Perhaps as a result, really important questions came up: whether, how and at what speed we do the business of digitization, in which areas we want to use AI systems such as face recognition at all, and how regulation can look beyond a calendar-like responsibility. Where do our red lines run?
A critical public will therefore be more important than ever. In this sense, breathe in and out calmly. But leaning back doesn't count - otherwise we'll be the all too trusting "dumb fucks" mentioned above.
https://www.republik.ch/2019/05/22/alles-nur-fake-ethik
#thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
A critical public will therefore be more important than ever. In this sense, breathe in and out calmly. But leaning back doesn't count - otherwise we'll be the all too trusting "dumb fucks" mentioned above.
https://www.republik.ch/2019/05/22/alles-nur-fake-ethik
#thinkabout #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
This is exactly where the matter becomes delicate. For as long as the companies themselves issue guidelines beyond generally applicable laws, "regulate themselves" through self-chosen councils or finance "independent" research themselves, doubts ferment as to whether the ethical principles are really sufficient; whether they are maintained or enforced at all - or whether they are not just a fleshless shell and thus cheap PR.
EU: Trustworthy CI
So the self-proclaimed do-gooders from Silicon Valley can hardly be expected to do anything substantial when it comes to ethics. From the stylized wording of Potemkin's ethics councils to the always the same, meaningless term casings, a lot of verbal fuss is made. But there are usually no consequences that really question one's own actions.
Their educational work thus has no effect whatsoever as a "principle of responsibility" (Hans Jonas), but as an act of precautionary ethics washing. If something goes wrong again, one will at least be able to explain it: After all, we made an effort.
The EU has now recognised the problem and set up the 52-member High-Level Expert Group on Artificial Intelligence itself, an expert committee that was to develop guidelines for AI. https://ec.europa.eu/digital-single-market/en/high-level-expert-group-artificial-intelligence
The result was presented in April - and was sobering. Thomas Metzinger, Professor of Theoretical Philosophy and one of only four ethicists in the group, described it as "lukewarm, short-sighted and deliberately vague". Resolute rejections, such as the use of lethal autonomous weapon systems, had been dispensed with at the insistence of industry representatives and the proclaimed "trustworthy AI" was nothing more than a stale "marketing narrative". https://background.tagesspiegel.de/ethik-waschmaschinen-made-in-europe
Metzinger's conclusion:
If the economy is too strongly involved in the discussion, at best "fake ethics" will emerge - but no real ethical progress. His appeal: Civil society must take the ethics debate away from industry again in order to develop the guidelines further itself. But how?
The tasks
Loose concepts could never make things and people better on their own. And preaching morality, as Friedrich Nietzsche already knew, is "just as easy as justifying morality is difficult". So instead of formulating a few melodious but shallow principles ex post, it is necessary to start earlier.
This means that already during the training of the developers - the TU Kaiserslautern, for example, offers the study course Socioinformatics - ethical and socio-political questions are raised and institutions are strengthened that negotiate ethics and digitality on a higher level beyond the relevant lobbyism. Institutions that push the discourse on effective rules without blinkers and false considerations.
Humanities scholars are also in demand here. Ethics, this would be the goal, must not remain a mere accessory that modestly accompanies or softly covers the laisser-faire in digital space. As a practice of consistent, critical assessment, its task should be to develop clear criteria for the corridors of action and thus also to determine the framework on which binding regulations are based. If it does not do so, it misses its potential and runs the risk of becoming meaningless.
To avoid this, it is necessary not to rely on the voluntary self-regulation of the tech elite, but to declare oneself more independent, in order to combine reflection on morality with reflection on the establishment of the world. Because if digital corporations are penetrating more and more areas of life and are decisively shaping social coexistence through their smart systems, this circumstance should be taken seriously. And think fundamentally about whether the techies, entrepreneurs and engineers alone should decide on the ethical dimensions of their developments - or whether this should not be a democratic, participatory, and thus many-voiced process.
EU: Trustworthy CI
So the self-proclaimed do-gooders from Silicon Valley can hardly be expected to do anything substantial when it comes to ethics. From the stylized wording of Potemkin's ethics councils to the always the same, meaningless term casings, a lot of verbal fuss is made. But there are usually no consequences that really question one's own actions.
Their educational work thus has no effect whatsoever as a "principle of responsibility" (Hans Jonas), but as an act of precautionary ethics washing. If something goes wrong again, one will at least be able to explain it: After all, we made an effort.
The EU has now recognised the problem and set up the 52-member High-Level Expert Group on Artificial Intelligence itself, an expert committee that was to develop guidelines for AI. https://ec.europa.eu/digital-single-market/en/high-level-expert-group-artificial-intelligence
The result was presented in April - and was sobering. Thomas Metzinger, Professor of Theoretical Philosophy and one of only four ethicists in the group, described it as "lukewarm, short-sighted and deliberately vague". Resolute rejections, such as the use of lethal autonomous weapon systems, had been dispensed with at the insistence of industry representatives and the proclaimed "trustworthy AI" was nothing more than a stale "marketing narrative". https://background.tagesspiegel.de/ethik-waschmaschinen-made-in-europe
Metzinger's conclusion:
If the economy is too strongly involved in the discussion, at best "fake ethics" will emerge - but no real ethical progress. His appeal: Civil society must take the ethics debate away from industry again in order to develop the guidelines further itself. But how?
The tasks
Loose concepts could never make things and people better on their own. And preaching morality, as Friedrich Nietzsche already knew, is "just as easy as justifying morality is difficult". So instead of formulating a few melodious but shallow principles ex post, it is necessary to start earlier.
This means that already during the training of the developers - the TU Kaiserslautern, for example, offers the study course Socioinformatics - ethical and socio-political questions are raised and institutions are strengthened that negotiate ethics and digitality on a higher level beyond the relevant lobbyism. Institutions that push the discourse on effective rules without blinkers and false considerations.
Humanities scholars are also in demand here. Ethics, this would be the goal, must not remain a mere accessory that modestly accompanies or softly covers the laisser-faire in digital space. As a practice of consistent, critical assessment, its task should be to develop clear criteria for the corridors of action and thus also to determine the framework on which binding regulations are based. If it does not do so, it misses its potential and runs the risk of becoming meaningless.
To avoid this, it is necessary not to rely on the voluntary self-regulation of the tech elite, but to declare oneself more independent, in order to combine reflection on morality with reflection on the establishment of the world. Because if digital corporations are penetrating more and more areas of life and are decisively shaping social coexistence through their smart systems, this circumstance should be taken seriously. And think fundamentally about whether the techies, entrepreneurs and engineers alone should decide on the ethical dimensions of their developments - or whether this should not be a democratic, participatory, and thus many-voiced process.
Launch Ceremony for the Adoption of the OECD Recommendation on Artificial Intelligence
22 May 2019, OECD, Paris
http://www.oecd.org/about/secretary-general/launch-ceremony-for-adoption-of-oecd-recommendation-on-ai-paris-may-2019.htm
#OECD #ArtificialIntelligence
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
22 May 2019, OECD, Paris
http://www.oecd.org/about/secretary-general/launch-ceremony-for-adoption-of-oecd-recommendation-on-ai-paris-may-2019.htm
#OECD #ArtificialIntelligence
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
๐บ SensorID
Sensor Calibration Fingerprinting for Smartphones
When you visit a website, your web browser provides a range of information to the website, including the name and version of your browser, screen size, fonts installed, and so on. Ostensibly, this information allows the website to provide a great user experience. Unfortunately this same information can also be used to track you. In particular, this information can be used to generate a distinctive signature, or device fingerprint, to identify you.
๐บ https://sensorid.cl.cam.ac.uk/
#tracking #android #ios #fingerprinting
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Sensor Calibration Fingerprinting for Smartphones
When you visit a website, your web browser provides a range of information to the website, including the name and version of your browser, screen size, fonts installed, and so on. Ostensibly, this information allows the website to provide a great user experience. Unfortunately this same information can also be used to track you. In particular, this information can be used to generate a distinctive signature, or device fingerprint, to identify you.
๐บ https://sensorid.cl.cam.ac.uk/
#tracking #android #ios #fingerprinting
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
๐บ Top 5 "Conspiracy Theories" That Turned Out To Be True
We all know the old trope of the tinfoil hat wearing conspiracy theorist who believes crazy things like "the government is spying on us" and "the military is spraying things in the sky" and "the CIA ships in the drugs." Except those things aren't so crazy after all. Here are five examples of things that were once derided as zany conspiracy paranoia and are now accepted as mundane historical fact.
๐บ https://www.youtube.com/watch?v=wO5oJM8GjWA
๐จ https://www.corbettreport.com/5conspiracies/
๐ก @NoGoolag #corbettreport
https://t.me/NoGoolag/1233
#corbettreport #conspiracy #facts #history #gov #why #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
We all know the old trope of the tinfoil hat wearing conspiracy theorist who believes crazy things like "the government is spying on us" and "the military is spraying things in the sky" and "the CIA ships in the drugs." Except those things aren't so crazy after all. Here are five examples of things that were once derided as zany conspiracy paranoia and are now accepted as mundane historical fact.
๐บ https://www.youtube.com/watch?v=wO5oJM8GjWA
๐จ https://www.corbettreport.com/5conspiracies/
๐ก @NoGoolag #corbettreport
https://t.me/NoGoolag/1233
#corbettreport #conspiracy #facts #history #gov #why #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
๐บ The secret tactics Monsanto used to protect Roundup, its star product
Four Corners investigates the secret tactics used by global chemical giant #Monsanto to protect its billion-dollar business and its star product โ the weed killer, #Roundup
๐บ https://www.youtube.com/watch?v=JszHrMZ7dx4
๐จ https://www.abc.net.au/news/2018-10-08/cancer-council-calls-for-review-amid-roundup-cancer-concerns/10337806
#DeleteMonsanto #DeleteBayer #DeleteRoundup #FourCorners #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Four Corners investigates the secret tactics used by global chemical giant #Monsanto to protect its billion-dollar business and its star product โ the weed killer, #Roundup
๐บ https://www.youtube.com/watch?v=JszHrMZ7dx4
๐จ https://www.abc.net.au/news/2018-10-08/cancer-council-calls-for-review-amid-roundup-cancer-concerns/10337806
#DeleteMonsanto #DeleteBayer #DeleteRoundup #FourCorners #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
๐ง Around the Globe with Financial Survival
James joins Melody Cedarstrom for this wide-ranging edition of Financial Survival. Topics covered include Vietnam and tyranny, big tech regulation and back door globalization, the US-China trade war and false flags in the Persian Gulf.
๐จ https://www.corbettreport.com/around-the-globe-with-financial-survival/
#corbettreport #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
James joins Melody Cedarstrom for this wide-ranging edition of Financial Survival. Topics covered include Vietnam and tyranny, big tech regulation and back door globalization, the US-China trade war and false flags in the Persian Gulf.
