To Surveil and Predict - A Human Rights Analysis of Algorithmic Policing in Canada
This publication is the result of an investigation by the Citizen Lab at the Munk School of Global Affairs & Public Policy and the University of Torontoβs International Human Rights Program (IHRP) at the Faculty of Law. Read the full report and our explanatory guide that provides a summary of research findings as well as questions and answers from the research team.
π ππΌ Read the full report (PDF)
https://citizenlab.ca/wp-content/uploads/2020/09/To-Surveil-and-Predict.pdf
π ππΌ Algorithmic Policing in Canada Explained
https://citizenlab.ca/2020/09/algorithmic-policing-in-canada-explained/
π ππΌ https://citizenlab.ca/2020/09/to-surveil-and-predict-a-human-rights-analysis-of-algorithmic-policing-in-canada/
#algorithmic #policing #canada #study #analysis #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
This publication is the result of an investigation by the Citizen Lab at the Munk School of Global Affairs & Public Policy and the University of Torontoβs International Human Rights Program (IHRP) at the Faculty of Law. Read the full report and our explanatory guide that provides a summary of research findings as well as questions and answers from the research team.
π ππΌ Read the full report (PDF)
https://citizenlab.ca/wp-content/uploads/2020/09/To-Surveil-and-Predict.pdf
π ππΌ Algorithmic Policing in Canada Explained
https://citizenlab.ca/2020/09/algorithmic-policing-in-canada-explained/
π ππΌ https://citizenlab.ca/2020/09/to-surveil-and-predict-a-human-rights-analysis-of-algorithmic-policing-in-canada/
#algorithmic #policing #canada #study #analysis #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Is the web getting slower?
A story on Hacker News recently argued that webpage speeds haven't improved, even as internet speeds have gone up.
This article explains why that conclusion can't be drawn from the original data.
We'll also look at how devices and the web have changed over the past 10 years, and what those changes have meant for web performance.
π‘ ππΌ https://www.debugbear.com/blog/is-the-web-getting-slower
π ππΌ The Need for Speed, 23 Years Later:
https://www.nngroup.com/articles/the-need-for-speed/
#webpage #speed #internet #study #report #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
A story on Hacker News recently argued that webpage speeds haven't improved, even as internet speeds have gone up.
This article explains why that conclusion can't be drawn from the original data.
We'll also look at how devices and the web have changed over the past 10 years, and what those changes have meant for web performance.
π‘ ππΌ https://www.debugbear.com/blog/is-the-web-getting-slower
π ππΌ The Need for Speed, 23 Years Later:
https://www.nngroup.com/articles/the-need-for-speed/
#webpage #speed #internet #study #report #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Debugbear
Is The Web Getting Slower? | DebugBear
As consumer devices and internet speeds become faster, website become larger and more complex. Is website performance getting worse overall?
Internet history can be used for βreidentificationβ finds study by Mozilla
A recent research paper has reaffirmed that our internet history can be reliably used to identify us. The research was conducted by Sarah Bird, Ilana Segall, and Martin Lopatka from Mozilla and is titled: Replication: Why We Still Canβt Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. The paper was released at the Symposium on Usable Privacy and Security and is a continuation of a 2012 paper that highlighted the same reidentifiability problem.
βΌοΈ Just your internet history can be used to reidentify you on the internet βΌοΈ
Using data from 52,000 consenting Firefox users, the researchers were able to identify 48,919 distinct browsing profiles which had 99% uniqueness.
This is especially concerning because internet history is routinely sold by your internet service provider (ISP) and mobile data provider to third party advertising and marketing firms which are demonstrably able to tie a list of sites back to an individual they already have a profile on β even if the ISP claims to be βanonymizingβ the data being sold. This is a legally sanctioned activity ever since 2017 when Congress voted to get rid of broadband privacy and allow the monetization of this type of data collection.
This type of βhistory-based profilingβ is undoubtedly being used to build ad profiles on internet users around the world. Previous studies have shown that an IP address usually stays static for about a month β which the researchers noted: βis more than enough time to build reidentifiable browsing profiles.β
π ππΌ (PDF)
https://www.usenix.org/system/files/soups2020-bird.pdf
π ππΌ https://www.cozyit.com/internet-history-can-be-used-for-reidentification-finds-study-by-mozilla/
#mozilla #study #research #internet #history #reidentification #thinkabout #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
A recent research paper has reaffirmed that our internet history can be reliably used to identify us. The research was conducted by Sarah Bird, Ilana Segall, and Martin Lopatka from Mozilla and is titled: Replication: Why We Still Canβt Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. The paper was released at the Symposium on Usable Privacy and Security and is a continuation of a 2012 paper that highlighted the same reidentifiability problem.
βΌοΈ Just your internet history can be used to reidentify you on the internet βΌοΈ
Using data from 52,000 consenting Firefox users, the researchers were able to identify 48,919 distinct browsing profiles which had 99% uniqueness.
This is especially concerning because internet history is routinely sold by your internet service provider (ISP) and mobile data provider to third party advertising and marketing firms which are demonstrably able to tie a list of sites back to an individual they already have a profile on β even if the ISP claims to be βanonymizingβ the data being sold. This is a legally sanctioned activity ever since 2017 when Congress voted to get rid of broadband privacy and allow the monetization of this type of data collection.
This type of βhistory-based profilingβ is undoubtedly being used to build ad profiles on internet users around the world. Previous studies have shown that an IP address usually stays static for about a month β which the researchers noted: βis more than enough time to build reidentifiable browsing profiles.β
π ππΌ (PDF)
https://www.usenix.org/system/files/soups2020-bird.pdf
π ππΌ https://www.cozyit.com/internet-history-can-be-used-for-reidentification-finds-study-by-mozilla/
#mozilla #study #research #internet #history #reidentification #thinkabout #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
NIST.IR.8331.pdf
29.6 MB
Face mask no longer helps against face recognition
The developers of biometric face recognition have adapted their software to the pandemic. While the algorithms still had great difficulty with masked faces in the summer, five months later the situation looks completely different, a new study shows.
Face recognition is becoming more and more accurate, even if the monitored persons wear a facemask. This is the result of a study published on Tuesday by the US National Institute of Standards and Technology (NIST), which tested 152 different face recognition algorithms.
π ππΌ (PDF)
https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8331.pdf
#biometric #facerecognition #study #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The developers of biometric face recognition have adapted their software to the pandemic. While the algorithms still had great difficulty with masked faces in the summer, five months later the situation looks completely different, a new study shows.
Face recognition is becoming more and more accurate, even if the monitored persons wear a facemask. This is the result of a study published on Tuesday by the US National Institute of Standards and Technology (NIST), which tested 152 different face recognition algorithms.
π ππΌ (PDF)
https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8331.pdf
#biometric #facerecognition #study #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
No, the Darknet is not the stronghold of all evil!
The anonymization service Tor can be used for good and bad, a study examines what outweighs. However, this goes a long way wrong.
To obtain information about the usage patterns of the Tor network, scientists Eric Jardine (Virginia Tech/USA), Andrew Lindner (Skidmore College/USA) and Gareth Owenson (University of Portsmouth/UK) operated about 1 percent of the Tor entry nodes for about seven months between December 31, 2018, and August 18, 2019, and studied the connections that were made there.
π ππΌ https://www.pnas.org/content/early/2020/11/24/2011893117
#tor #darknet #study #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The anonymization service Tor can be used for good and bad, a study examines what outweighs. However, this goes a long way wrong.
To obtain information about the usage patterns of the Tor network, scientists Eric Jardine (Virginia Tech/USA), Andrew Lindner (Skidmore College/USA) and Gareth Owenson (University of Portsmouth/UK) operated about 1 percent of the Tor entry nodes for about seven months between December 31, 2018, and August 18, 2019, and studied the connections that were made there.
π ππΌ https://www.pnas.org/content/early/2020/11/24/2011893117
#tor #darknet #study #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Does Your Threat Model Consider Country and Culture?
A Case Study of Brazilian Internet Banking Security to Show That It Should!
Every attack has a story. Uncovering these stories is essential to identify the gaps that allowed the attack to occur and the countermeasures to prevent it from happening again. Over time, many security players tried to model these gaps and countermeasures in their threat models, but all these attempts present the same drawback: they generalize everything! However, not every threat is global.
https://www.usenix.org/conference/enigma2021/presentation/botacin
#presentation #study #threadmodel #security #countermeasures
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
A Case Study of Brazilian Internet Banking Security to Show That It Should!
Every attack has a story. Uncovering these stories is essential to identify the gaps that allowed the attack to occur and the countermeasures to prevent it from happening again. Over time, many security players tried to model these gaps and countermeasures in their threat models, but all these attempts present the same drawback: they generalize everything! However, not every threat is global.
https://www.usenix.org/conference/enigma2021/presentation/botacin
#presentation #study #threadmodel #security #countermeasures
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Browser Fingerprinting
Is your digital fingerprint unique and trackable?
Participate in a scientific study and find out!
https://browser-fingerprint.cs.fau.de/?lang=en
#browser #fingerprinting #tracking #study
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Is your digital fingerprint unique and trackable?
Participate in a scientific study and find out!
https://browser-fingerprint.cs.fau.de/?lang=en
#browser #fingerprinting #tracking #study
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
2102.00813.pdf
207 KB
This is how we lost control of our faces
The largest ever study of facial-recognition data shows how much the rise of deep learning has fueled a loss of privacy.
Now a new study shows just how much this enterprise has eroded our privacy. It hasnβt just fueled an increasingly powerful tool of surveillance. The latest generation of deep-learning-based facial recognition has completely disrupted our norms of consent.
https://www.technologyreview.com/2021/02/05/1017388/ai-deep-learning-facial-recognition-data-history/
https://arxiv.org/pdf/2102.00813.pdf
#ai #deep #learning #facial #recognition #data #privacy #study #thinkabout #pdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
The largest ever study of facial-recognition data shows how much the rise of deep learning has fueled a loss of privacy.
Now a new study shows just how much this enterprise has eroded our privacy. It hasnβt just fueled an increasingly powerful tool of surveillance. The latest generation of deep-learning-based facial recognition has completely disrupted our norms of consent.
https://www.technologyreview.com/2021/02/05/1017388/ai-deep-learning-facial-recognition-data-history/
https://arxiv.org/pdf/2102.00813.pdf
#ai #deep #learning #facial #recognition #data #privacy #study #thinkabout #pdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
pgpp-arxiv20.pdf
7.1 MB
Pretty Good Phone Privacy
To receive service in todayβs cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
To receive service in todayβs cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
EPRS_STU(2021)656336_EN.pdf
3.6 MB
Online platforms: Economic and societal effects
Online platforms such as #Google, #Amazon, and #Facebook play an increasingly central role in the economy and society. They operate as digital intermediaries across interconnected sectors and markets subject to network effects. These firms have grown to an unprecedented scale, propelled by data-driven business models. Online platforms have a massive impact on individual users and businesses, and are recasting the relationships between customers, advertisers, workers and employers.
https://www.europarl.europa.eu/RegData/etudes/STUD/2021/656336/EPRS_STU(2021)656336_EN.pdf
#online #platforms #study #pdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Online platforms such as #Google, #Amazon, and #Facebook play an increasingly central role in the economy and society. They operate as digital intermediaries across interconnected sectors and markets subject to network effects. These firms have grown to an unprecedented scale, propelled by data-driven business models. Online platforms have a massive impact on individual users and businesses, and are recasting the relationships between customers, advertisers, workers and employers.
https://www.europarl.europa.eu/RegData/etudes/STUD/2021/656336/EPRS_STU(2021)656336_EN.pdf
#online #platforms #study #pdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag