, 'opacity': false, 'speedIn': , 'speedOut': , 'changeSpeed': , 'overlayShow': false, 'overlayOpacity': "", 'overlayColor': "", 'titleShow': false, 'titlePosition': '', 'enableEscapeButton': false, 'showCloseButton': false, 'showNavArrows': false, 'hideOnOverlayClick': false, 'hideOnContentClick': false, 'width': , 'height': , 'transitionIn': "", 'transitionOut': "", 'centerOnScroll': false }); }) HazDat
2Sep/13

Facebook Wants to Use Your Profile Pic to Help Automatic Photo Tagging

20130902-160235.jpg Facebook is proposing a series of changes to its terms if service. There's a lot of legal mumbo jumbo, but the most interesting piece is that Facebook wants to start using your profile photo as the basis for suggesting that you be tagged in your friends' photos. What Facebook's really saying here is that the content of your profile photo—and your face really—is now an actionable piece of data that it can associate with your identity. Previously, you could keep Facebook from "knowing" your face by not letting other people removing any tags of you. That's not exactly an option any more. In theory, you could refuse to upload your likeness to Facebook, but that's a pretty extreme measure. It's always been possible to turn off tag suggestions for your profile. When you do so, it deletes the "template" that Facebook created to identify you. It appears that this deletion applies to any template information that would be created from your Facebook profile photo as well. When we're talking about all this, it's important to remember that most people don't ever touch their privacy settings. So if the proposed changes go through, this is how it's going to be for a majority of users. So far, Facebook has only posted a section-by-section summary of the changes has been posted, but the actual tracked changes document isn't online yet that we can see. Luckily, ATD has the relevant section in its news post:

We are able to suggest that your friend tag you in a picture by scanning and comparing your friend’s pictures to information we’ve put together from your profile pictures and the other photos in which you’ve been tagged.

The old language:

We are able to suggest that your friend tag you in a picture by scanning and comparing your friend's pictures to information we've put together from the other photos you've been tagged in. This allows us to make these suggestions.

In the short-term, the change will improve the company's facial recognition so that it can suggest you be tagged in more photos all over the site. And of course, if it can find you all over the site, then it's got a more comprehensive sense of who you are. And of course since this is a proposed change, it won't take effect until after a certain waiting and deliberation period—so if it matters to you, make sure to weigh in.

Via http://gizmodo.com/facebook-wants-to-get-a-better-picture-of-what-your-loo-1222315712

Share
12Jun/12

iSpy: Apple Spy Planes @ WWDC

Attention sunbathers:

Why are these 1960's spys looking to the sky? Perhaps they're eyeing the competition.

Apple made many notable announcements at yesterday's Worldwide Developers Conference (WWDC). But less attention has gone to the fleet of spy planes bringing Apple's new aerial mapping software down to earth.

Also eyeing the competition is Google, who's mapping software will be replaced by Apple's new offering in iOS devices this Fall. Similarly, Google is said to have launched its own fleet of spy planes. Making the friendly skies a little less so.

With a resolution capible of focusing on objects as small as four inches, sunbathers might want to embrace their tan lines this Summer.

See: http://www.dailymail.co.uk/debate/article-2157582/Google-Apples-spy-planes-sun-lounger-sights.html#ixzz1xdA50Uyf

 

Share
Tagged as: No Comments
12Jun/12

UK reopens probe into Google’s Street View data capture

The ICO re-opened its investigation after a US probe uncovered more detail about the data captured Google is back under investigation after gathering personal data while cameras on its cars took pictures for its UK Street View service.

The Information Commissioner’s Office previously dropped a probe into the affair after being told limited data had been “mistakenly collected”.

However, it said it had since become aware of reports that a Google engineer had deliberately written software to obtain a wider range of material.

The ICO has asked for more information.

... CONTINUE READING »

Share
4May/12

Corporations Are People, My Friend. But, IP Addresses Are Not.

When a judge makes a good decision, it shouldn't be news. But, in this case, it's very good news indeed.  This week New York Magistrate Judge Gary Brown for the United States District Court for the Eastern District of New York filed a 26-page ruling pointing out that the person listed as an Internet account holder is often not the person using the account.

"It is no more likely that the subscriber to an IP address carried out a particular computer function–here the purported illegal downloading of a single pornographic film–than to say an individual who pays the telephone bill made a specific telephone call," Brown said in his Order & Report & Recommendation, filed May 1.

"An IP address merely identifies the location where a certain activity occurred", Brown noted. A computer in a household is usually shared, which means a child, a boyfriend, or any other visitor, is just as likely to be using the computer. Brown also noted that many households now have a wireless network. If the network is not secured, many people, including neighbors and strangers, can be sharing that IP address without the original account holder's knowledge.

"Considering the weak relationship between an IP address and personal identity, it's likely copyright holders were accusing the wrong people of violating copyright", Brown noted. Mass-BitTorrent lawsuits relying entirely on IP addresses to identify copyright infringers were a "waste of judicial resources," he wrote.

VIA: http://securitywatch.pcmag.com/security/297475-ip-address-not-a-person-judge-says-in-copyright-lawsuit

Share
12Apr/12

Social Networking Bill of Rights

BackgroundCheck.org has developed an interesting infographic seaks to address your rights as a social network user. (Click below for a larger view.)

Via: http://www.backgroundcheck.org/social-networking-bill-of-rights/

Share
30Mar/12

‘Massive’ credit card data breach involves all major brands

This breach has already been confirmed by the big processors, and seems to be larger in scope than prior breaches.

VIA http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/?source=cnn_bin

Share
23Mar/12

Sarkozy: Anyone who “consults Internet sites which promote terror” should go to jail

Sarkozy: Anyone who "consults Internet sites which promote terror" should go to jail | http://t.co/u34fQrH8

 

Share
19Mar/12

There’s an app for that: How researchers pwned your mind

Researchers turn smartphone users into unwitting minions with a simple app

With mobile users becoming more reliant on their devices and accompanying applications, researchers from Northwestern University have discovered the ease with which user’s mobility can be “soft” controlled.

As smartphone apps become further and further integrate into our daily lives, you have to wonder if we’re in control of our desires or if mobile applications are starting to controlling us.

To discover the ease with which app users can be manipulated, researchers from the McCormick School of Engineering at Northwestern University underwent a study to determine whether they could change the habits of a smartphone user’s mobility through gaming and social-networking applications. The goal was to compel them to visit areas less frequented.

How can an application affect on our decisions on a daily basis?

Like with advertising, we can be compelled by Foursquare to achieve or maintain our “Mayor” standing at a particular restaurant or venue. We might be manipulated, for instance, to travel not to the local pizza shop, but instead to the Chinese food store that we’ve been visiting repeatedly for the last month.

The research was conducted by John Rula and Fabián E.

Bustamant and titled, “Crowd (Soft) Control Moving Beyond the Opportunistic.” They used four foundational elements that work together offer individuals incentives:

  • Location: The location desired stated in terms of latitude and longitude, and optionally altitude and heading.
  • Action: The type of action to be triggered at the particular location and time.
  • Expiration Time: The time when the request is no longer valid; this is used to control the timing and relevancy of actions.
  • Ranking: The relative importance of the location. This can be used by the game to differentiate incentives by priority Rula and Bustamant created an Android-based augmented reality game titled, “Ghost Hunter,” which required users to chase monsters and ghosts throughout the neighborhood. The objective of the game was to “zap” the ghosts and monsters by capturing the augmented image on their mobile phone’s camera. But what users were not aware of was the researcher’s underlying intent.

The researchers had positioned the ghosts in exact locations, around a predetermined building. The resulting photographs of the “ghosts” enabled the researchers to create a 3D picture of the building from the collected images. While the photographic modeling of the building was successfully crowdsourced by the unsuspecting “Ghost Hunter” gamers, what the researchers had also discovered was the ability to compel users to capture images of the building from angles and locations typically not frequented, as the image below indicates.

While mobile users are concerned about their privacy, the ease with which they can be “soft” controlled raises a whole new issue altogether. Games and social networks not only offer a means of learning more about the people who use them, they can potentially offer a way to control their actions. Manipulating users into conducting illegal acts or luring them to dangerous locations is very much a reality.

Only days ago, three Japanese tourists were mislead by their GPS into the Moreton Bay in Australia during a low tide and became trapped in the thick mud. With the tide rising, they were forced to abandon their waterlogged rental car.

Ultimately, users will have to decide for themselves where they draw the line. As the research reiterates, “As augmented reality gamers can be trusted to exercise their best judgment during play, users of extended location based applications should be trusted to judge the suggestions made through CSC (Crowd Soft Control).”

Via http://www.digitaltrends.com/mobile/researchers-turn-smartphone-users-into-unwitting-minions-with-a-simple-app/

 

 

Share
15Mar/12

FBI’s most wanted smartphone

FBI Can't Crack Android Pattern-Screen Lock | Threat Level | Wired.com

Pattern-screen locks on Android phones are secure, apparently so much so that they have stumped the Federal Bureau of Investigation.

The bureau claims in federal court documents that forensics experts performed “multiple attempts” to access the contents of a Samsung Exhibit II handset, but failed to unlock the phone.

