Monday, January 07, 2019

“Legally” must be assumed… Right?
Phil Fairbanks reports:
When the FBI uncovered a scammer targeting Wegmans two years ago, agents hacked into the suspect’s computer in an effort to learn his identity.
The hacking, approved by a judge, involved an email and attachment that, when opened, connected the suspect’s computer to an FBI server.
A new lawsuit in Buffalo federal court says the Wegmans case is just one example of how the government is now using hacking in ordinary, day-to-day investigations, and not just in national security and foreign intelligence probes.
Read more on The Buffalo News. They don’t seem to give the case information, but I’m embedding the complaint, filed in federal court for the Western District of New York, below so you can read it all for yourself.
[From the article:
... the suit seeks evidence of what the groups call a "remarkable expansion of the government's surveillance powers."
This new tool, they argue in court papers, is so powerful and intrusive that it carries with it great risk to the privacy and security of both the individuals being investigated and the people around them.
"It's never before been the case that the government can accumulate so much important and sensitive personal information by accessing just one device," said Jonathan Manes, director of the UB Law School's Civil Liberties and Transparency Clinic.




I’m betting it’s not high on the “must have’ lists yet, but at least it is being mentioned.
Privacy becomes a selling point at tech show
"What happens on your iPhone stays on your iPhone," Apple says in the message to be seen by tens of thousands attending the Las Vegas tech show.
… The data scandals "are like Christmas presents for us," by prompting more consumers to look for better security, said Winston founder Richard Stokes.
"As we see more things being connected I think that you'll definitely hear people talk about security more and really looking at how would you secure the data," said analyst Carolina Milanesi of Creative Strategies.
"More companies are going to take kind of a cue from the marketing that Apple has been doing."




I don’t think he likes it.
Ethan Huff writes:
Millions of unwitting “sheeple” have willingly outfitted their homes and offices with so-called “smart” speakers like Amazon’s Alexa device, which is marketed as a convenience assistant for getting things done simply using only your voice. But as revealed by Justus Knight in a recent video update to his YouTube channel, Alexa is, practically speaking, an always-listening demon device that can monitor, track, and record people’s conversations for blackmail purposes.
The epitome of Orwellian, Big Brother privacy invasion, Alexa is hardly the innocuous technological “advancement” that its proponents claim it is. Alexa is a far-Left purveyor of “progressive” ideologies such as those perpetuated by Black Lives Matter (BLM). It’s also a potential snitch device that authoritarian overlords can use to control the populations of the world.
Read more on PrivacyWatch.news




For my Architecture students: another perspective.
Paper – Agile Research
In this paper we ask: “how might we take the ideas, the methods and the underlying philosophy behind agile software development and explore applying them in the context of doing research — even research that does not involve software development?” We look at some examples of agile research methods and think about how they might inspire the design of even better methods. We also try to address some potential criticisms of an approach that aims to minimize a need for Big Design Up Front by developing tighter iteration cycles, coupled with reflection and learning as part of a process for doing research.”




Perspective. When you can do “anything you can imagine” with technology, you sometimes run into things you never imagined.
Petcube 2 lets you use Alexa to fling treats at your pets
Petcube announced the second generation of its Petcube Bites and Play cameras today, which keep your pets entertained at home via flinging treats and laser pointers while you’re away at work.
… Both cameras in the Bites and Play have 1080p HD video, 4x digital zoom, and night vision. Pets can also initiate two-way “video calls,” which are triggered when a pet sits in front of the camera. Owners will then receive a push notification asking if they want to accept a video call from their pet (always, of course).
… The $10 plan comes with Smart alerts, which uses AI to distinguish between cats, dogs, and people, and offers audio recognition of barking and meowing to notify owners of potentially dangerous events.


(Related) ...and sometimes a headline makes your imagination run wild.
Kohler’s smart toilet promises a ‘fully-immersive experience’




For the toolkit.
7 Free Web Annotation and Markup Tools You Should Know
Hongkiat: “Contextual feedback is crucial for remote teams working online to have fast and efficient feedback system. Asking and taking feedback is tedious and usually happens off-context using email and text message. There are some tools, however, that allow teams to discuss things and collaborate online in much better way. Web Annotation and Markup tools help you to comment, discuss and collaborate right on web pages or screenshots or PDFs. Such tools add context to the content and make use of highlights, sticky notes, comments, etc. for making discussions with context. In this post, we’re showcasing the best yet freely available tools for contextual feedback. These tools let you annotate, comment and discuss on the web quickly and easily…”




Sometimes I think this is true.


No comments: