posted an image on Facebook showing the location of the camera in the living room and a shot of the family from the sneaky video feed: We're not certain which of the two devices on the ceiling contains the camera.

Loki registers as the first Australian not-for-profit privacy firm

Loki registers as the first Australian not-for-profit privacy firm

The Loki Foundation will also use blockchain to support a developer community that will build a suite of software and online applications that enhance digital privacy.

Introducing Warp: Fixing Mobile Internet Performance and Security

Introducing Warp: Fixing Mobile Internet Performance and Security

One silver lining is that if you browse the unencrypted Internet through Warp, when it’s safe to do so, Cloudflare’s network can cache and compress content to improve performance and potentially decrease your data usage and mobile carrier bill.

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF is proud to announce its newest investigative team: the Threat Lab. Using a combination of research skills, the Threat Lab will take a deep dive into how surveillance technologies are used to target communities, activists, or individuals.

More