Menu

Blog

Archive for the ‘privacy’ category: Page 28

Jun 23, 2015

How facial recognition will change shopping in stores

Posted by in categories: futurism, privacy

Where will these biometrics be stored and who will have access to them?

Read more

Jun 3, 2015

How the Tech Behind Bitcoin Could Stop the Next Snowden — Klint Finley Wired

Posted by in categories: bitcoin, encryption, government, hacking, information science, privacy, security

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access. Read more

May 16, 2015

So, the NSA Has an Actual Skynet Program — Kim Zet Wired

Posted by in categories: privacy, robotics/AI, security, Skynet, supercomputing, surveillance

We’ve suspected it all along—that Skynet, the massive program that brings about world destruction in the Terminator movies, was just a fictionalization of a real program in the hands of the US government. And now it’s confirmed—at least in name.

As The Intercept reports today, the NSA does have a program called Skynet. But unlike the autonomous, self-aware computerized defense system in Terminator that goes rogue and launches a nuclear attack that destroys most of humanity, this one is a surveillance program that uses phone metadata to track the location and call activities of suspected terrorists. A journalist for Al Jazeera reportedly became one of its targets after he was placed on a terrorist watch list. Read more

May 2, 2015

WikiLeaks Finally Brings Back Its Submission System for Your Secrets

Posted by in categories: hacking, open access, open source, privacy

— Wired
It’s taken close to half a decade. But WikiLeaks is back in the business of accepting truly anonymous leaks.

On Friday, the secret-spilling group announced that it has finally relaunched a beta version of its leak submission system, a file-upload site that runs on the anonymity software Tor to allow uploaders to share documents and tips while protecting their identity from any network eavesdropper, and even from WikiLeaks itself. The relaunch of that page—which in the past served as the core of WikiLeaks’ transparency mission—comes four and a half years after WikiLeaks’ last submission system went down amid infighting between WikiLeaks’ leaders and several of its disenchanted staffers. Read more

Mar 31, 2015

Where Were You 3 Minutes Ago? Your Apps Know

Posted by in category: privacy

By Elizabeth Dwoskin — Wall Street Journal

Dozens of smartphone apps collect so much location data that their publishers can plot users’ comings and goings in detail, a forthcoming peer-reviewed study found.

Computer scientists at Carnegie Mellon University concluded that a dozen or so popular Android apps collected device location – GPS coordinates accurate to within 50 meters – an average 6,200 times, or roughly every three minutes, per participant over a two-week study period.

The research comes at a time of increasing concern about electronic privacy. A 2014 Pew survey found that more than 90 percent of Americans feel they’ve lost control over personal data. While savvy users understand that using mobile devices entails some privacy tradeoffs – for example, a navigation app will reveal their location to the app’s publisher – most don’t realize the extent to which such information is collected and distributed, the researchers said.
Ready more

Feb 2, 2015

The Mathematical Wonders behind Bitcoin

Posted by in categories: bitcoin, business, education, encryption, finance, hacking, hardware, information science, innovation, privacy

Vires in Bitcoin
Bitcoin as a cryptocurrency has had its moments of strength and weakness. The technology behind bitcoins, however, is a different story. While skeptics don’t expect a lot from Bitcoin as an alternative currency because of its volatility, they do have high hopes for the technological innovation that powers it, believing that it can be further developed to create something much powerful than Bitcoin itself.

To those who know Bitcoin as a great way of transacting online, but don’t completely understand its dynamics, it’s time to get acquainted with the cryptocurrency’s mathematical wonders that make anonymous, faster, and cheaper transactions of moving funds on the internet possible.

Most of us know that Bitcoin uses the SHA-256 hashing algorithm, but hashing serves a different function and purpose from that of digital signatures. Hashing actually provides proof that a message has not been changed because running the same hash always generates similar result.

Any message, regardless of the size can go into a hash function where the algorithm breaks it down, combines the parts, and “digests” it until it makes a fixed-length outcome called “digest”. However, a good hashing algorithm possesses some critical characteristics, in which the same message always produces the same result, as mentioned above, and it only works in one direction.

Continue reading “The Mathematical Wonders behind Bitcoin” »

Jan 4, 2015

New Book: An Irreverent Singularity Funcyclopedia, by Mondo 2000’s R.U. Sirius.

Posted by in categories: 3D printing, alien life, automation, big data, bionic, bioprinting, biotech/medical, complex systems, computing, cosmology, cryptocurrencies, cybercrime/malcode, cyborgs, defense, disruptive technology, DNA, driverless cars, drones, economics, electronics, encryption, energy, engineering, entertainment, environmental, ethics, existential risks, exoskeleton, finance, first contact, food, fun, futurism, general relativity, genetics, hacking, hardware, human trajectories, information science, innovation, internet, life extension, media & arts, military, mobile phones, nanotechnology, neuroscience, nuclear weapons, posthumanism, privacy, quantum physics, robotics/AI, science, security, singularity, software, solar power, space, space travel, supercomputing, time travel, transhumanism

Quoted: “Legendary cyberculture icon (and iconoclast) R.U. Sirius and Jay Cornell have written a delicious funcyclopedia of the Singularity, transhumanism, and radical futurism, just published on January 1.” And: “The book, “Transcendence – The Disinformation Encyclopedia of Transhumanism and the Singularity,” is a collection of alphabetically-ordered short chapters about artificial intelligence, cognitive science, genomics, information technology, nanotechnology, neuroscience, space exploration, synthetic biology, robotics, and virtual worlds. Entries range from Cloning and Cyborg Feminism to Designer Babies and Memory-Editing Drugs.” And: “If you are young and don’t remember the 1980s you should know that, before Wired magazine, the cyberculture magazine Mondo 2000 edited by R.U. Sirius covered dangerous hacking, new media and cyberpunk topics such as virtual reality and smart drugs, with an anarchic and subversive slant. As it often happens the more sedate Wired, a watered-down later version of Mondo 2000, was much more successful and went mainstream.”


Read the article here >https://hacked.com/irreverent-singularity-funcyclopedia-mondo-2000s-r-u-sirius/

Jan 3, 2015

Legal Consulting Firm Believes Artificial Intelligence Could Replace Lawyers by 2030

Posted by in categories: architecture, automation, big data, business, complex systems, computing, cybercrime/malcode, disruptive technology, economics, encryption, engineering, ethics, finance, futurism, geopolitics, governance, government, human trajectories, information science, innovation, internet, law, law enforcement, military, neuroscience, philosophy, policy, privacy, robotics/AI, science, security, software, strategy, supercomputing, transhumanism, transparency

Quoted: “Tony Williams, the founder of the British-based legal consulting firm, said that law firms will see nearly all their process work handled by artificial intelligence robots. The robotic undertaking will revolutionize the industry, “completely upending the traditional associate leverage model.” And: “The report predicts that the artificial intelligence technology will replace all the work involving processing information, along with a wide variety of overturned policies.”

Read the article here > https://hacked.com/legal-consulting-firm-believes-artificial…yers-2030/

Dec 30, 2014

The Blockchain is the New Database, Get Ready to Rewrite Everything

Posted by in categories: architecture, automation, big data, bitcoin, business, complex systems, computing, cryptocurrencies, cyborgs, defense, disruptive technology, economics, education, encryption, engineering, finance, futurism, genetics, geopolitics, governance, government, hacking, hardware, human trajectories, information science, internet, law, military, mobile phones, nanotechnology, neuroscience, open access, open source, philosophy, physics, privacy, robotics/AI, science, scientific freedom, security, singularity, software, strategy, supercomputing, transhumanism, transparency

Quoted: “If you understand the core innovations around the blockchain idea, you’ll realize that the technology concept behind it is similar to that of a database, except that the way you interact with that database is very different.

The blockchain concept represents a paradigm shift in how software engineers will write software applications in the future, and it is one of the key concepts behind the Bitcoin revolution that need to be well understood. In this post, I’d like to explain 5 of these concepts, and how they interrelate to one another in the context of this new computing paradigm that is unravelling in front of us. They are: the blockchain, decentralized consensus, trusted computing, smart contracts and proof of work / stake. This computing paradigm is important, because it is a catalyst for the creation of decentralized applications, a next-step evolution from distributed computing architectural constructs.

Screen Shot 2014-12-23 at 10.30.59 PM

Read the article here > http://startupmanagement.org/2014/12/27/the-blockchain-is-th…verything/

Dec 13, 2014

Confessional in the Palm of Your Hand

Posted by in category: privacy

By Rachel Metz — MIT Technology Review

http://www.technologyreview.com/sites/default/files/images/anonymous.appsx2020.png

“I want to quit Google,” the message on my iPhone read. “It’s boring here.”

Posted by an anonymous user in San Francisco to the confessional app Secret, the message quickly gained attention; after four days, it had received 78 comments, ranging from “just means you’re not on the right project” to “I quit Google, and it was one of the best decisions of my life.” At times, the original poster chimed in, saying things like: “I’ve been there a long time. Many jobs. The company no longer values initiative, and promotion is very slow.”

Continue reading “Confessional in the Palm of Your Hand” »

Page 28 of 31First2425262728293031