
Yahoo "Hacked and Spied" on Millions of Customer Emails | Yahoo Secretly Scanned Customer Emails for US intelligence | Stillness in the Storm Source - CNBC by REUTERS, October 4th 2016 Yahoo last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said two former employees and a third person apprised of the events. Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to a spy agency's demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. That could mean a phrase in an email or an attachment, said the sources, who did not want to be identified. Officer Alex Stamos, who now holds the top security job at Facebook. Challenging the NSA Secret siphoning program
Pictures, News Photos, Picture Slideshows & More | Reuters.com Microsoft sounds an alarm over facial recognition technology Sophisticated facial-recognition technology is at the heart of many of China’s more dystopian security initiatives. With 200 million surveillance cameras — more than four times as many in the United States — China’s facial-recognition systems track members of the Uighur Muslim minority, block the entrances to housing complexes, and shame debtors by displaying their faces on billboards. I often include these stories here because it seems inevitable that they will make their way to the United States, at least in some form. AI Now is a group affiliated with New York University that counts as its members employees of tech companies including Google and Microsoft. Facial recognition and affect recognition need stringent regulation to protect the public interest. The AI Now researchers are particularly concerned about what’s called “affect recognition” — and attempt to identify people’s emotions, and possibly manipulate them, using machine learning. It feels like a conversation worth having.
THE TRUTH ABOUT SECRET WEAPONS AND THE INVOLUNTARY TESTING OF THOSE WEAPONS ON CIVILIANS | Paul Baird | Surveillance Issues Ugly Hedgehog - Photography Forum Facial recognition technology: The need for public regulation and corporate responsibility All tools can be used for good or ill. Even a broom can be used to sweep the floor or hit someone over the head. The more powerful the tool, the greater the benefit or damage it can cause. Facial recognition technology raises issues that go to the heart of fundamental human rights protections like privacy and freedom of expression. We’ve set out below steps that we are taking, and recommendations we have for government regulation. First, some context Facial recognition technology has been advancing rapidly over the past decade. So, what is changing now? Advanced technology no longer stands apart from society; it is becoming deeply infused in our personal and professional lives. Some emerging uses are both positive and potentially even profound. But other potential applications are more sobering. Perhaps as much as any advance, facial recognition raises a critical question: what role do we want this type of technology to play in everyday society? Politics meets Silicon Valley
Second Chinese Firm in a Week Found Hiding Backdoor in Firmware of Android Devices Security researchers have discovered that third-party firmware included with over 2.8 million low-end Android smartphones allows attackers to compromise Over-the-Air (OTA) update operations and execute commands on the target's phone with root privileges. Mobile experts from Anubis Networks discovered the problem this week. This is the second issue of its kind that came to light this week after researchers from Kryptowire discovered a similar secret backdoor in the firmware of Chinese firm Shanghai Adups Technology Co. Ltd.. This time around, the problem affected Android firmware created by another Chinese company named Ragentek Group. Researchers say they've discovered the issue after one of their researchers bought a BLU Studio G smartphone from Best Buy. They say the smartphone used an insecure Over-the-Air update system, powered by the Ragentek firmware, which contacts remote servers via an unencrypted communications channel.
Exposure | Understanding Exposure - ISO, Aperture and Shutter Speed Explained What controls exposure? ISO ratings determine the image sensor’s sensitivity to light, each value of the rating represents a “stop” of light, and each incremental ISO number (up or down) represents a doubling or halving of the sensor’s sensitivity to light. The Aperture controls the lens’ diaphragm, which controls the amount of light traveling through the lens to the film plane. The aperture setting is indicated by the f-number, whereas each f-number represents a “stop” of light. The Shutter Speed indicates the speed in which the curtain opens then closes, and each shutter speed value also represents a “stop” of light. When these three elements are combined, they represent a given exposure value (EV) for a given setting. ISO Speed ISO is actually an acronym, which stands for International Standards Organization. Aperture A lens’s aperture is the opening in the diaphragm that determines the amount of focused light passing through the lens. Shutter Speed What is "Auto Bracketing"? Conclusion
About Face ID advanced technology The technology that enables Face ID is some of the most advanced hardware and software that we’ve ever created. The TrueDepth camera captures accurate face data by projecting and analyzing over 30,000 invisible dots to create a depth map of your face and also captures an infrared image of your face. A portion of the neural engine of the A11, A12 Bionic, and A12X Bionic chip — protected within the Secure Enclave — transforms the depth map and infrared image into a mathematical representation and compares that representation to the enrolled facial data. Face ID automatically adapts to changes in your appearance, such as wearing cosmetic makeup or growing facial hair. To start using Face ID, you need to first enroll your face. The TrueDepth camera is intelligently activated; for example, by tapping to wake your screen, from an incoming notification that wakes the screen, or by raising to wake your iPhone.
Samsung Warns Customers To Think Twice About What They Say Near Smart TVs By Jake Anderson In a troubling new development in the domestic consumer surveillance debate, an investigation into Samsung Smart TVs has revealed that user voice commands are recorded, stored, and transmitted to a third party. The company even warns customers not to discuss personal or sensitive information within earshot of the device. This is in stark contrast to previous claims by tech manufacturers, like PlayStation, who vehemently deny their devices record personal information, despite evidence to the contrary, including news that hackers can gain access to unencrypted streams of credit card information. The new Samsung controversy stems from the discovery of a single haunting statement in the company’s “privacy policy,” which states: Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party. Samsung is a Nuance customer.
360 Degree Aerial Panorama | 3D Virtual Tours Around the World | Photos of the Most Interesting Places on the Earth | AirPano.com Comparing Faces in Images - Amazon Rekognition Currently we are only able to display this content in English. To compare a face in the source image with each face in the target image, use the CompareFaces operation. To specify the minimum level of confidence in the match that you want returned in the response, use similarityThreshold in the request. For more information, see CompareFaces. If you provide a source image that contains multiple faces, the service detects the largest face and uses it to compare with each face that's detected in the target image. You can provide the source and target images as an image byte array (base64-encoded image bytes), or specify Amazon S3 objects. To compare faces CompareFaces Operation Request The input to CompareFaces is an image. CompareFaces Operation Response In the response, you get an array of face matches, source face information, source and target image orientation, and an array of unmatched faces. In the following example response, note the following: