ivar + privacy   300

As Equifax Amassed Ever More Data, Safety Was a Sales Pitch - The New York Times
The company built algorithms and started scrubbing social media to assess consumers. In a big data collection coup, Equifax persuaded more than 7,000 employers to hand over salary details for an income verification system that now encompasses nearly half of American workers.
equifax  surveillance  capitalism  data  ml  profiling  corporation  privacy 
25 days ago by ivar
Big brother is here, and his name is Facebook | Hacker News
Interesting discussion about the surveillance capabilities of Google and Facebook
privacy  surveillance  facebook  google  hn 
9 weeks ago by ivar
Corporate Surveillance in Everyday Life
Corporate Surveillance in Everyday Life
Report: How thousands of companies monitor, analyze, and influence the lives of billions. Who are the main players in today’s digital tracking? What can they infer from our purchases, phone calls, web searches, and Facebook likes? How do online platforms, tech companies, and data brokers collect, trade, and make use of personal data?
data  privacy  surveillance  facebook  personal  profiling 
july 2017 by ivar
How Bureaucrats and Spies Turned Canada Into a Surveillance State | Motherboard
Canadians received a shock to the system when a spate of news items revealed how police and spy agencies flout the law and moral conventions to spy on citizens and journalists, in some cases dating back for many years.

“It is absolutely clear that CSIS and their Department of Justice lawyers made almost superhuman efforts to keep the fact that they were retaining metadata from the federal courts,” Fraser said.
canada  csis  surveillance  privacy  journalism  law  vice 
november 2016 by ivar
prosthetic knowledge — Accessorize to a Crime Research from Carnegie...
Research from Carnegie Mellon University can generate visual patterns onto glasses to either avoid facial recognition or ‘impersonate’ as someone else:

Machine learning is enabling a myriad innovations, including new algorithms for cancer diagnosis and self-driving cars. The broad use of machine learning makes it important to understand the extent to which machine-learning algorithms are subject to attack, particularly when used in applications where physical security or safety is at risk.
In this paper, we focus on facial biometric systems, which are widely used in surveillance and access control. We define and investigate a novel class of attacks: attacks that are physically realizable and inconspicuous, and allow an attacker to evade recognition or impersonate another individual. We develop a systematic method to automatically generate such attacks, which are realized through printing a pair of eyeglass frames. When worn by the attacker whose image is supplied to a state-of-the-art face-recognition algorithm, the eyeglasses allow her to evade being recognized or to impersonate another individual. Our investigation focuses on white-box face-recognition systems, but we also demonstrate how similar techniques can be used in black-box scenarios, as well as to avoid face detection.
surveillance  image  facial  recognition  privacy  camouflage  decoy 
november 2016 by ivar
« earlier      
per page:    204080120160

related tags

4th  5eyes  5th  access  account  accountability  accuweather  aclu  activism  ad  adblock  ads  adv  advertising  advocacy  ai  aid  airbnb  alexa  alternative  altright  amazon  amnesty  analysis  analytics  ancestry  android  anonymity  anonymization  anonymous  ansible  app  apple  applebaum  application  architecture  argument  art  article  articles  association  att  attack  audio  automation  autonomy  bank  bc  bccla  beacon  behaviour  bernerslee  bestbuy  bigdata  biology  biome  bitcoin  biz  blackhat  blog  book  books  bose  box  breach  breah  breech  britain  browser  bug  bulk  business  c-51  camera  camouflage  canada  capitalism  car  cbc  censorship  chat  checklist  children  china  chrome  cia  citizenship  civic  civil  class  clickthrough  cloud  collection  comic  commodity  communication  community  compliance  computation  computer  computing  conference  consequences  consumer  contagion  content  control  cook  cookie  cool  copyright  corporation  corruption  cortana  coup  CPO  credit  creditcard  crime  cross-device  crowd  crypto  cryptography  csec  csis  culture  cyber  darkcloud  darkdata  darkness  darknet  darkweb  data  databroker  datashare  dating  dea  deaddrop  deanonymization  deanonymize  debate  decentralized  decoy  defence  defense  deidentification  delete  democracy  demographic  dependence  deployment  depression  design  detection  development  deviance  device  devops  differential  digital  directory  disguise  disorder  diy  dna  dns  doctorow  documentary  DoD  download  dox  drexel  driving  drone  duty  ebook  education  eff  elcomsoft  electricity  email  employers  encryption  enforcement  england  equifax  ereader  escalation  essay  ethics  eu  eula  europe  evil  expectation  extension  face  facebook  faceprint  facial  fake  fakenews  family  fascism  fbi  feature  felony  filesharing  film  finance  finances  fingerprinting  firefox  firmware  first  flash  foi  forensics  free  freedom  fuckup  gathering  gawker  gchq  geeksquad  geist  gene  generator  genetics  genetor  ghost  gmail  google  government  gpg  gps  graph  graphic  group  groupware  gruber  guide  gut  hack  hacker  hardware  headphone  health  hidden  history  hn  hosting  household  howto  huffingtonpost  human  humanrights  id  idea  identity  ieee  image  implementation  imsi  india  inernet  info  infosec  instagram  insurance  intercept  international  internet  interview  investigation  investment  ios  iot  iphone  ipsec  irc  iron  it  journalism  js  kids  kit  laser  law  leak  legal  legality  liability  liberties  liberty  license  life  linguistics  linux  list  lobbyist  location  log  logging  logs  mac  machinelearning  MAID  malware  manipulation  manning  map  maps  marketing  marlinspike  mass  media  medical  mental  mesh  metadata  metrics  microbiome  microphone  microsoft  mit  ml  mobile  monetization  monitor  monopoly  motherjones  moxie  ms  music  name  net  network  news  nickblack  nonpost  nothingtohide  nsa  nyt  nytimes  obfuscation  office  officer  onion  oobik  opengraph  opensource  os  osx  ownership  p2p  parenting  patient  pattern  personal  pesonal  pgp  Philippines  phone  physical  pii  plate  plates  pokemongo  police  policy  politics  populism  post  power  powerventures  prank  prevention  printer  prism  privacy  private  product  productivity  profile  profiling  profit  protect  protest  psychology  public  punlic  purchase  python  race  raspberrypi  rate  rcmp  reading  realtime  reason  recognition  recommendation  recording  reference  registry  regulation  repair  report  reporting  retail  review  rfid  right  rights  roomba  root  rule  safety  sale  sales  scale  schneier  school  science  scope  score  secrecy  secret  security  self-defense  selfcensorship  selfhost  sellout  server  service  sharing  shopping  signature  silentcircle  skin  slack  snowden  social  socialgame  socialgraph  socialmedia  socialsoftware  society  sociology  software  sound  space  spiralofsilence  spotify  spy  spyware  stadium  stalk  stalking  stallman  statistics  steganography  stingray  stockpile  study  stuffy  stylometry  subpoena  surveillance  surveilliance  switzerland  tails  talk  target  targetting  technology  ted  teddybear  telco  telemetry  telephone  television  terrorism  test  thiel  thirdparty  thoughts  threat  three  tinder  tinfoilhat  tips  tool  tools  tor  tos  toy  tracking  transportation  treaty  truck  tv  twitter  uav  ubuntu  uk  ultrasonic  unrest  usa  usage  UX  vachani  value  verizon  vice  video  visualization  vizio  vpn  war  wasteland  watermark  waze  web  webdev  website  wechat  whatsapp  whistleblower  wifi  windows  work  workplace  workspace  yahoo  youaretheproduct  youth  zap  zimmermann 

Copy this bookmark: