Thousands of infected IoT devices used in for-profit anonymity service

Thousands of infected IoT devices used in for-profit anonymity service

The code further uses a lib2p-based network stack to interact with the Interplanetary File System, which is often abbreviated at IPFS.

Tokyo's latest attraction: Transparent public toilets

Tokyo's latest attraction: Transparent public toilets

Designed by Shigeru Ban Architects, a Pritzker Prize-winning architecture firm, the two new sets of transparent toilets have been installed in two Shibuya parks -- Yoyogi Fukamachi Mini Park and Haru-no-Ogawa Community Park.

Welcome to Element!

Welcome to Element!

Welcome to a whole new beginning for Riot: welcome to your new Element, one where mainstream Matrix users will enjoy themselves too - and which will pave the way for wider adoption of open, secure, decentralised communication via Matrix throughout the world.- Matthew, Amandine, and the whole Element team.

Pop Smoke's social media led killers to LA home after he posted his address online by mistake

Pop Smoke's social media led killers to LA home after he posted his address online by mistake

Jonathan Tippet of Los Angeles Police Department's elite Robbery-Homicide Division, said that three men and two teenage boys likely went to the home because they knew Pop Smoke was there from social media posts.

Release v1.3.2 & v1.2.2 - Fix for persistent XSS vulnerability in filenames of attached files

Release v1.3.2 & v1.2.2 - Fix for persistent XSS vulnerability in filenames of attached files

This release includes an improved solution, which addresses the issue on a broader scope, avoiding this to reoccur in other areas of the code in the future.

YouTube decides it’s easier to treat all watchers of kids’ content as kids

YouTube decides it’s easier to treat all watchers of kids’ content as kids

According to the FTC complaint, while Google said internally that it had no "child-directed" content and didn't need to worry about COPPA, it was at the same time telling companies such as Mattel and Hasbro that "YouTube was unanimously voted as the favorite website for kids 2-12" and "93 percent of tweens visit YouTube to watch videos.".

Let’s take back control of our events! #JoinMobilizon

Let’s take back control of our events! #JoinMobilizon

At this point, we are not talking about software, code or graphics yet: we are still focusing on the uses, the reality of organizing events and the real problems faced by the people who set them up.

Are.na Blog  -  Reimagining Privacy Online Through A Spectrum of Intimacy

Are.na Blog - Reimagining Privacy Online Through A Spectrum of Intimacy

This essay uses physical structures as metaphors to describe the spectrum of privacy and intimacy in digital spaces, and it explores how users’ thoughts and conversations play out in communication apps and social networks.

Adobe Error Exposes 7.5 Million Users’ Personal Data

Adobe Error Exposes 7.5 Million Users’ Personal Data

Security researchers have recently discovered that Adobe accidentally exposed and compromised the private data of around 7.5 million accounts, including those of its own employees.Diachenko found that around 7.5 million Adobe Creative Cloud users had their accounts’ details exposed to the public.

Artist Designs Metal Jewelry to Block Facial Recognition Software from Tracking You

Artist Designs Metal Jewelry to Block Facial Recognition Software from Tracking You

Polish designer Ewa Nowak has created a solution for this type of Big Brother-esque monitoring—an elegant and minimalist metal mask called Incognito.Designer Ewa Nowak has created a way for you to avoid facial recognition.

This jewelry is a brilliant shield against face-recognition intrusions

This jewelry is a brilliant shield against face-recognition intrusions

Having seen the light-up glasses invented by Japan’s National Institute of Informatics to foil face recognition, Nowak decided to move her project in a different direction, creating what she describes as face jewelry. Much to her surprise, the Prince-like design was the first one Nowak tried and the first that worked.

Industry Watch: Beware the dark patterns of privacy

Industry Watch: Beware the dark patterns of privacy

And that, said John Biondi, vice president of experience design at Nerdery, “is a UX not crafted to respect privacy.” Instead, he thinks companies — and the people who design their websites and applications — will gain more trust and have more success if they offer their users both agency to control their data and transparency into how their data is being used.

Accessories for the Paranoid uses fake data to stop your devices spying on you

Accessories for the Paranoid uses fake data to stop your devices spying on you

The second object is an add-on to the well-known Amazon Echo virtual assistant, which responds to the call of "Alexa".Having to listen at all times in order to detect the call of its name, the Alexa device observes, processes and collects data in the user's home whenever it is switched on.

Opinion | A Brief History of How Your Privacy Was Stolen

Opinion | A Brief History of How Your Privacy Was Stolen

Up until around 2000, the technology industry never had enough processing power, memory, storage or network bandwidth to build products that could be deeply integrated with our lives.

Let’s retake control of our events! #JoinMobilizon

Let’s retake control of our events! #JoinMobilizon

We asked professional designers to help us develop our vision for Mobilizon. We asked two designers to work with us on this project, so that Mobilizon would, right from its conception, fit the needs and uses of the people who are going to use it.

What does GDPR mean for UX?

What does GDPR mean for UX?

The General Data Protection Regulation (GDPR) act came into effect in May last year — it’s a legal framework that sets out guidelines on how to collect and process personal information within the European Union.

Sky Views: The government is quietly creating a digital ID card without us noticing

Sky Views: The government is quietly creating a digital ID card without us noticing

In mid-April, a few days after the launch of the government's long-waited Online Harms white paper, the Information Commissioner's Office (ICO) announced a code of practice for age-appropriate design online, proposing strong restrictions on the way under-18s are treated online.

The genius move behind Facebook groups: Mining users for more valuable data

The genius move behind Facebook groups: Mining users for more valuable data

In an Instagram post on Tuesday, , “Now we’re focused on building the digital equivalent of the living room, where you can interact in all the ways you’d want privately — from messaging and stories to secure payments and more.” He added, “We’ve redesigned Facebook to make communities as central as friends.

Facebook CEO Mark Zuckerberg says the ‘future is private’

Facebook CEO Mark Zuckerberg says the ‘future is private’

His opening statements build on the massive shift in Zuckerberg’s vision for the company that he first outlined early last month when he announced Facebook would transition away from the News Feed and public posts and toward a “privacy-focused communications platform” that unified its messaging products around concepts like ephemerality and encryption.

“Ethics” and Ethics

“Ethics” and Ethics

How should they even understand design ethics when there’s a user research department, an analytics group and, UX team each with a different focus? Philosophical ethics discusses the morality of human action, it doesn’t provide rules to program self-driving cars.

Handshake: a peculiar chat experiment

Handshake: a peculiar chat experiment

This is primarily a design for out-of-band communication in which communicating parties aim to mitigate potential compromises in asymmetric encryption methodology ranging from CA poisoning to reliance on trusted centralized service providers for communications technology, and it can even be used to explore patterns in post-quantum readiness.

The £300 ‘dumb phone’ with ZERO apps could fix your smartphone addiction

The £300 ‘dumb phone’ with ZERO apps could fix your smartphone addiction

AS SMARTPHONE brands try and outdo each other with the craziest new designs and cutting edge technology, to keep us glued to our phones, a Swiss company called Punkt is taking a decidedly different tack.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

NTRU Prime NTRU Prime is a NTRU based lattice cryptosystem that attempts to improve on the original NTRU design by eliminating weaknesses in the structure of the rings used in older NTRU systems.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation.

Maqp/tfc: Tinfoil Chat

Maqp/tfc: Tinfoil Chat

Transmitter Program encrypts and signs plaintext data and relays the ciphertexts from Source Computer to her Networked Computer through a serial interface and a hardware data diode.

Private App Designs are Inherently More Secure

Private App Designs are Inherently More Secure

Private Services Have Huge Comparative Security Advantages If we look at early Internet services that have somehow made it to 2019, we have designs like the Domain Name System (DNS) and Network Time Protocol (NTP) that have no inherent privacy or security.

A thread written by @cynthiablee

A thread written by @cynthiablee

Even if your child didn't install this app, if your child disclosed sensitive information to a friend who did, Facebook now has full access to that data, not anonymized.

This 'parasite' protects your privacy by feeding smart speakers white noise

This 'parasite' protects your privacy by feeding smart speakers white noise

images courtesy of bjoern karmann project alias is designed to give users more control over their smart assistants, both when it comes to customisation and privacy. through an app users can train alias to react on a custom wake-word/sound, and once trained, alias can take control over your home assistant.

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin banking: trends so far Here are just a few of the reasons for this prediction: Fidelity (one of the biggest asset management companies on the planet) is launching a crypto custody service .

The 2018 Matrix Holiday Special!

The 2018 Matrix Holiday Special!

This ended up consuming a lot of time over the summer as we updated Synapse and the various matrix-*-sdks (and thus Riot) to only calculate and send details to the clients about members who are currently talking in a room, whereas previously we sent the entire state of the room to the client (even including users who had left).