China’s panopticon. Technology is impressive and chilling — but it’s not nearly as all-seeing as the government wants you to think.
The Chinese government is working to create a techno-authoritarian state powered by artificial...
Read Moreby TheSingh | Jul 2, 2018 | Climate Change, Enviroment, FossilFuels, Security, Sustainability, World News | 0 |
Judging from its series of consequential meetings last week in Vienna, OPEC seems to have confirmed that the rumors of its death have been greatly exaggerated. The important thing to recognize is that it also has a new identity...
Read MoreAlmost exactly one year ago, the world experienced two destructive cyberattacks in which offensive cyber tools developed by the National Security Agency (NSA) were stolen and shared with the public. In May 2017, the WannaCry...
Read MoreThink the OnePlus 6 face unlock feature is all the security you need to keep shady people from getting into your phone? Think again. On Twitter this week, OnePlus 6 user Rik van Duijn, an ethical hacker with the Dutch security...
Read MoreThis week, 24 civil liberties organizations, including EFF and the ACLU, urged Director of National Intelligence Daniel Coats to report—as required by law—statistics that could help clear up just how many individuals are...
Read MoreNew analysis suggests that hundreds of thousands of routers are infected with a malicious bug that could be used by a nation-state to bring down large segments of the internet. Wired has the full story, and, fair warning… it’s...
Read MoreFrom https://www.ted.com/talks/zeynep_tufekci_we_re_building_a_dystopia_just_to_make_people_click_on_ads/transcript
Read MoreA hacker has provided Motherboard with the login details for a company that buys phone location data from major telecom companies and then sells it to law enforcement. A hacker has broken into the servers of Securus, a company...
Read MoreA new bill introduced in Congress gets encryption right. The bipartisan Secure Data Act would stop any government agency or court order from forcing a company to build backdoors into encrypted devices and communications. This...
Read More