The Safest Ways to Log In to Your Computer

from Wired Whether your computer runs Windows, macOS, or Chrome OS, you have options for how you log in. And your choice doesn’t only affect how convenient it is for you to get into your laptop or desktop; it also affects how easily someone else can gain access. These are the different login options that are available and that you need to be aware of, so make sure you choose wisely. The right one for you will depend on how your computer is set up and just how cautious you’d like to be. More here.

Continue reading

Some Shirts Hide You From Cameras—But Will Anyone Wear Them?

from ars technica Right now, you’re more than likely spending the vast majority of your time at home. Someday, however, we will all be able to leave the house once again and emerge, blinking, into society to work, travel, eat, play, and congregate in all of humanity’s many bustling crowds. The world, when we eventually enter it again, is waiting for us with millions of digital eyes—cameras, everywhere, owned by governments and private entities alike. Pretty much every state out there has some entity collecting license plate data from millions of cars—parked or on the road—every day. Meanwhile all kinds […]

Continue reading

Signal Is Finally Bringing Its Secure Messaging to the Masses

from Wired Last month, the cryptographer and coder known as Moxie Marlinspike was getting settled on an airplane when his seatmate, a Midwestern-looking man in his sixties, asked for help. He couldn’t figure out how to enable airplane mode on his aging Android phone. But when Marlinspike saw the screen, he wondered for a moment if he was being trolled: Among just a handful of apps installed on the phone was Signal. Marlinspike launched Signal, widely considered the world’s most secure end-to-end encrypted messaging app, nearly five years ago, and today heads the nonprofit Signal Foundation that maintains it. But […]

Continue reading

Facial Recognition Moves Into a New Front: Schools

from NYTs Jim Shultz tried everything he could think of to stop facial recognition technology from entering the public schools in Lockport, a small city 20 miles east of Niagara Falls. He posted about the issue in a Facebook group called Lockportians. He wrote an Op-Ed in The New York Times. He filed a petition with the superintendent of the district, where his daughter is in high school. But a few weeks ago, he lost. The Lockport City School District turned on the technology to monitor who’s on the property at its eight schools, becoming the first known public school […]

Continue reading

Facebook’s Oversight Board Bylaws: For Once, Moving Slowly

from Lawfare As America’s longest-serving member of Congress once said, “I’ll let you write the substance … and you let me write the procedure, and I’ll screw you every time.” This wisecrack explains why the newly released bylaws for Facebook’s Oversight Board are important. Facebook announced in 2018 that it would be setting up the board as an independent institution to review the company’s decisions about what is or is not allowed on its services. Last year, Facebook released its global consultation report and final charter for the board. As I wrote at the time, those documents were high level […]

Continue reading

We’re Banning Facial Recognition. We’re Missing the Point.

from NYTs Communities across the United States are starting to ban facial recognition technologies. In May of last year, San Francisco banned facial recognition; the neighboring city of Oakland soon followed, as did Somerville and Brookline in Massachusetts (a statewide banmay follow). In December, San Diego suspended a facial recognition program in advance of a new statewide law, which declared it illegal, coming into effect. Forty major music festivals pledged not to use the technology, and activists are calling for a nationwide ban. Many Democratic presidential candidates support at least a partial ban on the technology. These efforts are well […]

Continue reading

Nothing Lasts Forever— Not Even On The Internet.

from NYTs Social media is broken. It has poisoned the way we communicate with each other and undermined the democratic process. Many of us just want to get away from it, but we can’t imagine a world without it. Though we talk about reforming and regulating it, “fixing” it, those of us who grew up on the internet know there’s no such thing as a social network that lasts forever. Facebook and Twitter are slowly imploding. And before they’re finally dead, we need to think about what the future will be like after social media so we can prepare for […]

Continue reading

Building a World Where Data Privacy Exists Online

from NYTs Data is valuable — something that companies like Facebook, Google and Amazon realized far earlier than most consumers did. But computer scientists have been working on alternative models, even as the public has grown weary of having their data used and abused. Dawn Song, a professor at the University of California, Berkeley, and one of the world’s foremost experts in computer security and trustworthy artificial intelligence, envisions a new paradigm in which people control their data and are compensated for its use by corporations. While there have been many proposals for such a system, Professor Song is one […]

Continue reading

China’s TikTok Blazes New Ground. That Could Doom It.

from NYTs American leaders have effectively thrown Huawei and a handful of Chinese surveillance technology companies out of the country, warning darkly of the national security and privacy threats of installing Made-in-China products into sensitive parts of the nation’s electronic infrastructure. Now they have cast their fearful gaze on a new Chinese target: the dancing and singing teens and tweens of TikTok. A secretive federal panel with a national security focus is reviewing the purchase of TikTok two years ago by a Chinese company called Bytedance, The New York Times and othersreported last week. Three senators have asked the Trump […]

Continue reading

China’s New Cybersecurity Program: NO Place to Hide

from China Law Blog The Chinese government has been working for several years on a comprehensive Internet security/surveillance program.  This program is based on the Cybersecurity Law adopted on 2016. The plan is vast and includes a number of subsidiary laws and regulations. On December 1, 2018, the Chinese Ministry of Public Security announced it will finally roll-out the full plan. The core of the plan is for China’s Ministry of Security to fully access the massive amounts of raw data transmitted across Chinese networks and housed on servers in China. Since raw data has little value, the key to […]

