Étiquette : privacy (Page 10 of 46)

A Smart Lamp That Watches Kids When They Study Is a Hit in China

“The lamps come equipped with two built-in cameras—one facing the child and another offering a bird’s-eye view from above—letting parents remotely monitor their children when they study. There is a smartphone-sized screen attached to each lamp, which applies artificial intelligence to offer guidance on math problems and difficult words. And parents can hire a human proctor to digitally monitor their children as they study.In addition to the basic version of the lamp, a $170 upgraded model sends alerts and photos to parents when their children slouch. That version of the lamp sold out on China’s largest e-commerce platforms earlier this month.”

Source : A Smart Lamp That Watches Kids When They Study Is a Hit in China – WSJ

Tesla is working on driver ‘safety rating’ based on driving behaviors and Autopilot use to affect insurance cost

“Here are the factors that Tesla will be tracking to determine your safety rating:

  1. ABS Activation – Number of times ABS is activated Hours Driven – Average daily driving time Forced Autopilot
  2. Disengagements – Number of times Autopilot is disabled due to ignored alerts Forward Collision
  3. Warnings – Number of times car detects a potential forward collision
  4. Unsafe Following Time – Portion of time spent at an unsafe following distance
  5. Intensity of Acceleration and Braking – Speed variance due to extreme acceleration and braking. Shown on a scale from 0-10 as measured against Tesla’s internal fleet.

This score is going to affect your premium by up to 50% on a monthly basis – meaning that it can increase or lower your insurance cost depending on how you drive.”

Source : Tesla is working on driver ‘safety rating’ based on driving behaviors and Autopilot use to affect insurance cost – Electrek

Tinder Gives Members More Control With New Feature Allowing You to Block Your Ex

““We may not be able to save you from awkward run-ins at the coffee shop, but we are giving you more control over your experience on Tinder,” said Bernadette Morgan, Group Product Manager, Trust & Safety at Tinder. “We’re rolling out Block Contacts as an additional resource empowering members with peace of mind by helping create a worry-free space for them to spark new connections.” ”

Source : Tinder Gives Members More Control With New Feature Allowing You to Block Your Ex

Le 21 juillet 2020, l’entrée du Conseil constitutionnel, à Paris.

“Surtout, le Conseil constitutionnel a jugé « contraires à la Constitution » le très controversé article 24, devenu l’article 52, qui vise à protéger les forces de l’ordre en opération en pénalisant la diffusion malveillante de leur image. Largement soutenu par les syndicats de police, cet article punit la « provocation à l’identification » des forces de l’ordre, un nouveau chef d’accusation qui avait fait réagir les défenseurs des libertés publiques, parmi lesquels les organisations de journalistes.”

Source : Loi « sécurité globale » : le Conseil constitutionnel censure l’article 24

96% of US users opt out of app tracking in iOS 14.5, analytics find | Ars Technica

The Facebook iPhone app asks for permission to track the user in this early mock-up of the prompt made by Apple.

“It seems that in the United States, at least, app developers and advertisers who rely on targeted mobile advertising for revenue are seeing their worst fears realized: Analytics data published this week suggests that US users choose to opt out of tracking 96 percent of the time in the wake of iOS 14.5.”

Source : 96% of US users opt out of app tracking in iOS 14.5, analytics find | Ars Technica

Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective

FFmpeg vulnerabiltiies by year

“Given the number of opportunities present, we found that it’s possible to execute arbitrary code on a Cellebrite machine simply by including a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned. There are virtually no limits on the code that can be executed. For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.”

Source : Signal >> Blog >> Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective

Troy Hunt: Data From The Emotet Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI and NHTCU

“Earlier this year, the FBI in partnership with the Dutch National High Technical Crimes Unit (NHTCU), German Federal Criminal Police Office (BKA) and other international law enforcement agencies brought down what Europol rereferred to as the world’s most dangerous malware: Emotet. This strain of malware dates back as far as 2014 and it became a gateway into infected machines for other strains of malware ranging from banking trojans to credential stealers to ransomware. Emotet was extremely destructive and wreaked havoc across the globe before eventually being brought to a halt in February.
Following the takedown, the FBI reached out and asked if Have I Been Pwned (HIBP) might be a viable means of alerting impacted individuals and companies that their accounts had been affected by Emotet. This isn’t the first time HIBP has been used by law enforcement in the wake of criminal activity with the Estonian Central Police using it for similar purposes a few years earlier. ”

Source : Troy Hunt: Data From The Emotet Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI and NHTCU

533 million Facebook users’ phone numbers leaked on hacker forum

https://no-flux.beaude.net/wp-content/uploads/2021/04/phone-numbers.jpg

“The mobile phone numbers and other personal information for approximately 533 million Facebook users worldwide has been leaked on a popular hacker forum for free.The stolen data first surfaced on a hacking community in June 2020 when a member began selling the Facebook data to other members. What made this leak stand out was that it contained member information that can be scraped from public profiles and private mobile numbers associated with the accounts.”

Source : 533 million Facebook users’ phone numbers leaked on hacker forum

Google charts a course towards a more privacy-first web

Article's hero media

“Advances in aggregation, anonymization, on-device processing and other privacy-preserving technologies offer a clear path to replacing individual identifiers. In fact, our latest tests of FLoC show one way to effectively take third-party cookies out of the advertising equation and instead hide individuals within large crowds of people with common interests. Chrome intends to make FLoC-based cohorts available for public testing through origin trials with its next release this month, and we expect to begin testing FLoC-based cohorts with advertisers in Google Ads in Q2. Chrome also will offer the first iteration of new user controls in April and will expand on these controls in future releases, as more proposals reach the origin trial stage, and they receive more feedback from end users and the industry. This points to a future where there is no need to sacrifice relevant advertising and monetization in order to deliver a private and secure experience. ”

Source : Google charts a course towards a more privacy-first web

« Older posts Newer posts »

© 2026 no-Flux

Theme by Anders NorenUp ↑