Blog

Law enforcement is using a facial recognition app with huge privacy issues

[ad_1]

Part of the problem stems from a lack of oversight. There has been no real public input into adoption of Clearview’s software, and the company’s ability to safeguard data hasn’t been tested in practice. Clearview itself remained highly secretive until late 2019. It’s certainly capable of looking at search data if it wants — police helping to test the software for the NYT‘s story got calls asking if they’d been talking to the media.

The software also appears to explicitly violate policies at Facebook and elsewhere against collecting users’ images en masse. Facebook said it was looking into the situation and would “take appropriate action” if Clearview is breaking its rules.

Company chief Hoan Ton-That tried to downplay some of the privacy concerns. He noted that surveillance cameras are “too high” to deliver truly reliable facial recognition, and that Clearview was only notified about the reporter’s inquiries because of a system built to catch “anomalous search behavior.” Customer support reps don’t look at uploaded photos, the company added. And while there’s underlying code that could theoretically be used for augmented reality glasses that could identify people on the street, Ton-That said there were no plans for such a design.

Clearview’s software has nonetheless raised alarm bells, and not just for the possible abuses of power mentioned earlier. The software is only about 75 percent accurate, and hasn’t been tested by outsiders like the US government’s National Institute of Standards and Technology. There’s a real risk of false matches, not to mention potential gender and racial biases. However well it has worked in some instances, there’s a chance it could lead to false accusations or disproportionately target non-white groups. Cities like San Francisco have rushed to ban government use of facial recognition over problems like these, and calls for further bans might grow louder in the wake of this latest news.

[ad_2]

Source link

Microsoft will fix an Internet Explorer security flaw under active attack

[ad_1]

The issue is significant enough that Homeland Security issued an advisory encouraging people to both be aware of the flaw and consider implementing workarounds, including temporarily restricting access to jscript.dll.

Unlike the Firefox bug, though, you’ll have to wait a while for a patch. Microsoft said it wasn’t likely to provide its fix until its next monthly security release, slated for February 11th. Until then, you’ll either have to consider workarounds or be cautious about clicking links to visit unfamiliar sites.

The risks might not be extremely high given the modern browser market. Microsoft has largely showed Internet Explorer to the side in favor of Edge, which just got a major Chromium-based revamp on January 15th, and you’re statistically more likely to use a third-party browser like Chrome. Nonetheless, it’s a headache — Microsoft’s past is coming back to haunt its present.

[ad_2]

Source link

Amazon may offer hand recognition payments to other stores

[ad_1]

Amazon’s cloud would store the data and might even tie it to Amazon.com spending to help target ads, although we can imagine some hesitation given that people are already concerned about creepy targeting. The company may also have challenges in safeguarding payment cars. It could blacklist people caught using stolen cards, according to tipsters, but that would only help after a thief had already bought at least one item using your hard-earned money.

The system is still young, but may be making progress. Amazon is said to be working with Visa for test transactions, and is supposedly in talks with Mastercard. It might be less a question of whether or not the technology is viable as whether shoppers and stores are receptive. While handprints aren’t as revealing as faces, customers might still be reluctant to link biometric data to Amazon. Shops, meanwhile, might not want to remind customers that Amazon exists and that they could order some things online.

[ad_2]

Source link

Ask Engadget: What tech can help me survive a trade show?

[ad_1]


Chris Velazco

Chris Velazco
Senior Editor, Mobile

Trade show life can be exhilarating, but it usually doesn’t take long before something goes awry. I’ve been to CES something like nine times and MWC about seven, and a few gadgets come in handy every time.

When you’re roaming the show floor, solid data connections can be hard to come by — just ask the poor exhibitors around you, trying in vain to get their demos working on lousy venue Wi-Fi. Because of that, a portable hotspot is indispensable, especially when you’re like us and need to stay on top of many, many meetings. There’s a good chance your phone or laptop will need a top-up after long stretches on the floor, so I like to carry a power bank — Mophie’s Powerstation PD-XL or Powerstation AC are great choices. The latter is honestly very pricey, but it’s been a life-saver since it’ll also charge your USB-C laptop without fuss.

Assuming you’ll have to work at some point, some kind of noise-reducing or noise-mitigating headphones can feel like a godsend. I’ve been using Apple’s AirPod Pros since they strike a nice balance between noise cancellation and size, but Engadget also loves the Sony’s WF-1000XM3. Both of these options are small, discreet and sound great, but if you’d rather use a more reasonably priced wired pair, I’m a big fan of the Shure SE215. It uses dense foam tips instead of microphones and algorithms to block out the trade show din, but they’re damn good at it and they sound lovely.


Terrence O'Brien

Terrence O’Brien
Managing Editor

When I’m traveling, one of my must-haves is a portable humidifier. Now, before we go any further, let me be clear: Basically every portable humidifier I’ve used has been cheap garbage. But, this is one of those instances where cheap garbage is better than nothing. Every hotel where I’ve stayed has used forced-air heat, and that just quickly turns a room into an arid torture chamber.

That issue is only made worse when your hotel is in a barren desert wasteland. (Hello, Las Vegas!) A small portable humidifier can add just enough moisture to a room to keep you from waking up in the morning feeling like someone ran a box grater through your throat and sinuses.


Andrew Tarantola

Andrew Tarantola
Senior Editor

I’ve luckily got that gene that renders me generally immune to most of the cold and flu strains out there, but these 90-nanometer facemasks are a solid choice if you’re worried about getting sick and subsequently spreading it around. I used a set during the North Bay fires; they worked great for that too. I’d also recommend zinc supplements and alcohol-based hand wipes for external cleaning.


Devindra Hardawar

Devindra Hardawar
Senior Editor

A few things I’ve found helpful: noise canceling buds (like Apple’s Airpods Pro or Sony’s WF-1000XM3) are great for blocking out the crowd noise, without being completely closed off like noise canceling full-sized headphones. Extra battery packs are key, especially if they can recharge your computer over USB-C.

Depending on what you’re doing at a trade show, you may not need a camera or mic, but if you’d like to record panels for yourself, you can snag a mic add-on like this one from Shure for better quality. Also, bring a good water bottle to stay hydrated (and refill on the go). Oh, and wear good sneakers! That’s tech, right?


Amber Bouman

Amber Bouman
Community Content Editor

I’ll add a few things: First, Dev is right about a battery backup — a spare power supply is essential because outlets will not always be available or accessible. I like this one from Anker for phones and tablets.

Other smaller odds and ends that I’ve found helpful: a reliable calendar app with extensive features; a good note-taking app; and you may want to consider an app that uses your phones camera to take pictures of, and file, business cards. Also I cannot stress enough how useful it is to have a pouch or bag that corrals charging cables and cords into one place. (I use the Arkiv tool roll.)

[ad_2]

Source link

Hitting the Books: Hackers can convince your IoT devices to betray you

[ad_1]

Power to the People: How Open Technological Innovation is Arming Tomorrow’s Terrorists
by Audrey Kurth Cronin


Book coverThe internet is all around us — in our phones, our homes, our cars, and even our toaster ovens for some reason. Problem is, the adoption of this ubiquitous connectivity has far outpaced our efforts to secure those systems against unlawful intrusion, giving bad actors a plethora of new ways to harass, intimidate, harm and terrorize their targets.

In Power to the People, author and noted security expert Audrey Kurth Cronin, delves into the history of technological innovation and its impacts on international terrorism. From gunpowder and dynamite to cyberattacks, autonomous systems, and 3D printing, these advances have markedly improved our society but have also given your run of the mill extremist idealog access to weapons of mass murder.

The Internet of Things (IoT) is the interconnection of millions of computing devices via the Internet, equipped with sensors that directly receive and transfer data without human involvement. As the IoT grows to encompass more cars, kitchen appliances, thermostats, door locks, voice-activated assistants, and even hospital infusion pumps and heart monitors, it provides malevolent actors plentiful opportunities for hacking into systems and wreaking havoc.

A great danger is that because private sector companies compete furiously to get their products to market cheaply and quickly, software engineers routinely fail to incorporate security into their designs. Release of new products takes priority over implementing security features, and since competitors’ security is just as lax, properly securing these consumer products, which would lead to delays of months, would be a serious competitive disadvantage. What has resulted is a kind of race to the bottom: according to one estimate, 70 percent of all IoT devices have flaws such as unsecured software and unencrypted communication systems. Thus far, companies are usually not held legally responsible for hacks that break through lax security in consumer devices. What’s more, the companies themselves have little incentive to secure or encrypt these data sources, because easy access affords them a wealth of information about users. Openness and accessibility are valuable; for those who want to sell to us, having information on what millions of people do is very lucrative. But profiles of our behavior also offer extremely valuable intelligence for those who want to attack us.

Consumers have little to no control over what information is gathered through these devices because they do not own the software that runs them, or have control over that software. The Internet of Things is changing the nature of buying and owning items. According to law professor Joshua Fairfield, a fundamental shift in property rights is underway and we’re entering an era of digital serfdom, loosely resembling feudalism. Whereas serfs did not own their own land, homes, or even farm tools, we generally own the hardware of our smart devices, but the companies who produce them own the software and the information about us they gather. With some smart products, even the hardware is not owned outright, but rather rented. John Deere, for example, has told farmers that they don’t really own the tractors they purchase from the company because they are licensing the software that runs them. Farmers cannot fix the vehicles themselves or take them to independent repair shops.

Because IoT devices are connected to the Internet, they can also be hacked, and intrusions are already widespread. Would you leave your front door wide open? In August 2017, hundreds of Internet-connected locks became inoperable because of a faulty software update by LockState. It left hundreds of owners unable to lock or unlock their homes for a week. Hackers have moved from taking remote control of your PC to taking control of your smart TV or your city’s CCTV cameras instead. They have hacked cars (repeated attacks on Jeep Cherokees in 2015 and 2016), power plants (malware took down Ukraine’s power plants in 2016), smart bulbs (researchers showed they could hack thousands of Philips Hue smart bulbs in 2017), and voting machines (a Princeton professor hacked into one in seven minutes). Relatively inexpensive IoT hacking tools are widely and cheaply available to non-state actors. Why bother planting an explosive device under a car if you can hack into a vehicle’s navigation system and make it accelerate into a wall or off a bridge? No need for assassination if hackers can deliver a fatal dose of insulin through the unencrypted radio communication system of the insulin pump. No need to take physical hostages; just tamper with a hospital’s computer-connected infusion pump to overdose a patient—then threaten to do the same to others.

According to American cryptographer and computer security expert Bruce Schneier, IoT devices are more vulnerable than your laptop or your phone, for a number of reasons. The first is that huge corporations like Apple, Samsung, and Microsoft can afford to hire large teams of engineers devoted to security, while the smaller companies that are making smart locks and thermostats, for example, cannot. Second, whereas people replace their smartphones and laptops every few years, that is not the case for smart refrigerators, pacemakers, or cars, which they will keep for five or ten years or more. Nefarious actors have much more time to discover their vulnerabilities and, because the software is rarely updated, those vulnerabilities persist year after year, just waiting to be exploited. To make matters worse, a vulnerability in one Internet-enabled device, like your home router, can be used as a launching pad for attacks against a range of other connected devices you might own. One small flaw and your whole computer-assisted life can be hijacked.

Much attention has been paid to the threat of espionage and cyberattacks by states, and in February 2016, US Director of National Intelligence James Clapper warned that the Internet of Things will further empower state- sponsored espionage, enabling better monitoring, tracking, and targeting of individuals. The threat of attacks by non-state actors is also high. For terrorists, a key question now, as always, is which avenues of attack are most easily available? Enormous collections of data are enticing targets, at scales of magnitude that non-state malicious actors could never dream of amassing themselves. States and corporations are focused on the potential fruits of big data rather than on the criminals and terrorists who can hack into it.

By connecting everything from home defense systems to medical devices to utility companies to hydroelectric dams to the Internet, we have made a new means of attack highly accessible. Absent better security measures, well- established processes of the diffusion of lethal empowerment will kick in. In the mid-twentieth century, airline hijackings evolved from airplane flight diversions to Cuba to the downing of airliners with hundreds of innocent people aboard. Exploiting the Internet of Things to hold people hostage or attack them will spawn increasingly violent copycat attacks. Putting better defensive measures in place is essential.

From Power to the People: How Open Technological Innovation is Arming Tomorrow’s Terrorists by Audrey Kurth Cronin. Copyright © 2019 by Audrey Kurth Cronin and published by Oxford University Press. All rights reserved.

[ad_2]

Source link

The Morning After: Counting down to SpaceX’s next Crew Dragon test

[ad_1]


Original content.Ben & Jerry’s made a binge-worthy Netflix and Chill’d ice cream flavor

With official support from Netflix, Ben & Jerry’s has announced a new flavor called Netflix and Chill’d. It’s made with peanut butter, salty pretzel swirls and fudge brownie chunks. The lid displays the company’s logo and declares that you’re about to eat “A Netflix Original Flavor.”


Drones with bird-like wings could fly in rougher winds.This pigeon-inspired drone bends its wings to make it more agile

A team of researchers from Stanford University’s Lentink Lab has built a robotic pigeon aptly called PigeonBot, which can bend, extend and simply change the shape of its wings like real birds can.


Bad PasswordYour online activity is now effectively a social ‘credit score’

As columnist Violet Blue explains, companies are already using your online profile to decide if they’ll allow you on as a customer.


Ready for another trip?Engadget Podcast: Super Nintendo World, here we go!

Devindra, Cherlynn and Senior Editor Nick Summers take a relaxing break from the madness of CES by diving into some of this week’s news, like the trailer for Japan’s Super Nintendo World park. They also question the wisdom of Sony abandoning E3 (yet again), and welcome Microsoft’s new Chromium-infused Edge browser. Listen on Apple Podcasts, Google Play, Spotify, Pocket Casts or Stitcher.


It could help track breathing issues — if you have the right device.Fitbit quietly enables blood oxygen tracking on its wearables

A bunch of Fitbit models already have blood oxygen monitoring hardware, but until now it wasn’t being used. The company has just snuck out an update to its Versa, Ionic and Charge 3 devices, which will look at blood oxygen levels to help track things like asthma, heart disease and sleep apnea.


Like Project xCloud, but from your home console.Microsoft’s Xbox Console Streaming preview goes global

Microsoft has been experimenting with streaming Xbox games to Android phones and tablets for a while as it looks for an answer to the PS4’s Remote Play. Now, after opening a limited beta late last year, all Xbox Insiders in countries that support Xbox One can have a go.


Update ASAP.Microsoft patched a major Windows 10 flaw discovered by the NSA

This week Microsoft issued patches for Windows 10 as well as Windows Server 2016 and 2019. However, it wasn’t a normal Patch Tuesday, because this time it addressed a flaw that had been uncovered by the NSA and could be used to exploit computers remotely or spy on and manipulate encrypted internet traffic. Disclosing the vulnerability so it can be fixed will hopefully stop it from leaking out, which is what happened in 2017 with the EternalBlue exploit.


Nope, no, not happening.Valve is definitely not working on ‘Left 4 Dead 3’

Despite “LFD3” popping up on an HTC slide during a presentation, Valve says there’s nothing in development for the co-op shooter series, so quit asking.

But wait, there’s more…


The Morning After is a new daily newsletter from Engadget designed to help you fight off FOMO. Who knows what you’ll miss if you don’t Subscribe.

Craving even more? Like us on Facebook or Follow us on Twitter.

Have a suggestion on how we can improve The Morning After? Send us a note.



[ad_2]

Source link

Recommended Reading: The internet sleuths who caught the Astros cheating

[ad_1]

How the internet helped crack the Astros’ sign-stealing case
Joon Lee,
ESPN

One of the biggest sports stories of the year has already broke, and it’s barely mid-January. If you haven’t heard, Major League Baseball determined the Houston Astros used various methods, including video feeds, to steal signs from the opposition during the team’s 2017 championship season — including the World Series. MLB found that it continued to do so during the 2018 season, too. So far, three managers have lost their jobs due to their involvement. ESPN explains how internet detectives examined footage for clues over the last several months, and how that work helped blow the case wide open.

[ad_2]

Source link

Apple tests UWB switch to keep the iPhone 11 from tracking your location

[ad_1]

While Apple emphasized that the company isn’t collecting location data and that the UWB checks take place “entirely on the device,” it promised to roll out a dedicated toggle for the chip to assuage people’s fears. YouTube creator Brandon Butch has just spotted that feature in the latest iOS 13.3.1 beta.

The new toggle marked “Networking & Wireless” is found under System Services in Locations Services, which, in turn, is found in Privacy Settings. It looks like switching it off triggers a prompt that says “Turning off location for Networking & Wireless may affect Bluetooth, Wi-Fi, and Ultra Wideband performance.”

Apple’s devices use the UWB chip for highly precise location finding. One of its benefits is giving users the capability to quickly find the right person to AirDrop in a place full of iPhone users.



[ad_2]

Source link

Walmart’s weekend sale includes a $150 Xbox One S All-Digital Edition

[ad_1]

Microsoft’s cheapest Xbox One S is back to the lowest price we’ve seen, and is available for $150 at Walmart this weekend, $100 off the regular price. A few Black Friday deals saw the All-Digital version of the console drop to a price that low, but now that we’re in a new year — and we all know when the Xbox Series X is coming — maybe it’s a little more clear that you’d like an HDR-ready version of the Xbox One to hold you over.

It’s not as powerful as the pricier Xbox One X, but if all you want to do is watch 4K video and play a few downloaded games — or maybe do some xCloud streaming in the future — then it fits the bill, and for a lower price than other consoles — even the Nintendo Switch. With this bundle, it even throws in Sea of Thieves, Minecraft and Fortnite with 2,000 V-bucks and a special skin.

Buy Xbox One S 1 TB All-Digital Edition on Walmart – $150

[ad_2]

Source link

First-person shooter 'Kingpin: Life of Crime' is getting a remaster

[ad_1]

Kingpin: Life of Crime, a first-person shooter from 1999, is getting a remaster. If you never imagined this happening — "I'll take games I never thought would be remastered for $100, Alex" — we feel you. The title didn't enjoy as much popularity as…

[ad_2]

Source link