Identify the maker of a movie by the way the screen shakes

Egocentric cameras are being worn by an increasing number of users, among them many security forces worldwide. GoPro cameras already penetrated the mass market, and Google Glass may follow soon. As head-worn cameras do not capture the face and body of the wearer, it may seem that the anonymity of the wearer can be preserved even when the video is publicly distributed.We show that motion features in egocentric video provide biometric information, and the identity of the user can be determined quite reliably from a few seconds of video. Biometrics are extracted by training Convolutional Neural Network CNN architectures on coarse optical flow.Egocentric video biometrics can prevent theft of wearable cameras by locking the camera when worn by people other than the owner. In video sharing services, this Biometric measure can help to locate automatically all videos shot by the same user. An important message in this paper is that people should be aware that sharing egocentric video will compromise their anonymity.

via [1411.7591] Egocentric Video Biometrics.

EU Mandates eCall tracking system in your new car from 2018

The European Parliament has reached a deal with national ministers to introduce a mandatory “eCall” system for all new cars from April 2018.

However, although the system would automatically call the 112 emergency number in the event of a crash, euro lawmakers say that cars will not be continuously tracked.

“It will be illegal to use eCall to track a driver’s movements or to misuse location data, which must be sent only to the emergency services,” said Olga Sehnalova, the Czech politician who helped broker the deal.

The proposed rules would also follow the principle of data-minimisation, with only basic details such as the class of vehicle, the type of fuel used, the time of the accident, and the exact location given to the emergency services.

Nor is any of the data gathered allowed to be passed on to third parties without the explicit consent of the person involved.

via EU law bods: New eCall crash system WON'T TRACK YOU. Really • The Register.

I’m very curious how the system knows you’re in a crash…

FIDO v1 out – broadly adopted passwordless authentication for (eventually) everything

“Today, we celebrate an achievement that will define the point at which the old world order of passwords and PINs started to wither and die,” said Michael Barrett, president of the FIDO Alliance. “FIDO Alliance pioneers can forever lay claim to ushering in the ‘post password’ era, which is already revealing new dimensions in Internet services and digital commerce.”

The specifications outline a new standard for devices, servers and client software, including browsers, browser plugins, and native app subsystems. Any website or cloud application can interface with a broad variety of existing and future FIDO­enabled authenticators, ranging from biometrics to hardware tokens, to be used by consumers, enterprises, service providers, governments and organizations of all types.

Keeping with the FIDO Alliance mission, both specifications are unencumbered by FIDO member patents. Members are free to implement and market solutions around FIDO­enabled strong authentication, and non­members are free to deploy those solutions. As previously announced, current implementations available in the market include those from Nok Nok Labs, Synaptics, Alibaba, PayPal, Samsung, Google, Yubico and Plug­Up.
via FIDO Alliance.

IBM’s Watson Analytics enters public beta | ZDNet

Users of Watson Analytics feed in their own raw data, say, in the form of a spreadsheet, which the service then crunches with its own statistical analysis to highlight associations between different variables. It saves execs from needing to know how to write their own scripts or understand statistics in order to derive meaning from their data.

via IBM's Watson Analytics enters public beta | ZDNet.

NASA tests aircraft with shape shifting wings

FlexFoil is a shape-changing assembly that replaces the flaps on a wing and can alter shape in flight to produce seamless bendable and twistable aerofoil surfaces. This allows the FlexFoil to act like a flap in its various positions while still providing an unbroken air surface. This makes for a more streamlined wing and reduces noise during takeoffs and landings. Importantly, it’s designed not only for new aircraft designs, but for retrofitting to existing ones.

via NASA tests aircraft with shape shifting wings.

Sony Data Breach gets worse and worse

The data dump, which was reviewed extensively by BuzzFeed News, includes employee criminal background checks, salary negotiations, and doctors’ letters explaining the medical rationale for leaves of absence. There are spreadsheets containing the salaries of 6,800 global employees, along with Social Security numbers for 3,500 U.S. staff. And there is extensive documentation of the company’s operations, ranging from the script for an unreleased pilot written by Breaking Bad creator Vince Gilligan to the results of sales meetings with local TV executives.

The documents made public this weekend, covering the company’s human resources, sales, and marketing teams, among others, are just a fraction of approximately 100TB of data the hackers claim to have taken from Sony. They say it will all be made freely available online, once they figure out how to distribute such an enormous amount of information.

via A Look Through The Sony Pictures Data Hack: This Is As Bad As It Gets – BuzzFeed News.

GlassWire Network Security Monitor & Firewall Tool

GlassWire displays your network activity on an easy to understand graph while searching for unusual Internet behavior that could indicate malware or violations of your privacy. Once unusual network activity is discovered you’re instantly alerted with detailed information so you can protect your computer, privacy, and data.

via GlassWire Network Security Monitor & Firewall Tool.

The Newest Sony Data Breach Exposes Thousands Of Passwords

Excel and Word documents plainly expose thousands of computer log-in, financial, and web services passwords, including the Facebook, Twitter, YouTube, and MySpace passwords for hundreds of major motion picture accounts.

via It Gets Worse: The Newest Sony Data Breach Exposes Thousands Of Passwords – BuzzFeed News.

Oh dear, Sony is really hammering themselves on this one

Apple Deleted Rivals’ Songs from Users’ iPods

When a user who had downloaded music from a rival service tried to sync an iPod to the user’s iTunes library, Apple would display an error message and instruct the user to restore the factory settings, Coughlin said. When the user restored the settings, the music from rival services would disappear, he said.

via Apple Deleted Rivals’ Songs from Users’ iPods – Digits – WSJ.

Touch 3D shapes in mid-air using ultrasound

We present a method for creating three-dimensional haptic shapes in mid-air using focused ultrasound. This approach applies the principles of acoustic radiation force, whereby the non-linear effects of sound produce forces on the skin which are strong enough to generate tactile sensations. This mid-air haptic feedback eliminates the need for any attachment of actuators or contact with physical devices

via Rendering volumetric haptic shapes in mid-air using ultrasound – University of Bristol.

Why More Solar Panels Should Be Facing West, Not South

That captures the most solar energy over the course of the day, which benefits the homeowner, but does so at hours that are not so helpful for the utility and the grid as a whole.

Mount them to catch the sunlight from the west in the afternoon, and the panels’ production over all would fall, but it would come at hours when the electricity was more valuable.

via Why More Solar Panels Should Be Facing West, Not South – NYTimes.com.

Debian forks into Devuan over systemd

Devuan – the GNU/Linux by Veteran Unix Admins..

From the email:
“If systemd had just been an interchangeable init system it wouldn’t be so problematic. It’s the scope creep and mess of poorly-defined interdependencies that are truly shocking. ”

“With sysvinit great effort was taken never to break existing
configurations, and that appears to have been lost. Introducing dependency-based boot took over two stable cycles; optional in one, default in the next, mandatory after that. That could have been reduced certainly, but the point is that time was taken to ensure its correctness and robustness (and in the beginning, it did need work, so the wait was worthwhile). This has not occurred with systemd, which has been made the default yet is still not ready for production use.”

Big words and big actions!

Spaceship Two breaks up in flight

The spacecraft broke up after being released from a carrier aircraft at high altitude, according to Ken Brown, a photographer who witnessed the plane breaking apart.

One pilot was found dead inside the spacecraft and another parachuted out and was flown by helicopter to a hospital, Kern County Sheriff Donny Youngblood said.

Friday’s flight marked the 55th for SpaceShipTwo, which was intended to be the first of a fleet of craft. This was only the fourth flight to include a brief rocket firing. The rockets fire after the spacecraft is released from the underside of a larger carrying plane. During other flights, the craft either was not released from its mothership or functioned as a glider after release.

The problem happened about 50 minutes after takeoff and within minutes of the spaceship’s release from its mothership, said Stuart Witt, CEO of the Mojave Air and Space Port.

via Investigators, Branson Head to Spacecraft Crash Site | Military.com.

Good luck picking up the pieces and carrying on.

NL Provice of Utrecht buys citizen Facebookprofiles for marketing by offering free WiFi.

The Dutch province Utrecht has signed a deal with City Wireless that allows people free wireless. They can log in with their Facebook profile, which is then harvested for information for marketing purposes. City Wireless has since changed its’ homepage, removing the grizly details, but the Dutch paper still has the screencaps.

Article in Dutch.
Gemeente Utrecht koopt Facebookprofielen burgers – Webwereld.

Thought about privacy? Hell no!

BitHammer – Ban BitTorrent clients

Free up shared wifi spots!

Over a year of traveling, I’ve consistently struggled with broken wifi spots overloaded with torrent traffic. After talking with the frustrated non-technical people who owned/managed them, I wrote this program to help network users and owners.

This program:

Listens for BitTorrent clients on the network,

Adds their IPs and MACs to a ban list,

Bans them from the network for as long as the program is running.

via MichaelJCole/bithammer · GitHub.

Banks harvest callers’ voiceprints without their knowledge

A recent AP survey of 10 leading voice biometric vendors found that more than 65 million people worldwide have had their voiceprints taken, and that several banks, including Barclays PLC in Britain and Minneapolis-based U.S. Bancorp, are in the process of introducing their customers to the technology.

via Banks harvest callers' voiceprints to fight fraud.

Because keeping people’s details without their knowledge or consent is fine, right? Not.

Hackers own 80% of all South Korean ID data

The South Korean government is considering a complete overhaul of its national identity number computer system – after hackers comprehensively ransacked it and now hold the ID codes for as much as 80 per cent of the population.

Each South Korean citizen is issued with a lifetime unique ID number. This number is used in all transactions, and the system has been in place since the late 1960s.

A public hearing into the database raid heard that hackers have now stolen the vast majority of these numbers, sparking an online crimewave that has hit everyone, from the highest to the lowest.

South Korea faces $1bn bill after hackers raid national ID database • The Register.

Open Source Security Testing Methodology Manual (OSSTMM)

Fact does not come from the grand leaps of discovery but rather from the small, careful steps of verification. That is the premise of the Open Source Security Testing Methodology Manual also known as the OSSTMM (pronounced as "awstem") It is a peer-reviewed manual of security testing and analysis which result in verified facts. These facts provide actionable information that can measurably improve your operational security. By using the OSSTMM you no longer have to rely on general best practices, anecdotal evidence, or superstitions because you will have verified information specific to your needs on which to base your security decisions. One way to assure a security analysis has value is to know it has been done thoroughly, efficiently, and accurately. For that you need to use a formal methodology. The OSSTMM aims to be it.

via ISECOM – Open Source Security Testing Methodology Manual (OSSTMM).