• +598 29008192
  • info@servinfo.com.uy

Archivo del Autor: Belen De Leon

Citing monkey business, court refuses to toss simian selfie lawsuit

Who owns the rights to an image taken by a monkey? Although an agreement was reached between the photographer and PETA, the court says there are other issues to consider in the “monkey selfie” copyright case..

The post Citing monkey business, court refuses to toss simian selfie lawsuit appeared first on Digital Trends.

Source: Digital trends

Acer Nitro 5 Spin vs. Dell XPS 15 2-in-1

Acer’s Nitro 5 Spin tries its hardest to be both a good convertible 2-in-1 and a legit gaming notebook. It’s not the first laptop to make that attempt, so let’s check out our comparison to see if Dell’s XPS 15 2-in-1 beat it at either game.

The post Acer Nitro 5 Spin vs. Dell XPS 15 2-in-1 appeared first on Digital Trends.

Source: Digital trends

Anybody out there still listening to music on AM or FM radio? – CNET

Radio isn’t dead yet, but its future isn’t exactly healthy.
Source: CNET

NASA’s planet-hunting TESS telescope launches Monday aboard a SpaceX rocket

Some of the most exciting space news of the past few years has been about Earth-like exoplanets that could one day (or perhaps already do) support life. TESS, a space telescope set to launch Monday aboard a SpaceX Falcon 9 rocket, will scan the sky for exoplanets faster and better than any existing platforms, expanding our knowledge of the universe and perhaps finding a friendly neighborhood to move to.

The Transit Exoplanet Survey Satellite has been in the works for years and in a way could be considered a sort of direct successor to the Kepler, the incredibly fruitful mission that has located thousands of exoplanets over nearly a decade.

But if Kepler was a telephoto aimed at dim targets far in the distance, TESS is an ultra-wide-angle lens that will watch nearly the entire visible sky.

They both work on the same principle, which is really quite simple: when a planet (or anything else) passes between us and a star (a “transit”), the brightness of that star temporarily dims. By tracking how much dimmer and for how long over multiple transits, scientists can determine the size, speed, and other characteristics of the body that passed by.

It may seem like looking for a needle in a haystack, watching the sky hoping a planet will pass by at just the right moment. But when you think about the sheer number of stars in the sky — and by the way, planets outnumber them — it’s not so crazy. As evidence of this fact, in 2016 Kepler confirmed the presence of 1,284 new planets just in the tiny patch of sky it was looking at.

TESS will watch for the same thing with a much, much broader perspective.

Its camera array has four 16.4-megapixel imaging units, each covering a square of sky 24 degrees across, making for a tall “segment” of the sky like a long Tetris block. The satellite will spend full 13.7-day orbits observing a segment, then move on to the next one. There are 13 such segments in the sky’s Northern hemisphere and 13 in the southern; by the time TESS has focused on them all, it will have checked 85 percent of the visible sky.

The little yellow patches are Kepler’s various fields of view.

It will be focusing on the brightest stars in our neighborhood: less than 300 light-years away and 30 to 100 times as bright as the ones Kepler was looking at. The more light, the more data, and often the less noise — researchers will be able to tell more about stars that are observed, and if necessary dedicate other ground or space resources towards observing them.

“TESS is opening a door for a whole new kind of study,” said Stephen Rinehart, one of the TESS project scientists, in a NASA release. “We’re going to be able study individual planets and start talking about the differences between planets. The targets TESS finds are going to be fantastic subjects for research for decades to come. It’s the beginning of a new era of exoplanet research.”

TESS being checked pre-launch; engineers included for scale.

Of course, with such close and continuous scrutiny of hundreds of thousands of stars, other interesting behaviors may be observed and passed on to the right mission or observatory. Stars flaring or going supernova, bursts of interesting radiation, and other events could very well occur.

In fact, an overlapping area of observation above each of Earth’s poles will be seen for a whole year straight, increasing the likelihood of catching some rare phenomenon.

But the best part of all may be that many of the stars observed will be visible to the naked eye. As Rinehart puts it: “The cool thing about TESS is that one of these days I’ll be able to go out in the country with my daughter and point to a star and say ‘there’s a planet around that one.’”

The launch on Monday will take place at Space Launch Complex 40 in Cape Canaveral. Once it safely enters space, the craft will receive a timely gravitational assist from the moon, which will insert it into a highly eccentric orbit that brings it close to earth about every two weeks.

“The moon and the satellite are in a sort of dance,” said Joel Villasenor, an MIT researcher and instrument scientist for TESS. “The moon pulls the satellite on one side, and by the time TESS completes one orbit, the moon is on the other side tugging in the opposite direction. The overall effect is the moon’s pull is evened out, and it’s a very stable configuration over many years. Nobody’s done this before, and I suspect other programs will try to use this orbit later on.”

This unique orbit maximizes the sky that TESS can see, minimizes the effect of the moon’s pull, and regularly brings it close enough to send data home for a short period. So we can expect a sort of biweekly drip-drip of exoplanet news for quite some time.

SpaceX is the launch partner, and the Falcon 9 rocket on which it will ride into orbit has already been test fired. TESS is packaged up and ready to go, as you see at right. Currently the launch is planned for a 30-second window at 6:32 Florida time; if for some reason they miss that window, they’ll have to wait until the moon comes round again — a March 20 launch was already canceled.

You’ll be able to watch the launch live, of course; I’ll add a link as soon as it’s available.

Source: TechCrunch

How to save your privacy from the Internet’s clutches

Another week, another massive privacy scandal. When it’s not Facebook admitting it allowed data on as many as 87 million users to be sucked out by a developer on its platform who sold it to a political consultancy working for the Trump campaign, or dating app Grindr ‘fessing up to sharing its users’ HIV status with third party A/B testers, some other ugly facet of the tech industry’s love affair with tracking everything its users do slides into view.

Suddenly, Android users discover to their horror that Google’s mobile platform tells the company where they are all the time — thanks to baked-in location tracking bundled with Google services like Maps and Photos. Or Amazon Echo users realize Jeff Bezos’ ecommerce empire has amassed audio recordings of every single interaction they’ve had with their cute little smart speaker.

The problem, as ever with the tech industry’s teeny-weeny greyscaled legalise, is that the people it refers to as “users” aren’t genuinely consenting to having their information sucked into the cloud for goodness knows what. Because they haven’t been given a clear picture of what agreeing to share their data will really mean.

Instead one or two select features, with a mote of user benefit, tend to be presented at the point of sign up — to socially engineer ‘consent’. Then the company can walk away with a defacto license to perpetually harvest that person’s data by claiming that a consent box was once ticked.

A great example of that is Facebook’s Nearby Friends. The feature lets you share your position with your friends so — and here’s that shiny promise — you can more easily hang out with them. But do you know anyone who is actively using this feature? Yet millions of people started sharing their exact location with Facebook for a feature that’s now buried and mostly unused. Meanwhile Facebook is actively using your location to track your offline habits so it can make money targeting you with adverts.

Terms & Conditions are the biggest lie in the tech industry, as we’ve written before. (And more recently: It was not consent, it was concealment.)

Senator Kennedy of Louisiana also made the point succinctly to Facebook founder Mark Zuckerberg this week, telling him to his face: “Your user agreement sucks.” We couldn’t agree more.

Happily disingenuous T&Cs are on borrowed time — at least for European tech users, thanks to a new European Union data protection framework that will come into force next month. The GDPR tightens consent requirements — mandating clear and accurate information be provided to users at the point of sign up. Data collection is also more tightly tied to specific function.

From next month, holding onto personal data without a very good reason to do so will be far more risky — because GDPR is also backed up with a regime of supersized fines that are intended to make privacy rules much harder to ignore.

Of course U.S. tech users can’t bank on benefiting from European privacy regulations. And while there are now growing calls in the country for legislation to protect people’s data — in a bid to steer off the next democracy-denting Cambridge Analytica scandal, at very least — any such process will take a lot of political will.

It certainly will not happen overnight. And you can expect tech giants to fight tooth and nail against laws being drafted and passed — as indeed Facebook, Google and others lobbied fiercely to try to get GDPR watered down.

Facebook has already revealed it will not be universally applying the European regulation — which means people in North America are likely to get a degree of lower privacy than Facebook users everywhere else in the world. Which doesn’t exactly sound fair.

When it comes to privacy, some of you may think you have nothing to hide. But that’s a straw man. It’s especially hard to defend this line of thinking now that big tech companies have attracted so much soft power they can influence elections, inflame conflicts and divide people in general. It’s time to think about the bigger impact of technology on the fabric of society, and not just your personal case.

Shifting the balance

So what can Internet users do right now to stop tech giants, advertisers and unknown entities tracking everything you do online — and trying to join the dots of your digital activity to paint a picture of who they think you are? At least, everything short of moving to Europe, where privacy is a fundamental right.

There are some practical steps you can take to limit day-to-day online privacy risks by reducing third party access to your information and shielding more of your digital activity from prying eyes.

Not all these measures are appropriate for every person. It’s up to you to determine how much effort you want (or need) to put in to shield your privacy.

You may be happy to share a certain amount of personal data in exchange for access to a certain service, for example. But even then it’s unlikely that the full trade-off has been made clear to you. So it’s worth asking yourself if you’re really getting a good deal.

Once people’s eyes are opened to the fine-grained detail and depth of personal information being harvested, even some very seasoned tech users have reacted with shock — saying they had no idea, for example, that Facebook Messenger was continuously uploading their phone book and logging their calls and SMS metadata.

This is one of the reasons why the U.K.’s information commissioner has been calling for increased transparency about how and why data flows. Because for far too long tech savvy entities have been able to apply privacy hostile actions in the dark. And it hasn’t really been possible for the average person to know what’s being done with their information. Or even what data they are giving up when they click ‘I agree’.

Why does an A/B testing firm need to know a person’s HIV status? Why does a social network app need continuous access to your call history? Why should an ad giant be able to continuously pin your movements on a map?

Are you really getting so much value from an app that you’re happy for the company behind it and anyone else they partner with to know everywhere you go, everyone you talk to, the stuff you like and look at — even to have a pretty good idea what you’re thinking?

Every data misuse scandal shines a bit more light on some very murky practices — which will hopefully generate momentum for rule changes to disinfect data handling processes and strengthen individuals’ privacy by spotlighting trade-offs that have zero justification.

With some effort — and good online security practices (which we’re taking as a given for the purposes of this article, but one quick tip: Enable 2FA everywhere you can) — you can also make it harder for the web’s lurking watchers to dine out on your data.

