Internet’s wildest man arrested after Caribbean odyssey
John McAfee, inventor of the virus scanner named after him and self-proclaimed US presidential candidate, has been temporarily arrested in the Dominican Republic for illegal possession of weapons.
A few days ago, McAfee posed with the weapons on Twitter, possibly providing the reason for the arrest.
Wednesday night he was released after three days and said he was leaving the country. He must leave his yacht behind.
Weapons, getaways, conspiracy theories, murder suspicions: John McAfee’s life is so exciting that Netflix made a series out of it - and Hollywood wanted to shoot a film of his life story with Johnny Depp in the leading role. Planned title: “Welcome to the Jungle”.
The eccentric IT entrepreneur is something like the mascot of the Internet. He has made millions with software, lost millions, staged himself as a renegade against everything and everyone, and claims that the CIA is after him. On photos he usually has a cigarette, a drink or a pump gun in his hand. On Twitter he entertains more than a million followers with his escapades. In recent days, another chapter has been added to the McAfee saga.
After an odyssey through the Caribbean, McAfee, his wife Janice and four other people, including a German citizen, were arrested in a port in the Dominican Republic. The country’s security forces confirmed Monday’s arrest, according to the AP news agency. Since Wednesday night, he has been at large again, as he announced on Twitter, garnished with photos in which he embraces grinning Dominican policemen.
👉🏼 Read the full (translated) story without ads n shit:
https://rwtxt.lelux.fi/blackbox/internets-wildest-man-arrested-after-caribbean-odyssey
#McAfee #arrested #caribbean
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
John McAfee, inventor of the virus scanner named after him and self-proclaimed US presidential candidate, has been temporarily arrested in the Dominican Republic for illegal possession of weapons.
A few days ago, McAfee posed with the weapons on Twitter, possibly providing the reason for the arrest.
Wednesday night he was released after three days and said he was leaving the country. He must leave his yacht behind.
Weapons, getaways, conspiracy theories, murder suspicions: John McAfee’s life is so exciting that Netflix made a series out of it - and Hollywood wanted to shoot a film of his life story with Johnny Depp in the leading role. Planned title: “Welcome to the Jungle”.
The eccentric IT entrepreneur is something like the mascot of the Internet. He has made millions with software, lost millions, staged himself as a renegade against everything and everyone, and claims that the CIA is after him. On photos he usually has a cigarette, a drink or a pump gun in his hand. On Twitter he entertains more than a million followers with his escapades. In recent days, another chapter has been added to the McAfee saga.
After an odyssey through the Caribbean, McAfee, his wife Janice and four other people, including a German citizen, were arrested in a port in the Dominican Republic. The country’s security forces confirmed Monday’s arrest, according to the AP news agency. Since Wednesday night, he has been at large again, as he announced on Twitter, garnished with photos in which he embraces grinning Dominican policemen.
👉🏼 Read the full (translated) story without ads n shit:
https://rwtxt.lelux.fi/blackbox/internets-wildest-man-arrested-after-caribbean-odyssey
#McAfee #arrested #caribbean
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Further study proves lie of “anonymous” data
Anonymous data is often not really anonymous at all, in many data records individuals can be uniquely identified even without a name. A new study illustrates the amazing precision with which this can be done. Many companies and databases undermine the basic data protection regulation.
Not everywhere where it says anonymous is also anonymous in it. This is made clear by a study in the scientific journal “Nature”. The researchers can identify 99.98 percent of Americans in each data set, with only 15 characteristics such as age, place of residence or nationality.
The scientists’ example: a cheap health insurance company sells customer data, but only “anonymously” and only from a fraction of the database. The study makes it clear: this is not true anonymity, the data is not secure. People are simply too unique to hide in databases. Removing names only makes records pseudonymous, not anonymous. With an online tool, anyone can trace the de-anonymization themselves.
The authors write that “even highly fragmented anonymized data records do not meet the modern anonymization standards of the Basic Data Protection Ordinance”. Their results question “the technical and legal adequacy” of simply deleting directly identifying data types and not worrying about identifiability using other data types.
Data is never completely anonymous
“The study once again shows very beautifully what we have known for a long time,” says data protection researcher Wolfie Christl to netzpolitik.org. “As long as data records relating to individuals are being processed, no form of anonymization can prevent individuals from being reidentified with complete certainty.
👉🏼 Read the full (translated) story without ads n shit:
https://rwtxt.lelux.fi/blackbox/further-study-proves-lie-of-anonymous-data
#study #data #anonymous #poc
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Anonymous data is often not really anonymous at all, in many data records individuals can be uniquely identified even without a name. A new study illustrates the amazing precision with which this can be done. Many companies and databases undermine the basic data protection regulation.
Not everywhere where it says anonymous is also anonymous in it. This is made clear by a study in the scientific journal “Nature”. The researchers can identify 99.98 percent of Americans in each data set, with only 15 characteristics such as age, place of residence or nationality.
The scientists’ example: a cheap health insurance company sells customer data, but only “anonymously” and only from a fraction of the database. The study makes it clear: this is not true anonymity, the data is not secure. People are simply too unique to hide in databases. Removing names only makes records pseudonymous, not anonymous. With an online tool, anyone can trace the de-anonymization themselves.
The authors write that “even highly fragmented anonymized data records do not meet the modern anonymization standards of the Basic Data Protection Ordinance”. Their results question “the technical and legal adequacy” of simply deleting directly identifying data types and not worrying about identifiability using other data types.
Data is never completely anonymous
“The study once again shows very beautifully what we have known for a long time,” says data protection researcher Wolfie Christl to netzpolitik.org. “As long as data records relating to individuals are being processed, no form of anonymization can prevent individuals from being reidentified with complete certainty.
👉🏼 Read the full (translated) story without ads n shit:
https://rwtxt.lelux.fi/blackbox/further-study-proves-lie-of-anonymous-data
#study #data #anonymous #poc
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Amazon Requires Police to Shill Surveillance Cameras in Secret Agreement
Amazon's home security company Ring has enlisted local police departments around the country to advertise its surveillance cameras in exchange for free Ring products and a “portal” that allows police to request footage from these cameras, a secret agreement obtained by Motherboard shows. The agreement also requires police to “keep the terms of this program confidential.”
Dozens of police departments around the country have partnered with Ring, but until now, the exact terms of these partnerships have remained unknown. A signed memorandum of understanding between Ring and the police department of Lakeland, Florida, and emails obtained via a public records request, show that Ring is using local police as a de facto advertising firm. Police are contractually required to "Engage the Lakeland community with outreach efforts on the platform to encourage adoption of the platform/app.”
In order to partner with Ring, police departments must also assign officers to Ring-specific roles that include a press coordinator, a social media manager, and a community relations coordinator.
Ring donated 15 free doorbell surveillance cameras to the Lakeland Police Department, and created a program to encourage people to download its “neighborhood watch” app, Neighbors. For every Lakeland resident that downloads Neighbors as a result of the partnership, the documents show, the Lakeland Police Department gets credit toward more free Ring cameras for residents: “Each qualifying download will count as $10 towards these free Ring cameras.” A Ring doorbell camera currently costs $130 on Amazon.
👉🏼 Read more:
https://outline.com/TvwejM
#DeleteAmazon #security #ring #surveillance #police #shill #secret #agreement #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Amazon's home security company Ring has enlisted local police departments around the country to advertise its surveillance cameras in exchange for free Ring products and a “portal” that allows police to request footage from these cameras, a secret agreement obtained by Motherboard shows. The agreement also requires police to “keep the terms of this program confidential.”
Dozens of police departments around the country have partnered with Ring, but until now, the exact terms of these partnerships have remained unknown. A signed memorandum of understanding between Ring and the police department of Lakeland, Florida, and emails obtained via a public records request, show that Ring is using local police as a de facto advertising firm. Police are contractually required to "Engage the Lakeland community with outreach efforts on the platform to encourage adoption of the platform/app.”
In order to partner with Ring, police departments must also assign officers to Ring-specific roles that include a press coordinator, a social media manager, and a community relations coordinator.
Ring donated 15 free doorbell surveillance cameras to the Lakeland Police Department, and created a program to encourage people to download its “neighborhood watch” app, Neighbors. For every Lakeland resident that downloads Neighbors as a result of the partnership, the documents show, the Lakeland Police Department gets credit toward more free Ring cameras for residents: “Each qualifying download will count as $10 towards these free Ring cameras.” A Ring doorbell camera currently costs $130 on Amazon.
👉🏼 Read more:
https://outline.com/TvwejM
#DeleteAmazon #security #ring #surveillance #police #shill #secret #agreement #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
US state of Louisiana proclaims state of emergency because of blackmail Trojan attack
The governor of the US state of Louisiana has declared a state of emergency after several school districts in his state were attacked by blackmail Trojans. After Colorado in February 2018, this is the second time a U.S. state has activated such laws.
https://gov.louisiana.gov/assets/EmergencyProclamations/115-JBE-2019-State-of-Emergency-Cybersecurity-Incident.pdf
#USA #louisiana #cybersecurity #StateOfEmergency
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The governor of the US state of Louisiana has declared a state of emergency after several school districts in his state were attacked by blackmail Trojans. After Colorado in February 2018, this is the second time a U.S. state has activated such laws.
https://gov.louisiana.gov/assets/EmergencyProclamations/115-JBE-2019-State-of-Emergency-Cybersecurity-Incident.pdf
#USA #louisiana #cybersecurity #StateOfEmergency
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Ad Tool Facebook Built to Fight Disinformation Doesn’t Work as Advertised
The social network’s new ad library is so flawed, researchers say, that it is effectively useless as a way to track political messaging.
Faced with a rising backlash over the spread of disinformation in the aftermath of the 2016 elections, Facebook last year came up with a seemingly straightforward solution: It created an online library of all the advertisements on the social network.
Transparency, it decided, was the best disinfectant.
Ads would stay in the library for seven years, letting ordinary users see who was pushing what messages and how much they were paying to do it. Facebook gave researchers and journalists deeper access, allowing them to extract information directly from the library so they could create their own databases and tools to analyze the ads — and ferret out disinformation that had slipped past the social network’s safeguards.
“We know we can’t protect elections alone,” Facebook said when it unveiled the latest version of its Ad Library in March. “We’re committed to creating a new standard of transparency and authenticity for advertising.”
But instead of setting a new standard, Facebook appears to have fallen short. While ordinary users can look up individual ads without a problem, access to the library’s data is so plagued by bugs and technical constraints that it is effectively useless as a way to comprehensively track political advertising, according to independent researchers and two previously unreported studies on the archive’s reliability, one by the French government and the other by researchers at Mozilla, the maker of the Firefox web browser.
👉🏼 Read the full story without ads n shit:
https://rwtxt.lelux.fi/blackbox/ad-tool-facebook-built-to-fight-disinformation-doesnt-work-as-advertised
#DeleteFacebook #disinformation #researchers #Transparency
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The social network’s new ad library is so flawed, researchers say, that it is effectively useless as a way to track political messaging.
Faced with a rising backlash over the spread of disinformation in the aftermath of the 2016 elections, Facebook last year came up with a seemingly straightforward solution: It created an online library of all the advertisements on the social network.
Transparency, it decided, was the best disinfectant.
Ads would stay in the library for seven years, letting ordinary users see who was pushing what messages and how much they were paying to do it. Facebook gave researchers and journalists deeper access, allowing them to extract information directly from the library so they could create their own databases and tools to analyze the ads — and ferret out disinformation that had slipped past the social network’s safeguards.
“We know we can’t protect elections alone,” Facebook said when it unveiled the latest version of its Ad Library in March. “We’re committed to creating a new standard of transparency and authenticity for advertising.”
But instead of setting a new standard, Facebook appears to have fallen short. While ordinary users can look up individual ads without a problem, access to the library’s data is so plagued by bugs and technical constraints that it is effectively useless as a way to comprehensively track political advertising, according to independent researchers and two previously unreported studies on the archive’s reliability, one by the French government and the other by researchers at Mozilla, the maker of the Firefox web browser.
👉🏼 Read the full story without ads n shit:
https://rwtxt.lelux.fi/blackbox/ad-tool-facebook-built-to-fight-disinformation-doesnt-work-as-advertised
#DeleteFacebook #disinformation #researchers #Transparency
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
US Congress: Election systems attacked in all 50 states
In the US presidential election, hackers attacked digital election infrastructure in all 50 states. This is the result of an investigation by the US Congress. MEPs warn against incalculable risks, even without manipulated votes.
Read the Senate Intelligence Committee’s report: ‘Russian Efforts Against Election Infrastructure,’ (volume one)
https://games-cdn.washingtonpost.com/notes/prod/default/documents/6d6ee989-d0bf-4d7c-a158-a979c74bad3e/note/fe8e288b-e6fe-45ee-8a8b-c5ec463f293f.pdf
#USA #congress #hackers #russia #attack #election #votes #manipulation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
In the US presidential election, hackers attacked digital election infrastructure in all 50 states. This is the result of an investigation by the US Congress. MEPs warn against incalculable risks, even without manipulated votes.
