Remove Data collection Remove Internet Remove Surveillance Remove Technology
article thumbnail

Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

Communities across the United States are starting to ban facial recognition technologies. Forty major music festivals pledged not to use the technology, and activists are calling for a nationwide ban. Many Democratic presidential candidates support at least a partial ban on the technology. Let's take them in turn.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. China denied having done so , of course.

article thumbnail

TikTok is “unacceptable security risk” and should be removed from app stores, says FCC

Malwarebytes

Excessive data collection. Carr cited several incidents as evidence that TikTok has been dodgy about its data collection practices. ” Is TikTok a “sophisticated surveillance tool”? In the Twitter thread, Carr pointed out the national security risks TikTok poses. In China, it is known as Douyin.

Risk 145
article thumbnail

LLMs and Phishing

Schneier on Security

And new mechanisms, from ChatGPT plugins to LangChain , will enable composition of AI with thousands of API-based cloud services and open source tools, allowing LLMs to interact with the internet as humans do. Combine the digital dossiers that data brokers have on all of us with LLMs, and you have a tool tailor-made for personalized scams.

Phishing 282
article thumbnail

Stalkerware activity drops as glaring spying problem is revealed

Malwarebytes

It’s spying when governments do it through opaque, mass surveillance regimes, it’s spying when companies do it through shadowy data broker networks that braid together disparate streams of information, and it’s spying when private individuals do it through unseen behavior on personal devices.

article thumbnail

In conversation: Bruce Schneier on AI-powered mass spying

Malwarebytes

For decades, governments and companies have surveilled the conversations, movements, and behavior of the public. And then the internet came along and made that a whole lot easier. We kind of know what mass surveillance, mass spying looks like. Below is an edited transcript of their conversation. And that already sounds awful.