Just don’t expect the lengths you have to go to protect your privacy to feel fair or just — the horrible truth is this fight sucks.

But whatever you do, don’t give up.

How to hide on the internet

Action: Tape over all your webcams
Who is this for: Everyone — even Mark Zuckerberg!
How difficult is it: Easy peasy lemon squeezy
Tell me more: You can get fancy removable stickers for this purpose (noyb has some nice ones). Or you can go DIY and use a bit of masking tape — on your laptop, your smartphone, even your smart TV… If your job requires you to be on camera, such as for some conference calls, and you want to look a bit more pro you can buy a webcam cover. Sadly locking down privacy is rarely this easy.

Action: Install HTTPS Everywhere
Who is this for: Everyone — seriously do it
How difficult is it: Mild effort
Tell me more: Many websites offer encryption. With HTTPS, people running the network between your device and the server hosting the website you’re browsing can’t see your requests and your internet traffic. But some websites still load unencrypted pages by default (HTTP), which also causes a security risk. The EFF has developed a browser extension that makes sure that you access all websites that offer HTTPS using… HTTPS.

Action: Use tracker blockers
Who is this for: Everyone — except people who like being ad-stalked online
How difficult is it: Mild effort
Tell me more: Trackers refers to a whole category of privacy-hostile technologies designed to follow and record what web users are doing as they move from site to site, and even across different devices. Trackers come in a range of forms these days. And there are some pretty sophisticated ways of being tracked (some definitely harder to thwart than others). But to combat trackers being deployed on popular websites — which are probably also making the pages slower to load than they otherwise would be — there’s now a range of decent, user-friendly tracker blockers to choose from. Pro-privacy search engine DuckDuckGo recently added a tracker blocker to their browser extensions, for example. Disconnect.me is also a popular extension to block trackers from third-party websites. Firefox also has a built-in tracker blocker, which is now enabled by default in the mobile apps. If you’re curious and want to see the list of trackers on popular website, you can also install Kimetrak to understand that it’s a widespread issue.

Action: Use an ad blocker
Who is this for: Everyone who can support the moral burden
How difficult is it: Fairly easy these days but you might be locked out of the content on some news websites as a result
Tell me more: If you’ve tried using a tracker blocker, you may have noticed that many ads have been blocked in the process. That’s because most ads load from third-party servers that track you across multiple sites. So if you want to go one step further and block all ads, you should install an ad blocker. Some browsers like Opera come with an ad blocker. Otherwise, we recommend uBlock Origin on macOS, Windows, Linux and Android. 1Blocker is a solid option on iOS.
But let’s be honest, TechCrunch makes some money with online ads. If 100% of web users install an ad blocker many websites you know and love would simply go bankrupt. While your individual choice won’t have a material impact on the bottom line, consider whitelisting the sites you like. And if you’re angry at how many trackers your favorite news site is running try emailing them to ask (politely) if they can at least reduce the number of trackers they use.

Action: Make a private search engine your default
Who is this for: Most people
How difficult is it: A bit of effort because your search results might become slightly less relevant
Tell me more: Google probably knows more about you than even Facebook does, thanks to the things you tell it when you type queries into its search engine. Though that’s just the tip of how it tracks you — if you use Android it will keep running tabs on everywhere you go unless you opt out of location services. It also has its tracking infrastructure embedded on three-quarters of the top million websites. So chances are it’s following what you’re browsing online — unless you also take steps to lock down your browsing (see below).
But one major way to limit what Google knows about you is to switch to using an alternative search engine when you need to look something up on the Internet. This isn’t as hard as it used to be as there are some pretty decent alternatives now — such as DuckDuckGo which Apple will let you set as the default browser on iOS — or Qwant for French-speaking users. German users can check out Cliqz. You will also need to remember to be careful about any voice assistants you use as they often default to using Google to look stuff up on the web.

Action: Use private browser sessions
Who is this for: Most people
How difficult is it: Not at all if you understand what a private session is
Tell me more: All browsers on desktop and mobile now let you open a private window. While this can be a powerful tool, it is often misunderstood. By default, private sessions don’t make you more invisible — you’ll get tracked from one tab to another. But private sessions let you start with a clean slate. Every time you close your private session, all your cookies are erased. It’s like you disappear from everyone’s radar. You can then reopen another private session and pretend that nobody knows who you are. That’s why using a private session for weeks or months doesn’t do much, but short private sessions can be helpful.

Action: Use multiple browsers and/or browser containers
Who is this for: People who don’t want to stop using social media entirely
How difficult is it: Some effort to not get in a muddle
Tell me more: Using different browsers for different online activities can be a good way of separating portions of your browsing activity. You could, for example, use one browser on your desktop computer for your online banking, say, and a different browser for your social networking or ecommerce activity. Taking this approach further, you could use different mobile devices when you want to access different apps. The point of dividing your browsing across different browsers/devices is to try to make it harder to link all your online activity to you. That said, lots of adtech effort has been put into developing cross-device tracking techniques — so it’s not clear that fragmenting your browsing sessions will successful beat all the trackers. 
In a similar vein, in 2016 Mozilla added a feature to its Firefox browser that’s intended to help web users segregate online identities within the same browser — called multi container extensions. This approach gives users some control but it does not stop their browser being fingerprinted and all their web activity in it linked and tracked. It may help reduce some cookie-based tracking, though.
Last month Mozilla also updated the container feature to add one that specifically isolates a Facebook user’s identity from the rest of the web. This limits how Facebook can track a user’s non-Facebook web browsing — which yes Facebook does do, whatever Zuckerberg tried to claim in Congress — so again it’s a way to reduce what the social network giant knows about you. (Though it should also be noted that clicking on any Facebook social plug-ins you encounter on other websites will still send Facebook your personal data.)

Action: Get acquainted with Tor
Who is this for: Activists, people with high risks attached to being tracked online, committed privacy advocates who want to help grow the Tor network
How difficult is it: Patience is needed to use Tor. Also some effort to ensure you don’t accidentally do something that compromises your anonymity
Tell me more: For the most robust form of anonymous web browsing there’s Tor. Tor’s onion network works by encrypting and routing your Internet traffic randomly through a series of relay servers to make it harder to link a specific device with a specific online destination. This does mean it’s definitely not the fastest form of web browsing around. Some sites can also try to block Tor users so the Internet experience you get when browsing in this way may suffer. But it’s the best chance of truly preserving your online anonymity. You’ll need to download the relevant Tor browser bundle to use it. It’s pretty straightforward to install and get going. But expect very frequent security updates which will also slow you down.

Action: Switch to another DNS
Who is this for: People who don’t trust their ISP
How difficult is it: Moderately
Tell me more: When you type an address in the address bar (such as techcrunch.com), your device asks a Domain Name Server to translate that address into an IP address (a unique combination of numbers and dots). By default, your ISP or your mobile carrier runs a DNS for their users. It means that they can see all your web history. Big telecom companies are going to take advantage of that to ramp up their advertising efforts. By default, your DNS query is also unencrypted and can be intercepted by people running the network. Some governments also ask telecom companies to block some websites on their DNS servers — some countries block Facebook for censorship reasons, others block The Pirate Bay for online piracy reasons.
You can configure each of your device to use another public DNS. But don’t use Google’s public DNS! It’s an ad company, so they really want to see your web history. Both Quad9 and Cloudflare’s have strong privacy policies. But Quad9 is a not-for-profit organization, so it’s easier to trust them.

Action: Disable location services
Who is this for: Anyone who feels uncomfortable with the idea of being kept under surveillance
How difficult is it: A bit of effort finding and changing settings, and a bit of commitment to stay on top of any ‘updates’ to privacy policies which might try to revive location tracking. You also need to be prepared to accept some reduction in the utility and/or convenience of the service because it won’t be able to automatically customize what it shows you based on your location
Tell me more: The tech industry is especially keen to keep tabs on where its users are at any given moment. And thanks to the smash hit success of smartphones with embedded sensors it’s never been easier to pervasively track where people are going — and therefore to infer what they’re doing. For ad targeting purposes location data is highly valuable of course. But it’s also hugely intrusive. Did you just visit a certain type of health clinic? Were you carrying your phone loaded with location-sucking apps? Why then it’s trivially easy for the likes of Google and Facebook to connect your identity to that trip — and link all that intel to their ad networks. And if the social network’s platform isn’t adequately “locked down” — as Zuckerberg would put it — your private information might leak and end up elsewhere. It could even get passed around between all sorts of unknown entities — as the up to 87M Facebook profiles in the Cambridge Analytica scandal appear to have been. (Whistleblower Chris Wylie has said that Facebook data-set went “everywhere”.)
There are other potential risks too. Insurance premiums being assessed based on covertly collected data inputs. Companies that work for government agencies using social media info to try to remove benefits or even have people deported. Location data can also influence the types of adverts you see or don’t see. And on that front there’s a risk of discrimination if certain types of ads — jobs or housing, for example — don’t get served to you because you happen to be a person of color, say, or a Muslim. Excluding certain protected groups of people from adverts can be illegal — but that hasn’t stopped it happening multiple times on Facebook’s platform. And location can be a key signal that underpins this kind of prejudicial discrimination.
Even the prices you are offered online can depend on what is being inferred about you via your movements. The bottom line is that everyone’s personal data is being made to carry a lot of baggage these days — and most of the time it’s almost impossible to figure out exactly what that unasked for baggage might entail when you consent to letting a particular app or service track where you go.
Pervasive tracking of location at very least risks putting you at a disadvantage as a consumer. Certainly if you live somewhere without a proper regulatory framework for privacy. It’s also worth bearing in mind how lax tech giants can be where location privacy is concerned — whether it’s Uber’s infamous ‘god view’ tool or Snapchat leaking schoolkids’ location or Strava accidentally revealing the locations of military bases. Their record is pretty terrible.
If you really can’t be bothered to go and hunt down and switch off every location setting one fairly crude action you can take is to buy a faraday cage carry case — Silent Pocket makes an extensive line of carry cases with embedded wireless shielding tech, for instance — which you can pop your smartphone into when you’re on the move to isolate it from the network. Of course once you take it out it will instantly reconnect and location data will be passed again so this is not going to do very much on its own. Nixing location tracking in the settings is much more effective.

