Saturday, March 23, 2019

Why not? My Ethical Hackers will tell me.
Lorenzo Franceschi-Bicchierai reports:
This story is part of When Spies Come Home, a Motherboard series about powerful surveillance software ordinary people use to spy on their loved ones.
A company that sells consumer-grade software that lets customers spy on other people’s calls, messages, and anything they do on their cell phones left more than 95,000 images and more than 25,000 audio recordings on a database exposed and publicly accessible to anyone on the internet. The exposed server contains two folders with everything from intimate pictures to recordings of phone calls, given that the app markets itself mostly to parents.
Read more on Motherboard.




“Hello, we’re from the government. We’re here to help.” I guess they hire others to do harm.
Caroline Linton reports:
FEMA mistakenly exposed personal information, including addresses and bank account information, of 2.3 million disaster victims, the Department of Homeland Security’s Office of Inspector General said in a report released Friday. The breach occurred because FEMA did not ensure a private contractor only received information it required to perform its official duties, the report said.
The victims affected include survivors of Hurricanes Harvey, Irma and Maria and the 2017 California wildfires.
The report found FEMA’s failure to protect their data put them at risk of identity theft and fraud.
Read more on CBS




A near perfect headline!
Olivia Rizzo reports:
Several high school students are in hot water after they were able to log into their schools’ computer systems to change grades and attendance records.
A letter was sent out Wednesday to parents of high school students in the Elizabeth Public School system informing them of the data breach.
“Unfortunately, a number of our students have made some poor choices by participating, to varying degrees, in compromising our student information system to manipulate attendance and classroom grades,” a letter from the district’s Superintendent Olga Hugelmeyer read.
Read more on NJ.com.




Where were you on the night of the murder? Don’t bother to answer, your App has already ratted you out.
Matt Swayne writes:
Fitness apps and other smart devices embedded with GPS satellite chips and other sensors may use satellite data to help users stay fit and healthy, but, according to Penn State and Penn State Dickinson Law researchers, they unwittingly open a gateway to privacy-related legal and ethical headaches and are a repeated source of national security threats.
In a session at the Penn State Law Review annual symposium held today (March 22), the researchers and Dickinson Law professors said that immediate focus is needed on how vast quantities of data, collected from sensors embedded in smart devices combined with both government-owned and privately owned satellite mapping technologies, is aggregated, used, disseminated, and bought and sold. Government-owned satellite mapping technologies, including global positioning satellites provide free, worldwide access for use in GPS chip-embedded devices.
Read more on Penn State News.




A series on Privacy.
Michael Grothaus writes:
This story is part of The Privacy Divide, a series that explores the fault lines and disparities–economic, cultural, philosophical–that have developed around digital privacy and its impact on society.
Increasingly, the most important issue for everyday internet users is privacy—and rightly so. In today’s connected world, we’re being tracked and surveilled more than ever by everyone from search giants and social media companies to ISPs and advertising firms. These organizations don’t just record what we click on or share, but analyze our online activity to compile complex demographic and psychographic profiles about us—so they can manipulate us into doing their bidding, whether that’s clicking on ads they serve us based on the data they hold about us or getting us to interact with their sites more and share even more information about ourselves.
Read more on Fast Company.




An automated bias reinforcing App. Could be political ad with no specific political orientation. Some elements of “six degrees of separation” thinking.
How Twitter's algorithm is amplifying extreme political rhetoric
magine opening up the Twitter app on your phone and scrolling through your feed. Suddenly, you come across a hyper-partisan tweet calling Hillary Clinton the "godmother of ISIS." It's from a user you do not follow, and it's not in your feed by virtue of a retweet from a user you do follow. So how did it get there?
Over the last several months, Twitter has begun inserting what it believes to be relevant and popular tweets into the feeds of people who do not subscribe to the accounts that posted them. In other words, Twitter has started showing users tweets from accounts that are followed by those they follow. This practice is different from the promoted content paid for by advertisers, as Twitter is putting these posts into the feeds of users without being paid and without consent from users.
Twitter said its goal with the practice is to expose users to new accounts and content that they might be interested in. In some situations, the practice is innocuous and perhaps even beneficial. For instance, if someone is watching the Super Bowl, but doesn't follow Tom Brady, it might be useful for them to see his post-game tweet.
… In effect, the practice means Twitter may at times end up amplifying inflammatory political rhetoric, misinformation, conspiracy theories, and flat out lies to its users.
… The feature affects different users in different ways because it relies on the accounts followed by the user to determine which tweets to insert into the timeline. It does not appear to be biased toward a particular ideology, but only biased toward what content users might engage with. If a user primarily follows accounts on the political left, it's likely that person will see inserted content from other accounts on the left. The same goes for people who follow accounts on the political right.




Something every citizen should have? (Free)
All the Crime, All the Time: How Citizen Works
Open Citizen and you will see a familiar blue location dot — that’s you! — surrounded by other, often larger dots, in red and yellow. Each represents an incident, either of the “Recent” or “Trending” variety, that has recently been reported in your proximity, and that may even be unfolding at the very moment.
… Particularly notable reports might have video, sometimes live, as well as a timeline of new developments, and a chat-scroll full of users discussing what they’re seeing. (“This is the second time this has happened in a month,” noted one citizen in TAXI ENGULFED IN FLAMES. “Is it gonna blow up,” wondered another, watching the live video broadcast of firefighters putting down the fire.)




Free is good. In this case, free is good for Microsoft. (
The Windows 10 calculator will soon be able to graph math equations
Microsoft is adding a graphing mode to the Windows 10 calculator. The company made the calculator open-sourced on GitHub earlier this month and has received over thirty suggestions from contributors so far, as spotted by ZDNet.
… As of now, the feature’s still under development but GitHub notes indicate users would be able to graph linear, quadratic, and exponential equations.
[Until it’s ready, try: https://www.desmos.com/calculator




For my programmers. Always steal study and create your own version of the best!




Same for Artificial Intelligence?


No comments: