Finally final!
Now thin air can be a touchscreen. Yasuaki Monnai and his team at the University of Tokyo have created a virtual screen you can feel. Called HaptoMime, it uses reflective surfaces to create a holographic display.
via Ultrasound makes hologram keyboard touchy-feely – tech – 28 October 2014 – New Scientist.
The addresses and domains you email to, your search terms, how often you use your Mac.
And this with a few hours of poking.
Apple keeps saying it’s leaving users alone, but really?
fix-macosx/yosemite-phone-home · GitHub.
The Dutch province Utrecht has signed a deal with City Wireless that allows people free wireless. They can log in with their Facebook profile, which is then harvested for information for marketing purposes. City Wireless has since changed its’ homepage, removing the grizly details, but the Dutch paper still has the screencaps.
Article in Dutch.
Gemeente Utrecht koopt Facebookprofielen burgers – Webwereld.
Thought about privacy? Hell no!
Free up shared wifi spots!
Over a year of traveling, I’ve consistently struggled with broken wifi spots overloaded with torrent traffic. After talking with the frustrated non-technical people who owned/managed them, I wrote this program to help network users and owners.
This program:
Listens for BitTorrent clients on the network,
Adds their IPs and MACs to a ban list,
Bans them from the network for as long as the program is running.
via MichaelJCole/bithammer · GitHub.
A recent AP survey of 10 leading voice biometric vendors found that more than 65 million people worldwide have had their voiceprints taken, and that several banks, including Barclays PLC in Britain and Minneapolis-based U.S. Bancorp, are in the process of introducing their customers to the technology.
via Banks harvest callers' voiceprints to fight fraud.
Because keeping people’s details without their knowledge or consent is fine, right? Not.
Lockheed Martin is developing an exoskeleton that transfers all the energy used to the ground, thus allowing you to lift heavy loads without using batteries.
FORTIS Exoskeleton · Lockheed Martin.
The South Korean government is considering a complete overhaul of its national identity number computer system – after hackers comprehensively ransacked it and now hold the ID codes for as much as 80 per cent of the population.
Each South Korean citizen is issued with a lifetime unique ID number. This number is used in all transactions, and the system has been in place since the late 1960s.
A public hearing into the database raid heard that hackers have now stolen the vast majority of these numbers, sparking an online crimewave that has hit everyone, from the highest to the lowest.
South Korea faces $1bn bill after hackers raid national ID database • The Register.
Fact does not come from the grand leaps of discovery but rather from the small, careful steps of verification. That is the premise of the Open Source Security Testing Methodology Manual also known as the OSSTMM (pronounced as "awstem") It is a peer-reviewed manual of security testing and analysis which result in verified facts. These facts provide actionable information that can measurably improve your operational security. By using the OSSTMM you no longer have to rely on general best practices, anecdotal evidence, or superstitions because you will have verified information specific to your needs on which to base your security decisions. One way to assure a security analysis has value is to know it has been done thoroughly, efficiently, and accurately. For that you need to use a formal methodology. The OSSTMM aims to be it.
via ISECOM – Open Source Security Testing Methodology Manual (OSSTMM).
PrintScreen is an enabling technology for digital fabrication of customized flexible displays using thin-film electroluminescence (TFEL). It enables inexpensive and rapid fabrication of highly customized displays in low volume, in a simple lab environment, print shop or even at home. We show how to print ultra-thin (120 um) segmented and passive matrix displays in greyscale or multi-color on a variety of deformable and rigid substrate materials
via PrintScreen: Digital Fabrication of Thin-Film Displays | Embodied Interaction.
They found that if Friendster had used certain state-of-the-art prediction algorithms, it could have divined sensitive information about non-members, including their sexual orientation. “At the time, it was possible for Friendster to predict the sexual orientation of people who did not have an account on Friendster,”
[….]
The problem Garcia identifies lies in something called “shadow profiles,” and as a consequence, we all could be intimately profiled by the Facebooks and Googles and LinkedIns of the world—whether we agree to it or not.
Garcia says this kind of statistical analysis—essentially using machine learning to study the known tastes and relationships of one person’s contacts, and making a guess about who they are likely to be—could be used to build disturbingly detailed profiles of people who do not even use the social network
[…]
We learned about shadow profiles last year when security researchers at a company called Packetstorm discovered Facebook was maintaining its own files on users’ contacts. For example, if Facebook found two users were connected to a non-member—say, bob@wired.com—it would pool other information—different phone numbers, for example—into one master dossier.
via Not on a Social Network? You've Still Got a Privacy Problem | WIRED.
Adobe’s Digital Editions 4 ebook reader software is collecting detailed information about the reading habits of its users – and sending it back to the company in a format that’s easy for others to slurp.
An investigation by Nate Hoffelder of The Digital Reader blog showed that ADE 4 was collecting telemetry on which pages of ebooks were being read, and in which order. This included the title, publisher, and other metadata, which was then sent to the company’s mothership – a server called adelogs, no less – in plain text over the internet.
via Adobe spies on readers: EVERY page you turn, EVERY book you own leaked back to base • The Register.
So… In the last year, Adobe has lost account details to some 50 million users, has lost its’ source codes to hackers and still doesn’t understand the need for security and privacy?!
Microsoft collects information about you, your devices, applications and networks, and your use of those devices, applications and networks. Examples of data we collect include your name, email address, preferences and interests; browsing, search and file history; phone call and SMS data; device configuration and sensor data; and application usage.
This isn’t the only thing Microsoft is collecting from Insider Program participants. According to the Privacy Policy, the company is collecting things like text inputted into the operating system, the details of any/all files on your system, voice input and program information.
It’s a comb like structure, which means the hairs can be washed out easily
Tiya convenient floor drain – 2014 | concept | Red Dot Award: Design Concept.
The University of Illinois has put together a comprehensive list of stain solutions. Each solution contains the supplies you will need and the preferred method for cleaning the stain
via Stain Solutions | U of I Extension.
Conservative policy towards the Human Rights Act has serious consequences for privacy and freedom of expressionAccording to most of the broadsheets, if there is a Conservative Government after the next General Election, the European Court of Human Rights will no longer be able to overrule British courts.
This way they can do things like keep DNA of innocent people on file forever, force journalists into revealing their laws, invade your privacy at will.
Another step towards totalitarianism.
Are you looking for an easy way to access Linux desktop applications LibreOffice, Evolution etc remotely?fernapp makes it possible to run a GUI application on a Linux server and access it from anywhere via web browser!It’s not an ordinary remote desktop. It focuses on the application windows and integrates them nicely.
via fernapp.
In the age of BYOD this open source proggie is very useful.
Of course, Beginning with Version 3.5 LibreOffice can be launched as a web server. This allows using LibreOffice online within a web browser.