Action: Approach VPNs with extreme caution
Who is this for: All web users — unless free Internet access is not available in your country
How difficult is it: No additional effort
Tell me more: While there may be times when you feel tempted to sign up and use a VPN service — say, to try to circumvent geoblocks so you can stream video content that’s not otherwise available in your country — if you do this you should assume that the service provider will at very least be recording everything you’re doing online. They may choose to sell that info or even steal your identity. Many of them promise you perfect privacy and great terms of service. But you can never know for sure if they’re actually doing what they say. So the rule of thumb about all VPNs is: Assume zero privacy — and avoid if at all possible. Facebook even has its own VPN — which it’s been aggressively pushing to users of its main app by badging it as a security service, with the friendly-sounding name ‘Protect’. In reality the company wants you to use this so it can track what other apps you’re using — for its own business intelligence purposes. So a more accurate name for this ‘service’ would be: ‘Protect Facebook’s stranglehold on the social web’.

Action: Build your own VPN server
Who is this for: Developers
How difficult is it: You need to be comfortable with the Terminal
Tell me more: The only VPN server you can trust is the one you built yourself! In that case, VPN servers can be a great tool if you’re on a network you don’t trust (a hotel, a conference or an office). We recommend using Algo VPN and a hosting provider you trust.

Action: Take care with third-party keyboard apps
Who is this for: All touchscreen device users
How difficult is it: No additional effort
Tell me more: Keyboard apps are a potential privacy minefield given that, if you allow cloud-enabled features, they can be in a position to suck out all the information you’re typing into your device — from passwords to credit card numbers to the private contents of your messages. That’s not to say that all third-party keyboards are keylogging everything you type. But the risk is there — so you need to be very careful about what you choose to use. Security is also key. Last year, sensitive personal data from 31M+ users of one third-party keyboard, AI.type, leaked online after the company had failed to properly secure its database server, as one illustrative example of the potential risks.
Google knows how powerful keyboards can be as a data-sucker — which is why it got into the third-party keyboard game, outing its own Gboard keyboard app first for Apple’s iOS in 2016 and later bringing it to Android. If you use Gboard you should know you are handing the adtech giant another firehose of your private information — though it claims that only search queries and “usage statistics” are sent by Gboard to Google (The privacy policy further specifies: “Anything you type other than your searches, like passwords or chats with friends, isn’t sent. Saved words on your device aren’t sent.”). So if you believe that Gboard is not literally a keylogger. But it is watching what you search for and how you use your phone. 
Also worth remembering: Data will still be passed by Gboard to Google if you’re using an e2e encrypted messenger like Signal. So third party keyboards can erode the protection afforded by robust e2e encryption — so again: Be very careful what you use.

Action: Use end-to-end encrypted messengers
Who is this for: Everyone who can
How difficult is it: Mild effort unless all your friends are using other messaging apps
Tell me more: Choosing friends based on their choice of messaging app isn’t a great option so real world network effects can often work against privacy. Indeed, Facebook uses the fuzzy feelings you have about your friends to manipulate Messenger users to consent to continuously uploading their phone contacts, by suggesting you have to if you want to talk to your contacts. (Which is, by the by, entirely bogus.)
But if all your friends use a messaging app that does not have end-to-end encryption chances are you’ll feel forced to use that same non-privacy-safe app too. Given that the other option is to exclude yourself from the digital chatter of your friend group. Which would clearly suck. 
Facebook-owned WhatsApp does at least have end-to-end encryption — and is widely used (certainly internationally). Though you still need to be careful to opt out of any privacy-eroding terms the company tries to push. In summer 2016, for example, a major T&Cs change sought to link WhatsApp users’ accounts with their Facebook profiles (and thus with all the data Facebook holds on them) — as well as sharing sensitive stuff like your last seen status, your address book, your BFFs in Whatsapp and all sorts of metadata with Zuck’s ‘family’ of companies. Thankfully most of this privacy-hostile data sharing has been suspended in Europe, after Facebook got in trouble with local data protection agencies. 

Action: Use end-to-end encryption if you use cloud storage
Who is this for: Dedicated privacy practitioners, anyone worried about third parties accessing their stuff
How difficult is it: Some effort, especially if you have lots of content stored in another service that you need to migrate
Tell me more: Dropbox IPO’d last month — and the markets signalled their approval of its business. But someone who doesn’t approve of the cloud storage giant is Edward Snowden — who in 2014 advised: “Get rid of Dropbox”, arguing the company is hostile to privacy. The problem is that Dropbox does not offer zero access encryption — because it retains encryption keys, meaning it can technically decrypt and read the data you store with it if it decides it needs to or is served with a warrant.
Cloud storage alternatives that do offer local encryption with no access to the encryption keys are available, such as Spideroak. And if you’re looking for a cloud backup service, Backblaze also offers the option to let you manage the encryption key. Another workaround if you do still want to use a service like Dropbox is to locally encrypt the stuff you want to store before you upload it — using another third party service such as Boxcryptor.

Action: Use an end-to-end encrypted email service
Who is this for: Anyone who wants to be sure their email isn’t being data mined
How difficult is it: Some effort — largely around migrating data and/or contacts from another email service
Tell me more: In the middle of last year Google finally announced it would no longer be data-mining the emails inside its Gmail free email service. (For a little perspective on how long it took to give up data-mining your emails, Gmail launched all the way back in 2004.) The company probably feels it has more than enough alternative data points feeding its user profiling at this point. Plus data-mining email with the rise of end-to-end encrypted messaging apps risks pushing the company over the ‘creepy line’ it’s been so keen to avoid to try to stave off the kind of privacy backlash currently engulfing Facebook.
So does it mean that Gmail is now 100% privacy safe? No, because the service is not end-to-end encrypted. But there are now some great webmail clients that do offer robust end-to-end encryption — most notably the Swiss service Protonmail. Really it’s never been easier to access a reliable, user-friendly, pro-privacy email service. If you want to go one step further, you should set up PGP encryption keys and share them with your contacts. This is a lot more difficult though.

