Monthly Shaarli
February, 2018
Apple is moving iCloud accounts registered in China to state-run Chinese servers on Wednesday along with the digital keys needed to unlock them.
By Lo Shih-hung The US-based global tech giant Apple Inc. is set to hand over the operation of its iCloud data center in mainland China to a local corporation called Guizhou-Cloud Big Data (GCBD) by February 28, 2018. When this transition happens, the local company will become responsible for handling …
As smarter vehicles become troves of personal information, get ready for coupon offers at the next stoplight.
Des astreintes jusqu'à 100 millions d'euros
The new approach could one day allow people to screen themselves for the risks that could lead to heart disease.
Google sécurise enfin l'appareil photo et le micro
Et c'est un peu grâce à Facebook
« Tout ce que vous dites ou faites peut être et sera utilisé contre vous, n’importe quand dans un avenir lointain, lorsque le contexte et l’acceptabilité de ce que vous dites ou faites auront radicalement changé. » Avec la surveillance analogique de nos parents, tout était capté dans le contexte de son temps. La surveillance numérique de nos enfants conserve tout pour un usage futur contre eux.
Vers une neutralité des terminaux ?
A British spy agency secretly hacked a company in Belgium then evaded an extraordinary police investigation.
The paradoxical truth I’m driving at is that today’s technologies of individualization are technologies of mass individualization. Customization can be surprisingly homogenizing. Everyone, or nearly everyone, is on Facebook: It is the most convenient way to keep track of your friends and family, who in theory should represent what is unique about you and your life. Yet Facebook seems to make us all the same. Its format and conventions strip us of all but the most superficial expressions of individuality, such as which particular photo of a beach or mountain range we select as our background image.
I recently listened to a podcast with the founders of a startup by the name of Aerial (https://aerial.ai) that that is doing real-time location mapping and activity detection using wifi and deep learning.
NOTE: I'm in no way related to this company or the podcast (aside from being an occasional listener).
Episode page: https://twimlai.com/talk/107
Direct episode link: https://feeds.soundcloud.com/stream/393602724-twiml-twiml-ta...
Episode description:
In this episode I’m joined by Michel Allegue and Negar Ghourchian of Aerial.ai. Aerial is doing some really interesting things in the home automation space, by using wifi signal statistics to identify and understand what’s happening in our homes and office environments.
Michel, the CTO, describes some of the capabilities of their platform, including its ability to detect not only people and pets within the home, but surprising characteristics like breathing rates and patterns. He also gives us a look into the data collection process, including the types of data needed, how they obtain it, and how it is parsed. Negar, a senior data scientist with Aerial, describes the types of models used, including semi-supervised, unsupervised and signal processing based models, and how they’ve scaled their platform, and provides us with some real-world use cases.
The company is actually collecting and analyzing the data of Onavo users. Doing so allows Facebook to monitor the online habits of people outside their use of the Facebook app itself. For instance, this gave the company insight into Snapchat’s dwindling user base, even before the company announced a period of diminished growth last year.
AMP is, to begin with, Google exerting its market power to extend its control over others’ content. Facebook is doing it, so Google has to. Using its privileged position as the means through which people find a great deal of content, Google is attempting to make it so that the content itself must also be part of a system it has defined.
OpenBoard is an open source cross-platform interactive whiteboard application. OpenBoard is intended for use primarily in schools and universities, and can be used both with interactive whiteboards or in a dual-screen setup with a touchscreen and secondary display.
Le plus grand danger, à long terme, estime le journaliste du « Monde » Damien Leloup, est celui de créer des sociétés habituées à la surveillance de masse permanente, dans laquelle tout libre arbitre disparaît dans les bases de données de quelques entreprises géantes.
Mauvais coup de pub pour Amazon
Comment éviter la plupart des blocages d'adblocker en quelques clics.
Aral Balkan, en anglais et à l’occasion de la journée des données personnelles, s’expliquait ainsi (traduction approximative par mes soins) :
Séparer une personne de ses données, c’est retirer à celles-ci ses droits humains, c’est en faire un objet qu’on peut commercialiser. Tous les droits ainsi conférés à l’objet (les données) seront donc moindres que ceux protégeant le sujet (la personne). En traitant les gens et leurs données comme étant des notions différentes — l’une en sujet, l’autre en objet — ce qu’on finit par faire c’est de rendre commercialisable les gens en les découpant en tranches prêtes à être vendues au plus offrant. Voici, en substance, le business model de la Silicon Valley : numériser les gens et être propriétaire des versions numériques.
Lettre ouverte à Mark Zuckerberg
China built and paid for the AU’s computer network – but inserted a backdoor allowing it access to confidential information
AdHell 2 *** Disclamer I first want to note that the original developer did not help me in any way with this, he did not provide me with the code (it was…
microG, F-Droid, GNU Bash, Zelda sounds, FOSS applications and more for Android
Versions until 15.1 were called NanoMod, starting with 16.0 they’re called NanoDroid.
La faille se situe dans l'utilitaire Lenovo Fingerprint Manager Pro qui permet aux utilisateurs de déverrouiller leur ordinateur ou de s'authentifier pour des paiements en ligne. "Les données sensibles stockées par Lenovo Fingerprint Manager Pro, y compris les informations d'identification de Windows et les données d'empreintes digitales des utilisateurs, sont chiffrées à l'aide d'un algorithme faible, avec un mot de passe codé en dur, et sont accessibles à tous les utilisateurs disposant d'un accès local non administrateur", reconnaît la firme.
Web Transparency & Accountability Project @ Princeton
Google, Facebook hidden trackers follow users around the web at alarming rates, says DuckDuckGo's CEO Gabriel Weinberg.
Le traitement « SNIIRAM » (Système national d’information inter-régimes de l’assurance maladie), créé par la loi du 23 décembre 1998 et mis en œuvre par la CNAMTS (Caisse nationale de l’assurance maladie des travailleurs salariés) a pour objectif de contribuer à une meilleure gestion des politiques de santé.
CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS.
Baby monitors serve an important purpose in securing and monitoring our loved ones. An estimated 52k user accounts and video baby monitors are affected by a
"I don't want to live in a world where younger generations grow up without privacy."
Monitoring tech pioneered in the region is spreading across China and the world.
Des experts tirent la sonnette d'alarme
Long before we knew that it would be called Signal, we knew what we wanted it to be. Instead of teaching the rest of the world cryptography, we wanted to see if we could develop cryptography that worked for the rest of the world. At the time, the industry consensus was largely that encryption and cryptography would remain unusable, but we started Signal with the idea that private communication could be simple. Since then, we’ve made some progress. We’ve built a service used by millions, and software used by billions. The stories that make it back to us and keep us going are the stories of people discovering each other in moments where they found they could speak freely over Signal, of people falling in love over Signal, of people organizing ambitious plans over Signal. When we ask friends who at their workplace is on Signal and they respond “every C-level executive, and the kitchen staff.” When we receive a subpoena for user data and have nothing to send back but a blank sheet of paper. When we catch that glimpse of “Signal blue” on a metro commuter’s phone and smile.
researchers of the NETMIT group at MIT’s Computer Science and Artificial Intelligence Lab, are using WiFi signals to detect the breathing and heart rate of individuals in a room. They’ve just released a couple videos showing off the technology in action
When applying for a loan, mobile phone contract, or even trying to rent an apartment in Germany, the Schufa score - Germany’s credit rating - is decisive. If you have a few „points“ too little, yo...
Our Solutions
Technology Overview
Our contextual technology is based on one key principle: simplicity. We rely on existing wireless signals to recognize people (and animals too), gather data about what they are doing and where they are located. Based on this data, we can automate workflows and provide contextual information that can be
A while back I decided to no longer use the router given to me by my ISP. You may want to consider doing the same.
Private search engines have seen huge growth over the past few years. Until recently, it was unthinkable that anyone could compete with…
Dans son rapport public annuel 2018, la Cour des comptes a reconnu l'intérêt du logiciel libre, décrit comme un « puissant facteur d’efficience et d’influence » mais aussi une façon de répondre à un « enjeu de sécurité et de souveraineté ».
Eric Lundgren is obsessed with recycling electronics. His Chatsworth company, IT Asset Partners, processes more than 41 million pounds of e-waste each year and counts IBM, Motorola and Sprint among its clients. But an idea he had to prolong the life of personal computers could land him in prison.
Ces utilisateurs se détournent de Facebook ? Pas grave puisque le géant avait justement modifié ses règles de confidentialité pour permettre les croisements de données entre ses différents services, dont Instagram, sa propriété.
La firme de Zuckerberg peut donc toujours offrir à ses clients la possibilité de cibler ces internautes. "Bien que l'utilisation de la principale application Facebook diminue chez les adolescents, les spécialistes du marketing pourront toujours les atteindre sur Instagram" notait d'ailleurs eMarketer l'année dernière.
Et la collecte de données de Facebook ne se cantonne nullement à ses seuls services et applications. Avec ses plugins sociaux intégrés dans pratiquement toutes les pages du Web, dont des forums et sites Web populaires parmi les ados, Facebook peut continuer de capter données et donc valeur.
The Sacramento Bee said in a statement that a firewall protecting its database was not restored during routine maintenance last month, leaving the 19,501,258 voter files publicly accessible. Additionally, the names, home addresses, email addresses, and phone numbers of 52,873 Sacramento Bee subscribers were compromised.
Firefox détaille une nouvelle fonctionnalité visant à améliorer la protection des utilisateurs de la navigation privée : l’URL de provenance, ou referrer, n’affichera plus que le nom de domaine et non l’URL de la page complète, afin d’éviter la fuite de données personnelles.
An adblocker. Contribute to NanoAdblocker/NanoCore development by creating an account on GitHub.
Privacy Risks with Facebook’s PII-based Targeting: Auditing a Data Broker’s Advertising Interface
Ayant cherché pendant un certain temps à mettre en place une solution fonctionnelle permettant un retour arrière (rollback) suite à une mise à jour système défaillante, j'ai le plaisir de vous faire découvrir la recette magique. Nous verrons que la procédure est plus ou moins complexe suivant la distribution.
Combien le "j'aime" ? Et combien le retweet ?
Il y a un an, les informaticiens du bâtiment, construit en 2012 par les Chinois, ont découvert que l’intégralité du contenu de ses serveurs était transférée à Shanghaï.
To help prevent third party data leakage while browsing privately, Firefox Private Browsing Mode will remove path information from referrers sent to third parties starting ...
microG, F-Droid, GNU Bash, Zelda sounds, FOSS applications and more for Android
Le réseau social a revu à la hausse le nombre de ses utilisateurs ayant interagi avec des comptes liés aux intérêts russes pendant la campagne présidentielle américaine de 2016.
The Web never forgets: Persistent tracking mechanisms in the wild is the first large-scale study of three advanced web tracking mechanisms - canvas fingerprinting, evercookies and use of "cookie syncing" in conjunction with evercookies.
Berlin, January 31, 2018 – The Document Foundation announces LibreOffice 6.0, a major release and a dramatically improved free office suite, which celebrates the 7th anniversary of the availability of the very first version of LibreOffice. Today LibreOffice is more powerful, simple and secure, and offers superior interoperability with Microsoft Office documents.
LibreOffice 6.0 is immediately ...
Trois mois pour se mettre en conformité
A document contains Apple's first public acknowledgment that it is storing data for its iCloud services in Google's data centers.
TRIBUNE. Nous avons passé malgré nous un pacte entre d’un côté le confort procuré et de l’autre la liberté abandonnée. L’enjeu deviendra démocratique s’il ne l’est pas déjà.
La Commission satisfaite des efforts de Google
35.000 personnes touchées par la faille
Google's going to weave AI into every part of the company.
Facebook’s (much deserved) media nightmare continued this week when it came under criticism for spamming members who signed up for two-factor authentication. This was followed by charges that its P…
Last August, I launched a little feature within Have I Been Pwned (HIBP) I called Pwned Passwords. This was a list of 320 million passwords from a range of different data breaches which organisations could use to better protect their own systems. How? NIST explains: When processing requests to establish
Service blocks access to corruption claim-related posts despite YouTube failing to meet similar demand.
RF-Capture has many applications, like:
It can know who the person behind a wall is.
It can trace a person's handwriting in air from behind a wall.
It can determine how a person behind a wall is moving .
Social network instructed to delete illegally collected data or face €100m in fines after it loses case over consent and tracking
catt - Cast All The Things allows you to send videos from many, many online sources to your Chromecast.
The URLs [1] [2] describe the content. I thought [1] was interesting but not answering your question. [2] Answers your question, and shows black and white and thermal pictures.
[1] https://www.medgadget.com/2014/06/mits-wifi-system-detects-p... (June 2014)
[2] https://hackaday.io/project/5452-wifi-thermal-camera (2015)
[EDIT] I stand corrected, [2] is unrelated. My bad! Here's some good sources as alternative.
"MIT turns Wi-Fi Into Indoor GPS New tech from CSAIL lab lets one Wi-Fi device locate another to within centimeters" [3]
"RF-Capture: Capturing the Human Figure Through a Wall
It can know who the person behind a wall is. It can trace a person's handwriting in air from behind a wall. It can determine how a person behind a wall is moving." [4]
They also contain further resources.
[3] https://spectrum.ieee.org/tech-talk/telecom/wireless/mit-tur...
I’m getting sick of Windows 10’s auto-installing apps. Apps like Facebook are now showing up out of nowhere, and even displaying notifications begging for me to use them. I didn’t install the Facebook app, I didn’t give it permission to show notifications, and I’ve never even used it. So why is it bugging me?
Une loi est même en préparation
Google might sell hardware, but they’re an advertising company first and foremost. That’s how Google makes the vast majority their money, so it’s unlikely Google would ever do anything that would actually hurt advertising revenue.
Apple, meanwhile, makes basically all of their money from selling hardware and services, and next to nothing from advertising revenue. This means they see advertising less as a source of revenue and more as a potential annoyance for their users.
Facebook is now pointing some users to a secure wireless networking app without disclosing it's a Facebook-owned company.
The app, Onavo Protect, also tracks users' apps, how often they're used and what websites users visit.
Seven in 10 said Instagram made them feel worse about body image and half of 14-24-year-olds reported Instagram and Facebook exacerbated feelings of anxiety. Two-thirds said Facebook made cyber-bullying worse.
Alexandra Elbakyan runs Sci-Hub, a website with over 64 million academic papers available for free to anybody in the world.
Intervenant : Tristan Nitot
VideoLAN, the team behind the VLC media player, recently revealed that they turned down several tens of millions of euros to bundle their software with advertising. The same cannot be said of third-party developers cloning VLC for profit, however. An ad-supported clone discovered on Google Play has a staggering five to ten million downloads and breaches VLC's GPL license, yet Google refuses to take it down.
Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance & mobile experience. And they're hiring WordPress experts.
Today is apparently #DataPrivacyDay, so here goes: There is no such thing as “data privacy”, there is privacy. Data doesn’t have rights, people have a human right to privacy. Your data belongs to you & is a part of you. Data about people is people.
Same goes for “digital rights”. There are no digital rights, only human rights in the digital age. Speaking of “digital rights” and “data privacy” implies that those are separate to our human rights and to our privacy, paving the way for a different set of (lesser) protections.
To separate a person from their data is to strip the latter of its human rights, making it into an object to be commodified. Any rights thereupon conferred on the object will thus be lesser than those protecting the subject.
By treating people and their data as separate constructs – one a subject, the other an object – what you end up doing is commodifying people by slicing them into their constituent bits and bytes; ready to be sold off to the highest bidder.
And that, in a nutshell, is the business model of Silicon Valley: to digitise people and to own those digital copies.
L'application de la caméra simple mais fort pour capturer vos moments!
microG, F-Droid, GNU Bash, Zelda sounds, FOSS applications and more for Android
Shotcut is a free, open source, cross-platform video editor for Windows, Mac and Linux
Stanford Engineering Digital Magazine Article
Everyone wants to be popular online. Some even pay for it. Inside social media’s black market.
24% of the population currently cares deeply enough about their online privacy to take significant actions to try to protect it.
Federal and state authorities are investigating the sellers of artificial followers and other fraudulent social media engagement.