The term "ghost protocol" might remind you of a famous blockbuster starring Tom Cruise, but here it applies to a new proposal by the Government Communications Headquarters (GCHQ) in the…
Privacy is one policy preference of the intersection of Data, AI, IOT, and OS
a service called FaceApp received a wave of press for using artificial intelligence to transform pictures of faces, making them look older or younger, male or female, or adding a smile to appear happier. This week, FaceApp once again made headlines as celebrities, including the Jonas Brothers, Drake and Dwayne Wade, appeared to use the app to show what they might look like when they get much older.
The internet is only 30 years old and is supposedly already “broken.” What began as a happy experiment in information exchange, invented by scientist Time Berners-Lee to facilitate knowledge transfers between the learned, has become a virtual world full of all that physical existence has to offer, plus some, including fraud, crime, data exploitation, outrage, and hate.
We have now all learned that you should likely just assume that your Internet of Things Appliances are exposing you to unknown levels of data privacy threats. Two big recent…
What does Facebook really know about you? When do they know it? What is a "Birds Eye" view of the information they collect?
Let's be honest here: is the NSA secretly trying to institute a totalitarian society? Probably not. Is Admiral Kieth Alexander entitled to some bit of "leeway" even though his organization clearly overstepped its legal mandate? Most likely. Is this funny and relevant? Absolutely.
It is a frequently heard presumptive the world over... "If you have nothing to hide, you have nothing to fear". As this documentary demonstrates, that is a flawed way of viewing the topic of privacy and surveillance.
Your friends are talking about how they see Advertisements appear after they have discussed something unusual in a conversation. Does that mean your devices are eavesdropping on you?
This video is an overview of how Internet Service Providers collect your private internet activity and then make it available for sale, all while you are paying them for the privilege.
Your hardware is now a bigger threat than your software. We are all accustomed to the drumbeat of malware, viruses, and trojans, etc, invading our computing platforms. However, since January…