An Android device requires the handset’s Google e-mail address and its accompanying password to unlock the handset once too many wrong swipes are made. The bureau is seeking that information via a court-approved warrant to Google in order to unlock a suspected San Diego-area prostitution pimp’s mobile phone. (For details on the pimp investigation, check out Ars Technica‘s story on the case.)

Locking down a phone is even more important today than ever because smart phones store so much personal information.

What’s more, many states, including California, grant authorities the right to access a suspect’s mobile phone, without a warrant, upon arrest for any crime.

Forensic experts and companies in the phone-cracking space agreed that the Android passcode locks can defeat unauthorized intrusions.

“It’s not unreasonable they don’t have the capability to bypass that on a live device,” said Dan Rosenberg, a consultant at Boston-based Virtual Security Research.

A San Diego federal judge days ago approved the warrant upon a request by FBI Special Agent Jonathan Cupina. The warrant was disclosed Wednesday by security researcher Christopher Soghoian, In a court filing, Cupina wrote: (.pdf)

Failure to gain access to the cellular telephone’s memory was caused by an electronic ‘pattern lock’ programmed into the cellular telephone. A pattern lock is a modern type of password installed on electronic devices, typically cellular telephones. To unlock the device, a user must move a finger or stylus over the keypad touch screen in a precise pattern so as to trigger the previously coded un-locking mechanism. Entering repeated incorrect patterns will cause a lock-out, requiring a Google e-mail login and password to override. Without the Google e-mail login and password, the cellular telephone’s memory can not be accessed. Obtaining this information from Google, per the issuance of this search warrant, will allow law enforcement to gain access to the contents of the memory of the cellular telephone in question.

Rosenberg, in a telephone interview, suggested the authorities could “dismantle a phone and extract data from the physical components inside if you’re looking to get access.” However, that runs the risk of damaging the phone’s innards, and preventing any data recovery.

Linda Davis, a spokeswoman for forensics-solutions company Logicube of suburban Los Angeles, said law enforcement is a customer of its CellXtract technology, which it advertises as a means to “fast and thorough forensic data extraction from mobile devices.” But that software, she said in a telephone interview, “is not going to work” on a locked device.

All of which is another way of saying those Android screen locks are a lot stronger than one might suspect.

It was not immediately clear whether the iPhone’s locking system is as powerful as its Android counterpart. But the iPhone’s passcode has been defeated with simple hacks, the latest of which was revealed in October 2010.

Clearly, the bureau is none too happy about having to call in Google for help. The warrant requires Google to turn over Samsung’s “default code” in “verbal” or “written instructions for overriding the ‘pattern lock’ installed on the Samsung model SGH-T679.” Google spokesman Chris Gaither would not say if Google would challenge any aspect of the warrant. Google, he said, does not comment on “specific cases.” “Like all law-abiding companies, we comply with valid legal process. Whenever we receive a request we make sure it meets both the letter and spirit of the law before complying,” he said in an e-mail. “If we believe a request is overly broad, we will seek to narrow it.” Photo: Mike Dent/Flickr

Via http://www.wired.com/threatlevel/2012/03/fbi-android-phone-lock/

 

Share
8Feb/11

I Know What You Did Last Winter (Snow Job)

For those who believe revenge is a dish best served cold...

Like so many around the country, David Welles has had to endure a long cold Winter this year -- only made worse by the volume of snow in front of his Chicago home, and the untimely disappearance of his snow shovel. While Welles is no better equipped to dig his way out of a snowstorm than anyone else without a shovel, he was perfectly equipped to identify the perpetrator -- or, at least her car. That's because Welles works for a security company by the name of Tunnel Vision Technology, and it appears as though he's been visiting the supply closet.

While we'll presume that David's "eagle eye" came with a receipt, the snow shovel he caught his neighbor stealing on digital video didn't. Under ordinary circumstances, one might turn the evidence over to the police. Then again, under ordinary circumstances, it's not likely there would have been any evidence. But, these are no ordinary circumstances, and these are no ordinary times.

David's shovel was probably worth less than $25, maybe ten on the street. The trail was cold before it was laid. And the "perp" wore gloves, so no fingerprints. This wasn't about money. This was about the age's-old relationship between a man and his tools. Besides, Welles had another idea. He entered an arms race, added a dose of PsyOps... and then he turned to YouTube. The result? What Welles calls, "The Quadrilogy of My Favorite Snow Shovel". See the results for yourself.

(NOTE: If you are ONLY connaisseur of revenge, skip to the mid-point.)

Share

Log In


Join the conversation...

Join the conversation on Twitter

Join the conversation on Facebook

disquslogo_180 Subscribe to RSS feed

Join the Google conversaton…

Geo Visitors Map