Who needs democracy when you have data? - MIT Technology Review
https://www.technologyreview.com/s/611815/who-needs-democracy-when-you-have-data/
Here’s how China rules using data, AI, and internet surveillance.
https://www.technologyreview.com/s/611815/who-needs-democracy-when-you-have-data/
Here’s how China rules using data, AI, and internet surveillance.
A company that sells surveillance software to parents and employers
hashed passwords and logins, Facebook messages
trying to enter the U.S. on a fake passport that may have passed at face value with humans
critics worry about the implications for invasions of privacy … and the potential for mistaken matches.
The AI advances that brought you Alexa are teaching propaganda how to talk.
https://www.nytimes.com/2018/08/23/technology/huawei-banned-australia-5g.html
Companies that “are likely to be subject to extrajudicial directions from a foreign government” pose unacceptable security risks, the ministers said.
https://www.nytimes.com/interactive/2018/08/17/technology/alexa-siri-conversation.html
https://techcrunch.com/2018/08/22/apple-facebook-onavo/
the app’s true intentions were buried deep in its description: “Onavo collects your mobile data traffic…
https://www.bt.no/btmeninger/debatt/i/jPjJaL/Prisen-for-en-digitalisert-skole
Til skolestart i år får bergenske åttendeklassinger hver sin Chromebook.
Det er billig i kroner og øre, men vi betaler likevel en høy pris. I praksis kjøper Bergen kommune datamaskiner til barna våre ved å selge persondataene deres.
https://mashable.com/2018/08/13/instagram-hack-locked-out-of-account/#C5l2Wp7_pqqs
https://www.nytimes.com/2018/08/13/business/behavioral-biometrics-banks-security.html
The way you press, scroll and type on a phone screen or keyboard can be as unique as your fingerprints or facial features.
https://www.thedailybeast.com/chinese-police-are-spying-on-uighurson-american-soil
threatening to detain their relatives if they do not provide personal and identifying information to Chinese police.
https://www.buzzfeednews.com/article/kevincollier/2016-sweden-ddos-expressen-hack-russia-cables
the attack was part of a Russian campaign to sow disinformation about NATO
https://www.wired.com/story/police-body-camera-vulnerabilities/
the vulnerabilities would allow an attacker to download footage off a camera, edit things out or potentially make more intricate modifications, and then re-upload it, leaving no indication of the change.
https://www.wired.com/story/machine-learning-identify-anonymous-code/
The researchers don’t rely on low-level features, like how code was formatted. Instead, they create “abstract syntax trees,” which reflect code’s underlying structure, rather than its arbitrary components.
https://apnews.com/828aefab64d4411bac257a07c1af0ecb
Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to.
https://www.engadget.com/2018/08/13/deepmind-ai-moorfields-eye-hospital-disease/
The tool searches OCT scans for over 50 eye diseases including macular degeneration.
In addition, the system can show its workings, allowing eye care professionals to scrutinize the final assessment.
https://www.wired.com/story/mac-remote-hack-wifi-enterprise/
targets enterprise Macs that use Apple’s Device Enrollment Program and its Mobile Device Management platform.
https://money.cnn.com/2018/08/04/news/companies/wells-fargo-mortgage-modification/index.html
Hundreds of people had their homes foreclosed on after software used by Wells Fargo incorrectly denied them mortgage modifications.
tricking a provider like AT&T into transferring the target’s phone number to a SIM card controlled by the criminal.
reset the victims’ passwords and break into their online accounts