Protecting people’s information is at the heart of everything we do.
This is sure to cause a privacy firestorm. Or make the already growing one worse.Syndicated copies to:
This is the transcript of my lightning talk from the beyond tellerrand Berlin pre-conference warm-up on 6 November 2017. It was a condensed version of my longer, work-in-progress and upcoming talk on privacy as a core pillar of ethical UX design. If you are interested in the final talk or know about a conference or event that might be, I’d be thrilled to hear from you.
It’s sad the amount of not caring that both laws and apathy on the internet can make your life just dreadful in ways that it shouldn’t.
I love the fact that people are working on solving these seemingly mundane issues. This is a great little presentation Sebastian!Syndicated copies to:
The service is called Amazon Key, and it relies on a Amazon’s new Cloud Cam and compatible smart lock. The camera is the hub, connected to the internet via your home Wi-Fi. The camera talks to the lock over Zigbee, a wireless protocol utilized by many smart home devices. When a courier arrives with a package for in-home delivery, they scan the barcode, sending a request to Amazon’s cloud. If everything checks out, the cloud grants permission by sending a message back to the camera, which starts recording. The courier then gets a prompt on their app, swipes the screen, and voilà, your door unlocks. They drop off the package, relock the door with another swipe, and are on their way. The customer will get a notification that their delivery has arrived, along with a short video showing the drop-off to confirm everything was done properly.
There’s a lot of trust Amazon is asking people for in it’s last few products. Alexa could listen (and potentially record) anything you say, cameras in your bedroom (ostensibly to help you dress), and now a key to your house. I can see so many things going wrong with this despite the potential value.
I’m probably more concerned about the flimsy lack of security in the area of internet of things (IoT) which could dip into these though than I am about what Amazon would/could do with them.Syndicated copies to:
At Signal, we’ve been thinking about the difficulty of private contact discovery for a long time. We’ve been working on strategies to improve our current design, and today we’ve published a new private contact discovery service. Using this service, Signal clients will be able to efficiently and scalably determine whether the contacts in their address book are Signal users without revealing the contacts in their address book to the Signal service.
There’s a lot of work involved here, but this is an intriguing proposition for doing contact discovery in social media while maintaining privacy. I can’t wait to see which silos follow suit, but I’m even more curious if any adventurous IndieWeb creators will travel down this road?
h/t cryptographer Matthew Green
Private contact discovery for Signal. Make no mistake: what Moxie is doing here is going to revolutionize messaging. https://t.co/RjAMWIpXui
— Matthew Green (@matthew_d_green) September 26, 2017
Syndicated copies to:
In short: your contact list will no longer be available to Signal servers. If you trust Intel SGX this wipes out a load of info leakage.
— Matthew Green (@matthew_d_green) September 26, 2017
DHS says agents are in the right to ask for passwords, decryption help.
Allow your website to accept pasted passwords - it makes your site more secure, not less.
One of the things people often tweet to us @ncsc are examples of websites which prevent you pasting in a password. Why do websites do this? The debate has raged – with most commentators raging how annoying it is.
So why do organisations do this? Often no reason is given, but when one is, that reason is ‘security’. The NCSC don’t think the reasons add up. We think that stopping password pasting (or SPP) is a bad thing that reduces security. We think customers should be allowed to paste their passwords into forms, and that it improves security. Continue reading “Let them paste passwords | NCSC Site”
EFF has run a full-page ad in this month’s Wired, addressed to the technology industry, under the banner “Your threat model just changed,” warning them that the incoming administr…
The man who saved net neutrality is stepping aside.
A reader analytics company in London wants to use data on our reading habits to transform how publishers acquire, edit and market books.
Syndicated copies to:
USC’s Ming Hsieh Department of Electrical Engineeing has announced that H. Vincent Poor will deliver the 2015 Viterbi Lecture
H. Vincent Poor, Ph.D.
Dean of the School of Engineering and Applied Science
Michael Henry Strater University Professor
Tuesday, March 24, 2015
Hughes Electrical Engineering Center (EEB) 132
As has become quite clear from recent headlines, the ubiquity of technologies such as wireless communications and on-line data repositories has created new challenges in information security and privacy. Information theory provides fundamental limits that can guide the development of methods for addressing these challenges. After a brief historical account of the use of information theory to characterize secrecy, this talk will review two areas to which these ideas have been applied successfully: wireless physical layer security, which examines the ability of the physical properties of the radio channel to provide confidentiality in data transmission; and utility-privacy tradeoffs of data sources, which quantify the balance between the protection of private information contained in such sources and the provision of measurable benefits to legitimate users of them. Several potential applications of these ideas will also be discussed.
H. Vincent Poor (Ph.D., Princeton 1977) is Dean of the School of Engineering and Applied Science at Princeton University, where he is also the Michael Henry Strater University Professor. From 1977 until he joined the Princeton faculty in 1990, he was a faculty member at the University of Illinois at Urbana-Champaign. He has also held visiting appointments at a number of other universities, including most recently at Stanford and Imperial College. His research interests are primarily in the areas of information theory and signal processing, with applications in wireless networks and related fields. Among his publications in these areas is the recent book Principles of Cognitive Radio (Cambridge University Press, 2013). At Princeton he has developed and taught several courses designed to bring technological subject matter to general audiences, including “The Wireless Revolution” (in which Andrew Viterbi was one of the first guest speakers) and “Six Degrees of Separation: Small World Networks in Science, Technology and Society.”
Dr. Poor is a member of the National Academy of Engineering and the National Academy of Sciences, and is a foreign member of the Royal Society. He is a former President of the IEEE Information Theory Society, and a former Editor-in-Chief of the IEEE Transactions on Information Theory. He currently serves as a director of the Corporation for National Research Initiatives and of the IEEE Foundation, and as a member of the Council of the National Academy of Engineering. Recent recognition of his work includes the 2014 URSI Booker Gold Medal, and honorary doctorates from several universities in Asia and Europe.