Whether you’re tweeting, shopping or just browsing, internet companies are monitoring you. Here’s how to evade the snoopers
En el siglo XXI, procesos como encontrar pareja, trabajo, reconocer rostros, tomar fotos, construir -y manejar- autos y enviar emails, entre otros servicios entregados por aplicaciones móviles, se basan también en el uso de algoritmos. Y Chile no está ajeno al avance científico y matemático en torno a ellos.
Las empresas de telecomunicaciones, Internet y entornos móviles del mundo no revelan suficiente información a los usuarios sobre sus prácticas que afectan la libertad de expresión y el derecho a la privacidad, concluye el Índice de Responsabilidad Corporativa 2017 de la iniciativa Ranking Digital Rights (RDR).
Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?
Snapchat’s Evan Spiegel wore a sharp suit for his company’s IPO – a far cry from the relaxed look we’ve come to expect from tech entrepreneurs
one response to his letter is to think it’s inspiring, touching, even, that there’s a billionaire out there who wants to build an “infrastructure”, a word he uses 24 times, that “prevents harm, helps during crises and rebuilds afterwards”.But here’s another response: where does that power end? Who holds it to account? What are the limits on it? Because the answer is there are none. Facebook’s power and dominance, its knowledge of every aspect of its users’ intimate lives, its ability to manipulate their – our – world view, its limitless ability to generate cash, is already beyond the reach of any government.
We have to take action now to root out Russian and other foreign influences before they become too deeply enmeshed in our political ecosystem. First and foremost, leaders in the US and Europe must stop any attempt by the Trump administration to ease sanctions on Russia. It must be abundantly clear that attacking our elections through cyberspace will prompt a tough and proportional response.
This means that the move towards an algorithmically driven society also represents a radical power-shift, away from citizens and consumers and towards a smallish number of powerful, pathologically secretive technology companies, whose governing philosophy seems to be that they should know everything about us, but that we should know as little as possible about their operations.
The debate about “fake news” and the “post-truth” society we now supposedly inhabit has become the epistemological version of a feeding frenzy: so much heat, so little light. Two things about it are particularly infuriating. The first is the implicit assumption that “truth” is somehow a straightforward thing and our problem is that we just can’t be bothered any more to find it. The second is the failure to appreciate that the profitability, if not the entire business model, of both Google and Facebook depends critically on them not taking responsibility for what passes through their servers. So hoping that these companies will somehow fix the problem is like persuading turkeys to look forward to Christmas.
Two of Moscow’s top cybersecurity officials are facing treason charges for cooperating with the CIA, according to a Russian news report.The accusations add further intrigue to a mysterious scandal that has had the Moscow rumour mill working in overdrive for the past week, and comes not long after US intelligence accused Russia of interfering in the US election and hacking the Democratic party’s servers.
With voice recognition software being used in household products, Dr Hannah Fry explores how it works – and what the future might bring.
no es falso considerar hoy en día que todos estos datos que proveemos a los gigantes de la economía digital en cada uno de nuestros actos digitales (simplemente, por ejemplo, desplazándonos con un teléfono geolocalizado), y que nos revenden luego bajo la forma de servicios diversos, constituye una de las expoliaciones del bien del pueblo más espectacular de la Historia.
The key sentence in the clause that they eventually drafted read: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”Sign up to the new-look Media Briefing: bigger, better, brighterRead moreThis single sentence provided the legal underpinning for how the world wide web has evolved.
“Lamentablemente, en Chile y Latinoamérica aún no hay señales de que el roaming vaya a desaparecer, principalmente debido a falta de voluntad política y de los países en la región para llegar a un acuerdo beneficioso para todos. Sin embargo, sí hay opciones de avanzar. Como paso previo, son prioritarios los cambios normativos que resulten en tarifas sustancialmente menores para los usuarios. Esto pasa por una política de Estado para fijar un límite y, desde luego, se necesitan alianzas entre todos los países de la región y el trabajo conjunto de las operadoras para terminar con estos precios absurdos”.
Since the information platform launched in 2012 the young entrepreneur has been heralded as a saviour of Cameroon’s mothers and children, but he is very clear that a mobile phone can never replace a midwife. Nor should governments stop investing in energy infrastructure because people are using solar lanterns, or stop supporting teachers because children are learning with ebooks.
In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.
Restless consumers and technology are creating disruption
While cybersecurity companies traditionally aim to ensure that the code in software and hardware is free of flaws — mistakes that malicious hackers can take advantage of — DarkMatter, according to sources familiar with the company’s activities, was trying to find and exploit these flaws in order to install malware. DarkMatter could take over a nearby surveillance camera or cellphone and basically do whatever it wanted with it — conduct surveillance, interfere with or change any electronic messages it emitted, or block the signals entirely.
Fuente: Spies for Hire
Mr Arshad is one of a growing group of digital media stars who use YouTube videos, Facebook posts, tweets, photos and standup comedy to counter the barrage of extremist propaganda online — particularly from social media-savvy terrorist groups such as Isis. His YouTube series, which tackles issues facing Muslim youth in London, has been watched more than 73m times. One video, “I’m a Muslim, not a terrorist” has been screened in more than 100 schools around the UK by the police.
Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.
some people in the industry are asking whether these companies really have an innovative strategy, or just a modern twist on the centuries-old concept of pooling risk.Although all of them have different business models, there are some common themes. Most tend to put their customers (along with most of their premiums) into small groups, or pools. The money in each pool is used to pay its members’ claims.
By what legal authority do the National Security Agency and the FBI ask Yahoo to search its users’ emails? Neither the government nor the tech company would say, after Reuters first reported on Tuesday that Yahoo “secretly built a custom software program” it used on behalf of the NSA and CIA to scan customer emails.
Finally, Yahoo’s possible betrayal of its users is another example of why whistleblowers and leaks to the press are so important. The US government considers this type of surveillance “legal” even though it shocks the conscience of many ordinary Americans and dozens of civil liberties groups have been attempting to have courts rule it illegal for years.
Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by US intelligence officials, sources have told Reuters.The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency (NSA) or FBI, said two former employees and a third person who knew about the programme.
Modern love is digitised. Letters and unrequited love have been replaced with modern iterations (saucy pictures and ghosting). You do not go on blind dates, you go on dates with people whose best photos you deem, at best, attractive and, at worst, passable. No one asks each other out in person any more, probably.