We talk a lot about organizations that sell our personally identifiable #data, but we should consider discussing those that purchase our information...
- Specifically, who are they?
- What can be done to productively pressure them to stop?
Purposely not asking “what do they use it for?” because it legitimizes their actions.
Cloud Capitol by Mike Winkelmann #art
Respected security expert Bruce Schneier advocates for careful regulation of facial recognition, not an outright ban.
"Focusing on one particular identification method misconstrues the nature of the surveillance society we’re in the process of building." https://www.nytimes.com/2020/01/20/opinion/facial-recognition-ban-privacy.html
Signal Is Finally Bringing Its Secure Messaging to the Masses
"In just the last three months, Signal has added support for iPad, ephemeral images and video designed to disappear after a single viewing, downloadable customizable "stickers," and emoji reactions. More significantly, it announced plans to roll out a new system for group messaging, and an experimental method for storing encrypted contacts in the cloud."
The PC game "Kingdom Come: Deliverance" is being given away today, through February 20th.
"Kingdom Come: Deliverance is a story-driven open-world RPG that immerses you in an epic adventure in the Holy Roman Empire. Avenge your parents' death as you battle invading forces, go on game-changing quests, and make influential choices."
DOJ charges four Chinese military hackers for Equifax hack
"Most intelligence and counter-intelligence operations are usually left off the table when it comes to criminal investigations, as long as they don't target civilians. US officials said that this operation orchestrated by China's military hackers was different because they focused on the mass collection of civilian data and intellectual property theft."
#cybersecurity #infosec #china
On a Ledge by Jin Wang #art
An update to a 37-year-old digital protocol could profoundly change the way music sounds
"MIDI stands for “Musical Instrument Digital Interface” and, after 37 years, it has finally received a major update. MIDI 2.0 is live, and it could mean the end of the keyboard’s dominance over popular music."
"[B]ecause of MIDI 2.0, synthesizers and other electronic instruments will become more expressive. We will have more individual control over each note."
A Chinese national’s sloppy cover story exposed smuggling of sensitive US microchips https://qz.com/1794308/
Junk mail is borrowing tracking techniques from targeted online advertising
"They’re using the same technology and data as online advertising companies to target who gets what flier, postcard or envelope — even tying people’s online browsing activity to their home address. It means after you research Parachute’s bedsheets online, its ad won’t just follow you around on the Internet. It may also end up as a paper ad in your hands, delivered to your front door."
Jeff Bezos’s iPhone had Apple’s state-of-the-art security, and that may have helped its alleged hackers
"Apple’s secretive stance on bugs may prove to be an Achilles’ heel."
"Researchers like to compare iPhones to a home with a massive security system covering the perimeter.... Most burglars would not even bother trying to break in. But the select few who knew how to bypass those protections could essentially go undetected once inside."