India may force social media platforms to offer user verification - government sources

India may force social media platforms to offer user verification - government sources

NEW DELHI (Reuters) - India’s proposed new privacy bill may require large social media platforms to offer an identity-verification option, a potentially precedent-setting effort to rein in the spread of “fake news”, two government sources told Reuters on Thursday.

Porn, public transport and other dubious justifications for using facial recognition software

Porn, public transport and other dubious justifications for using facial recognition software

Last month the joint standing committee on intelligence and security told the government it needed to rethink its plans for a national facial verification database built off people’s passport and driver’s licence photos.

Click To Pray — The Pope's Dystopian ERosary — CyberPunks.com

Click To Pray — The Pope's Dystopian ERosary — CyberPunks.com

The daily prayers pushed to worshippers through Click to Pray could be tailored towards a particular outcome or diverted via a particular saint, and the verified prayers of the faithful totted up behind the sandstone edifice on Borgo Santo Spirito.

Australia proposed using facial recognition technology for online gambling and pornography age verification

Australia proposed using facial recognition technology for online gambling and pornography age verification

The Australian government’s Department of Home Affairs has proposed using facial recognition for online age verification for pornography and gambling websites visited by Australians as an update to Australia’s National Identity Security Strategy.

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft already offers Windows Secure Boot, a feature that checks for cryptographic signatures to confirm software integrity.Instead of relying on firmware, Microsoft has worked with AMD, Intel, and Qualcomm to make new central processing unit chips that can run integrity checks during boot in a controlled, cryptographically verified way.

UK drops plans for online pornography age verification system

UK drops plans for online pornography age verification system

Plans to introduce a nationwide age verification system for online pornography have been abandoned by the government after years of technical troubles and concerns from privacy campaigners.

UK's controversial 'porn blocker' plan dropped

UK's controversial 'porn blocker' plan dropped

In a written statement issued on Wednesday, Ms Morgan said the government would not be "commencing Part 3 of the Digital Economy Act 2017 concerning age verification for online pornography".Instead, she said, porn providers would be expected to meet a new "duty of care" to improve online safety.

How to Remove Your Personal Information From Mylife, Intelius, Spokeo, Radius, and BeenVerified

How to Remove Your Personal Information From Mylife, Intelius, Spokeo, Radius, and BeenVerified

This article will walk you through the steps you need to take to remove your personal information from the background check sites Mylife, Spokeo, BeenVerified, Radius, and Intelius.

A huge database of Facebook users’ phone numbers found online

A huge database of Facebook users’ phone numbers found online

Each record contained a user’s unique Facebook ID and the phone number listed on the account.TechCrunch verified a number of records in the database by matching a known Facebook user’s phone number against their listed Facebook ID.

Dan Larimer’s Game-Changing Facial ID Verification

Dan Larimer’s Game-Changing Facial ID Verification

Dan Larimer’s futuristic facial recognition network idea could solve decades old problems of identity that transcend blockchain itself.The new patent could solve major problems like identity theft which have collectively cost it’s victims over $107 billion the last 6 years.

Russian lawmakers want to restrict email access by telephone verification, and force providers to block banned information

Russian lawmakers want to restrict email access by telephone verification, and force providers to block banned information

Led by senators Andrey Klishas and Alexander Bashkin, the lawmakers have also proposed requiring email services to block messages containing information banned in Russia within 24 hours of being notified by the state authorities.“The adoption of this legislation will significantly reduce the number of false terrorist messages distributed through email services, create the legal conditions for bringing criminals to justice, and reduce the economic damage from such communications,” claims the draft law’s explanatory note.

Digital ID Verification – The Key to Developing Intelligent Security Systems

Digital ID Verification – The Key to Developing Intelligent Security Systems

With the increased advancement in intelligent systems, businesses can now implement systems that are able to verify users in real-time, all the while lending better security to transactions.

Passbase  -  Blog - Identity Checking - Why Digital Identities Drive Security And Privacy

Passbase - Blog - Identity Checking - Why Digital Identities Drive Security And Privacy

In today's hyper-connected world, aspects that cover user verification, reducing fraud, checking identity theft and enabling identity checking services are some of the main focus points for businesses, regulators and government bodies. For businesses, identity theft means losses, highlighting the need for companies to cautiously leverage identity checking services and identity card checking for user verification.

Tokyo 2020 will be the first Olympic Games to use facial recognition

Tokyo 2020 will be the first Olympic Games to use facial recognition

Select attendees of the games — including athletes, media, staff, and volunteers — will have their identities verified via a face scan to enter venues, the Tokyo Organizing Committee said in an announcement.

UK gov's porn block is a privacy disaster waiting to happen, says new report

UK gov's porn block is a privacy disaster waiting to happen, says new report

rolls out porn blocks for under 18s and tug tokens for over 18s that still want to enjoy the less fine things of life, a new report from the Open Rights Group (ORG) has highlighted yet more problems: this time in BBFC age verification certificate standards and data protection.

Online Tool Launched to Help Airline Passengers Avoid Facial Recognition

Online Tool Launched to Help Airline Passengers Avoid Facial Recognition

A tool has been launched by privacy rights groups to help travellers avoid the ‘invasive’ tech in US airports, amid growing concerns over the use of facial recognition technology. The site informs passengers on which airlines use facial recognition technology as part of the verification process during boarding.

Facial Recognition in Identity Verification

Facial Recognition in Identity Verification

There is no doubt that facial recognition systems have greatly improved the accuracy and efficiency of security verification processes while reducing labour costs, as the technology excels at detecting small but unique facial features that would be overlooked by human eyes.

Private data (including rates) of 49M Instagram influencers leaked

Private data (including rates) of 49M Instagram influencers leaked

Last night, TechCrunch reported that a massive database containing info of over 49 million Instagram influencers, celebrities, and brand accounts found in the open. As per the report, the data contained influencers’ Instagram handles, bios, verification status, location, email, and phone number.

No KYC Exchanges List

No KYC Exchanges List

This is a verified list of cryptocurrency bitcoin exchanges that have no KYC/AML and don’t need documents to trade. Exchanges that let you trade Bitcoin, Ethereum etc futures, perpetual markets and margin leverage with no ID verification and no KYC check.

Facebook accidentally scraped the email contacts of 1.5 million users

Facebook accidentally scraped the email contacts of 1.5 million users

"Last month we stopped offering email password verification as an option for people verifying their account when signing up for Facebook for the first time," a Facebook spokesperson said an a statement to Mashable.

This is how age verification will work under the UK's porn law

This is how age verification will work under the UK's porn law

"The user verifies their email address and then chooses an age verification option from our list of third party providers, using options such as SMS, credit card, passport, or driving licence," a spokesperson for AgeID explains.

An Email Marketing Company Left 809 Million Records Exposed Online

An Email Marketing Company Left 809 Million Records Exposed Online

Last week, security researchers Bob Diachenko and Vinny Troia discovered an unprotected, publicly accessible MongoDB database containing 150 gigabytes-worth of detailed, plaintext marketing data—including 763 million unique email addresses. The database, owned by the "email validation" firm Verifications.io, was taken offline the same day Diachenko reported it to the company.

Open Source Hardware Could Defend Against Next Generation Hacking

Open Source Hardware Could Defend Against Next Generation Hacking

Shane Oberloier and Joshua Pearce , CC BY-ND The future of distributed manufacturing Making open-source hardware systems more available increases regular people’s security by giving them verifiably secure options.

Intelligent Tracking Prevention 2.1

Intelligent Tracking Prevention 2.1

As of ITP 2.1, partitioned cookies are no longer supported and third-parties classified with cross-site tracking capabilities now have to use the Storage Access API to get any cookie access. When a partitioned cache entry is created for a domain that’s classified by ITP as having cross-site tracking capabilities, the entry gets flagged for verification.

We met to discuss BBFC's voluntary age verification privacy scheme, but BBFC did not attend

We met to discuss BBFC's voluntary age verification privacy scheme, but BBFC did not attend

For PCI DSS, the banks and their customers have more to lose than the processors For Age Verification, site users have more to lose than the processors, however only the processors seem likely to be involved in setting the standard We look forward to BBFC agreeing to meet us to discuss the outcome of the roundtable we held about their scheme, and to discuss our concerns about the new voluntary privacy standard.

Verifying Software Signatures

Verifying Software Signatures

[3] In this instance, "other authentication systems" refers to: [4] Checking Digital Fingerprints of Signed Software [ edit ] Once a user has carefully: Then the file(s) signatures must be verified against the signing key.

Tails report for December, 2018

Tails report for December, 2018

Part of this work was to switch our IDF format to JSON and to rewrite and release a new version of the Tails verification extension . The translation server (not yet in production) now updates its Git repository automatically using scripts. The staging website (not yet in production either) is updated automatically.

Why did the PGP Web of Trust fail?

Why did the PGP Web of Trust fail?

The PGP Web of Trust (WoT) Key Signing parties help grow the number of people each individual has verified personally.

CPJ Safety Advisory: Sophisticated phishing attacks mimic 2FA

CPJ Safety Advisory: Sophisticated phishing attacks mimic 2FA

The email asked journalists to enter their email and password details, which hackers were able to check in real time and send out a fake two-step verification request either as a SMS, via the authenticator app, or via push notifications.

Digital Safety: Using security keys to secure accounts against phishing

Digital Safety: Using security keys to secure accounts against phishing

Two-step verification is an extra layer of security used to protect accounts. The most secure way to protect accounts is by using a security key. A security key is a hardware device that you can either plug into your computer via USB or connect to wirelessly via your phone.

More