๐จ https://www.corbettreport.com/around-the-globe-with-financial-survival/
#corbettreport #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
โฃ๏ธ Chaos Communication Camp 2019 โฃ๏ธ
The Chaos Communication Camp in Mildenberg is an open-air hacker camp and party that takes place every four years, organized by the Chaos Computer Club (CCC). Thousands of hackers, technology freaks, artists and utopians get together for five days in the Brandenburg summer โ to communicate, learn, hack and party together.
We focus on topics such as information technology, digital security, hacking, crafting, making and breaking, and we engage in creative, sceptical discourse on the interaction between technology and society.
Weโd love to see your submission for these tracks:
๐ก Arts & Culture,
๐ก Ethics, Society & Politics,
๐ก Hardware & Making,
๐ก Security & Hacking,
๐ก Science.
Apart from the official conference program on the main stages, the Chaos Communication Camp also offers space for community villages, developer and project meetings, art installations, lightning talks and numerous workshops (called โself-organized sessionsโ).
Dates & deadlines:
๐ก May 22th, 2019: Call for Participation
๐ก June 11th, 2019 (23:59 CEST): Deadline for submissions
๐ก July 10th: Notification of acceptance
๐ก August 21st โ 25th, 2019: Chaos Communication Camp at Ziegeleipark Mildenberg
Submission guidelines for talks:
All lectures need to be submitted to our conference planning system under the following URL:
Please follow the instructions there. If you have any questions regarding the submission, you are welcome to contact us via mail at
Please send us a description of your suggested talk that is as complete as possible. The description is the central criterium for acceptance or rejection, so please ensure that it is as clear and complete as possible. Quality comes before quantity. Due to the non-commercial nature of the event, presentations which aim to market or promote commercial products or entities will be rejected without consideration.
#ccc #camp
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
The Chaos Communication Camp in Mildenberg is an open-air hacker camp and party that takes place every four years, organized by the Chaos Computer Club (CCC). Thousands of hackers, technology freaks, artists and utopians get together for five days in the Brandenburg summer โ to communicate, learn, hack and party together.
We focus on topics such as information technology, digital security, hacking, crafting, making and breaking, and we engage in creative, sceptical discourse on the interaction between technology and society.
Weโd love to see your submission for these tracks:
๐ก Arts & Culture,
๐ก Ethics, Society & Politics,
๐ก Hardware & Making,
๐ก Security & Hacking,
๐ก Science.
Apart from the official conference program on the main stages, the Chaos Communication Camp also offers space for community villages, developer and project meetings, art installations, lightning talks and numerous workshops (called โself-organized sessionsโ).
Dates & deadlines:
๐ก May 22th, 2019: Call for Participation
๐ก June 11th, 2019 (23:59 CEST): Deadline for submissions
๐ก July 10th: Notification of acceptance
๐ก August 21st โ 25th, 2019: Chaos Communication Camp at Ziegeleipark Mildenberg
Submission guidelines for talks:
All lectures need to be submitted to our conference planning system under the following URL:
https://frab.cccv.de/cfp/camp2019.Please follow the instructions there. If you have any questions regarding the submission, you are welcome to contact us via mail at
camp2019-content@cccv.de.Please send us a description of your suggested talk that is as complete as possible. The description is the central criterium for acceptance or rejection, so please ensure that it is as clear and complete as possible. Quality comes before quantity. Due to the non-commercial nature of the event, presentations which aim to market or promote commercial products or entities will be rejected without consideration.
More info:https://events.ccc.de/2019/05/22/call-for-participation-chaos-communication-camp-2019/
#ccc #camp
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
๐บ Interview with Ren Zhengfei, Founder And CEO Of Chinese Telecom Giant Huawei
Ren Zhengfei, founder and CEO of Chinese telecom giant Huawei, spoke to Time on U.S. actions against his company, the security of Huawei's product, his daughter and Huawei CFO's arrest, President Donald Trump and 5G technology.
๐บ https://www.youtube.com/watch?v=Nl2jCWDwE8w
#china #huawei #founder #interview #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Ren Zhengfei, founder and CEO of Chinese telecom giant Huawei, spoke to Time on U.S. actions against his company, the security of Huawei's product, his daughter and Huawei CFO's arrest, President Donald Trump and 5G technology.
๐บ https://www.youtube.com/watch?v=Nl2jCWDwE8w
#china #huawei #founder #interview #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
US authorities want to intercept telecommunications in Europe
The FBI could soon legally demand sensitive communication data from European Internet service providers, possibly in real time. In doing so, the European Union wants to make the Trump administration more inclined to be allowed to query "electronic evidence" directly on Facebook & Co. in return.
The EU Commission wants to negotiate an agreement with the US government that will force European Union-based Internet service providers to cooperate more with US authorities. The companies would have to grant police and secret services from the USA access to the communication of their users. European prosecutors would then also be able to issue an order for publication directly on Facebook, Apple and other Internet giants. The legal process via the judicial authorities that has been customary up to now is to be dropped. https://ec.europa.eu/info/policies/justice-and-fundamental-rights/criminal-justice/e-evidence-cross-border-access-electronic-evidence_de
The plans are part of the "E-Evidence" regulation, with which the EU wants to facilitate the publication of "electronic evidence". According to a recently published draft, this includes user data (name, date of birth, postal address, telephone number), access data (date and time of use, IP address), transaction data (transmission and reception data, location of the device, protocol used) and content data.
