Remove tag anonymization
article thumbnail

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

The Last Watchdog

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. Assuming privacy concerns get addressed, much wider consumer uses are envisioned in areas such as marketing, retailing and health services. Related: Drivers behind facial recognition boom.

Privacy 153
article thumbnail

Computers and Video Surveillance

Schneier on Security

Maybe they just recorded, and no one looked at the video unless they needed to. In either case, the video was only stored for a few days because storage was expensive. Identification technologies make it easier to automatically figure out who is in the videos. First: video analytics. First: video analytics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The iPhone 11 Pro’s Location Data Puzzler

Krebs on Security

Apple says this is by design, but that response seems at odds with the company’s own privacy policy. ” The policy explains users can disable all location services entirely with one swipe (by navigating to Settings > Privacy > Location Services, then switching “Location Services” to “off”).

Privacy 212
article thumbnail

California proposes rules for automated decision-making

Data Protection Report

On November 27, 2023, the California Privacy Protection Agency (“CPPA”) released a first draft of rules for automated decision-making technologies under California’s privacy law. The proposed rules revolve around providing notice of the technology’s use, opting out, and consumer access to business information.

Access 64
article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

US Army Video: Operations security or OpSec, preserves the effectiveness of military capabilities and keeps potential adversaries from discovering our critical information. It's basic privacy hygiene. In a moment we'll find out what steps you need to take to be truly anonymous online … and there are a lot of them.

Privacy 52
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

And that's precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I've never discussed publicly before. S**t Express is literally a site to send other people pieces of that - anonymously - and they got breached , thus somewhat affecting their anonymity.

article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Doctors can now use mobile devices to to tag patient condition and sending, for example, xrays from Africa to India by mobile network to be checked by doctors and diagnosed. Web video showdown: Flash vs. QuickTime vs. Windows Media How do the three major web video formats compare in terms of CPU usage and battery life?