In many parts of the world, like North America, using Wikipedia is taken for granted; hell, there are even Twitter accounts to track government employees editing the internet's free encyclopedia while on the clock. But in other places, like Turkey or Syria, using Wikipedia can be difficult, and even dangerous. To make using Wikipedia safer for at-risk users, former Facebook security engineer Alec Muffett has started an experimental dark net Wikipedia service that gives visitors some strong privacy protections. The project is unofficial; for now, Wikipedia isn't involved. So it's a bit janky. The service uses self-signed certificates that may trigger a security warning in Tor, so you have to manually white-list the addresses
The initial announcement of the plans this summer, viewed as part of President Donald Trump’s calls for the “extreme vetting” of visitors from Muslim countries, stoked a public outcry from immigrants and civil liberties advocates. They argued that such a plan would discriminate against Muslim visitors and potentially place a huge number of individuals under watch.
ICE officials subsequently changed the program’s name to “Visa Lifecycle Vetting.” But, according to the ICE presentation, the goal of the initiative—enhanced monitoring of visa holders using social media—remains the same.
Hillary Clinton has warned that the US is “totally unprepared” for the economic and societal effects of artificial intelligence. Speaking to radio host Hugh Hewitt this week in an interview promoting her recent book, the former Secretary of State said the world was “racing headfirst into a new era of artificial intelligence” that would affect “how we live, how we think, [and] how we relate to each other.”
Increasingly, researchers and artists are tinkering with machine-learning software to explore how neural networks can express creativity, whether through generating contemporary paintings or paint swatch names. Designer Philipp Schmitt decided to program a computer to produce a photobook, a process that involved curation as well as creation. The result, he believes, teaches us how to see our surroundings from a new perspective — “through the eyes of an algorithm,” in his words.
The US Department of Education's Free Application for Federal Student Aid program requires any student applying for federal aid for college or university to turn over an enormous amount of compromising personal information, including current and previous addresses, driver's license numbers, Green Card numbers, marital details, drug convictions, educational history, tax return details, total cash/savings/checking balances, net worth of all investments, child support received, veterans' benefits, children's details, homelessness status, parents details including SSNs, and much, much more.
If you have the Social Security Number, data of birth, and full name of anyone who's applied for college grants or loans, you can then feed it into the Free Application for Federal Student Aid website and it will show you all this data.
20,000,000 people have their data in this database.
Equifax and several other services have breached the Social Security Numbers of millions of Americans. The going price for a person's SSN on the darkweb is $4-5
Sensoria and Genesis Rehab Services will work together on products to monitor the daily activity of older adults, accelerate rehab and help with fall prevention.
Sensoria is a world leader in smart garment technologies. Genesis Rehab Services, a subsidiary of Genesis HealthCare, is a leading provider of physical therapy, occupational therapy, speech therapy, respiratory therapy and wellness services.
Sensoria will be using its digitally enhanced footwear to detect and predict fall scenarios. Genesis Rehab Services, on the other hand, will provide clinical validation of the data in rehab and activity monitoring.
If you were an Imgur user in 2014, you might want to consider changing your password. Yesterday, the photo-sharing site revealed that it learned of a security breach in 2014 that compromised the e-mail addresses and passwords of approximately 1.7 million users.
Computers are smart and, thanks to artificial neural networks, they are getting smarter. These networks, modelled after real neurological systems, allow computers to complete complex tasks such as image recognition. Until now, they have been impressively tough to fool. But one group of researchers claims to have found a way to reliably trick these networks into getting it wrong.
TLDR is what Linux man pages always should have been.
Wer mit verschnupfter Nase in die Apotheke geht, wird gefilmt: So läuft es derzeit in zwei österreichischen Apotheken, in denen der Pharmakonzern Bayer Austria testweise Gesichtsscanner einsetzt. Lässt ein Kunde sein Gesicht erfassen, zeigen Displays Werbung, die zu seinem Geschlecht und Alter passen.
Das ist krass: 12 der 13 getesteten Smartwatches oder Fitnessbänder geben deine intimsten Daten an große Firmen weiter. Und das kannst du nicht einmal unterbinden. Ansonsten bieten sie alle coole Technik
As misconfigured Amazon servers continue to leak sensitive data Australian Broadcasting Corporation (ABC) is the latest culprit of administrators not properly securing their cloud servers.
ICE officials have invited tech companies, including Microsoft, to develop algorithms that will track visa holders’ social media activity.
Texas Rangers have served Apple with a search warrant for data from deceased Sutherland Springs gunman Devin Patrick Kelley, who killed 26 people in a Texas church earlier this month.
Sarah Sims of Norfolk, West Virginia said school officials did nothing to stop her 9-year-old daughter from being bullied at school. So she put a digital audio recorder in her daughter's backpack to catch the bullying. The school found the recorder and police charged Sims with felony use of device to intercept oral communication and misdemeanor contributing to the delinquency of a minor. She faces five years in prison on the felony charge.
Anonymity and privacy researcher Sarah Jamie Lewis realized that a connected sex toy's "email a blowjob" feature had significant security vulnerabilities and has produced an entertaining and delightful Twitter thread explaining how she was able to both fingerprint electronic blowjob description files and disrupt them with code-injection attacks.
Fitness- und Wellness-Apps sind weitverbreitet. Doch was passiert, wenn man die Anbieter fragt, was sie speichern und an wen sie Daten weitergeben? Die Verbraucherschutzzentrale Nordrhein-Westfalen hat das bei zwölf Anbietern getestet. Nun hagelt es Abmahnungen sowie eine Klage gegen Apple.
Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git. The “fork and branch” workflow is a common way of collaborating on open source projects using Git and GitHub. In this post, I’m going to walk through this workflow (as I understand it—I’m constantly learning), with a focus toward helping those that are new to this sort of thing.
In 2017, a flaw causing vulnerabilities in millions of encryption keys, including national Estonian electronic ID (eID) cards, was discovered. A month and a half after the discovery, the Estonian Police publicly announced the vulnerability, but stated that the eID cards “are completely secure”.
Our article on the problems with the Estonian eID card attracted some criticism and non-specific allegations of inaccuracies. We recognise the sensitivities of the Estonian authorities on this issue, but stand behind the article.