Street-Level Surveillance

Street-Level Surveillance

EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities.Every day, the threats to our rights expand as police use surveillance technologies to compile enormous databases filled with our personal information.

Conservative News Sites Track You Lots More Than Left-Leaning Ones

Conservative News Sites Track You Lots More Than Left-Leaning Ones

Popular right-leaning outlets analyzed by the researchers placed 227 cookies in a user's browser, versus 131 for the median popular left-leaning counterparts., the most popular right-leaning site, placed around 4 percent more cookies in women's browsers than , the most popular left-leaning site as categorized by BuzzFeed.

Chinese government deploys coronavirus tracking app to help curb outbreak

Chinese government deploys coronavirus tracking app to help curb outbreak

According to China’s National Health Commission, close contact refers to someone who has come in close distance, with no effective protection, with confirmed cases, suspected cases or mild cases while the person was ill or showed symptoms of being ill.

How Big Companies Spy on Your Emails

How Big Companies Spy on Your Emails

Motherboard has also obtained documentation that provides more specifics about how two other popular apps—Cleanfox and Slice—sell products based on users' emails to corporate clients.

Mental health websites don't have to sell your data. Most still do.

Mental health websites don't have to sell your data. Most still do.

For example, the page dedicated to treatments for depression on French health website Eurekasante contacts an astounding 71 third parties (compared to 36 in our first research) as soon as you open the page.

Breach at Indian Airline Affects 1.2 Million Passengers

Breach at Indian Airline Affects 1.2 Million Passengers

Using a brute-force attack, the researcher busted into an unencrypted database backup file containing the private information of more than 1.2 million passengers who flew with SpiceJet last month.

Fuck off Google! - Let's kick Google and co. out of our Lives and Spaces!

Fuck off Google! - Let's kick Google and co. out of our Lives and Spaces!

As a diverse multitude we can organize to resist and kick Google & co.Please contact us to suggest additions or modification of content, submit documents and proposals for research and action.Feel also free to participate by gardening our wiki.PARTICIPATE IN OUR WIKI.

Personal identification - People can now be identified at a distance by their heartbeat

Personal identification - People can now be identified at a distance by their heartbeat

The stress of telling a falsehood can alter someone’s heartbeat, so it could improve lie-detection technology, according to Wang Chen-chia, an engineer at Brimrose, another firm working on heartprint vibrometry.

There's nowhere to hide anymore: This AI can see around corners

There's nowhere to hide anymore: This AI can see around corners

Felix Heide/Princeton University Hiding behind a wall might not be practical for much longer thanks to new technology that uses artificial intelligence to see and even read around corners.The beam is bounced off a visible wall and onto a hidden object behind a corner.

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Army Research Lab has previously publicized research in this area, but these contracts, which started at the end of September 2019 and run until 2021, indicate the technology is now being actively developed for use in the field.“Sensors should be demonstrable in environments such as targets seen through automotive windshield glass, targets that are backlit, and targets that are obscured due to light weather (e.g., fog),” the Department of Defense indicated when requesting proposals.

Researchers warn census privacy efforts may muddy federal data

Researchers warn census privacy efforts may muddy federal data

The policy change came after Census Bureau research found that an attacker could isolate almost half of the respondents using public data, allowing them to be cross referenced with commercially available medical data, purchasing information and the like.

Let’s Reverse Engineer Discord

Let’s Reverse Engineer Discord

After encrypting the entire stream and sending with an RTP header, we can see this packet received and decrypted by our remote Discord client which is in a debugger.

New security system to revolutionise privacy

New security system to revolutionise privacy

A new uncrackable security system created by researchers at the University of St Andrews, King Abdullah University of Science and Technology (KAUST) and the Center for Unconventional Processes of Sciences (CUP Sciences) is set to revolutionise communications privacy.

TikTok on the clock, and the hacking won't stop: SMS spoofing vuln let baddies twiddle teens' social media videos

TikTok on the clock, and the hacking won't stop: SMS spoofing vuln let baddies twiddle teens' social media videos

TikTok, a mobile video app popular with teens, was vulnerable to SMS spoofing attacks that could have led to the extraction of private information, according to infosec researchers.Research from Israeli outfit Check Point found that an attacker could send a spoofed SMS message to a user containing a malicious link.

Let’s take back control of our events! #JoinMobilizon

Let’s take back control of our events! #JoinMobilizon

At this point, we are not talking about software, code or graphics yet: we are still focusing on the uses, the reality of organizing events and the real problems faced by the people who set them up.

Dr. Max Welling on Federated Learning and Bayesian Thinking

Dr. Max Welling on Federated Learning and Bayesian Thinking

The other thing is that with Bayesian update , if you have a very wide posterior distribution, then you know that parameter is not going be very important for making predictions.

