5 min read · 2021-12-16 · The parent company of Facebook and Instagram says the firms used its platforms to spy on human rights activists, government critics, celebrities and journalists in more than 100 countries.
7 min read · 2021-05-06 · In March 2017, a group of hackers from China arrived in Vancouver with one goal: Find hidden weak spots inside the world’s most popular technologies. Google’s Chrome browser, Microsoft’s Windows…
A remote attacker could take over any iPhone that visited a web page containing Qixun’s malicious code. It’s the kind of hack that can potentially be sold for millions of dollars on the open market to give criminals or governments the ability to spy on large numbers of people.
8 min read · 2021-10-09 · El filósofo surcoreano, una de las estrellas del pensamiento actual, profundiza en su cruzada contra los ‘smartphones’. Estima que se han convertido en una herramienta de subyugación digital que crea…
4 min read · 2021-10-01 · El divendres 29 al vespre, agents de la Guàrdia Civil es van presentar al Centre de Telecomunicacions i Tecnologies de la Informació (CTTI) de la Generalitat, al carrer Salvador Espriu de l’Hospita…
6 min read · 2021-09-03 · Colin Koopman’s writings are focused on the politics and ethics of contemporary information technologies. Countering the widespread assumption that all the information technology we are immersed in…
These precedents show us to have been swaddled in data for much longer than we commonly think.
7 min read · 2021-08-26 · “Under His Eye,” she says. The right farewell. “Under His Eye,” I reply, and she gives a little nod.
Now, however, that’s all set to change. Under the new design, your phone will now perform these searches on Apple’s behalf before your photos have even reached their iCloud servers, and—yada, yada, yada—if enough "forbidden content" is discovered, law-enforcement will be notified.
4 min read · From 2016 · One way of working out if the data you’re gathering is particularly sensitive is to do a thought experiment: what would happen if this data got into the hands of a malicious actor? Who would be keen to get their hands on it? What are the worst things that they could do with this data?