Category Archives for "Technology"

Blockchain: Practical use cases for the privacy pro – Learning from Estonia

Many Americans would not be able to point out Estonia on a map, yet, the tiny country has become a technological powerhouse and is the headquarters for NATO’€™s Cyber Defense Centre.

Estonia was also the first country to vote online (in 2005) and almost all Estonians can now file taxes online within minutes. Now the Estonian government is heavily turning to blockchain technology to further advance its digital government services and provide citizens with greater control over their personal data. According to Former Estonian President Toomas Hendrik Ilves, “€œEstonia is now a blockchain nation.”

Source: Blockchain: Practical use cases for the privacy pro – Learning from Estonia

How firms you have never interacted with can target your Facebook

Advertisers are seemingly able to access accounts with no input from the user.

On one of Facebook’s myriad setting screens, a place where few dare tread, is a list of places you’ve probably never heard of, all of whom insist that they know you. It’s emblematic of the data protection issues Facebook is struggling to address in the wake of the Cambridge Analytica scandal, of the fact that these problems spread far beyond Facebook, and of the easy solutions the company could take if only it had the courage.

Source: How firms you have never interacted with can target your Facebook | Technology | The Guardian

Cops Around the Country Can Now Unlock iPhones, Records Show

A Motherboard investigation has found that law enforcement agencies across the country have purchased GrayKey, a relatively cheap tool for bypassing the encryption on iPhones, while the FBI pushes again for encryption backdoors.

Source: Cops Around the Country Can Now Unlock iPhones, Records Show – Motherboard

China’s facial-recognition cameras caught suspect tryiing to blend in with 60,000 concertgoers

The man’s unlikely capture became the latest example of China’s growing use of facial recognition technology.

The 31-year-old man, wanted by police, had thought playing a numbers game would be enough to allow him to fade into anonymity.

Source: A suspect tried to blend in with 60,000 concertgoers. China’s facial-recognition cameras caught him. – The Washington Post

Advisory group releases IoT safety and design risk toolkit

Hundreds of initiatives have been launched over the past several years to tackle the issue of internet-of-things security in the design phase for devices. AgeLight Advisory Group Managing Director Craig Spiezle spent the time to review more than 1,500 documents to see what those initiatives hoped to achieve.

AgeLight has released the fruits of Spiezle’s work in the form of the IoT Safety and Trust Design Architecture and Risk Toolkit. The toolkit seeks to achieve three primary goals: to guide and drive industry into self-regulation, to promote high-value privacy and security practices, and to deliver trustworthy devices to the marketplace.

Source: Advisory group releases IoT safety and design risk toolkit

Google is testing self-destructing emails in new Gmail

Google is working on a brand new design for the web version of Gmail.

You can configure the expiration date so that your email disappears after 1 week, 1 month, multiple years, etc. You can also ask your recipient to confirm their identity with a passcode sent via text message. This sounds like a great way to associate email addresses with phone numbers and improve Google’s ads.

Source: Google is testing self-destructing emails in new Gmail | TechCrunch

DNS: Strengthening the Weakest Link in Internet Privacy

For many, the conversation about online privacy centers around a few high-profile companies, and rightly so. We consciously engage with their applications and services and want to know who else might access our information and how they might use it.

But there are other, less obvious ways that accessing the World Wide Web exposes us. In this post we will look at how one part of the web’s infrastructure, the Domain Name System (DNS), “leaks” your private information and what you can do to better protect your privacy and security. Although DNS has long been a serious compromise in the privacy of the web, we’ll discuss some simple steps you can take to improve your privacy online.

Source: DNS: Strengthening the Weakest Link in Internet Privacy

Cambridge Analytica scandal ‘highlights need for AI regulation’

Britain needs to lead the way on artificial intelligence regulation, in order to prevent companies such as Cambridge Analytica setting precedents for dangerous and unethical use of the technology, the head of the House of Lords select committee on AI has warned.

The Cambridge Analytica scandal, Lord Clement-Jones said, reinforced the committee’s findings, released on Monday in the report “AI in the UK: ready, willing and able?”

Source: Cambridge Analytica scandal ‘highlights need for AI regulation’ | Technology | The Guardian

EDPS launches ‘Privacy by Design’ contest for health apps

The European Data Protection Supervisor (EDPS) has announced the launch of a contest to design mobile health (m-health) applications implementing “privacy by design and by default” principles.

The aim is to create best practices that may constitute a reference for privacy-friendly development of mobile apps and give users more control over their personal information. Participants are challenged to develop a useful and user-friendly m-health application at the forefront of the implementation of the data protection by design and by default principle, as required under the GDPR. The deadline for submissions is the end of June.

Source: EDPS launches ‘Privacy by Design’ contest for m-health apps – Telecompaper

The privacy pro’s guide to explainability in machine learning

With the GDPR’s implementation date looming, there has been much discussion about whether the regulation requires a “right to an explanation” from machine learning models.

Regardless of the regulation’s effects on machine learning, however, the practical implications of attempting to explain machine learning models presents significant difficulties.

Source: The privacy pro’s guide to explainability in machine learning

1 2 3 45
>