Action: Choose iOS over Android
Who is this for: Mainstream consumers, Apple fans
How difficult is it: Depends on the person. Apple hardware is generally more expensive so there’s a cost premium
Tell me more: No connected technology is 100% privacy safe but Apple’s hardware-focused business model means the company’s devices are not engineered to try to harvest user data by default. Apple does also invest in developing pro-privacy technologies. Whereas there’s no getting around the fact Android-maker Google is an adtech giant whose revenues depend on profiling users in order to target web users with adverts. Basically the company needs to suck your data to make a fat profit. That’s why Google asks you to share all your web and app activity and location history if you want to use Google Assistant, for instance.
Android is a more open platform than iOS, though, and it’s possible to configure it in many different ways — some of which can be more locked down as regards privacy than others (the Android Open Source Project can be customized and used without Google services as default preloads, for example). But doing that kind of configuration is not going to be within reach of the average person. So iOS is the obvious choice for mainstream consumers.

Action: Delete your social media accounts
Who is this for: Committed privacy lovers, anyone bored with public sharing
How difficult is it: Some effort — mostly feeling like you’re going to miss out. But third party services can sometimes require a Facebook login (a workaround for that would be to create a dummy Facebook account purely for login purposes — using a name and email you don’t use for anything else, and not linking it to your usual mobile phone number or adding anyone you actually know IRL)
Tell me more: Deleting Facebook clearly isn’t for everyone. But ask yourself how much you use it these days anyway? You might find yourself realizing it’s not really that central to what you do on the Internet after all. The center of gravity in social networking has shifted away from mass public sharing into more tightly curated friend groups anyway, thanks to the popularity of messaging apps.
But of course Facebook owns Messenger, Instagram and WhatsApp too. So ducking out of its surveillance dragnet entirely is especially hard. Ideally you would also need to run tracker blockers (see above) as the company tracks non-Facebook users around the Internet via the pixels it has embedded on lots of popular websites.
While getting rid of your social media accounts is not a privacy panacea, removing yourself from mainstream social network platforms at least reduces the risk of a chunk of your personal info being scraped and used without your say so. Though it’s still not absolutely guaranteed that when you delete an account the company in question will faithfully remove all your information from their servers — or indeed from the servers of any third party they shared your data with.
If you really can’t bring yourself to ditch Facebook (et al) entirely, at least dive into the settings and make sure you lock down as much access to your data as you can — including checking which apps have been connected to your account and removing any that aren’t relevant or useful to you anymore.

Action: Say no to always-on voice assistants
Who is this for: Anyone who values privacy more than gimmickry
How difficult is it: No real effort
Tell me more: There’s a rash of smart speaker voice assistants on shop shelves these days, marketed in a way that suggests they’re a whole lot smarter and more useful than they actually are. In reality they’re most likely to be used for playing music (albeit, audio quality can be very poor) or as very expensive egg timers.
Something else the PR for gadgets like Amazon’s (many) Echos or Google Home doesn’t mention is the massive privacy trade off involved with installing an always-on listening device inside your home. Essentially these devices function by streaming whatever you ask to the cloud and will typically store recordings of things you’ve said in perpetuity on the companies’ servers. Some do offer a delete option for stored audio but you would have to stay on top of deleting your data as long as you keep using the device. So it’s a tediously Sisyphean task. Smart speakers have also been caught listening to and recording things their owner didn’t actually want them to — because they got triggered by accident. Or when someone on the TV used the trigger word.
The privacy risks around smart speakers are clearly very large indeed. Not least because this type of personal data is of obvious and inevitable interest to law enforcement agencies. So ask yourself whether that fake fart dispenser gizmo you’re giggling about is really worth the trade off of inviting all sorts of outsiders to snoop on the goings on inside your home.

Action: Block some network requests
Who is this for: Paranoid people
How difficult is it: Need to be tech savvy
Tell me more: On macOS, you can install something called Little Snitch to get an alert every time an app tries to talk with a server. You can approve or reject each request and create rules. If you don’t want Microsoft Word to talk with Microsoft’s servers all the time for instance, it’s a good solution — but is not really user friendly.

Action: Use a privacy-focused operating system
Who is this for: Edward Snowden
How difficult is it: Need to be tech savvy
Tell me more: If you really want to lock everything down, you should consider using Tails as your desktop operating system. It’s a Linux distribution that leaves no trace by default, uses the Tor network for all network requests by default. But it’s not exactly user friendly, and it’s quite complicated to install on a USB drive. One for those whose threat model really is ‘bleeding edge’.

Action: Write to your political reps to demand stronger privacy laws
Who is this for: Anyone who cares about privacy, and especially Internet users in North America right now
How difficult is it: A bit of effort
Tell me more: There appears to be bipartisan appetite among U.S. lawmakers to bring in some form of regulation for Internet companies. And with new tougher rules coming in in Europe next month it’s an especially opportune moment to push for change in the U.S. where web users are facing reduced standards vs international users after May 25. So it’s a great time to write to your reps reminding them you’re far more interested in your privacy being protected than Facebook winning some kind of surveillance arms race with the Chinese. Tell them it’s past time for the U.S. to draft laws that prioritize the protection of personal data. 

Action: Throw away all your connected devices — and choose your friends wisely
Who is this for: Fugitives and whistleblowers
How difficult is it: Privacy doesn’t get harder than this
Tell me more: Last month the former Catalan president, Carles Puigdemont — who, in October, dodged arrest by the Spanish authorities by fleeing to Brussels after the region’s abortive attempt to declare independence — was arrested by German police, after crossing the border from Denmark in a car. Spanish intelligence agents had reportedly tracked his movements via the GPS on the mobile device of one or more of his friends. The car had also been fitted with a tracker. Trusting anything not to snitch on you is a massive risk if your threat model is this high. The problem is you also need trustworthy friends to help you stay ahead of the surveillance dragnet that’s out to get you.

Action: Ditch the Internet entirely
Who is this for: Fugitives and whistleblowers
How difficult is it: Privacy doesn’t get harder than this
Tell me more: Public administrations can ask you to do pretty much everything online these days — and even if it’s not mandatory to use their Internet service it can be incentivized in various ways. The direction of travel for government services is clearly digital. So eschewing the Internet entirely is getting harder and harder to do.
One wild card option — that’s still not a full Internet alternative (yet) — is to use a different type of network that’s being engineered with privacy in mind. The experimental, decentralized MaidSafe network fits that bill. This majorly ambitious project has already clocked up a decade’s worth of R&D on the founders’ mission to rethink digital connectivity without compromising privacy and security by doing away with servers — and decentralizing and encrypting everything. It’s a fascinating project. Just sadly not yet a fully-fledged Internet alternative.

Source: TechCrunch

Ewoks are on a rampage in the upcoming limited-time ‘Battlefront II’ event

Whether you love them or hate them, the furry but lethal Ewoks are a big part of the Star Wars universe, and they’re featured in a limited-time Battlefront II event. Even more terrifying, loot boxes are coming back to the game.

The post Ewoks are on a rampage in the upcoming limited-time ‘Battlefront II’ event appeared first on Digital Trends.

Source: Digital trends

Austin is piloting blockchain to improve homeless services

While the vagaries of the cryptocurrency markets are keeping crypto traders glued to their CoinDesk graphs, the real potential of blockchain is its capability to solve real human challenges in a decentralized, private, and secure way. Government officials have increasingly investigated how blockchain might solve critical problems, but now one city intends to move forward with an actual implementation.

The city of Austin is piloting a new blockchain platform to improve identity services for its homeless population, as part of a competitive grant awarded by the Mayor’s Challenge program sponsored by Bloomberg Philanthropies. Austin was one of 35 cities to be awarded pilot grants, and the top city from that group will ultimately be awarded $5 million.

Steve Adler, the mayor of Austin since 2015, explained to TechCrunch that “at a high level, [the pilot] is trying to figure out how to solve one of the challenges we have in our community related to the homeless population, which is how to keep all the information of that individual with that individual.”

Identity is among the thorniest challenges for governments to solve, particularly for marginal populations like the homeless or refugees. As Sly Majid, Chief Services Officer for Austin, said, “If you have your backpack stolen or if your social security card gets wet and falls apart, or if you are camping and the city cleans up the site and takes your possessions, you have to start all over from the beginning again.” That is devastating for marginal populations, because it means that the cycle of poverty persists. “It really prevents you from going about and doing the sort of activities that allow you to transition out of homelessness,” he continued.

Austin has been on an economic tear, becoming one of the top startup hubs in the United States and increasingly drawing talent from major cities like San Francisco. But, “For everything that is going right, we have some challenges that are shared by a lot of large cities,” Adler said. That dizzying growth has raised housing prices, making it more difficult to improve the city’s homelessness rate. Some 2,000 individuals are homeless in the city according to a census taken earlier this year, with several thousand more at various states of transition.

The city wanted to improve the ability of its patchwork of government and private homeless service providers to offer integrated and comprehensive aid. There are a number of separate challenges here: verifying the identity of a person seeking help, knowing what care that individual has previously received, and empowering the individual to “own” their own records, and ultimately, their destiny.

The goal of the city’s blockchain pilot program is to consolidate the identity and vital records of each homeless person in a safe and confidential way while providing a means for service providers to access that information. Adler explained that “there are all kinds of confidentiality issues that arise when you try to do that, so the thought was that blockchain would allow us to bridge that need.”

By using blockchain, the hope is that the city could replace paper records, which are hard to manage, with electronic encrypted records that would be more reliable and secure. In addition, the blockchain platform could create a decentralized authentication mechanism to verify a particular person’s identity. For instance, a homeless services worker operating in the field could potentially use their mobile device to verify a person live, without having to bring someone back to an office for processing.

More importantly, vital records on the blockchain could build over time, so different providers would know what services a person had used previously. Majid provided the example of health care, where it is crucially important to know the history of an individual. The idea is that, when a homeless person walks into a clinic, the blockchain would provide the entire patient history of that individual to the provider. “Here was your medical records from your last clinic visits, and we can build off the care that you were given last time,” he said. Austin is partnering with the Dell Medical School at the University of Texas to work out how best to implement the blockchain for medical professionals.

Identity is a popular area for investors interested in blockchain and decentralization more generally. As I wrote about earlier this week, Element, a New York City-based startup co-founded by famed deep learning researcher Yann LeCun, hopes to provide decentralized identity to people in developing countries like Indonesia and the Philippines. Austin is exploring partnering with decentralized startups like BanQu to implement the details of the service for the city.

Majid noted that “It’s an iterative process for us, … and we need to crawl before we walk, and walk before we run.” Adler believes that the program is an example of the power of fusing government and private industry. Austin “tries to work with new industries, and new technologies, and new economies and tries to find the proper intersection of government innovation and responsibility,” he said. If blockchain can improve homelessness here, that solution could carry throughout the world.

Source: TechCrunch

Solo: A Star Wars Story toys now on sale, peek at new movie – CNET

Hasbro, Lego and other toymakers are releasing their toys depicting younger Han Solo’s adventures.
Source: CNET

NASA, SpaceX to launch spacecraft to find another Earth – CNET

We speak to scientists behind a new mission to find nearby exoplanets that could host life.
Source: CNET

Playground is betting big on robots

You find robotics in unexpected corners of Playground Global’s Palo Alto headquarters. They’re in the lobby and scattered amongst the cubicles. Inside the venture fund’s labs, an older Spot Mini stands next to RightHand Robotics’ pick and place mechanical arm.

A recent video shoot in the space shows Boston Dynamics’ latest creation meeting Playground-funded bipedal wunderkind Cassie for the first time. The former also had a run-in with Andy Rubin’s dog in the company parking lot. The poor little terrier was less impressed.

Robotics is a core part of the firm’s portfolio. No surprise, really. It was, after all, co-founder Rubin’s lifelong obsession with the technology that gave Google’s mobile operating system its name. Co-founder and CTO Peter Barrett clearly shares that enthusiasm, as he gives us a tour around the space, pointing out each and every ‘bot surrounding Playground’s delightfully on-brand slide and swings.

“They’re becoming a good investment,” the executive begins. “Robotics is really in its infancy for some of these scale applications. What’s missing has been the link between what are now tour de force controls and physical systems with the intelligence and perception to make them useful.”

At last count, the company lists around 10 robotics investments in its portfolio — including some that are still in stealth mode. Those that it has revealed represent a fairly robust cross-section of technologies. There’s warehouse fulfillment system RightHand and Agility, the Oregon State spin-off that created Cassie. Zippy develops delivery robots and FarmWise builds autonomous systems designed to harvest food for short-staffed farmers.

To hear Barrett describe it, however, the companies are not as disconnected as they might appear at first blush. The CTO casually hints at something larger — a sort of connective tissue that might one day link the far-flung world of robotics. It’s hard not to see echoes of his pitch in Rubin’s earlier work on Android.

“There’s not a good robotics platform the way there is a good platform for making cellphones,” Barrett explains during an interview seated above the titular playground. “There are core components in things like ROS [Robot Operating System], but there’s no real, broad intelligence platforms that imagines robotics the way we think it will evolve.”

ROS, a legacy operating system designed by dearly departed Bay Area robotics company Willow Garage, is currently the closest to what Barrett describes. The open source OS, currently maintained by Open Source Robotics Foundation, is designed to provide the framework for robotic development.

Its mission statement also hints at Playground’s grander goals, being “built from the ground up to encourage collaborative robotics software development.” But the executive believes the teams his firm have developed can take things even further, offering both a springboard for robotics developers and helping to develop a shared knowledge base so both robots and their creators don’t have to redouble efforts every time a new system comes along.

“Every one of those investments would benefit from a common, underlying infrastructure that scales up into the disrupted intelligence that we think these robotic applications will need in the future,” Barrett says. “So, we think it’s worth our while spending the time working on the underlying infrastructure.”

Beyond that, things start to get a bit hazy — because, well, VCs. No point in showing your full hand when you may or may not be building Skynet (without all of the time-traveling, killer robots, of course). But Playground’s larger vision finds the company looking to help robotics grow beyond its own built-in feedback loop.

“If you look into the capital that goes into robotics, an enormous amount of it goes sideways implementing and reimplementing things that we’ve been doing since Shakey was made in the ’50s,” he says, referring to SRI’s groundbreaking, multi-purpose mobile robot.

There are echoes here of Google robotics, Rubin’s post-Android pursuit, which left the world wondering what, precisely the company was building amid an acquisition spree that found the company snapping up Boston Dynamics, Industrial Perception and Bot & Dolly, among others.

With Barrett and Rubin at the helm, along with fellow co-founders Matt Hershenson and Bruce Leak, those goals could finally be realized. After all, what’s the point (or fun) in funding startups if you aren’t going to go big?

“We tend not to look for short-term returns,” says Barrett. “In VC, you have to do something that is almost certainly wrong, otherwise everyone else will do it. The real opportunities are somewhere between the unlikely and the impossible. It’s hard to invest on the other side of impossible, and it’s hard to make money on the other side of unlikely.”

Andy Rubin and Playground will be appearing at TC Sessions: Robotics on May 11 at the UC Berkeley campus. 

Source: TechCrunch