Read the Senate Intelligence Committee’s report: ‘Russian Efforts Against Election Infrastructure,’ (volume one)
https://games-cdn.washingtonpost.com/notes/prod/default/documents/6d6ee989-d0bf-4d7c-a158-a979c74bad3e/note/fe8e288b-e6fe-45ee-8a8b-c5ec463f293f.pdf
#USA #congress #hackers #russia #attack #election #votes #manipulation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Tell us if traceability is technically possible: Madras HC to WhatsApp and IIT Madras professor
India has had a problem with WhatsApp rumours and lies for some time now. Therefore, a court demanded that the number of the original channel be displayed next to a forwarded message. Experts should now clarify how this would be technically possible.
On July 24, Court No. 3 of the Madras High Court was packed with barely any standing room. As item no. 14 drew closer on the roster, more people jammed in. That’s because some of the biggest names in Indian legal fraternity had combined forced to make a case against implementing traceability in WhatsApp as the case examined ways in which cybercrime might be curbed with the assistance of social media companies.
Senior Advocates Kapil Sibal and Arvind Datar defended WhatsApp, as former Attorney General of India, Mukul Rohatgi, represented Facebook. The hearing began at 12:20 pm and went on for almost an hour. It saw representation from the government of Tamil Nadu (E. Manoharan), Twitter (Senior Advocate Sajan Poovayya), and Google (Senior Advocate P. S. Raman). Senior Advocate N. L. Rajah, who had represented WhatsApp in the last hearing, was also present. Internet Freedom Foundation, which had been made an intervener in the last hearing on June 27, was represented by Suhrith Parthasarathy. IFF’s executive director, Apar Gupta, was also present.
If this litany of names wasn’t enough, the presence of Brian Hennessey, the director and associate general counsel of WhatsApp, drove home the point that WhatsApp Inc. is paying particular attention to this case.
👉🏼 Read the full story without ads n shit:
https://rwtxt.lelux.fi/blackbox/tell-us-if-traceability-is-technically-possible-madras-hc-to-whatsapp-and-iit-madras-professor
#DeleteWhatsapp #tracing #india
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
India has had a problem with WhatsApp rumours and lies for some time now. Therefore, a court demanded that the number of the original channel be displayed next to a forwarded message. Experts should now clarify how this would be technically possible.
On July 24, Court No. 3 of the Madras High Court was packed with barely any standing room. As item no. 14 drew closer on the roster, more people jammed in. That’s because some of the biggest names in Indian legal fraternity had combined forced to make a case against implementing traceability in WhatsApp as the case examined ways in which cybercrime might be curbed with the assistance of social media companies.
Senior Advocates Kapil Sibal and Arvind Datar defended WhatsApp, as former Attorney General of India, Mukul Rohatgi, represented Facebook. The hearing began at 12:20 pm and went on for almost an hour. It saw representation from the government of Tamil Nadu (E. Manoharan), Twitter (Senior Advocate Sajan Poovayya), and Google (Senior Advocate P. S. Raman). Senior Advocate N. L. Rajah, who had represented WhatsApp in the last hearing, was also present. Internet Freedom Foundation, which had been made an intervener in the last hearing on June 27, was represented by Suhrith Parthasarathy. IFF’s executive director, Apar Gupta, was also present.
If this litany of names wasn’t enough, the presence of Brian Hennessey, the director and associate general counsel of WhatsApp, drove home the point that WhatsApp Inc. is paying particular attention to this case.
👉🏼 Read the full story without ads n shit:
https://rwtxt.lelux.fi/blackbox/tell-us-if-traceability-is-technically-possible-madras-hc-to-whatsapp-and-iit-madras-professor
#DeleteWhatsapp #tracing #india
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
🇪🇸 El anonimato va camino de desaparecer.
Con solo 15 atributos demográficos es posible identificar a cada uno de los ciudadanos de Estados Unidos.
Hasta ahora nos identificaba nuestro nombre, un número de DNI, un número de teléfono, una dirección postal o de email. Bastaba con ocultar estos detalles en una base de datos para que no pudiera vincularse una serie de informaciones con su propietario. Ya no.
El reguero de datos que dejamos más la capacidad de almacenarlos y tratarlos hacen que sea cada vez más sencillo identificarnos individualmente a partir de lo que hacemos o somos. El anonimato ya no depende de que alguien averigüe nuestro nombre o teléfono. Ahora nuestro comportamiento o identidad puede desanonimizarnos.
Las oficinas de censo, hospitales o empresas comparten muestras anonimizadas de sus inmensas bases de datos por transparencia o para estudios y comprobaciones. El pequeño tamaño de la muestra hacía difícil que esa información acabara vinculándose a un individuo.
Un nuevo estudio publicado por Nature Communications determina que esa incertidumbre es cuantificable. Y puede eliminarse. La coincidencia de unos datos no tenía por qué implicar que era exactamente esa persona. Con 15 atributos es suficiente para distinguir a cada uno de los estadounidenses, sea cual sea el tamaño de la muestra. "Aunque puede haber mucha gente que tiene 30 y pico años, es hombre, vive en Nueva York, muchos menos nacieron un 5 de enero de 1985, conducen un deportivo rojo y viven con dos niñas y un perro", dice Yves-Alexandre de Montjoye, profesor del Imperial College de Londres y uno de los autores de la investigación.
Los factores decisivos no son siempre los mismos o en la misma medida: a veces es el estado civil y otra la raza o cualquier otro. Pero solo tomando 15 factores el modelo es capaz de certificar con una probabilidad del 99,98% que la persona que buscamos es un perfil único entre una enorme base de datos.
Para encontrar a ese individuo hay que conocerlo o tener acceso obviamente a otra base de datos que nos dé parte de la información equivalente para cotejar. Parece difícil, pero la cantidad de combinaciones que pueden darse es cada vez mayor. La información sobre nosotros que puede encontrarse públicamente es cada día mayor.
A lo largo de la última década, los investigadores han encontrado que puede desanonimizarse con multitud de variables si el número de datos es suficiente: uso de redes sociales, datos genéticos, localización, gasto de tarjeta de crédito, historial de navegación, estilo de escritura, código informático.
