Tag: privacy concerns

  • Slashdot: Encrypted Chat App ‘Session’ Leaves Australia After Visit From Police

    Source URL: https://it.slashdot.org/story/24/10/22/142225/encrypted-chat-app-session-leaves-australia-after-visit-from-police?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Encrypted Chat App ‘Session’ Leaves Australia After Visit From Police Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Session, an encrypted messaging app that is relocating its operations from Australia to Switzerland due to increased pressure from the Australian Federal Police regarding user data. This highlights…

  • Hacker News: When machines could see you

    Source URL: https://dnlserrano.github.io//2024/10/20/when-machines-could-see-you.html Source: Hacker News Title: When machines could see you Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details the historical development of facial recognition technologies, particularly highlighting the contributions of Geoffrey Hinton and the Viola-Jones algorithm. It emphasizes the transition from earlier methods used for face detection to modern…

  • Wired: ICE’s $2 Million Contract With a Spyware Vendor Is Under White House Review

    Source URL: https://www.wired.com/story/ice-paragon-contract-white-house-review/ Source: Wired Title: ICE’s $2 Million Contract With a Spyware Vendor Is Under White House Review Feedly Summary: Immigration and Customs Enforcement’s contract with Paragon Solutions faces scrutiny over whether it complies with the Biden administration’s executive order on spyware, WIRED has learned. AI Summary and Description: Yes Summary: The text discusses…

  • Slashdot: Can We Turn Off AI Tools From Google, Microsoft, Apple, and Meta? Sometimes…

    Source URL: https://apple.slashdot.org/story/24/10/20/2023223/can-we-turn-off-ai-tools-from-google-microsoft-apple-and-meta-sometimes?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Can We Turn Off AI Tools From Google, Microsoft, Apple, and Meta? Sometimes… Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the rise of AI technology in consumer products and its implications for data privacy. While many users find these tools intrusive, the options to control…

  • Hacker News: Kennedy, Merkley introduce bill to end TSA facial recognition (2023)

    Source URL: https://www.kennedy.senate.gov/public/2023/11/kennedy-merkley-introduce-bill-to-end-involuntary-facial-recognition-screenings-protect-americans-privacy Source: Hacker News Title: Kennedy, Merkley introduce bill to end TSA facial recognition (2023) Feedly Summary: Comments AI Summary and Description: Yes Summary: The Traveler Privacy Protection Act of 2023 seeks to restrict the use of facial recognition technology by the TSA in U.S. airports, highlighting concerns over privacy, consent, and potential…

  • Wired: Sam Altman’s Eye-Scanning Orb Has a New Look—and Will Come Right to Your Door

    Source URL: https://www.wired.com/story/worldcoin-sam-altman-orb/ Source: Wired Title: Sam Altman’s Eye-Scanning Orb Has a New Look—and Will Come Right to Your Door Feedly Summary: The ambitious identity-verification project Worldcoin, now called ‘World,’ wants a future where humans are ‘orb-verified.’ AI Summary and Description: Yes Summary: The text discusses the launch and implications of Worldcoin, a biometric identity…

  • Simon Willison’s Weblog: Gemini API Additional Terms of Service

    Source URL: https://simonwillison.net/2024/Oct/17/gemini-terms-of-service/#atom-everything Source: Simon Willison’s Weblog Title: Gemini API Additional Terms of Service Feedly Summary: Gemini API Additional Terms of Service I’ve been trying to figure out what Google’s policy is on using data submitted to their Google Gemini LLM for further training. It turns out it’s clearly spelled out in their terms of…

  • CSA: AI and ML for Implementing Zero Trust Network Access

    Source URL: https://www.zscaler.com/cxorevolutionaries/insights/ai-and-ml-adopting-implementing-and-maturing-zero-trust-network-access Source: CSA Title: AI and ML for Implementing Zero Trust Network Access Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the evolving cyber threat landscape and argues for the adoption of Zero Trust Network Access (ZTNA) enhanced by AI and Machine Learning (ML). It emphasizes the importance of continuous…

  • Cisco Talos Blog: What NIST’s latest password standards mean, and why the old ones weren’t working

    Source URL: https://blog.talosintelligence.com/threat-source-newsletter-oct-10-2024/ Source: Cisco Talos Blog Title: What NIST’s latest password standards mean, and why the old ones weren’t working Feedly Summary: Rather than setting a regular cadence for changing passwords, users only need to change their passwords if there is evidence of a breach.  AI Summary and Description: Yes **Summary:** The text discusses…

  • Schneier on Security: Deebot Robot Vacuums Are Using Photos and Audio to Train Their AI

    Source URL: https://www.schneier.com/blog/archives/2024/10/deebot-robot-vacuums-are-using-photos-and-audio-to-train-their-ai.html Source: Schneier on Security Title: Deebot Robot Vacuums Are Using Photos and Audio to Train Their AI Feedly Summary: An Australian news agency is reporting that robot vacuum cleaners from the Chinese company Deebot are surreptitiously taking photos and recording audio, and sending that data back to the vendor to train their…