Remove Accountability Remove Data collection Remove Surveillance Remove Technology
article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Where possible, favor openness and transparency over aggressive data collection or restrictions which erode civil liberties. Seek security policies and technologies that enhance society broadly rather than benefit special interests. Surveillance creep risks violating autonomy. Focus only on proportional responses.

article thumbnail

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

The Last Watchdog

Either way, a singular piece of technology – artificial intelligence (AI) — is destined to profoundly influence which way we go from here. The study found that the “vast majority” of AI ethics statements say “very little about implementation, accountability, or how such ethics would be measured and enforced in practice.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google will pay $29.5M to settle two lawsuits over its location tracking practices

Security Affairs

Given the vast level of tracking and surveillance that technology companies can embed into their widely used products, it is only fair that consumers be informed of how important user data, including information about their every move, is gathered, tracked, and utilized by these companies. The IT giant will pay $9.5

article thumbnail

Privacy predictions 2022

SecureList

Citizens, for their part, are increasingly concerned with surveillance capitalism , a lack of anonymity and dependence on online services. Governments are wary of the growing big tech power and data hoarding, which will lead to conflicts – and compromises. People and regulators will demand more algorithmic transparency.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

The State of Stalkerware in 2023–2024

SecureList

Stalkerware requires physical access to be installed, but our report also looks at a range of remote technology that can be used for nefarious purposes. Not only can the intruder violate their victim’s privacy by monitoring their activities, but they can also use the software to access huge volumes of personal data.

Mobile 78
article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

They all must have unique identifiers and the ability to collect and transfer data over networks to enable monitoring, surveillance, and execution of decisions based on the collected data with little or no human intervention. Protecting the integrity and confidentiality of data collected by all connected devices.

IoT 72