As he demonstrated, a malicious hacker can execute a search for an Elasticsearch database with these tools by defining a port, an index, and a keyword. In less than a minute, Wethington found 33,000 open Elasticsearch databases, a small percentage of which would be related to facial recognition or artificial intelligence. “The point is that the data is easy to find if it’s even remotely insecure,” he says. In short order, Wethington found a database in China that is using facial recognition technology. He says the tools to access these systems are freely available and often require zero authentication. “Technically, they aren’t being hacked—they are simply not being secured,” says Wethington. … [Read more...] about Due to weak oversight, we don’t really know how tech companies are using facial recognition data
Data centers bay area
Planning scholar Jake Wegmann, who’s in the process of moving from Berkeley to the University of Texas at Austin, believes there’s another way: backyard cottages. Hear him out. Individual micro-units on single-family properties don’t require much time or money to build. They don’t need much space to sit on. They’re affordable almost by definition and are well-suited to the modern family–from the recent college grad living at home to the grandparent who wants to age in place. … [Read more...] about The Next Big Thing In Urban Planning? Backyard Cottages
Letting machine bias in? However, as artificial intelligence experts have cautioned, systems that aim to reduce bias through AI could be complicated by AI itself. Automated systems will only be as good as the underlying data, says Rashida Richardson, director of policy research at AI Now Institute, a think tank at New York University that studies machine bias and algorithmic accountability. And since admissions are embedded with many subjective judgments, Richardson believes attempting to automate it can result in “embedding and possibly concealing these subjective decisions,” quietly replicating the problems that these systems purport to address. … [Read more...] about Schools are using software to help pick who gets in. What could go wrong?
There are cheaper options. Rather than attacking phones, Nohl says most spyware vendors offer SS7 spying, which takes advantage of vulnerabilities in the mobile network. SS7, or Signaling System No. 7, is a protocol that allows various phone networks to communicate with one another. When an exploit gives hackers access to SS7, they can capture smartphone user information like voice calls, text messages, location information, and other data. “Of course, your iPhone can be strong as you want security-wise, but if the mobile network leaks information, that’s outside the control of the phone and Apple. Companies like Circles are very actively promoting that they can track the location of a phone through SS7.” … [Read more...] about Inside the shadowy world of spyware makers that target activists and dissidents
In 2018, the Journal of Applied Digital Forensics noted that there hasn’t been much research into the type of data logged by a car’s computer systems, how long these user artifacts remain, whether or not they can be removed, and if certain cars provide more data than others. In their study, researchers noted that today’s “connected cars” feature systems that “function like computers, storing information they process including user data from devices synced to the system.” The researchers studied cars of different makes and models with either a Uconnect® system or a Toyota™ Extension Box. The Toyota system provided a “significant amount of user information” like contacts, call logs, media file information, and locations, while the Uconnect system only provided location data. The study also noted that these systems can also log social media feed data. … [Read more...] about Despite the controversy, plenty of smaller tech startups work with ICE