When you buy a smart phone in China, your face will be…
Tag: Surveillance
AI Drones Monitoring Music Festivals
The Eye in the Sky program, a drone surveillance system developed in…
The Automatic Listening Exploitation Act
Smart home devices like the Amazon Echo and Google Nest are super…
Big Brother Likes To Watch
Billions of CCTV cameras now monitor cities across the world but don’t…
iPhone Security Called Into Question
Companies claiming to be able to crack iPhone security measures for law…
China’s “Deadbeat” Map
An app-based ‘deadbeat debtors’ map can warn users if they’re in close…
AI For Mass Surveillance
Cyber security experts say the world’s democracies should fear the development of…
The Omnipresence Of Facial Recognition Technology
There are rising concerns over the unfettered use of the technology. How…
Weekly News From Beyond Infinity 24/4/18
Our weekly news round-up: TESS exoplanet hunter successfully launched toward unusual lunar…
Privacy Doubts Over Virtual Assistants
Where do devices like Google Home, Home Pod or Alexa store all…
The Longer Arm Of The Law
The South Australian Government plans to legislate for mandatory police access to…
Facebook Hears Your Words, Then Serves Targeted Ads
The social network already knows so much about you. With sophisticated AI,…
How To Monitor Encrypted Communications
Governments want access to WhatsApp and other encrypted messaging technologies that have…
The Feds Want Access To Private Messaging
In the wake of recent terror attacks, Attorney General George Brandis wants…
British And US Democracy Falls Victim To Data Miners
Were the outcomes of the Brexit referendum and the US presidential election…
Wikileaks Vault 7: The Post-Privacy World
In Part 3 of our series on Wikileaks’ Vault 7 release, we…
More from Wikileaks Vault 7 – Dark Matter
In Part 2 of our series on this massive leak, we discuss…
The Risks Of Free VPNs
Virtual Private Networks are very useful but it’s worth using a reputable…
Surveillance And Wifi
Changes in the strength and timing of a wifi signal can reveal…
Who Is Banksy?
The secretive street artist’s identity is confirmed by criminal geographic targeting.
TOR And The Dark Web
TorFlow lets you visualise what private browser traffic looks like around the…
Metadata Retention
Reams of data is collected from PCs and mobile devices, serving both…
Reset the Net Privacy Initiative
Mass surveillance by governments has prompted many large internet companies to form…
Government Data Retention Policies Debated
Sir Tim Berners-Lee, the inventor of the world wide web, says there…