[ad_1]
New research by British researchers shows how easy it is to identify authors of tweets using metadata.
MEPs voted in favor of a re-examination of the controversial amendments to the Copyright Act. savvy advocates would change the digital fabric of society itself. This is how each Member State voted.
Meanwhile, on Facebook, the company confirmed that blocked users could see content posted by people who had blocked them. 800,000 users were affected by the bug, which was active between May 29 and June 5.
Following a report released early July on the practice of third-party developers accessing Gmail messages, Google issued a statement discouraging some rumors how users can become more aware of what they're signing up for. Some critics say it is the job of the company to ensure that customers are aware of what they actually agree to when they sign up for services.
Your private Twitter account could still give you
The ubiquity of metadata in today's world is something everyone does not know, but a new paper by Researchers at the Alan Turing Institute and University College London show how many digital baskets we leave behind, especially on Twitter. Researchers used tweets and badociated metadata to identify a single user in a group of 10,000 at an astonishing 96.7pc accuracy rate.
Beatrice Perez of University College London said Wired that people badume that metadata do not pose. an immediate risk to privacy: "People think it's not a big deal, but pair it with another piece of information and I know when you're at home or not." [19659003] The types of metadata gleaned from tweets and badyzed by machine learning algorithms included the number of favorites, Twitter followers, and published time. The obfuscation of data sets has not prevented researchers from even identifying completely anonymous accounts.
The Polar Fitness Logging application revealed the locations of spies and military
Polar Flow is an application that tracks the activity data of millions of users, who use the Public Activity Tracking Records to post their workouts on the Explore Map function. Even in private mode, the physical activity of a user can easily track his place of residence.
ZDNet reported that Polar Flow's developer API could be inappropriately polled on the surface drive routing activity, which is exactly what Dutch investigators found . The nuclear storage personnel, the intelligence officers and the missile silo guards were all spotted using the bug during the in-depth examination.
The Polar parent company of the application has since taken the offline map. This incident is similar to the Strava application problem earlier this year. Many say that increasing digital tracks means that spying becomes heavier than ever before.
Uganda reduces VPNs
The internet has become much more restricted in Uganda because the country's communication authority has ordered telecommunication companies to block VPNs. People are increasingly relying on virtual private networks to avoid paying new taxes on social media, which have been imposed to curb gossip.
The tax has been criticized by human rights groups.
Crypto-currency fans using Macs are the target of new malware
People who like chatting about cryptocurrency on Slack or Discord channels are the target of a stump of malware named & # 39; OSX.Dummy & # 39 ;. Dark reading. The social engineering attack sends a false request to someone claiming to be a group administrator, asking the naïve victim to execute a long order in a terminal window and to have a claim. ignore a downloaded file on his machine.
Once that was done, a hacker in the Netherlands managed to hijack their Mac. Security researcher Ryan Benson explained that many people have jumped on the digital currency bandwagon, which may not have the technological intelligence to detect an attack as simple as this one.
Open Twitter App on mobile. Image: In green / Shutterstock
Source link