El presidente Donald Trump ha sido una víctima reciente de la posibilidad de vincular información obtenida por ahí con muestras públicas de bases de datos. El New York Times publicó hace unos meses unos artículos de investigación sobre la declaración de renta del presidente. El periódico logró desanonimizar información fiscal de Trump en una lista de los contribuyentes más ricos del país a partir de unos datos que les había pasado una fuente: "El Times fue capaz de encontrar datos coincidentes en la información fiscal de los mayores contribuyentes (una base de datos disponible públicamente que cada año incluye una muestra de un tercio de esos contribuyentes, con los datos identificativos suprimidos)", dice el periódico.
"Los ataques solo van a mejorar", dice Arvind Narayanan, profesor de la Universidad de Princeton y autor del estudio que demostró que en una base de datos de 2006 solo con la información de evaluación de películas de medio millón de suscriptores de Netflix era posible identificar a individuos. Es decir, la capacidad de vincular nuestro pasado con información de bases de datos anónimas pero públicas solo va a mejorar.
"Nuestra recomendación", añade Narayanan, "es que la carga de la prueba recaiga en el controlador de los datos para que demuestre fehacientemente que los datos anónimos no pueden ser ligados a individuos, en lugar de que sean los defensores de la privacidad los que deban probar que esa relación es posible."
Con solo 15 atributos demográficos es posible identificar a cada uno de los ciudadanos de Estados Unidos.
Hasta ahora nos identificaba nuestro nombre, un número de DNI, un número de teléfono, una dirección postal o de email. Bastaba con ocultar estos detalles en una base de datos para que no pudiera vincularse una serie de informaciones con su propietario. Ya no.
El reguero de datos que dejamos más la capacidad de almacenarlos y tratarlos hacen que sea cada vez más sencillo identificarnos individualmente a partir de lo que hacemos o somos. El anonimato ya no depende de que alguien averigüe nuestro nombre o teléfono. Ahora nuestro comportamiento o identidad puede desanonimizarnos.
Las oficinas de censo, hospitales o empresas comparten muestras anonimizadas de sus inmensas bases de datos por transparencia o para estudios y comprobaciones. El pequeño tamaño de la muestra hacía difícil que esa información acabara vinculándose a un individuo.
Un nuevo estudio publicado por Nature Communications determina que esa incertidumbre es cuantificable. Y puede eliminarse. La coincidencia de unos datos no tenía por qué implicar que era exactamente esa persona. Con 15 atributos es suficiente para distinguir a cada uno de los estadounidenses, sea cual sea el tamaño de la muestra. "Aunque puede haber mucha gente que tiene 30 y pico años, es hombre, vive en Nueva York, muchos menos nacieron un 5 de enero de 1985, conducen un deportivo rojo y viven con dos niñas y un perro", dice Yves-Alexandre de Montjoye, profesor del Imperial College de Londres y uno de los autores de la investigación.
Los factores decisivos no son siempre los mismos o en la misma medida: a veces es el estado civil y otra la raza o cualquier otro. Pero solo tomando 15 factores el modelo es capaz de certificar con una probabilidad del 99,98% que la persona que buscamos es un perfil único entre una enorme base de datos.
Para encontrar a ese individuo hay que conocerlo o tener acceso obviamente a otra base de datos que nos dé parte de la información equivalente para cotejar. Parece difícil, pero la cantidad de combinaciones que pueden darse es cada vez mayor. La información sobre nosotros que puede encontrarse públicamente es cada día mayor.
A lo largo de la última década, los investigadores han encontrado que puede desanonimizarse con multitud de variables si el número de datos es suficiente: uso de redes sociales, datos genéticos, localización, gasto de tarjeta de crédito, historial de navegación, estilo de escritura, código informático.
El presidente Donald Trump ha sido una víctima reciente de la posibilidad de vincular información obtenida por ahí con muestras públicas de bases de datos. El New York Times publicó hace unos meses unos artículos de investigación sobre la declaración de renta del presidente. El periódico logró desanonimizar información fiscal de Trump en una lista de los contribuyentes más ricos del país a partir de unos datos que les había pasado una fuente: "El Times fue capaz de encontrar datos coincidentes en la información fiscal de los mayores contribuyentes (una base de datos disponible públicamente que cada año incluye una muestra de un tercio de esos contribuyentes, con los datos identificativos suprimidos)", dice el periódico.
"Los ataques solo van a mejorar", dice Arvind Narayanan, profesor de la Universidad de Princeton y autor del estudio que demostró que en una base de datos de 2006 solo con la información de evaluación de películas de medio millón de suscriptores de Netflix era posible identificar a individuos. Es decir, la capacidad de vincular nuestro pasado con información de bases de datos anónimas pero públicas solo va a mejorar.
"Nuestra recomendación", añade Narayanan, "es que la carga de la prueba recaiga en el controlador de los datos para que demuestre fehacientemente que los datos anónimos no pueden ser ligados a individuos, en lugar de que sean los defensores de la privacidad los que deban probar que esa relación es posible."
Los métodos deberán ser otros. El uso de grandes bases de datos ayuda a entender una enfermedad, la movilidad en una ciudad u otros comportamientos humanos. Esta labor deberá seguir haciéndose, pero será cada día más difícil. Los organismos o empresas que compartan o pierdan parte de sus bases de datos anonimizadas se creían invulnerables al no estar vinculadas a información personal. Cada vez más sin embargo lo que hacemos queda registrado y es información personal, esté o no ligada a un nombre o identificador único.
"Necesitamos estándares más altos para lo que constituyan datos anónimos legalmente y empezar a usar herramientas de ingeniería que permitan usar datos que logren preservar la privacidad de la gente", dice De Montjoye.
Este tipo de estudios deben tenerse en cuenta cuando las grandes tecnológicas dicen que no vinculan información personal con nuestros "datos". Para desanonimizar a alguien, ya no hace falta el carné de identidad.
https://elpais.com/tecnologia/2019/07/24/actualidad/1563927638_772353.html
#privacidad #anonimato #rastreo
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
"Necesitamos estándares más altos para lo que constituyan datos anónimos legalmente y empezar a usar herramientas de ingeniería que permitan usar datos que logren preservar la privacidad de la gente", dice De Montjoye.
Este tipo de estudios deben tenerse en cuenta cuando las grandes tecnológicas dicen que no vinculan información personal con nuestros "datos". Para desanonimizar a alguien, ya no hace falta el carné de identidad.
https://elpais.com/tecnologia/2019/07/24/actualidad/1563927638_772353.html
#privacidad #anonimato #rastreo
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
El País
El anonimato va camino de desaparecer
Con solo 15 atributos demográficos es posible identificar a cada uno de los ciudadanos de Estados Unidos
Media is too big
VIEW IN TELEGRAM
Hong Kong police storm Yuen Long MTR station - 11 arrests, 23 injured at banned anti-triad demo
At least 23 people were injured and 11 were arrested following police-protester clashes during a banned anti-mob violence protest in Yuen Long on Saturday.
Among those hospitalised, two people were in a severe condition as of 1am Sunday, with 11 in a stable condition. Ten were discharged. At least four police officers and two journalists were also hurt as the violence escalated into the evening.
📺 https://www.hongkongfp.com/2019/07/28/video-11-arrests-23-injured-banned-anti-triad-demo-hong-kong-police-storm-yuen-long-mtr-station/
#FreeHongKong #freespeach #humanrights #demos #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
At least 23 people were injured and 11 were arrested following police-protester clashes during a banned anti-mob violence protest in Yuen Long on Saturday.
Among those hospitalised, two people were in a severe condition as of 1am Sunday, with 11 in a stable condition. Ten were discharged. At least four police officers and two journalists were also hurt as the violence escalated into the evening.
📺 https://www.hongkongfp.com/2019/07/28/video-11-arrests-23-injured-banned-anti-triad-demo-hong-kong-police-storm-yuen-long-mtr-station/
#FreeHongKong #freespeach #humanrights #demos #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
IP Freely (Screw YouTube)
In this clip from Episode 360 of The Corbett Report podcast, James debuts his blockbuster online protest song, “IP Freely (Screw YouTube),” featuring the #YouTube thoughtcrime chord: the Dsus2!
📺 https://www.corbettreport.com/ip-freely-screw-youtube/
#ScrewYouTube #corbettreport #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
In this clip from Episode 360 of The Corbett Report podcast, James debuts his blockbuster online protest song, “IP Freely (Screw YouTube),” featuring the #YouTube thoughtcrime chord: the Dsus2!
📺 https://www.corbettreport.com/ip-freely-screw-youtube/
#ScrewYouTube #corbettreport #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Home Affairs pushes for cyber spy powers
The Department of Home Affairs is pushing ahead with moves to expand the powers of Australia’s cyber spy agency, the Australian Signals Directorate, to potentially embed ASD within the corporate computer systems that run the nation’s banks, telecommunications and other critical infrastructure.
https://www.thesaturdaypaper.com.au/news/politics/2019/07/27/home-affairs-pushes-cyber-spy-powers/15641496008501
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The Department of Home Affairs is pushing ahead with moves to expand the powers of Australia’s cyber spy agency, the Australian Signals Directorate, to potentially embed ASD within the corporate computer systems that run the nation’s banks, telecommunications and other critical infrastructure.
https://www.thesaturdaypaper.com.au/news/politics/2019/07/27/home-affairs-pushes-cyber-spy-powers/15641496008501
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
YouTuber and IG Metall set YouTube deadline for negotiations
The FairTube campaign demands transparency, independent arbitration and a codetermination for YouTuber. The campaign is backed by YouTubers Union and the IG Metall trade union. If the company has not started negotiations in a month, FairTube wants to sue it for bogus self-employment and DSGVO violations.
📺 🇬🇧 https://www.youtube.com/watch?v=oZZ5Kouj_hQ
📺 🇩🇪 https://www.youtube.com/watch?v=f6ZBfOIerR4v%3DoZZ5Kouj_hQ
#Youtube #FairTube #IGmetall #negotiations #DSGVO
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The FairTube campaign demands transparency, independent arbitration and a codetermination for YouTuber. The campaign is backed by YouTubers Union and the IG Metall trade union. If the company has not started negotiations in a month, FairTube wants to sue it for bogus self-employment and DSGVO violations.
📺 🇬🇧 https://www.youtube.com/watch?v=oZZ5Kouj_hQ
📺 🇩🇪 https://www.youtube.com/watch?v=f6ZBfOIerR4v%3DoZZ5Kouj_hQ
#Youtube #FairTube #IGmetall #negotiations #DSGVO
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
ProtonMail: Secret adjustments to the transparency report
ProtonMail is one of the few Internet companies in Switzerland with a transparency report. The transparency that such a report can create is intended to create trust.
Thanks in part to this transparency report, it became known that real-time monitoring is also possible for ProtonMail.
The ProtonMail Transparency Report, however, has the flaw that it has been adapted considerably over the last few weeks in silence and secrecy.
According to the information in the transparency report, the last adjustment was made on 24 April 2019 (“Updated on 24 April 2019”).
But if you compare the versions that the Internet Archive Wayback machine had saved on April 25 and July 26, 2019 (screenshot), you can see several adjustments, among others:
👉🏼 Read the full (translated) report without ads n shit:
https://rwtxt.lelux.fi/blackbox/protonmail-secret-adjustments-to-the-transparency-report
#ProtonMail #Switzerland #transparency #report
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
ProtonMail is one of the few Internet companies in Switzerland with a transparency report. The transparency that such a report can create is intended to create trust.
Thanks in part to this transparency report, it became known that real-time monitoring is also possible for ProtonMail.
The ProtonMail Transparency Report, however, has the flaw that it has been adapted considerably over the last few weeks in silence and secrecy.
According to the information in the transparency report, the last adjustment was made on 24 April 2019 (“Updated on 24 April 2019”).
But if you compare the versions that the Internet Archive Wayback machine had saved on April 25 and July 26, 2019 (screenshot), you can see several adjustments, among others:
👉🏼 Read the full (translated) report without ads n shit:
https://rwtxt.lelux.fi/blackbox/protonmail-secret-adjustments-to-the-transparency-report
#ProtonMail #Switzerland #transparency #report
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Kazakhstan's HTTPS Interception
This post describes our analysis of carrier-level HTTPS interception ordered by the government of Kazakhstan.
The Kazakhstan government recently began using a fake root CA to perform a man-in-the-middle (MitM) attack against HTTPS connections to websites including Facebook, Twitter, and Google. We have been tracking the attack, and in this post, we provide preliminary results from our ongoing research and new technical details about the Kazakh interception system.
👉🏼 Read more:
https://censoredplanet.org/kazakhstan
#kazakhstan #HTTPS #interception #websites #MitM #tracking #attack #research #analysis #facebook #twitter #google
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
This post describes our analysis of carrier-level HTTPS interception ordered by the government of Kazakhstan.
The Kazakhstan government recently began using a fake root CA to perform a man-in-the-middle (MitM) attack against HTTPS connections to websites including Facebook, Twitter, and Google. We have been tracking the attack, and in this post, we provide preliminary results from our ongoing research and new technical details about the Kazakh interception system.
👉🏼 Read more:
https://censoredplanet.org/kazakhstan
#kazakhstan #HTTPS #interception #websites #MitM #tracking #attack #research #analysis #facebook #twitter #google
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Facebook is funding brain experiments to create a device that reads your mind
Big tech firms are trying to read people’s thoughts, and no one’s ready for the consequences.
In 2017, Facebook announced that it wanted to create a headband that would let people type at a speed of 100 words per minute, just by thinking.
Now, a little over two years later, the social-media giant is revealing that it has been financing extensive university research on human volunteers.
Today, some of that research was described in a scientific paper from the University of California, San Francisco, where researchers have been developing “speech decoders” able to determine what people are trying to say by analyzing their brain signals.
The research is important because it could help show whether a wearable brain-control device is feasible and because it is an early example of a giant tech company being involved in getting hold of data directly from people’s minds.
To some neuro-ethicists, that means we are going to need some rules, and fast, about how brain data is collected, stored, and used.
In the report published today in Nature Communications, UCSF researchers led by neuroscientist Edward Chang used sheets of electrodes, called ECoG arrays, that were placed directly on the brains of volunteers.
The scientists were able to listen in in real time as three subjects heard questions read from a list and spoke simple answers. One question was “From 0 to 10, how much pain are you in?” The system was able to detect both the question and the response of 0 to 10 far better than chance.
Another question asked was which musical instrument they preferred, and the volunteers were able to answer “piano” and “violin.” The volunteers were undergoing brain surgery for epilepsy.
Facebook says the research project is ongoing, and that is it now funding UCSF in efforts to try to restore the ability to communicate to a disabled person with a speech impairment.
Eventually, Facebook wants to create a wearable headset that lets users control music or interact in virtual reality using their thoughts.
To that end, Facebook has also been funding work on systems that listen in on the brain from outside the skull, using fiber optics or lasers to measure changes in blood flow, similar to an MRI machine.
Such blood-flow patterns represent only a small part of what’s going on in the brain, but they could be enough to distinguish between a limited set of commands.
👉🏼 Read more:
https://www.technologyreview.com/s/614034/facebook-is-funding-brain-experiments-to-create-a-device-that-reads-your-mind/
💡 Also intresting:
https://www.ucsf.edu/news/2019/07/415046/team-ids-spoken-words-and-phrases-real-time-brains-speech-signals
#DeleteFacebook #experiments #brain #SpeechSignals #BigTech #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Big tech firms are trying to read people’s thoughts, and no one’s ready for the consequences.
In 2017, Facebook announced that it wanted to create a headband that would let people type at a speed of 100 words per minute, just by thinking.
Now, a little over two years later, the social-media giant is revealing that it has been financing extensive university research on human volunteers.
Today, some of that research was described in a scientific paper from the University of California, San Francisco, where researchers have been developing “speech decoders” able to determine what people are trying to say by analyzing their brain signals.
The research is important because it could help show whether a wearable brain-control device is feasible and because it is an early example of a giant tech company being involved in getting hold of data directly from people’s minds.
To some neuro-ethicists, that means we are going to need some rules, and fast, about how brain data is collected, stored, and used.
In the report published today in Nature Communications, UCSF researchers led by neuroscientist Edward Chang used sheets of electrodes, called ECoG arrays, that were placed directly on the brains of volunteers.
The scientists were able to listen in in real time as three subjects heard questions read from a list and spoke simple answers. One question was “From 0 to 10, how much pain are you in?” The system was able to detect both the question and the response of 0 to 10 far better than chance.
Another question asked was which musical instrument they preferred, and the volunteers were able to answer “piano” and “violin.” The volunteers were undergoing brain surgery for epilepsy.
Facebook says the research project is ongoing, and that is it now funding UCSF in efforts to try to restore the ability to communicate to a disabled person with a speech impairment.
Eventually, Facebook wants to create a wearable headset that lets users control music or interact in virtual reality using their thoughts.
To that end, Facebook has also been funding work on systems that listen in on the brain from outside the skull, using fiber optics or lasers to measure changes in blood flow, similar to an MRI machine.
Such blood-flow patterns represent only a small part of what’s going on in the brain, but they could be enough to distinguish between a limited set of commands.
👉🏼 Read more:
https://www.technologyreview.com/s/614034/facebook-is-funding-brain-experiments-to-create-a-device-that-reads-your-mind/
💡 Also intresting:
https://www.ucsf.edu/news/2019/07/415046/team-ids-spoken-words-and-phrases-real-time-brains-speech-signals
#DeleteFacebook #experiments #brain #SpeechSignals #BigTech #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
🇪🇸 Multas millonarias en protección de datos para British Airways y Marriott…y estas son solo las primeras.
Las agencias quieren que las sanciones tengan un efecto disuasorio e impondrán multas que estén ligadas al volumen de facturación de la compañía.
Poco más de 1 año después de la entrada en vigor de la nueva regulación sobre protección de datos en Europa, hemos visto como la agencia de protección de datos inglesa, la Oficina del Comisionado de Información de Reino Unido (ICO) ha anunciado su intención de imponer las primeras multas millonarias en Europa: 203 millones de euros a British Airways y 110 millones de euros para Marriott.
Pero, ¿qué es lo que la ICO ha tenido en consideración para proponer este importe de sanciones a los que no estamos nada acostumbrados? En ambos casos, las propuestas de sanciones se impondrían como consecuencia de una brecha de seguridad y en ambos casos la ICO ha valorado, multitud de factores, siendo probablemente el más relevante, la existencia de fallos en las medidas de seguridad.
Si la empresa no tiene implementadas las medidas de seguridad necesarias para proteger los datos personales, las sanciones van a ser muy elevadas. Es cierto que la sofisticación de los ciberataques es cada vez mayor y que no existe ninguna medida de seguridad 100 % infalible, no obstante, lo que los reguladores van a tener en consideración en este tipo de casos es si las empresas se lo han puesto fácil a los atacantes porque no tenían implementadas las medidas adecuadas.
Y ambas multas son prueba de ello. En el caso de British Airways la ICO ha manifestado que la aerolínea no cumplía con los estándares básicos de seguridad que hay que aplicar cuando se trata información de pagos con tarjetas (PCI) y no tenía encriptados los códigos de seguridad (CVV) de las tarjetas de crédito.
Qué tipo de información se ve afectada por la brecha y las consecuencias que pueden derivarse para los usuarios es otro factor a tener en consideración en este tipo de investigaciones. Las consecuencias no son las mismas si los datos afectados son, por ejemplo, direcciones de email, que si además, como es el caso de British Airways, los atacantes tienen acceso a datos financieros como números de tarjetas de crédito que pueden fácilmente ser usados con fines fraudulentos.
No obstante, la ICO no tiene en consideración si ese uso fraudulento se ha producido o no, dado que como indica su directora, Elizabeth Denham, en una entrevista publicada por el Wall Street Journal, pueden transcurrir bastantes años desde que se produce la brecha hasta que los datos se utilizan con estos fines, como fue el caso de Yahoo! (la brecha se produjo en 2014 y el uso fraudulento se detectó 3 años más tarde).
El número de afectados también es otro criterio a tener en cuenta, en el caso de British Airways estamos hablando de 500.000 clientes , pero en el caso de Marriott se cree que la brecha afectó a la información de alrededor de 500.000.000 de clientes. La duración de la brecha, esto es, el tiempo durante el cual los hackers han podido acceder a la información hasta que se descubre la brecha es otro criterio a valorar; en el caso de Bristirh Airways fueron dos semanas mientras que en el de Marriott fueron 4 años.
En el caso de Marriott, la ICO también ha tenido en consideración las medidas que se adoptaron el momento de la adquisición de la cadena Starwood.
Las agencias quieren que las sanciones tengan un efecto disuasorio e impondrán multas que estén ligadas al volumen de facturación de la compañía.
Poco más de 1 año después de la entrada en vigor de la nueva regulación sobre protección de datos en Europa, hemos visto como la agencia de protección de datos inglesa, la Oficina del Comisionado de Información de Reino Unido (ICO) ha anunciado su intención de imponer las primeras multas millonarias en Europa: 203 millones de euros a British Airways y 110 millones de euros para Marriott.
Pero, ¿qué es lo que la ICO ha tenido en consideración para proponer este importe de sanciones a los que no estamos nada acostumbrados? En ambos casos, las propuestas de sanciones se impondrían como consecuencia de una brecha de seguridad y en ambos casos la ICO ha valorado, multitud de factores, siendo probablemente el más relevante, la existencia de fallos en las medidas de seguridad.
Si la empresa no tiene implementadas las medidas de seguridad necesarias para proteger los datos personales, las sanciones van a ser muy elevadas. Es cierto que la sofisticación de los ciberataques es cada vez mayor y que no existe ninguna medida de seguridad 100 % infalible, no obstante, lo que los reguladores van a tener en consideración en este tipo de casos es si las empresas se lo han puesto fácil a los atacantes porque no tenían implementadas las medidas adecuadas.
Y ambas multas son prueba de ello. En el caso de British Airways la ICO ha manifestado que la aerolínea no cumplía con los estándares básicos de seguridad que hay que aplicar cuando se trata información de pagos con tarjetas (PCI) y no tenía encriptados los códigos de seguridad (CVV) de las tarjetas de crédito.
Qué tipo de información se ve afectada por la brecha y las consecuencias que pueden derivarse para los usuarios es otro factor a tener en consideración en este tipo de investigaciones. Las consecuencias no son las mismas si los datos afectados son, por ejemplo, direcciones de email, que si además, como es el caso de British Airways, los atacantes tienen acceso a datos financieros como números de tarjetas de crédito que pueden fácilmente ser usados con fines fraudulentos.
No obstante, la ICO no tiene en consideración si ese uso fraudulento se ha producido o no, dado que como indica su directora, Elizabeth Denham, en una entrevista publicada por el Wall Street Journal, pueden transcurrir bastantes años desde que se produce la brecha hasta que los datos se utilizan con estos fines, como fue el caso de Yahoo! (la brecha se produjo en 2014 y el uso fraudulento se detectó 3 años más tarde).
El número de afectados también es otro criterio a tener en cuenta, en el caso de British Airways estamos hablando de 500.000 clientes , pero en el caso de Marriott se cree que la brecha afectó a la información de alrededor de 500.000.000 de clientes. La duración de la brecha, esto es, el tiempo durante el cual los hackers han podido acceder a la información hasta que se descubre la brecha es otro criterio a valorar; en el caso de Bristirh Airways fueron dos semanas mientras que en el de Marriott fueron 4 años.
En el caso de Marriott, la ICO también ha tenido en consideración las medidas que se adoptaron el momento de la adquisición de la cadena Starwood.
Y, obviamente, el tamaño de la empresa es lo que define el importe de la sanción; se asume que cuanto mayor sea el tamaño de la empresa, esta debe tener más medios dedicados a proteger los datos personales de sus clientes o empleados. No se le puede exigir lo mismo a una PYME que a una multinacional.
Pero además, las agencias de protección de datos quieren que las sanciones tengan un efecto disuasorio y para conseguir ese fin tienen que imponer multas que estén ligadas al volumen de facturación de la compañía, cosa que permite la nueva regulación de protección de datos. Así, mientras que bajo la anterior regulación la ICO solo pudo imponer a Facebook una multa de 500.000 Libras, que era la máxima permitida en aquel momento, por el escándalo de Cambridge Analytica, ahora, la nueva regulación le da la posibilidad de imponer una sanción a British Airways que representa el 1,5 % de su volumen de facturación anual en 2017. Claramente, el grado de persuasión de este tipo de sanciones es mayor.
La Agencia Española de Protección de Datos sancionó a la Liga de Fútbol Profesional con 250.000 euros recientemente y la directora de la ICO, en la mencionada entrevista, anunciaba que se van a imponer más multas a otras empresas este verano por parte del organismo que dirige, así que parece que vienen curvas y que British Airways y Marriott son solo los primeros de una larga lista de sanciones millonarias.
https://cincodias.elpais.com/cincodias/2019/07/29/legal/1564410687_469515.html
#multas #privacidad #seguridad
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Pero además, las agencias de protección de datos quieren que las sanciones tengan un efecto disuasorio y para conseguir ese fin tienen que imponer multas que estén ligadas al volumen de facturación de la compañía, cosa que permite la nueva regulación de protección de datos. Así, mientras que bajo la anterior regulación la ICO solo pudo imponer a Facebook una multa de 500.000 Libras, que era la máxima permitida en aquel momento, por el escándalo de Cambridge Analytica, ahora, la nueva regulación le da la posibilidad de imponer una sanción a British Airways que representa el 1,5 % de su volumen de facturación anual en 2017. Claramente, el grado de persuasión de este tipo de sanciones es mayor.
La Agencia Española de Protección de Datos sancionó a la Liga de Fútbol Profesional con 250.000 euros recientemente y la directora de la ICO, en la mencionada entrevista, anunciaba que se van a imponer más multas a otras empresas este verano por parte del organismo que dirige, así que parece que vienen curvas y que British Airways y Marriott son solo los primeros de una larga lista de sanciones millonarias.
https://cincodias.elpais.com/cincodias/2019/07/29/legal/1564410687_469515.html
#multas #privacidad #seguridad
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Cinco Días
Multas millonarias en protección de datos para British Airways y Marriott…y estas son solo las primeras
Las agencias quieren que las sanciones tengan un efecto disuasorio e impondrán multas que estén ligadas al volumen de facturación de la compañía
Pentagon testing mass surveillance balloons across the US
The US military is conducting wide-area surveillance tests across six midwest states using experimental high-altitude balloons, documents filed with the Federal Communications Commission (FCC) reveal.
Up to 25 unmanned solar-powered balloons are being launched from rural South Dakota and drifting 250 miles through an area spanning portions of Minnesota, Iowa, Wisconsin and Missouri, before concluding in central Illinois.
Travelling in the stratosphere at altitudes of up to 65,000ft, the balloons are intended to “provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats”, according to a filing made on behalf of the Sierra Nevada Corporation, an aerospace and defence company.
The balloons are carrying hi-tech radars designed to simultaneously track many individual vehicles day or night, through any kind of weather. The tests, which have not previously been reported, received an FCC license to operate from mid-July until September, following similar flights licensed last year.
Arthur Holland Michel, the co-director of the Center for the Study of the Drone at Bard College in New York, said, “What this new technology proposes is to watch everything at once. Sometimes it’s referred to as ‘combat TiVo’ because when an event happens somewhere in the surveilled area, you can potentially rewind the tape to see exactly what occurred, and rewind even further to see who was involved and where they came from.”
The tests have been commissioned by the US Southern Command (Southcom), which is responsible for disaster response, intelligence operations and security cooperation in the Caribbean and Central and South America. Southcom is a joint effort by the US army, navy, air force and other forces, and one of its key roles is identifying and intercepting drug shipments headed for the United States.
“We do not think that American cities should be subject to wide-area surveillance in which every vehicle could be tracked wherever they go,” said Jay Stanley, a senior policy analyst at the American Civil Liberties Union.
“Even in tests, they’re still collecting a lot of data on Americans: who’s driving to the union house, the church, the mosque, the Alzheimer’s clinic,” he said. “We should not go down the road of allowing this to be used in the United States and it’s disturbing to hear that these tests are being carried out, by the military no less.”
PDF:
https://apps.fcc.gov/els/GetAtt.html?id=233815&x=.
👉🏼 Read more:
https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest
#USA #pentagon #surveillance #Southcom
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The US military is conducting wide-area surveillance tests across six midwest states using experimental high-altitude balloons, documents filed with the Federal Communications Commission (FCC) reveal.
Up to 25 unmanned solar-powered balloons are being launched from rural South Dakota and drifting 250 miles through an area spanning portions of Minnesota, Iowa, Wisconsin and Missouri, before concluding in central Illinois.
Travelling in the stratosphere at altitudes of up to 65,000ft, the balloons are intended to “provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats”, according to a filing made on behalf of the Sierra Nevada Corporation, an aerospace and defence company.
The balloons are carrying hi-tech radars designed to simultaneously track many individual vehicles day or night, through any kind of weather. The tests, which have not previously been reported, received an FCC license to operate from mid-July until September, following similar flights licensed last year.
Arthur Holland Michel, the co-director of the Center for the Study of the Drone at Bard College in New York, said, “What this new technology proposes is to watch everything at once. Sometimes it’s referred to as ‘combat TiVo’ because when an event happens somewhere in the surveilled area, you can potentially rewind the tape to see exactly what occurred, and rewind even further to see who was involved and where they came from.”
The tests have been commissioned by the US Southern Command (Southcom), which is responsible for disaster response, intelligence operations and security cooperation in the Caribbean and Central and South America. Southcom is a joint effort by the US army, navy, air force and other forces, and one of its key roles is identifying and intercepting drug shipments headed for the United States.
“We do not think that American cities should be subject to wide-area surveillance in which every vehicle could be tracked wherever they go,” said Jay Stanley, a senior policy analyst at the American Civil Liberties Union.
“Even in tests, they’re still collecting a lot of data on Americans: who’s driving to the union house, the church, the mosque, the Alzheimer’s clinic,” he said. “We should not go down the road of allowing this to be used in the United States and it’s disturbing to hear that these tests are being carried out, by the military no less.”
PDF:
https://apps.fcc.gov/els/GetAtt.html?id=233815&x=.
👉🏼 Read more:
https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest
#USA #pentagon #surveillance #Southcom
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Audio
The Tech Worker Resistance
There’s a movement building within tech. Workers are demanding higher standards from their companies — and because of their unique skills and talent, they have the leverage to get attention. Walkouts and sit-ins. Picket protests and petitions. Shareholder resolutions, and open letters. These are the new tools of tech workers, increasingly emboldened to speak out. And, as they do that, they expose the underbellies of their companies’ ethics and values, or perceived lack of them.
📻 #IRL - Online Life is Real Life #podcast
https://irlpodcast.org/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
There’s a movement building within tech. Workers are demanding higher standards from their companies — and because of their unique skills and talent, they have the leverage to get attention. Walkouts and sit-ins. Picket protests and petitions. Shareholder resolutions, and open letters. These are the new tools of tech workers, increasingly emboldened to speak out. And, as they do that, they expose the underbellies of their companies’ ethics and values, or perceived lack of them.
📻 #IRL - Online Life is Real Life #podcast
https://irlpodcast.org/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
YouTube Blacklists Federal Reserve Information - It’s Up To YOU To Spread It!
Breitbart finally covers the story of how Chris Hayes got YouTube to blacklist the search term “federal reserve” and scrub Century of Enslavement from those search results. Today, James puts out the challenge: can you break through the information blockade with good old word of mouth?
📺 https://www.corbettreport.com/youtube-blacklists-federal-reserve-information-its-up-to-you-to-spread-it/
#ItsUpToYOU #corbettreport #censorship #youtube #FederalReserve #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Breitbart finally covers the story of how Chris Hayes got YouTube to blacklist the search term “federal reserve” and scrub Century of Enslavement from those search results. Today, James puts out the challenge: can you break through the information blockade with good old word of mouth?
📺 https://www.corbettreport.com/youtube-blacklists-federal-reserve-information-its-up-to-you-to-spread-it/
#ItsUpToYOU #corbettreport #censorship #youtube #FederalReserve #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN