‘Fawkes’ Tool Protects Against Unregulated Facial Software
Examples of original photos and versions that have been “cloaked” by the Fawkes tool created by a team at the University of Chicago. Team co-leaders Heather Zheng and Ben Zhao are pictured on the bottom row. Credit: SAND Lab, University of Chicago.
By Rachel Looker
With the abundance of surveillance cameras in stores, at traffic lights and in most people’s pockets, the possibility of your face being captured for unsavory purposes has become more prevalent than ever before.
To protect individual privacy, University of Chicago professors Ben Zhao and Heather Zheng led a team to create the “Fawkes” algorithmic and software tool.
Continue reading “Q&A: University of Chicago’s Ben Zhao and Heather Zheng”
Even a Small Breach in Election Security Can Sow Distrust
By Mary Pieper
William T. Adler, senior technologist in elections and security at the Center for Democracy and Technology in Washington, recently participated in a news briefing on election security.
With record early voting leading into Tuesday’s election, Adler and his colleagues explained what election officials were doing to prevent security breaches. They also discussed online misinformation and voting suppression.
In a follow-up interview, Adler told Digital Privacy News that, while election officials had made numerous security improvements, vulnerabilities still existed.
An attack on just one voting machine could create widespread doubts about overall election security, he said.
Continue reading “Q&A: CDT’s William Adler”
Americans Deserve ‘Full Accounting’ From Big Tech CEOs on Their Practices
By Jeff Benson
Nearly two weeks ago, The New York Post published what it deemed a bombshell story allegedly linking Hunter Biden to a Ukrainian-influence campaign on his father, then-Vice President Joe Biden.
Many social media users didn’t hear about it until later.
Twitter blocked the article for purportedly breaching its privacy policies, while Facebook slowed down dissemination so the report could be fact-checked.
The incident put further strain on Section 230 of the Communications Decency Act, which gives online publishers broad discretion to moderate content submitted by users.
Continue reading “Q&A: Sen. Roger Wicker, R-Miss.”
‘Companies Have Your Back When Having Your Back Is Good for Them’
By Jeff Benson
Last of three parts.
Cory Doctorow’s latest book, “How to Destroy Surveillance Capitalism,” has much to say about how using antitrust law can lead to better privacy.
But it has less to say about what consumers can do avoid online surveillance.
In this final installment of a three-part interview, Doctorow told Digital Privacy News that the internet became centralized through mergers, that personal data leaks were unavoidable and that consumers should be battling for stronger penalties for companies that break the law.
Continue reading “Q&A: Blogger Cory Doctorow”
‘We Can Pass Laws That Make Being Anti-Privacy Unprofitable’
By Jeff Benson
Second of three parts.
Technologist and author Cory Doctorow doesn’t buy the argument that we can’t regulate Big Tech because they’ll move overseas.
In today’s Digital Privacy News interview, the second of three parts, he said that U.S. laws allowed monopolies to expand across the globe, that changing those rules were “politically difficult” and that companies only cared about privacy if they could profit from it.
Continue reading “Q&A: Technologist Cory Doctorow”
Breaking Up Monopolies Unleashes Innovation, Competition
By Jeff Benson
First of three parts.
Cory Doctorow is one of the world’s most prolific tech and science fiction writers.
In between releasing his second graphic novel, “Poesy the Monster Slayer,” in July and a sequel to “Little Brother” (due out in October), Doctorow managed to fit in a 27,000-word treatise on breaking up tech monopolies.
Published on OneZero late last month (and available for free to read), “How to Destroy Surveillance Capitalism” argues that the government needs to step up its antitrust efforts or else Facebook, Google and their ilk will invade people’s privacy with impunity.
In the first of a three-part interview, Doctorow told Digital Privacy News that breaking up monopolies helped tech grow, that Facebook won’t stop hoarding data on its own — and provided questions that really should be asked about Big Tech.
Continue reading “Q&A: British Author Cory Doctorow”
Online Voting Is Not Safe
By Patrick W. Dunne
With the concerns surrounding a U.S. Postal Service slowdown and voter suppression, discussions continue to grow about online voting for the 2020 election.
But many cybersecurity experts are skeptical, including Murat Kantarcioglu, a professor of computer science at the University of Texas at Dallas.
Kantarcioglu, who holds a doctorate in computer science from Perdue University, told Digital Privacy News that online voting lacked a meaningful method of self-auditing, which eroded trust in the system.
Continue reading “Q&A: University of Texas’ Murat Kantarcioglu”
Bill Seeks to Limit Use of Police Cameras
By Mukund Rathi
Congresswoman Eleanor Holmes Norton, D-D.C., introduced the Federal Police Camera and Accountability Act in June 2019.
It was incorporated into the George Floyd Justice in Policing Act that recently passed the House of Representatives.
The bill regulates federal law-enforcement’s use of body and dashboard cameras.
Generally, it requires them to activate cameras when interacting with the public and to disclose videos on appropriate requests.
The legislation would affect the more than 30 federal law-enforcement agencies working in Washington.
Continue reading “Q&A: Delegate Eleanor Holmes Norton, D-D.C.”
Privacy Has Its Roots in Outrage
By C.J. Thompson
Nabiha Syed is a media attorney and president of The Markup, an independent news website dedicated to illuminating concerning privacy issues.
“Part of our mission is to help people understand exactly how their privacy is being affected by technology,” she told Digital Privacy News.
The need for new privacy laws and regulation are primary components of a landscape that has never been more complex, cluttered — and, in many ways — cloaked.
But Syed remains encouraged by the current wave of public activism, as it is exactly what’s needed to provoke meaningful privacy protections.
Continue reading “Q&A: The Markup’s Nabiha Syed”
The Public Needs to Know Where Their Data Has Been
By Emilie Rodriguez
The Adobe data breach occurred in October 2013, the largest known at the time. Hackers exposed user account information, created a source code leak, and stole nearly 3 million encrypted customer credit card records.
An estimated 38 million users were affected.
After the incident, Troy Hunt, an Australian internet security professional, started the website “Have I Been Pwned” (HIBP).
Continue reading “Q&A: HIBP’s Troy Hunt”