«China has been building what it calls « the world’s biggest camera surveillance network ». Across the country, 170 million CCTV cameras are already in place and an estimated 400 million new ones will be installed in the next three years.Many of the cameras are fitted with artificial intelligence, including facial recognition technology. The BBC’s John Sudworth has been given rare access to one of the new hi-tech police control rooms».
Étiquette : privacy (Page 28 of 47)
Laisser Android voir vos proches plutôt que laisser vos proches voir votre Android. La vie privée (caméra active en permanence) ou la batterie ne semblent pas être des problèmes…
«Google researchers Hee Jung Ryu and Florian Schroff are gearing up to present a novel little project that takes advantage of your phone’s front camera and AI to spot people around you who are peeping at your screen, and shame them with a sticker».
Source : Google’s new tech can spot and shame people peeping at your phone
«Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for more than a year. This week, the ride-hailing firm ousted its chief security officer and one of his deputies for their roles in keeping the hack under wraps, which included a $100,000 payment to the attackers.»
via Bloomberg
«Many people realize that smartphones track their locations. But what if you actively turn off location services, haven’t used any apps, and haven’t even inserted a carrier SIM card? Even if you take all of those precautions, phones running Android software gather data about your location and send it back to Google when they’re connected to the internet»
Source : Google collects Android users’ locations even when location services are disabled — Quartz
«The differential privacy technology used by Apple is rooted in the idea that statistical noise that is slightly biased can mask a user’s individual data before it is shared with Apple. If many people are submitting the same data, the noise that has been added can average out over large numbers of data points, and Apple can see meaningful information emerge».
«Be honest and good to others and your Reputation Score will reflect this Our algorithms will calculate your Reputation Score based on the strength of your profile, your circle of friends, and what people you’ve interacted with say about you»
Source : Credo
«To put it mildly, this is a huge, huge problem,” Wray said. “It impacts investigations across the board — narcotics, human trafficking, counterterrorism, counterintelligence, gangs, organized crime, child exploitation. […] I get it, there’s a balance that needs to be struck between encryption and the importance of giving us the tools we need to keep the public safe» – Christopher Wray (FBI Director).
Source : FBI couldn’t access nearly 7K devices because of encryption
«Identifiez les habitudes de vos clients et découvrez leur univers en détectant les caractéristiques de votre audience : lieux de vie, lieux favoris, lieux culturels, lieux d’achats…».
«Les données de géolocalisation sont en fait envoyées à une deuxième société, distincte d’Ezeeworld. Les coordonnées GPS des téléphones ayant activé la géolocalisation parviennent à la société Accengage, qui édite le service Ad4Push, une solution qui permet d’envoyer des notifications sur les smartphones. Les données géographiques sont-elles nécessaires ? Oui, selon Olivier Tilloy, de S-money. Il doit être possible, explique-t-il, d’envoyer à l’étudiant des notifications géographiquement ciblées, spécifiques à sa région voire à son université, or l’application Izly est nationale. « L’actualité d’un étudiant n’est pas la même partout, on a besoin de contextualiser le message pour les étudiants », explique M. Tilloy».
Source : Izly, l’appli du Cnous qui géolocalise des étudiants et renseigne des sociétés publicitaires
«The technique “can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on,” he wrote. “The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data».