Continue reading

The Ringification of Suburban Life

from Wired Across the US, consumers are canvassing their communities with a new type of device that’s changing civic life. Camera-equipped doorbells and other home surveillance devices, made by companies like Ring, are documenting facets of suburban existence that once went unnoticed. For years, citizens have used smartphones to monitor their neighborhoods, especially instances of police misconduct or abuse. But pointing a smartphone at authorities is an active choice. Homeowners use cameras and their ilk to passively monitor their neighborhoods and each other. Instead of capturing the moments citizens intentionally choose to record, Ring cameras log whatever may happen in […]

Continue reading

Tiktok Is China’s Next Big Weapon

from Axios Chinese social media is largely impenetrable for most in the West — just check out their memes — but Sino tech giants have their eye on owning the U.S. market, evidenced by the rise of TikTok. Why it matters: While the video-based app simply seems like a benign platform for Gen Zers to make and share funny memes, it’s could become a Chinese vacuum for coveted American data. It has made its top creators into bona fide celebrities, as evidenced by a look at YouTube’s annual VidCon by The Atlantic’s Taylor Lorenz. Between the lines: TikTok’s “parent company, ByteDance, recently […]

Continue reading

A Simple Way to Make It Harder for Mobile Ads to Track You

from Wired If you’re not careful, most of what you do online and in mobile apps will wind up fueling targeted advertising, all that data feeding into a composite profile of your likes, dislikes, and demographic information. But increasingly, even careful web users can’t avoid being swept up in the digital marketing dragnet. While it’s ridiculously difficult to get a handle on all this tracking, there is a simple step you can take right now to throw a tiny wrench in those industry-wide gears. Both Android and iOS force apps to use a special “ad ID” for tracking smartphones, which […]

Continue reading

How Big Data Could Help Make It Easier For Landlords To Evict You

from Fast Company It’s easy to track prices of some things: Drive down any major street and you’ll only have to pass a few gas stations to know roughly how much gasoline costs in your area. Turn on the news during the workday, and you’ll quickly learn how the big stock market indexes are faring. Go shopping every week, and you’ll soon know how much bananas or eggs cost at your local supermarket. Real estate is more complicated, partly because so many uncertain factors go into determining prices. Buying or selling a house always involves a bit of gambling on […]

Continue reading

The Windows 10 Privacy Settings You Should Check Right Now

from Wired If you’re at all concerned about the privacy of your data, you don’t want to leave the default settings in place on your devices—and that includes anything that runs Windows 10. Microsoft’s operating system comes with a variety of controls and options you can modify to lock down the use of your data, from the information you share with Microsoft to the access that individual apps have to your location, camera, and microphone. Check these privacy-related settings as soon as you’ve got your Windows 10 computer set up—or now, in case you’re a longtime user who hasn’t gotten […]

Continue reading

Why You Need a Password Manager. Yes, You.

from NYTs You probably know that it’s not a good idea to use “password” as a password, or your pet’s name, or your birthday. But the worst thing you can do with your passwords — and something that more than 50 percent of people are doing, according to a recent Virginia Tech study — is to reuse the same ones across multiple sites. If even one of those accounts is compromised in a data breach, it doesn’t matter how strong your password is — hackers can easily use it to get into your other accounts. But even though I should […]

Continue reading

Google Knows Everywhere You Go — Here’s How To Stop It From Tracking You And Delete The Logs

from CNBC Google knows a lot about you and, if you use Google Maps or other Google apps, it stores a copy of everywhere you go. I recently performed Google’s “Privacy Checkup” to learn a bit more about what it knows about me, and was pretty surprised at the level of detail it had on my exact locations. I picked a random date: April 16, 2019. It knew everywhere I went, including that I took Interstate 95 to our office in northern New Jersey and that I arrived at 7:58 a.m. It knew that at 1:02 p.m. I drove to […]

Continue reading

How to Scan Your Airbnb for Hidden Cameras

from Slate Over the weekend, news outlets reported that a New Zealand man named Andrew Barker had found a camera, hidden in a smoke detector, in his Airbnb that was livestreaming a feed of the living room. Barker was in Cork, Ireland, on a 14-month trip around Europe with his family when they checked into the rental house. Once they unpacked, Barker, who works in IT security, conducted a scan of the Wi-Fi network and found a camera the owner had not mentioned. He was then able to connect to the camera and view the live feed. The next day, […]

Continue reading

The Privacy Project

from NYTs Companies and governments are gaining new powers to follow people across the internet and around the world, and even to peer into their genomes. The benefits of such advances have been apparent for years; the costs — in anonymity, even autonomy — are now becoming clearer. The boundaries of privacy are in dispute, and its future is in doubt. Citizens, politicians and business leaders are asking if societies are making the wisest tradeoffs. The Times is embarking on this monthslong project to explore the technology and where it’s taking us, and to convene debate about how it can […]

Continue reading