background preloader

Technology

Facebook Twitter

OpenID Foundation website. Building the Social Web Together. Harvard Journal of Law & Technology :: Home. Stanford Technology Law Review. The Stanford Technology Law Review (STLR) presents well-rounded analyses of the legal, business, and policy issues that arise at the intersection of intellectual property law, science and technology, and industry. STLR publishes exclusively online, providing timely coverage of emerging issues to its readership base of legal academics and practitioners.

Format STLR accepts manuscripts and perspectives from scholars, practitioners, and students. The exclusively online nature of the journal provides for a rapid turnaround time from submission to publication, and frees contributors from the traditional restrictions of page limits and quotas. Archived on a dedicated Internet server, all of STLR’s publications can be freely accessed without subscription by a worldwide, multidisciplinary audience. STLR’s publications are also made available through legal databases such as Lexis-Nexis and Westlaw.

History Membership STLR is a Stanford Law School organization managed by law students. Technology and Liberty. We are dedicated to protecting and expanding the First Amendment freedoms of expression, association, and inquiry; expanding the right to privacy and increasing the control that individuals have over their personal information; and ensuring that civil liberties are enhanced rather than compromised by new advances in science and technology. Make a Difference Your support helps the ACLU defend privacy rights and a broad range of civil liberties. Give Now The project is currently working on a variety of issues, including political protest, freedom of expression online, privacy of electronic information, journalists’ rights, scientific freedom, and openness in the courts. One of the project’s major initiatives, the dotRights campaign, is focused on updating and expanding privacy laws to include new developments in technology, so that the government has the same restrictions on access to American’s private, personal information online as they do offline.

Additional Resources: Most Popular. Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free. (pdf) Building the Digital Out-Of- Home Privacy Infrastructure. TILT. Weblog Law & Technology. Tech and Law: Privacy - technology & other challenges - comparat. Bookmark this on Delicious <a href=' history</a> Just seen on the European Commission website, some useful papers from a study conducted for the Commission and concluded in January 2010 (dated 20 Jan 2010, in "final final" versions no less). Report Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments - final report, LDRP Kantor Ltd with Centre for Public Reform (Executive Summary) and attachments - Comparative chart and country reports The study included various reports on countries across the world, not just the EU (including the UK, Germany, USA, Australia) and a comparative chart of national laws - Comparative chart - Divergencies between data protection laws in the EU, Douwe Korff See the EU webpage for links to the country reports on - European countries: ©WH.

Lex Informatica (LexInformatica) Beth Simone Noveck | Most Creative People 2010. TAT - The Astonishing Tribe. Chaîne de TATMobileUI. Recognizr can identify you by your photo alone | Geek Gestalt - You know all those times when you recognize someone on the subway or on the street but can't quite remember who they are? Well, a new technology from the Swedish firm The Astonishing Tribe (TAT) called Recognizr could soon help you figure out who they are so that you can get up and greet them by name. According to an article published Tuesday in Popular Science, Recognizr is a new application that can figure out who someone is--and auto-discover social networking information about them--based solely on a photo (see video below). PopSci, riffing on the growing field of augmented reality, called the technology "augmented identity. " "Mashing up face recognition technology, computer vision, cloud computing and augmented reality with the complex digital lives many of us lead on the Internet," PopSci wrote, "TAT has created an app that allows you to gather information on a person and their social networking life simply by pointing your camera phone at their face.

" Augmented Identity App Helps You Identify Strangers on the Stree. By this point, we're all familiar with augmented reality, but Swedish mobile software firm The Astonishing Tribe is taking information overload to the next logical step: augmented identity. Mashing up face recognition technology, computer vision, cloud computing, and augmented reality with the complex digital lives many of us lead on the Internet, TAT has created an app that allows you to gather information on a person and their social networking life simply by pointing your camera phone at their face.

Dubbed Recognizr, the app essentially works like this: the user points the camera at a person across the room. Face recognition software creates a 3-D model of the person's mug and sends it across a server where it's matched with an identity in the database. A cloud server conducts the facial recognition since and sends back the subject's name as well as links to any social networking sites the person has provided access to. [Technology Review] The Astonishing Tribe. At the SAE Convergence Conference and Exhibition, TAT will show HMI demos in the QNX Connected Car as well as in the Freescale MadMax car. SAE Convergence is held in Detroit, USA on the 19–20th of October 2010. For over 30 years, the Convergence® Conference and Exhibition has served the automotive and transportation electronics community by delivering relevant technology solutions and an electrifying line-up of invited speakers and presenters addressing “hot-button” topics. Taking place biennially in Detroit, Michigan – right in the heart of the global automotive technical center – Convergence has earned world-wide recognition as the premier transportation electronics event attracting leading executives, engineers and technologists from around the globe.

Find out more and register here << Moreover, TAT’s James Haliburton will speak at the SID Vehicles and Photons Symposium being held in Dearborn, MI, USA on October 21st 2010. Cars are, in essence, personal mobile devices. PKIoverheid Public Key Infrastructure voor de overheid, kortweg  Facial recognition system. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.[1] Techniques[edit] Traditional[edit] Some facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.

Recognition algorithms can be divided into two main approaches, geometric, which looks at distinguishing features, or photometric, which is a statistical approach that distills an image into values and compares the values with templates to eliminate variances. 3-dimensional recognition[edit] A newly emerging trend, claimed to achieve improved accuracies, is three-dimensional face recognition. Skin texture analysis[edit] Onion routing. Onion routing (OR) is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Like someone peeling an onion, each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated.

This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. [citation needed] Capabilities[edit] The idea of onion routing is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network. [citation needed] Onion routing accomplishes this according to the principle of Chaum's mix cascades: messages travel from source to destination via a sequence of proxies ("onion routers"), which re-route messages in an unpredictable path. Onions[edit] Routing onions[edit] Example "onion" Send HTTP request to IP-of-webpage. Tor: anonymity online. LFW Face Database : Main. New results page: We have recently updated and changed the format and content of our results page.

Please refer to the new technical report for details of the changes. Labeled Faces in the Wild is a public benchmark for face verification, also known as pair matching. No matter what the performance of an algorithm on LFW, it should not be used to conclude that an algorithm is suitable for any commercial purpose. There are many reasons for this. While there are many resources available for assessing face recognition algorithms, such as the Face Recognition Vendor Tests run by the USA National Institute of Standards and Technology (NIST), the understanding of how to best test face recognition algorithms for commercial use is a rapidly evolving area. Welcome to Labeled Faces in the Wild, a database of face photographs designed for studying the problem of unconstrained face recognition.

Related: [new] Collected resources related to LFW - updated 2017/05/09. LFW Deep Funneled Images. View 1: LFW : Results. Introduction LFW provides information for supervised learning under two different training paradigms: image-restricted and unrestricted. Under the image-restricted setting, only binary "matched" or "mismatched" labels are given, for pairs of images. Under the unrestricted setting, the identity information of the person appearing in each image is also available, allowing one to potentially form additional image pairs. For more information, see the readme. Often, algorithms designed for LFW will also make use of additional, external sources of training information. For instance, this issue originally arose when facial landmark detectors were being used to align the images (Huang et al.4).

These detectors were pre-trained on face part images outside of LFW, so this algorithm was implicitly making use of this additional source of information. Results in red indicate methods accepted but not yet published (e.g. accepted to an upcoming conference). Image-Restricted Training Results Notes Methods. Tech and Law. METHOD AND APPARATUS FOR THWARTING TRAFFIC ANALYSIS IN ONLINE GAMES - US Patent Application 20100197405 Full Text.

Abstract text The subject disclosure relates to a method and apparatus for routing data in a network-based computer game via proxy computers. The method and system includes a set of techniques that utilizes the proxy computers to thwart traffic analysis in high-speed games while continuing to satisfy the games' latency requirements. The method and apparatus facilitates thwarting multiple classes of traffic analysis, including inspection of unencrypted header fields, observation of packet size, correlation of packet timing, and collusion among players. A matchmaking system for matching players in a network-based computer game in a manner that resists traffic analysis is also provided.

Claims 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Description [0001]The subject disclosure is generally directed towards routing data in a computer network, and more particularly towards routing gaming data so as to thwart traffic analysis during online gaming sessions. Overview. Deep packet inspection. There are multiple ways to acquire packets for deep packet inspection. Using port mirroring (sometimes called Span Port) is a very common way, as well as an optical splitter. Deep Packet Inspection (and filtering) enables advanced network management, user service, and security functions as well as internet data mining, eavesdropping, and internet censorship.

Although DPI technology has been used for Internet management for many years, some advocates of net neutrality fear that the technology may be used anticompetitively or to reduce the openness of the Internet.[2] DPI is used in a wide range of applications, at the so-called "enterprise" level (corporations and larger institutions), in telecommunications service providers, and in governments.[3] Background[edit] DPI-enabled devices have the ability to look at Layer 2 and beyond Layer 3 of the OSI model. In some cases, DPI can be invoked to look through Layer 2-7 of the OSI model. DPI at the enterprise level[edit] Lawful interception[edit] Your Rights Online Story | UK ISP Admitted to Spying on Customers. UK ISP TalkTalk Monitoring its Customers Online Activity Without Consent − ISPreview UK. Broadband ISP TalkTalk UK could be about to incur the wrath of privacy campaigners after some of its customers spotted that their online website browsing activity was being monitored and recorded without consent.

The situation has caused a significant amount of concern with many end-users worried about the impact upon their personal privacy. TalkTalk has since confirmed that the monitoring, which was first discovered on the ISPs discussion forum during the middle of July (here), is part of a future Malware/Security/Parental Guidance tool to be provided by Chinese vendor Huawei. This is due to launch before the end of 2010.

The system, which is not yet fully in place, aims to help block dangerous websites (e.g. those designed to spread malware) by comparing the URL that a person visits against a list of good and bad/dangerous sites. Bad sites will then be restricted. TalkTalk's Official Statement In due course we will be trialing and launching these services. Im Being Monitored/Watched? - The TalkTalk Members Forums. TalkTalk. Deep Packet Inspection – Bring It On « Office of the Privacy Commissioner – Deep Packet Inspection. How does society reconcile the technological benefits and privacy impacts of new technology?

Deep packet inspection is just one seemingly neutral technological application that can have a significant impact on privacy rights and other basic civil liberties, especially as market forces, the enthusiasm of technologists and the influence of national security interests grow stronger. In the summer and fall of 2008, the Office of the Privacy Commissioner of Canada contacted leading academics and professionals working in telecommunications, law, privacy, civil liberties and computer science to ask if they would contribute a short essay on DPI to a project tor create a resource on deep packet inspection. This web page presents the work of these academics, lawyers, researchers, activists and industry professionals.

We value the time they invested in preparing their essays, and we hope that it will encourage further discussion around deep packet inspection and similar technologies. HTTP cookie. A HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie, the latter which is not to be confused with the literal definition), is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website. Every time the user loads the website, the browser sends the cookie back to the server to notify the website of the user's previous activity.[1] Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items in a shopping cart) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited by the user as far back as months or years ago). §History[edit] The term "cookie" was derived from the term "magic cookie", which is a packet of data a program receives and sends back unchanged.

Together with John Giannandrea, Montulli wrote the initial Netscape cookie specification the same year. §Structure[edit] Privacy lawsuit targets 'Net giants over "zombie" cookies. Privacy Lawsuit Targets Net Giants Over ‘Zombie’ Cookies | Threat Level. Thinglink About. Thinglink Blog. (pdf) Evading Cellular Data Monitoring with Human Movement Networks. Facebook’s New Photo Tagging Feature Selects Friends For You. Making Facebook Photos Better. Facebook Slickens Up Its Photo Tagging Tools. Automatic face detection comes to Facebook photos. How to camouflage yourself from facial recognition technology | Technology - Google debates face recognition technology. AutoTagger: Tag your Facebook photos on your iPhone via facial recognition. Facial tagging. GlastoTag - One huge photo. A whole load of tags. | Glastonbury. Glastonbury: Are you in the world's most tagged photograph? | Me. Real-Time Image Tracking & Recognition Comes to the iPhone.

Aphex Twin uses live interactive face mapping on audience. EyeSwipe® The End of Privacy: Entire City to Track People With Public Eye Scanners. Underpaid Genius - Who Will Watch The Watchers? Face.com - Face recognition for the masses. Augmented reality meets Facebook - Mobile Phones - Crave - CNET. Face.com Brings Facial Recognition To Facebook Photos (We Have I. iPhoto Gets A Facelift. Intellicheck Mobilisa. Hand-held scanner checks 100 databases -- in one second | Homela.

GSM. CDMA - Code Division Multiple Access. Eyeborg. Detecting suspicious account activity. Suspicious login protection extended to all Google accounts. WikiLeaks: Moving Target. Technology makes secrets easier to hide, easier to find: AP’s Kathleen Carroll on secrecy in journalism.