Two people with paralysis walk again using an implanted device - The Verge
The researchers are still investigating how this all works.
The researchers are still investigating how this all works.
https://blog.cryptographyengineering.com/2018/09/23/why-im-leaving-chrome/
From now on, every time you log into a Google property (for example, Gmail), Chrome will automatically sign the browser into your Google account for you. […] Google developers claim this will not actually start synchronizing your data to Google — yet.
https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.htm
The review of 20 children’s apps […] found examples on both platforms that sent data to tracking companies, potentially violating children’s privacy law; the iOS apps sent less data over all.
We need paper verifiable ballots, no internet voting, and we need to ensure we can audit ballots properly.
http://www.thedrive.com/tech/23599/tesla-stolen-from-mall-of-america-using-only-a-smartphone
A little bit of social engineering can go a long way.
https://www.wired.com/story/weather-channel-hurricane-florence-storm-surge-graphic/
It fills in the gaps of your imagination, and hopefully underscores for anyone in a flood zone all the reasons they should not be.
https://www.nrk.no/ostfold/sykehuset-matte-avbryte-narkose-fordi-pc-ble-oppdatert-1.14206040
PC-en som ble brukt begynte automatisk å oppdatere programvaren midt i undersøkelsen, som derfor måtte avbrytes fordi sykehuset ikke hadde en reserve-PC tilgjengelig.
GCHQ’s methods for bulk interception of online communications violated privacy and failed to provide sufficient surveillance safeguards, the European court of human rights has ruled.
To understand how digital technologies went from instruments for spreading democracy to weapons for attacking it, you have to look beyond the technologies themselves.
To name a few: ASKfm, NOAA Weather Radar, Homes.com, Perfect365
https://www.nytimes.com/2018/09/07/world/europe/youtube-far-right-extremism.html
the platform’s recommendation system consistently directed people toward extremist videos on the riots — then on to far-right videos on other subjects.
https://www.nytimes.com/2018/08/31/world/middleeast/hacking-united-arab-emirates-nso-group.html
leaked documents and emails that directly challenge the company’s repeated assertions that it is not responsible for any illegal surveillance conducted by the governments that buy its spyware.
https://www.nytimes.com/aponline/2018/08/30/world/europe/ap-eu-sweden-elections-twitter.html
The FOI agency noted that “it is 40 percent more common that the bots express support for the Swedish Democrats compared to what genuine accounts do.”
https://www.lego.com/en-us/aboutus/news-room/2018/august/technic-bugatti-chiron-build-for-real/
non-glued, fully-functional and self-propelled LEGO Technic model can fit two passengers inside and accelerate to over 20km/h
https://motherboard.vice.com/en_us/article/j5nzx4/what-was-the-first-blockchain
the world’s oldest blockchain predates Bitcoin by 13 years and it’s been hiding in plain sight
at the moment, self-driving car tech doesn’t seem to be advanced enough to handle all these humans.
https://theintercept.com/2018/08/28/google-china-censorship-plan-human-rights/
represents “an alarming capitulation by Google on human rights” and could result in the company “directly contributing to, or [becoming] complicit in, human rights violations.”
Impact of high levels of toxic air ‘is equivalent to having lost a year of education’