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

Recently, a security researcher named Bob Diachenko found a database of user account info including their name and phone numbers for 267 million Facebook users.There’s no new information about how users can find out if their data was hacked and if the database is still being shared on hacker forums.

Revealed: NHS England bosses meet with tech and pharmaceutical giants to discuss price list of millions of Brits' medical data

Revealed: NHS England bosses meet with tech and pharmaceutical giants to discuss price list of millions of Brits' medical data

NHS Digital said in an “opportunity overview” document, seen by The Register , that it has the “foundations” to create an England-wide “single, national, standardised, event-based longitudinal record for 65 million citizens within two years,” that as well as being vital for “effective, efficient and safe patient care,” will service the “delivery data and insights to medical research organisations in the NHS, academia and Life Services.”.

New Intel CPU Vulnerability Puts Protected Data At Risk

New Intel CPU Vulnerability Puts Protected Data At Risk

Intel CPUs are at the center of controversy once again as yet another vulnerability is discovered by Cybersecurity researchers.According to their findings, the security vulnerability can compromise SGX (software guard extensions) protected by undervolting the CPU when executing protected computations, to the degree that the SGX memory encryption failed to protect data.

Chinese residents worry about rise of facial recognition

Chinese residents worry about rise of facial recognition

China was ranked the worst of 50 surveyed countries in a study looking at how extensively and invasively biometric ID and surveillance systems are being deployed.China has more facial recognition cameras than any other country and they are often hard to avoid.

China is using DNA samples to try to re-create the faces of Uighurs

China is using DNA samples to try to re-create the faces of Uighurs

The news: Chinese researchers are using blood taken from Uighurs to try to work out how to use a DNA sample to re-create an image of a person’s face, according to an investigation by the New York Times.

Website Calls for Investigation of Ring, Gets Blocked by Facebook

Website Calls for Investigation of Ring, Gets Blocked by Facebook

A leading digital rights organization on Tuesday said that Facebook was actively blocking its users from sharing a link to a web page critical of Amazon that labels its internet-connected home security products—namely, Ring doorbell cameras—a threat to “privacy, civil liberties, and security”.

New 5G flaws can track phone locations and spoof emergency alerts

New 5G flaws can track phone locations and spoof emergency alerts

Last week, the researchers found several security flaws in the baseband protocol of popular Android models — including Huawei’s Nexus 6P and Samsung’s Galaxy S8+ — making them vulnerable to snooping attacks on their owners.

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

While the researchers tested only Siri, Alexa, Google Assistant, Facebook Portal, and a small number of tablets and phones, the researchers believe all devices that use MEMS microphones are susceptible to Light Commands attacks.

Popular Android phones can be tricked into snooping on their owners

Popular Android phones can be tricked into snooping on their owners

“The impact of these attacks ranges from sensitive user information exposure to complete service disruption,” said Syed Rafiul Hussain and Imtiaz Karim, two co-authors of the research, in an email to TechCrunch.

Opinion: 50 years ago, I helped invent the internet. How did it go so wrong?

Opinion: 50 years ago, I helped invent the internet. How did it go so wrong?

Later that decade, the Advanced Research Projects Agency — a research funding arm of the Department of Defense created in response to Sputnik — determined they needed a network based on my theory so that their computer research centers could share work remotely.

You Got a Brain Scan at the Hospital. Someday a Computer May Use It to Identify You.

You Got a Brain Scan at the Hospital. Someday a Computer May Use It to Identify You.

The only privacy protection for subjects so far has been the fact that researchers who want to access data from the study have to sign agreements saying that they will not try to identify participants.

The Government Is Testing Mass Surveillance on the Border Before Turning It on Americans

The Government Is Testing Mass Surveillance on the Border Before Turning It on Americans

When the idea of a smart wall began gaining traction in 2017, three higher-ups from Palantir — the secretive data tech giant that has long been behind some of the government’s largest surveillance projects — left to co-found Anduril, a company dedicated to creating cutting-edge tech for border security.

You Are Being Continuously Tracked By Your Smart TVs: Here’s How

You Are Being Continuously Tracked By Your Smart TVs: Here’s How

Among the various OTT services, Roku and Amazon Fire TV track users and extract the user data.The automated crawler exhibited human behavior and monitored the tracking capabilities of OTT services by going through all the channels like an actual user.

Google reportedly targeted people with 'dark skin' to improve facial recognition

Google reportedly targeted people with 'dark skin' to improve facial recognition

Google has been using subcontracted workers to collect face scans from members of the public in exchange for $5 gift cards, according to a report from the New York Daily News.“They said to target homeless people because they’re the least likely to say anything to the media,” a former contractor told the Daily News.