Agreement on implementation with the US Government
The planned EU regulation is limited to companies domiciled in the European Union. But because most of the coveted data is stored in the USA, the EU Commission is planning an implementation agreement with the US government. This would be possible within the framework of the "CLOUD Act", which the US government enacted last year. It obliges companies established in the USA to disclose inventory, traffic and content data if this appears necessary for criminal prosecution or averting danger.
The CLOUD Act also allows third countries to issue orders to US companies. An agreement necessary for this must be based on reciprocity and thus allow the US government access to companies in the partner countries. The Trump administration, however, demands a concession to be able to listen to content data in real time. Companies based in the EU would then have to transfer this data directly to US authorities.
#USA #FBI #EU #government #surveillance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
The FBI could soon legally demand sensitive communication data from European Internet service providers, possibly in real time. In doing so, the European Union wants to make the Trump administration more inclined to be allowed to query "electronic evidence" directly on Facebook & Co. in return.
The EU Commission wants to negotiate an agreement with the US government that will force European Union-based Internet service providers to cooperate more with US authorities. The companies would have to grant police and secret services from the USA access to the communication of their users. European prosecutors would then also be able to issue an order for publication directly on Facebook, Apple and other Internet giants. The legal process via the judicial authorities that has been customary up to now is to be dropped. https://ec.europa.eu/info/policies/justice-and-fundamental-rights/criminal-justice/e-evidence-cross-border-access-electronic-evidence_de
The plans are part of the "E-Evidence" regulation, with which the EU wants to facilitate the publication of "electronic evidence". According to a recently published draft, this includes user data (name, date of birth, postal address, telephone number), access data (date and time of use, IP address), transaction data (transmission and reception data, location of the device, protocol used) and content data.
Agreement on implementation with the US Government
The planned EU regulation is limited to companies domiciled in the European Union. But because most of the coveted data is stored in the USA, the EU Commission is planning an implementation agreement with the US government. This would be possible within the framework of the "CLOUD Act", which the US government enacted last year. It obliges companies established in the USA to disclose inventory, traffic and content data if this appears necessary for criminal prosecution or averting danger.
The CLOUD Act also allows third countries to issue orders to US companies. An agreement necessary for this must be based on reciprocity and thus allow the US government access to companies in the partner countries. The Trump administration, however, demands a concession to be able to listen to content data in real time. Companies based in the EU would then have to transfer this data directly to US authorities.
More info:https://netzpolitik.org/2019/us-behoerden-wollen-telekommunikation-in-europa-abhoeren/
#USA #FBI #EU #government #surveillance
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Meet Doggo: Stanford's student built, four-legged robot
Putting their own twist on robots that amble through complicated landscapes, the Stanford Student Robotics clubโs Extreme Mobility team at Stanford University has developed a four-legged robot that is not only capable of performing acrobatic tricks and traversing challenging terrain but is also designed with reproducibility in mind. Anyone who wants their own version of the robot, dubbed Stanford Doggo, can consult comprehensive plans, code and a supply list that the students have made freely available online:
https://github.com/Nate711/StanfordDoggoProject
https://docs.google.com/spreadsheets/d/1MQRoZCfsMdJhHQ-ht6YvhzNvye6xDXO8vhWQql2HtlI/edit#gid=726381752
http://roboticsclub.stanford.edu/
๐บ https://www.youtube.com/watch?v=2E82o2pP9Jo
#doggo #robotic #opensource #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Putting their own twist on robots that amble through complicated landscapes, the Stanford Student Robotics clubโs Extreme Mobility team at Stanford University has developed a four-legged robot that is not only capable of performing acrobatic tricks and traversing challenging terrain but is also designed with reproducibility in mind. Anyone who wants their own version of the robot, dubbed Stanford Doggo, can consult comprehensive plans, code and a supply list that the students have made freely available online:
https://github.com/Nate711/StanfordDoggoProject
https://docs.google.com/spreadsheets/d/1MQRoZCfsMdJhHQ-ht6YvhzNvye6xDXO8vhWQql2HtlI/edit#gid=726381752
http://roboticsclub.stanford.edu/
๐บ https://www.youtube.com/watch?v=2E82o2pP9Jo
#doggo #robotic #opensource #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Itโs the middle of the night. Do you know who your iPhone is talking to?
Apple says, โWhat happens on your iPhone stays on your iPhone.โ Our privacy experiment showed 5,400 hidden app trackers guzzled our data โ in a single week.
Itโs 3 a.m. Do you know what your iPhone is doing?
Mine has been alarmingly busy. Even though the screen is off and Iโm snoring, apps are beaming out lots of information about me to companies Iโve never heard of. Your iPhone probably is doing the same โ and Apple could be doing more to stop it.
On a recent Monday night, a dozen marketing companies, research firms and other personal data guzzlers got reports from my iPhone. At 11:43 p.m., a company called Amplitude learned my phone number, email and exact location. At 3:58 a.m., another called Appboy got a digital fingerprint of my phone. At 6:25 a.m., a tracker called Demdex received a way to identify my phone and sent back a list of other trackers to pair up with.
And all night long, there was some startling behavior by a household name: Yelp. It was receiving a message that included my IP address -โ once every five minutes.
Our data has a secret life in many of the devices we use every day, from talking Alexa speakers to smart TVs. But weโve got a giant blind spot when it comes to the data companies probing our phones.
You might assume you can count on Apple to sweat all the privacy details. After all, it touted in a recent ad, โWhat happens on your iPhone stays on your iPhone.โ My investigation suggests otherwise.
IPhone apps I discovered tracking me by passing information to third parties โ just while I was asleep โ include Microsoft OneDrive, Intuitโs Mint, Nike, Spotify, The Washington Post and IBMโs the Weather Channel. One app, the crime-alert service Citizen, shared personally identifiable information in violation of its published privacy policy.
And your iPhone doesnโt only feed data trackers while you sleep. In a single week, I encountered over 5,400 trackers, mostly in apps, not including the incessant Yelp traffic. According to privacy firm Disconnect, which helped test my iPhone, those unwanted trackers would have spewed out 1.5 gigabytes of data over the span of a month. Thatโs half of an entire basic wireless service plan from AT&T.
โThis is your data. Why should it even leave your phone? Why should it be collected by someone when you donโt know what theyโre going to do with it?โ says Patrick Jackson, a former National Security Agency researcher who is chief technology officer for Disconnect. He hooked my iPhone into special software so we could examine the traffic. โI know the value of data, and I donโt want mine in any hands where it doesnโt need to be,โ he told me.
Read more:
https://www.washingtonpost.com/technology/2019/05/28/its-middle-night-do-you-know-who-your-iphone-is-talking
#apple #iphone #trackers #datamining #privacy #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Apple says, โWhat happens on your iPhone stays on your iPhone.โ Our privacy experiment showed 5,400 hidden app trackers guzzled our data โ in a single week.
Itโs 3 a.m. Do you know what your iPhone is doing?
Mine has been alarmingly busy. Even though the screen is off and Iโm snoring, apps are beaming out lots of information about me to companies Iโve never heard of. Your iPhone probably is doing the same โ and Apple could be doing more to stop it.
On a recent Monday night, a dozen marketing companies, research firms and other personal data guzzlers got reports from my iPhone. At 11:43 p.m., a company called Amplitude learned my phone number, email and exact location. At 3:58 a.m., another called Appboy got a digital fingerprint of my phone. At 6:25 a.m., a tracker called Demdex received a way to identify my phone and sent back a list of other trackers to pair up with.
And all night long, there was some startling behavior by a household name: Yelp. It was receiving a message that included my IP address -โ once every five minutes.
Our data has a secret life in many of the devices we use every day, from talking Alexa speakers to smart TVs. But weโve got a giant blind spot when it comes to the data companies probing our phones.
You might assume you can count on Apple to sweat all the privacy details. After all, it touted in a recent ad, โWhat happens on your iPhone stays on your iPhone.โ My investigation suggests otherwise.
IPhone apps I discovered tracking me by passing information to third parties โ just while I was asleep โ include Microsoft OneDrive, Intuitโs Mint, Nike, Spotify, The Washington Post and IBMโs the Weather Channel. One app, the crime-alert service Citizen, shared personally identifiable information in violation of its published privacy policy.
And your iPhone doesnโt only feed data trackers while you sleep. In a single week, I encountered over 5,400 trackers, mostly in apps, not including the incessant Yelp traffic. According to privacy firm Disconnect, which helped test my iPhone, those unwanted trackers would have spewed out 1.5 gigabytes of data over the span of a month. Thatโs half of an entire basic wireless service plan from AT&T.
โThis is your data. Why should it even leave your phone? Why should it be collected by someone when you donโt know what theyโre going to do with it?โ says Patrick Jackson, a former National Security Agency researcher who is chief technology officer for Disconnect. He hooked my iPhone into special software so we could examine the traffic. โI know the value of data, and I donโt want mine in any hands where it doesnโt need to be,โ he told me.
Read more:
https://www.washingtonpost.com/technology/2019/05/28/its-middle-night-do-you-know-who-your-iphone-is-talking
#apple #iphone #trackers #datamining #privacy #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
All for all - and Assange against all
Julian Assange is the only anarchist who has made world politics in the 21st century. In London he must go to court - and with him the ideas of hacker culture.
80c11049faebf441d524fb3c4cd5351c: American soldier Chelsea Manning types this character combination into a chat on March 8, 2010. It is a so-called hash value, the encrypted form of a password. Manning wants to open another door in the army's computer system from which she forwards internal documents to Wikileaks. But she can't crack the hash, hopes for her chat partner, and according to the US Department of Justice the name is Julian Assange. But even the Wikileaks founder and his team are unable to decipher the hash.
The very moment when Assange's hacking skills fail is his doom.
This Thursday, the most famous face that hacker culture has produced will be on trial in London. It is about Assange's extradition to his arch-enemy, the United States of America. The accusation: espionage as Manning's accomplice. Depending on one's point of view, this does not only call into question freedom of the press. The basic conviction of an increasingly influential subculture is also being negotiated: that all information must be freed from dark computer memories and all knowledge of domination must be removed. Everything for everyone. Assange is the only anarchist who made world politics in the 21st century.
The term "hacker" first appeared in the USA in the 1950s and has little to do with political ideas. The first mainframe computers still programmed with punched cards are found in universities. The early hackers did not want to invade foreign computer systems - there are hardly any of them yet. They want to extend the functions of computers. The word "hack" initially means solving a technical problem. In the "Tech Model Railroad Club", a model railway club at the Massachusetts Institute of Technology, the first hackers are working on improving track circuits.
Chip technology later replaced the transistor computer, computers became smaller and more affordable for private individuals. But because there were no graphical user interfaces until the 1980s, as is the case today in Windows or smartphones, owners must at least be able to program a little. To this day, movies present hacking as a superhuman skill. As an X-ray view that perceives what happens under the smooth surfaces of the devices and in nanometer-sized chip parts. Historian Julia Gรผl Erdogan sees things differently. She says: "The goal of the early hackers was to demystify computer technology. They wanted to understand and master their new machines." Erdogan is doing his doctorate at the Centre for Contemporary Historical Research in Potsdam on hacker cultures in the FRG and GDR.
In 1984, US journalist Steven Levy formulated the so-called "hacker ethics" in the foreword to his book "Hackers". His main concern is free access to computers and knowledge. And mistrust of authorities. It is the spirit that drives Assange since he invaded military networks from his native Australia in the early 1990s. A spirit that at some point leads to his very personal hatred of foreign policy "hawks" like Hillary Clinton.
Early on in the scene, some discover the computer as a political tool. Since the 1980s, the Free Software movement has demanded that people have control over the programs they use at all times, and can change them at any time. Other hackers realize that money can be made with their knowledge. Bill Gates hacks university computers as a student, Steve Jobs and Steve Wozniak also manipulate telephone circuits by sending whistling tones at a certain frequency over the line (phreaking). Their companies Microsoft and Apple later set out to conquer the world.
Julian Assange is the only anarchist who has made world politics in the 21st century. In London he must go to court - and with him the ideas of hacker culture.
80c11049faebf441d524fb3c4cd5351c: American soldier Chelsea Manning types this character combination into a chat on March 8, 2010. It is a so-called hash value, the encrypted form of a password. Manning wants to open another door in the army's computer system from which she forwards internal documents to Wikileaks. But she can't crack the hash, hopes for her chat partner, and according to the US Department of Justice the name is Julian Assange. But even the Wikileaks founder and his team are unable to decipher the hash.
The very moment when Assange's hacking skills fail is his doom.
This Thursday, the most famous face that hacker culture has produced will be on trial in London. It is about Assange's extradition to his arch-enemy, the United States of America. The accusation: espionage as Manning's accomplice. Depending on one's point of view, this does not only call into question freedom of the press. The basic conviction of an increasingly influential subculture is also being negotiated: that all information must be freed from dark computer memories and all knowledge of domination must be removed. Everything for everyone. Assange is the only anarchist who made world politics in the 21st century.
The term "hacker" first appeared in the USA in the 1950s and has little to do with political ideas. The first mainframe computers still programmed with punched cards are found in universities. The early hackers did not want to invade foreign computer systems - there are hardly any of them yet. They want to extend the functions of computers. The word "hack" initially means solving a technical problem. In the "Tech Model Railroad Club", a model railway club at the Massachusetts Institute of Technology, the first hackers are working on improving track circuits.
Chip technology later replaced the transistor computer, computers became smaller and more affordable for private individuals. But because there were no graphical user interfaces until the 1980s, as is the case today in Windows or smartphones, owners must at least be able to program a little. To this day, movies present hacking as a superhuman skill. As an X-ray view that perceives what happens under the smooth surfaces of the devices and in nanometer-sized chip parts. Historian Julia Gรผl Erdogan sees things differently. She says: "The goal of the early hackers was to demystify computer technology. They wanted to understand and master their new machines." Erdogan is doing his doctorate at the Centre for Contemporary Historical Research in Potsdam on hacker cultures in the FRG and GDR.
In 1984, US journalist Steven Levy formulated the so-called "hacker ethics" in the foreword to his book "Hackers". His main concern is free access to computers and knowledge. And mistrust of authorities. It is the spirit that drives Assange since he invaded military networks from his native Australia in the early 1990s. A spirit that at some point leads to his very personal hatred of foreign policy "hawks" like Hillary Clinton.
Early on in the scene, some discover the computer as a political tool. Since the 1980s, the Free Software movement has demanded that people have control over the programs they use at all times, and can change them at any time. Other hackers realize that money can be made with their knowledge. Bill Gates hacks university computers as a student, Steve Jobs and Steve Wozniak also manipulate telephone circuits by sending whistling tones at a certain frequency over the line (phreaking). Their companies Microsoft and Apple later set out to conquer the world.
So the hacker himself has always been an ambivalent figure. A system malfunctioner that makes the system better. The "penetration test", an attack on a network to find weaknesses in the defense, today means a livelihood for those hackers who then call themselves "IT security experts". But it is precisely because the hacker and his work are usually invisible that they inspire collective fantasies. The penetration of computer systems by dark powers is part of pop culture.
A decisive experience for the Federal Republic: the so-called KGB Hack
Hackers in fictitious works today are above all gloomy, like Elliot Alderson (Rami Malek), who sabotages an overpowering corporation in Mr Robot as a torn drug addict. Thanks to advisors from the scene, the series is one of the few depictions with which experts are satisfied: with digital attack techniques that really exist and without squeaky colorful visualizations of computer viruses. Assange himself probably inspired the figure of the sex-fixed transparency guru Andreas Wolf in Jonathan Franzens novel "Innocence", and James Bond's opponent in "Skyfall".
The paths to hacking are different, Beau Woods describes his as follows: "In college, people sometimes do things that annoy, and then you just want to wipe out their computers." The American works for think tanks and his NGO "i am the cavalry", which is supposed to bring hackers together with the rest of society. The black hoodie, he assures the meeting at the digital conference SXSW in Austin, he only wears ironically. It was his speciality to suddenly let foreign CD-Rom drives open from a distance.
In Germany, the Chaos Computer Club (CCC) has been making a name for itself as a group of experts since the 1980s. A decisive experience for the Federal Republic of Germany is the so-called KGB hack, which became public in 1989: A group from Hanover sold information from US-American servers to the Soviet secret service. A television program spoke of the "biggest espionage case since Guillaume", even though the information sold was anything but explosive. In public perception, however, fears of a networked world have since been linked to the practices of hackers, explains historian Erdogan.
In contrast, the actions of the "white hats", the hackers on the bright side who, unlike criminal "black hats", do not want to harm anyone, are fading. During the 1984 BTX hack, CCC members were able to access the Hamburger Sparkasse and theoretically make it about 135,000 marks easier. Theoretically, because the CCC kept the hacking largely in legal tracks and emphasized the social responsibility of the scene. The members come from an alternative left-wing milieu, from the civil rights and peace movement, which are actually considered critical of technology. But they fear the surveillance state and oppose, for example, the telecommunications monopoly of the Federal Post Office, says Erdogan.
Hacking is also taking place in the GDR. While more than three million home computers and consoles were sold in West Germany in 1986, they were rare in socialist Germany. The imported Western technology was expensive, there were only a few GDR models. The largest and best known club was the one in the House of Young Talents in East Berlin. In 1987 there were two Commodore 64 and one Atari 130 XL. The Stasi supervised the meetings, says Erdogan. Private online communication was not possible in the GDR.
For Beau Woods, hackers trigger a primeval fear of industrial society
In the 21st century, culture's detachment from the state and idealism are put to the test. Blackmailing software that cripples victims' computers until they pay is becoming increasingly lucrative. Facebook and Google offer the best experts astronomical sums to protect their products. At the most important hacker conference, the Black Hat in Las Vegas, NSA agents bring along an Enigma machine from the Wehrmacht. They wanted to bait and recruit hackers through their love of encryption and decryption.
A decisive experience for the Federal Republic: the so-called KGB Hack
Hackers in fictitious works today are above all gloomy, like Elliot Alderson (Rami Malek), who sabotages an overpowering corporation in Mr Robot as a torn drug addict. Thanks to advisors from the scene, the series is one of the few depictions with which experts are satisfied: with digital attack techniques that really exist and without squeaky colorful visualizations of computer viruses. Assange himself probably inspired the figure of the sex-fixed transparency guru Andreas Wolf in Jonathan Franzens novel "Innocence", and James Bond's opponent in "Skyfall".
The paths to hacking are different, Beau Woods describes his as follows: "In college, people sometimes do things that annoy, and then you just want to wipe out their computers." The American works for think tanks and his NGO "i am the cavalry", which is supposed to bring hackers together with the rest of society. The black hoodie, he assures the meeting at the digital conference SXSW in Austin, he only wears ironically. It was his speciality to suddenly let foreign CD-Rom drives open from a distance.
In Germany, the Chaos Computer Club (CCC) has been making a name for itself as a group of experts since the 1980s. A decisive experience for the Federal Republic of Germany is the so-called KGB hack, which became public in 1989: A group from Hanover sold information from US-American servers to the Soviet secret service. A television program spoke of the "biggest espionage case since Guillaume", even though the information sold was anything but explosive. In public perception, however, fears of a networked world have since been linked to the practices of hackers, explains historian Erdogan.
In contrast, the actions of the "white hats", the hackers on the bright side who, unlike criminal "black hats", do not want to harm anyone, are fading. During the 1984 BTX hack, CCC members were able to access the Hamburger Sparkasse and theoretically make it about 135,000 marks easier. Theoretically, because the CCC kept the hacking largely in legal tracks and emphasized the social responsibility of the scene. The members come from an alternative left-wing milieu, from the civil rights and peace movement, which are actually considered critical of technology. But they fear the surveillance state and oppose, for example, the telecommunications monopoly of the Federal Post Office, says Erdogan.
Hacking is also taking place in the GDR. While more than three million home computers and consoles were sold in West Germany in 1986, they were rare in socialist Germany. The imported Western technology was expensive, there were only a few GDR models. The largest and best known club was the one in the House of Young Talents in East Berlin. In 1987 there were two Commodore 64 and one Atari 130 XL. The Stasi supervised the meetings, says Erdogan. Private online communication was not possible in the GDR.
For Beau Woods, hackers trigger a primeval fear of industrial society
In the 21st century, culture's detachment from the state and idealism are put to the test. Blackmailing software that cripples victims' computers until they pay is becoming increasingly lucrative. Facebook and Google offer the best experts astronomical sums to protect their products. At the most important hacker conference, the Black Hat in Las Vegas, NSA agents bring along an Enigma machine from the Wehrmacht. They wanted to bait and recruit hackers through their love of encryption and decryption.
For Beau Woods, hackers trigger a primal fear of industrial society. They are the opponents of the established heroes of modernity: "Scientists and engineers tame nature, of which humans have always been afraid. Thousands of years ago, the king of the Assyrians is said to have gone into the wilderness and killed lions because humans killed them. Later, engineers would have built roads through nature and put them in order with machines. "But now there are people, hackers, who can manipulate the machines of the engineers at will, let them do their will." That irritates people. Woods says others see him like this: "The wizards have created the smartphone, but you surpass them because you can break into what they have created."
Those who have such abilities can afford a bit of arrogance. The punch line at the end of the groundbreaking "Hacker Manifesto" of 1986 is: "My crime is that I'm smarter than you, which you'll never forgive me for." A sentence like an autobiography of Julian Assange.
https://www.sueddeutsche.de/digital/julian-assange-hacker-it-sicherheit-1.4467914
#FreeAssange
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Those who have such abilities can afford a bit of arrogance. The punch line at the end of the groundbreaking "Hacker Manifesto" of 1986 is: "My crime is that I'm smarter than you, which you'll never forgive me for." A sentence like an autobiography of Julian Assange.
https://www.sueddeutsche.de/digital/julian-assange-hacker-it-sicherheit-1.4467914
#FreeAssange
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
๐บ Unboxing Social Data Algorithms - #facebook #tracking #exposed
Today I want to talk about a project named ALEX, which is the acronym for Algorithm Exposed, and one of its first output: a tool for scientific analysis of the social network personalisation algorithm, that we call fbtrex, Facebook-tracking-exposed. It works by collecting what Facebook sends to you, as your timeline. Because is personalised, it can be obtained as evidence and used to understand the algorithm logic.
๐บ Claudio Agosti @ transmediale 2019b #video #podcast
https://2019.transmediale.de/content/affects-ex-machina-unboxing-social-data-algorithms
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Today I want to talk about a project named ALEX, which is the acronym for Algorithm Exposed, and one of its first output: a tool for scientific analysis of the social network personalisation algorithm, that we call fbtrex, Facebook-tracking-exposed. It works by collecting what Facebook sends to you, as your timeline. Because is personalised, it can be obtained as evidence and used to understand the algorithm logic.
๐บ Claudio Agosti @ transmediale 2019b #video #podcast
https://2019.transmediale.de/content/affects-ex-machina-unboxing-social-data-algorithms
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
FOTN_2018_Final Booklet_11_1_2018.pdf
8.4 MB
Freedom on the Net 2018
The Rise of Digital Authoritarianism
This booklet is a summary of findings for the 2018 edition of Freedom on the Net. Narrative reports of the 65 countries assessed in this yearโs study and a full list of contributors can be found on our website at www.freedomonthenet.org
https://freedomhouse.org/sites/default/files/FOTN_2018_Final%20Booklet_11_1_2018.pdf
#thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
The Rise of Digital Authoritarianism
This booklet is a summary of findings for the 2018 edition of Freedom on the Net. Narrative reports of the 65 countries assessed in this yearโs study and a full list of contributors can be found on our website at www.freedomonthenet.org
https://freedomhouse.org/sites/default/files/FOTN_2018_Final%20Booklet_11_1_2018.pdf
#thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Forwarded from cRyPtHoNโข INFOSEC (DE)
๐บ Error 451: Unavailable for leagl reasons - Jetzt im Livestream - Gulaschprogrammiernacht 19
Die GPN ist ein vom Entropia e. V. โ Chaos Computer Club (CCC) veranstalteter Kongress, der sich als eine Hackveranstaltung mit dem Fokus auf Programmieren, Basteln und kreatives Schaffen versteht. Wรคhrend die KonferenzteilnehmerInnen an ihren Projekten arbeiten und Ideen austauschen, kรถnnen sich interessierte Gรคste in lockerer Atmosphรคre รผber diese informieren und die Vortrรคge besuchen. Der Schwerpunkt liegt im Bereich IT/Technik, aber auch andere Themenbereichen wie Gesellschaft, Kunst oder Philosophie werden angesprochen. Der Name ist Programm: Es wird Gulasch in groรen Mengen gereicht.
๐บ Error 451 #CCC #Video #Livestream
https://streaming.media.ccc.de/gpn19/medientheater
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Die GPN ist ein vom Entropia e. V. โ Chaos Computer Club (CCC) veranstalteter Kongress, der sich als eine Hackveranstaltung mit dem Fokus auf Programmieren, Basteln und kreatives Schaffen versteht. Wรคhrend die KonferenzteilnehmerInnen an ihren Projekten arbeiten und Ideen austauschen, kรถnnen sich interessierte Gรคste in lockerer Atmosphรคre รผber diese informieren und die Vortrรคge besuchen. Der Schwerpunkt liegt im Bereich IT/Technik, aber auch andere Themenbereichen wie Gesellschaft, Kunst oder Philosophie werden angesprochen. Der Name ist Programm: Es wird Gulasch in groรen Mengen gereicht.
๐บ Error 451 #CCC #Video #Livestream
https://streaming.media.ccc.de/gpn19/medientheater
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
๐บ The Dark History of the Minimum Wage
Thereโs something strange about the idea of a minimum wage. Itโs one of those subjects that everyone has a strong opinion about, even if they have no idea what makes actual economic sense. But perhaps the most surprising thing of all is that the minimum wage has a dirty secret that most economists donโt want you to know about. Today we explore The Dark History of the Minimum Wage.
๐บ https://www.corbettreport.com/the-dark-history-of-the-minimum-wage/
#corbettreport #why #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Thereโs something strange about the idea of a minimum wage. Itโs one of those subjects that everyone has a strong opinion about, even if they have no idea what makes actual economic sense. But perhaps the most surprising thing of all is that the minimum wage has a dirty secret that most economists donโt want you to know about. Today we explore The Dark History of the Minimum Wage.
๐บ https://www.corbettreport.com/the-dark-history-of-the-minimum-wage/
#corbettreport #why #video #podcast
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Audit-Protokoll-Analysis with Palantir Gotham
๐บ https://archive.org/details/youtube-i4f381YNQdQ
#BigData #surveillance #police #eu #palantir #software #gotham #peterthiel #ebay
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
๐บ https://archive.org/details/youtube-i4f381YNQdQ
#BigData #surveillance #police #eu #palantir #software #gotham #peterthiel #ebay
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN